Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 196 / 238
Cisco discloses high-severity IP phone zero-day with exploit code https://www.bleepingcomputer.com/news/security/cisco-discloses-high-severity-ip-phone-zero-day-with-exploit-code/
12/12/2022 15:48:05
QRCode
archive.org
thumbnail

Cisco has disclosed today a high-severity zero-day vulnerability affecting the latest generation of its IP phones and exposing them to remote code execution and denial of service (DoS) attacks.

bleepingcomputer EN 2022 Cisco Denial-of-Service DoS RCE Remote-Code-Execution Zero-Day CVE-2022-20968
Pilfered Keys Free App Infected by Malware Steals Keychain Data https://www.trendmicro.com/en_us/research/22/k/pilfered-keys-free-app-infected-by-malware-steals-keychain-data.html
12/12/2022 09:48:35
QRCode
archive.org
thumbnail

Open-source applications are a practical way to save money while keeping up with your productivity. However, this can be abused by threat actors to steal your data. Find out how one app was used to gather information of Apple users.

trendmicro EN 2022 Open-source Apple malware keychain keysteal
Cryptocurrency Scam - Pig Butchering https://www.michigan.gov/ag/consumer-protection/consumer-alerts/consumer-alerts/scams/cryptocurrency-scam-pig-butchering
12/12/2022 08:42:43
QRCode
archive.org
thumbnail

A recent cryptocurrency scam has highlighted a need for fraud awareness. The new scam - called “pig butchering” - includes a sophisticated new twist that combines a romance scam with an investment spin. According to the Federal Bureau of Investigation (FBI), the term “pig butchering” refers to a time-tested, heavily scripted, and contact intensive process to fatten up the prey before slaughter.

michigan.gov EN 2022 cryptocurrency scam definition FBI
Pulse Connect Secure: A View from the Internet https://censys.io/pulse-connect-secure-a-view-from-the-internet/
10/12/2022 22:46:22
QRCode
archive.org
thumbnail

Pulse Connect Secure is a low-cost and widely-deployed SSL VPN solution for remote and mobile users. Over the years, researchers have found several significant vulnerabilities in the server software, some even resulting in the active exploitation of critical infrastructure by malicious threat actors. In April of 2021, CISA released a report detailing some of these activities, which included exploiting several unknown (at the time) vulnerabilities and resulted in swift action from Ivanti, the Pulse Connect Secure software developer.

censys EN 2022 PulseConnectSecure VPN vulnerable CVE-2021-22893
Gaming firm Razer wins lawsuit against IT vendor over data leak, awarded $8.7m in damages https://www.straitstimes.com/singapore/courts-crime/gaming-firm-razer-wins-lawsuit-against-it-vendor-over-data-leak-awarded-87m-in-damages
10/12/2022 18:28:53
QRCode
archive.org
thumbnail

Shipping information and order details of thousands of customers worldwide were leaked in September 2020.
Read more at straitstimes.com.

straitstimes EN 2022 Razer lawsuit damages Capgemini
Hitching a ride with Mustang Panda https://decoded.avast.io/threatintel/apt-treasure-trove-avast-suspects-chinese-apt-group-mustang-panda-is-collecting-data-from-burmese-government-agencies-and-opposition-groups/
10/12/2022 10:39:35
QRCode
archive.org
thumbnail

Avast discovered a distribution point where a malware toolset is hosted, but also serves as temporary storage for the gigabytes of data being exfiltrated on a daily basis, including documents, recordings, and webmail dumps including scans of passports from Asian, American and European citizens and diplomats applying for Burmese visas, from Burmese human rights activists and Burmese government institutions.

avast EN 2022 MustangPanda exfiltrated analysis
New MuddyWater Threat: Old Kitten; New Tricks https://www.deepinstinct.com/blog/new-muddywater-threat-old-kitten-new-tricks
10/12/2022 09:59:21
QRCode
archive.org
thumbnail

MuddyWater, also known as Static Kitten and Mercury, is a cyber espionage group that’s most likely a subordinate element within Iran's Ministry of Intelligence and Security (MOIS).

Since at least 2017 MuddyWater has targeted a range of government and private organizations across sectors, including telecommunications, local government, defense, and oil and natural gas organizations, in the Middle East, Asia, Africa, Europe, and North America.

deepinstinct MuddyWater EN 2022 analysis malspam StaticKitten Mercury
Apple rolls out end-to-end encryption for iCloud backups https://www.bleepingcomputer.com/news/apple/apple-rolls-out-end-to-end-encryption-for-icloud-backups/
07/12/2022 21:57:14
QRCode
archive.org
thumbnail

Apple introduced today Advanced Data Protection for iCloud, a new feature that uses end-to-end encryption to protect sensitive iCloud data, including backups, Photos, Notes, and more.

bleepingcomputer EN 2022 Apple Backup E2EE End-to-end-encryption iCloud
Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets https://blogs.blackberry.com/en/2022/12/mustang-panda-uses-the-russian-ukrainian-war-to-attack-europe-and-asia-pacific-targets?s=09
07/12/2022 21:43:18
QRCode
archive.org
thumbnail

APT group Mustang Panda now appears to have Europe and Asia Pacific targets in its sights. The BlackBerry Research and Intelligence team recently unearthed evidence that the group may be using global interest in the Russian-Ukraine war to deliver PlugX malware via phishing lure to unsuspecting users.

blackberry EN 2022 MustangPanda Europe Asia russia-ukraine-war PlugX malware
Leaked: The Altrnativ world of cybersurveillance https://www.politico.eu/leaked-altrnativ-world-cybersurveillance/
07/12/2022 21:36:16
QRCode
archive.org
thumbnail

Leaked: The Altrnativ world of cybersurveillance About this series: As co-founder of the French search engine Qwant, Eric Leandri was heralded as a champion of digital privacy and an example of Eur…

politico EN FR 2022 LEandri Qwant Altrnativ French privacy spy OSINT surveillance
Top 10 macOS Malware Discoveries in 2022 https://www.sentinelone.com/blog/top-10-macos-malware-discoveries-in-2022/
07/12/2022 21:20:49
QRCode
archive.org
thumbnail

Learn about all the new malware targeting macOS users in 2022 and how to stay safe from the latest Mac-focused campaigns.

sentinelone EN 2022 top10 malware macOS
Supply Chain Vulnerabilities Put Server Ecosystem At Risk https://eclypsium.com/2022/12/05/supply-chain-vulnerabilities-put-server-ecosystem-at-risk/
06/12/2022 22:46:22
QRCode
archive.org

BMC&C Eclypsium Research has discovered and reported 3 vulnerabilities in American Megatrends, Inc. (AMI) MegaRAC Baseboard Management Controller (BMC) software. We are referring to these vulnerabilities collectively as BMC&C. MegaRAC BMC is widely used by many leading server manufacturers to provide “lights-out” management capabilities for their server products. Server manufacturers…

eclypsium EN 2022 CVE-2022-40259 CVE-2022-40242 CVE-2022-2827 Research AMI BMC MegaRAC supply-chain vulnerabilities server
Zerobot – New Go-Based Botnet Campaign Targets Multiple Vulnerabilities https://www.fortinet.com/blog/threat-research/zerobot-new-go-based-botnet-campaign-targets-multiple-vulnerabilities
06/12/2022 22:38:53
QRCode
archive.org
thumbnail

FortiGuardLabs examines a botnet known as Zerobot written in the Go language targeting IoT vulnerabilities. Read our blog to learn about how it evolves, including self-replication, attacks for different protocols, and self-propagation as well as its behavior once inside an infected device.

fortinet EN 2022 vulnerabilities Botnet iot-security Zerobot Go Threat-Research malware-research malware-analysis
Vice Society: Profiling a Persistent Threat to the Education Sector https://unit42.paloaltonetworks.com/vice-society-targets-education-sector/
06/12/2022 19:52:15
QRCode
archive.org
thumbnail

Vice Society, a ransomware gang, has been involved in high-profile activity against schools this year.

unit42 EN 2022 paloaltonetworks vice-society education ransomware schools
Le renseignement espagnol muet sur le scandale du logiciel espion Pegasus https://fr.euronews.com/my-europe/2022/11/29/le-renseignement-espagnol-muet-sur-le-scandale-du-logiciel-espion-pegasus
06/12/2022 10:43:36
QRCode
archive.org
thumbnail

Auditionnée par le Parlement européen, la directrice du Centre national espagnol s’est contentée de rappeler le cadre juridique, selon les eurodéputés.

euronews FR 2022 Espagne Parlement-européen Pegasus spyware
Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems https://thehackernews.com/2022/12/critical-ping-vulnerability-allows.html
06/12/2022 08:35:38
QRCode
archive.org
thumbnail

he maintainers of the FreeBSD operating system have released updates to remediate a security vulnerability impacting the ping module that could be potentially exploited to crash the program or trigger remote code execution.

The issue, assigned the identifier CVE-2022-23093, impacts all supported versions of FreeBSD and concerns a stack-based buffer overflow vulnerability in the ping service.

thehackernews EN 2022 Ping Vulnerability FreeBSD CVE-2022-23093
Winbiz change d’hébergeur: des milliers de clients toujours sans accès à leur comptabilité | ICTjournal https://www.ictjournal.ch/articles/2022-12-05/winbiz-change-dhebergeur-des-milliers-de-clients-toujours-sans-acces-a-leur
06/12/2022 08:12:46
QRCode
archive.org
thumbnail

Deux semaines après la cyberattaque dont a été victime son hébergeur Infopro, Winbiz n’a pas complètement rétabli l’accès à son logiciel cloud

ictjournal FR 2022 CH Winbiz infopro victime hébergeur
Blowing Cobalt Strike Out of the Water With Memory Analysis https://unit42.paloaltonetworks.com/cobalt-strike-memory-analysis/
06/12/2022 06:51:47
QRCode
archive.org
thumbnail

Unit 42 researchers examine several malware samples that incorporate Cobalt Strike components, and discuss some of the ways that we catch these samples by analyzing artifacts from the deltas in process memory at key points of execution. We will also discuss the evasion tactics used by these threats, and other issues that make their analysis problematic.

unit42 EN 2022 CobaltStrike analysis paloaltonetworks
Suspected Iran-Nexus TAG-56 Uses UAE Forum Lure for Credential Theft Against US Think Tank https://www.recordedfuture.com/suspected-iran-nexus-tag-56-uses-uae-forum-lure-for-credential-theft-against-us-think-tank
06/12/2022 06:50:40
QRCode
archive.org
thumbnail
W4SP continues to nest in PyPI: Same supply chain attack, different distribution method https://develop.secure.software/w4sp-continues-to-nest-in-pypi-same-supply-chain-attack-different-distribution-method
05/12/2022 12:13:20
QRCode
archive.org
thumbnail

Here's ReversingLabs' discoveries and indicators of compromise (IOCs) for W4SP, as well as links to our YARA rule that can be used to detect the malicious Python packages in your environment. 

develop.secure.software EN 2022 W4SP YARA Python PyPI
page 196 / 238
4755 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio