Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 207 / 251
SentinelSneak: Malicious PyPI module poses as security software development kit https://blog.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk
21/12/2022 00:05:00
QRCode
archive.org
thumbnail

A malicious Python file found on the PyPI repo adds backdoor and data exfiltration features to what appears to be a legitimate SDK client from SentinelOne.

reversinglabs EN 2022 PyPI Supply-chain-security Python exfiltration module kit
CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange https://securelist.com/cve-2022-41040-and-cve-2022-41082-zero-days-in-ms-exchange/108364/
20/12/2022 17:56:09
QRCode
archive.org
thumbnail

At the end of September, GTSC reported the finding of two 0-day vulnerabilities in Microsoft Exchange Server, CVE-2022-41040 and CVE-2022-41082. The cybersecurity community dubbed the pair of vulnerabilities ProxyNotShell.

securelist EN 2022 DLL-hijacking Malware-Descriptions Microsoft-Exchange Trojan Vulnerabilities-and-exploits Zero-day CVE-2022-41040 CVE-2022-41082 analysis
Get root on macOS 13.0.1 with CVE-2022-46689, the macOS Dirty Cow bug https://worthdoingbadly.com/macdirtycow/
19/12/2022 11:39:02
QRCode
archive.org

Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple’s XNU source.

worthdoingbadly EN 2022 CVE-2022-46689 macOS dirtycow
GoTrim: Go-based Botnet Actively Brute Forces WordPress Websites https://www.fortinet.com/blog/threat-research/gotrim-go-based-botnet-actively-brute-forces-wordpress-websites
19/12/2022 11:05:36
QRCode
archive.org
thumbnail

FortiGuard Labs encountered an unreported CMS scanner and brute forcer written in the Go programming language. Read our analysis of the malware and how this active botnet scans and compromises websites.

fortinet EN 2022 analysis malware scanner Wordpress go brute-force-attack FortiGuards-Labs Threat-Research botnet
À propos du chiffrement côté client - Aide Administrateur Google Workspace https://support.google.com/a/answer/10741897
18/12/2022 22:26:30
QRCode
archive.org

Vous pouvez chiffrer les données de votre organisation à l'aide de vos propres clés de chiffrement, en plus du chiffrement par défaut fourni par Google Workspace. Avec le chiffrement côté client (CSE) Google Workspace, le chiffrement du contenu est géré dans le navigateur du client avant la transmission ou le stockage des données dans le cloud via Google Drive. De cette façon, les serveurs Google ne peuvent pas accéder à vos clés de chiffrement ni déchiffrer vos données. Après avoir configuré le CSE, vous pouvez choisir quels utilisateurs peuvent créer du contenu chiffré côté client et le partager en interne ou en externe.

Google Workspace 2022 FR chiffrement
Support King, banned by FTC, linked to new phone spying operation https://techcrunch.com/2022/12/17/support-king-ftc-spytrac
18/12/2022 15:11:39
QRCode
archive.org
thumbnail

year after it was banned by the Federal Trade Commission, a notorious phone surveillance company is back in all but name, a TechCrunch investigation has found.

A groundbreaking FTC order in 2021 banned the stalkerware app SpyFone, its parent company Support King, and its chief executive Scott Zuckerman from the surveillance industry. The order, unanimously approved by the regulator’s five sitting commissioners, also demanded that Support King delete the phone data it illegally collected and notify victims that its app was secretly installed on their device.

techcrunch EN 2022 SupportKing stalkerware SpyFone FTC banned
Google ads lead to fake software pages pushing IcedID (Bokbot) https://isc.sans.edu/diary/Google+ads+lead+to+fake+software+pages+pushing+IcedID+Bokbot/29344
18/12/2022 12:00:59
QRCode
archive.org
thumbnail

Fake sites for popular software have occasionally been used by cyber criminal groups to push malware. Campaigns pushing IcedID malware (also known as Bokbot) also use this method as a distribution technique (we also commonly see IcedID sent through email).

SANS EN 2022 googleads bokbot fake software ads abusing delivery IceID
New Ransom Payment Schemes Target Executives, Telemedicine https://krebsonsecurity.com/2022/12/new-ransom-payment-schemes-target-executives-telemedicine/
18/12/2022 11:28:39
QRCode
archive.org

Ransomware groups are constantly devising new methods for infecting victims and convincing them to pay up, but a couple of strategies tested recently seem especially devious. The first centers on targeting healthcare organizations that offer consultations over the Internet and sending them booby-trapped medical records for the “patient.” The other involves carefully editing email inboxes of public company executives to make it appear that some were involved in insider trading.

krebsonsecurity EN 2022 executives ransom healthcare Venus CL0P infiltration
Using OpenAI Chat to Generate Phishing Campaigns https://www.richardosgood.com/posts/using-openai-chat-for-phishing/
16/12/2022 09:18:03
QRCode
archive.org

OpenAI chat has exploded in popularity over the last couple of weeks. People are using it to do all sorts of interesting things. If you are unfamiliar with OpenAI Chat and GPT-3, you can find a primer here. The gist is that it’s an artificial intelligence model that you can chat with as if it were a person. It can do all kinds of things like answer questions, write code, find bugs in code, and more. It also remembers context, so you can refer to something you already mentioned at it is able to follow along. I thought maybe this could be a useful tool for building email phishing campaigns for my pentesting work, so I thought I’d try it out and see what I could get it to do.

richardosgood ChatGPT Phishing Campaigns
How ChatGPT can turn anyone into a ransomware and malware threat actor   https://venturebeat-com.cdn.ampproject.org/c/s/venturebeat.com/security/chatgpt-ransomware-malware/amp/
16/12/2022 09:09:24
QRCode
archive.org
thumbnail

Ever since OpenAI launched ChatGPT at the end of November, commentators on all sides have been concerned about the impact AI-driven content-creation will have, particularly in the realm of cybersecurity. In fact, many researchers are concerned that generative AI solutions will democratize cybercrime.

venturebeat EN 2022 ChatGPT cybercrime generative AI
Global crackdown against DDoS services shuts down most popular platforms https://www.europol.europa.eu/media-press/newsroom/news/global-crackdown-against-ddos-services-shuts-down-most-popular-platforms
15/12/2022 22:09:24
QRCode
archive.org
thumbnail

Known as Operation Power Off, this operation saw law enforcement in the United States, the United Kingdom, the Netherlands, Poland and Germany take action against these types of attacks which can paralyse the internet.   The services seized were by far the most popular DDoS booter services on the market, receiving top billing on search engines. One such service taken...

europol EN 2022 DDoS crackdown platforms
Très courtisées, les sociétés suisses de cybersécurité s’arrachent https://www.letemps.ch/economie/tres-courtisees-societes-suisses-cybersecurite-sarrachent
15/12/2022 09:26:51
QRCode
archive.org
thumbnail

En l’espace de quelques jours, Hacknowledge a été rachetée par La Poste, alors que SCRT a été acquise par Orange Cyberdefense. Le manque d’experts et la demande croissante des PME motivent ces opérations

letemps FR CH 2022 Sécurité SCRT Hacknowledge Cyberdefense Poste compétences rachats experts
Microsoft-signed malicious Windows drivers used in ransomware attacks https://www.bleepingcomputer.com/news/microsoft/microsoft-signed-malicious-windows-drivers-used-in-ransomware-attacks/
14/12/2022 10:19:13
QRCode
archive.org
thumbnail

Microsoft has revoked several Chardware developer accounts after drivers signed through their profiles were used in cyberattacks, including ransomware incidents.

bleepingcomputer EN 2022 Microsoft-signed Microsoft cyberattacks drivers
FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/?v=2
14/12/2022 09:29:25
QRCode
archive.org

InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI) to build cyber and physical threat information sharing partnerships with the private sector, this week saw its database of contact information on more than 80,000 members go up…

krebsonsecurity 2022 EN InfraGard FBI leak database
A Custom Python Backdoor for VMWare ESXi Servers https://blogs.juniper.net/en-us/threat-research/a-custom-python-backdoor-for-vmware-esxi-servers
14/12/2022 08:44:25
QRCode
archive.org
thumbnail

Juniper Threat Labs analyzes a backdoor installed on a compromised VMware ESXi server that can execute arbitrary commands and launch reverse shells.

juniper EN 2022 VMware ESXi python
Apple fixes 'actively exploited' zero-day security vulnerability affecting most iPhones https://techcrunch.com/2022/12/13/apple-zero-day-webkit-iphone/
14/12/2022 08:05:44
QRCode
archive.org
thumbnail

The iPhone security flaw was discovered by a Google unit that uncovers nation-state spyware, hacking and cyberattacks.

Apple EN 2022 security cyberattack iphone spyware
Mallox Ransomware showing signs of Increased Activity https://blog.cyble.com/2022/12/08/mallox-ransomware-showing-signs-of-increased-activity/
13/12/2022 21:04:34
QRCode
archive.org
thumbnail

“TargetCompany” is a type of ransomware that was first identified in June 2021. The researchers named it TargetCompany ransomware because it adds the targeted company name as a file extension to the encrypted files. In September 2022, researchers identified a TargetCompany ransomware variant targeting Microsoft SQL servers and adding the “Fargo” extension to the encrypted files. TargetCompany ransomware is also known to add a “Mallox” extension after encrypting the files.

cyble en 2022 mallox Ransomware analysis
State-sponsored attackers actively exploiting RCE in Citrix devices, patch ASAP! (CVE-2022-27518) https://www.helpnetsecurity.com/2022/12/13/cve-2022-27518-exploited/
13/12/2022 16:23:44
QRCode
archive.org
thumbnail

An unauthenticated RCE flaw (CVE-2022-27518) is being leveraged by APT5 to compromise Citrix ADC deployments.

helpnetsecurity 2022 CVE-2022-27518 Citrix ADC APT5 attackers
Released: Citrix ADC and Citrix Gateway (security bulletin CTX474995) security update https://www.citrix.com/blogs/2022/12/13/critical-security-update-now-available-for-citrix-adc-citrix-gateway/
13/12/2022 16:15:44
QRCode
archive.org
thumbnail

Learn about security updates for versions 12.1 (including FIPS and NDcPP) and 13.0 before 13.0-58.32 of Citrix ADC and Citrix Gateway and get fixes for both (security bulletin CTX474995).

citrix EN 2022 citrix-adc citrix-gateway netscaler netscaler-gateway ctx474995 citrix-vulnerability citrix CVE-2022-27518
Patrol and Persuade - A follow up on 110 Overseas investigation https://safeguarddefenders.com/en/blog/patrol-and-persuade-follow-110-overseas-investigation
13/12/2022 11:46:58
QRCode
archive.org

This latest release documents further extensive evidence of the establishment by local PRC Public Security authorities of at least 102 “Chinese Overseas Police Service Centers” in 53 countries around the world and how some of them have been partaking in the execution of "persuasions to return" operations. Patrol and Persuade (PDF) also documents the (silent) complicity of a number of host countries, instilling a further sense of fear into targeted communities and severely undermining the international rules-based order .

safeguarddefenders EN 2022 PRC operations Chinese Overseas Police Service Centers
page 207 / 251
5001 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn