Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 24 / 200
3996 résultats taggé EN  ✕
Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/
23/03/2025 10:56:48
QRCode
archive.org
thumbnail

Starting in December 2024, leading up to some of the busiest travel days, Microsoft Threat Intelligence identified a phishing campaign that impersonates online travel agency Booking.com and targets organizations in the hospitality industry. The campaign uses a social engineering technique called ClickFix to deliver multiple credential-stealing malware in order to conduct financial fraud and theft. […]

microsoft EN 2025 microsoft Phishing campaign credential-stealing malware Booking.com ClickFix
SSD Advisory - Linux kernel hfsplus slab-out-of-bounds Write - SSD Secure Disclosure https://ssd-disclosure.com/ssd-advisory-linux-kernel-hfsplus-slab-out-of-bounds-write/
22/03/2025 10:12:34
QRCode
archive.org
thumbnail

This advisory describes an out-of-bounds write vulnerability in the Linux kernel that achieves local privilege escalation on Ubuntu 22.04 for active user sessions.

Credit
An independent security researcher working with SSD Secure Disclosure.

Vendor Response
Ubuntu has released the following advisory and fix: https://ubuntu.com/security/CVE-2025-0927

ssd-disclosure EN 2025 CVE-2025-0927 Linux kernel hfsplus slab-out-of-bounds Write
Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440 https://isc.sans.edu/diary/rss/31782
21/03/2025 08:57:27
QRCode
archive.org
thumbnail

Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440, Author: Johannes Ullrich

sans EN 2025 CVE-2024-20439 CVE-2024-20440 Exploit attempts Cisco Smart-Licensing-Utility
StarkeBlog - CVE Wednesday - CVE-2024-20439 https://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html
21/03/2025 08:55:41
QRCode
archive.org

Cisco recently released an advisory for CVE-2024-20439 here. (nvd) Please note I did not discover this vulnerability, I just reverse engineered the vulnerability from the advisory

starkeblog EN vulnerabilty CVE-2024-20439 Cisco Smart-Licensing-Utility reverse
VSCode extensions found downloading early-stage ransomware https://www.bleepingcomputer.com/news/security/vscode-extensions-found-downloading-early-stage-ransomware/
21/03/2025 08:31:59
QRCode
archive.org
thumbnail

Two malicious VSCode Marketplace extensions were found deploying in-development ransomware from a remote server, exposing critical gaps in Microsoft's review process.

bleepingcomputer EN 2025 Coding Extensions Microsoft PowerShell Ransomware VSCode Marketplace
A well-funded Moscow-based global ‘news’ has infected Western artificial intelligence tools worldwide with Russian propaganda https://www.newsguardrealitycheck.com/p/a-well-funded-moscow-based-global
20/03/2025 12:20:06
QRCode
archive.org

A Moscow-based disinformation network named “Pravda” — the Russian word for "truth" — is pursuing an ambitious strategy by deliberately infiltrating the retrieved data of artificial intelligence chatbots, publishing false claims and propaganda for the purpose of affecting the responses of AI models on topics in the news rather than by targeting human readers, NewsGuard has confirmed. By flooding search results and web crawlers with pro-Kremlin falsehoods, the network is distorting how large language models process and present news and information. The result: Massive amounts of Russian propaganda — 3,600,000 articles in 2024 — are now incorporated in the outputs of Western AI systems, infecting their responses with false claims and propaganda.

newsguardrealitycheck EN 2025 Pravda propaganda pollution LLM network
Critical Veeam Backup & Replication CVE-2025-23120 https://www.rapid7.com/blog/post/2025/03/19/etr-critical-veeam-backup-and-replication-cve-2025-23120/
20/03/2025 08:27:02
QRCode
archive.org
thumbnail

On Wednesday, March 19, 2025, backup and recovery software provider Veeam published a security advisory for a critical remote code execution vulnerability tracked as CVE-2025-23120. The vulnerability affects Backup & Replication systems that are domain joined. Veeam explicitly mentions that domain-joined backup servers are against security and compliance best practices, but in reality, we believe this is likely to be a relatively common configuration

rapid7 EN 2025 Replication CVE-2025-23120 vulnerabilty Veeam
Virtue or Vice? A First Look at Proliferating Spyware Operations https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/
20/03/2025 06:49:33
QRCode
archive.org
thumbnail

In our first investigation into Israel-based spyware company, Paragon Solutions, we begin to untangle multiple threads connected to the proliferation of Paragon's mercenary spyware operations across the globe. This report includes an infrastructure analysis of Paragon’s spyware product, called Graphite; a forensic analysis of infected devices belonging to members of civil society; and a closer look at the use of Paragon spyware in both Canada and Italy.

citizenlab EN 2025 investigation Paragon spyware Canada Italy Graphite mercenary
Secure Annex - Enterprise Browser Extension Security & Management Platform https://secureannex.com/blog/buying-browser-extensions/
19/03/2025 21:07:40
QRCode
archive.org
thumbnail

An investigation into buying access to browsers through extensions

secureannex EN 2025 investigation Browser Extension buying extensions
Infostealers fueled cyberattacks and snagged 2.1B credentials last year | CyberScoop https://cyberscoop.com/infostealers-cybercrime-surged-2024-flashpoint/?ref=metacurity.com
19/03/2025 21:05:04
QRCode
archive.org

Inexpensive information-stealing malware surged in 2024, infecting 23 million hosts, according to Flashpoint.

cyberscoop EN 2025 Infostealers cyberattacks Flashpoint report
Over 16.8 Billion Records Exposed as Data Breaches Increase 6% https://www.infosecurity-magazine.com/news/168-billion-records-exposed/?ref=metacurity.com
19/03/2025 21:04:34
QRCode
archive.org
thumbnail

Flashpoint data points to a surge in data breaches fueled by compromised credentials, ransomware and exploits

infosecurity-magazine EN 2025 Flashpoint Exposed Data-Breach 2024 Report
Apple's Passwords app was vulnerable to phishing attacks for nearly three months after launch https://9to5mac.com/2025/03/18/apples-passwords-app-was-vulnerable-to-phishing-attacks-for-nearly-three-months-after-launch/?ref=metacurity.com
19/03/2025 21:02:20
QRCode
archive.org

In iOS 18, Apple spun off its Keychain password management tool—previously only tucked away in Settings—into a standalone app called...

9to5mac EN 2025 iOS apple passwords http app vulnerable phishing Keychain
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping.... https://www.cobaltstrike.com/blog/cobalt-strike-411-shh-beacon-is-sleeping
19/03/2025 20:36:07
QRCode
archive.org
thumbnail

Strike 4.11 introduces a novel Sleepmask, a novel process injection technique, new out-of-the-box obfuscation options for Beacon, asynchronous BOFs, and a DNS over HTTPS (DoH) Beacon.

cobaltstrike EN 2025 feature sleep-mode Sleepmask process-injection
Facial Recognition Injection Attacks - An Overview https://www.scip.ch/en/?labs.20250318
19/03/2025 09:35:35
QRCode
archive.org
thumbnail

Facial Recognition Injection Attacks involve injecting tampered video feeds or deepfakes into facial recognition systems to bypass security. Current attack types include Virtual Video Injections, Hardware-based Video Injections, Device Emulation and Function Hooking.

scip EN 2025 Facial Recognition Injection Attacks Complexity Deepfake
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs https://tinyhack.com/2025/03/13/decrypting-encrypted-files-from-akira-ransomware-linux-esxi-variant-2024-using-a-bunch-of-gpus/
17/03/2025 21:21:35
QRCode
archive.org
thumbnail

I recently helped a company recover their data from the Akira ransomware without paying the ransom. I’m sharing how I did it, along with the full source code.

The code is here: https://github.com/yohanes/akira-bruteforce

To clarify, multiple ransomware variants have been named Akira over the years, and several versions are currently circulating. The variant I encountered has been active from late 2023 to the present (the company was breached this year).

tinyhack EN 2025 Akia ransomware akira-bruteforce decrypt brute-forcing
Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours — new counterattack breaks encryption | Tom's Hardware https://www.tomshardware.com/tech-industry/cyber-security/akira-ransomware-cracked-with-rtx-4090-new-exploit-to-brute-force-encryption-attack
17/03/2025 21:20:17
QRCode
archive.org
thumbnail

Tinyhack publishes a full how-to guide on brute-forcing past the Akira ransomware's encryption attack and freeing captive files.

tomshardware EN 2025 Akira ransomware RTX4090 ceack Tinyhack brute-forcing
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices https://blog.eclecticiq.com/inside-bruted-black-basta-raas-members-used-automated-brute-forcing-framework-to-target-edge-network-devices
17/03/2025 21:13:53
QRCode
archive.org
thumbnail

On February 11, 2025, a Russian speaking actor using the Telegram handle @ExploitWhispers [1], leaked internal chat logs of Black Basta Ransomware-as-a-Service (RaaS) members [2]. These communications, spanning from September 2023 to September 2024, provide an insider look on the group's operational tactics.

eclecticiq EN 2025 BRUTED BlackBasta Bruteforce
Apple Drops Another WebKit Zero-Day Bug https://www.darkreading.com/mobile-security/apple-drops-another-webkit-zero-day-bug
17/03/2025 09:17:49
QRCode
archive.org

For the third time in as many months, Apple has released an emergency patch to fix an already exploited zero-day vulnerability impacting a wide range of its products.

The new vulnerability, identified as CVE-2025-24201, exists in Apple's WebKit open source browser engine for rendering Web pages in Safari and other apps across macOS, iOS, and iPadOS. WebKit is a frequent target for attackers because of how deeply integrated it is with Apple's ecosystem.

darkreading EN 2025 CVE-2025-24201spyware Apple vulnerability 0-day WebKit
New Ransomware Operator Exploits Fortinet Vulnerability Duo https://www.forescout.com/blog/new-ransomware-operator-exploits-fortinet-vulnerability-duo/
14/03/2025 17:19:23
QRCode
archive.org

Between late January and early March, Forescout Research – Vedere Labs identified a series of intrusions based on two Fortinet vulnerabilities. It began with the exploitation of Fortigate firewall appliances — culminating in the deployment of a newly discovered ransomware strain we have dubbed SuperBlack.

forescout EN 2025 Fortinet vulnerabilities SuperBlack ransomware
ICANN moves to retire Soviet-era .SU country domain name - Domain Name Wire https://domainnamewire.com/2025/03/11/icann-moves-to-retire-soviet-era-su-country-domain-name/
14/03/2025 16:12:22
QRCode
archive.org
thumbnail

Domain system overseer plans to retire .su in 2030. ICANN has notified the operator of the legacy Soviet Union country code domain, .su, of its plans to retire the domain in five years, Domain Name Wire has learned. The .su namespace, which remains open for new registrations and currently has around 100,000 domain names, is […]

domainnamewire EN 2025 TDL country ICANN 2030 Soviet-Union
page 24 / 200
4551 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio