Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 183 / 214
4261 résultats taggé E*N  ✕
EDR: Detections, Bypassess and other Shenanigans https://fourcore.io/blogs/edr-detections-bypasses-and-other-shenanigans
28/10/2022 23:17:24
QRCode
archive.org

EDR or Endpoint Detection and Response refers to an integrated endpoint security solution which continuously monitors end-point user's devices and try to prevent anomalies like Malware, Ransomware by using automated rule based response method.

fourcore EN 2022 EDR Detections Bypassess Endpoint Detection Response
Incident Report: Employee and Customer Account Compromise https://www.twilio.com/blog/august-2022-social-engineering-attack
28/10/2022 09:02:19
QRCode
archive.org
thumbnail

On August 4, 2022, Twilio identified accounts of employees who were compromised by a social engineering attack. The attacker then gained access to data for a limited number of customers.

Twilio EN 2022 compromised postmortem
Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity https://www.microsoft.com/en-us/security/blog/2022/10/27/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity/
28/10/2022 09:01:26
QRCode
archive.org

Microsoft has discovered recent activity indicating that the Raspberry Robin worm is part of a complex and interconnected malware ecosystem, with links to other malware families and alternate infection methods beyond its original USB drive spread.

microsoft EN 2022 Raspberry-Robin malware ecosystem FakeUpdates DEV-0651
SiriSpy - iOS bug allowed apps to eavesdrop on your conversations with Siri https://rambo.codes/posts/2022-10-25-sirispy-ios-bug-allowed-apps-to-eavesdrop
27/10/2022 08:06:40
QRCode
archive.org
thumbnail

Any app with access to Bluetooth could record your conversations with Siri and audio from the iOS keyboard dictation feature when using AirPods or Beats headsets. This would happen without the app requesting microphone access permission and without the app leaving any trace that it was listening to the microphone.

rambo.codes EN 2022 iOS bug Siri SiriSpy Bluetooth AirPods privacy
LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company https://www.trendmicro.com/en_us/research/22/j/lv-ransomware-exploits-proxyshell-in-attack.html
26/10/2022 20:19:52
QRCode
archive.org
thumbnail

Our blog entry provides a look at an attack involving the LV ransomware on a Jordan-based company from an intrusion analysis standpoint

trendmicro EN 2022 ProxyShell endpoints targeted-attacks ransomware research APT REvil Sodinokibi
Pro-PRC DRAGONBRIDGE Influence Campaign Leverages New TTPs to Aggressively Target U.S. Interests, Including Midterm Elections https://www.mandiant.com/resources/blog/prc-dragonbridge-influence-elections
26/10/2022 16:21:31
QRCode
archive.org
thumbnail

Mandiant has recently observed DRAGONBRIDGE, an influence campaign we assess with high confidence to be operating in support of the political interests of the People’s Republic of China (PRC), aggressively targeting the United States by seeking to sow division both between the U.S. and its allies and within the U.S. political system itself. Recent narratives include:

  • Claims that the China-nexus threat group APT41 is instead a U.S. government-backed actor.
  • Aggressive attempts to discredit the U.S. democratic process, including attempts to discourage Americans from voting in the 2022 U.S. midterm elections.
  • Allegations that the U.S. was responsible for the Nord Stream gas pipeline explosions.
Mendiant 2022 EN PRC China US DRAGONBRIDGE Campaign Influence TTPs Midterm
Stranger Strings: An exploitable flaw in SQLite https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/
26/10/2022 07:01:42
QRCode
archive.org
thumbnail

Trail of Bits is publicly disclosing CVE-2022-35737, which affects applications that use the SQLite library API. CVE-2022-35737 was introduced in SQLite version 1.0.12 (released on October 17, 2000) and fixed in release 3.39.2 (released on July 21, 2022). CVE-2022-35737 is exploitable on 64-bit systems, and exploitability depends on how the program is compiled; arbitrary code execution is confirmed when the library is compiled without stack canaries, but unconfirmed when stack canaries are present, and denial-of-service is confirmed in all cases.

trailofbits EN 2022 CVE-2022-35737 SQLite
Advisory: Atlassian Jira Align Application, Version… | Bishop Fox https://bishopfox.com/blog/jira-align-advisory
25/10/2022 15:30:22
QRCode
archive.org
thumbnail

Bishop Fox covers server-side request forgery (SSRF) and insufficient authorization controls vulnerabilities in Atlassian Jira Align, Version 10.107.4.

bishopfox.com EN 2022 Bishop-Fox bishopfox SSRF Atlassian Jira
Apple Fixes Exploited Zero-Day With iOS 16.1 Patch | SecurityWeek.Com https://www.securityweek.com/apple-fixes-exploited-zero-day-ios-161-patch
25/10/2022 09:21:25
QRCode
archive.org

Apple confirms the active exploitation of CVE-2022-42827, warning in a barebones advisory that the flaw exposes iPhones and iPads to arbitrary code execution attacks.

securityweek EN 2022 apple CVE-2022-42827 CVE-2022-32894 CVE-2022-32917 ios ipad iphone zero-day exploits in-the-wild
#StopRansomware: Daixin Team https://www.cisa.gov/uscert/ncas/alerts/aa22-294a
24/10/2022 21:52:46
QRCode
archive.org

Actions to take today to mitigate cyber threats from ransomware: • Install updates for operating systems, software, and firmware as soon as they are released. • Require phishing-resistant MFA for as many services as possible. • Train users to recognize and report phishing attempts.

cisa EN 2022 US uscert csirt cert threat ransomware #StopRansomware alert Daixin-Team gang health
Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries https://blogs.blackberry.com/en/2022/10/unattributed-romcom-threat-actor-spoofing-popular-apps-now-hits-ukrainian-militaries
24/10/2022 21:48:55
QRCode
archive.org
thumbnail

Threat actor RomCom RAT is now targeting Ukrainian military institutions. Known to deploy spoofed versions of popular software Advanced IP Scanner, once exposed, RomCom RAT switched to PDF Filler, another popular application, which indicates the group behind it is actively developing new capabilities.

blackberry EN 2022 Research Unattributed RomCom Advanced-IP-Scanner RAT
SHA-3 Buffer Overflow https://mouha.be/sha-3-buffer-overflow/
24/10/2022 07:03:47
QRCode
archive.org

Over the past few months, I’ve been coordinating the disclosure of a new vulnerability that I’ve found. Today is the disclosure date, so I am excited that I can finally talk about what I’ve been working on! The vulnerability has been assigned CVE-2022-37454 and bug reports are available for Python, PHP, PyPy, SHA3 for Ruby, and XKCP.

mouha.be EN 2022 CVE-2022-37454 SHA-3 Buffer-Overflow vulnerability XKCP
TommyLeaks and SchoolBoys: Two sides of the same ransomware gang https://www.bleepingcomputer.com/news/security/tommyleaks-and-schoolboys-two-sides-of-the-same-ransomware-gang/
24/10/2022 07:02:48
QRCode
archive.org
thumbnail

Two new extortion gangs named 'TommyLeaks' and 'SchoolBoys' are targeting companies worldwide. However, there is a catch — they are both the same ransomware gang.

bleepingcomputer EN 2022 TommyLeaks SchoolBoys ransomware extortion gang
“Dormant Colors”: Live Campaign With Over 1M Data Stealing Extensions Installed https://guardiosecurity.medium.com/dormant-colors-live-campaign-with-over-1m-data-stealing-extensions-installed-9a9a459b5849
24/10/2022 07:02:14
QRCode
archive.org
thumbnail

The “Dormant Colors” is yet another vast campaign of malicious extensions with millions of active installations worldwide, this time with a color-related theme and full of deception all through the chain. It starts with the trickery malvertising campaign, continues with a crafty novel way to side-load the real malicious code without anyone noticing (until now!), and finally with stealing not only your searches and browsing data, but also affiliation to 10,000 targeted sites — a capability that is easily leveraged for targeted spear phishing, account takeover and credential extraction — all using this powerful network of millions of infected computers worldwide!

guardiosecurity EN 2022 Campaign Data Stealing malicious Extensions browser Chrome Edge
Intelligence Insights: October 2022 https://redcanary.com/blog/intelligence-insights-october-2022/
24/10/2022 07:01:47
QRCode
archive.org
thumbnail

AdSearch ghosts, Qbot returns with new tricks, and PureCrypter loads malware treats.

redcanary EN 2022 trends Insights october2022
Mirai, RAR1Ransom, and GuardMiner – Multiple Malware Campaigns Target VMware Vulnerability https://www.fortinet.com/blog/threat-research/multiple-malware-campaigns-target-vmware-vulnerability
24/10/2022 07:01:03
QRCode
archive.org
thumbnail

n April, VMware patched a vulnerability CVE-2022-22954. It causes server-side template injection because of the lack of sanitization on parameters “deviceUdid” and “devicetype”. It allows attackers to inject a payload and achieve remote code execution on VMware Workspace ONE Access and Identity Manager. FortiGuard Labs published Threat Signal Report about it and also developed IPS signature in April.

fortinet EN 2022 VMware CVE-2022-22954 vulnerability Campaigns deviceUdid devicetype
Operation Jackal: Interpol arrests Black Axe fraud suspects https://www.theregister.com/2022/10/17/interpol_black_axe_fraud/
23/10/2022 11:51:46
QRCode
archive.org
thumbnail

75 collars felt, $1.2m seized in bid to cut off crime network’s financial lifeline

theregister EN 2022 Interpol BalckAxe arrest operation-jackal fraud
Exploited Windows zero-day lets JavaScript files bypass security warnings https://www.bleepingcomputer.com/news/security/exploited-windows-zero-day-lets-javascript-files-bypass-security-warnings/
22/10/2022 18:46:55
QRCode
archive.org
thumbnail

A new Windows zero-day allows threat actors to use malicious JavaScript files to bypass Mark-of-the-Web security warnings. Threat actors are already seen using the zero-day bug in ransomware attacks.

bleepingcomputer EN 2022 JavaScript Mark-of-the-Web Microsoft Ransomware Windows-10 Windows-11
Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1 https://securityintelligence.com/posts/analysis-rce-vulnerability-cobalt-strike/
22/10/2022 18:41:21
QRCode
archive.org
thumbnail

Command & Control (C2) frameworks are a very sensitive component of Red Team operations. Often, a Red Team will be in a highly privileged position on a target’s network, and a compromise of the C2 framework could lead to a compromise of both the red team operator’s system and control over beacons established on a target’s systems. As such, vulnerabilities in C2 frameworks are high priority targets for threat actors and Counterintelligence (CI) operations. On September 20, 2022, HelpSystems published an out-of-band patch for Cobalt Strike which stated that there was potential for Remote Code Execution (RCE).

securityintelligence EN 2022 RCE Cobalt-Strike HelpSystems Vulnerability Analysis
Reverse Engineering the Apple MultiPeer Connectivity Framework https://www.evilsocket.net/2022/10/20/Reverse-Engineering-the-Apple-MultiPeer-Connectivity-Framework/
22/10/2022 18:38:55
QRCode
archive.org
thumbnail

Some time ago I was using Logic Pro to record some of my music and I needed a way to start and stop the recording from an iPhone, so I found about Logic Remote and was quite happy with it.

evilsocket EN 2022 Apple MultiPeer Connectivity Framework mDNS analysis macOS LogicPro network reverse-engineering
page 183 / 214
4845 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn