Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 5
87 résultats taggé attack  ✕
Cyble Honeypot Sensors Detect WordPress Plugin Attack, New Banking Trojan https://cyble.com/blog/cyble-honeypot-sensors-detect-wordpress-plugin-attack-new-banking-trojan/
04/10/2024 13:36:12
QRCode
archive.org
thumbnail

WordPress plugins are under active attack, a new banking trojan is spreading, and phishing and brute-force attacks continue unabated.

cyble EN 2024 WordPress Plugin Attack Banking Trojan CVE-2024-4577 CVE-2024-27956
Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps https://www.securityweek.com/record-breaking-ddos-attack-peaked-at-3-8-tbps-2-14-billion-pps/
03/10/2024 08:10:33
QRCode
archive.org

Web performance and security firm Cloudflare recently mitigated another record-breaking DDoS attack.
According to Matthew Prince, the company’s CEO, the attack peaked at 3.8 terabits per second (Tbps) and 2.14 billion packets per second (Pps). The attack was aimed at an unidentified customer of an unnamed hosting provider that uses Cloudflare services.

securityweek EN 2024 DDoS Record-Breaking Attack Cloudflare
Hacker plants false memories in ChatGPT to steal user data in perpetuity https://arstechnica.com/security/2024/09/false-memories-planted-in-chatgpt-give-hacker-persistent-exfiltration-channel/
26/09/2024 08:04:40
QRCode
archive.org
thumbnail

Emails, documents, and other untrusted content can plant malicious memories.

arstechnica EN 2024 ChatGPT exploit malicious memories attack
Unprecedented 3.15 Billion Packet Rate DDoS Attack Mitigated by Global Secure Layer https://globalsecurelayer.com/blog/unprecedented-3-15-billion-packet-rate-ddos-attack
28/08/2024 09:10:37
QRCode
archive.org
thumbnail

On August 25th 2024, Global Secure Layer mitigated the largest packet rate DDoS attack recorded against our platform

globalsecurelayer EN 2024 DDoS Attack Minecraft
DDoS attack volume rises, peak power reaches 1.7 Tbps https://www.helpnetsecurity.com/2024/08/15/ddos-attacks-h1-2024-increase/
16/08/2024 12:00:09
QRCode
archive.org
thumbnail

The total number of DDoS attacks during H1 2024 amounted to 830,000, an increase of 46% when compared to H1 2023, according to Gcore.

helpnetsecurity EN 2024 DDoS attack Statistics report
Akamai Blocked 419 TB of Malicious Traffic in a 24-Hour DDoS Attack https://www.akamai.com/blog/security/akamai-blocked-419-tb-of-malicious-traffic
08/08/2024 10:49:45
QRCode
archive.org

On July 15, 2024, Akamai prevented one of the largest distributed denial-of-service (DDoS) cyberattacks it has ever observed against a major financial services company in Israel.

The highly sophisticated, high-volume attack lasted almost 24 hours.

The attacker deployed larger-than-usual resources, indicating a serious risk for future attacks.

Other Israeli financial institutions reportedly suffered outages and downtimes on the same day, potentially due to the same type of attack and the same aggressor.

Akamai EN 2024 Blocked DDoS high-volume attack
TuDoor https://tudoor.net/
26/07/2024 08:14:23
QRCode
archive.org
thumbnail

TuDoor is a new DNS attack, which could be exploited to carry out DNS cache poisoning, denial-of-service, and resource consuming.

DNS can be compared to a game of chess in that its rules are simple, yet the possibilities it presents are endless. While the fundamental rules of DNS are straightforward, DNS implementations can be extremely complex. In this study, we intend to explore the complexities and vulnerabilities in DNS response pre-processing by systematically analyzing DNS RFCs and DNS software implementations.

TuDoor 2024 EN DNS attack implementation cache-poisoning
Lviv neighbourhood left without heating, hot water by hacker attack https://en.lb.ua/news/2024/01/23/26110_lviv_neighbourhood_left_without.html?ref=news.risky.biz
25/07/2024 15:17:43
QRCode
archive.org
thumbnail

The Sykhiv residential area in Lviv was left without hot water and heating as a result of a hacker attack on Lvivteploenergo. This is reported on the company's website.

"The hacker attack disrupted the heat supply management system. Work is underway to restore heating and hot water supply in the Sykhiv residential area. The estimated time of restoration is 21:00," the statement said.

lb.ua EN 2024 hacking Lviv Russia-Ukraine-war attack disrupted heating Lvivteploenergo
South African pathology labs down after ransomware attack https://www.capeindependent.com/article/south-african-pathology-labs-down-after-ransomware-attack?ref=news.risky.biz
08/07/2024 06:49:45
QRCode
archive.org
thumbnail

The National Health Laboratory Service is the primary diagnostic service for 80% of the population, and no timeline for its restoration has been determined

capeindependent EN 2024 South-Africa ransomware attack pathology health
New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities https://thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
30/06/2024 11:41:28
QRCode
archive.org
thumbnail

Researchers unveil SnailLoad, a new side-channel attack exploiting network latency to infer web activity remotely, achieving up to 98% accuracy in vid

thehackernews EN 2024 SnailLoad Attack side-channel attack network latency
New attack uses MSC files and Windows XSS flaw to breach networks https://www.bleepingcomputer.com/news/security/new-grimresource-attack-uses-msc-files-and-windows-xss-flaw-to-breach-networks/
25/06/2024 09:01:37
QRCode
archive.org
thumbnail

A novel command execution technique dubbed 'GrimResource' uses specially crafted MSC (Microsoft Saved Console) and an unpatched Windows XSS flaw to perform code execution via the Microsoft Management Console.

bleepingcomputer EN 2024 Attack GrimResource Microsoft MSC Windows XSS
Okta warns of "unprecedented" credential stuffing attacks on customers https://www.bleepingcomputer.com/news/security/okta-warns-of-unprecedented-credential-stuffing-attacks-on-customers/
27/04/2024 19:19:15
QRCode
archive.org
thumbnail

Okta warns of an "unprecedented" spike in credential stuffing attacks targeting its identity and access management solutions, with some customer accounts breached in the attacks.

bleepingcomputer EN 2024 Account-Takeover Attack Credential-Stuffing Okta warning
Round 2: Change Healthcare Targeted in Second Ransomware Attack https://www.darkreading.com/cyberattacks-data-breaches/round-2-change-healthcare-targeted-second-ransomware-attack
10/04/2024 10:05:51
QRCode
archive.org
thumbnail

RansomHub, which is speculated to have some connection to ALPHV, has stolen 4TB of sensitive data from the beleaguered healthcare company.

darkreading 2024 Change-Healthcare ALPHV Ransomware Attack
A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask https://www.wired.com/story/p4x-north-korea-internet-hacker-identity-reveal/
04/04/2024 13:28:34
QRCode
archive.org
thumbnail

As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to show the US military how it can—and should—adopt his methods.

wired EN 2024 P4x North-Korea Vigilante military attack
research!rsc: The xz attack shell script https://research.swtch.com/xz-script
03/04/2024 10:00:07
QRCode
archive.org

Andres Freund published the existence of the xz attack on 2024-03-29 to the public oss-security@openwall mailing list. The day before, he alerted Debian security and the (private) distros@openwall list. In his mail, he says that he dug into this after “observing a few odd symptoms around liblzma (part of the xz package) on Debian sid installations over the last weeks (logins with ssh taking a lot of CPU, valgrind errors).”

At a high level, the attack is split in two pieces: a shell script and an object file. There is an injection of shell code during configure, which injects the shell code into make. The shell code during make adds the object file to the build. This post examines the shell script. (See also my timeline post.)

research.swtch.com EN 2024 script exploitation xz attack
PyPI halted new users and projects while it fended off supply-chain attack https://arstechnica.com/security/2024/03/pypi-halted-new-users-and-projects-while-it-fended-off-supply-chain-attack/
28/03/2024 22:45:47
QRCode
archive.org
thumbnail

Automation is making attacks on open source code repositories harder to fight.

arstechnica EN 2024 PyPI Automation malicious packages attack
Thousands of servers hacked in ongoing attack targeting Ray AI framework https://arstechnica.com/security/2024/03/thousands-of-servers-hacked-in-ongoing-attack-targeting-ray-ai-framework/?comments=1&comments-page=1
28/03/2024 00:21:11
QRCode
archive.org
thumbnail

Researchers say it's the first known in-the-wild attack targeting AI workloads.

arstechnica EN 2024 Ray AI framework attack ongoing servers
Recent ‘MFA Bombing’ Attacks Targeting Apple Users – Krebs on Security https://krebsonsecurity.com/2024/03/recent-mfa-bombing-attacks-targeting-apple-users/
27/03/2024 09:56:52
QRCode
archive.org

Several Apple customers recently reported being targeted in elaborate phishing attacks that involve what appears to be a bug in Apple's password reset feature. In this scenario, a target's Apple devices are forced to display dozens of system-level prompts that…

krebsonsecurity EN 2024 MFA-fatigue attack Apple MFA-bombing password
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms https://comsec.ethz.ch/research/dram/zenhammer/
26/03/2024 09:57:53
QRCode
archive.org

Our work shows that it is possible to trigger Rowhammer bit flips on DDR4 devices on AMD Zen 2 and Zen 3 systems despite deployed TRR mitigations. This result proves that AMD systems are equally vulnerable to Rowhammer as Intel systems, which greatly increases the attack surface, considering today’s AMD market share of around 36%… Read

ETHZ EN 2024 ZenHammer Rowhammer DDR4 AMD Zen2 Zen3 attack study
Managing Attack Surface | Huntress Blog https://www.huntress.com/blog/managing-attack-surface
21/03/2024 09:23:51
QRCode
archive.org
thumbnail

Huntress recently detected interesting activity on an endpoint; a threat actor was attempting to establish a foothold on an endpoint by using commands issued via MSSQL to upload a reverse shell accessible from the web server. All attempts were obviated by MAV and process detections, but boy-howdy, did they try!

huntress EN 2024 attack IoCs MSSQL reverse-shell
page 2 / 5
4737 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio