Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 210 / 251
Samsung, LG, Mediatek certificates compromised to sign Android malware https://www.bleepingcomputer.com/news/security/samsung-lg-mediatek-certificates-compromised-to-sign-android-malware/
02/12/2022 15:27:16
QRCode
archive.org
thumbnail

Multiple platform certificates used by Android OEM device vendors to digitally sign core system applications have also been used to sign Android apps containing malware.

bleepingcomputer 2022 Android Certificates LG Malware MediaTek Platform-Certificate Samsung
Google Online Security Blog: Memory Safe Languages in Android 13 https://security.googleblog.com/2022/12/memory-safe-languages-in-android-13.html
02/12/2022 12:45:56
QRCode
archive.org
thumbnail

As the amount of new memory-unsafe code entering Android has decreased, so too has the number of memory safety vulnerabilities. From 2019 to 2022 it has dropped from 76% down to 35% of Android’s total vulnerabilities. 2022 is the first year where memory safety vulnerabilities do not represent a majority of Android’s vulnerabilities.

Google EN 2022 memory-safe Android statistics vulnerabilities memory safety
Multiple Organisations compromised by Critical Authentication Bypass Vulnerability in Fortinet Products (CVE-2022-40684) https://blog.cyble.com/2022/11/24/multiple-organisations-compromised-by-critical-authentication-bypass-vulnerability-in-fortinet-products-cve-2022-40684/
01/12/2022 19:19:14
QRCode
archive.org
thumbnail

Cyble Global Sensor Intelligence detects exploitation attempts of CVE-2022-40684, and CRIL observes Fortinet Access distribution in cybercrime forums.

cyble EN CVE-2022-40684 Fortinet Authentication Bypass Organisations darknet
Lastpass says hackers accessed customer data in new breach https://www.bleepingcomputer.com/news/security/lastpass-says-hackers-accessed-customer-data-in-new-breach/
01/12/2022 06:55:38
QRCode
archive.org
thumbnail

LastPass says unknown attackers breached its cloud storage using information stolen during a previous security incident from August 2022.

The company added that, once in, the threat actors also managed to access customer data stored in the compromised storage service.

bleepingcomputer EN 2022 lastpass GoTo breach cloud
LockBit 3.0 ‘Black’ attacks and leaks reveal wormable capabilities and tooling https://news.sophos.com/en-us/2022/11/30/lockbit-3-0-black-attacks-and-leaks-reveal-wormable-capabilities-and-tooling/
30/11/2022 22:10:11
QRCode
archive.org
thumbnail

Reverse-engineering reveals close similarities to BlackMatter ransomware, with some improvements

sophos EN 2022 LockBit3.0 BlackMatter Reverse-engineering
CashRewindo: How to age domains for an investment scam like fine scotch https://blog.confiant.com/cashrewindo-how-to-age-domains-for-an-investment-scam-like-fine-scotch-a48d22788c84
30/11/2022 09:57:13
QRCode
archive.org

Years-old domains, compromised JS libraries and worldwide-localized content among tactics of this sophisticated attacker.

confiant EN 2022 Medium CashRewindo investment scam analysis
Play, ce nouveau ransomware utilisé contre les Alpes-Maritimes et ITS Group https://www.lemagit.fr/actualites/252527798/Play-ce-nouveau-ransomware-utilise-contre-les-Alpes-Maritimes-et-ITS-Group
29/11/2022 19:28:33
QRCode
archive.org
thumbnail

Les opérateurs de ce rançongiciel ont attendu la fin novembre pour commencer à épingler publiquement leurs victimes et à en divulguer des données. Pour autant, ils sont actifs depuis au moins fin juin.

lemagit FR 2022 play ransonware PlayCrypt
Libye: la mise en examen de la société française Amesys et l'inculpation de deux cadres, confirmées en appel https://www.rfi.fr/fr/afrique/20221125-libye-la-mise-en-examen-de-la-soci%C3%A9t%C3%A9-fran%C3%A7aise-amesys-et-l-inculpation-de-deux-cadres-confirm%C3%A9es-en-appel
27/11/2022 20:41:48
QRCode
archive.org
thumbnail

La cour d'appel de Paris a confirmé cette semaine (lundi), la mise en examen de la société française Amesys pour complicité d'actes de torture dans l'enquête sur la vente d’un programme de cybersurveillance au régime libyen de Mouammar Kadhafi. Deux des chefs de l'entreprise ont été inculpés, ce qui rend la société complice d'exactions en Libye.

rfi FR 2022 Lybie Amesys inculpation
U.S. bans sale and import of some tech from Chinese companies Huawei and ZTE https://www.npr.org/2022/11/26/1139258274/us-ban-tech-china-huawei-zte
27/11/2022 18:50:52
QRCode
archive.org
thumbnail

The five-member FCC said it has voted unanimously to adopt new rules that will block the importation or sale of certain technology products that pose security risks to U.S. critical infrastructure.

npr 2022 EN US ban China Huawei FCC block Politics infrastructure
Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms https://blog.bushidotoken.net/2022/11/detecting-and-fingerprinting.html
27/11/2022 17:18:47
QRCode
archive.org
thumbnail

Cyber threat intelligence largely involves the tracking and studying of the adversaries outside of your network. Gaining counterintelligence about your adversaries' capabilities and weaponry is one of the final building blocks for managing a strong cyber defense. In the pursuit of performing this duty, I have been studying how to discover adversary infrastructure on the internet. One good way of doing this has been via leveraging the scan data available through the popular Shodan search engine. If you've not used it before, Shodan periodically scans the entire internet and makes it available for users to query through. It is often used to monitor networks, look for vulnerabilities, and ensure the security of an organization's perimeter.

bushidotoken en 2022 shodan Infostealer Malware-as-a-Service Detecting howto
WhatsApp data leak: 500 million user records for sale https://cybernews.com/news/whatsapp-data-leak/
26/11/2022 11:29:36
QRCode
archive.org

Someone is allegedly selling up-to-date mobile phone numbers of nearly 500 million WhatsApp users. A data sample investigated by Cybernews likely confirms this to be true.

cybernews WhatsApp EN 2022 leak phone numbers
Google pushes emergency Chrome update to fix 8th zero-day in 2022 https://www.bleepingcomputer.com/news/security/google-pushes-emergency-chrome-update-to-fix-8th-zero-day-in-2022/
25/11/2022 11:29:34
QRCode
archive.org
thumbnail

Google has released an emergency security update for the desktop version of the Chrome web browser, addressing the eighth zero-day vulnerability exploited in attacks this year.

bleepingcomputer Google Google-Chrome Vulnerability Web-Browser Zero-Day patch CVE-2022-3723 CVE-2022-3075 CVE-2022-2856 CVE-2022-2294 CVE-2022-1364 CVE-2022-1096 CVE-2022-0609
Ransomware Roundup: Cryptonite Ransomware https://www.fortinet.com/blog/threat-research/Ransomware-Roundup-Cryptonite-Ransomware
24/11/2022 21:02:22
QRCode
archive.org
thumbnail

The latest FortiGuard Labs Threat Signal Ransomware Roundup covers the Cryptonite ransomware, along with protection recommendations. Read more.

fortinet EN 2022 Cryptonite Ransomware FortiGuards-Labs Threat-Research ransomware crypto-ransomware
Suisse: Une cyberattaque bloque la comptabilité de milliers de sociétés https://www.20min.ch/fr/story/des-milliers-de-pme-privees-de-logiciel-de-compta-954997709130
24/11/2022 10:22:25
QRCode
archive.org
thumbnail

Victime du piratage de son hébergeur cloud, le logiciel de gestion d'entreprise Winbiz ne peut pas être utilisé depuis lundi. Le retour à la normale prendra du temps.

20min FR CH 2022 Winbiz inforpro piratage cloud hébergeur
Des dizaines de milliers d'entreprises victimes indirectes d'une cyberattaque https://www.rts.ch/info/economie/13570369-des-dizaines-de-milliers-dentreprises-victimes-indirectes-dune-cyberattaque.html
24/11/2022 10:21:21
QRCode
archive.org
thumbnail

Plus de 45'000 PME et près d'un millier de fiduciaires suisses ne peuvent plus utiliser leur logiciel de gestion "Winbiz cloud", accessible en ligne. La faute à une attaque informatique qui a touché l'hébergeur bernois Infopro. La situation devrait perdurer jusqu'à ce week-end.

rts CH FR 2022 Winbiz fiduciaires Infopro attaque
Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice | Proofpoint US https://www.proofpoint.com/us/blog/threat-insight/nighthawk-and-coming-pentest-tool-likely-gain-threat-actor-notice
23/11/2022 22:57:25
QRCode
archive.org
thumbnail

Key Takeaways

  • Nighthawk is an advanced C2 framework intended for red team operations through commercial licensing.
  • Proofpoint researchers observed initial use of the framework in September 2022 by a likely red team.
  • We have seen no indications at this time that leaked versions of Nighthawk are being used by attributed threat actors in the wild.
  • The tool has a robust list of configurable evasion techniques that are referenced as “opsec” functions throughout its code.
    P* roofpoint researchers expect Nighthawk will show up in threat actor campaigns as the tool becomes more widely recognized or as threat actors search for new, more capable tools to use against targets.
proofpoint EN 2022 redteam tool Nighthawk C2 framework threat
ViperSoftX: Hiding in System Logs and Spreading VenomSoftX - Avast Threat Labs https://decoded.avast.io/janrubin/vipersoftx-hiding-in-system-logs-and-spreading-venomsoftx/
23/11/2022 22:48:29
QRCode
archive.org

ViperSoftX is a multi-stage stealer that exhibits interesting hiding capabilities. Other than stealing cryptocurrencies, it also spreads the VenomSoftX browser extension, which performs man-in-the-browser attacks.

avast 2022 EN ViperSoftX multi-stage stealer analysis browser extension man-in-the-browser
Nokia warns 5G security ‘breaches are the rule, not the exception’ https://www.cybersecuritydive.com/news/5g-security-breaches/636693/
23/11/2022 10:44:17
QRCode
archive.org
thumbnail

A majority of 5G network operators experienced up to six cyber incidents in the past year. Defenses are especially lacking for ransomware and phishing attacks.

cybersecuritydive network report Nokia 5G Breaches breaches Cyberattacks cyberattacks
Android SharkBot Droppers on Google Play Underline Platform's Security Needs https://www.bitdefender.com/blog/labs/android-sharkbot-droppers-on-google-play-underlines-platforms-security-needs/
22/11/2022 21:24:35
QRCode
archive.org
thumbnail

A common theme we've noticed in the last few months consists of malicious apps
distributed directly from the Google Play Store.

bitdefender EN 2022 SharkBot Android GooglePlay malicious apps
Why would you want to hack Electric Vehicle Charging Stations? https://blog.lukaszolejnik.com/why-would-you-want-to-hack-electric-vehicle-charging-stations/
22/11/2022 21:17:08
QRCode
archive.org
thumbnail

A Russian zero-day exploit purchase site is interested in tools for hacking of Electric Vehicle Charging Stations. This raises a number of questions. Why would anybody want to hack such targets? Also, why would Russian entities (in particular) be interested in such targets? The best answer to these is “good question!”, and let's put politics aside. Let’s explore the potential cybersecurity risks of electric vehicle charging station, assuming the ability of compromising them at a scale, having some kind of tools. It turns out that this is a fascinating security problem!

lukaszolejnik EN 2022 cyber-risk cyberwarfare security 0-day Vehicle Charging Stations
page 210 / 251
5001 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn