Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 207 / 238
ZINC weaponizing open-source software https://www.microsoft.com/security/blog/2022/09/29/zinc-weaponizing-open-source-software/
29/09/2022 18:15:19
QRCode
archive.org
thumbnail

In recent months, Microsoft detected weaponization of legitimate open-source software by an actor the Microsoft Threat Intelligence Center (MSTIC) tracks as ZINC, targeting employees at media, defense and aerospace, and IT service provider organizations in the US, UK, India, and Russia.

microsoft EN 2022 ZINC open-source software MSTIC aerospace weaponizing
Lindy Cameron at Chatham House security and defence conference 2022 https://www.ncsc.gov.uk/speech/lindy-cameron-chatham-house-security-and-defence-conference-2022
29/09/2022 16:08:53
QRCode
archive.org
thumbnail

The National Cyber Security Centre’s CEO Lindy Cameron delivered a keynote speech at the Chatham House security and defence conference 2022.

Lindy Cameron discussed the cyber dimension of the Russia-Ukraine conflict, focusing on what the NCSC has observed and the UK’s response.

ncsc UK EN 2022 Russia-Ukraine-war cyber warfare
BumbleBee: Round Two https://thedfirreport.com/2022/09/26/bumblebee-round-two/
28/09/2022 15:29:52
QRCode
archive.org
thumbnail

In this intrusion from May 2022, the threat actors used BumbleBee as the initial access vector. BumbleBee has been identified as an initial access vector utilized by several ransomware affiliates. …

thedfirreport EN 2022 BumbleBee ransomware RDP IoCs
NullMixer drops Redline Stealer, SmokeLoader and other malware | Securelist https://securelist.com/nullmixer-oodles-of-trojans-in-a-single-dropper/107498/
28/09/2022 15:28:47
QRCode
archive.org
thumbnail

NullMixer is a dropper delivering a number of Trojans, such as RedLine Stealer, SmokeLoader, Satacom, and others.

securelist EN 2022 NullMixer dropper Malware Malware-Descriptions Malware-Technologies Trojan Trojan-Dropper Trojan-stealer
MAR-10400779-1.v1 – Zimbra 1 https://www.cisa.gov/uscert/ncas/analysis-reports/ar22-270a
28/09/2022 15:27:59
QRCode
archive.org

CISA received seven files for analysis. Six Java Server Pages (JSP) webshells and a Bourne Again SHell (bash) file. Five JSP webshell files are designed to parse inbound requests for commands for execution, download files, and upload files. One JSP webshell file contains a form with input fields that prompts the attacker to enter the command in the input box and click "run" to execute. The command output will be displayed in a JSP page. The bash file is designed to perform ldapsearch queries and store the output into a newly created directory.

uscert csirt cert EN 2022 Malware Analysis Report AR22-270A Zimbra
Lazarus ‘Operation In(ter)ception’ Targets macOS Users Dreaming of Jobs in Crypto https://www.sentinelone.com/blog/lazarus-operation-interception-targets-macos-users-dreaming-of-jobs-in-crypto/
28/09/2022 15:24:54
QRCode
archive.org
thumbnail

First Coinbase, now Crypto.com. Lazarus campaign targets more crypto exchange platform job seekers with multi-stage malware.

sentinelone EN 2022 Lazarus Lazarus-Group crypto macOS operation APT38
Slack’s and Teams’ Lax App Security Raises Alarms https://www.wired.com/story/slack-microsoft-teams-app-security/
27/09/2022 07:51:57
QRCode
archive.org
thumbnail

New research shows how third-party apps could be exploited to infiltrate these sensitive workplace tools.

wired EN 2022 Microsoft Teams Slack third-party app research
Poseidon’s Offspring: Charybdis and Scylla https://www.humansecurity.com/learn/blog/poseidons-offspring-charybdis-and-scylla
26/09/2022 11:10:59
QRCode
archive.org
thumbnail

HUMAN's Satori Threat Intelligence and Research Team uncovered a network of 89 Android and iOS apps committing various flavors of ad fraud.

humansecurity EN 2022 Android iOS ad-fraud Charybdis Scylla
In the footsteps of the Fancy Bear: PowerPoint mouse-over event abused to deliver Graphite implants https://blog.cluster25.duskrise.com/2022/09/23/in-the-footsteps-of-the-fancy-bear-powerpoint-graphite/
26/09/2022 11:08:02
QRCode
archive.org
thumbnail

Analysis of APT28/Fancy Bear PowerPoint mouse-over campaign

cluster25 2022 EN APT28 IoCs FancyBear PowerPoint campaign mouse-over Analysis
GRU: Rise of the (Telegram) MinIOns https://www.mandiant.com/resources/blog/gru-rise-telegram-minions
26/09/2022 10:52:59
QRCode
archive.org
thumbnail

Multiple self-proclaimed hacktivist groups are conducting attacks in support of Russian interests.

Mandiant EN 2022 Telegram GRU Russia-Ukraine-war hacktivist Russia Analysis GRU
BitBucket Server and Data Center at risk via Command Injection Vulnerability https://blog.cyble.com/2022/09/22/bitbucket-server-and-data-center-at-risk-via-command-injection-vulnerability/
26/09/2022 10:04:22
QRCode
archive.org
thumbnail

Cyble analyzes CVE-2022-36804 affecting Atlassian Bitbucket and how Threat Actors may exploit this in the near future.

cyble EN 2022 BitBucket Atlassian CVE-2022-26134 CVE-2022-26138
Resolved RCE in Sophos Firewall (CVE-2022-3236) https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce
26/09/2022 10:02:12
QRCode
archive.org
thumbnail

A code injection vulnerability allowing remote code execution was discovered in the User Portal and Webadmin of Sophos Firewall. The vulnerability has been fixed.

sophos EN RCE firewall CVE-2022-3236 injection Webadmin
New Malware Campaign Targets Zoom Users https://blog.cyble.com/2022/09/19/new-malware-campaign-targets-zoom-users/
26/09/2022 09:49:59
QRCode
archive.org
thumbnail

Cyble Research and Intelligence Labs analyzes a new malware campaign targeting Zoom users.

cyble EN 2022 Malware Zoom Vidar Stealer
2K Games' Support System Hacked https://thecyberexpress.com/2k-games-support-system-hacked/
26/09/2022 09:46:50
QRCode
archive.org
thumbnail

2K Games Support System was hacked by an unknown hacker group targeting gamers via a fake user ticketing system.

thecyberexpress EN 2022 RedLine stealer 2K-Games gamers
Microsoft Issues Out-of-Band Patch for Flaw Allowing Lateral Movement, Ransomware Attacks https://www.securityweek.com/microsoft-issues-out-band-patch-flaw-allowing-lateral-movement-ransomware-attacks
25/09/2022 18:08:50
QRCode
archive.org

Microsoft this week released an out-of-band security update for its Endpoint Configuration Manager solution to patch a vulnerability that could be useful to malicious actors for moving around in a targeted organization’s network.

The vulnerability is tracked as CVE-2022-37972 and it has been described by Microsoft as a medium-severity spoofing issue. The tech giant has credited Brandon Colley of Trimarc Security for reporting the flaw.

Microsoft EN 2022 CVE-2022-37972 Endpoint-Configuration-Manager patch vulnerability
Unpatched 15-year old Python bug allows code execution in 350k projects https://www.bleepingcomputer.com/news/security/unpatched-15-year-old-python-bug-allows-code-execution-in-350k-projects/
25/09/2022 12:01:06
QRCode
archive.org
thumbnail

A vulnerability in the Python programming language that has been overlooked for 15 years is now back in the spotlight as it likely affects more than 350,000 open-source repositories and can lead to code execution.

bleepingcomputer Code-Execution Path-Traversal Python Vulnerability CVE-2007-4559
Tarfile: Exploiting the World With a 15-Year-Old Vulnerability https://www.trellix.com/en-us/about/newsroom/stories/research/tarfile-exploiting-the-world.html
25/09/2022 12:00:13
QRCode
archive.org
thumbnail

Trellix Advanced Research Center stumbled across a vulnerability in Python’s tarfile module. As we dug into the issue, we realized this was in fact CVE-2007-4559. The vulnerability is a path traversal attack in the extract and extractall functions in the tarfile module that allow an attacker to overwrite arbitrary files by adding the “..” sequence to filenames in a TAR archive. Over the course of our research into the impact of this vulnerability we discovered that hundreds of thousands of repositories were vulnerable to this vulnerability. While the vulnerability was originally only marked as a 6.8, we were able to confirm that in most cases an attacker can gain code execution from the file write.

trellix EN 2022 CVE-2007-4559 tarfile Python vulnerability
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/noberus-blackcat-ransomware-ttps
24/09/2022 10:56:44
QRCode
archive.org
thumbnail

New version of Exmatter, and Eamfo malware, used by attackers deploying the Rust-based ransomware.

symantec-enterprise-blogs EN 2022 Noberus Ransomware BlackMatter rust Darkside Exmatter Eamfo ransomware-as-a-service
Malicious OAuth applications abuse cloud email services to spread spam https://www.microsoft.com/security/blog/2022/09/22/malicious-oauth-applications-used-to-compromise-email-servers-and-spread-spam/
24/09/2022 00:50:46
QRCode
archive.org
thumbnail

Microsoft discovered an attack where attackers installed a malicious OAuth application in compromised tenants and used their Exchange Online service to launch spam runs.

microsoft EN 2022 Exchange OAuth abuse spam Exchange attack
Void Balaur | The Sprawling Infrastructure of a Careless Mercenary https://www.sentinelone.com/labs/the-sprawling-infrastructure-of-a-careless-mercenary/
23/09/2022 23:03:15
QRCode
archive.org
thumbnail

The Void Balaur cyber mercenary group has thrived throughout 2022, attacking targets on a global scale with new phishing campaigns.

sentinelone EN 2022 mercenary Void-Balaur phishing hack-for-hire
page 207 / 238
4760 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio