Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 3
57 résultats taggé fake  ✕
Behind the CAPTCHA: A Clever Gateway of Malware https://www.mcafee.com/blogs/other-blogs/mcafee-labs/behind-the-captcha-a-clever-gateway-of-malware/
25/09/2024 21:00:34
QRCode
archive.org
thumbnail

McAfee Labs recently observed an infection chain where fake CAPTCHA pages are being leveraged to distribute malware, specifically Lumma Stealer. We are observing a campaign targeting multiple countries. Below is a map showing the geolocation of devices accessing fake CAPTCHA URLs, highlighting the global distribution of the attack.

mcafee EN 2024 CAPTCHA Gateway Malware LummaStealer campaign fake
Staying a Step Ahead: Mitigating the DPRK IT Worker Threat https://cloud.google.com/blog/topics/threat-intelligence/mitigating-dprk-it-worker-threat/?hl=en
24/09/2024 08:37:56
QRCode
archive.org
thumbnail

North Korea's IT workforce presents a persistent and escalating cyber threat.

Mandiant EN 2024 fake workforce DPRK North-Korea UNC5267
Fake Google Authenticator Website Installs Malware https://any.run/cybersecurity-blog/fake-google-authenticator-campaign/
02/09/2024 11:46:48
QRCode
archive.org
thumbnail

See how adversaries are impersonating Google Authenticator in Google Ads to deliver the DeerStealer information-stealing malware. 

any.run EN 2024 Google Authenticator GoogleAds fake malvertising
Fake Palo Alto GlobalProtect used as lure to backdoor enterprises https://www.bleepingcomputer.com/news/security/fake-palo-alto-globalprotect-used-as-lure-to-backdoor-enterprises/
30/08/2024 08:27:26
QRCode
archive.org
thumbnail

Threat actors target Middle Eastern organizations with malware disguised as the legitimate Palo Alto GlobalProtect Tool that can steal data and execute remote PowerShell commands to infiltrate internal networks further.

bleepingcomputer EN 2024 fake Malware Middle-East Palo-Alto-Networks
No one’s ready for this https://www.theverge.com/2024/8/22/24225972/ai-photo-era-what-is-reality-google-pixel-9
23/08/2024 09:34:53
QRCode
archive.org
thumbnail

With AI photo editing getting easy and convincing, the world isn’t prepared for an era where photographs aren’t to be trusted.

theverge EN 2024 photo-editing AI fake trust images
Les cybercriminels ont copié dieci.ch à l'identique https://www.dieci.ch/fr/news/dieci-ch-a-ete-copie
12/08/2024 20:09:47
QRCode
archive.org
thumbnail

Sous le domaine dleci.ch, une page de phishing a été mise en ligne, reproduisant à l'identique le contenu de dieci.ch.

dieci CH FR clone phishing pizza identique fake
Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft https://www.trendmicro.com/en_us/research/24/h/malvertising-campaign-fake-ai-editor-website-credential-theft.html
03/08/2024 02:04:24
QRCode
archive.org
thumbnail

We uncovered a malvertising campaign where the threat actor hijacks social media pages, renames them to mimic popular AI photo editors, then posts malicious links to fake websites.

trendmicro EN 2024 malware cyber-crime research phishing malvertising social media fake mimic campaign
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI https://www.sentinelone.com/labs/nullbulge-threat-actor-masquerades-as-hacktivist-group-rebelling-against-ai/
18/07/2024 23:35:48
QRCode
archive.org
thumbnail

Actors are masquerading as hacktivists targeting AI-centric communities with commodity malware and customized LockBit payloads.

sentinelone EN 2024 NullBulge threat-actor hacktivists fake malware LockBit
Fake AWS Packages Ship Command and Control Malware In JPEG Files https://blog.phylum.io/fake-aws-packages-ship-command-and-control-malware-in-jpeg-files
18/07/2024 23:25:43
QRCode
archive.org
thumbnail

On July 13, 2024, the Phylum platform alerted us to a series of odd packages published to the npm package registry. At first glance, these packages appear entirely legitimate; however, as our system automatically noted, they contained sophisticated command and control functionality hidden in image files that would be executed

phylum EN 2024 AWS fake Supply-chain-attack npm package registry JPEG
In China, AI transformed Ukrainian YouTuber into a Russian https://www.reuters.com/technology/artificial-intelligence/china-ai-transformed-ukrainian-youtuber-into-russian-2024-06-21/
21/06/2024 06:40:50
QRCode
archive.org

Olga Loiek, a University of Pennsylvania student was looking for an audience on the internet – just not like this.
Shortly after launching a YouTube channel in November last year, Loiek, a 21-year-old from Ukraine, found her image had been taken and spun through artificial intelligence to create alter egos on Chinese social media platforms.
Her digital doppelgangers - like "Natasha" - claimed to be Russian women fluent in Chinese who wanted to thank China for its support of Russia and make a little money on the side selling products such as Russian candies.

reuters EN 2024 AI Ukrainian YouTuber Russia China fake
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail https://thehackernews.com/2024/05/cyber-criminals-exploit-github-and.html
25/05/2024 21:59:33
QRCode
archive.org

A "multi-faceted campaign" has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking trojans such as Atomic (aka AMOS), Vidar, Lumma (aka LummaC2), and Octo by impersonating credible software like 1Password, Bartender 5, and Pixelmator Pro.

thehackernews EN 2024 GitHub FileZilla AMOS impersonating software 1Password fake
A Catalog of Hazardous AV Sites – A Tale of Malware Hosting https://www.trellix.com/blogs/research/a-catalog-of-hazardous-av-sites-a-tale-of-malware-hosting/
25/05/2024 21:52:52
QRCode
archive.org

In mid-April 2024, Trellix Advanced Research Center team members observed multiple fake AV sites hosting highly sophisticated malicious files such as APK, EXE and Inno setup installer that includes Spy and Stealer capabilities. Hosting malicious software through sites which look legitimate is predatory to general consumers, especially those who look to protect their devices from cyber-attacks. The hosted websites made to look legitimate are listed below.

trellix EN 2024 fake antivirus AV malicious research
New Go loader pushes Rhadamanthys stealer https://www.malwarebytes.com/blog/threat-intelligence/2024/03/new-go-loader-pushes-rhadamanthys
25/03/2024 18:53:17
QRCode
archive.org
thumbnail

A malicious ad for the popular admin tool PuTTY leads victims to a fake site that downloads malware.

malwarebytes EN 2024 PuTTY malicious fake Go Rhadamanthys
RATs Distributed Through Skype, Zoom, & Google Meet Lures https://www.zscaler.com/blogs/security-research/android-and-windows-rats-distributed-online-meeting-lures
06/03/2024 06:41:27
QRCode
archive.org
thumbnail

Threat actors are creating and using fake Skype, Zoom, and Google Meet pages to spread RATs.

zscaler EN 2024 fake Skype Zoom meet RAT Lures
Fake LastPass App Sneaks Past Apple's Review Team https://www.macrumors.com/2024/02/08/fake-lastpass-app-in-apple-app-store/
12/02/2024 01:21:17
QRCode
archive.org
thumbnail

Popular password management app LastPass is warning customers about a fraudulent app that uses a similar name and icon to attempt to trick LastPass...

macrumors EN 2024 App-Store LastPass fake fraudulent
X is being flooded with graphic Taylor Swift AI images https://www.theverge.com/2024/1/25/24050334/x-twitter-taylor-swift-ai-fake-images-trending
26/01/2024 09:58:13
QRCode
archive.org
thumbnail

Fake sexually explicit images of Taylor Swift have been circulating on X over the last day in the latest example of the proliferation of AI-generated pornography.

theverge EN 2024 Taylor-Swift X fake deepfake pornography
Follow-On Extortion Campaign Targeting Victims of Akira and Royal Ransomware https://arcticwolf.com/resources/blog/follow-on-extortion-campaign-targeting-victims-of-akira-and-royal-ransomware/
11/01/2024 20:46:01
QRCode
archive.org
thumbnail

Arctic Wolf Labs has investigated several cases where ransomware victims are being targeted for follow-on extortion attempts by threat actors who are aware of ransom attack details.

arcticwolf 2024 Extortion Campaign fake expert ransomware Akira Royal
BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates https://www.proofpoint.com/us/blog/threat-insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates
22/12/2023 16:15:49
QRCode
archive.org
thumbnail

Overview  Throughout the summer and fall of 2023, DarkGate entered the ring competing for the top spot in the remote access trojan (RAT) and loader category. It was observed in use by multiple cybe...

proofpoint EN 2023 BattleRoyal DarkGate RAT fake fake-updates RogueRaticate
Amazon sues group that fakes returns so people can get free MacBooks - The Verge https://www.theverge.com/2023/12/8/23993573/amazon-rekk-refund-return-fraud-lawsuit
11/12/2023 15:50:26
QRCode
archive.org
thumbnail

Amazon sues REKK, which allegedly helped shoppers get other expensive items for free by hacking and bribing fulfillment center employees to approve fake returns.

theverge 2023 EN Amazon REKK fake MacBook
Jamf Threat Labs: Fake Lockdown Mode proof of concept https://www.jamf.com/blog/fake-lockdown-mode/
06/12/2023 18:51:18
QRCode
archive.org
thumbnail

JTL security researchers discover how Lockdown Mode on iOS can be manipulated by a threat actor on compromised or jailbroken iPhones to trick users into believing that their device is protected by Lockdown Mode when in reality when in fact, it's not.

jamf EN 2023 Lockdown Mode iOS jailbroken fake
page 2 / 3
4481 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio