Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 24 / 76
1513 résultats taggé 2024  ✕
Europe’s privacy watchdog probes Google over data used for AI training https://arstechnica.com/tech-policy/2024/09/europes-privacy-watchdog-probes-google-over-data-used-for-ai-training/
12/09/2024 16:12:53
QRCode
archive.org
thumbnail

Meta and X have already paused some AI training over same set of concerns.

arstechnica EN 2024 Meta AI probe training EU Google watchdog privacy legal
Telegram: 'The dark web in your pocket' https://www.bbc.com/news/articles/cdey4prn3e1o
12/09/2024 15:16:59
QRCode
archive.org
thumbnail

The arrest of Telegram’s chief executive in France has ignited a debate about moderation on his app.
About nine months ago while researching a story, I found myself added to a large Telegram channel which was focused on selling drugs.
I was then added to one about hacking and then one about stolen credit cards.
I realised my Telegram settings had made it possible for people to add me to their channels without me doing anything. I kept the settings the same to see what would happen.

bbc EN 2024 Telegram the-dark-web-in-your-pocket
Enquête ESET : le cybergang CosmicBeetle cible des entreprises françaises et devient affilié de RansomHub | UnderNews https://www.undernews.fr/hacking-hacktivisme/enquete-eset-le-cybergang-cosmicbeetle-cible-des-entreprises-francaises-et-devient-affilie-de-ransomhub.html
11/09/2024 21:48:49
QRCode
archive.org
thumbnail

ESET découvre que le groupe CosmicBeetle s'associe à d'autres gangs de ransomwares et cible des entreprises en France. Tribune ESET. Les chercheurs d'ESET ont mené l’enquête sur ScRansom, un nouveau ransomware développé par le groupe CosmicBeetle. CosmicBeetle a débuté avec les outils Lockbit qui ont fuité. CosmicBeetle est probablement devenu récement un affilié RansomHub ScRansom

undernews FR 2024 cosmicbeetle ransomhub ransomware scransom
Microsoft Says Windows Update Zero-Day Being Exploited to Undo Security Fixes https://www.securityweek.com/microsoft-says-windows-update-zero-day-being-exploited-to-undo-security-fixes/
11/09/2024 21:46:57
QRCode
archive.org

Microsoft on Tuesday raised an alarm for in-the-wild exploitation of a critical flaw in Windows Update, warning that attackers are rolling back security fixes on certain versions of its flagship operating system.

securityweek EN 2024 CVE-2024-43491 Downdate Zero-Day in-the-wild Undo exploitation Windows Update Windows-Update
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/
11/09/2024 21:45:21
QRCode
archive.org
thumbnail

We recently performed research that started off "well-intentioned" (or as well-intentioned as we ever are) - to make vulnerabilities in WHOIS clients and how they parse responses from WHOIS servers exploitable in the real world (i.e. without needing to MITM etc).

As part of our research, we discovered that a few years ago the WHOIS server for the .MOBI TLD migrated from whois.dotmobiregistry.net to whois.nic.mobi – and the dotmobiregistry.net domain had been left to expire seemingly in December 2023.

watchtowr EN 2024 DNS WHOIS domain renes
A glimpse into the Quad7 operators' next moves and associated botnets https://blog.sekoia.io/a-glimpse-into-the-quad7-operators-next-moves-and-associated-botnets/#h-conclusion
11/09/2024 20:35:54
QRCode
archive.org
thumbnail

Uncover the secrets of the Quad7 botnet and its ever-evolving toolset. Learn about the new backdoors and protocols used by these operators.

sekoia EN 2024 Quad7 botnet toolset backdoors analysis
Tracking Ransomware - August 2024 - CYFIRMA https://www.cyfirma.com/research/tracking-ransomware-august-2024/
11/09/2024 15:09:29
QRCode
archive.org
thumbnail

August 2024 witnessed a noticeable increase in ransomware activity, with emerging groups like Lynx and RansomHub showing dramatic...

cyfirma EN 2024 ransomware report August2024 RansomHub
Wifi routers and VPN appliances targeted by notorious botnet Quad7 https://cybernews.com/security/wifi-routers-and-vpn-appliances-targeted-by-quad7/
10/09/2024 10:32:27
QRCode
archive.org

The mysterious Quad7 botnet has evolved its tactics to compromise several brands of Wi-Fi routers and VPN appliances. It’s armed with new backdoors, multiple vulnerabilities, some of which were previously unknown, and new staging servers and clusters, according to a report by Sekoia, a cybersecurity firm.

cybernews EN 2024 quad7 TP-Link VPN appliances routers targeted
Arctic Wolf Observes Akira Ransomware Campaign Targeting SonicWall SSLVPN Accounts https://arcticwolf.com/resources/blog/arctic-wolf-observes-akira-ransomware-campaign-targeting-sonicwall-sslvpn-accounts/
10/09/2024 08:26:42
QRCode
archive.org
thumbnail

In recent threat activity observed by Arctic Wolf, Akira ransomware affiliates carried out ransomware attacks with an initial access vector involving the compromise of SSLVPN user accounts on SonicWall devices.

arcticwolf EN 2024 SonicWall Akira SSLVPN ransomware CVE-2024-40766
Critical SonicWall SSLVPN bug exploited in ransomware attacks https://www.bleepingcomputer.com/news/security/critical-sonicwall-sslvpn-bug-exploited-in-ransomware-attacks/
10/09/2024 08:23:13
QRCode
archive.org
thumbnail

Ransomware affiliates exploit a critical security vulnerability in SonicWall SonicOS firewall devices to breach victims' networks.

bleepingcomputer EN 2024 SonicWall SSLVPN bug CVE-2024-40766
Data Privacy Framework – swissprivacy.law https://swissprivacy.law/313/
10/09/2024 08:12:06
QRCode
archive.org

À l'occasion d'un communiqué de presse publié le 14 août 2024, le Conseil fédéral a approuvé le Swiss-U.S. Data Privacy Framework (Swiss-U.S. DPF) et arrêté son en vigueur au 15 septembre 2024. Selon cette décision, les entreprises américaines participant au Swiss-U.S. DPF garantissent un niveau adéquat de protection des données en vertu de la LPD, de sorte que les données personnelles peuvent être transférées aux entreprises américaines participantes sans avoir à conclure de clauses contractuelles types adoptées par la Commission Européenne (SCC) et sans qu'il soit nécessaire de procéder à une analyse d'impact du transfert de données.

swissprivacy FR 2024 Suisse Swiss-U.S. US Swiss-US-Data-Privacy-Framework legal
Veeam Backup & Response - RCE With Auth, But Mostly Without Auth (CVE-2024-40711) https://labs.watchtowr.com/veeam-backup-response-rce-with-auth-but-mostly-without-auth-cve-2024-40711-2/
09/09/2024 22:08:37
QRCode
archive.org
thumbnail

Every sysadmin is familiar with Veeam’s enterprise-oriented backup solution, ‘Veeam Backup & Replication’. Unfortunately, so is every ransomware operator, given it's somewhat 'privileged position' in the storage world of most enterprise's networks. There's no point deploying cryptolocker malware on a target unless you can also deny access to backups, and so, this class of attackers absolutely loves to break this particular software.
With so many eyes focussed on it, then, it is no huge surprise that it has a rich history of CVEs. Today, we're going to look at the latest episode - CVE-2024-40711.
Well, that was a complex vulnerability, requiring a lot of code-reading! We’ve successfully shown how multiple bugs can be chained together to gain RCE in a variety of versions of Veeam Backup & Replication.

watchtowr EN 2024 EN Veeam CVE-2024-40711 analysis PoC
Sextortion scams now use your "cheating" spouse’s name as a lure https://www.bleepingcomputer.com/news/security/sextortion-scams-now-use-your-cheating-spouses-name-as-a-lure/
09/09/2024 21:15:53
QRCode
archive.org
thumbnail

A new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is cheating on them, with links to the alleged proof.

bleepingcomputer EN 2024 Cheating Spouse Extortion Security Sextortion
New Android SpyAgent Campaign Steals Crypto Credentials via Image Recognition https://www.mcafee.com/blogs/other-blogs/mcafee-labs/new-android-spyagent-campaign-steals-crypto-credentials-via-image-recognition/
09/09/2024 21:14:57
QRCode
archive.org
thumbnail

Authored by SangRyol Ryu Recently, McAfee’s Mobile Research Team uncovered a new type of mobile malware that targets mnemonic keys by scanning for images

mcafee EN 2024 SpyAgent Campaign OCR Android
Russia focusing on US social media stars to covertly influence voters https://www.reuters.com/world/russia-focusing-american-social-media-stars-covertly-influence-voters-2024-09-09/
09/09/2024 16:07:16
QRCode
archive.org

Russia is increasingly turning to American social media stars to covertly influence voters ahead of the 2024 presidential election, according to U.S. officials and recently unveiled criminal charges.
“What we see them doing is relying on witting and unwitting Americans to seed, promote and add credibility to narratives that serve these foreign actors’ interest,” a senior intelligence official said in a briefing on Friday. “These foreign countries typically calculate that Americans are more likely to believe other Americans’ views.”

reuters EN 2024 US social media stars influence Russia presidential election
Major US car rental breach exposes hundreds of thousands https://cybernews.com/cybercrime/avis-car-rental-data-breach/
09/09/2024 12:09:07
QRCode
archive.org

Attackers roamed the systems of Avis Car Rental, a major car rental service provider, for several days, accessing data of nearly 300,000 individuals.

Malicious actors breached Avis systems on August 3rd and roamed inside the system for three days until the company secured its networks.

The company’s data breach notification letter, submitted to the Maine Attorney General’s Office, states that Avis discovered the breach on August 5th, indicating it took at least one day to kick the malicious actors out.

cybernews EN 2024 US avis Data-Breach car rental
Une faille dans le HDMI permet de voler des mots de passe et des informations sensibles https://www.journaldugeek.com/2024/08/31/une-faille-dans-le-hdmi-permet-de-voler-des-mots-de-passe-et-des-informations-sensibles/
08/09/2024 19:31:00
QRCode
archive.org
thumbnail

Il existe une méthode pour intercepter des informations sensibles en exploitant les émissions électromagnétiques des câbles HDMI ! Cette technique, qui s'appuie sur l'intelligence artificielle, permet de reconstituer ce qui est affiché sur un écran avec une précision inquiétante.

journaldugeek FR 2024 Deep-Tempest HDMI intercepter ondes émissions électromagnétiques câble
Progress LoadMaster vulnerable to 10/10 severity RCE flaw https://www.bleepingcomputer.com/news/security/progress-loadmaster-vulnerable-to-10-10-severity-rce-flaw/
08/09/2024 18:43:58
QRCode
archive.org
thumbnail

Progress Software has issued an emergency fix for a maximum (10/10) severity vulnerability impacting its LoadMaster and LoadMaster Multi-Tenant (MT) Hypervisor products that allows attackers to remotely execute commands on the device.

bleepingcomputer EN 2024 LoadMaster Progress-Software RCE Remote-Command-Execution Vulnerability
Free Russia Foundation to investigate data breach after internal documents published online — Novaya Gazeta Europe https://novayagazeta.eu/articles/2024/09/07/free-russia-foundation-to-investigate-data-breach-after-internal-documents-published-online-en-news
08/09/2024 15:51:06
QRCode
archive.org
thumbnail

One of Russia’s most prominent pro-democracy organisations, the Free Russia Foundation, announced that it was investigating a potential cyberattack on Friday, following a leak of thousands of emails and documents related to its work.

novayagazeta EN 2024 investigation Data-Leak Russia pro-democracy cyberattack
The state of sandbox evasion techniques in 2024 https://fudgedotdotdot.github.io/posts/sandbox-evasion-in-2024/sandboxes.html
08/09/2024 11:12:24
QRCode
archive.org

This post is about sandbox evasion techniques and their usefulness in more targeted engagements.

There's a lot of sandbox evasion techniques, some are simple: query WMI, some are cool: parsing SMBIOS tables, most try to detect sandbox artifacts. I wanted to know if these techniques are still effective for detecting sandboxes, or if the sandboxes have since been updated to counter them.

fudgedotdotdot EN 2024 sandbox-evasion technique analysis
page 24 / 76
4527 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio