Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 29 / 227
Stalkerware apps Cocospy and Spyic are exposing phone data of millions of people | TechCrunch https://techcrunch.com/2025/02/20/stalkerware-apps-cocospy-spyic-exposing-phone-data-of-millions-of-people/
23/02/2025 21:18:38
QRCode
archive.org
thumbnail

A bug in the Android and iPhone monitoring operations allows anyone to access private data exfiltrated from a victim's device.

techcrunch EN 20245 Stalkerware Android iPhone data data-leak Spyic Cocospy
WordPress ClickFix Malware Causes Google Warnings and Infected Computers https://blog.sucuri.net/2025/02/wordpress-clickfix-malware-causes-google-warnings-and-infected-computers.html
23/02/2025 21:00:41
QRCode
archive.org
thumbnail

Learn about the fake Google reCAPTCHA campaign infecting machines by tricking unsuspecting users into running malicious Powershell commands.

sucuri EN 2025 WordPress ClickFix Malware reCAPTCHA
Beware: PayPal "New Address" feature abused to send phishing emails https://www.bleepingcomputer.com/news/security/beware-paypal-new-address-feature-abused-to-send-phishing-emails/
23/02/2025 20:57:05
QRCode
archive.org
thumbnail

An ongoing PayPal email scam exploits the platform's address settings to send fake purchase notifications, tricking users into granting remote access to scammers

bleepingcomputer EN 2025 PayPal Purchase-Confirmation Remote-Access Scam ScreenConnect
Weathering the storm: In the midst of a Typhoon https://blog.talosintelligence.com/salt-typhoon-analysis/
21/02/2025 17:07:37
QRCode
archive.org
thumbnail

Cisco Talos has been closely monitoring reports of widespread intrusion activity against several major U.S. telecommunications companies, by a threat actor dubbed Salt Typhoon. This blog highlights our observations on this campaign and identifies recommendations for detection and prevention.

talosintelligence EN 2025 analysis Salt-Typhoon
Objet: Secteur du cloud - État de la menace informatique https://www.cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-001/
21/02/2025 17:04:05
QRCode
archive.org

Le Cloud computing, devenu incontournable pour les secteurs public et privé, favorise la transformation numérique mais offre également de nouvelles opportunités d’attaques et problématiques de sécurité pour les organisations qui l’utilisent.

L'ANSSI observe une augmentation des attaques contre les environnements cloud. Ces campagnes d'attaques, menées à des fins lucratives, d'espionnage et de déstabilisation, affectent les fournisseurs de services cloud (Cloud Service Provider, CSP), en partie ciblés pour les accès qu’ils peuvent offrir vers leurs clients. Elles ciblent également les environnements de clients de services cloud, dont l'hybridation des systèmes d'information générée par l'usage du cloud, augmente la surface d'attaque.

cert.ssi.gouv.fr FR 2025 cloud rapport attaques
Meet NailaoLocker: a ransomware distributed in Europe by ShadowPad and PlugX backdoors https://www.orangecyberdefense.com/global/blog/cert-news/meet-nailaolocker-a-ransomware-distributed-in-europe-by-shadowpad-and-plugx-backdoors
21/02/2025 16:59:03
QRCode
archive.org
  • An unknown threat cluster has been targeting at least between June and October 2024 European organizations, notably in the healthcare sector.
  • Tracked as Green Nailao by Orange Cyberdefense CERT, the campaign relied on DLL search-order hijacking to deploy ShadowPad and PlugX – two implants often associated with China-nexus targeted intrusions.
  • The ShadowPad variant our reverse-engineering team analyzed is highly obfuscated and uses Windows services and registry keys to persist on the system in the event of a reboot.
  • In several Incident Response engagements, we observed the consecutive deployment of a previously undocumented ransomware payload.
  • The campaign was enabled by the exploitation of CVE-2024-24919 (link for our World Watch and Vulnerability Intelligence customers) on vulnerable Check Point Security Gateways.
    IoCs and Yara rules can be found on our dedicated GitHub page here.
orangecyberdefense EN 2025 health NailaoLocker: China campaign ShadowPad PlugX Europe
German election targeted by Russian disinformation, security services warn | The Record from Recorded Future News https://therecord.media/german-election-targeted-by-russian-disinformation
21/02/2025 16:56:11
QRCode
archive.org
thumbnail

Germany’s security services warned on Friday that fake videos circulating online purporting to reveal ballot manipulation in the country’s upcoming federal elections were part of a Russian information operation.

therecord.media EN 2024 Germany disinformation Russia election
Black Basta is latest ransomware group to be hit by leak of chat logs https://therecord.media/black-basta-ransomware-group-chat-logs-leaked
21/02/2025 16:53:01
QRCode
archive.org
thumbnail

Cybersecurity researchers are analyzing about 200,000 messages from inside the high-profile Black Basta ransomware operation that were leaked recently.

therecord EN 2025 BlackBasta ransomware dataleak messages logs
Apple yanks encrypted storage in U.K. instead of allowing backdoor access https://www.washingtonpost.com/technology/2025/02/21/apple-yanks-encrypted-storage-uk-instead-allowing-backdoor-access/
21/02/2025 16:31:59
QRCode
archive.org

Company will no longer provide its highest security offering in Britain in the wake of a government order to let security officials see protected data.

washingtonpost EN 2025 Apple privacy encrypted storage backdoor
CISA and FBI: Ghost ransomware breached orgs in 70 countries https://www.bleepingcomputer.com/news/security/cisa-and-fbi-ghost-ransomware-breached-orgs-in-70-countries/
21/02/2025 07:23:21
QRCode
archive.org
thumbnail

CISA and the FBI said attackers deploying Ghost ransomware have breached victims from multiple industry sectors across over 70 countries, including critical infrastructure organizations.
#CISA #Computer #Cring #Critical #FBI #Ghost #InfoSec #Infrastructure #Ransomware #Security

bleepingcomputer EN 2025 Ghost Ransomware Critical-Infrastructure Cring CISA FBI
UK healthcare giant HCRG confirms hack after ransomware gang claims theft of sensitive data https://techcrunch.com/2025/02/20/uk-healthcare-giant-hcrg-confirms-hack-after-ransomware-gang-claims-theft-of-sensitive-data/
20/02/2025 15:07:38
QRCode
archive.org
thumbnail

The prolific Medusa ransomware group claims to have stolen troves of data from HCRG, including patients’ sensitive health data

techcrunch EN 2025 ransomware Medusa HCRG health UK
Un expert du darknet dénonce une perquisition abusive par Fedpol https://www.heidi.news/suisse/un-expert-du-darknet-denonce-une-perquisition-abusive-par-fedpol
20/02/2025 06:46:25
QRCode
archive.org
thumbnail

Luis S. est un Genevois qui recueille des données d'intérêt public sur le darknet pour les fournir aux médias romands. Dans le cadre de cette activité, il a été perquisitionné en 2023 par la police fédérale, puis blanchi. Mais entretemps, des documents ont disparu dans les supports informatiques saisis, notamment des échanges avec des journalistes.

heidi.news FR CH Suisse Fedpol darkweb darknet perquisition abusive
OpenSSH bugs threaten enterprise security, uptime https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/
19/02/2025 22:05:14
QRCode
archive.org
thumbnail

Researchers can disclose two brand-new vulnerabilities in OpenSSH now that patches have been released.

Qualys discovered the bugs in January, per its disclosure timeline. These vulnerabilities allow miscreants to perform machine-in-the-middle (MitM) attacks on the OpenSSH client and pre-authentication denial-of-service (DoS) attacks.

Patches for CVE-2025-26465 and CVE-2025-26466 were released this morning. Although their respective severity scores (6.8 and 5.9 out of 10) don't necessarily scream "patch me right away" – it certainly doesn't seem as bad as last year's regreSSHion issue – they're both likely to raise some degree of concern given the tool's prominence.

theregister EN 2025 CVE-2025-26465 CVE-2025-26466 OpenSSH bugs FreSSH
Threat Spotlight: Inside the World's Fastest Rising Ransomware Operator — BlackLock https://www.reliaquest.com/blog/threat-spotlight-inside-the-worlds-fastest-rising-ransomware-operator-blacklock/
19/02/2025 22:02:23
QRCode
archive.org
thumbnail

First observed in March 2024, “BlackLock” (aka El Dorado or Eldorado) has rapidly emerged as a major player in the ransomware-as-a-service (RaaS) ecosystem. By Q4 2024, it ranked as the 7th most prolific ransomware group on data-leak sites, fueled by a staggering 1,425% increase in activity from Q3. BlackLock uses a double extortion tactic—encrypting data while stealing sensitive information—to pressure victims with the threat of public exposure. Its ransomware is built to target Windows, VMWare ESXi, and Linux environments, though the Linux variant offers fewer features than its Windows counterpart.

reliaquest EN 2025 BlackLock Eldorado RaaS analysis ransomware gang
Ecuador's legislature says hackers attempted to access confidential information https://therecord.media/ecuador-national-assembly-cyberattack
19/02/2025 22:00:14
QRCode
archive.org
thumbnail

The National Assembly, Ecuador's unicameral legislature, says it was able to "identify and counteract" attempts by malicious hackers to breach sensitive systems.

therecord.media EN 2025 Ecuador National Assembly hackers
Microsoft spots XCSSET macOS malware variant used for crypto theft https://www.bleepingcomputer.com/news/security/microsoft-spots-xcsset-macos-malware-variant-used-for-crypto-theft/
18/02/2025 15:37:22
QRCode
archive.org
thumbnail

A new variant of the XCSSET macOS modular malware has emerged in attacks that target users' sensitive information, including digital wallets and data from the legitimate Notes app.

bleepingcomputer EN 2025 Apple Malware Supply-Chain-Attack Xcode XCSSET Security
CVE-2022-31631: High-Risk PHP Vulnerability Demands Immediate Patch https://cyble.com/blog/cve-2022-31631-vulnerability-immediate-patch/
18/02/2025 15:06:54
QRCode
archive.org
thumbnail

A critical PHP vulnerability (CVE-2022-31631) could expose websites and applications to SQL injection attacks, leading to data breaches and system compromise.

cyble EN 2025 cve-2022-31631 PHP vulnerability
Network Security Issues in RedNote https://citizenlab.ca/2025/02/network-security-issues-in-rednote/
17/02/2025 16:10:21
QRCode
archive.org
thumbnail

Our first network security analysis of the popular Chinese social media platform, RedNote, revealed numerous issues with the Android and iOS versions of the app. Most notably, we found that both the Android and iOS versions of RedNote fetch viewed images and videos without any encryption, which enables network eavesdroppers to learn exactly what content users are browsing. We also found a vulnerability in the Android version that enables network attackers to learn the contents of files on users’ devices. We disclosed the vulnerability issues to RedNote, and its vendors NEXTDATA, and MobTech, but did not receive a response from any party. This report underscores the importance of using well-supported encryption implementations, such as transport layer security (TLS). We recommend that users who are highly concerned about network surveillance from any party refrain from using RedNote until these security issues are resolved.

citizenlab EN 2025 RedNote privacy analysis social-media
Investigating Anonymous VPS services used by Ransomware Gangs https://blog.bushidotoken.net/2025/02/investigating-anonymous-vps-services.html
16/02/2025 14:40:27
QRCode
archive.org
thumbnail

One of the challenges with investigating cybercrime is the infrastructure the adversaries leverage to conduct attacks. Cybercriminal infrastructure has evolved drastically over the last 25 years, which now involves hijacking web services, content distribution networks (CDNs), residential proxies, fast flux DNS, domain generation algorithms (DGAs), botnets of IoT devices, the Tor network, and all sorts of nested services.

This blog shall investigate a small UK-based hosting provider known as BitLaunch as an example of how challenging it can be to tackle cybercriminal infrastructure. Research into this hosting provider revealed that they appear to have a multi-year history of cybercriminals using BitLaunch to host command-and-control (C2) servers via their Anonymous VPS service.

bushidotoken EN 2025 investigation VPS BitLaunch C2 Ransomware
Hidden Backdoors Uncovered in WordPress Malware Investigation https://blog.sucuri.net/2025/02/hidden-backdoors-uncovered-in-wordpress-malware-investigation.html
16/02/2025 14:38:31
QRCode
archive.org
thumbnail

Dive into our investigation of WordPress malware and find out how mu-plugins are used to hide backdoor threats.

sucuri E*N 2025 WordPress malware backdoor plugin php mu-plugins
page 29 / 227
4527 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio