Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 238 / 239
[LEAK] Maze + Egregor + Sekhmet keys along with m0yv (expiro) source code https://www.bleepingcomputer.com/forums/t/768330/leak-maze-egregor-sekhmet-keys-along-with-m0yv-expiro-source-code/
13/02/2022 21:56:22
QRCode
archive.org
thumbnail

Hello, Its developer. It was decided to release keys to the public for Egregor, Maze, Sekhmet ransomware families.
also there is a little bit harmless source code of polymorphic x86/x64 modular EPO file infector m0yv detected in the wild as Win64/Expiro virus, but it is not expiro actually, but AV engines detect it like this, so no single thing in common with...

leak Maze Egregor Sekhmet keys decryptor EN forum bleepingcomputer
Decryptor released for Maze, Egregor, and Sekhmet ransomware strains | ZDNet https://www.zdnet.com/article/decryptor-for-maze-egregor-and-sekhmet-ransomware-strains-released/
13/02/2022 21:54:50
QRCode
archive.org
thumbnail

A decryptor has been released for the Maze, Sekhmet, and Egregor ransomware after someone published the master decryption keys in a BleepingComputer forum post.

decryptor EN Egregor Maze Sekhmet ransomware
Exposed documents reveal how the powerful clean up their digital past using a reputation laundering firm https://restofworld.org/2022/documents-reputation-laundering-firm-eliminalia/
13/02/2022 11:05:29
QRCode
archive.org
thumbnail

Reputation firms like Eliminalia use legal threats and copyright notices to have material taken down around the world.

Eliminalia EN reputation laundering copyright
Les 200 mots de passe les plus populaires en 2021 https://nordpass.com/fr/most-common-passwords-list/
13/02/2022 02:00:37
QRCode
archive.org
thumbnail

Nombreux sont ceux qui utilisent les mêmes mots de passe faibles, encore et encore. Découvrez les 200 mots de passe les plus utilisés dans le monde en 2021.

FR NordPass liste 2021 passwords motsdepasse populaires
Liste des mots de passe les plus courants https://fr.wikipedia.org/wiki/Liste_des_mots_de_passe_les_plus_courants
13/02/2022 01:58:09
QRCode
archive.org

Cet article contient des listes des mots de passe les plus courants, selon différentes sources.

Wikipedia liste passwords FR motsdepasse
List of the most common passwords https://en.wikipedia.org/wiki/List_of_the_most_common_passwords
13/02/2022 01:56:54
QRCode
archive.org

This is a list of the most common passwords, discovered in various data breaches. Common passwords generally are not recommended on account of low password strength

Wikipedia EN reference list passwords common
Why is the Zoom app listening on my microphone... https://community.zoom.com/t5/Meetings/Why-is-the-Zoom-app-listening-on-my-microphone-when-not-in-a/m-p/41449#M20549
13/02/2022 01:48:22
QRCode
archive.org
thumbnail

I'm running MacOS Monterey. Several times in the last few weeks, I've noticed the orange dot indicating the microphone is being used by an app, and I click on the Control Center and see that Zoom is accessing the microphone. I'm not in a meeting and simply have the Zoom app open. Why would Zoom be accessing the microphone when I'm not in a meeting?

zoom EN macOS bug microphone
Who Needs to Exploit Vulnerabilities When You Have Macros? https://insights.sei.cmu.edu/blog/who-needs-to-exploit-vulnerabilities-when-you-have-macros/
13/02/2022 01:46:37
QRCode
archive.org
thumbnail

Recently, there has been a resurgence of malware that is spread via Microsoft Word macro capabilities....

microsoft macros office EN
esmat: New Free macOS Endpoint Security Message Analysis Tool • UX monitoring & endpoint security analytics for Windows, macOS, Citrix, VMware on Splunk https://uberagent.com/blog/esmat-new-free-macos-endpoint-security-framework-esf-message-analysis-tool/
13/02/2022 01:45:21
QRCode
archive.org

We’re happy to announce the public release of esmat, a new free & open-source tool. esmat is a command-line app for macOS that allows you to explore the behavior of Apple’s Endpoint Security framework.

macOS EN tool esmat commandline endpointsecurityframework apple log logging
Operation EmailThief: Active Exploitation of Zero-day XSS Vulnerability in Zimbra https://www.volexity.com/blog/2022/02/03/operation-emailthief-active-exploitation-of-zero-day-xss-vulnerability-in-zimbra/
13/02/2022 01:37:20
QRCode
archive.org
thumbnail
Volexity EN Zimbra 0-day TEMP_Heretic
PwnKit: Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec (CVE-2021-4034) https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034
13/02/2022 01:35:15
QRCode
archive.org
thumbnail

The Qualys Research Team has discovered a memory corruption vulnerability in polkit's pkexec, a SUID-root program that is installed by default on every major…

Qualys EN PwnKit Linux CVE-2021-4034 polkit pkexec
Utilisation de Google Analytics et transferts de données vers les États-Unis : la CNIL met en demeure un gestionnaire de site web https://www.cnil.fr/fr/utilisation-de-google-analytics-et-transferts-de-donnees-vers-les-etats-unis-la-cnil-met-en-demeure
13/02/2022 01:32:23
QRCode
archive.org

Google Analytics est une fonctionnalité qui peut être intégrée par les gestionnaires de sites web tels que des sites de vente en ligne afin d’en mesurer la fréquentation par les internautes. Dans ce cadre, un identifiant unique est attribué à chaque visiteur. Cet identifiant (qui constitue une donnée personnelle) et les données qui lui sont associées sont transférés par Google aux États-Unis.

CNIL FR google googleanalytics RGPD GDPR
Helping users stay safe: Blocking internet macros by default in Office https://techcommunity.microsoft.com/t5/microsoft-365-blog/helping-users-stay-safe-blocking-internet-macros-by-default-in/ba-p/3071805
13/02/2022 01:30:37
QRCode
archive.org
thumbnail

Changing Default Behavior

We’re introducing a default change for five Office apps that run macros:
VBA macros obtained from the internet will now be blocked by default.

Microsoft EN change macros Office VBA
Google Project Zero: Vendors are now quicker at fixing zero-days https://www.bleepingcomputer.com/news/security/gooject-zero-vendors-are-now-quicker-at-fixing-zero-days/ogle-pr
11/02/2022 18:52:36
QRCode
archive.org

Google's Project Zero has published a report showing that organizations took less time to address the zero-day vulnerabilities that the team reported last year.

googleprojectzero EN 0-day metrics bleepingcomputer
A walk through Project Zero metrics https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html
11/02/2022 18:47:14
QRCode
archive.org
thumbnail
  • In 2021, vendors took an average of 52 days to fix security vulnerabilities reported from Project Zero. This is a significant acceleration from an average of about 80 days 3 years ago.
  • In addition to the average now being well below the 90-day deadline, we have also seen a dropoff in vendors missing the deadline (or the additional 14-day grace period). In 2021, only one bug exceeded its fix deadline, though 14% of bugs required the grace period.
  • Differences in the amount of time it takes a vendor/product to ship a fix to users reflects their product design, development practices, update cadence, and general processes towards security reports. We hope that this comparison can showcase best practices, and encourage vendors to experiment with new policies.
  • This data aggregation and analysis is relatively new for Project Zero, but we hope to do it more in the future. We encourage all vendors to consider publishing aggregate data on their time-to-fix and time-to-patch for externally reported vulnerabilities, as well as more data sharing and transparency in general.
googleprojectzero metrics bug 0-day EN
UPnProxy: Eternal Silence https://www.akamai.com/blog/security/upnproxy-eternal-silence
11/02/2022 18:39:36
QRCode
archive.org

UPnProxy is alive and well. There are 277,000 devices, out of a pool of 3.5 million, running vulnerable implementations of UPnP. Of those, Akamai can confirm that more than 45,000 have been compromised in a widely distributed UPnP NAT injection campaign.

Akamai EN UPnProxy EternalSilence UPnP
FritzFrog: P2P Botnet Hops Back on the Scene https://www.akamai.com/blog/security/fritzfrog-p2p
11/02/2022 18:37:08
QRCode
archive.org

FritzFrog is a peer-to-peer botnet, which means its command and control server is not limited to a single, centralized machine, but rather can be done from every machine in its distributed network. In other words, every host running the malware process becomes part of the network, and is capable of sending, receiving, and executing the commands to control machines in the network.

FritzFrog botnet EN Akamai
CISA Adds One Known Exploited Vulnerability to Catalog https://www.cisa.gov/uscert/ncas/current-activity/2022/02/11/cisa-adds-one-known-exploited-vulnerability-catalog
11/02/2022 18:32:07
QRCode
archive.org

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerability listed in the table below. These types of vulnerabilities are a frequent attack vector for malicious cyber actors of all types and pose significant risk to the federal enterprise.

uscert csirt CISA EN CVE-2022-22620
Mettez à jour iOS ! WebKit contient une vulnérabilité dangereuse https://www.kaspersky.fr/blog/webkit-vulnerability-cve-2022-22620/18550/
11/02/2022 18:30:02
QRCode
archive.org
thumbnail

Apple a publié iOS 15.3.1 pour corriger la vulnérabilité CVE-2022-22620 de WebKit, qui serait activement exploitée par les cybercriminels.

version EN

CVE-2022-22620 Apple iOS iPadOS WebKit Safari FR Kaspersky
Nouvelle version de Safari 15.3 sur Big Sur et Catalina pour combler une faille importante | MacGeneration https://www.macg.co/logiciels/2022/02/nouvelle-version-de-safari-153-sur-big-sur-et-catalina-pour-combler-une-faille-importante-127163
11/02/2022 18:25:31
QRCode
archive.org
thumbnail

"Sorti hier, macOS 12.2.1 règle un problème de sécurité dans WebKit, le moteur de Safari, qui aurait pu permettre à une personne malintentionnée d'exécuter du code arbitraire en faisant simplement visiter à l'utilisateur une page web malveillante (CVE-2022-22620). Si votre Mac n'est pas compatible avec macOS Monterey, une mise à jour individuelle de Safari est disponible."

CVE-2022-22620 Safari BigSur Catalina FR
page 238 / 239
4762 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio