Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 215 / 220
4393 résultats taggé EN  ✕
Samsung confirms hackers stole Galaxy devices source code https://www.bleepingcomputer.com/news/security/samsung-confirms-hackers-stole-galaxy-devices-source-code/
07/03/2022 17:47:33
QRCode
archive.org
thumbnail

Samsung Electronics confirmed on Monday that its network was breached and the hackers stole confidential information, including source code present in Galaxy smartphones.

bleepingcomputer Lapsus$ Samsung Galaxy EN 2022 confidential DataBreach sourcecode
The Dirty Pipe Vulnerability — The Dirty Pipe Vulnerability documentation https://dirtypipe.cm4all.com/
07/03/2022 16:07:02
QRCode
archive.org

This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes.

It is similar to CVE-2016-5195 “Dirty Cow” but is easier to exploit.

The vulnerability was fixed in Linux 5.16.11, 5.15.25 and 5.10.102.

CVE-2022-0847 dirtypipe Linux Kernel arbitrary privilege escalation vulnerability EN 2022
Escaping privileged containers for fun https://pwning.systems/posts/escaping-containers-for-fun/
07/03/2022 08:22:11
QRCode
archive.org

Despite the fact that it is not a 'real' vulnerability, escaping privileged Docker containers is nevertheless pretty funny. And because there will always be people who will come up with reasons or excuses to run a privileged container (even though you really shouldn't), this could really be handy at some point in the future

escape docker kubernetes pwningsystems EN 2022 escalation
Hackers leak 190GB of alleged Samsung data, source code https://www.bleepingcomputer.com/news/security/hackers-leak-190gb-of-alleged-samsung-data-source-code/
06/03/2022 20:22:16
QRCode
archive.org
thumbnail

The Lapsus$ data extortion group leaked today a huge collection of confidential data they claim to be from Samsung Electronics, the South Korean giant consumer electronics company.

DataBreach DataLeak Lapsus$ Samsung bleepingcomputer 2022 EN confidential
Cybercriminals who breached Nvidia issue one of the most unusual demands ever https://arstechnica.com/information-technology/2022/03/cybercriminals-who-breached-nvidia-issue-one-of-the-most-unusual-demands-ever/
06/03/2022 18:43:49
QRCode
archive.org
thumbnail

Chipmaker has until Friday to comply or see its crown-jewel source code released.

Nvidia 2022 EN ransom demands code arstechnica
Malware now using stolen NVIDIA code signing certificates https://www.bleepingcomputer.com/news/security/malware-now-using-stolen-nvidia-code-signing-certificates/
06/03/2022 10:28:17
QRCode
archive.org
thumbnail

Threat actors are using stolen NVIDIA code signing certificates to sign malware to appear trustworthy and allow malicious drivers to be loaded in Windows.

This week, NVIDIA confirmed that they suffered a cyberattack that allowed threat actors to steal employee credentials and proprietary data.

bleepingcomputer Nvidia certificates malware EN 2022 code signing
Crypto Bug in Samsung Galaxy Devices: Breaking Trusted Execution Environments (TEEs) https://medium.com/asecuritysite-when-bob-met-alice/crypto-bug-in-samsung-galaxy-devices-breaking-trusted-execution-environments-tees-b442f9dea77f
06/03/2022 09:54:50
QRCode
archive.org
thumbnail

If you use an Apple Macbook, it’s likely that you have a secret enclave for important secrets — such as your encryption keys. These keys define the core of the trust infrastructure on the device — and protect applications from stealing these secrets. The TEE also allows isolation between code which is fully trusted, and code that cannot be fully trusted. If this did not happen, we could install applications on our computer which would discover our login password and steal the encryption used used to key things secret and trusted.

asecuritysite bug samsung galaxy EN 2022 CVE-2021-25444 medium CVE-2021–25490
Scam E-Mail Impersonating Red CrossScam E-Mail Impersonating Red Cross https://isc.sans.edu/diary/28404
05/03/2022 14:08:56
QRCode
archive.org
thumbnail

Earlier today, I received a scam email that impersonates the Ukrainian Red Cross. It attempts to solicit donations via Bitcoin. The email is almost certainly not related to any valid Red Cross effort.
There are some legitimate efforts to collect donations for Ukraine using crypto-currencies. This scam may take advantage of these efforts.

sansedu 2022 EN redcross scam war donations email
New Security Vulnerability Affects Thousands of Self-Managed GitLab Instances https://thehackernews.com/2022/03/new-security-vulnerability-affects.html
04/03/2022 21:57:58
QRCode
archive.org

Researchers have disclosed details of a new security vulnerability in GitLab, an open-source DevOps software, that could potentially allow a remote, unauthenticated attacker to recover user-related information.

GitLab thehackernews 2022 EN vulnerability opensource CVE-2021-4191
Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement https://www.proofpoint.com/us/blog/threat-insight/asylum-ambuscade-state-actor-uses-compromised-private-ukrainian-military-emails
04/03/2022 09:15:27
QRCode
archive.org
thumbnail
  • Proofpoint has identified a likely nation-state sponsored phishing campaign using a possibly compromised Ukrainian armed service member’s email account to target European government personnel involved in managing the logistics of refugees fleeing Ukraine.
  • The email included a malicious macro attachment which attempted to download a Lua-based malware dubbed SunSeed.
  • The infection chain used in this campaign bears significant similarities to a historic campaign Proofpoint observed in July 2021, making it likely the same threat actor is behind both clusters of activity.
  • Proofpoint is releasing this report in an effort to balance accuracy with responsibility to disclose actionable intelligence during a time of high-tempo conflict.
APT Russia Ukraine Government Military proofpoint EN 2022 phishing refugees SunSeed
Cyber Realism in a Time of War https://www.lawfareblog.com/cyber-realism-time-war
03/03/2022 21:16:47
QRCode
archive.org
thumbnail

Activity in the digital domain may affect the war in Eastern Europe at the margins, but it will not decide it. That should tell us something about the West’s cyber posture.

politics lawfareblog weapon EN 2022 analysis Cybersecurity realism opinion
Conti Ransomware https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/
03/03/2022 09:52:55
QRCode
archive.org

A Ukrainian security researcher this week leaked several years of internal chat logs and other sensitive data tied to Conti, an aggressive and ruthless Russian cybercrime group that focuses on deploying its ransomware to companies with more than $100 million…

Krebs Conti NSA cybercrime contileak EN 2022 krebsonsecurity
Phishing attacks target countries aiding Ukrainian refugees https://www.bleepingcomputer.com/news/security/phishing-attacks-target-countries-aiding-ukrainian-refugees/
02/03/2022 14:41:10
QRCode
archive.org
thumbnail

A spear-phishing campaign likely coordinated by a state-backed threat actor has been targeting European government personnel providing logistics support to Ukrainian refugees.

Belarus Europe Ghostwriter Malware Phishing TA445 Ukraine UNC1151 bleepingcomputer EN 2022 refugees
Toyota suspends domestic factory operations after suspected cyber attack https://www.reuters.com/business/autos-transportation/toyota-suspends-all-domestic-factory-operations-after-suspected-cyber-attack-2022-02-28/
02/03/2022 12:06:30
QRCode
archive.org
thumbnail

Toyota Motor Corp said it will suspend domestic factory operations on Tuesday, losing around 13,000 cars of output, after a supplier of plastic parts and electronic components was hit by a suspected cyber attack.

reuters Toyota EN 2022 factory cyberattack attack Japan
Ukrainian cyber resistance group targets Russian power grid, railways https://www.reuters.com/technology/ukrainian-cyber-resistance-group-targets-russian-power-grid-railways-2022-03-01/
02/03/2022 12:04:47
QRCode
archive.org
thumbnail

A Ukrainian cyber guerrilla warfare group plans to launch digital sabotage attacks against critical Russian infrastructure such as railways and the electricity grid, to strike back at Moscow over its invasion, a hacker team coordinator told Reuters.

reuters 2022 EN resistance cyberguerilla cyberwar sabotage warfare grid infrastructure Ukraine
Nvidia Confirms Company Data Was Stolen in Hack https://www.pcmag.com/news/nvidia-confirms-company-data-was-stolen-in-hack
02/03/2022 09:48:07
QRCode
archive.org
thumbnail

Meanwhile, the hackers behind the breach are now releasing some of the stolen files on the web.

PCMag Nvidia EN 2022 hackback malware LAPSUS$
Destructive Malware Targeting Organizations in Ukraine https://www.cisa.gov/uscert/ncas/alerts/aa22-057a
01/03/2022 23:07:31
QRCode
archive.org

Actions to Take Today: • Set antivirus and antimalware programs to conduct regular scans. • Enable strong spam filters to prevent phishing emails from reaching end users. • Filter network traffic. • Update software. • Require multifactor authentication. Leading up to Russia’s unprovoked attack against Ukraine, threat actors deployed destructive malware against organizations in Ukraine to destroy computer systems and render them inoperable. 

uscert csirt cert CISA EN 2022 alert WhisperGate HermeticWiper malware
IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine https://www.welivesecurity.com/2022/03/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/
01/03/2022 14:55:15
QRCode
archive.org
thumbnail

ESET researchers uncover IsaacWiper, a new wiper that attacks Ukrainian organizations and HermeticWizard, a worm spreading HermeticWiper in local networks.

ESET IsaacWiper HermeticWizard EN 2022 welivesecurity Ukraine datawiping attacks cyberwar
Ukrainian Researcher Leaks Conti Ransomware Gang Data https://www.bankinfosecurity.com/ukrainian-researcher-leaks-conti-ransomware-gang-data-a-18620
01/03/2022 08:49:19
QRCode
archive.org
thumbnail

A Ukrainian cybersecurity researcher has released a huge batch of data that came from the internal systems of the Conti ransomware gang. The researcher released the

Ukraine bankinfosecurity Conti ransomware dataleak EN 2022 gang chat logs
The Next Web https://thenextweb.com/news/apple-airtags-danger-analysis
28/02/2022 17:22:24
QRCode
archive.org
thumbnail

Apple's AirTags, its cheap and cheerful trackers, have proven increasingly dangerous. Unfortunately, there's no easy way of making them safer

thenextweb 2022 EN Apple AirTags
page 215 / 220
5003 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn