Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 181 / 251
EDR bypassing via memory manipulation techniques | WithSecure™ Labs https://labs.withsecure.com/publications/edr-bypassing-via-memory-manipulation-techniques
31/05/2023 14:13:59
QRCode
archive.org
thumbnail

Endpoint Detection & Response systems (EDR),
delivered by in-house teams or as part of a managed
service, are a feature of modern intrusion detection
and remediation operations. This success is a problem
for attackers, and malicious actors have worked to
find new ways to evade EDR detection capabilities.

PDF Document

withsecure EN 2023 Research Connor-Morley EDR bypass manipulation techniques
Iranian dissidents take over high-security servers of regime presidency | https://english.mojahedin.org/news/iranian-dissidents-take-over-high-security-servers-of-regime-presidency/
31/05/2023 07:08:46
QRCode
archive.org
thumbnail

A group of Iranian dissidents, self-described as “GhyamSarnegouni” (meaning "Rise to Overthrow" in Farsi), has claimed responsibility for taking control

New hacking forum leaks data of 478,000 RaidForums members https://www.bleepingcomputer.com/news/security/new-hacking-forum-leaks-data-of-478-000-raidforums-members/
30/05/2023 08:48:58
QRCode
archive.org
thumbnail

A database for the notorious RaidForums hacking forums has been leaked online, allowing threat actors and security researchers insight into the people who frequented the forum.

bleepingcomputer EN 2023 Data-Breach Database Exposed Hacking-Forum RaidForums
Hauts-de-Seine : les petits pirates informatiques avaient rançonné le pôle Leonard de Vinci https://www.leparisien.fr/amp/faits-divers/hauts-de-seine-les-petits-pirates-informatiques-avaient-ranconne-le-pole-leonard-de-vinci-26-05-2023-MYCVLRMXANDDRL3F3YNAL24PUE.php
29/05/2023 21:15:22
QRCode
archive.org
thumbnail

Trois étudiants avaient fait chanter les responsables du pôle universitaire. Ils ont été interpellés par la police judiciaire avant d’être présentés à un juge d’instruction.

leparisien FR 2023 étudiants rançon données France école Université
The professionalization of cyber crime https://www.withsecure.com/en/expertise/research-and-innovation/research/the-professionalization-of-cyber-crime
29/05/2023 15:13:15
QRCode
archive.org
thumbnail

The huge profits of ransomware have led to a rapid evolution and professionalization of the wider cyber crime industry, and the rapid growth of a supporting underground marketplace of products and service providers.

PDF doc

withsecure EN 2023 ransomware professionalization cyber-crime-industry,
You’ve been kept in the dark (web): exposing Qilin’s RaaS program https://www.group-ib.com/blog/qilin-ransomware/
29/05/2023 11:39:23
QRCode
archive.org

All you need to know about Qilin ransomware and its operations targeting critical sectors.
Group-IB’s Threat Intelligence team infiltrated the Qilin ransomware group in March 2023 and now can reveal inside information about this RaaS program. The blog provides recommendations on how to prevent Qilin’s attacks and will be useful for threat intelligence experts, threat hunters, and corporate cybersecurity teams.

group-ib EN 2023 Qilin RaaS infiltrated
Hundreds of Swiss students and teachers have data stolen https://www.swissinfo.ch/eng/sci-tech/hundreds-of-swiss-students-and-teachers-have-data-stolen/
29/05/2023 11:16:28
QRCode
archive.org

A total 761 people had sensitive personal data hacked during a cyberattack on the education department of the Swiss city of Basel.

swissinfo EN 2023 Basel education students ransomware databreach sensitive personal
ABB provides details about IT security incident https://new.abb.com/news/detail/103405/abb-provides-details-about-it-security-incident
29/05/2023 08:47:57
QRCode
archive.org
thumbnail

ABB recently became aware of an IT security incident that impacted certain ABB systems. ABB started an investigation, retained leading experts, notified certain law enforcement and data protection authorities, and implemented measures to contain and assess the incident. The incident has now been successfully contained.

ABB EN 2023 security-incident ransomware
Tesla Files: Un vol de données met Tesla dans l'embarras https://www.blick.ch/fr/news/monde/des-voitures-dangereuses-un-vol-de-donnees-met-tesla-et-elon-musk-dans-lembarras-id18614234.html
29/05/2023 08:38:27
QRCode
archive.org
thumbnail

Tesla a été confronté à une fuite de données très sensibles. Non seulement les rémunérations et les adresses privées de collaborateurs ont été révélées, mais surtout des dysfonctionnements sur la conduite autonome des voitures Tesla.

black.ch FR 2023 Tesla-files Tesla Leak
Vulnerability in GCP CloudSQL Leads to Data Exposure https://www.dig.security/post/gcp-cloudsql-vulnerability-leads-to-internal-container-access-and-data-exposure
28/05/2023 23:21:17
QRCode
archive.org
thumbnail

The Dig research team reveals recently discovered critical vulnerability in GCP CloudSQL service that lead to internal container access and data exposure

dig.security EN 2023 cloud GCP CloudSQL leak exposure Google Cloud PII
Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones https://arstechnica.com/information-technology/2023/05/hackers-can-brute-force-fingerprint-authentication-of-android-devices/
28/05/2023 14:11:44
QRCode
archive.org
thumbnail

Researchers have devised a low-cost smartphone attack that cracks the authentication fingerprint used to unlock the screen and perform other sensitive actions on a range of Android devices in as little as 45 minutes.

arstechnica EN 2023 BrutePrint low-cost smartphone attack fingerprint authentication attack
Mercenary mayhem: A technical analysis of Intellexa's PREDATOR spyware https://blog.talosintelligence.com/mercenary-intellexa-predator/
28/05/2023 13:46:37
QRCode
archive.org
thumbnail

We would like to thank The Citizen Lab for their cooperation, support and inputs into this research.

  • Commercial spyware use is on the rise, with actors leveraging these sophisticated tools to conduct surveillance operations against a growing number of targets. Cisco Talos has new details of a commercial spyware product sold by the spyware firm Intellexa (formerly known as Cytrox).
  • Our research specifically looks at two components of this mobile spyware suite known as “ALIEN” and “PREDATOR,” which compose the backbone of the spyware implant. Our findings include an in-depth walkthrough of the infection chain, including the implants’ various information-stealing capabilities.
  • A deep dive into both spyware components indicates that ALIEN is more than just a loader for PREDATOR and actively sets up the low-level capabilities needed for PREDATOR to spy on its victims.
  • We assess with high confidence that the spyware has two additional components — tcore (main component) and kmem (privilege escalation mechanic) — but we were unable to obtain and analyze these modules.
  • If readers suspect their system(s) may have been compromised by commercial spyware, please consider notifying Talos’ research team at talos-mercenary-spyware-help@external.cisco.com to assist in furthering the community’s knowledge of these threats.
talosintelligence EN 2023 PREDATOR spyware Intellexa ALIEN analysis Android
Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days https://arstechnica.com/information-technology/2023/05/inner-workings-revealed-for-predator-the-android-malware-that-exploited-5-0-days/
28/05/2023 13:46:18
QRCode
archive.org
thumbnail

Spyware is sold to countries including Egypt, Indonesia, Oman, Saudi Arabia, and Serbia.
Smartphone malware sold to governments around the world can surreptitiously record voice calls and nearby audio, collect data from apps such as Signal and WhatsApp, and hide apps or prevent them from running upon device reboots, researchers from Cisco’s Talos security team have found.

arstechnica EN 2023 Smartphone PREDATOR 0-days spyware Android
Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices https://unit42.paloaltonetworks.com/mirai-variant-iz1h9/
27/05/2023 21:48:42
QRCode
archive.org
thumbnail

We analyze Mirai variant IZ1H9, which targets IoT devices. Our overview includes campaigns observed, botnet configuration and vulnerabilities exploited.

paloaltonetworks EN 2023 Mirai IZ1H9 IoT campaigns
NHS data breach: trusts shared patient details with Facebook without consent | Health | The Guardian https://www.theguardian.com/society/2023/may/27/nhs-data-breach-trusts-shared-patient-details-with-facebook-meta-without-consent
27/05/2023 21:43:44
QRCode
archive.org
thumbnail

Observer investigation reveals Meta Pixel tool passed on private details of web browsing on medical sites

theguardian EN 2023 privacy NHS databreach Facebook Health
Armenia spyware victims: Pegasus hacking in war https://www.accessnow.org/publication/armenia-spyware-victims-pegasus-hacking-in-war/
25/05/2023 23:45:14
QRCode
archive.org
thumbnail

A joint investigation by civil society and independent researchers has uncovered hacking of Armenia spyware victims with NSO Group's Pegasus spyware.

accessnow EN 2023 Pegasus Armenia spyware NSO war
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises | Mandiant https://www.mandiant.com/resources/blog/cosmicenergy-ot-malware-russian-response
25/05/2023 20:17:56
QRCode
archive.org
thumbnail

Mandiant identified novel operational technology (OT) / industrial control system (ICS)-oriented malware, which we track as COSMICENERGY, uploaded to a public malware scanning utility in December 2021 by a submitter in Russia. The malware is designed to cause electric power disruption by interacting with IEC 60870-5-104 (IEC-104) devices, such as remote terminal units (RTUs), that are commonly leveraged in electric transmission and distribution operations in Europe, the Middle East, and Asia.

mandiant EN 2023 COSMICENERGY Malware ICS (ICS)-oriented
Barracuda email security appliances hacked via zero-day vulnerability (CVE-2023-2868) - Help Net Security https://www.helpnetsecurity.com/2023/05/25/cve-2023-2868/
25/05/2023 12:01:27
QRCode
archive.org
thumbnail

A vulnerability (CVE-2023-2868) in Barracuda Networks' ESG appliances is actively exploited by attackers, the company has warned.

helpnetsecurity EN 2023 CVE-2023-2868 Barracuda 0-day
Analysis of new active malware: MediaArena – PUA https://northwave-cybersecurity.com/threat-intel-research/analysis-of-new-active-malware-mediaarena-pua
25/05/2023 11:19:40
QRCode
archive.org

Analysis of new active malware: MediaArena – PUA

northwave-cybersecurity EN 2023 PUA MediaArena infostealer
Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations https://www.secureworks.com/blog/chinese-cyberespionage-group-bronze-silhouette-targets-us-government-and-defense-organizations
25/05/2023 11:12:22
QRCode
archive.org
thumbnail

Learn how the U.S. National Security Agency (NSA) issued a joint cybersecurity advisory highlighting a cluster of activity it attributes to a People’s Republic of China (PRC) state-sponsored threat group.

secureworks EN 2023 NSA US China Bronze-Silhouette Volt-Typhoon
page 181 / 251
5007 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn