Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 180 / 220
4391 résultats taggé EN  ✕
NoName057(16) - The Pro-Russian Hacktivist Group Targeting NATO https://www.sentinelone.com/labs/noname05716-the-pro-russian-hacktivist-group-targeting-nato/
12/01/2023 21:54:07
QRCode
archive.org
thumbnail

In the name of Russia's war in Ukraine, NoName057(16) abuses GitHub and Telegram in an ongoing campaign to disrupt NATO's critical infrastructure.

sentinelone EN 2023 NoName057(16) Russia Telegram Hacktivist NATO
StrongPity espionage campaign targeting Android users https://www.welivesecurity.com/2023/01/10/strongpity-espionage-campaign-targeting-android-users/
11/01/2023 22:39:31
QRCode
archive.org
thumbnail

ESET researchers uncover an active StrongPity campaign that spreads a trojanized version of the Android Telegram app posing as the Shagle video chat app.

welivesecurity EN 2023 ESET Android Telegram trojanized Shagle
Misconfigured PostgreSQL Used to Target Kubernetes Clusters https://www.databreachtoday.eu/misconfigured-postgresql-used-to-target-kubernetes-clusters-a-20899?s=09
11/01/2023 11:33:08
QRCode
archive.org
thumbnail

Researchers have found that Kinsing malware gained access to Kubernetes servers by exploiting misconfigured and exposed PostgreSQL servers. The threat actors gained

databreachtoday EN 2023 PostgreSQL Kubernetes Misconfigured malware Kinsing
Zoom Patches High Risk Flaws on Windows, MacOS Platforms https://www.securityweek.com/zoom-patches-high-risk-flaws-windows-macos-platforms
11/01/2023 09:23:06
QRCode
archive.org

Video messaging giant Zoom has released patches for multiple security vulnerabilities that expose both Windows and macOS users to malicious hacker attacks.

securityweek EN 2023 CVE-2022-36930 CVE-2022-36929 CVE-2022-36927 patch-tuesday zoom zoom-rooms windows macos video-conferencing video-messaging privilege-escalation vulnerability
Raspberry Robin's botnet second life https://blog.sekoia.io/raspberry-robins-botnet-second-life/
10/01/2023 20:52:19
QRCode
archive.org
thumbnail

Raspberry Robin appears to be a type of Pay-Per-Install botnet, likely to be used by cybercriminals to distribute other malware.

sekoia EN 2023 RaspberryRobin Pay-Per-Install botnet cybercriminals malware
The OWASSRF + TabShell exploit chain https://blog.viettelcybersecurity.com/tabshell-owassrf/
09/01/2023 23:56:01
QRCode
archive.org
thumbnail

We see that one of our vulnerabilities is exploited in the wild Link. So we decided to public the detail analysis of our two bug chains. Any customer has enough information to mitigate these bugs. The vendor also released all patches a week ago. This blog post shares the detail

viettelcybersecurity EN 2022 Exchange TabShell exploit chain OWASSRF vulnerabilities
New Paper on Old Threema Protocol https://threema.ch/en/blog/posts/news-alleged-weaknesses-statement
09/01/2023 22:50:34
QRCode
archive.org
thumbnail

This is a statement on the NZZ news article from January 9, 2023 about alleged weaknesses in Threema's encryption. But these are completely impractical and theoretical.

threema EN 2023 statement NZZ weaknesses encryption Old Protocol
Three Lessons from Threema: Analysis of a Secure Messenger https://breakingthe3ma.app/
09/01/2023 22:48:01
QRCode
archive.org

Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers.

In our work, we present seven attacks against the cryptographic protocols used by Threema, in three distinct threat models. All the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice.

breakingthe3ma Threema EN 2023 paper vulnerabilies attacks cryptographic protocols
Advertising ID: APPLE DISTRIBUTION INTERNATIONAL fined 8 million euros https://www.cnil.fr/en/advertising-id-apple-distribution-international-fined-8-million-euros
09/01/2023 05:30:39
QRCode
archive.org

On 29 December 2022, the CNIL's restricted committee imposed an administrative fine of 8 million euros on the company APPLE DISTRIBUTION INTERNATIONAL because it did not collect the consent of iPhone's French users (iOS 14.6 version) before depositing and/or writing identifiers used for advertising purposes on their terminals.

CNIL EN 2023 Apple administrative fine collect iPhone France ads advertising
I scanned every package on PyPi and found 57 live AWS keys https://tomforb.es/i-scanned-every-package-on-pypi-and-found-57-live-aws-keys/
07/01/2023 22:21:04
QRCode
archive.org

After inadvertently finding that InfoSys leaked an AWS key on PyPi I wanted to know how many other live AWS keys may be present on Python package index. After scanning every release published to PyPi I found 57 valid access keys from organisations like:

Amazon themselves 😅
Intel
Stanford, Portland and Louisiana University
The Australian Government
General Atomics fusion department
Terradata
Delta Lake
And Top Glove, the worlds largest glove manufacturer 🧤

tomforb EN 2022 leak scan AWS keys PyPi
OPWNAI : Cybercriminals Starting to Use ChatGPT https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/
07/01/2023 11:11:03
QRCode
archive.org

At the end of November 2022, OpenAI released ChatGPT, the new interface for its Large Language Model (LLM), which instantly created a flurry of interest in AI and its possible uses. However, ChatGPT has also added some spice to the modern cyber threat landscape as it quickly became apparent that code generation can help less-skilled threat actors effortlessly launch cyberattacks.

In Check Point Research’s (CPR) previous blog, we described how ChatGPT successfully conducted a full infection flow, from creating a convincing spear-phishing email to running a reverse shell, capable of accepting commands in English. The question at hand is whether this is just a hypothetical threat or if there are already threat actors using OpenAI technologies for malicious purposes.

CPR’s analysis of several major underground hacking communities shows that there are already first instances of cybercriminals using OpenAI to develop malicious tools. As we suspected, some of the cases clearly showed that many cybercriminals using OpenAI have no development skills at all. Although the tools that we present in this report are pretty basic, it’s only a matter of time until more sophisticated threat actors enhance the way they use AI-based tools for bad.

checkpoint EN 2023 research deepweb OpenAI ChatGPT cybercriminals malicious tools
Armed With ChatGPT, Cybercriminals Build Malware And Plot Fake Girl Bots https://www.forbes.com/sites/thomasbrewster/2023/01/06/chatgpt-cybercriminal-malware-female-chatbots/
07/01/2023 11:09:04
QRCode
archive.org
thumbnail

Users of underground forums start sharing malware coded by OpenAI’s viral sensation and dating scammers are planning on creating convincing fake girls with the tool. Cyber prognosticators predict more malicious use of ChatGPT is to come.

forbes EN 2023 Cybercriminals Fake Girl Bots deepweb openAI ChatGPT
Schools hit by cyber attack and documents leaked https://www.bbc.com/news/uk-england-gloucestershire-63637883
06/01/2023 15:22:58
QRCode
archive.org
thumbnail

Confidential details including child passport scans and SEN data is published online, the BBC finds.

bbc EN 2023 ViceSociety vice-society schools UK leak ransomware attack education
Twitter leak: 200m+ account database now free to download https://www.theregister.com/2023/01/05/twitter_leak_200m_accounts/
06/01/2023 08:40:58
QRCode
archive.org
thumbnail

No passwords, but plenty of stuff for social engineering and doxxing

theregister 2023 EN Twitter leak download doxxing database
Slack Security Update https://slack.com/intl/en-au/blog/news/slack-security-update
06/01/2023 00:15:12
QRCode
archive.org
thumbnail

Because we take security, privacy, and transparency very seriously, we are sharing the details of a recent incident.

Slack EN 2024 security incident Security-Incident details
Cyberattack shutters the Guardian's office for a month https://www.semafor.com/article/01/03/2023/cyberattack-shutters-the-guardians-office-for-a-month
06/01/2023 00:07:08
QRCode
archive.org
thumbnail

The news organization won't go into detail about what attackers hit, and why.

semafor EN 2023 Guardian ransomware London hack
Meta’s Ad Practices Ruled Illegal Under E.U. Law https://www.nytimes.com/2023/01/04/technology/meta-facebook-eu-gdpr.html
05/01/2023 23:47:40
QRCode
archive.org

The decision is one of the most consequential issued under the E.U.’s landmark data-protection law and creates a new business headwind for the social media giant.

nytimes 2023 EN privacy EU Meta Illegal Ad ruling Facebook WhatsApp Ireland GDPR
CircleCI warns of security breach — rotate your secrets! https://www.bleepingcomputer.com/news/security/circleci-warns-of-security-breach-rotate-your-secrets/
05/01/2023 08:35:09
QRCode
archive.org
thumbnail

CircleCI, a software development service has disclosed a security incident and is urging users to rotate their secrets.

The CI/CD platform touts having a user base comprising more than one million engineers who rely on the service for "speed and reliability" of their builds."speed and reliability" of their builds.

bleepingcomputer EN 2023 CircleCI DevOps Security-Incident
Jenkins discloses dozens of zero-day bugs in multiple plugins https://www.bleepingcomputer.com/news/security/jenkins-discloses-dozens-of-zero-day-bugs-in-multiple-plugins/
05/01/2023 08:28:08
QRCode
archive.org
thumbnail

On Thursday, the Jenkins security team announced 34 security vulnerabilities affecting 29 plugins for the Jenkins open source automation server, 29 of the bugs being zero-days still waiting to be patched.

bleepingcomputer EN 2023 CSRF Jenkins Vulnerability XSS Zero-Day Security
Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More https://samcurry.net/web-hackers-vs-the-auto-industry/
05/01/2023 07:01:14
QRCode
archive.org
thumbnail

During the fall of 2022, a few friends and I took a road trip from Chicago, IL to Washington, DC to attend a cybersecurity conference and (try) to take a break from our usual computer work.

While we were visiting the University of Maryland, we came across a fleet of electric scooters scattered across the campus and couldn't resist poking at the scooter's mobile app. To our surprise, our actions caused the horns and headlights on all of the scooters to turn on and stay on for 15 minutes straight.

When everything eventually settled down, we sent a report over to the scooter manufacturer and became super interested in trying to more ways to make more things honk. We brainstormed for a while, and then realized that nearly every automobile manufactured in the last 5 years had nearly identical functionality. If an attacker were able to find vulnerabilities in the API endpoints that vehicle telematics systems used, they could honk the horn, flash the lights, remotely track, lock/unlock, and start/stop vehicles, completely remotely.

samcurry EN 2023 Auto Industry Critical Vulnerabilities BMW Rolls Royce Porsche car-hacking API
page 180 / 220
5001 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn