Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 4
68 résultats taggé Vulnerabilities  ✕
Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices https://www.wired.com/story/sophos-chengdu-china-five-year-hacker-war/
01/11/2024 16:05:21
QRCode
archive.org
thumbnail

Sophos went so far as to plant surveillance “implants” on its own devices to catch the hackers at work—and in doing so, revealed a glimpse into China's R&D pipeline of intrusion techniques.

cybersecurity hacking malware vulnerabilities security china
Alert: Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities https://thehackernews.com/2024/10/alert-over-700000-draytek-routers.html
06/10/2024 23:34:29
QRCode
archive.org
thumbnail

14 new DrayTek router vulnerabilities, including critical flaws, could allow attackers to take control. Patch now

thehackernews EN 2024 routers DrayTek vulnerabilities CVE-2024-41589 CVE-2024-41591
How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions https://blog.talosintelligence.com/how-multiple-vulnerabilities-in-microsoft-apps-for-macos-pave-the-way-to-stealing-permissions/
20/08/2024 09:14:14
QRCode
archive.org
thumbnail

An adversary could exploit these vulnerabilities by injecting malicious libraries into Microsoft's applications to gain their entitlements and user-granted permissions.

talosintelligence EN 2024 vulnerabilities Microsoft apps macos Outlook
Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE https://www.akamai.com/blog/security-research/2024/aug/2024-august-apache-waf-proactive-collaboration-orange-tsai-devcore?ref=news.risky.biz
12/08/2024 19:58:53
QRCode
archive.org
  • In collaboration with renowned security researcher Orange Tsai and DEVCORE, Akamai researchers have issued early-release remediations to Apache CVEs for our Akamai App & API Protector customers.

  • Tsai presented his research at Black Hat USA 2024 and outlined the details for many Apache HTTP Server (httpd) vulnerabilities that were recently patched.

  • Before his Black Hat presentation, the Akamai Security Intelligence Group (SIG) proactively contacted Tsai to facilitate the sharing of technique details for proactive defense for our customers.

  • App & API Protector customers who are in automatic mode have existing and updated protections.

akamai OrangeTsai EN 2024 DEVCORE vulnerabilities Apache httpd CVE-2024-38475 CVE-2024-38472 CVE-2024-39573 CVE-2024-38477
Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2024/08/08/chained-for-attack-openvpn-vulnerabilities-discovered-leading-to-rce-and-lpe/
12/08/2024 14:24:55
QRCode
archive.org
thumbnail

Microsoft researchers found multiple vulnerabilities in OpenVPN that could lead to an attack chain allowing remote code execution and local privilege escalation. This attack chain could enable attackers to gain full control over targeted endpoints, potentially resulting in data breaches, system compromise, and unauthorized access to sensitive information.

microsoft EN 2024 OpenVPN vulnerabilities discovered RCE CVE-2024-27459 CVE-2024-27903
SwRI evaluates cybersecurity risks associated with EV fast-charging equipment | Southwest Research Institute https://www.swri.org/press-release/swri-evaluates-cybersecurity-risks-associated-ev-fast-charging-equipment?ref=news.risky.biz
29/07/2024 09:28:02
QRCode
archive.org
thumbnail

Engineers at Southwest Research Institute have identified cybersecurity vulnerabilities with electric vehicles (EVs) using direct current fast-charging systems, the quickest, commonly used way to charge electric vehicles. The high-voltage technology relies on power line communication (PLC) technology to transmit smart-grid data between vehicles and charging equipment.

In a laboratory, the SwRI team exploited vulnerabilities in the PLC layer, gaining access to network keys and digital addresses on both the charger and the vehicle.

swri EN 2024 electric vehicles vulnerabilities PLC vehicles charging equipment
Sonar https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/
04/07/2024 13:18:05
QRCode
archive.org
thumbnail

We discovered 4 critical code vulnerabilities in Gogs, a source code hosting solution, which are still unpatched. Read about the details and how to protect yourself.

sonarsource EN 2024 Gogs vulnerabilities developers Supply-Chain
Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities https://thehackernews.com/2024/05/researchers-uncover-active-exploitation.html?m=1
30/05/2024 16:30:28
QRCode
archive.org

Researchers have discovered several vulnerabilities in popular WordPress plugins that allow attackers to create rogue admin accounts.
#attacks #breach #computer #cyber #data #hack #hacker #hacking #how #information #malware #network #news #ransomware #security #software #the #to #today #updates #vulnerability

thehackernews EN 2024 WordPress Plugin Vulnerabilities
Big Vulnerabilities in Next-Gen BIG-IP https://eclypsium.com/blog/big-vulnerabilities-in-next-gen-big-ip/
09/05/2024 12:48:05
QRCode
archive.org
thumbnail

Our ongoing research has identified remotely exploitable vulnerabilities in F5’s Next Central Manager that can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any F5 assets managed by the Next Central Manager. These attacker-controlled accounts would not be visible from the Next Central Manager itself, enabling ongoing malicious persistence within the environment. At the time of writing, we have not seen any indication that these vulnerabilities have been exploited in the wild.

eclypsium EN 2024 BIG-IP vulnerabilities CVE-2024-21793 CVE-2024-26026
Chinese Keyboard App Vulnerabilities Explained https://citizenlab.ca/2024/04/chinese-keyboard-app-vulnerabilities-explained/
26/04/2024 08:19:43
QRCode
archive.org
thumbnail

We analyzed third-party keyboard apps Tencent QQ, Baidu, and iFlytek, on the Android, iOS, and Windows platforms. Along with Tencent Sogou, they comprise over 95% of the market share for third-party keyboard apps in China. This is an FAQ for the full report titled "The not-so-silent type: Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers."

citizenlab EN 2024 Chinese Keyboard App Vulnerabilities Tencent Baidu Android iOS
'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks https://www.wired.com/story/arcanedoor-cyberspies-hacked-cisco-firewalls-to-access-government-networks/
25/04/2024 07:48:55
QRCode
archive.org
thumbnail

Sources suspect China is behind the targeted exploitation of two zero-day vulnerabilities in Cisco’s security appliances.

wired EN 2024 0-day vulnerabilities security cisco cybersecurity china hacking ArcaneDoor
DJI Mavic 3 Drone Research: Vulnerability Analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis
03/04/2024 23:00:22
QRCode
archive.org
thumbnail

Nozomi Networks Labs found 9 vulnerabilities in DJI drones - we outline the research process for identifying and mitigating these security issues.

nozominetworks EN 2024 DJI drones vulnerabilities Analysis
The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind https://www.wired.com/story/jia-tan-xz-backdoor/
03/04/2024 17:16:13
QRCode
archive.org
thumbnail

The thwarted XZ Utils supply chain attack was years in the making. Now, clues suggest nation-state hackers were behind the persona that inserted the malicious code.

wired EN 2024 XZ vulnerabilities linux open-source hackers JiaT75
Vulnerabilities Year-in-Review: 2023 https://intel471.com/blog/vulnerabilities-year-in-review-2023
01/04/2024 10:40:32
QRCode
archive.org
thumbnail

In 2023, threat actors continued to exploit a variety of vulnerabilities — both newly discovered weaknesses and unresolved issues — to carry out sophisticated attacks on global organizations. The number of documented software vulnerabilities continued to rise, and threat actors were quick to capitalize on new vulnerabilities and leverage recent releases of publicly available vulnerability research and exploit code to target entities. However, while there was a high number of vulnerabilities released in the reporting period, only a handful actually were weaponized in attacks. The ones of most interest are those that threat actors use for exploitation. In this report, we’ll analyze the numbers and types of vulnerabilities in 2023 with a view to understanding attack trends and how organizations can better defend themselves.

intel471 EN 2024 Year-in-Review 2023 Vulnerabilities
BlueSpy - Spying on Bluetooth conversations https://www.tarlogic.com/blog/bluespy-spying-on-bluetooth-conversations/
26/03/2024 15:58:35
QRCode
archive.org
thumbnail

BlueSpy is a proof of concept for exploiting vulnerabilities in Bluetooth headsets and eavesdropping on private conversations

tarlogic EN 2024 BlueSpy Bluetooth PoC vulnerabilities eavesdropping
Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds | WIRED https://www.wired.com/story/saflok-hotel-lock-unsaflok-hack-technique/
21/03/2024 15:27:07
QRCode
archive.org
thumbnail

The company behind the Saflok-brand door locks is offering a fix, but it may take months or years to reach some hotels.

wired EN 2024 vulnerabilities Saflok Keycard Lock hotel door NCF
Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Connect and Policy Secure Gateways | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060b
29/02/2024 19:44:12
QRCode
archive.org

Based upon the authoring organizations’ observations during incident response activities and available industry reporting, as supplemented by CISA’s research findings, the authoring organizations recommend that the safest course of action for network defenders is to assume a sophisticated threat actor may deploy rootkit level persistence on a device that has been reset and lay dormant for an arbitrary amount of time. For example, as outlined in PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure), sophisticated actors may remain silent on compromised networks for long periods. The authoring organizations strongly urge all organizations to consider the significant risk of adversary access to, and persistence on, Ivanti Connect Secure and Ivanti Policy Secure gateways when determining whether to continue operating these devices in an enterprise environment.

CISA EN 2024 Ivanti Vulnerabilities Connect persistence Warning
Multiple XSS flaws in Joomla can lead to remote code execution https://securityaffairs.com/159487/security/joomla-xss-flaws.html
22/02/2024 16:55:14
QRCode
archive.org
thumbnail

Joomla maintainers have addressed multiple flaws in the popular content management system (CMS) that can lead to execute arbitrary code

securityaffairs EN 2024 XSS Joomla CMS vulnerabilities CVE-2024-21722 CVE-2024-21723
Here is Apple's official 'jailbroken' iPhone for security researchers | TechCrunch https://techcrunch.com/2024/02/01/here-is-apples-official-jailbroken-iphone-for-security-researchers/
01/02/2024 19:22:28
QRCode
archive.org
thumbnail

A security researchers shared a picture of the instructions that go along Apple's Security Research Device and more details about this special iPhone.

techcrunch EN 2024 apple bugs cybersecurity iphone vulnerabilities Jailbreak
How Memory Forensics Revealed Exploitation of Ivanti Connect Secure VPN Zero-Day Vulnerabilities https://www.volexity.com/blog/2024/02/01/how-memory-forensics-revealed-exploitation-of-ivanti-connect-secure-vpn-zero-day-vulnerabilities/
01/02/2024 18:46:42
QRCode
archive.org
thumbnail

Volexity regularly prioritizes memory forensics when responding to incidents. This strategy improves investigative capabilities in many ways across Windows, Linux, and macOS. This blog post highlights some specific ways memory forensics played a key role in determining how two zero-day vulnerabilities were being chained together to achieve unauthenticated remote code execution in Ivanti Connect Secure VPN devices.

volexity EN 2024 Ivanti Connect Secure VPN Zero-Day Vulnerabilities
page 2 / 4
4481 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio