Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 5
85 résultats taggé report  ✕
Cybercriminals operating ransomware as a service from overseas continue to be responsible for most high-profile cybercrime attacks against the UK https://www.nationalcrimeagency.gov.uk/threats/nsa-cyber-2024
30/08/2024 11:23:23
QRCode
archive.org

The deployment of ransomware remains the greatest serious and organised cybercrime threat, the largest cybersecurity threat, and also poses a risk to the UK’s national security. Ransomware attacks can have a significant impact on victims due to financial, data, and service losses, which can lead to business closure, inaccessible public services, and compromised customer data. Threat actors are typically based in overseas jurisdictions where limited cooperation makes it challenging for UK law enforcement to disrupt their activities.

nationalcrimeagency.gov.uk EN 2024 ransomware report assassment cybercrime UK
Disrupting a covert Iranian influence operation https://openai.com/index/disrupting-a-covert-iranian-influence-operation/
17/08/2024 02:49:59
QRCode
archive.org

We banned accounts linked to an Iranian influence operation using ChatGPT to generate content focused on multiple topics, including the U.S. presidential campaign. We have seen no indication that this content reached a meaningful audience.

openai EN 2024 chatgpt Iran influence-operation US disrupted report
DDoS attack volume rises, peak power reaches 1.7 Tbps https://www.helpnetsecurity.com/2024/08/15/ddos-attacks-h1-2024-increase/
16/08/2024 12:00:09
QRCode
archive.org
thumbnail

The total number of DDoS attacks during H1 2024 amounted to 830,000, an increase of 46% when compared to H1 2023, according to Gcore.

helpnetsecurity EN 2024 DDoS attack Statistics report
Geopolitical Tensions Drive Explosion in DDoS Attacks https://www.infosecurity-magazine.com/news/geopolitical-tensions-drive-ddos/
16/08/2024 11:59:20
QRCode
archive.org
thumbnail

Radware found that Web DDoS attacks rose by 265% in H1 2024, driven by hacktivist groups amid rising geopolitical tensions

infosecurity-magazine EN 2024 DDoS attacks statistcs report
Risk assessment report on cyber resilience on EU’s telecommunications and electricity sectors https://digital-strategy.ec.europa.eu/en/news/risk-assessment-report-cyber-resilience-eus-telecommunications-and-electricity-sectors
01/08/2024 23:13:00
QRCode
archive.org

EU Member States, with the support of the European Commission and ENISA, the EU Agency for Cybersecurity, published the first report on the cybersecurity and resilience of Europe’s telecommunications and electricity sectors.

digital-strategy.ec.europa.eu 2024 EU ENISA cybersecurity resilience report electricity telecommunications
'Fortune 50' Company Made Record-Breaking $75M Ransomware Payment https://www.pcmag.com/news/fortune-50-company-made-record-breaking-75m-ransomware-payment
01/08/2024 23:07:59
QRCode
archive.org

A major company made a staggering $75 million ransomware payment to hackers earlier this year, according to cybersecurity vendor Zscaler.

Zscaler made the claim in a Tuesday report examining the latest trends in ransomware attacks, which continue to ensnare companies, hospitals, and schools across the country.

pcmag EN 2024 Zscaler report Fortune50 record ransomware payment DarkAngels
IBM: Cost of a breach reaches nearly $5 million, with healthcare being hit the hardest https://therecord.media/ibm-breach-report-cost-rise-to-5-million
01/08/2024 06:58:00
QRCode
archive.org
thumbnail

Businesses that fall victim to a data breach can expect a financial hit of nearly $5 million on average — a 10% increase compared to last year — according to IBM’s annual report on cybersecurity incidents.

therecord.media EN 2024 IBM cost financial data-breach report
Mid-year Doppelgänger information operations in Europe and the US https://harfanglab.io/en/insidethelab/doppelganger-operations-europe-us/?ref=news.risky.biz
29/07/2024 09:27:34
QRCode
archive.org
thumbnail

This report delves into Doppelgänger information operations conducted by Russian actors, focusing on their activities from early June to late-July 2024. Our investigation was motivated by the unexpected snap general election in France, prompting a closer look at Doppelgänger activities during this period.

While recent activities have been described since1,2, our first dive into the information operations topic offers a complementary threat-intelligence analysts’ perspective on the matter, brings additional knowledge on associated infrastructure, tactics and motivation in Europe and the United States.

HarfangLab EN 2024 Russia Doppelgänger disinformation report
NVD Analysis Report https://www.fortressinfosec.com/nvd-analysis-report
27/07/2024 13:08:45
QRCode
archive.org
thumbnail

The following estimates are calculated using data from the NVD Dashboard. At the time of this reports generation, NVD's 2024 daily average for analyzing new CVEs is 30.27. There is a current backlog of 16777 CVEs awaiting analysis. With an average influx of 111.07 new CVEs per day, a daily average of 217.93 analyses is required to clear this backlog and process new CVEs. Currently, NVD is falling short of this goal by 187.66 CVEs a day. Given this data, if the current daily rate of CVE analysis persists, the projected number of CVEs awaiting analysis by the end of 2024 will be 29462.6.

fortressinfosec EN 2024 stats CVEs report estimate trends averages
UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion?hl=en
11/06/2024 08:43:35
QRCode
archive.org
thumbnail

A campaign targeting Snowflake customer database instances with the intent of data theft and extortion.

Mandiant EN 2024 UNC5537 Snowflake report
Molding lies into reality || Exploiting CVE-2024-4358 https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/
03/06/2024 13:05:23
QRCode
archive.org
thumbnail

Progress Report Server Unauthenticated Remote Code Execution Chain

summoning.team EN 2024 CVE-2024-4358 Telerik Report Server
Cache Me If You Can: Local Privilege Escalation in Zscaler Client Connector (CVE-2023-41973) https://spaceraccoon.dev/zscaler-client-connector-local-privilege-escalation/
29/05/2024 15:43:59
QRCode
archive.org
thumbnail

A couple months ago, my colleague Winston Ho and I chained a series of unfortunate bugs into a zero-interaction local privilege escalation in Zscaler Client Connector. This was an interesting journey into Windows RPC caller validation and bypassing several checks, including Authenticode verification. Check out the original Medium blogpost for Winston’s own ZSATrayManager Arbitrary File Deletion (CVE-2023-41969)!

spaceraccoon EN 204 report vulnerability Zscaler Client Connector CVE-2023-41973
APT trends report Q1 2024 https://securelist.com/apt-trends-report-q1-2024/112473/
09/05/2024 12:41:51
QRCode
archive.org

For more than six years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. These summaries are based on our threat intelligence research. They provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They are designed to highlight the significant events and findings that we feel people should be aware of.

securelist Kaspersky EN 2024 report APT Gelsemium Careto
From IcedID to Dagon Locker Ransomware in 29 Days https://thedfirreport.com/2024/04/29/from-icedid-to-dagon-locker-ransomware-in-29-days/
29/04/2024 06:41:41
QRCode
archive.org
  • In late August 2023, we observed an intrusion that started with a phishing campaign using PrometheusTDS to distribute IcedID.
  • IcedID dropped and executed a Cobalt Strike beacon, which was then used through-out the intrusion.
  • The threat actor leveraged a bespoke PowerShell tool known as AWScollector to facilitate a range of malicious activities including discovery, lateral movement, data exfiltration, and ransomware deployment.
  • Group Policy was used to distribute Cobalt Strike beacons at login to a specific privileged user group.
  • The threat actor utilized a suite of tools to support their activities, deploying Rclone, Netscan, Nbtscan, AnyDesk, Seatbelt, Sharefinder, and AdFind.
  • This case had a TTR (time to ransomware) of 29 days.
thedfirreport EN 2024 PrometheusTDS TTR IcedID report
The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider | Trend Micro (US) https://www.trendmicro.com/en_us/research/24/d/labhost-takedown.html?ref=news.risky.biz
19/04/2024 07:10:16
QRCode
archive.org
thumbnail

On Thursday, April 18, 2024, the UK’s Metropolitan Police Service, along with fellow UK and international law enforcement, as well as several trusted private industry partners, conducted an operation that succeeded in taking down the Phishing-as-a-Service (PhaaS) provider LabHost. This move was also timed to coincide with a number of key arrests related to this operation. In this entry, we will briefly explain what LabHost was, how it affected its victims, and the impact of this law enforcement operation — including the assistance provided by Trend Micro.

trendmicro EN 2024 cybercrime report LabHost takedown PhaaS Phishing-as-a-Service
DDoS threat report for 2024 Q1 https://blog.cloudflare.com/ddos-threat-report-for-2024-q1
17/04/2024 06:44:03
QRCode
archive.org
thumbnail

2024 started with a bang. Cloudflare’s autonomous systems mitigated over 4.5 million DDoS attacks in the first quarter of the year — a 50% increase compared to the previous year.

cloudflare EN 2024 DDoS attacks report
State of WordPress Security In 2024 https://patchstack.com/whitepaper/state-of-wordpress-security-in-2024/
01/04/2024 10:39:55
QRCode
archive.org
thumbnail

This year, we’ve partnered with Sucuri. With both of our data combined, we can cover the entire timeline of security incidents from the vulnerability being found to the point where malware infection gets detected on a vulnerable website.

2023 was another record year of new vulnerabilities being discovered and fixed in the WordPress ecosystem. In 2023, we added 5,948 new vulnerabilities to the Patchstack vulnerability database. That’s 24% more than in 2022.

patchstack EN WordPress report
APT29 Uses WINELOADER to Target German Political Parties | Mandiant https://www.mandiant.com/resources/blog/apt29-wineloader-german-political-parties
25/03/2024 09:14:30
QRCode
archive.org
thumbnail

APT29 used a new backdoor variant publicly tracked as WINELOADER to target German political parties.

mandiant EN 2024 report APT29 backdoor WINELOADER German Political Parties Germany
Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | Trend Micro (US) https://www.trendmicro.com/en_us/research/24/c/earth-krahang.html
19/03/2024 15:51:23
QRCode
archive.org
thumbnail

Since early 2022, we have been monitoring an APT campaign that targets several government entities worldwide, with a strong focus in Southeast Asia, but also seen targeting Europe, America, and Africa.

trendmicro EN 2024 targeted-attacks research report Earth-Krahang i-soon
Jamf says 9% of smartphone have fallen for phishing attacks https://appleinsider.com/articles/24/02/22/apple-users-are-increasingly-falling-victim-to-malware-phishing-and-viruses
22/02/2024 22:14:16
QRCode
archive.org
thumbnail

In a report going over the state of malware in 2024, device management firm Jamf says that 9% of mobile users were caught by phishing, while 20% of companies were at risk because of bad smartphone configurations.

appleinsider EN 2024 smartphone phishing macos ios report Statistics
page 2 / 5
4470 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio