Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 175 / 213
4251 résultats taggé E*N  ✕
Shlayer Malware: Continued Use of Flash Updates https://www.crowdstrike.com/blog/shlayer-malvertising-campaigns-still-using-flash-update-disguise/
28/12/2022 02:49:09
QRCode
archive.org
thumbnail

Although Flash Player reached end of life for macOS in 2020, this has not stopped Shlayer operators from continuing to abuse it for malvertising campaigns.

crowdstrike EN 2021 Flash Player macOS Shlayer malvertising analysis IoCs
Shlayer malware abusing Gatekeeper bypass on macOS https://www.jamf.com/blog/shlayer-malware-abusing-gatekeeper-bypass-on-macos/
28/12/2022 02:48:09
QRCode
archive.org
thumbnail

Shlayer malware bypasses Gatekeeper security protections on macOS to execute unauthorized software without requiring approval.

jamf EN 2021 Gatekeeper bypass macOS Shlayer malware
L’art de l’évasion How Shlayer hides its configuration inside Apple proprietary DMG files https://objective-see.org/blog/blog_0x70.html
28/12/2022 02:46:15
QRCode
archive.org
thumbnail

While conducting routine threat hunting for macOS malware on Ad networks, I stumbled upon an unusual Shlayer sample. Upon further analysis, it became clear that this variant was different from the known Shlayer variants such as OSX/Shlayer.D, OSX/Shlayer.E, or ZShlayer. We have dubbed it OSX/Shlayer.F.

objective-see 2022 EN Shlayer macos malware IoCs analysis
Hacker claims to be selling Twitter data of 400 million users https://www.bleepingcomputer.com/news/security/hacker-claims-to-be-selling-twitter-data-of-400-million-users/
27/12/2022 13:11:04
QRCode
archive.org
thumbnail

A threat actor claims to be selling public and private data of 400 million Twitter users scraped in 2021 using a now-fixed API vulnerability. They're asking $200,000 for an exclusive sale.

bleepingcomputer EN 2022 Twitter threat API vulnerability ransom
Cracking encrypted Lastpass vaults https://markuta.com/cracking-lastpass-vaults/
27/12/2022 00:42:22
QRCode
archive.org

The recent (2022) compromise of Lastpass included email addresses, home addresses, names, and encrypted customer vaults. In this post I will demonstrate how attackers may leverage tools like Hashcat to crack an encrypted vault with a weak password.

Markuta EN 2022 password-cracking lastpass compromise Hashcat crack PoC
Threat Spotlight: XLLing in Excel - threat actors using malicious add-ins https://blog.talosintelligence.com/xlling-in-excel-malicious-add-ins/
26/12/2022 23:07:12
QRCode
archive.org
thumbnail

As more and more users adopt new versions of Microsoft Office, it is likely that threat actors will turn away from VBA-based malicious documents to other formats such as XLLs or rely on exploiting newly discovered vulnerabilities to launch malicious code.

talosintelligence EN 2022 Excel XLLing malicious add-ins XLL malicious analysis
Raspberry Robin Malware Targets Telecom, Governments https://www.trendmicro.com/en_us/research/22/l/raspberry-robin-malware-targets-telecom-governments.html
26/12/2022 23:06:07
QRCode
archive.org
thumbnail

We found samples of the Raspberry Robin malware spreading in telecommunications and government office systems beginning September. The main payload itself is packed with more than 10 layers for obfuscation and is capable of delivering a fake payload once it detects sandboxing and security analytics tools.

trendmicro EN 2022 malware apt endpoints RaspberryRobin obfuscation analysis
Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development - SentinelOne https://www.sentinelone.com/labs/custom-branded-ransomware-the-vice-society-group-and-the-threat-of-outsourced-development/
26/12/2022 23:03:12
QRCode
archive.org
thumbnail

New PolyVice ransomware is likely in use by multiple threat actors building re-branded payloads with the same custom encryption scheme.

sentinelone EN 2022 ransomware PolyVice ViceSociety analysis
An infostealer comes to town: Dissecting a highly evasive malware targeting Italy https://blog.cluster25.duskrise.com/2022/12/22/an-infostealer-comes-to-town
23/12/2022 22:35:26
QRCode
archive.org
thumbnail

Cluster25 researchers analyzed several campaigns (also publicly reported by CERT-AGID) that used phishing emails to spread an InfoStealer malware written in .NET through an infection chain that involves Windows Shortcut (LNK) files and Batch Scripts (BAT). Taking into account the used TTPs and extracted evidence, the attacks seem perpetrated by the same adversary (internally named AUI001).

cluster25 EN 2022 infostealer Italy phishing Campaigns analysis Alibaba2044 IoCs
Notice of Recent Security Incident https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/
22/12/2022 23:25:58
QRCode
archive.org
thumbnail

We are working diligently to understand the scope of the incident and identify what specific information has been accessed.

lastpass EN 2022 incident backup hack exfiltration
New Ransomware Strains Emerging from Leaked Conti’s Source Code   https://blog.cyble.com/2022/12/22/new-ransomware-strains-emerging-from-leaked-contis-source-code/
22/12/2022 22:59:19
QRCode
archive.org
thumbnail

Cyble Research and Intelligence Labs analyzes multiple ransomware strains created based on leaked source code of Conti Ransomware.

cyble EN 2022 Conti Leaked sourcecode ransomware strains analysis
Meddler-in-the-Middle Phishing Attacks Explained MitM https://unit42.paloaltonetworks.com/meddler-phishing-attacks/
22/12/2022 22:47:44
QRCode
archive.org
thumbnail

Meddler-in-the-Middle (MitM) phishing attacks show how threat actors find ways to get around traditional defenses and advice.

unit42 EN 2022 MitM phishing Meddler-in-the-Middle explanation analysis
Stolen certificates in two waves of ransomware and wiper attacks https://securelist.com/ransomware-and-wiper-signed-with-stolen-certificates/108350/
22/12/2022 22:45:01
QRCode
archive.org
thumbnail

In this report, we compare the ROADSWEEP ransomware and ZEROCLEARE wiper versions used in two waves of attacks against Albanian government organizations.

securelist 2022 EN Malware Malware-Descriptions Malware-Technologies Ransomware Targeted-attacks Trojan Wiper Albania
New Kiss-a-dog Cryptojacking Campaign Targets Docker and Kubernetes https://www.crowdstrike.com/blog/new-kiss-a-dog-cryptojacking-campaign-targets-docker-and-kubernetes/
22/12/2022 10:08:41
QRCode
archive.org
thumbnail

CrowdStrike has uncovered a new cryptojacking campaign targeting vulnerable Docker and Kubernetes infrastructure using an obscure domain from the payload, container escape attempt and anonymized “dog” mining pools.

Called “Kiss-a-dog,” the campaign used multiple command-and-control (C2) servers to launch attacks that attempted to mine cryptocurrency, utilize user and kernel mode rootkits to hide the activity, backdoor compromised containers, move laterally in the network and gain persistence. 

The CrowdStrike Falcon® platform helps protect organizations of all sizes from sophisticated breaches, including cryptojacking campaigns such as this. 

crowdstrike EN 2022 Kiss-a-dog Cryptojacking docker kubernetes
A Roomba recorded a woman on the toilet. How did screenshots end up on Facebook? https://www.technologyreview.com/2022/12/19/1065306/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy/
21/12/2022 20:14:56
QRCode
archive.org
thumbnail

Robot vacuum companies say your images are safe, but a sprawling global supply chain for data from our devices creates risk.

technologyreview EN 2022 privacy robots robot-vacuums iRobot Roomba Amazon artificial-intelligence machine-learning computer-vision internet-of-things surveillance privacy Federal-Trade-Commission
Guardian hit by serious IT incident believed to be ransomware attack https://www.theguardian.com/media/2022/dec/21/guardian-hit-by-serious-it-incident-believed-to-be-ransomware-attack
21/12/2022 20:00:59
QRCode
archive.org
thumbnail

Incident has hit parts of media company’s technology infrastructure, with staff told to work from home

theguardian EN 2022 incident ransomware attack
Okta's source code stolen after GitHub repositories hacked https://www.bleepingcomputer.com/news/security/oktas-source-code-stolen-after-github-repositories-hacked/
21/12/2022 11:05:22
QRCode
archive.org
thumbnail

In a 'confidential' email notification sent by Okta and seen by BleepingComputer, the company states that attackers gained access to its GitHub repositories this month and stole the company's source code.

bleepingcomputer en 2022 GitHub Okta Source-Code Theft
2022: A Look Back On A Year Of Mass Exploitation https://www.greynoise.io/blog/2022-a-look-back-on-a-year-of-mass-exploitation
21/12/2022 00:08:18
QRCode
archive.org
thumbnail

Researchers at GreyNoise Intelligence have added over 230 tags since January 1, 2022, which include detections for over 160 CVEs. In today’s release of the GreyNoise Intelligence 2022 "Year of Mass Exploits" retrospective report, we showcase four of 2022's most pernicious and pwnable vulnerabilities.

greynoise 2022 EN review Intelligence retrospective
SentinelSneak: Malicious PyPI module poses as security software development kit https://blog.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk
21/12/2022 00:05:00
QRCode
archive.org
thumbnail

A malicious Python file found on the PyPI repo adds backdoor and data exfiltration features to what appears to be a legitimate SDK client from SentinelOne.

reversinglabs EN 2022 PyPI Supply-chain-security Python exfiltration module kit
CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange https://securelist.com/cve-2022-41040-and-cve-2022-41082-zero-days-in-ms-exchange/108364/
20/12/2022 17:56:09
QRCode
archive.org
thumbnail

At the end of September, GTSC reported the finding of two 0-day vulnerabilities in Microsoft Exchange Server, CVE-2022-41040 and CVE-2022-41082. The cybersecurity community dubbed the pair of vulnerabilities ProxyNotShell.

securelist EN 2022 DLL-hijacking Malware-Descriptions Microsoft-Exchange Trojan Vulnerabilities-and-exploits Zero-day CVE-2022-41040 CVE-2022-41082 analysis
page 175 / 213
4834 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn