Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 178 / 251
A Shady Chinese Firm’s Encryption Chips Got Inside NATO and NASA https://www.wired.com/story/hualan-encryption-chips-entity-list-china/
17/06/2023 13:06:40
QRCode
archive.org
thumbnail

The US government warns encryption chipmaker Hualan has suspicious ties to China’s military. Yet US agencies still use one of its subsidiary’s chips, raising fears of a backdoor.

wired EN 2023 US China chipmaker cybersecurity china encryption national-security Supply-Chain backdoor
‘Several’ US federal agencies affected by MOVEit breach https://therecord.media/several-us-federal-agencies-affected-by-moveit-breach
16/06/2023 09:34:27
QRCode
archive.org

Top U.S. cybersecurity officials confirmed Thursday that several federal agencies have been impacted by cyberattacks on the widely used MOVEit file transfer tool.

Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly told reporters that her team and the FBI are working to provide assistance to federal agencies that used MOVEit, which is being exploited by the Russia-based Clop ransomware gang in a widespread breach that appears to have compromised dozens of entities.

“We’ve been working closely with Progress Software [which makes MOVEit], the FBI and our federal partners to understand its prevalence within federal agencies,” she said. Earlier in the day, CNN first reported that several government agencies were compromised in the hacks. Easterly said that CISA is providing support to “several agencies that have experienced intrusions of their MOVEit applications.”

therecord EN 2023 MOVEit cl0p US federal agencies affected
Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally
16/06/2023 00:57:42
QRCode
archive.org
thumbnail

Mandiant is investigating a Barracuda ESG appliance zero-day vulnerability being exploited in the wild.

mandiant EN 2023 Barracuda ESG Zero-Day CVE-2023-2868 China
Suspected LockBit ransomware affiliate arrested, charged in US https://www.bleepingcomputer.com/news/security/suspected-lockbit-ransomware-affiliate-arrested-charged-in-us/
15/06/2023 21:43:01
QRCode
archive.org
thumbnail

Russian national Ruslan Magomedovich Astamirov was arrested in Arizona and charged by the U.S. Justice Department for allegedly deploying LockBit ransomware on the networks of victims in the United States and abroad.

bleepingcomputer EN 2023 Affiliates LockBit Ransomware Security arrested
Fake Security Researcher GitHub Repositories Deliver Malicious Implant https://vulncheck.com/blog/fake-repos-deliver-malicious-implant
15/06/2023 21:39:46
QRCode
archive.org
thumbnail

VulnCheck discovers a network of fake security researcher accounts promoting hidden malware.

vulncheck EN 2023 fake researcher malware GitHub Repositories Implant
Déferlante d’attaques DDoS en Suisse revendiquées par des hacktivistes pro-russes https://www.ictjournal.ch/news/2023-06-15/deferlante-dattaques-ddos-en-suisse-revendiquees-par-des-hacktivistes-pro-russes
15/06/2023 21:27:02
QRCode
archive.org
thumbnail

Déferlante d’attaques DDoS en Suisse revendiquées par des hacktivistes pro-russes

ICTjournal FR CH 2023 DDoS Russia-Ukraine-war suisse
Ransomware gang lists first victims of MOVEit mass-hacks, including US banks and universities | TechCrunch https://techcrunch.com/2023/06/15/moveit-clop-mass-hacks-banks-universities/
15/06/2023 13:53:44
QRCode
archive.org
thumbnail

The hackers responsible for exploiting a flaw to target users of a popular file transfer tool has begun listing victims of the mass-attacks

techcrunch EN 2023 ransomware MOVEit cl0p victims
Microsoft Encrypted Restricted Permission Messages Deliver Phishing | Trustwave https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/microsoft-encrypted-restricted-permission-messages-deliver-phishing/
15/06/2023 08:21:00
QRCode
archive.org
thumbnail

Over the past few days, we have seen phishing attacks that use a combination of compromised Microsoft 365 accounts and .rpmsg encrypted emails to deliver the phishing message.

trustwave EN 2023 Phishing Microsoft Email Microsoft-365 rpmsg encrypted M365
Ce qui se cache derrière les cyberattaques pro-russes contre la Suisse https://www.watson.ch/fr/international/hacker/187817038-ce-qui-se-cache-derriere-les-cyberattaques-pro-russes-contre-la-suisse
14/06/2023 23:01:36
QRCode
archive.org
thumbnail

Le groupe d'hacktivistes pro-russe «NoName057(16)» poursuit sans relâche ses attaques contre des serveurs suisses. Voici leur organisation sur Telegram.

watson FR 2023 International hacker Technologie Russie NoName057(16) CH NoName
Cadet Blizzard emerges as a novel and distinct Russian threat actor | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2023/06/14/cadet-blizzard-emerges-as-a-novel-and-distinct-russian-threat-actor/
14/06/2023 22:05:17
QRCode
archive.org
thumbnail

Microsoft attributes several campaigns to a distinct Russian state-sponsored threat actor tracked as Cadet Blizzard (DEV-0586), including the WhisperGate destructive attack, Ukrainian website defacements, and the hack-and-leak front “Free Civilian”.

microsoft EN 2023 CadetBlizzard DEV-0586 Russia analysis
The Phantom Menace: Brute Ratel remains rare and targeted https://news.sophos.com/en-us/2023/05/18/the-phantom-menace-brute-ratel-remains-rare-and-targeted/
14/06/2023 21:42:55
QRCode
archive.org
thumbnail

The commercial attack tool’s use by bad actors has faded after an initial flurry, while Cobalt Strike remains the go-to post-exploitation tool for many.

sophos EN 2023 BruteRatel faded analysis
Cyberattaque contre l'entreprise Xplain: les premiers résultats des analyses indiquent que des mesures sont nécessaires https://www.admin.ch/gov/fr/accueil/documentation/communiques.msg-id-95683.html
14/06/2023 17:25:33
QRCode
archive.org

Berne, 14.06.2023 - Depuis la révélation de l'attaque par rançongiciel qui a visé l'entreprise Xplain, des examens approfondis sont en cours à l'administration fédérale. Les analyses effectuées jusqu'à présent montrent que les données dérobées comprennent aussi des données opérationnelles de diverses autorités et organisations. Le but est maintenant de comprendre comment ces données se sont retrouvées sur l'infrastructure de l'entreprise Xplain.

admin.ch FR 2023 Communiqué Xplain administration fédérale
TAG Aviation: Black Basta pirate une compagnie romande https://www.watson.ch/fr/suisse/technologie/155927204-tag-aviation-black-basta-pirate-une-compagnie-romande
14/06/2023 17:05:24
QRCode
archive.org
thumbnail

La société TAG Aviation a été victime d'une attaque par ransomware. Les recherches de watson révèlent que Black Basta est à l'origine de cette attaque.

watson CH FR Suisse TAG Aviation ransomware BlackBasta Technologie Informatique hacker Cybercrime Genève
Switzerland under cyberattack https://www.helpnetsecurity.com/2023/06/14/swiss-government-ddos/
14/06/2023 14:11:04
QRCode
archive.org
thumbnail

The Swiss government is under DDoS attacks, but several ransomware gangs have also turned their sights on other Swiss organizations.

helpnetsecurity EN 2023 CH Swiss DDoS attacks ransomware russia-ukraine-war
Microsoft June 2023 Patch Tuesday fixes 78 flaws, 38 RCE bugs https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2023-patch-tuesday-fixes-78-flaws-38-rce-bugs/
13/06/2023 19:31:28
QRCode
archive.org
thumbnail

Today is Microsoft's June 2023 Patch Tuesday, with security updates for 78 flaws, including 38 remote code execution vulnerabilities.

bleepingcomputer EN 2023 patch-tuesday June2023
Analysis of CVE-2023-27997 and Clarifications on Volt Typhoon Campaign https://www.fortinet.com/blog/psirt-blogs/analysis-of-cve-2023-27997-and-clarifications-on-volt-typhoon-campaign
13/06/2023 07:31:34
QRCode
archive.org
thumbnail

Affected Platforms: FortiOS
Impacted Users: Targeted at government, manufacturing, and critical infrastructure
Impact: Data loss and OS and file corruption
Severity Level: Critical

Today, Fortinet published a CVSS Critical PSIRT Advisory (FG-IR-23-097 / CVE-2023-27997) along with several other SSL-VPN related fixes. This blog adds context to that advisory, providing our customers with additional details to help them make informed, risk-based decisions, and provides our perspective relative to recent events involving malicious actor activity.

fortinet EN 2023 patch CVE-2023-27997 analysis VoltTyphoon Clarifications
Xortigate, or CVE-2023-27997 - The Rumoured RCE That Was https://labs.watchtowr.com/xortigate-or-cve-2023-27997/
13/06/2023 07:21:59
QRCode
archive.org
thumbnail

When Lexfo Security teased a critical pre-authentication RCE bug in FortiGate devices on Saturday 10th, many people speculated on the practical impact of the bug. Would this be a true, sky-is-falling level vulnerability like the recent CVE-2022-42475? Or was it some edge-case hole, requiring some unusual and exotic requisite before any exposure? Others even went further, questioning the legitimacy of the bug itself. Details were scarce and guesswork was rife.

labs.watchtowr EN 2023 Xortigate XOR RCE CVE-2023-27997 FortiGate analysis
CVE-2023-34362 https://attackerkb.com/topics/mXmV0YpC3W/cve-2023-34362/rapid7-analysis
12/06/2023 17:53:05
QRCode
archive.org
thumbnail

On May 31, 2023, Progress Software disclosed a critical SQL injection vulnerability that was later assigned CVE-2023-34362. Rapid7 has observed exploitation in…

attackerkb EN 2023 MOVEit CVE-2023-34362
Attaque DDoS contre l’administration fédérale: plusieurs applications et sites Internet ne sont plus accessibles https://www.ncsc.admin.ch/ncsc/fr/home/aktuell/im-fokus/2023/ddos.html
12/06/2023 11:45:14
QRCode
archive.org

Lundi 12 juin 2023, plusieurs sites Internet de la Confédération étaient ou sont encore inaccessibles, en raison d’une attaque DDoS menée contre ses systèmes. Celle-ci a été rapidement détectée par les spécialistes de l’administration fédérale, qui travaillent actuellement à rétablir dans les plus brefs délais l’accès aux applications et sites Internet touchés.

NCSC FR CH DDoS NoName
Sites officiels paralysés: L’administration fédérale suisse fait l’objet d’une attaque informatique | 24 heures https://www.24heures.ch/ladministration-federale-suisse-fait-lobjet-dune-attaque-informatique-895980737992
12/06/2023 11:05:06
QRCode
archive.org
thumbnail

L’entité «NoName» a pris pour cible des sites officiels de l’administration, comme FedPol, lundi matin lors d’une cyberattaque.

24heures FR CH NoName FedPol DDoS
page 178 / 251
5008 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn