Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 22 / 200
3988 résultats taggé EN  ✕
Apple belatedly fixes exploited flaws in older OSes https://www.theregister.com/2025/04/02/apple_patch_bundle/
02/04/2025 09:06:29
QRCode
archive.org
thumbnail

Apple has delivered a big batch of OS updates, some of which belatedly patch older versions of its operating systems to address exploited-in-the-wild flaws the iGiant earlier fixed in more recent releases.

theregister EN 2025 belatedly older Apple patch iOS vulnerabilities CVE-2025-24200
Analyzing open-source bootloaders: Finding vulnerabilities faster with AI https://www.microsoft.com/en-us/security/blog/2025/03/31/analyzing-open-source-bootloaders-finding-vulnerabilities-faster-with-ai/
02/04/2025 06:44:13
QRCode
archive.org
thumbnail

By leveraging Microsoft Security Copilot to expedite the vulnerability discovery process, Microsoft Threat Intelligence uncovered several vulnerabilities in multiple open-source bootloaders, impacting all operating systems relying on Unified Extensible Firmware Interface (UEFI) Secure Boot as well as IoT devices. The vulnerabilities found in the GRUB2 bootloader (commonly used as a Linux bootloader) and U-boot and Barebox bootloaders (commonly used for embedded systems), could allow threat actors to gain and execute arbitrary code.

microsoft EN 2025 open-source bootloaders UEFI GRUB2 AI
From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic https://blog.sekoia.io/clickfake-interview-campaign-by-lazarus/
01/04/2025 11:54:41
QRCode
archive.org
thumbnail

Discover how Lazarus leverages fake job sites in the ClickFake Interview campaign targeting crypto firms using the ClickFix tactic.

sekoia EN 2025 ClickFake Interview ClickFix Lazarus
CrushFTP Authentication Bypass - CVE-2025-2825 https://projectdiscovery.io/blog/crushftp-authentication-bypass
01/04/2025 09:49:24
QRCode
archive.org
thumbnail

Enterprise file transfer solutions are critical infrastructure for many organizations, facilitating secure data exchange between systems and users. CrushFTP, a widely used multi-protocol file transfer server, offers an extensive feature set including Amazon S3-compatible API access. However, a critical vulnerability (CVE-2025-2825) was discovered in versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 that allows unauthenticated attackers to bypass authentication and gain unauthorized access

projectdiscovery EN 2025 CVE-2025-2825 vulnerability CrushFTP Authentication Bypass
Fake Zoom Ends in BlackSuit Ransomware https://thedfirreport.com/2025/03/31/fake-zoom-ends-in-blacksuit-ransomware/
31/03/2025 20:56:58
QRCode
archive.org
thumbnail

Key Takeaways The threat actor gained initial access by a fake Zoom installer that used d3f@ckloader and IDAT loader to drop SectopRAT. After nine days of dwell time, the SectopRAT malware dropped …

thedfirreport EN 2025 Fake Zoom IDAT loader SectopRAT d3f@ckloader incident analysis
ClickFix: Another Deceptive Social Engineering Technique https://www.logpoint.com/en/blog/emerging-threats/clickfix-another-deceptive-social-engineering-technique/
31/03/2025 19:37:12
QRCode
archive.org
thumbnail

Discover ClickFix, a rising social engineering threat used to deliver malware and learn how to detect and respond against it with Logpoint.

logpoint EN 2025 ClickFix social-engineering Technique
Pulling the Threads on the Phish of Troy Hunt https://www.validin.com/blog/pulling_threads_on_phishing_campaign/
31/03/2025 19:36:08
QRCode
archive.org
thumbnail

Connecting a successful phishing attempt to Scattered Spider through Validin pivoting

validin EN 2025 phishing Scattered-Spider troyhunt
TCCing is Believing https://objective-see.org/blog/blog_0x7F.html
31/03/2025 19:31:21
QRCode
archive.org
thumbnail

Apple finally adds TCC events to Endpoint Security!
Since the majority of macOS malware circumvents TCC through explicit user approval, it would be incredibly helpful for any security tool to detect this — and possibly override the user’s risky decision. Until now the best (only?) option was to ingest log messages generated by the TCC subsystem. This approach was implemented in a tool dubbed Kronos, written by Calum Hall Luke Roberts (now, of Phorion fame). Unfortunately, as they note, this approach did have it drawbacks:

objective-see EN 2025 macos Apple TCC events Endpoint Security subsystem
Hidden Malware Strikes Again: Mu-Plugins Under Attack https://blog.sucuri.net/2025/03/hidden-malware-strikes-again-mu-plugins-under-attack.html
31/03/2025 19:30:17
QRCode
archive.org
thumbnail

Hidden malware strikes WordPress mu-plugins. Our latest findings reveal how to safeguard your site against these threats.

sucuri EN 2025 Wordpress Mu-Plugins malware Hidden plugin
Ransomware crews add EDR killers to their arsenal https://www.theregister.com/2025/03/31/ransomware_crews_edr_killers/
31/03/2025 12:14:22
QRCode
archive.org
thumbnail

interview: Crims are disabling security tools early in attacks, Talos says

theregister EN 2025 EDR-killer HRSword Ransomware
Blacklock Ransomware: A Late Holiday Gift with Intrusion into the Threat Actor https://www.resecurity.com/blog/article/blacklock-ransomware-a-late-holiday-gift-with-intrusion-into-the-threat-actors-infrastructure
29/03/2025 17:33:51
QRCode
archive.org

Dubbed “BlackLock” (aka "El Dorado" or "Eldorado"), the ransomware-as-a-service (RaaS) outfit has existed since March 2024. In Q4 of last year, it increased its number of data leak posts by a staggering 1,425% quarter-on-quarter. According to independent reporting, a relatively new group has rapidly accelerated attacks and could become the most dominant RaaS group in 2025.

Fortunately, it will not happen due to certain events happening "behind the scenes." As you may know, Christmas and Winter Holidays are the best times for cybercriminals to attack, defraud, and extort victims globally. But in some cases, they may expect unexpected gifts too. Around that time, Resecurity identified a vulnerability present at the Data Leak Site (DLS) of BlackLock in the TOR network - successful exploitation of which allowed our analysts to collect substantial intelligence about their activity outside of the public domain.

resecurity EN 2025 Ransomware Blacklock hacked
Why are North Korean hackers such good crypto-thieves? https://archive.ph/fFH97
29/03/2025 09:51:16
QRCode
archive.org

FEBRUARY 21st was a typical day, recalls Ben Zhou, the boss of ByBit, a Dubai-based cryptocurrency exchange. Before going to bed, he approved a fund transfer between the firm’s accounts, a “typical manoeuvre” performed while servicing more than 60m users around the world. Half an hour later he got a phone call. “Ben, there’s an issue,” his chief financial officer said, voice shaking. “We might be hacked…all of the Ethereum is gone.”

The-Economist EN 2025 archive.ph North-Korea hackers crypto-thieves
Oracle Health breach compromises patient data at US hospitals https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/
28/03/2025 16:22:16
QRCode
archive.org
thumbnail

A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers.

bleepingcomputer EN 2025 Cerner Data-Breach Electronic-Health-Record Hospital Oracle Oracle-Health Patient-Data
SAMLStorm: Critical Authentication Bypass in xml-crypto and Node.js libraries https://workos.com/blog/samlstorm
28/03/2025 12:15:54
QRCode
archive.org
thumbnail

Any service using xml-crypto or a Node.js SAML implementation using it, should update immediately to the latest version. WorkOS customers are safe and were not impacted.

workos EN 2025 Authentication Bypass xml-crypto Node.js SAMLStorm CVE-2025-29775 CVE-2025-29774
Malware found on npm infecting local package with reverse shell https://www.reversinglabs.com/blog/malicious-npm-patch-delivers-reverse-shell
28/03/2025 11:27:24
QRCode
archive.org
thumbnail

For the first time, RL researchers discover malicious locally-installed npm packages infecting other legitimate packages.

reversinglabs EN 2025 npm packages ethers-provider2 reverse-shell malicious locally-installed
Lucid https://catalyst.prodaft.com/public/report/lucid/overview
27/03/2025 10:21:25
QRCode
archive.org

Lucid is a sophisticated Phishing-as-a-Service (PhaaS) platform operated by Chinese-speaking threat actors, targeting 169 entities across 88 countries globally. With 129 active instances and 1000+ registered domains, Lucid ranks among prominent PhaaS platforms, alongside Darcula and Lighthouse.
Its scalable, subscription-based model enables cybercriminals to conduct large-scale phishing campaigns to harvest credit card details for financial fraud. The platform employs an automated attack delivery mechanism, deploying customizable phishing websites distributed primarily through SMS-based lures. To enhance effectiveness, Lucid leverages Apple iMessage and Android’s RCS technology, bypassing traditional SMS spam filters and significantly increasing delivery and success rates.
Lucid incorporates advanced anti-detection and evasion techniques, such as IP blocking and user-agent filtering, to prolong the lifespan of its phishing sites. Additionally, it features a built-in card generator, enabling threat actors to validate and exploit stolen payment data efficiently. Given its advanced infrastructure and persistent activity, Lucid poses a significant and ongoing cyber threat. Its operations underscore the growing reliance on PhaaS platforms to facilitate payment fraud and financial cybercrime, necessitating heightened vigilance and proactive mitigation efforts.

prodaft EN 2025 analysis Lucid PhaaS Chinese-speaking
CVE-2025-29927: Next.js Middleware Authorization Bypass https://projectdiscovery.io/blog/nextjs-middleware-authorization-bypass
27/03/2025 08:44:44
QRCode
archive.org
thumbnail

Next.js is an open-source web framework built by Vercel that powers React-based apps with features like server-side and static rendering. Recently, a critical vulnerability (CVE) was disclosed that lets attackers bypass middleware-based authorization checks. The issue was originally discovered and analyzed by Rachid Allam (zhero). In this blog, we’ll break down the vulnerability and walk through their research and will create a Nuclei template to help you detect it across your assets.

projectdiscovery EN 2025 next.js vulnerabilty CVE-2025-29927 analysis
Micropatches released for SCF File NTLM Hash Disclosure Vulnerability (0day) https://blog.0patch.com/2025/03/scf-file-ntlm-hash-disclosure.html
27/03/2025 08:14:25
QRCode
archive.org
thumbnail

    While patching a SCF File NTLM hash disclosure issue on our security-adopted Windows versions, our researchers discovered a related v...

0patch EN 2025 SCF File NTLM hash disclosure
GorillaBot: Technical Analysis and Code Similarities with Mirai https://any.run/cybersecurity-blog/gorillabot-malware-analysis/
26/03/2025 21:34:54
QRCode
archive.org
thumbnail

Discover technical analysis of GorillaBot, a new malware variant based on the original code of the Mirai botnet.

any.run EN 2025 GorillaBot analysis Mirai code
Troy Hunt: A Sneaky Phish Just Grabbed my Mailchimp Mailing List https://www.troyhunt.com/a-sneaky-phish-just-grabbed-my-mailchimp-mailing-list/
25/03/2025 10:46:12
QRCode
archive.org
thumbnail

You know when you're really jet lagged and really tired and the cogs in your head are just moving that little bit too slow? That's me right now, and the penny has just dropped that a Mailchimp phish has grabbed my credentials, logged into my account and exported the mailing list for this blog. I'm deliberately keeping this post very succinct to ensure the message goes out to my impacted subscribers ASAP, then I'll update the post with more details.

troyhunt EN 2025 Phish hacked Mailchimp
page 22 / 200
4540 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio