Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 212 / 239
Revealing Europe's NSO https://www.lighthousereports.nl/investigation/revealing-europes-nso/
28/08/2022 12:45:41
QRCode
archive.org
thumbnail

An Italian surveillance company is tracking people all over the world on a grand scale on behalf of its clients – including in countries with a recent history of corruption and human rights abuses. Its powerful spyware was recently found in Kazakhstan and Romania. Europe’s parliamentarians voice growing concern about an out-of-control surveillance industry and call for it to be regulated.

lighthousereports EN 2022 Investigation Tykelab Hermit spyware
IAM Whoever I Say IAM :: Infiltrating VMWare Workspace ONE Access Using a 0-Click Exploit https://srcincite.io/blog/2022/08/11/i-am-whoever-i-say-i-am-infiltrating-vmware-workspace-one-access-using-a-0-click-exploit.html
27/08/2022 15:57:56
QRCode
archive.org

On March 2nd, I reported several security vulnerabilities to VMWare impacting their Identity Access Management (IAM) solution. In this blog post I will discu...

srcincite EN 2022 0-Click VMWare IAM WorkspaceOne vulnerabilities
An interview with initial access broker Wazawaka: 'There is no such money anywhere as there is in ransomware https://therecord.media/an-interview-with-initial-access-broker-wazawaka-there-is-no-such-money-anywhere-as-there-is-in-ransomware/
27/08/2022 15:56:49
QRCode
archive.org
thumbnail

Editor’s Note: Last April, a ransomware group threatened to expose police informants and other sensitive information if the Washington, D.C. Metropolitan Police Department did not pay a demand.

The brazen attack was the work of a gang known as Babuk, which in early 2021 gained a reputation for posting stolen databases on its website from victims that refused to pay a ransom. Just days after it tried to extort the Metropolitan Police Department, Babuk announced it was closing its ransomware affiliate program, and would focus on data theft and extortion instead.

therecord EN 2022 Wazawaka Babuk interview ransomware criminal
Linux Kernel Exploit (CVE-2022-32250) with mqueue https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/
26/08/2022 09:57:02
QRCode
archive.org
thumbnail

Netfilter is a framework in the Linux kernel for implementing various networking-related tasks with user-defined handlers. Netfilter provides various functions for packet filtering, network address translation and port translation, and packet logging. Netfilter represents a set of hooks that allow other kernel modules to register callback functions in the kernel’s networking stack.

theori EN 2022 exploit Linux mqueue CVE-2022-32250 Kernel
Roasting 0ktapus: The phishing campaign going after Okta identity credentials https://blog.group-ib.com/0ktapus
25/08/2022 16:57:14
QRCode
archive.org
thumbnail

Over 130 organizations have been compromised in a sophisticated attack using simple phishing kits

group-ib EN 2022 phishing Okta 0ktapus identity campaign
Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks - Microsoft Security Blog https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/
25/08/2022 14:34:56
QRCode
archive.org
thumbnail

Threat actors evade detection by adopting the Sliver command-and-control (C2) framework in intrusion campaigns.

microsoft EN 2022 Sliver C2 framework command-and-control threat-actor
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone https://www.microsoft.com/security/blog/2022/08/24/magicweb-nobeliums-post-compromise-trick-to-authenticate-as-anyone/
24/08/2022 19:56:03
QRCode
archive.org
thumbnail

Microsoft security researchers have discovered a post-compromise capability we’re calling MagicWeb, which is used by a threat actor we track as NOBELIUM to maintain persistent access to compromised environments.

Microsoft MagicWeb EN 2022 NOBELIUM APT29 CozyBear
Legitimate SaaS Platforms Being Used to Host Phishing Attacks https://unit42.paloaltonetworks.com/platform-abuse-phishing/
24/08/2022 15:56:47
QRCode
archive.org
thumbnail

Platform-abuse phishing is on the rise. We analyze how attackers use services such as website builders to host phishing pages.

unit42 paloaltonetworks EN 2022 phishing attack SaaS abuse website-builders
XCSSET Malware Update | macOS Threat Actors Prepare for Life Without Python https://www.sentinelone.com/blog/xcsset-malware-update-macos-threat-actors-prepare-for-life-without-python/
23/08/2022 18:06:06
QRCode
archive.org
thumbnail

New domains and new behavioral indicators, but malware authors stick to tried and tested architecture despite Apple’s updates.

sentinelone EN 2022 XCSSET macOS Threat
Vulnerability in Linux containers – investigation and mitigation https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
23/08/2022 16:35:39
QRCode
archive.org
thumbnail

Operating system access controls, that constrain which programs can open which files, have existed for almost as long as computers themselves. Access controls are still widely used and are more flexible and efficient when compared to cryptographically protecting files. Despite the long history, ther

benthamsgaze EN 2022 constrain Linux containers investigation Access controls
Break me out of sandbox in old pipe - CVE-2022-22715 Windows Dirty Pipe https://whereisk0shl.top/post/break-me-out-of-sandbox-in-old-pipe-cve-2022-22715-windows-dirty-pipe
23/08/2022 11:23:05
QRCode
archive.org

In February 2022, Microsoft patched the vulnerability I used in TianfuCup 2021 for escaping Adobe Reader sandbox, assigned CVE-2022-22715. The vulnerability existed in Named Pipe File System nearly 10 years since the AppContainer was born. We called it "Windows Dirty Pipe".
In this article, I will share the root cause and exploitation of Windows Dirty Pipe. So let's start our journey.

whereisk0shl EN 2022 CVE-2022-22715 Windows Dirty-Pipe PoC ANALYSIS
A Dad Took Photos of His Naked Toddler for the Doctor. Google Flagged Him as a Criminal. https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html
22/08/2022 14:27:13
QRCode
archive.org

Google has an automated tool to detect abusive images of children. But the system can get it wrong, and the consequences are serious.

nytimes EN 2022 CSAM scan Photos Naked Toddler Google children Criminal
THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control https://www.cybereason.com/blog/threat-analysis-report-bumblebee-loader-the-high-road-to-enterprise-domain-control
22/08/2022 14:23:16
QRCode
archive.org
thumbnail

Cybereason GSOC observed distribution of the Bumblebee Loader and post-exploitation activities including privilege escalation, reconnaissance and credential theft. Bumblebee operators use the Cobalt Strike framework throughout the attack and abuse credentials for privilege escalation to access Active Directory, as well as abusing a domain administrator account to move laterally, create local user accounts and exfiltrate data...

cybereason EN 2022 THREAT ANALYSIS REPORT Bumblebee Loader CobaltStrike
Ransomware Group Claims Access to SCADA in Confusing UK Water Company Hack https://www.securityweek.com/ransomware-group-claims-access-scada-confusing-uk-water-company-hack
21/08/2022 19:20:29
QRCode
archive.org

A ransomware group has hit at least one water company in the United Kingdom, but there is some confusion over whose systems were actually breached.

securityweek EN 2022 Cl0p ransomware SCADA UK water-company HMI ICS Thames South-Staffordshire
Fake DDoS Pages On WordPress Sites Lead to Drive-By-Downloads https://blog.sucuri.net/2022/08/fake-ddos-pages-on-wordpress-lead-to-drive-by-downloads.html
21/08/2022 10:37:25
QRCode
archive.org
thumbnail

We reveal how hackers have begun leveraging fake DDoS protection pages to trick users into downloading remote access trojans (RATs) onto their computers.

sucuri EN 2022 fake DDoS protection lure Wordpress RAT
Lloyd’s to Exclude Catastrophic Nation-Backed Cyberattacks From Insurance Coverage https://www.wsj.com/articles/lloyds-to-exclude-catastrophic-nation-backed-cyberattacks-from-insurance-coverage-11660861586
20/08/2022 17:31:26
QRCode
archive.org
thumbnail

Lloyd’s of London will require its insurer groups globally to exclude catastrophic state-backed hacks from stand-alone cyber insurance policies starting next year.

wsj EN 2022 Insurance Lloyd Exclude Catastrophic Nation-Backed Cyberattacks cyber-insurance
CVE-2022-27925 https://attackerkb.com/topics/dSu4KGZiFd/cve-2022-27925/rapid7-analysis
20/08/2022 17:29:04
QRCode
archive.org
thumbnail

On May 10, 2022, Zimbra released versions 9.0.0 patch 24 and 8.8.15 patch 31 to address multiple vulnerabilities in Zimbra Collaboration Suite, including CVE-2…

AttackerKB Analysis CVE-2022-27925 EN 2022 Zimbra
Google And Cloudflare Are Changing The Trust Infrastructure of the Internet: A Long Goodbye to RSA and a Hello to ECC and ECDSA https://medium.com/asecuritysite-when-bob-met-alice/google-and-cloudflare-are-changing-the-trust-infrastructure-of-the-internet-a-long-goodbye-to-rsa-74982d37949c
20/08/2022 10:16:06
QRCode
archive.org
thumbnail

The RSA method was created by Rivest, Shamir and Adleman in 1978, and it is still used to encrypt and sign for data. The core of trust on the Internet is the usage of PKI, and where Web sites have a…

asecuritysite-when-bob-met-alice Médium EN RSA PKI ECDSA ECC Clouflare Google Buchanan
New macOS malware 'CloudMensis' detected and prevented https://www.jamf.com/blog/cloudmensis-malware/
20/08/2022 10:14:05
QRCode
archive.org
thumbnail

Jamf Threat Labs updates Jamf Protect to completely prevent CloudMensis from threatening the security of your macOS fleet.

jamf EN jamfprotect IoC jamf-protect CloudMensis macos
Mēris botnet, climbing to the record https://blog.qrator.net/en/meris-botnet-climbing-to-the-record_142/
19/08/2022 11:21:23
QRCode
archive.org

End of June 2021, Qrator Labs started to see signs of a new assaulting force on the Internet – a botnet of a new kind. That is a joint research we conducted together with Yandex to elaborate on the specifics of the DDoS attacks enabler emerging in almost real-time.

qrator EN 2021 DDoS botnet Analysis
page 212 / 239
4762 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio