Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 209 / 220
4392 résultats taggé EN  ✕
Researchers devise iPhone malware that runs even when device is turned off https://arstechnica.com/information-technology/2022/05/researchers-devise-iphone-malware-that-runs-even-when-device-is-turned-off/
18/05/2022 14:59:49
QRCode
archive.org
thumbnail

Research is largely theoretical but exposes an overlooked security issue.

arstechnica EN 2022 iPhone study malware Bluetooth Darmstadt university
CVE-2022-22675: AppleAVD Overflow in AVC_RBSP::parseHRD | 0-days In-the-Wild https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2022/CVE-2022-22675.html
17/05/2022 16:35:10
QRCode
archive.org

Information about 0-days exploited in-the-wild!

CVE-2022-22675 googleprojectzero EN 2022 0-days iOS macOS
Multi-factor Authentication to Generate $27 Billion Globally for Mobile Operators in 2022, Juniper Research Study Finds https://www.businesswire.com/news/home/20220509005459/en/Juniper-Research-Multi-factor-Authentication-to-Generate-27-Billion-Globally-for-Mobile-Operators-in-2022-Juniper-Research-Study-Finds
17/05/2022 09:49:11
QRCode
archive.org
thumbnail

A new study by Juniper Research has found operators will generate $27 billion from the termination of SMS messages related to multi-factor authentication in 2022; an increase from $25 billion in 2021. The research predicts this 5% growth will be driven by increased pressure on digital service providers to offer secure authentication that reduces risk of data breaches and protects user identity. Multi-factor authentication combines multiple credentials to verify a user or transaction. This includes sending an SMS that contains a one‑time password or code to a user’s unique phone number.

businesswire Juniper EN 2022 Multi-factor MFA SMS Research Study Authentication Mobile
Web ad firms scrape email addresses before you know it https://www.theregister.com/2022/05/16/ad_companies_data/
17/05/2022 07:51:33
QRCode
archive.org
thumbnail

Tracking, marketing, and analytics firms have been exfiltrating the email addresses of internet users from web forms prior to submission and without user consent, according to security researchers.

theregister 2022 EN scrape email analytics marketing Tracking privacy exfiltrating research
Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission https://www.usenix.org/conference/usenixsecurity22/presentation/senol
17/05/2022 07:49:07
QRCode
archive.org

Web users enter their email addresses into online forms for a variety of reasons, including signing in or signing up for a service or subscribing to a newsletter. While enabling such functionality, email addresses typed into forms can also be collected by third-party scripts even when users change their minds and leave the site without submitting the form.

usenix form EN 2022 exfiltration submission Study form privacy
US links Thanos and Jigsaw ransomware to 55-year-old doctor https://www.bleepingcomputer.com/news/security/us-links-thanos-and-jigsaw-ransomware-to-55-year-old-doctor/
16/05/2022 22:50:59
QRCode
archive.org
thumbnail

The US Department of Justice today said that Moises Luis Zagala Gonzalez (Zagala), a 55-year-old cardiologist with French and Venezuelan citizenship residing in Ciudad Bolivar, Venezuela, created and rented Jigsaw and Thanos ransomware to cybercriminals.

bleepingcomputer EN 2022 Department-of-Justice DOJ Thanos Jigsaw Ransomware Thanos USA Venezuela
A closer look at Eternity Malware https://blog.cyble.com/2022/05/12/a-closer-look-at-eternity-malware/
16/05/2022 12:00:29
QRCode
archive.org
thumbnail

In this analysis, Cyble looks at the Eternity Malware suite, listing a wide variety of malware for sale on Telegram.

Cyble 2022 EN 2022 Eternity Malware Telegram analysis
EU lands new law to fight off hackers in critical sectors https://www.politico.eu/article/eu-lands-new-law-to-fight-off-hackers-in-critical-sectors/
14/05/2022 09:38:51
QRCode
archive.org
thumbnail

Rules for industries and governments aim to prevent all-out cyber breakdown.

Politico EN 2022 EU directive 5G Bart-Groothuis Communications Critical-infrastructure Cyber-Espionage Cybercrime Cybersecurity Data-flows Digital-Industry Eva-Maydell Hackers Internet-of-Things Network-security Privacy Supply-chain-security Telecoms Telecoms-Infrastructure
The Linux Foundation and Open Source Software Security Foundation (OpenSSF) Gather Industry and Government Leaders for Open Source Software Security Summit II https://www.prnewswire.com/news-releases/the-linux-foundation-and-open-source-software-security-foundation-openssf-gather-industry-and-government-leaders-for-open-source-software-security-summit-ii-301546671.html
14/05/2022 09:36:41
QRCode
archive.org
thumbnail

The Linux Foundation and the Open Source Software Security Foundation (OpenSSF) brought together over 90 executives from 37 companies and...

The-Linux-Foundation opensource 2022 EN Security
Analyzing a Pirrit adware installer https://forensicitguy.github.io/analyzing-pirrit-adware-installer/
14/05/2022 09:33:03
QRCode
archive.org

While Windows holds the largest market share on malware, macOS has its fair share of threats that mostly exist in an adware/grayware area. In this post I want to walk through how a Pirrit PKG file installer works. There are lots of more complex threats, but this is a good place to start if you’re just jumping into analysis. If you want to follow along at home, I’m working with this file in MalwareBazaar: https://bazaar.abuse.ch/sample/d39426dbceb54bba51587242f8101184df43cc23af7dc7b364ca2327e28e7825/.

forensicitguy EN Analysis pirrit macOS malware walkthough PKG adware
Known macOS Vulnerabilities Led Researcher to Root Out New Flaws https://www.darkreading.com/endpoint/known-macos-vulnerabilities-led-researcher-to-root-out-new-flaws
12/05/2022 23:27:36
QRCode
archive.org
thumbnail

Researcher shares how he unearthed newer bugs in Apple's operating system by closer scrutiny of previous research, including vulnerabilities that came out of the Pwn2Own competition.

darkreading macOS EN 2022 bugs Apple vulnerabilities Fitzl XCSSET
Russia hacked an American satellite company one hour before the Ukraine invasion https://www.technologyreview.com/2022/05/10/1051973/russia-hack-viasat-satellite-ukraine-invasion
11/05/2022 14:08:50
QRCode
archive.org
thumbnail

The attack on Viasat showcases cyber’s emerging role in modern warfare.

technologyreview EN 2022 cyberwar russia-ukraine-war Viasat satellite warfare
npm Supply Chain Attack Targeting Germany-Based Companies https://jfrog.com/blog/npm-supply-chain-attack-targets-german-based-companies/
11/05/2022 11:32:33
QRCode
archive.org
thumbnail

The JFrog Security Research team identified and quickly disclosed new npm malicious packages aimed at compromising leading industrial organizations

jfrog 2022 EN Supply Chain supplychain industrial npm attack research
Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/
11/05/2022 11:25:36
QRCode
archive.org
thumbnail

Microsoft coined the term “human-operated ransomware” to clearly define a class of attack driven by expert humane intelligence at every step of the attack chain and culminate in intentional business disruption and extortion. In this blog, we explain the ransomware-as-a-service affiliate model and disambiguate between the attacker tools and the various threat actors at play during a security incident.

microsoft ransomware Ransomware-as-a-service EN 2022 affiliate
Costa Rica declares national emergency after Conti ransomware attacks https://www.bleepingcomputer.com/news/security/costa-rica-declares-national-emergency-after-conti-ransomware-attacks/
10/05/2022 19:48:37
QRCode
archive.org
thumbnail

The Costa Rican President Rodrigo Chaves has declared a national emergency following cyber attacks from Conti ransomware group on multiple government bodies.

BleepingComputer also observed Conti published most of the 672 GB dump that appears to contain data belonging to the Costa Rican government agencies.

The declaration was signed into law by Chaves on Sunday, May 8th, same day as the economist and former Minister of Finance effectively became the country's 49th and current president.

bleepingcomputer EN 2022 Conti ransomware leak Costarica emergency
Dissecting Saintstealer https://blog.cyble.com/2022/04/27/dissecting-saintstealer/
10/05/2022 15:09:32
QRCode
archive.org
thumbnail

Cyble Analyzes Saintstealer, an infostealer using a C&C server with known links to other popular infostealers.

Cyble 2022 EN Saintstealer infostealer
Russian TVs, search engines hacked on Victory Day with antiwar message https://www.washingtonpost.com/world/2022/05/09/russia-tv-hack-victory-day-ukraine-war/
10/05/2022 13:27:46
QRCode
archive.org
thumbnail

Russians using smart TVs reported seeing something atypical: A message appeared instead of the usual listing of channels. “The blood of thousands of Ukrainians and hundreds of murdered children is on your hands,” read the message that took over their screens. “TV and the authorities are lying. No to war.”

washingtonpost 2022 EN russian TV hacked smart
Apple, Google, and Microsoft commit to expanded support for FIDO standard https://www.apple.com/newsroom/2022/05/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard/
10/05/2022 09:56:44
QRCode
archive.org
thumbnail

Faster, easier, and more secure sign-ins will be available to consumers across leading devices and platforms.

Apple newsroom EN 2022 FIDO standard
Vulnerability Analysis - CVE-2022-1388 https://www.randori.com/blog/vulnerability-analysis-cve-2022-1388/
09/05/2022 19:01:08
QRCode
archive.org
thumbnail

CVE-2022-1388 is a critical vulnerability (CVSS 9.8) in the management interface of F5 Networks’ BIG-IP solution that enables an unauthenticated attacker to gain remote code execution on the system through bypassing F5’s iControl REST authentication. The vulnerability was first discovered by F5’s internal product security team and disclosed publicly on May 4, 2022.

CVE-2022-1388 randori EN 2022 critical vulnerability F5 BIG-IP RCE
From the Front Lines | Unsigned macOS oRAT Malware Gambles For The Win https://www.sentinelone.com/blog/from-the-front-lines-unsigned-macos-orat-malware-gambles-for-the-win/
09/05/2022 18:58:30
QRCode
archive.org
thumbnail

Researchers looking into a new APT group targeting gambling sites with a variety of cross-platform malware recently identified a version of oRAT malware targeting macOS users and written in Go. While neither RATs nor Go malware are uncommon on any platform, including the Mac, the development of such a tool by a previously unknown APT is an interesting turn, signifying the increasing need for threat actors to address the rising occurrence of Macs among their intended targets and victims. In this post, we dig deeper into the technical details of this novel RAT to understand better how it works and how security teams can detect it in their environments.

SentinelOne EN 2022 macos oRat Go APT RAT
page 209 / 220
5002 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn