Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 179 / 208
4148 résultats taggé EN  ✕
A New Attack Surface on MS Exchange Part 4 - ProxyRelay! https://devco.re/blog/2022/10/19/a-new-attack-surface-on-MS-exchange-part-4-ProxyRelay/
19/10/2022 07:03:05
QRCode
archive.org
thumbnail

Hi, this is a long-time-pending article. We could have published this article earlier (the original bug was reported to MSRC in June 2021 with a 90-days Public Disclosure Policy). However, during communications with MSRC, they explained that since this is an architectural design issue, lots of code changes and testings are expected and required, so they hope to resolve this problem with a one-time CU (Cumulative Update) instead of the regular Patch Tuesday. We understand their situation and agree to extend the deadline.

devco.re EN 2022 CVE-2021-26414 CVE-2022-21979 Exchange Microsoft-Exchange ProxyRelay
CVE-2022-42889: Keep Calm and Stop Saying "4Shell" https://www.rapid7.com/blog/post/2022/10/17/cve-2022-42889-keep-calm-and-stop-saying-4shell/
18/10/2022 11:13:42
QRCode
archive.org
thumbnail

CVE-2022-42889, which some have begun calling “Text4Shell,” is a vulnerability in the popular Apache Commons Text library that can result in code execution when processing malicious input. The vulnerability was announced on October 13, 2022 on the Apache dev list and originally reported by Alvaro Munoz

rapid7 EN 2022 CVE-2022-42889 Text4Shell Apache Commons Text
Cyble Phishing ERMAC Android Malware Increasingly Active https://blog.cyble.com/2022/10/18/ermac-android-malware-increasingly-active/
18/10/2022 10:45:03
QRCode
archive.org
thumbnail

CRIL Investigates the resurgence of ERMAC Android Malware as an increasing number of users are falling prey to their phishing attacks.

cyble EN 2022 ERMAC Android Malware phishing Analysis
Ransom Cartel Ransomware: A Possible Connection With REvil https://unit42.paloaltonetworks.com/ransom-cartel-ransomware/
18/10/2022 10:33:34
QRCode
archive.org
thumbnail

Ransom Cartel is ransomware as a service (RaaS) that exhibits several similarities to and technical overlaps with REvil ransomware. Read our overview.

unit42 paloaltonetworks EN 2022 Ransom-Cartel REvil RaaS
Technical Analysis of BlueSky Ransomware https://cloudsek.com/technical-analysis-of-bluesky-ransomware/
18/10/2022 10:30:48
QRCode
archive.org

BlueSky Ransomware is a modern malware using advanced techniques to evade security defences. It predominantly targets Windows hosts and utilizes the Windows multithreading model for fast encryption.

cloudsek EN 2022 ransomware IoCs Analysis BlueSky
Prime minister links drones over Norway to ‘hybrid threats’ https://www.newsinenglish.no/2022/10/14/prime-minister-links-drones-over-norway-to-hybrid-threats/
17/10/2022 19:56:46
QRCode
archive.org

Norwegian police and military were busy again this week investigating more unidentified drones seen flying over critical energy infrastructure. After a Russian man was arrested for trying to leave Norway with two drones containing lots of pictures, Prime Minister Jonas Gahr Støre likened the incidents to a new form of “hybrid threats.”

newsinenglish.no EN 2022 drone Norway hybrid-threat Russia
New “Prestige” ransomware impacts organizations in Ukraine and Poland https://www.microsoft.com/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/
14/10/2022 21:21:48
QRCode
archive.org
thumbnail

The Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a novel ransomware campaign targeting organizations in the logistics and transportation industry in Ukraine and Poland utilizing a previously unidentified ransomware payload.

microsoft EN 2022 MSTIC Ukraine Poland ransomware payload Prestige
Microsoft Office 365 Message Encryption Insecure Mode of Operation | WithSecure™ Labs https://labs.withsecure.com/advisories/microsoft-office-365-message-encryption-insecure-mode-of-operation
14/10/2022 16:11:00
QRCode
archive.org
thumbnail

Microsoft Office 365 Message Encryption (OME) utilitises Electronic Codebook (ECB) mode of operation. This mode is insecure and leaks information about the structure of the messages sent and can lead to partial or full message disclosure.

withsecure EN 2022 Security-advisory 365 office365 leak Encryption ECB disclosure
New PHP Variant of Ducktail Infostealer Targeting Facebook Business Accounts https://www.zscaler.com/blogs/security-research/new-php-variant-ducktail-infostealer-targeting-facebook-business-accounts
14/10/2022 13:45:07
QRCode
archive.org
thumbnail

ThreatLabz has discovered, hiding in app stores, a PHP variant of the Ducktail infostealer used to hijack Facebook Business accounts.

zscaler EN 2022 Ducktail Facebook Infostealer Analysis
Software Delivery Shield protects the software supply chain https://cloud.google.com/blog/products/devops-sre/introducing-software-delivery-shield-from-google-cloud
14/10/2022 13:43:39
QRCode
archive.org
thumbnail

Software Delivery Shield, a software supply chain security solution, can enhance the security posture along the supply chain from dev to production.

google EN blog cloud supplychain supply-chain solution dev shield announcement
Threat Alert: Private npm Packages Disclosed via Timing Attacks https://blog.aquasec.com/private-packages-disclosed-via-timing-attack-on-npm
14/10/2022 09:42:51
QRCode
archive.org
thumbnail

Via timing attacks, threat actors create phony public npm packages masked as private ones to deceive developers into downloading compromised packages

aquasec EN 2022 npm supplychain supply-chain attack timing-attack
Alchimist: A new attack framework in Chinese for Mac, Linux and Windows https://blog.talosintelligence.com/2022/10/alchimist-offensive-framework.html
14/10/2022 09:39:08
QRCode
archive.org
thumbnail
  • Cisco Talos discovered a new attack framework including a command and control (C2) tool called "Alchimist" and a new malware "Insekt" with remote administration capabilities.
  • The Alchimist has a web interface in Simplified Chinese with remote administration features.
  • The attack framework is designed to target Windows, Linux and Mac machines.
  • Alchimist and Insekt binaries are implemented in GoLang.
  • This campaign consists of additional bespoke tools such as a MacOS exploitation tool, a custom backdoor and multiple off-the-shelf tools such as reverse proxies.
talosintelligence EN 2022 TheAlchimist C2 C&C attack-framework
On Bypassing eBPF Security Monitoring https://blog.doyensec.com/2022/10/11/ebpf-bypass-security-monitoring.html
13/10/2022 11:05:20
QRCode
archive.org

There are many security solutions available today that rely on the Extended Berkeley Packet Filter (eBPF) features of the Linux kernel to monitor kernel functions. Such a paradigm shift in the latest monitoring technologies is being driven by a variety of reasons

doyensec doyensecurity EN 2022 vulnerability exploit eBPF bypass research
Black Basta Ransomware Gang Infiltrates networks via QAKBOT, Brute Ratel, and Cobalt Strike https://www.trendmicro.com/de_de/research/22/j/black-basta-infiltrates-networks-via-qakbot-brute-ratel-and-coba.html
13/10/2022 10:33:28
QRCode
archive.org
thumbnail

We analyzed a QAKBOT-related case leading to a Brute Ratel C4 and Cobalt Strike payload that can be attributed to the threat actors behind the Black Basta ransomware.

trendmicro EN 2022 malware research network reports cyber-threats QAKBOT BruteRatelC4 BlackBasta
POLONIUM targets Israel with Creepy malware https://www.welivesecurity.com/2022/10/11/polonium-targets-israel-creepy-malware/
13/10/2022 10:07:59
QRCode
archive.org
thumbnail

ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group.

welivesecurity EN 2022 research POLONIUM Israel malware APT
Malicious WhatsApp mod distributed through legitimate apps https://securelist.com/malicious-whatsapp-mod-distributed-through-legitimate-apps/107690/
12/10/2022 15:26:42
QRCode
archive.org
thumbnail

The malicious version of YoWhatsApp messenger, containing Triada trojan, was spreading through ads in the popular Snaptube app and the Vidmate app's internal store.

securelist EN 2022 Trojan WhatsApp malicious Snaptube
The Fresh Phish Market: Behind the Scenes of the Caffeine Phishing-as-a-Service Platform https://www.mandiant.com/resources/blog/caffeine-phishing-service-platform
11/10/2022 08:42:18
QRCode
archive.org
thumbnail

Bad actors are using a shared Phishing-as-a-Service platform called “Caffeine”.

mandiant EN 2022 Caffeine Phishing-as-a-Service Platform
New US Executive Order unlikely to satisfy EU law https://noyb.eu/en/new-us-executive-order-unlikely-satisfy-eu-law
10/10/2022 19:38:25
QRCode
archive.org
thumbnail

Today, the US government published an executive order, allegedly limiting US surveillance. This is a first statement by noyb.

noyb EN 2022 EU US privacy-shield privacy statement executive-order surveillance
Fake Ransomware Infection Under widespread https://blog.cyble.com/2022/10/06/fake-ransomware-infection-under-widespread/
10/10/2022 12:25:54
QRCode
archive.org
thumbnail

Cyble Research and Intelligence Labs analyzes Fake ransomware, a destructive malware capable of wiping out system drives.

cyble EN 2022 Fake Ransomware dell.exe Analysis
Intel Confirms Alder Lake BIOS Source Code Leak https://www.tomshardware.com/news/intel-confirms-6gb-alder-lake-bios-source-code-leak-new-details-emerge
10/10/2022 08:31:57
QRCode
archive.org
thumbnail

Intel confirms that 6GB of proprietary BIOS source code for its Alder Lake processors was leaked to the public.

tomshardware EN 202 Alder Lake BIOS Source Code Leak Intel
page 179 / 208
4734 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio