Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 184 / 251
Cybersecurity Firm Breach Exposes Tobacco Giant Philip Morris https://www.dailydot.com/debug/optimeyes-4chan-exposes-philip-morris-hack-data/
11/05/2023 23:07:25
QRCode
archive.org
thumbnail

The data appears to have been dumped by an anonymous user.

Data from Philip Morris USA, the nation’s leading cigarette manufacturer, has been exposed online following an apparent breach at a cybersecurity firm.

The data, taken from the cybersecurity risk assessment company OptimEyes, was located within a 68GB cache posted to the notorious imageboard 4chan on Tuesday.

dailydot EN 2023 PhilipMorris Leak 4chan
Tennessee, Georgia colleges respond to cyberattacks as school year wraps up https://therecord.media/cyberattacks-chattanooga-state-mercer-university
11/05/2023 23:03:38
QRCode
archive.org
thumbnail

Hackers infiltrated networks of at least two colleges over the last week, disrupting the schools during the season of final exams and commencement ceremonies.

Tennessee’s Chattanooga State Community College has been responding to a cyberattack since Saturday, forcing the school to cancel classes on Monday and modify schedules for staff members. The school serves more than 11,000 students.

therecord EN 2023 Schools cyberattack colleges disrupting US chattanooga
New phishing-as-a-service tool “Greatness” already seen in the wild https://blog.talosintelligence.com/new-phishing-as-a-service-tool-greatness-already-seen-in-the-wild/
11/05/2023 22:01:18
QRCode
archive.org
thumbnail
  • A previously unreported phishing-as-a-service (PaaS) offering named “Greatness” has been used in several phishing campaigns since at least mid-2022. Greatness incorporates features seen in some of the most advanced PaaS offerings, such as multi-factor authentication (MFA) bypass, IP filtering and integration with Telegram bots.
  • Greatness, for now, is only focused on Microsoft 365 phishing pages, providing its affiliates with an attachment and link builder that creates highly convincing decoy and login pages. It contains features such as having the victim’s email address pre-filled and displaying their appropriate company logo and background image, extracted from the target organization’s real Microsoft 365 login page. This makes Greatness particularly well-suited for phishing business users.
  • An analysis of the domains targeted in several ongoing and past campaigns revealed the victims were almost exclusively companies in the U.S., U.K., Australia, South Africa, and Canada, and the most commonly targeted sectors were manufacturing, health care and technology. The exact distribution of victims in each country and sector varies slightly between campaigns.
  • To use Greatness, affiliates must deploy and configure a provided phishing kit with an API key that allows even unskilled threat actors to easily take advantage of the service’s more advanced features. The phishing kit and API work as a proxy to the Microsoft 365 authentication system, performing a “man-in-the-middle” attack and stealing the victim’s authentication credentials or cookies.
talosintelligence EN 2023 Greatness Phishing phishing-kits analysis
Leak of Intel Boot Guard Keys Could Have Security Repercussions for Years https://www.darkreading.com/attacks-breaches/leak-of-intel-boot-guard-keys-could-have-security-repercussions-for-years
11/05/2023 08:55:48
QRCode
archive.org
thumbnail

While Intel is still investigating the incident, the security industry is bracing itself for years of potential firmware insecurity if the keys indeed were exposed.

The potential leak from MSI Gaming of signing keys for an important security feature in Intel-based firmware could cast a shadow on firmware security for years to come and leave devices that use the keys highly vulnerable to cyberattacks, security experts say.

darkreading EN 2023 MSI leak Intel firmware
Deconstructing a Cybersecurity Event https://www.dragos.com/blog/deconstructing-a-cybersecurity-event/
10/05/2023 20:55:43
QRCode
archive.org
thumbnail

Learn more about a failed extortion scheme against Dragos in May 2023. No Dragos systems were breached, including anything related to the Dragos Platform.

dragos EN 2023 lesson-learned incident event extortion
Global Surveillance: The Secretive Swiss Dealer Enabling Israeli Spy Firms - National Security & Cyber https://www.haaretz.com/israel-news/security-aviation/2023-05-10/ty-article-magazine/.premium/global-surveillance-the-secretive-swiss-dealer-enabling-israeli-spy-firms/00000188-0005-dc7e-a3fe-22cdf2900000
10/05/2023 20:32:58
QRCode
archive.org
thumbnail

The International Mobile System Is Exposed and a Loophole Allows Hackers, Cybercriminals and States to Geolocate Targets and Even Hijack Email and Web Accounts. Israelis Can Be Found Among the Victims - and the Attackers

haaretz EN 2023 privacy surveillance Geolocation Cyber-Warfare Spy Israel-arms-exports Swiss
Justice Department Announces Court-Authorized Disruption of the Snake Malware Network Controlled by Russia's Federal Security Service https://www.justice.gov/usao-edny/pr/justice-department-announces-court-authorized-disruption-snake-malware-network
10/05/2023 10:19:07
QRCode
archive.org
thumbnail

“Russia used sophisticated malware to steal sensitive information from our allies, laundering it through a network of infected computers in the United States in a cynical attempt to conceal their crimes.  Meeting the challenge of cyberespionage requires creativity and a willingness to use all lawful means to protect our nation and our allies,” stated United States Attorney Peace.  “The court-authorized remote search and remediation announced today demonstrates my Office and our partners’ commitment to using all of the tools at our disposal to protect the American people.”

justice.gov US 2023 EN Operation-MEDUSA Snake Malware Network FBI cyberespionage espionnage PERSEUS Russia FSB
How macOS now tracks the provenance of apps https://eclecticlight.co/2023/05/10/how-macos-now-tracks-the-provenance-of-apps/
10/05/2023 10:15:36
QRCode
archive.org
thumbnail

Which extended attributes are attached to downloaded archives and apps? How do they fit in with provenance tracking?

eclecticlight EN 2023 macOS attributes how provenance tracking
Snake: Coming soon in Mac OS X flavour – Fox-IT International blog https://blog.fox-it.com/2017/05/03/snake-coming-soon-in-mac-os-x-flavour/
10/05/2023 10:14:46
QRCode
archive.org
thumbnail

Summary Snake, also known as Turla, Uroburos and Agent.BTZ, is a relatively complex malware framework used for targeted attacks. Over the past year Fox-IT has been involved in multiple incident response cases where the Snake framework was used to steal sensitive information. Targets include government institutions, military and large corporates. Researchers who have previously analyzed…

fox-it 2017 EN Snake Turla Uroburos malware framework macos OSX
Hunting Russian Intelligence “Snake” Malware https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a
10/05/2023 09:59:47
QRCode
archive.org

The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive targets. To conduct operations using this tool, the FSB created a covert peer-to-peer (P2P) network of numerous Snake-infected computers worldwide. Many systems in this P2P network serve as relay nodes which route disguised operational traffic to and from Snake implants on the FSB’s ultimate targets. Snake’s custom communications protocols employ encryption and fragmentation for confidentiality and are designed to hamper detection and collection efforts.

cisa EN 2023 Snake Malware Russia Intelligence FSB espionnage implant PERSEUS
Leaked Intel Boot Guard keys:What happened? How does it affect the software supply chain? https://binarly.io/posts/Leaked_Intel_Boot_Guard_keys_What_happened_How_does_it_affect_the_software_supply_chain/index.html
10/05/2023 09:44:06
QRCode
archive.org

Binarly is the world's most advanced automated firmware supply chain security platform. Using cutting-edge machine-learning techniques, Binary identifies both known and unknown vulnerabilities, misconfigurations, and malicious code in firmware and hardware components.

binarly EN 2023 MSI BootGuard Leaked Intel supplychain
Microsoft May 2023 Patch Tuesday https://isc.sans.edu/diary/Microsoft%20May%202023%20Patch%20Tuesday/29826
10/05/2023 09:42:53
QRCode
archive.org
thumbnail

This month we got patches for 49 vulnerabilities. Of these, 6 are critical, and 2 are already being exploited, according to Microsoft.

One of the exploited vulnerabilities is a Win32k Elevation of Privilege Vulnerability (CVE-2023-29336). This vulnerability has low attack complexity, low privilege, and none user interaction. The attack vector is local, the CVSS is 7.8, and the severity is Important.

sansedu EN 2023 May2023 vulnerabilities PatchTuesday
Microsoft Patch Tuesday, May 2023 Edition https://krebsonsecurity.com/2023/05/microsoft-patch-tuesday-may-2023-edition/
10/05/2023 09:40:56
QRCode
archive.org

Microsoft today released software updates to fix at least four dozen security holes in its Windows operating systems and other software, including patches for two zero-day vulnerabilities that are already being exploited in active attacks.

krebsonsecurity EN 2023 May2023 PatchTuesday
Apple Fails to Fully Reboot iOS Simulator Copyright Case https://news.bloomberglaw.com/ip-law/apple-fails-to-revive-copyright-case-over-iphone-ios-simulator
10/05/2023 09:39:09
QRCode
archive.org
thumbnail

Apple Inc. failed to fully revive a long-running copyright lawsuit against cybersecurity firm Corellium Inc. over its software that simulates the iPhone’s iOS operating systems, letting security researchers identify flaws in the software.

bloomberglaw EN 2023 Apple Corellium
oss-sec: [CVE-2023-32233] Linux kernel use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary reads and writes in kernel memory https://seclists.org/oss-sec/2023/q2/133
10/05/2023 08:23:43
QRCode
archive.org
thumbnail

An issue has been discovered in the Linux kernel that can be abused by
unprivileged local users to escalate privileges.

The issue is about Netfilter nf_tables accepting some invalid updates
to its configuration.

seclists.org EN 2023 CVE-2023-32233 Linux Kernel Netfilter nf_tables arbitrary memory vulnerability
‘PlugwalkJoe’ pleads guilty for the massive 2020 Twitter hack - The Verge https://www.theverge.com/2023/5/9/23717558/plugwalkjoe-pleads-guilty-twitter-hack-other-crimes-tiktok
10/05/2023 08:03:37
QRCode
archive.org
thumbnail

PlugwalkJoe, aka Joseph James O’Connor, a UK citizen connected to the 2020 Twitter hack affecting many high-profile accounts, including Elon Musk, Joe Biden, Barack Obama, and Apple, has pled guilty to cyberstalking and other crimes. On Tuesday, the Department of Justice (DOJ) announced that O’Connor has been extradited to the US.

theverge EN 2023 PlugwalkJoe Twitter hack Obama Apple extradited UK US
The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services https://www.wired.com/story/big-pipes-ddos-for-hire-fbi/
10/05/2023 08:02:57
QRCode
archive.org
thumbnail

For a decade, a group called Big Pipes has worked behind the scenes with the FBI to target the worst cybercriminal “booter” services plaguing the internet.

WHEN THE FBI announced the takedown of 13 cyberattack-for-hire services yesterday, it may have seemed like just another day in law enforcement’s cat-and-mouse game with a criminal industry that has long plagued the internet’s infrastructure, bombarding victims with relentless waves of junk internet traffic to knock them offline. In fact, it was the latest win for a discreet group of detectives that has quietly worked behind the scenes for nearly a decade with the goal of ending that plague for good.

wired EN 2023 cyberattack-for-hire busted FBI US BigPipes DDoS
On the trail of the Dark Avenger: the most dangerous virus writer in the world https://www.theguardian.com/news/2023/may/09/on-the-trail-of-the-dark-avenger-the-most-dangerous-virus-writer-in-the-world
09/05/2023 08:35:10
QRCode
archive.org
thumbnail

The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?

theguardian En 2023 history Virus Bulgaria DarkAvenger 1980 Viruses
CVE-2023-25394 - VideoStream Local Privilege Escalation https://danrevah.github.io/2023/05/03/CVE-2023-25394-VideoStream-LPE/
08/05/2023 15:05:55
QRCode
archive.org

Videostream is a user-friendly wireless application designed to stream videos, music, and images to Google Chromecast devices. Boasting simplicity and reliability, this app enables you to wirelessly play any local video file with a single click. Videostream even transcodes audio and video from incompatible files into Chromecast-supported formats.

With over 5 million installations, Videostream has made its mark in the streaming industry. This figure was obtained from their official website (https://getvideostream.com), while the Chrome app store lists 900,000+ users.

danrevah EN 2023 VideoStream LPE CVE-2023-25394 macOS
WordPress Advanced Custom Fields Pro plugin <= 6.1.5 - Reflected Cross Site Scripting (XSS) vulnerability https://patchstack.com/database/vulnerability/advanced-custom-fields-pro/wordpress-advanced-custom-fields-pro-plugin-6-1-5-reflected-cross-site-scripting-xss-vulnerability
08/05/2023 11:18:18
QRCode
archive.org
thumbnail

Rafie Muhammad (Patchstack) discovered and reported this Cross Site Scripting (XSS) vulnerability in WordPress Advanced Custom Fields PRO Plugin. This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site. This vulnerability has been fixed in version 6.1.6.

patchstack EN 2023 WP CVE-2023-30777 Advanced Custom Fields Pro plugin XSS vulnerability Wordpress plugin
page 184 / 251
5001 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn