Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 223 / 251
PSA: Nearly 5 Million Attacks Blocked Targeting 0-Day in BackupBuddy Plugin https://www.wordfence.com/blog/2022/09/psa-nearly-5-million-attacks-blocked-targeting-0-day-in-backupbuddy-plugin/
09/09/2022 15:28:47
QRCode
archive.org
thumbnail

Late evening, on September 6, 2022, the Wordfence Threat Intelligence team was alerted to the presence of a vulnerability being actively exploited in BackupBuddy, a WordPress plugin we estimate has around 140,000 active installations. This vulnerability makes it possible for unauthenticated users to download arbitrary files from the affected site which can include sensitive information. ...Read More

wordfence EN 2022 Wordpress vulnerability 0-day BackupBuddy plugin
MagicRAT: Lazarus’ latest gateway into victim networks https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html
08/09/2022 23:21:24
QRCode
archive.org
thumbnail
  • Cisco Talos has discovered a new remote access trojan (RAT) we're calling "MagicRAT," developed and operated by the Lazarus APT group, which the U.S. government believes is a North Korean state-sponsored actor.
  • Lazarus deployed MagicRAT after the successful exploitation of vulnerabilities in VMWare Horizon platforms.
  • We've also found links between MagicRAT and another RAT known as "TigerRAT," disclosed and attributed to Lazarus by the Korean Internet & Security Agency (KISA) recently.
  • TigerRAT has evolved over the past year to include new functionalities that we illustrate in this blog.
talosintelligence EN 2022 MagicRAT Lazarus Lazarus-Group North-Korea TigerRAT RAT
Good game, well played: an overview of gaming-related cyberthreats in 2022 https://securelist.com/gaming-related-cyberthreats-2021-2022/107346/
08/09/2022 18:18:08
QRCode
archive.org

The gaming industry went into full gear during the pandemic, as many people took up online gaming as their new hobby to escape the socially-distanced reality. Since then, the industry has never stopped growing. According to the analytical agency Newzoo, in 2022, the global gaming market will exceed $ 200 billion, with 3 billion players globally. Such an engaged, solvent and eager-to-win audience becomes a tidbit for cybercriminals, who always find ways to fool their victims. One of the most outstanding examples involves $2 million‘s worth of CS:GO skins stolen from a user’s account, which means that losses can get truly grave. Besides stealing personal credentials and funds, hackers can affect the performance of gaming computers, infecting these with unsolicited miner files.

securelist EN 2022 gaming cyberthreats overview
Shikitega - New stealthy malware targeting Linux https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux
07/09/2022 11:11:43
QRCode
archive.org
thumbnail

AT&T Alien Labs has discovered a new malware targeting endpoints and IoT devices that are running Linux operating systems. Shikitega is delivered in a multistage infection chain where each module responds to a part of the payload and downloads and executes the next one. An attacker can gain full control of the system, in addition to the cryptocurrency miner that will be executed and set to persist.

cybersecurity.att.com AT&T-Alien-Labs Shikitega EN 2022 Linux malware Analysis
Mirai Variant MooBot Targeting D-Link Devices https://unit42.paloaltonetworks.com/moobot-d-link-devices/
07/09/2022 11:09:36
QRCode
archive.org
thumbnail

Attackers are leveraging known vulnerabilities in D-Link devices to deliver MooBot, a Mirai variant, potentially leading to further DDoS attacks.

unit42 paloaltonetworks EN 2022 Mirai Variant MooBot Targeting D-Link CVE-2015-2051 CVE-2018-6530 CVE-2022-26258 CVE-2022-28958 analysis
QNAP warns of zero-day vulnerability in latest DeadBolt ransomware campaign https://therecord.media/qnap-warns-of-zero-day-vulnerability-in-latest-deadbolt-ransomware-campaign/
07/09/2022 08:29:50
QRCode
archive.org
thumbnail

The Record by Recorded Future gives exclusive, behind-the-scenes access to leaders, policymakers, researchers, and the shadows of the cyber underground.

therecord EN 2022 QNAP DeadBolt ransomware NAS
SafeBreach Uncovers New Remote Access Trojan (RAT) https://www.safebreach.com/resources/blog/remote-access-trojan-coderat
06/09/2022 18:01:11
QRCode
archive.org
thumbnail

Dubbed CodeRAT, the new RAT is used in attacks targeting Farsi-speaking code developers using a Microsoft Dynamic Data Exchange (DDE) exploit.

safebreach 2022 EN CodeRAT RAT DDE Analysis
TA505 Hackers Using TeslaGun Panel to Manage ServHelper Backdoor Attacks https://thehackernews.com/2022/09/ta505-hackers-using-teslagun-panel-to.html
06/09/2022 12:16:00
QRCode
archive.org

Cybersecurity researchers have offered insight into a previously undocumented software control panel used by a financially motivated threat group known as TA505.

"The group frequently changes its malware attack strategies in response to global cybercrime trends," Swiss cybersecurity firm PRODAFT said in a report shared with The Hacker News. "It opportunistically adopts new technologies in order to gain leverage over victims before the wider cybersecurity industry catches on."

thehackernews EN 2022 PRODAFT TeslaGun ServHelper Backdoor Analysis
EvilProxy Phishing-as-a-Service with MFA Bypass Emerged in Dark Web https://resecurity.com/blog/article/evilproxy-phishing-as-a-service-with-mfa-bypass-emerged-in-dark-web
05/09/2022 14:06:10
QRCode
archive.org

Following the recent Twilio hack leading to the leakage of 2FA (OTP) codes, cybercriminals continue to upgrade their attack arsenal to orchestrate advanced phishing campaigns targeting users worldwide. Resecurity has recently identified a new Phishing-as-a-Service (PhaaS) called EvilProxy advertised in the Dark Web. On some sources the alternative name is Moloch, which has some connection to a phishing-kit developed by several notable underground actors who targeted the financial institutions and e-commerce sector before.

Resecurity EN 2022 EvilProxy Phishing-as-a-Service MFA Bypass 2FA
Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users https://www.mcafee.com/blogs/other-blogs/mcafee-labs/malicious-cookie-stuffing-chrome-extensions-with-1-4-million-users/
05/09/2022 10:11:08
QRCode
archive.org
thumbnail

A few months ago, we blogged about malicious extensions redirecting users to phishing sites and inserting affiliate IDs into cookies of eCommerce sites. Since that time, we have investigated several other malicious extensions and discovered 5 extensions with a total install base of over 1,400,000
"...the extensions also track the user’s browsing activity."

mcafee 2022 EN malicious extensions Chrome Analysis privacy browser cookie Stuffing
Sharkbot is back in Google Play https://blog.fox-it.com/2022/09/02/sharkbot-is-back-in-google-play/
05/09/2022 10:04:50
QRCode
archive.org
thumbnail

Authored by Alberto Segura (main author) and Mike Stokkel (co-author) Introduction After we discovered in February 2022 the SharkBotDropper in Google Play posing as a fake Android antivirus and cleaner, now we have detected a new version of this dropper active in the Google Play and dropping a new version of Sharkbot.This new dropper doesn't…

fox-it EN 2022 sharkbot SharkBotDropper GooglePlay antivirus cleaner fake
Peut-on encore, en Suisse, recourir à des services cloud offerts par Microsoft ? https://swissprivacy.law/165/
05/09/2022 09:04:24
QRCode
archive.org

Dans une prise de position publiée le 13 juin 2022, le Préposé fédéral à la protection des données et à la transparence a estimé que le recours aux services cloud M365 de Microsoft serait susceptible de violer la Loi fédérale sur la protection des données, quand bien même le projet de la Caisse nationale suisse d'assurance en cas d'accidents (SUVA) envisage que les données soient hébergées en Suisse et que le cocontractant du responsable du traitement soit une entité européenne du Groupe Microsoft.

swissprivacy FR 2022 CH Suisse Préposé-fédéral Microsoft cloud protection données Cloud-Act
Stealing Clouds https://www.reuters.com/investigates/special-report/china-cyber-cloudhopper/
04/09/2022 12:56:29
QRCode
archive.org
thumbnail

Reuters shows how Chinese hackers invaded myriad global companies, exposing entrenched weaknesses in Western cyber defenses.

Reuters 2019 Chinese APT10 Cloud attack Cloud-Hopper Ericsson IBM HP
Adoption de l’OPDo et confirmation de l’entrée en vigueur de la nLPD https://smetille.ch/2022/09/02/adoption-de-lordonnance-sur-la-protection-des-donnees/?s=09
03/09/2022 14:12:01
QRCode
archive.org

Comme cela était attendu, le Conseil fédéral a adopté les projets d’Ordonnance sur la protection des données (OPDo) et d’Ordonnance sur les certifications en matière de protection des données (OCPD) Plus rien ne s’oppose donc à l’entrée en vigueur de la Loi sur la protection des données révisée (nLPD) le 1er septembre 2023. Le Conseil fédéral a en effet souhaité laisser encore un peu de temps aux petites et moyennes entreprises pour se mettre en conformité.

smetille CH FR 2022 legal nLPD lois protection OPDo données Suisse Switzerland law
Hackers Create Traffic Jam in Moscow by Ordering Dozens of Taxis at Once Through App https://www.vice.com/en/article/y3pbgy/hackers-create-traffic-jam-in-moscow-by-ordering-dozens-of-taxis-at-once-through-app
03/09/2022 12:55:00
QRCode
archive.org
thumbnail

Attackers attempted to disrupt ride-hailing app service on Thursday, the company confirmed.

vice EN 2022 Yandex Moscow Taxis app hacked traffic jam Hackers
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks https://www.sentinelone.com/labs/pypi-phishing-campaign-juiceledger-threat-actor-pivots-from-fake-apps-to-supply-chain-attacks/
03/09/2022 11:24:16
QRCode
archive.org
thumbnail

A new threat actor is spreading infostealer malware through targeted attacks on developers and fraudulent cryptotrading applications.

sentinelone EN 2022 PyPI JuiceLedger infostealer malware ANALYSIS
Tech tool offers police ‘mass surveillance on a budget’ https://apnews.com/article/technology-police-government-surveillance-d395409ef5a8c6c3f6cdab5b1d0e27ef
03/09/2022 10:11:06
QRCode
archive.org
thumbnail

Local law enforcement agencies from suburban Southern California to rural North Carolina have been using an obscure cellphone tracking tool, at times without search warrants, that gives them the power to follow people’s movements months back in time, according to public records and internal emails obtained by The Associated Press.

ApNews EN 2022 AP-Investigations Technology Police California Arkansas Weekend-Reads North-Carolina privacy Government-surveillance Law-enforcement-agencies Criminal-investigations
Researchers found one-click exploits in Discord and Teams https://www.malwarebytes.com/blog/news/2022/08/researchers-found-one-click-exploits-in-discord-and-teams
31/08/2022 16:58:02
QRCode
archive.org
thumbnail

A group of security researchers found a series of vulnerabilities in the software underlying popular apps like Discord, Microsoft Teams, Spotify and many others

malwarebytes EN 2022 Electron vulnerability
Zimbra Open Bucket Data Leak – Responsible Disclosure https://members.backbox.org/zimbra-open-bucket-data-leak-responsible-disclosure/
31/08/2022 10:14:16
QRCode
archive.org

Hundreds of millions use Zimbra, an all-in-one business productivity suite for micro, small, medium & enterprise in-office and remote work teams. The Zimbra Inc company was acquired by Synacor Inc

backbox EN 2022 Leak Zimbra Disclosure Bucket
Traffers: a deep dive into the information stealer ecosystem https://blog.sekoia.io/traffers-a-deep-dive-into-the-information-stealer-ecosystem/
31/08/2022 08:42:44
QRCode
archive.org
thumbnail

Traffers are responsible for redirecting user traffic to malicious content (malware, fraud, phishing, scam) exploited by other threat actors.

sekoia EN 2022 Traffers traffic web stealer
page 223 / 251
5010 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn