Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 227 / 239
LemonDuck botnet plunders Docker cloud instances in cryptocurrency crime wave https://www.zdnet.com/article/lemonduck-botnet-plunders-docker-cloud-instances-in-cryptocurrency-crime-wave/?taid=62650e16e7253e000130e7db
24/04/2022 10:59:54
QRCode
archive.org
thumbnail

Operators of the LemonDuck botnet are targeting Docker instances in a cryptocurrency mining campaign.

ZDNet EN 2022 lemonduck docker bonnet cryptocurrency
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure https://www.microsoft.com/security/blog/2021/07/22/when-coin-miners-evolve-part-1-exposing-lemonduck-and-lemoncat-modern-mining-malware-infrastructure/
24/04/2022 10:58:21
QRCode
archive.org
thumbnail

In this two-part blog series, we expose a modern malware infrastructure and provide guidance for protecting against the wide range of threats it enables. Part 1 covers the evolution of the threat, how it spreads, and how it impacts organizations. Part 2 is a deep dive on the attacker behavior and will provide investigation guidance.

microsoft 2021 LemonDuck lemoncat EN malware botnet infrastructure
Securing Cloudflare Using Cloudflare https://blog.cloudflare.com/securing-cloudflare-using-cloudflare/
24/04/2022 10:24:54
QRCode
archive.org

When a new security threat arises — a publicly exploited vulnerability (like log4j) or the shift from corporate-controlled environments to remote work or a potential threat actor — it is the Security team’s job to respond to protect Cloudflare’s network, customers, and employees. And as security threats evolve, so should our defense system. Cloudflare is committed to bolstering our security posture with best-in-class solutions — which is why we often turn to our own products as any other Cloudflare customer would?

cloudflare 2022 EN FIDO2 access control management
CVE-2022-21449: Psychic Signatures in Java https://neilmadden.blog/2022/04/19/psychic-signatures-in-java/
20/04/2022 13:17:22
QRCode
archive.org
thumbnail

The long-running BBC sci-fi show Doctor Who has a recurring plot device where the Doctor manages to get out of trouble by showing an identity card which is actually completely blank. Of course, this being Doctor Who, the card is really made out of a special "psychic paper", which causes the person looking at it…

CVE-2022-21449 neilmadden EN 2022 cryptobug ECDSA
The More You Know, The More You Know You Don’t Know https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html
20/04/2022 07:58:06
QRCode
archive.org
thumbnail

A Year in Review of 0-days Used In-the-Wild in 2021

googleprojectzero EN 2022 2021 0-day 0-days Review Year
Pegasus spyware found on 5 French cabinet members' phones https://www.intego.com/mac-security-blog/pegasus-spyware-found-on-5-french-cabinet-members-phones/
19/04/2022 16:55:09
QRCode
archive.org
thumbnail

A new report claims that telltale signs of Pegasus spyware have been identified on at least five current French cabinet ministers' mobile phones. The

intego 2021 EN Pegasus spyware French France
CatalanGate: Extensive Mercenary Spyware Operation against Catalans Using Pegasus and Candiru https://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-against-catalans-using-pegasus-candiru/
18/04/2022 15:27:16
QRCode
archive.org
thumbnail

The Citizen Lab, in collaboration with Catalan civil society groups, has identified at least 65 individuals targeted or infected with mercenary spyware, including members of the European Parliament, Catalan Presidents, legislators, jurists, and members of civil society organisations.

citizenlab CatalanGate EN 2022 Pagasus Catalan spyware EU
GitHub: Attacker breached dozens of orgs using stolen OAuth tokens https://www.bleepingcomputer.com/news/security/github-attacker-breached-dozens-of-orgs-using-stolen-oauth-tokens/
18/04/2022 09:45:06
QRCode
archive.org
thumbnail

GitHub revealed today that an attacker is using stolen OAuth user tokens (issued to Heroku and Travis-CI) to download data from private repositories.

Breach GitHub OAuth Warning bleepingcomputer EN 2022
Increased Enterprise Use of iOS, Mac Means More Malware https://www.bankinfosecurity.com/ios-mac-malware-grows-increased-enterprise-use-a-18792
16/04/2022 09:57:28
QRCode
archive.org
thumbnail

As use of Apple devices has grown in the enterprise, the company has increasingly become a target for malware threats and other attacks. ISMG spoke with experts and

Apple iOS macOS MDM malware-threats bankinfosecurity EN 2022 entreprise
Researcher uses 379-year-old algorithm to crack crypto keys found in the wild https://arstechnica.com/information-technology/2022/03/researcher-uses-600-year-old-algorithm-to-crack-crypto-keys-found-in-the-wild/
15/04/2022 10:35:16
QRCode
archive.org
thumbnail

It takes only a second to crack the handful of weak keys. Are there more out there?

CVE-2022-26320 arstechnica 2022 EN RSA crack keys SafeZone
Microsoft Zero-Days, Wormable Bugs Spark Concern https://threatpost.com/microsoft-zero-days-wormable-bugs/179273/
13/04/2022 16:10:01
QRCode
archive.org
thumbnail

For April Patch Tuesday, the computing giant addressed a zero-day under active attack and several critical security vulnerabilities, including three that allow self-propagating exploits.

CVE-2022-26809 EN 2022 threatpost Vulnerabilities Patch-Tuesday zero-day CVE-2022-26904 Windows RPC
Russia’s Sandworm hackers attempted a third blackout in Ukraine https://arstechnica.com/information-technology/2022/04/russias-sandworm-hackers-attempted-a-third-blackout-in-ukraine/
13/04/2022 09:00:34
QRCode
archive.org
thumbnail

The attack was the first in five years to use Sandworm's Industroyer malware.

Sandworm Industroyer arstechnica 2022 EN cyberwar Ukraine blackout malware ICS
RaidForums hacking forum seized by police, owner arrested https://www.bleepingcomputer.com/news/security/raidforums-hacking-forum-seized-by-police-owner-arrested/
13/04/2022 08:59:27
QRCode
archive.org
thumbnail

The RaidForums hacker forum, used mainly for trading and selling stolen databases, has been shut down and its domain seized by U.S. law enforcement during Operation TOURNIQUET, an action coordinated by Europol that involved law enforcement agencies in several countries.

bleepingcomputer 2022 EN Arrest DOJ Europol FBI RaidForums
Git security vulnerability announced https://github.blog/2022-04-12-git-security-vulnerability-announced/
13/04/2022 08:12:27
QRCode
archive.org
thumbnail

GitHub is unaffected by the vulnerabilities, but users should be aware of them and upgrade their local installation of Git.

Git github 2022 EN CVE-2022-24765 CVE-2022-24767 vulnerability
The U.S. is using declassified intel to fight an info war with Russia, even when the intel isn't rock solid https://www.nbcnews.com/politics/national-security/us-using-declassified-intel-fight-info-war-russia-even-intel-isnt-rock-rcna23014
12/04/2022 17:45:04
QRCode
archive.org
thumbnail

The Biden administration has broken with precedent by using declassified intelligence in an information war against Russia — even intel that isn’t rock solid.

nbcnews EN 2022 US strategy declassified intel infowar cyberwarfare
Industroyer2: Industroyer reloaded https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/
12/04/2022 15:38:40
QRCode
archive.org
thumbnail

ESET researchers have responded to a cyber-incident that affected an energy provider in Ukraine and involved ICS-capable malware called Industroyer2.

welivesecurity Industroyer2 Industroyer EN 2022 Ukraine cyberwar ICS research
Exploiting Scratch with a malicious image https://www.mnemonic.no/blog/exploiting-scratch-with-a-malicious-image/
12/04/2022 10:03:33
QRCode
archive.org

How handcrafted SVGs in applications can compromise applications and lead to full remote code execution in MIT’s Scratch.

2020 EN mnemonic SVG Scratch CVE-2020-7750 malicious image
CVE-2022-22965 Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware https://www.trendmicro.com/en_id/research/22/d/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulner.html
12/04/2022 08:57:37
QRCode
archive.org
thumbnail

Trend Micro Threat Research observed active exploitation of the Spring4Shell vulnerability assigned as CVE-2022-22965, which allows malicious actors to weaponize and execute the Mirai botnet malware. The exploitation allows threat actors to download the Mirai sample to the “/tmp” folder and execute them after permission change using “chmod”.

We began seeing malicious activities at the start of April 2022. We also found the malware file server with other variants of the sample for different CPU architectures.

CVE-2022-22965 trendmicro EN 2022 Spring4Shell Vulnerability SpringFramework Tomcat
Browser-in-the-Middle (BitM) attack https://link.springer.com/article/10.1007/s10207-021-00548-5
12/04/2022 08:52:43
QRCode
archive.org

Man-in-the-Middle (MitM), one of the best known attacks in the world of computer security, is among the greatest concerns for professionals in the field. Main goal of MitM is to compromise confidentiality, integrity and availability of data flowing between source and destination. However, most of its many variants involve difficulties that make it not always possible. The present paper aims at modelling and describing a new method of attack, named Browser-in-the-Middle (BitM) which, despite the similarities with MitM in the way it controls the data flow between a client and the service it accesses, bypasses some of MitM’s typical shortcomings. It could be started by phishing techniques and in some cases coupled to the well-known Man-in-the-Browser (MitB) attack. It will be seen how BitM expands the range of the possible attacker’s actions, at the same time making them easier to implement. Among its features, the absence of the need to install malware of any kind on the victim’s machine and the total control it allows the attacker are to be emphasized.
Document PDF

springer EN 2021 PDF paper BitM Browser-in-the-Middle
Spionaggio cyber alla Commissione europea https://www.wired.it/article/spionaggio-commissione-europea-smartphone-spiati-nso-pegasus/
11/04/2022 15:48:58
QRCode
archive.org
thumbnail

Gli smartphone di almeno cinque funzionari di Bruxelles e del commissario alla Giustizia Reynders sono stati tenuti sotto controllo tra febbraio e settembre 2021 con software dell'azienda isrealiana Pegaus, contro cui Reynders aveva chiesto l'apertura di un'indagine

wiredit IT 2022 privacy europa sorveglianza Pegasus EU
page 227 / 239
4762 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio