Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 220 / 239
Council conclusions on a Framework for a coordinated EU response to hybrid campaigns https://www.consilium.europa.eu/en/press/press-releases/2022/06/21/council-conclusions-on-a-framework-for-a-coordinated-eu-response-to-hybrid-campaigns/
22/06/2022 20:30:23
QRCode
archive.org
thumbnail

RECALLS the relevant conclusions of the European Council1 and the Council2, ACKNOWLEDGES that state and non-state actors are increasingly using hybrid tactics, posing a growing threat to the security of the EU, its Member States and its partners3. RECOGNISES that, for some actors applying such tactics, peacetime is a period for covert malign activities, when a conflict can continue or be prepared for in a less open form. EMPHASISES that state actors and non-state actors also use information manipulation and other tactics to interfere in democratic processes and to mislead and deceive citizens. NOTES that Russia’s armed aggression against Ukraine is showing the readiness to use the highest level of military force, regardless of legal or humanitarian considerations, combined with hybrid tactics, cyberattacks, foreign information manipulation and interference, economic and energy coercion and an aggressive nuclear rhetoric, and ACKNOWLEDGES the related risks of potential spillover effects in EU neighbourhoods that could harm the interests of the EU.

europa EU 2022 EN Framework Council hybrid campaigns Hybrid Toolbox non-state actors legal
MuddyWater’s “light” first-stager targetting Middle East https://lab52.io/blog/muddywaters-light-first-stager-targetting-middle-east/
22/06/2022 09:35:41
QRCode
archive.org

Since the last quarter of 2020 MuddyWater has mantained a “long-term” infection campaign targeting Middle East countries. We have gathered samples from November 2020 to January 2022, and due to the recent samples found, it seems that this campaign might still be currently active. The latest campaigns of the Muddy Water threat group, allegedly sponsored by the Iranian government and linked to the Iranian revolutionary guard (the main armed forces of the Iranian government), could be framed within the dynamics of maintaining Iran’s regional sovereignty.

lab52 EN 2022 muddywaters research Middle-East
Nothing Has Changed: Website Retailers Selling Domains Meant for Illicit Goods and Services, Digital Citizens Alliance Investigation Finds https://www.prnewswire.com/news-releases/nothing-has-changed-website-retailers-selling-domains-meant-for-illicit-goods-and-services-digital-citizens-alliance-investigation-finds-301572036.html
22/06/2022 09:32:28
QRCode
archive.org
thumbnail

Domain names geared to offer illicit goods and services – from illegally purchased guns to opioids to Covid vaccine cards – remain easy to...

prnewswire 2022 EN Digital-Citizens-Alliance Investigation Domain illegally guns
The Cybersecurity 202: Internet domain names are ripe for scam during coronavirus crisis https://www.washingtonpost.com/politics/2020/09/08/cybersecurity-202-internet-domain-names-are-ripe-scam-during-coronavirus-crisis/
22/06/2022 08:52:33
QRCode
archive.org
thumbnail

Companies including GoDaddy are making it easy for criminals to scoop up websites for dangerous coronavirus scams, researchers say.

washingtonpost 2020 EN Internet domain scam coronavirus registrars registrar
FBI says fraud on LinkedIn a 'significant threat' to platform and consumers https://www.cnbc.com/2022/06/17/fbi-says-fraud-on-linkedin-a-significant-threat-to-platform-and-consumers.html
22/06/2022 08:48:54
QRCode
archive.org
thumbnail

Fraudsters who target LinkedIn users in sophisticated investment schemes pose a "significant threat" to the platform, the FBI tells CNBC.

cnbc EN 2022 LinkedIn fraud FBI Microsoft Cryptocurrency Politics
Russia's APT28 uses fear of nuclear war to spread Follina docs in Ukraine https://blog.malwarebytes.com/threat-intelligence/2022/06/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine/
21/06/2022 17:33:19
QRCode
archive.org
thumbnail

Threat actors associated with Russian intelligence are using the fear or nuclear war to spread data-stealing malware in Ukraine.

malwarebytes EN 2022 Follina Russia cyberwar Ukraine Russia-Ukraine-war
Emotet SMB spreader overview http://reversing.fun/posts/2022/06/20/emotet-smb-spreader.html
21/06/2022 17:24:22
QRCode
archive.org

Emotet is back in business and it’s revealing some new tricks. Not long ago, Emotet introduced a new module, the Google Chrome’s credit card grabber. More recently, the SMB spreader module has been brought back and is now, once again, part of the infection chain.

reversing.fun Emotet 2022 SMB analysis module
Project Zero: An Autopsy on a Zombie In-the-Wild 0-day https://googleprojectzero.blogspot.com/2022/06/an-autopsy-on-zombie-in-wild-0-day.html
21/06/2022 08:57:54
QRCode
archive.org

Whenever there’s a new in-the-wild 0-day disclosed, I’m very interested in understanding the root cause of the bug. This allows us to then understand if it was fully fixed, look for variants, and brainstorm new mitigations. This blog is the story of a “zombie” Safari 0-day and how it came back from the dead to be disclosed as exploited in-the-wild in 2022. CVE-2022-22620 was initially fixed in 2013, reintroduced in 2016, and then disclosed as exploited in-the-wild in 2022. If you’re interested in the full root cause analysis for CVE-2022-22620, we’ve published it here.

googleprojectzero EN 2022 0-day Safari CVE-2022-22620 Apple
Zero Day Initiative — CVE-2022-23088: Exploiting a Heap Overflow in the FreeBSD Wi-Fi Stack https://www.zerodayinitiative.com/blog/2022/6/15/cve-2022-23088-exploiting-a-heap-overflow-in-the-freebsd-wi-fi-stack
21/06/2022 08:50:54
QRCode
archive.org
thumbnail

In April of this year, FreeBSD patched a 13-year-old heap overflow in the Wi-Fi stack that could allow network-adjacent attackers to execute arbitrary code on affected installations of FreeBSD Kernel. This bug was originally reported to the ZDI program by a researcher known as m00nbsd and patched in

zerodayinitiative EN 2022 CVE-2022-23088 HeapOverflow FreeBSD Wi-Fi
BRATA is evolving into an Advanced Persistent Threat https://www.cleafy.com/cleafy-labs/brata-is-evolving-into-an-advanced-persistent-threat?s=09
20/06/2022 08:49:35
QRCode
archive.org
thumbnail

Here we go with another episode about our (not so) old friend, BRATA. In almost one year, threat actors (TAs) have further improved the capabilities of this malware. In our previous blog post [1] we defined three main BRATA variants, which appeared during two different waves detected by our telemetries at the very end of 2021. However, during the last months we have observed a change in the attack pattern commonly used.

cleafy 2022 EN malware BRATA APT phishing analysis IOCs banker
Lookout Découverte d'un logiciel espion Android déployé au Kazakhstan https://fr.lookout.com/blog/hermit-spyware-discovery
20/06/2022 08:19:14
QRCode
archive.org
thumbnail

Lookout Les chercheurs de Threat Lab ont découvert un logiciel de surveillance Android de niveau entreprise utilisé par le gouvernement du Kazakhstan à l'intérieur de ses frontières. D'après notre analyse, le logiciel espion est probablement développé par le fournisseur italien de logiciels espions RCS Lab S.p.A.

lookout FR 2022 surveillance spyware Android rcslab Italie Italy Kazakhstan Hermit
What It Means that the U.S. Is Conducting Offensive Cyber Operations Against Russia https://zetter.substack.com/p/what-it-means-that-the-us-is-conducting
18/06/2022 10:38:58
QRCode
archive.org
thumbnail

Gen. Paul Nakasone's remarks this month about offensive operations against Russia caused a stir. But have people misinterpreted his words?

Zetter newsletter EN 2022 cyberoperations definition Nakasone offensive TallinManual Russia US cyberwarfare cyberwar
Phishing tactics: how a threat actor stole 1M credentials in 4 months https://pixmsecurity.com/blog/blog/phishing-tactics-how-a-threat-actor-stole-1m-credentials-in-4-months/
17/06/2022 10:50:59
QRCode
archive.org

It is rare that the identities of participants and ringleaders in criminal phishing schemes are uncovered. But in many cases, when untangling the web of a cyber criminal group (particularly with financially motivated e-crime actors), there are enough OSINT breadcrumbs left behind by a threat actor, on forums, in code, or elsewhere, to point investigators in the right direction.

pixmsecurity 2022 EN Phishing tactics Anti-Phishing OSINT
Last Week on My Mac: Introducing XProtect Remediator, successor to MRT – The Eclectic Light Company https://eclecticlight.co/2022/06/12/last-week-on-my-mac-introducing-xprotect-remediator-successor-to-mrt/
17/06/2022 08:43:06
QRCode
archive.org
thumbnail

MRT’s days appear numbered. On 14 March this year, Apple released its successor – a new version of XProtect, which now does the lot.

eclecticlight 2022 EN mac XProtect Remediator macos security Apple
Analysis of dark web posts selling access to corporate networks https://securelist.com/initial-access-data-price-on-the-dark-web/106740/
17/06/2022 07:11:54
QRCode
archive.org
thumbnail

Money has been and remains the main motivator for cybercriminals. The most widespread techniques of monetizing cyberattacks include selling stolen databases, extortion (using ransomware) and carding. However, there is demand on the dark web not only for data obtained through an attack, but also for the data and services necessary to organize one (e.g., to perform specific steps of a multiphase attack)

securelist EN 2022 monetizing cyberattacks selling access darkweb
Telerik UI exploitation leads to cryptominer, Cobalt Strike infections https://news.sophos.com/en-us/2022/06/15/telerik-ui-exploitation-leads-to-cryptominer-cobalt-strike-infections/
17/06/2022 07:11:21
QRCode
archive.org
thumbnail

Attacker targets bugs in a popular web application graphical interface development tool.

sophos 2022 EN research POWERSHELL TELERIK XMRIG CVE-2017-11357 CVE-2019-18935 CVE-2017-11317 cobaltstrike cryptomaining
Password policies of most top websites fail to follow best practices https://passwordpolicies.cs.princeton.edu/
17/06/2022 07:07:02
QRCode
archive.org

We examined the password policies of 120 of the most popular English-language websites in the world.

princeton paper en 2022 password passwords policies websites bestpractices
Police Linked to Hacking Campaign to Frame Indian Activists https://www.wired.com/story/modified-elephant-planted-evidence-hacking-police/
16/06/2022 21:36:26
QRCode
archive.org
thumbnail

New details connect police in India to a plot to plant evidence on victims' computers that led to their arrest.

Wired en 2022 crime malware hacking India police spyware activists
Zimbra Email - Stealing Clear-Text Credentials via Memcache injection https://blog.sonarsource.com/zimbra-mail-stealing-clear-text-credentials-via-memcache-injection/
15/06/2022 18:18:08
QRCode
archive.org
thumbnail

We discovered flaws in Zimbra, an enterprise email solution, that allow attackers to steal credentials of users and gain access to their email accounts.

sonarsource EN 2022 Zimbra memcache Vulnerability email steal credentials
Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro" https://www.insicurezzadigitale.com/alphv-blackcat-non-e-piu-solo-darkweb-pubblica-anche-su-internet-in-chiaro/
15/06/2022 11:48:05
QRCode
archive.org
thumbnail

La nuova funzione implementata ieri da BlackCat, esporrà le vittime colpite anche su Internet, con una diffusione più massiccia e pubblica dei dati rubati, con nome di dominio autentico intestato alla vittima stessa

insicurezzadigitale IT 2022 BlackCat Alphv ransomware pubblica Alphv-BlackCat Internet
page 220 / 239
4762 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio