Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 204 / 238
Grâce à une fausse enceinte Bluetooth JBL, ils réussissaient à voler des voitures https://www.francelive.fr/article/france-live/grace-a-une-fausse-enceinte-bluetooth-jbl-ils-reussissaient-a-voler-des-voitures-7659620/
21/10/2022 10:52:36
QRCode
archive.org
thumbnail

En Seine-et-Marne, deux voleurs ont été interceptés par les gendarmes au volant d'une voiture signalée volée. Ils étaient en possession d'une enceinte Bluetooth dans laquelle était dissimulée un dispositif électronique capable de démarrer de nombreuses voitures.

francelive FR 2022 vol voitures
Melting the DNS Iceberg: Taking over your infrastructure Kaminsky style https://sec-consult.com/blog/detail/melting-the-dns-iceberg-taking-over-your-infrastructure-kaminsky-style/
20/10/2022 21:15:06
QRCode
archive.org
thumbnail

Hidden DNS resolvers and how to compromise your infrastructure

sec-consult 2022 Kaminsky attack DNS Hidden resolvers compromise infrastructure technical
TeamTNT Returns – or Does It? https://www.trendmicro.com/en_us/research/22/j/teamtnt-returns-or-does-it.html
20/10/2022 20:36:13
QRCode
archive.org
thumbnail

TeamTNT is a threat group that was known for primarily targeting the cloud and container environments around the world. This group has been documented to leverage the cloud and container resources by deploying cryptocurrency miners in the victim environments. While the group has been active since 2019 and announced it was quitting in 2021, our recent observations make it appear as if TeamTNT has returned — or a copycat group imitating the routines of TeamTNT — and has been deploying an XMRig cryptocurrency miner. Analysis of the attack patterns and other technical details of the code has also led us to believe that the routines are mimicking TeamTNT’s arsenal, but are likely deployed by another cryptocurrency mining group named WatchDog.

trendmicro 2022 EN TeamTNT WatchDog
Nouvelle cyberattaque contre le Réseau pédagogique neuchâtelois https://www.ictjournal.ch/news/2022-10-20/nouvelle-cyberattaque-contre-le-reseau-pedagogique-neuchatelois
20/10/2022 11:47:38
QRCode
archive.org
thumbnail

Déjà victime de pirates informatiques il y a quelques mois, le Réseau pédagogique neuchâtelois annonce être à nouveau ciblé par une cyberattaque.

ICTjournal CH FR 2022 cyberattaque Réseau pédagogique neuchâtelois Neuchâtel
Cyberattaque : comment Caen a évité le pire grâce à l’EDR d’HarfangLab https://www.lemagit.fr/actualites/252526055/Cyberattaque-comment-Caen-a-evite-le-pire-grace-a-lEDR-dHarfangLab
19/10/2022 09:08:10
QRCode
archive.org
thumbnail

Caen a profité des suites d’un démonstrateur de l'EDR d'HarfangLab en attente de contractualisation pour détecter les prémices du possible déploiement d’un rançongiciel. L’intrusion est avérée, un nettoyage en cours, mais le chiffrement a été évité. Et très probablement le vol de données aussi.

lemagit FR 2022 Caen EDR HarfangLab ransomware
SafeBreach Uncovers Fully Undetectable Powershell Backdoor https://www.safebreach.com/resources/blog/safebreach-labs-researchers-uncover-new-fully-undetectable-powershell-backdoor/
19/10/2022 08:30:40
QRCode
archive.org
thumbnail

See how this tool—created by a sophisticated and seemingly unknown threat actor—uses the unique approach of disguising itself as part of a Windows update.

SafeBreach EN 2022 Powershell Undetectable IoCs research
A New Attack Surface on MS Exchange Part 4 - ProxyRelay! https://devco.re/blog/2022/10/19/a-new-attack-surface-on-MS-exchange-part-4-ProxyRelay/
19/10/2022 07:03:05
QRCode
archive.org
thumbnail

Hi, this is a long-time-pending article. We could have published this article earlier (the original bug was reported to MSRC in June 2021 with a 90-days Public Disclosure Policy). However, during communications with MSRC, they explained that since this is an architectural design issue, lots of code changes and testings are expected and required, so they hope to resolve this problem with a one-time CU (Cumulative Update) instead of the regular Patch Tuesday. We understand their situation and agree to extend the deadline.

devco.re EN 2022 CVE-2021-26414 CVE-2022-21979 Exchange Microsoft-Exchange ProxyRelay
CVE-2022-42889: Keep Calm and Stop Saying "4Shell" https://www.rapid7.com/blog/post/2022/10/17/cve-2022-42889-keep-calm-and-stop-saying-4shell/
18/10/2022 11:13:42
QRCode
archive.org
thumbnail

CVE-2022-42889, which some have begun calling “Text4Shell,” is a vulnerability in the popular Apache Commons Text library that can result in code execution when processing malicious input. The vulnerability was announced on October 13, 2022 on the Apache dev list and originally reported by Alvaro Munoz

rapid7 EN 2022 CVE-2022-42889 Text4Shell Apache Commons Text
Cyble Phishing ERMAC Android Malware Increasingly Active https://blog.cyble.com/2022/10/18/ermac-android-malware-increasingly-active/
18/10/2022 10:45:03
QRCode
archive.org
thumbnail

CRIL Investigates the resurgence of ERMAC Android Malware as an increasing number of users are falling prey to their phishing attacks.

cyble EN 2022 ERMAC Android Malware phishing Analysis
Ransom Cartel Ransomware: A Possible Connection With REvil https://unit42.paloaltonetworks.com/ransom-cartel-ransomware/
18/10/2022 10:33:34
QRCode
archive.org
thumbnail

Ransom Cartel is ransomware as a service (RaaS) that exhibits several similarities to and technical overlaps with REvil ransomware. Read our overview.

unit42 paloaltonetworks EN 2022 Ransom-Cartel REvil RaaS
Technical Analysis of BlueSky Ransomware https://cloudsek.com/technical-analysis-of-bluesky-ransomware/
18/10/2022 10:30:48
QRCode
archive.org

BlueSky Ransomware is a modern malware using advanced techniques to evade security defences. It predominantly targets Windows hosts and utilizes the Windows multithreading model for fast encryption.

cloudsek EN 2022 ransomware IoCs Analysis BlueSky
BianLian Ransomware Encrypts Files in the Blink of an Eye https://blogs.blackberry.com/en/2022/10/bianlian-ransomware-encrypts-files-in-the-blink-of-an-eye
18/10/2022 10:25:08
QRCode
archive.org
thumbnail

BianLian is a financially motivated threat actor that targets a wide range of industries. It uses the exotic programming language “Go” to encrypt files with unusual speed.

blackberry Research 2022 Ransomware BianLian GO Golang
Prime minister links drones over Norway to ‘hybrid threats’ https://www.newsinenglish.no/2022/10/14/prime-minister-links-drones-over-norway-to-hybrid-threats/
17/10/2022 19:56:46
QRCode
archive.org

Norwegian police and military were busy again this week investigating more unidentified drones seen flying over critical energy infrastructure. After a Russian man was arrested for trying to leave Norway with two drones containing lots of pictures, Prime Minister Jonas Gahr Støre likened the incidents to a new form of “hybrid threats.”

newsinenglish.no EN 2022 drone Norway hybrid-threat Russia
New “Prestige” ransomware impacts organizations in Ukraine and Poland https://www.microsoft.com/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/
14/10/2022 21:21:48
QRCode
archive.org
thumbnail

The Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a novel ransomware campaign targeting organizations in the logistics and transportation industry in Ukraine and Poland utilizing a previously unidentified ransomware payload.

microsoft EN 2022 MSTIC Ukraine Poland ransomware payload Prestige
Microsoft Office 365 Message Encryption Insecure Mode of Operation | WithSecure™ Labs https://labs.withsecure.com/advisories/microsoft-office-365-message-encryption-insecure-mode-of-operation
14/10/2022 16:11:00
QRCode
archive.org
thumbnail

Microsoft Office 365 Message Encryption (OME) utilitises Electronic Codebook (ECB) mode of operation. This mode is insecure and leaks information about the structure of the messages sent and can lead to partial or full message disclosure.

withsecure EN 2022 Security-advisory 365 office365 leak Encryption ECB disclosure
New PHP Variant of Ducktail Infostealer Targeting Facebook Business Accounts https://www.zscaler.com/blogs/security-research/new-php-variant-ducktail-infostealer-targeting-facebook-business-accounts
14/10/2022 13:45:07
QRCode
archive.org
thumbnail

ThreatLabz has discovered, hiding in app stores, a PHP variant of the Ducktail infostealer used to hijack Facebook Business accounts.

zscaler EN 2022 Ducktail Facebook Infostealer Analysis
Software Delivery Shield protects the software supply chain https://cloud.google.com/blog/products/devops-sre/introducing-software-delivery-shield-from-google-cloud
14/10/2022 13:43:39
QRCode
archive.org
thumbnail

Software Delivery Shield, a software supply chain security solution, can enhance the security posture along the supply chain from dev to production.

google EN blog cloud supplychain supply-chain solution dev shield announcement
Threat Alert: Private npm Packages Disclosed via Timing Attacks https://blog.aquasec.com/private-packages-disclosed-via-timing-attack-on-npm
14/10/2022 09:42:51
QRCode
archive.org
thumbnail

Via timing attacks, threat actors create phony public npm packages masked as private ones to deceive developers into downloading compromised packages

aquasec EN 2022 npm supplychain supply-chain attack timing-attack
Alchimist: A new attack framework in Chinese for Mac, Linux and Windows https://blog.talosintelligence.com/2022/10/alchimist-offensive-framework.html
14/10/2022 09:39:08
QRCode
archive.org
thumbnail
  • Cisco Talos discovered a new attack framework including a command and control (C2) tool called "Alchimist" and a new malware "Insekt" with remote administration capabilities.
  • The Alchimist has a web interface in Simplified Chinese with remote administration features.
  • The attack framework is designed to target Windows, Linux and Mac machines.
  • Alchimist and Insekt binaries are implemented in GoLang.
  • This campaign consists of additional bespoke tools such as a MacOS exploitation tool, a custom backdoor and multiple off-the-shelf tools such as reverse proxies.
talosintelligence EN 2022 TheAlchimist C2 C&C attack-framework
On Bypassing eBPF Security Monitoring https://blog.doyensec.com/2022/10/11/ebpf-bypass-security-monitoring.html
13/10/2022 11:05:20
QRCode
archive.org

There are many security solutions available today that rely on the Extended Berkeley Packet Filter (eBPF) features of the Linux kernel to monitor kernel functions. Such a paradigm shift in the latest monitoring technologies is being driven by a variety of reasons

doyensec doyensecurity EN 2022 vulnerability exploit eBPF bypass research
page 204 / 238
4760 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio