Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 186 / 208
4150 résultats taggé EN  ✕
Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks - Microsoft Security Blog https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/
25/08/2022 14:34:56
QRCode
archive.org
thumbnail

Threat actors evade detection by adopting the Sliver command-and-control (C2) framework in intrusion campaigns.

microsoft EN 2022 Sliver C2 framework command-and-control threat-actor
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone https://www.microsoft.com/security/blog/2022/08/24/magicweb-nobeliums-post-compromise-trick-to-authenticate-as-anyone/
24/08/2022 19:56:03
QRCode
archive.org
thumbnail

Microsoft security researchers have discovered a post-compromise capability we’re calling MagicWeb, which is used by a threat actor we track as NOBELIUM to maintain persistent access to compromised environments.

Microsoft MagicWeb EN 2022 NOBELIUM APT29 CozyBear
Legitimate SaaS Platforms Being Used to Host Phishing Attacks https://unit42.paloaltonetworks.com/platform-abuse-phishing/
24/08/2022 15:56:47
QRCode
archive.org
thumbnail

Platform-abuse phishing is on the rise. We analyze how attackers use services such as website builders to host phishing pages.

unit42 paloaltonetworks EN 2022 phishing attack SaaS abuse website-builders
XCSSET Malware Update | macOS Threat Actors Prepare for Life Without Python https://www.sentinelone.com/blog/xcsset-malware-update-macos-threat-actors-prepare-for-life-without-python/
23/08/2022 18:06:06
QRCode
archive.org
thumbnail

New domains and new behavioral indicators, but malware authors stick to tried and tested architecture despite Apple’s updates.

sentinelone EN 2022 XCSSET macOS Threat
Vulnerability in Linux containers – investigation and mitigation https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
23/08/2022 16:35:39
QRCode
archive.org
thumbnail

Operating system access controls, that constrain which programs can open which files, have existed for almost as long as computers themselves. Access controls are still widely used and are more flexible and efficient when compared to cryptographically protecting files. Despite the long history, ther

benthamsgaze EN 2022 constrain Linux containers investigation Access controls
Break me out of sandbox in old pipe - CVE-2022-22715 Windows Dirty Pipe https://whereisk0shl.top/post/break-me-out-of-sandbox-in-old-pipe-cve-2022-22715-windows-dirty-pipe
23/08/2022 11:23:05
QRCode
archive.org

In February 2022, Microsoft patched the vulnerability I used in TianfuCup 2021 for escaping Adobe Reader sandbox, assigned CVE-2022-22715. The vulnerability existed in Named Pipe File System nearly 10 years since the AppContainer was born. We called it "Windows Dirty Pipe".
In this article, I will share the root cause and exploitation of Windows Dirty Pipe. So let's start our journey.

whereisk0shl EN 2022 CVE-2022-22715 Windows Dirty-Pipe PoC ANALYSIS
A Dad Took Photos of His Naked Toddler for the Doctor. Google Flagged Him as a Criminal. https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html
22/08/2022 14:27:13
QRCode
archive.org

Google has an automated tool to detect abusive images of children. But the system can get it wrong, and the consequences are serious.

nytimes EN 2022 CSAM scan Photos Naked Toddler Google children Criminal
THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control https://www.cybereason.com/blog/threat-analysis-report-bumblebee-loader-the-high-road-to-enterprise-domain-control
22/08/2022 14:23:16
QRCode
archive.org
thumbnail

Cybereason GSOC observed distribution of the Bumblebee Loader and post-exploitation activities including privilege escalation, reconnaissance and credential theft. Bumblebee operators use the Cobalt Strike framework throughout the attack and abuse credentials for privilege escalation to access Active Directory, as well as abusing a domain administrator account to move laterally, create local user accounts and exfiltrate data...

cybereason EN 2022 THREAT ANALYSIS REPORT Bumblebee Loader CobaltStrike
Ransomware Group Claims Access to SCADA in Confusing UK Water Company Hack https://www.securityweek.com/ransomware-group-claims-access-scada-confusing-uk-water-company-hack
21/08/2022 19:20:29
QRCode
archive.org

A ransomware group has hit at least one water company in the United Kingdom, but there is some confusion over whose systems were actually breached.

securityweek EN 2022 Cl0p ransomware SCADA UK water-company HMI ICS Thames South-Staffordshire
Fake DDoS Pages On WordPress Sites Lead to Drive-By-Downloads https://blog.sucuri.net/2022/08/fake-ddos-pages-on-wordpress-lead-to-drive-by-downloads.html
21/08/2022 10:37:25
QRCode
archive.org
thumbnail

We reveal how hackers have begun leveraging fake DDoS protection pages to trick users into downloading remote access trojans (RATs) onto their computers.

sucuri EN 2022 fake DDoS protection lure Wordpress RAT
Lloyd’s to Exclude Catastrophic Nation-Backed Cyberattacks From Insurance Coverage https://www.wsj.com/articles/lloyds-to-exclude-catastrophic-nation-backed-cyberattacks-from-insurance-coverage-11660861586
20/08/2022 17:31:26
QRCode
archive.org
thumbnail

Lloyd’s of London will require its insurer groups globally to exclude catastrophic state-backed hacks from stand-alone cyber insurance policies starting next year.

wsj EN 2022 Insurance Lloyd Exclude Catastrophic Nation-Backed Cyberattacks cyber-insurance
CVE-2022-27925 https://attackerkb.com/topics/dSu4KGZiFd/cve-2022-27925/rapid7-analysis
20/08/2022 17:29:04
QRCode
archive.org
thumbnail

On May 10, 2022, Zimbra released versions 9.0.0 patch 24 and 8.8.15 patch 31 to address multiple vulnerabilities in Zimbra Collaboration Suite, including CVE-2…

AttackerKB Analysis CVE-2022-27925 EN 2022 Zimbra
Google And Cloudflare Are Changing The Trust Infrastructure of the Internet: A Long Goodbye to RSA and a Hello to ECC and ECDSA https://medium.com/asecuritysite-when-bob-met-alice/google-and-cloudflare-are-changing-the-trust-infrastructure-of-the-internet-a-long-goodbye-to-rsa-74982d37949c
20/08/2022 10:16:06
QRCode
archive.org
thumbnail

The RSA method was created by Rivest, Shamir and Adleman in 1978, and it is still used to encrypt and sign for data. The core of trust on the Internet is the usage of PKI, and where Web sites have a…

asecuritysite-when-bob-met-alice Médium EN RSA PKI ECDSA ECC Clouflare Google Buchanan
New macOS malware 'CloudMensis' detected and prevented https://www.jamf.com/blog/cloudmensis-malware/
20/08/2022 10:14:05
QRCode
archive.org
thumbnail

Jamf Threat Labs updates Jamf Protect to completely prevent CloudMensis from threatening the security of your macOS fleet.

jamf EN jamfprotect IoC jamf-protect CloudMensis macos
Mēris botnet, climbing to the record https://blog.qrator.net/en/meris-botnet-climbing-to-the-record_142/
19/08/2022 11:21:23
QRCode
archive.org

End of June 2021, Qrator Labs started to see signs of a new assaulting force on the Internet – a botnet of a new kind. That is a joint research we conducted together with Yandex to elaborate on the specifics of the DDoS attacks enabler emerging in almost real-time.

qrator EN 2021 DDoS botnet Analysis
Overview of the Cyber Weapons Used in the Ukraine https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/overview-of-the-cyber-weapons-used-in-the-ukraine-russia-war/
19/08/2022 09:58:30
QRCode
archive.org
thumbnail

Observing the ongoing conflict between Russia and Ukraine, we can clearly see that cyberattacks leveraging malware are an important part of modern hybrid war strategy.

trustwave EN 2022 Russia War Ukraine Cyber Weapons cyberattacks Russia-Ukraine-war cyber-weapons hybrid
Bypass phishing detections with Google Translate https://certitude.consulting/blog/en/bypass-phishing-detections-with-google-translate-2/
19/08/2022 09:52:00
QRCode
archive.org

A new wave of phishing is currently circulating (a related story from derstandard.at newspaper can be found here). Documents are said to have been sent to you from a scanner, which you can allegedly download, as can be seen in the following image

certitude EN 2022 phishing Google translate bypass detection Technique
Reservations Requested: TA558 Targets Hospitality and Travel https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and-travel
19/08/2022 09:44:55
QRCode
archive.org
thumbnail
  • TA558 is a likely financially motivated small crime threat actor targeting hospitality, hotel, and travel organizations.
  • Since 2018, this group has used consistent tactics, techniques, and procedures to attempt to install a variety of malware including Loda RAT, Vjw0rm, and Revenge RAT.
  • TA558’s targeting focus is mainly on Portuguese and Spanish speakers, typically located in the Latin America region, with additional targeting observed in Western Europe and North America.
  • TA558 increased operational tempo in 2022 to a higher average than previously observed.
  • Like other threat actors in 2022, TA558 pivoted away from using macro-enabled documents in campaigns and adopted new tactics, techniques, and procedures.
proofpoint EN Analysis TA558
Making Sense of the Killnet, Russia’s Favorite Hacktivists https://www.linkedin.com/pulse/making-sense-killnet-russias-favorite-hacktivists-flashpoint-intel
19/08/2022 09:42:43
QRCode
archive.org
thumbnail

Killnet makes three announcements The past month seemed to be a turning point for the pro-Russian hacktivist group “Killnet”—and it was very eager to tell the world about it.  First, on July 27, “Killmilk”—the founder and the head of the group who led its transformation from a DDoS-for-hire outlet i

flashpoint EN 2022 Killnet Russia hacktivism Analysis
Disrupting SEABORGIUM’s ongoing phishing operations https://www.microsoft.com/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/
18/08/2022 15:43:50
QRCode
archive.org
thumbnail

The Microsoft Threat Intelligence Center (MSTIC) has observed and taken actions to disrupt campaigns launched by SEABORGIUM in campaigns involve persistent phishing and credential theft campaigns leading to intrusions and data theft.

microsoft MSTIC EN 2022 SEABORGIUM phishing Russia
page 186 / 208
4736 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio