Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 181 / 220
4391 résultats taggé EN  ✕
Chinese researchers claim to have broken RSA with a quantum computer. Experts aren’t so sure. https://therecord.media/chinese-researchers-claim-to-have-broken-rsa-with-a-quantum-computer-experts-arent-so-sure/
04/01/2023 22:15:46
QRCode
archive.org

Researchers in China claim to have reached a breakthrough in quantum computing, figuring out how they can break the RSA public-key encryption system using a quantum computer of around the power that will soon be publicly available.

Breaking 2048-bit RSA — in other words finding a method to consistently and quickly discover the secret prime numbers underpinning the algorithm — would be extremely significant. Although the RSA algorithm itself has largely been replaced in consumer-facing protocols, such as Transport Layer Security, it is still widely used in older enterprise and operational technology software and in many code-signing certificates.

therecord EN 2023 Breaking 2048-bit RSA Quantum computer China
How do you know when macOS detects and remediates malware? https://eclecticlight.co/2023/01/04/how-do-you-know-when-macos-detects-and-remediates-malware/
04/01/2023 21:12:28
QRCode
archive.org
thumbnail

macOS may alert you when you’re trying to open or run a file, with an alert informing you that malware was detected. But what about in scans?

eclecticlight EN 2023 malware alert macos XProtect Remediator
Data of over 200 million Deezer users stolen, leaks on hacking forum https://grahamcluley.com/data-of-over-200-million-deezer-users-stolen-leaks-on-hacking-forum/
04/01/2023 20:59:35
QRCode
archive.org
thumbnail

Music-streaming service Deezer has owned up to a data breach, after hackers managed to steal the data of over 200 million of its users.

grahamcluley EN 2023 Deezer stolen leak
New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection https://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection/
04/01/2023 18:06:41
QRCode
archive.org
thumbnail

We recently discovered ransomware, which performs MSDTC service DLL Hijacking to silently execute its payload. We have named this ransomware CatB, based on the contact email that the ransomware group uses. The sample was first uploaded to VT on November 23, 2022 and tagged by the VT community as a possible variant of the Pandora Ransomware. The assumed connection to the Pandora Ransomware was due to some similarities between the CatB and Pandora ransom notes. However, the similarities pretty much end there. The CatB ransomware implements several anti-VM techniques to verify execution on a “real machine”, followed by a malicious DLL drop and DLL hijacking to evade detection.

minerva-labs EN 2022 CatB analysis DLL Hijacking Ransomware
Shc Linux Malware Installing CoinMiner https://asec.ahnlab.com/en/45182/
04/01/2023 12:14:36
QRCode
archive.org
thumbnail

The ASEC analysis team recently discovered that a Linux malware developed with Shc has been installing a CoinMiner. It is presumed that after successful authentication through a dictionary attack on inadequately managed Linux SSH servers, various malware were installed on the target system. Among those installed were the Shc downloader, XMRig CoinMiner installed through the former, and DDoS IRC Bot, developed with Perl.

asec 2023 EN Shell Script Compiler analysis Linux Malware CoinMiner Shc
Breaking RSA with a Quantum Computer https://www.schneier.com/blog/archives/2023/01/breaking-rsa-with-a-quantum-computer.html
04/01/2023 09:18:15
QRCode
archive.org

A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be correct, but it’s not obviously wrong.

Schneier EN 2023 RSA Quantum Computer China break cryptography
More than 200 U.S. institutions hit with ransomware in 2022: report https://therecord.media/more-than-200-u-s-institutions-hit-with-ransomware-in-2022-report/
04/01/2023 07:15:59
QRCode
archive.org

More than 200 local governments, schools and hospitals in the U.S. were affected by ransomware in 2022, according to research conducted by cybersecurity firm Emsisoft.

The annual “State of Ransomware in the US” report found that 105 local governments; 44 universities and colleges; 45 school districts; and 25 healthcare providers operating 290 hospitals dealt with ransomware attacks last year.

therecord EN 2023 annual report ransomware 2022 governments universities school
Ukraine Has Digitized Its Fighting Forces on a Shoestring https://www.wsj.com/articles/ukraine-has-digitized-its-fighting-forces-on-a-shoestring-11672741405
03/01/2023 15:17:54
QRCode
archive.org
thumbnail

Ukraine has achieved a cut-price version of what the Pentagon has spent decades and billions of dollars striving to accomplish: digitally networked fighters, intelligence and weapons.

wsj 2023 EN Ukraine Drones Armed-Forces Risk-News Military-Action russia-ukraine-war
The Mac Malware of 2022 👾 https://objective-see.org/blog/blog_0x71.html
02/01/2023 19:48:36
QRCode
archive.org
thumbnail

A comprehensive analysis of the year's new malware

objective-see 2022 EN malware macos analysis
Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022. https://pytorch.org/blog/compromised-nightly-dependency/
02/01/2023 11:38:36
QRCode
archive.org
thumbnail

If you installed PyTorch-nightly on Linux via pip between December 25, 2022 and December 30, 2022, please uninstall it and torchtriton immediately, and use the latest nightly binaries (newer than Dec 30th 2022).

$ pip3 uninstall -y torch torchvision torchaudio torchtriton
$ pip3 cache purge
PyTorch-nightly Linux packages installed via pip during that time installed a dependency, torchtriton, which was compromised on the Python Package Index (PyPI) code repository and ran a malicious binary. This is what is known as a supply chain attack and directly affects dependencies for packages that are hosted on public package indices.

PyTorch EN 2022 Linux pip Compromised dependency Supply-chain-security
U.S. targeted adversary cyber infrastructure to safeguard midterm vote https://www.reuters.com/world/us/us-targeted-adversary-cyber-infrastructure-safeguard-midterm-vote-2022-12-19/
02/01/2023 11:38:04
QRCode
archive.org
thumbnail

The U.S. military's Cyber Command hunted down foreign adversaries overseas ahead of this year's mid-term elections, taking down their infrastructure before they could strike, the head of U.S. Cyber Command said.

U.S. Army General Paul Nakasone said the cyber effort to secure the vote began before the Nov. 8 vote and carried through until the elections were certified.

"We did conduct operations persistently to make sure that our foreign adversaries couldn't utilize infrastructure to impact us," Nakasone, who is also the director of the U.S. National Security Agency, told reporters.

reuters EN 2022 safeguard midterm vote cyber infrastructure operations US
Ransomware gang gives decryptor to Toronto’s SickKids Hospital https://www.itworldcanada.com/article/breaking-news-ransomware-gang-gives-decryptor-to-torontos-sickkids-hospital/519841
01/01/2023 22:31:11
QRCode
archive.org
thumbnail

In a New Year's Eve apology, the LockBit ransomware gang has expressed regret for attacking Toronto's Hospital for Sick Children and sent a free decryptor so files can be unscrambled. According to Brett Callow, a B.C.-based threat analyst for Emsisoft, the gang posted a message on its site claiming the attack was the work of an affiliate and violated their rules.

itworldcanada EN 2023 canada Hospital LockBit ransomware gang affiliate regret
Russian cyberattacks - Special Services - Gov.pl website https://www.gov.pl/web/special-services/russian-cyberattacks
30/12/2022 23:35:51
QRCode
archive.org
thumbnail

With the ongoing war in Ukraine, in the Polish cyberspace, there are more and more occurrences classified as computer incidents, including attacks perpetrated by Russian hackers. This is a response of the Russian Federation to the Poland’s support provided to Ukraine and an attempt to destabilise the situation in our country.

Gov.pl EN 2022 official Ukraine russia-ukraine-war Polish attacks
New YouTube Bot Malware Spotted Stealing User’s Sensitive Information https://blog.cyble.com/2022/12/23/new-youtube-bots-malware-spotted-stealing-users-sensitive-information/
30/12/2022 11:55:50
QRCode
archive.org
thumbnail

New YouTube Bot Malware Spotted Stealing User’s Sensitive Information

Cyble EN 2022 Malware Bot YouTube stealer analysis
Pure coder offers multiple malware for sale in Darkweb forums https://blog.cyble.com/2022/12/27/pure-coder-offers-multiple-malware-for-sale-in-darkweb-forums/
30/12/2022 11:54:35
QRCode
archive.org
thumbnail

Italians Users Targeted By PureLogs Stealer Through Spam Campaigns

Cyble EN 2022 Pure malware Darkweb PureLogs analysis
This ‘Dystopian’ Cyber Firm Could Have Saved Mossad Assassins From Exposure https://www.haaretz.com/israel-news/security-aviation/2022-12-26/ty-article-magazine/.premium/this-dystopian-cyber-firm-could-have-saved-mossad-assassins-from-exposure/00000185-0bc6-d26d-a1b7-dbd739100000
30/12/2022 11:50:06
QRCode
archive.org

Meet Toka, the Israeli cyber firm founded by Ehud Barak, that lets clients hack cameras and change their feeds – just like in Hollywood heist movies

haaretz EN 2022 privacy spy Toka Israeli Dystopian Mossad
Cyber attacks set to become ‘uninsurable’, says Zurich chief https://archive.ph/2022.12.26-110811/https://www.ft.com/content/63ea94fa-c6fc-449f-b2b8-ea29cc83637d
30/12/2022 11:48:10
QRCode
archive.org

The chief executive of one of Europe’s biggest insurance companies has warned that cyber attacks, rather than natural catastrophes, will become “uninsurable” as the disruption from hacks continues to grow.

ft Financial-Times archive 2022 EN chief executive insurance cyber-attacks uninsurable Zurich
zhuowei/WDBFontOverwrite: Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689. https://github.com/zhuowei/WDBFontOverwrite
30/12/2022 11:46:10
QRCode
archive.org
thumbnail

Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.

Works on iOS 16.1.2 and below (tested on iOS 16.1) on unjailbroken devices.

zhuowei EN GitHub PoC iOS CVE-2022-46689 unjailbroken ComicSans
Twitter in data-protection probe after '400 million' user details up for sale https://www.bbc.co.uk/news/technology-64109777
29/12/2022 19:00:30
QRCode
archive.org
thumbnail

A watchdog is to investigate Twitter after a hacker claimed to have private details linked to more than 400 million accounts.

BBC EN 2022 hacker data-protection Twitter sale watchdog
ZINC weaponizing open-source software - Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2022/09/29/zinc-weaponizing-open-source-software/
28/12/2022 11:39:07
QRCode
archive.org
thumbnail

In recent months, Microsoft has detected a wide range of social engineering campaigns using weaponized legitimate open-source software by an actor we track as ZINC. Microsoft Threat Intelligence Center (MSTIC) observed activity targeting employees in organizations across multiple industries including media, defense and aerospace, and IT services in the US, UK, India, and Russia. Based on the observed tradecraft, infrastructure, tooling, and account affiliations, MSTIC attributes this campaign with high confidence to ZINC, a state-sponsored group based out of North Korea with objectives focused on espionage, data theft, financial gain, and network destruction.

microsoft EN 2022 Microsoft weaponized ZINC open-source MSTIC apt North-Korea
page 181 / 220
5001 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn