Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 178 / 237
Privacy, a chi tocca proteggere gli studenti? https://www.wired.it/article/privacy-studenti-scuole-italia-google-microsoft-ministero-istruzione/
31/03/2023 20:03:16
QRCode
archive.org
thumbnail

L'uso di piattaforme didattiche fornite da Google e Microsoft nelle scuole italiane solleva interrogativi sullo scambio di dati con gli Stati Uniti, al centro di un braccio di ferro tra Washington e la Commissione europea. E per il ministero dell'Istruzione il problema è delle scuole

Wiredit IT 2023 Privacy scuola schools google microsoft istruzione US
Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability
30/03/2023 22:38:23
QRCode
archive.org
thumbnail
  • Proofpoint has observed recent espionage-related activity by TA473, including yet to be reported instances of TA473 targeting US elected officials and staffers. TA473 is a newly minted Proofpoint threat actor that aligns with public reporting on Winter Vivern.
  • TA473 since at least February 2023 has continuously leveraged an unpatched Zimbra vulnerability in publicly facing webmail portals that allows them to gain access to the email mailboxes of government entities in Europe.
  • TA473 recons and reverse engineers bespoke JavaScript payloads designed for each government targets’ webmail portal.
  • Proofpoint concurs with Sentinel One analysis that TA473 targeting superficially aligns with the support of Russian and/or Belarussian geopolitical goals as they pertain to the Russia-Ukraine War.
proofpoint EN 2023 NATO proofpoint Zimbra CVE-2022-27926 WinterVivern Russia JavaScript payloads
Spyware vendors use 0-days and n-days against popular platforms https://blog.google/threat-analysis-group/spyware-vendors-use-0-days-and-n-days-against-popular-platforms/
30/03/2023 22:29:01
QRCode
archive.org
thumbnail

Google’s Threat Analysis Group (TAG) tracks actors involved in information operations (IO), government backed attacks and financially motivated abuse. For years, TAG has been tracking the activities of commercial spyware vendors to protect users. Today, we actively track more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government backed actors. These vendors are enabling the proliferation of dangerous hacking tools, arming governments that would not be able to develop these capabilities in-house. While use of surveillance technologies may be legal under national or international laws, they are often found to be used by governments to target dissidents, journalists, human rights workers and opposition party politicians.

GoogleTAG EN 2023 0-days Spyware Italy Malaysia Kazakhstan CVE-2022-42856 Webkit Samsung CVE-2022-4262 CVE-2023-0266
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics https://www.theguardian.com/technology/2023/mar/30/vulkan-files-leak-reveals-putins-global-and-domestic-cyberwarfare-tactics
30/03/2023 21:38:14
QRCode
archive.org
thumbnail

Vulkan engineers have worked for Russian military and intelligence agencies to support hacking operations, prepare for attacks on infrastructure and spread disinformation

theguardian EN 2023 Leak Vulkan Russian Russia military intelligence cyberwarfare VulkanLeaks
3CX VoIP Software Compromise & Supply Chain Threats https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats
30/03/2023 15:18:36
QRCode
archive.org
thumbnail

The 3CX VoIP Desktop Application has been compromised to deliver malware via legitimate 3CX updates. Huntress has been investigating this incident and working to validate and assess the current supply chain threat to the security community.

huntress EN 2023 3CX VoIP Software Compromise supplychain analysis
3CX Security Alert for Electron Windows App https://www.3cx.com/blog/news/desktopapp-security-alert/
30/03/2023 11:17:11
QRCode
archive.org
thumbnail

A security issue arose on Update 7, version numbers 18.12.407 & 18.12.416 only for our Electron Windows App. Check this post for more info.

3CX EN official statement security
Ironing out (the macOS details) of a Smooth Operator https://objective-see.org/blog/blog_0x73.html
30/03/2023 10:54:24
QRCode
archive.org
thumbnail

The 3CX supply chain attack, gives us an opportunity to analyze a trojanized macOS application

objective-see EN 2023 3CX supplychain macOS trojanized
3CX: Supply Chain Attack Affects Thousands of Users Worldwide https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3cx-supply-chain-attack
30/03/2023 10:32:25
QRCode
archive.org
thumbnail

North Korean-sponsored actors believed to be linked to attack that Trojanized several versions of 3CX DesktopApp

symantec EN 2023 3CX DesktopApp IoCs
CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/
30/03/2023 09:04:31
QRCode
archive.org

What Happened On March 29, 2023, Falcon OverWatch observed unexpected malicious activity emanating from a legitimate …

reddit EN 2023 CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers
Hackers compromise 3CX desktop app in a supply chain attack https://www.bleepingcomputer.com/news/security/hackers-compromise-3cx-desktop-app-in-a-supply-chain-attack/
30/03/2023 09:01:57
QRCode
archive.org
thumbnail

A digitally signed and trojanized version of the 3CX Voice Over Internet Protocol (VOIP) desktop client is reportedly being used to target the company's customers in an ongoing supply chain attack.

bleepingcomputer EN 2023 3CX PBX Supply-Chain Supply-Chain-Attack Voice-over-IP VoIP
3CX users under DLL-sideloading attack: What you need to know https://news.sophos.com/en-us/2023/03/29/3cx-dll-sideloading-attack/
30/03/2023 09:00:47
QRCode
archive.org
thumbnail

A Trojanized version of the popular VOIP/PBX software is in the news; here’s what hunters and defenders are doing

IOCs

sophos EN 2023 3CX DLL-sideloading
New OpcJacker Malware Distributed via Fake VPN Malvertising https://www.trendmicro.com/en_us/research/23/c/new-opcjacker-malware-distributed-via-fake-vpn-malvertising.html
29/03/2023 21:26:28
QRCode
archive.org
thumbnail

We discovered a new malware, which we named “OpcJacker” (due to its opcode configuration design and its cryptocurrency hijacking ability), that has been distributed in the wild since the second half of 2022.

trendmicro EN 2023 malware endpoints research articles news reports OpcJacker VPN Malvertising
The criminal use of ChatGPT – a cautionary tale about large language models https://www.europol.europa.eu/media-press/newsroom/news/criminal-use-of-chatgpt-cautionary-tale-about-large-language-models
27/03/2023 13:18:01
QRCode
archive.org
thumbnail

In response to the growing public attention given to ChatGPT, the Europol Innovation Lab organised a number of workshops with subject matter experts from across Europol to explore how criminals can abuse large language models (LLMs) such as ChatGPT, as well as how it may assist investigators in their daily work.

europol 2023 EN ChatGPT criminal use
Guidance for investigating attacks using CVE-2023-23397 https://www.microsoft.com/en-us/security/blog/2023/03/24/guidance-for-investigating-attacks-using-cve-2023-23397/
27/03/2023 11:09:51
QRCode
archive.org
thumbnail

This guide provides steps organizations can take to assess whether users have been targeted or compromised by threat actors exploiting CVE-2023-23397.

microsoft EN 2023 Guidance investigating CVE-2023-23397 Outlook
France bans all recreational apps from government devices https://www.theregister.com/2023/03/27/france_bans_all_recreational_apps/
27/03/2023 11:02:57
QRCode
archive.org
thumbnail

The government of France has banned TikTok – and all other recreational apps – from phones issued to its employees.

The nation's ministère de la transformation et de la fonction publiques last Friday issued a statement PDF announcing the policy, which minister of transformation and public service Stanislas Guerini justified on grounds that no recreational apps have sufficiently robust security for them to be deployed on government-owned devices.

theregister EN 2023 France TikTok statement government-owned devices ban
Bypassing Qakbot Anti-Analysis https://lab52.io/blog/bypassing-qakbot-anti-analysis-tactics/
27/03/2023 07:31:49
QRCode
archive.org

QakBot is a banking trojan that has been evolving since its first version was discovered in 2008. According to the 2022 report published by CISA, it was one of the most active variants in 2021, and during 2022 and so far in 2023 it has remained quite active. Taking a brief look at the latests news of QakBot it has been updating its tactics constantly, for example, using a Windows zero-day to avoid displaying the MoTW or the most recent one, using OneNote files to drop QakBot.

In this case we are particularly interested in the anti-analysis techniques used by QakBot during the early stages of its execution. These techniques can make malware analysis harder if they are not known, so learning to identify and bypass them is essential to get to see the malware’s operation at its full potential. Furthermore, there are techniques that can replicate / adopt different types of malware, so knowking them opens the door to the study of different samples.

lab52 EN 2023 Qakbot analysis anti-analysis techniques TTP
MacStealer: New macOS-based Stealer Malware Identified https://www.uptycs.com/blog/macstealer-command-and-control-c2-malware
27/03/2023 07:20:11
QRCode
archive.org
thumbnail

Uptycs has already identified three Windows-based malware families that use Telegram this year, including Titan Stealer, Parallax RAT, and HookSpoofer. Attackers are increasingly turning to it, particularly for stealer command and control (C2).

And now the Uptycs threat research team has discovered a macOS stealer that also controls its operations over Telegram. We’ve dubbed it MacStealer.

Uptycs EN 2023 macOS C2 stealer MacStealer Telegram
NCA infiltrates cyber crime market with disguised DDoS sites https://www.nationalcrimeagency.gov.uk/news/nca-infiltrates-cyber-crime-market-with-disguised-ddos-sites
27/03/2023 07:18:17
QRCode
archive.org
thumbnail

The National Crime Agency has today revealed that it has infiltrated the online criminal marketplace by setting up a number of sites purporting to offer DDoS-for-hire services.

Today’s announcement comes after the Agency chose to identify one of the sites currently being run by officers as part of a sustained programme of activity to disrupt and undermine DDoS as a criminal service.

nationalcrimeagency 2023 EN NCA DDoS
Throttling and Blocking Email from Persistently Vulnerable Exchange Servers to Exchange Online - Microsoft Community Hub https://techcommunity.microsoft.com/t5/exchange-team-blog/throttling-and-blocking-email-from-persistently-vulnerable/ba-p/3762078
27/03/2023 07:15:28
QRCode
archive.org
thumbnail

As we continue to enhance the security of our cloud, we are going to address the problem of email sent to Exchange Online from unsupported and unpatched Exchange servers. There are many risks associated with running unsupported or unpatched software, but by far the biggest risk is security. Once a version of Exchange Server is no longer supported, it no longer receives security updates; thus, any vulnerabilities discovered after support has ended don’t get fixed. There are similar risks associated with running software that is not patched for known vulnerabilities. Once a security update is released, malicious actors will reverse-engineer the update to get a better understanding of how to exploit the vulnerability on unpatched servers.

microsoft techcommunity EN 2023 announce Blocking Email Exchange unpatched
La NZZ victime d'un ransomware https://www.ictjournal.ch/news/2023-03-24/la-nzz-victime-dun-ransomware
25/03/2023 22:19:39
QRCode
archive.org
thumbnail

Plusieurs médias alémaniques sont touchés par un ransomware.

ictjournal CH 2023 ransomware NZZ journal médias
page 178 / 237
4737 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio