Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 230 / 239
Piratage d'Okta : l'entreprise admet enquêter, LAPSUS$ revendique https://www.zdnet.fr/actualites/piratage-d-okta-l-entreprise-admet-enqueter-lapsus-revendique-39939261.htm
22/03/2022 09:37:39
QRCode
archive.org
thumbnail

Le groupe cybercriminel LAPSUS$ a publié des captures d'écran montrant ce qu'il prétend être des éléments de l'environnement informatique interne de l'entreprise.

LAPSUS$ FR 2022 zdnetfr Okta piratage
Protestware : l’open source n’échappe pas au conflit russo-ukrainien https://www.zdnet.fr/actualites/protestware-l-open-source-n-echappe-pas-au-conflit-russo-ukrainien-39939233.htm
21/03/2022 21:32:14
QRCode
archive.org
thumbnail

A travers plusieurs mises à jour de projets open source, des développeurs ont manifesté leur opposition à l’invasion russe de l’Ukraine. Si dans certains cas, l’impact se limite à des messages de sensibilisation, certains projets vont jusqu’à inclure des logiciels malveillants.

Protestware FR 2022 zdnetfr Ukraine sabotage opensource sensibilisation
Activists are targeting Russians with open-source "protestware" https://www.technologyreview.com/2022/03/21/1047489/activists-are-targeting-russians-with-open-source-protestware/
21/03/2022 21:29:30
QRCode
archive.org
thumbnail

The volunteers who run open-source software projects are changing the code so that they display anti-war messages—or even wipe entire files.

technologyreview EN 2022 volunteers protestware sabotage Ukraine cyberwar
Ukraine warns of InvisiMole attacks tied to state-sponsored Russian hackers https://www.zdnet.com/article/ukraine-warns-of-invisimole-attacks-tied-to-state-sponsored-russian-hackers/
21/03/2022 21:02:35
QRCode
archive.org
thumbnail

InvisiMole has been collaborating with the Gamaredon APT for years.

InvisiMole APT EN 2022 Russia state-sponsored ukraine zdnet phishing cyberwar
Exposing initial access broker with ties to Conti https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/
20/03/2022 10:48:30
QRCode
archive.org
thumbnail

Threat Analysis Group (TAG) observed a financially motivated threat actor we refer to as EXOTIC LILY, exploiting a 0day in Microsoft MSHTML (CVE-2021-40444). Investigating this group's activity, we determined they are an Initial Access Broker (IAB) who appear to be working with the Russian cyber crime gang known as FIN12 (Mandiant, FireEye) / WIZARD SPIDER (CrowdStrike).

GoogleTAG EXOTICLILY CVE-2021-40444 0day reseller Conti IAB
Gas Is Too Expensive; Let’s Make It Cheap! https://securelist.com/expensive-gas/83542/
20/03/2022 00:08:33
QRCode
archive.org
thumbnail

A search online lead me to a discovery I didn’t think was possible nowadays. I realized almost immediately that critical security issues were probably involved. I found that out of the many tens of thousands of gas stations the company claimed to have installed their product in, 1,000 are remotely hackable.

Internet-of-Things securelist gas-station EN 2022 shodan IoT research hacking
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus | Ars Technica https://arstechnica.com/information-technology/2022/03/sabotage-code-added-to-popular-npm-package-wiped-files-in-russia-and-belarus/
20/03/2022 00:02:22
QRCode
archive.org
thumbnail

When code with millions of downloads nukes user files, bad things can happen.

Sabotage arstechnica EN 2022 NPM Russia cyberwar node-ipc package CVE-2022-23812
OpenSSL plombé par une importante faille de sécurité https://www.lemondeinformatique.fr/actualites/lire-openssl-plombe-par-une-importante-faille-de-securite-86156.html
19/03/2022 23:57:27
QRCode
archive.org
thumbnail

La bibliothèque de chiffrement web open source OpenSSL est affectée par une vulnérabilité pouvant servir à des attaques par déni de service. Les versions 1.0.2, 1.1.1 et 3.0 doivent être mises à jour dès que possible.

lemondeinformatique FR 2022 OpenSSL DoS CVE-2022-0778 vulnérabilité
Popular NPM Package Updated to Wipe Russia, Belarus Systems to Protest Ukraine Invasion https://thehackernews.com/2022/03/popular-npm-package-updated-to-wipe.html
19/03/2022 23:54:09
QRCode
archive.org

In what's an act of deliberate sabotage, the developer behind the popular "node-ipc" NPM package shipped a new tampered version to condemn Russia's invasion of Ukraine, raising concerns about security in the open-source and the software supply chain.

thehackernews EN 2022 node-ipc developer cyberwar NPM supplychain sabotage CVE-2022-23812
L’Ukraine reconnaît « une énorme perte de communication » après la cyberattaque contre le satellite KA-SAT https://www.lemonde.fr/pixels/article/2022/03/15/l-ukraine-reconnait-une-enorme-perte-de-communication-apres-la-cyberattaque-contre-le-satellite-ka-sat_6117632_4408996.html#xtor=AL-32280270-%5Btwitter%5D-%5Bios%5D
16/03/2022 11:40:00
QRCode
archive.org
thumbnail

Lors d’une conférence de presse, un responsable ukrainien a, pour la première fois, donné des détails sur les conséquences de cette cyberattaque.

lemonde cyberattaque satellite KASAT FR 2022 Ukraine cyberwar
PROPHET SPIDER Exploits Citrix ShareFile https://www.crowdstrike.com/blog/prophet-spider-exploits-citrix-sharefile/
16/03/2022 08:46:41
QRCode
archive.org
thumbnail

At the start of 2022, CrowdStrike Intelligence and CrowdStrike Services investigated an incident in which PROPHET SPIDER exploited CVE-2021-22941 — a remote code execution (RCE) vulnerability impacting Citrix ShareFile Storage Zones Controller — to compromise a Microsoft Internet Information Services (IIS) web server. The adversary exploited the vulnerability to deploy a webshell that enabled the downloading of additional tools. This incident highlights how PROPHET SPIDER continues to evolve their tradecraft while continuing to exploit known web-server vulnerabilities.

CrowdStrike PROPHETSPIDER EN 2022 CVE-2021-22941RCE webshell ShareFile vulnerability Citrix
The Discovery and Exploitation of CVE-2022-25636 https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/
14/03/2022 16:04:52
QRCode
archive.org

A few weeks ago, I found and reported CVE-2022-25636 - a heap out of bounds write in the Linux kernel. The bug is exploitable to achieve kernel code execution (via ROP), giving full local privilege escalation, container escape, whatever you want.

cve-2022-25636 nickgregory bug Linux Kernel escape
Cyber-attaques en Suisse sur des particuliers? «On ne peut rien exclure» https://www.watson.ch/fr/!564691503
14/03/2022 00:48:58
QRCode
archive.org
thumbnail

Interview | La Suisse doit s'attendre à des cyberattaques après les sanctions contre la Russie. Seot questions à Solange Ghernaouti, experte en cybersécurité.

guerre Russie Cybercrime Suisse Interview CH 2022 FR watson Ghernaouti
Raccoon Stealer: “Trash panda” abuses Telegram https://decoded.avast.io/vladimirmartyanov/raccoon-stealer-trash-panda-abuses-telegram/
14/03/2022 00:34:57
QRCode
archive.org
thumbnail

We recently came across a stealer, called Raccoon Stealer, a name given to it by its author. Raccoon Stealer uses the Telegram infrastructure to store and update actual C&C addresses.  Raccoon Stealer is a password stealer capable of stealing not just passwords, but various types of data, including: Cookies, saved logins and forms data from […]

avast stealer EN 2022 RaccoonStealer Telegram research malware passwordstealer
Cyber Security Incident Pushes Ubisoft to Issue Internal Password Reset https://www.hackread.com/ubisoft-employee-passwordresets-cyber-security-incident/
12/03/2022 20:13:48
QRCode
archive.org
thumbnail

It is unclear what type of “Cyber Security Incident” Ubisoft suffered but on Telegram LAPSUS$ hacking group responded to the news with smirking face emoji suggesting their alleged involvement.

ubisoft en 2022 hackread LAPSUS$
Exclusive: U.S. spy agency probes sabotage of satellite internet during Russian invasion, sources say | Reuters https://www.reuters.com/world/europe/exclusive-us-spy-agency-probes-sabotage-satellite-internet-during-russian-2022-03-11/
12/03/2022 09:09:42
QRCode
archive.org
thumbnail

Western intelligence agencies are investigating a cyberattack by unidentified hackers that disrupted broadband satellite internet access in Ukraine coinciding with Russia's invasion, according to three people with direct knowledge of the incident.

reuters Viasat en 2022 sabotage Ukraine ukraine-war intelligence russia
Armis Finds Three Critical Zero-Day Vulnerabilities in APC Smart-UPS Devices, Dubbed "TLStorm," Exposing More than 20 Million Enterprise Devices https://www.prnewswire.com/news-releases/armis-finds-three-critical-zero-day-vulnerabilities-in-apc-smart-ups-devices-dubbed-tlstorm-exposing-more-than-20-million-enterprise-devices-301497137.html
11/03/2022 20:27:21
QRCode
archive.org
thumbnail

Vulnerabilities found in widely-used Uninterruptible Power Supplies could allow attackers to bypass security features and remotely take over or damage critical industrial, medical, and enterprise devices

TLStorm armis UPS APC prnewswire 2022 EN vulnerability
EU and UK launch antitrust investigation into Google and Meta’s adtech dealings - The Verge https://www.theverge.com/2022/3/11/22972384/eu-uk-antitrust-investigation-google-meta-facebook-jedi-blue-adtech-deal
11/03/2022 11:33:54
QRCode
archive.org
thumbnail

They’re accused of colluding to carve up the advertising market between them

theverge EU UK EN 2022 antitrust investigation Google Meta advertising adtech legal
BRANCH HISTORY INJECTION https://www.vusec.net/projects/bhi-spectre-bhb/?s=09
11/03/2022 10:09:52
QRCode
archive.org

On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks
BHI (or Spectre-BHB) is a revival of cross-privilege Spectre-v2 attacks on modern systems deploying in-hardware defenses. And we have a very neat end-to-end exploit leaking arbitrary kernel memory on modern Intel CPUs to prove it (PoC||GTFO right?).

vusec 2022 EN analysis spectre exploit speculative cross-privilege attack
Denmark: Datatilsynet publishes guidance on use of cloud technologies https://www.dataguidance.com/news/denmark-datatilsynet-publishes-guidance-use-cloud
11/03/2022 09:24:38
QRCode
archive.org

The Danish data protection authority ('Datatilsynet') announced, on 9 March 2022, that it had published a new guide on the use of cloud services, as well as a short overview of frequently asked questions ('FAQs'). In particular, the Datatilsynet stated that the new guide is targeted at data controllers and notes the considerations which data controllers must keep in mind when using a cloud service, including an outline of the pitfalls, opportunities, and obligations that arise when using such technologies.
Document PDF

Denmark dataguidance EN 2022 guidance cloud privacy legal EU Datatilsynet
page 230 / 239
4762 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio