Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 209 / 251
Le renseignement espagnol muet sur le scandale du logiciel espion Pegasus https://fr.euronews.com/my-europe/2022/11/29/le-renseignement-espagnol-muet-sur-le-scandale-du-logiciel-espion-pegasus
06/12/2022 10:43:36
QRCode
archive.org
thumbnail

Auditionnée par le Parlement européen, la directrice du Centre national espagnol s’est contentée de rappeler le cadre juridique, selon les eurodéputés.

euronews FR 2022 Espagne Parlement-européen Pegasus spyware
Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems https://thehackernews.com/2022/12/critical-ping-vulnerability-allows.html
06/12/2022 08:35:38
QRCode
archive.org
thumbnail

he maintainers of the FreeBSD operating system have released updates to remediate a security vulnerability impacting the ping module that could be potentially exploited to crash the program or trigger remote code execution.

The issue, assigned the identifier CVE-2022-23093, impacts all supported versions of FreeBSD and concerns a stack-based buffer overflow vulnerability in the ping service.

thehackernews EN 2022 Ping Vulnerability FreeBSD CVE-2022-23093
Winbiz change d’hébergeur: des milliers de clients toujours sans accès à leur comptabilité | ICTjournal https://www.ictjournal.ch/articles/2022-12-05/winbiz-change-dhebergeur-des-milliers-de-clients-toujours-sans-acces-a-leur
06/12/2022 08:12:46
QRCode
archive.org
thumbnail

Deux semaines après la cyberattaque dont a été victime son hébergeur Infopro, Winbiz n’a pas complètement rétabli l’accès à son logiciel cloud

ictjournal FR 2022 CH Winbiz infopro victime hébergeur
Blowing Cobalt Strike Out of the Water With Memory Analysis https://unit42.paloaltonetworks.com/cobalt-strike-memory-analysis/
06/12/2022 06:51:47
QRCode
archive.org
thumbnail

Unit 42 researchers examine several malware samples that incorporate Cobalt Strike components, and discuss some of the ways that we catch these samples by analyzing artifacts from the deltas in process memory at key points of execution. We will also discuss the evasion tactics used by these threats, and other issues that make their analysis problematic.

unit42 EN 2022 CobaltStrike analysis paloaltonetworks
Suspected Iran-Nexus TAG-56 Uses UAE Forum Lure for Credential Theft Against US Think Tank https://www.recordedfuture.com/suspected-iran-nexus-tag-56-uses-uae-forum-lure-for-credential-theft-against-us-think-tank
06/12/2022 06:50:40
QRCode
archive.org
thumbnail
W4SP continues to nest in PyPI: Same supply chain attack, different distribution method https://develop.secure.software/w4sp-continues-to-nest-in-pypi-same-supply-chain-attack-different-distribution-method
05/12/2022 12:13:20
QRCode
archive.org
thumbnail

Here's ReversingLabs' discoveries and indicators of compromise (IOCs) for W4SP, as well as links to our YARA rule that can be used to detect the malicious Python packages in your environment. 

develop.secure.software EN 2022 W4SP YARA Python PyPI
Post-quantum cryptography: What is Emmanuel Macron talking about? https://www.lemonde.fr/en/pixels/article/2022/12/04/post-quantum-cryptography-what-is-emmanuel-macron-talking-about_6006537_13.html
05/12/2022 11:56:38
QRCode
archive.org
thumbnail

The President of the Republic announced the sending of the 'first diplomatic telegram encrypted using post-quantum cryptography' to the French embassy in Washington. We explain its importance for the future of confidential communications.

lemonde EN 2022 cryptography Macron post-quantum cryptography
Purpose Built Proxy Services and the Malicious Activity They Enable https://www.domaintools.com/resources/blog/purpose-built-criminal-proxy-services-and-the-malicious-activity-they-enable/
05/12/2022 11:33:44
QRCode
archive.org
thumbnail

As demand for malicious proxy services continues, new players have entered the market. Black Proxies is marketed to other cybercriminals for their reliability, scope, and overwhelming number of IP addresses.

domaintools EN 2022 proxy black-proxies cybercriminals Services
CVE-2022-21661: Exposing Database Info via WordPress SQL Injection https://www.zerodayinitiative.com/blog/2022/1/18/cve-2021-21661-exposing-database-info-via-wordpress-sql-injection
05/12/2022 11:31:28
QRCode
archive.org
thumbnail

In October of this year, we received a report from ngocnb and khuyenn from GiaoHangTietKiem JSC covering a SQL injection vulnerability in WordPress. The bug could allow an attacker to expose data stored in a connected database. This vulnerability was recently addressed as CVE-2022-21661 ( ZDI-22-020

zerodayinitiative EN 2022 CVE-2022-21661 SQL-injection vulnerability WordPress
Connected medical devices are the Achilles' heel of healthcare orgs - Help Net Security https://www.helpnetsecurity.com/2022/12/05/connected-medical-devices-cyberattacks/
05/12/2022 11:29:37
QRCode
archive.org
thumbnail

The rising adoption of connected medical devices is accelerating cyberattacks, according to Capterra’s Medical IoT Survey.

helpnetsecurity EN 2022 IoT connected medical devices statistcs healthcare Survey
Schoolyard Bully Trojan Facebook Credential Stealer - Zimperium https://www.zimperium.com/blog/schoolyard-bully-trojan-facebook-credential-stealer/
05/12/2022 11:17:24
QRCode
archive.org
thumbnail

Zimperium zLabs has discovered a new Android threat campaign, the Schoolyard Bully Trojan, which has been active since 2018 and has spread to over 300,000 victims and is specifically targeting Facebook credentials. To learn more about this new threat, read more on our blog.

zimperium EN 2022 Android Schoolyard-Bully Trojan Facebook schools
Rackspace Cloud Office suffers security breach https://doublepulsar.com/rackspace-cloud-office-suffers-security-breach-958e6c755d7f
05/12/2022 08:52:08
QRCode
archive.org

Thousands of small to medium size businesses are suffering as Rackspace have suffered a security incident on their Hosted Exchange service.

Yesterday, 2nd December 2022, Rackspace announced an outage to their Hosted Exchange Server:

doublepulsar EN 2022 Rackspace Cloud Office breach Exchange
En matière de transparence, communes et cantons sont à la traîne https://www.letemps.ch/node/1349461
05/12/2022 06:58:43
QRCode
archive.org
thumbnail

Adoptée dans la foulée de son homologue genevoise, la loi sur l’information vaudoise a fêté ses 20 ans cette année. Si la plupart des demandes émanent de citoyens, le principe de transparence reste encore méconnu

letemps CHFR transparence juridique paywall
Yvelines : cyberattaque contre l'hôpital André Mignot du centre hospitalier de Versailles https://www.lefigaro.fr/actualite-france/yvelines-cyberattaque-contre-l-hopital-andre-mignot-du-centre-hospitalier-de-versailles-20221204
04/12/2022 13:51:15
QRCode
archive.org
thumbnail

L'accueil des patients est limité et l'hôpital a déjà organisé le transfert de deux patients vers d'autres centres de soins, indique France Info.

lefigaro FR 2022 l'hôpital cyberattaque Mignot
Certpotato – using adcs to privesc from virtual and network service accounts to local system https://sensepost.com/blog/2022/certpotato-using-adcs-to-privesc-from-virtual-and-network-service-accounts-to-local-system/
04/12/2022 11:22:09
QRCode
archive.org

The goal of this blog post is to present a privilege escalation I found while working on ADCS. We will see how it is possible to elevate our privileges to NT AUTHORITY\SYSTEM from virtual and network service accounts of a domain-joined machine (for example from a webshell on a Windows server) using ADCS. I want to call this attack chain “CertPotato” as homage to other *Potato tools and as a way to better remember it.

A popular technique for getting SYSTEM from a virtual or network service account is Delegate 2 Thyself by Charlie Clark. This technique involves using RBCD to elevate your privileges. In this article, I propose an alternative approach to become local SYSTEM using ADCS.

sensepost 2022 EN certpotato adcs privesc escalation
Preparing for a Russian cyber offensive against Ukraine this winter https://blogs.microsoft.com/on-the-issues/2022/12/03/preparing-russian-cyber-offensive-ukraine/
03/12/2022 20:22:37
QRCode
archive.org
thumbnail

As we report more fully below, in the wake of Russian battlefield losses to Ukraine this fall, Moscow has intensified its multi-pronged hybrid technology approach to pressure the sources of Kyiv’s military and political support, domestic and foreign. This approach has included destructive missile and cyber strikes on civilian infrastructure in Ukraine, cyberattacks on Ukrainian and now foreign-based supply chains, and cyber-enabled influence operations[1]—intended to undermine US, EU, and NATO political support for Ukraine, and to shake the confidence and determination of Ukrainian citizens.

Microsoft EN 2022 iridium russia-ukraine-war Russia cyberoffensive analysis winter
Darknet markets generate millions in revenue selling stolen personal data https://arstechnica.com/tech-policy/2022/12/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data/
03/12/2022 18:30:46
QRCode
archive.org
thumbnail

A handful of markets were responsible for trafficking most of the data.

arstechnica EN 2022 Darknet markets data stolen-data-supply-chain
Fuite de données sensibles au Département de la justice à Zurich https://www.rts.ch/info/regions/autres-cantons/13595065-fuite-de-donnees-sensibles-au-departement-de-la-justice-a-zurich.html
03/12/2022 17:46:43
QRCode
archive.org
thumbnail

Une fuite de données secoue le monde politique zurichois, à deux mois des élections cantonales. Entre 2006 et 2012, un ancien prestataire informatique du Département de la justice a omis d'effacer des données parfois sensibles sur des ordinateurs remplacés.

rts FR CH 2022 Fuite Leak Zurich prestataire justice sensibles
La cybersécurité disposera de son propre office fédéral en Suisse https://www.rts.ch/info/suisse/13594638-la-cybersecurite-disposera-de-son-propre-office-federal-en-suisse.html
03/12/2022 13:36:41
QRCode
archive.org
thumbnail

Le Centre national pour la cybersécurité (NCSC) deviendra un office fédéral à part entière, et il sera rattaché au département de la Défense. Le Conseil fédéral a précisé vendredi la nouvelle organisation.

rts CH FR NCSC Défense
The Mystery of Metador | Unpicking Mafalda’s Anti-Analysis Techniques https://www.sentinelone.com/labs/the-mystery-of-metador-unpicking-mafaldas-anti-analysis-techniques/
02/12/2022 21:17:56
QRCode
archive.org
thumbnail

Discover the anti-analysis techniques of the Mafalda implant, a unique, feature-rich backdoor used by the Metador threat actor.

SentinelOne EN 2022 Metador Mafalda Anti-Analysis Techniques
page 209 / 251
5001 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn