Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 3 / 41
815 résultats taggé 2022  ✕
An infostealer comes to town: Dissecting a highly evasive malware targeting Italy https://blog.cluster25.duskrise.com/2022/12/22/an-infostealer-comes-to-town
23/12/2022 22:35:26
QRCode
archive.org
thumbnail

Cluster25 researchers analyzed several campaigns (also publicly reported by CERT-AGID) that used phishing emails to spread an InfoStealer malware written in .NET through an infection chain that involves Windows Shortcut (LNK) files and Batch Scripts (BAT). Taking into account the used TTPs and extracted evidence, the attacks seem perpetrated by the same adversary (internally named AUI001).

cluster25 EN 2022 infostealer Italy phishing Campaigns analysis Alibaba2044 IoCs
Notice of Recent Security Incident https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/
22/12/2022 23:25:58
QRCode
archive.org
thumbnail

We are working diligently to understand the scope of the incident and identify what specific information has been accessed.

lastpass EN 2022 incident backup hack exfiltration
New Ransomware Strains Emerging from Leaked Conti’s Source Code   https://blog.cyble.com/2022/12/22/new-ransomware-strains-emerging-from-leaked-contis-source-code/
22/12/2022 22:59:19
QRCode
archive.org
thumbnail

Cyble Research and Intelligence Labs analyzes multiple ransomware strains created based on leaked source code of Conti Ransomware.

cyble EN 2022 Conti Leaked sourcecode ransomware strains analysis
EXCLUSIVE: TikTok Spied On Forbes Journalists https://www.forbes.com/sites/emilybaker-white/2022/12/22/tiktok-tracks-forbes-journalists-bytedance/
22/12/2022 22:52:20
QRCode
archive.org
thumbnail

ByteDance confirmed it used TikTok to monitor journalists’ physical location using their IP addresses, as first reported by Forbes in October.

forbes 2022 TikTok ByteDance China mattis-et-ultricies-eget Mauris-felis-urna
Meddler-in-the-Middle Phishing Attacks Explained MitM https://unit42.paloaltonetworks.com/meddler-phishing-attacks/
22/12/2022 22:47:44
QRCode
archive.org
thumbnail

Meddler-in-the-Middle (MitM) phishing attacks show how threat actors find ways to get around traditional defenses and advice.

unit42 EN 2022 MitM phishing Meddler-in-the-Middle explanation analysis
Stolen certificates in two waves of ransomware and wiper attacks https://securelist.com/ransomware-and-wiper-signed-with-stolen-certificates/108350/
22/12/2022 22:45:01
QRCode
archive.org
thumbnail

In this report, we compare the ROADSWEEP ransomware and ZEROCLEARE wiper versions used in two waves of attacks against Albanian government organizations.

securelist 2022 EN Malware Malware-Descriptions Malware-Technologies Ransomware Targeted-attacks Trojan Wiper Albania
New Kiss-a-dog Cryptojacking Campaign Targets Docker and Kubernetes https://www.crowdstrike.com/blog/new-kiss-a-dog-cryptojacking-campaign-targets-docker-and-kubernetes/
22/12/2022 10:08:41
QRCode
archive.org
thumbnail

CrowdStrike has uncovered a new cryptojacking campaign targeting vulnerable Docker and Kubernetes infrastructure using an obscure domain from the payload, container escape attempt and anonymized “dog” mining pools.

Called “Kiss-a-dog,” the campaign used multiple command-and-control (C2) servers to launch attacks that attempted to mine cryptocurrency, utilize user and kernel mode rootkits to hide the activity, backdoor compromised containers, move laterally in the network and gain persistence. 

The CrowdStrike Falcon® platform helps protect organizations of all sizes from sophisticated breaches, including cryptojacking campaigns such as this. 

crowdstrike EN 2022 Kiss-a-dog Cryptojacking docker kubernetes
A Roomba recorded a woman on the toilet. How did screenshots end up on Facebook? https://www.technologyreview.com/2022/12/19/1065306/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy/
21/12/2022 20:14:56
QRCode
archive.org
thumbnail

Robot vacuum companies say your images are safe, but a sprawling global supply chain for data from our devices creates risk.

technologyreview EN 2022 privacy robots robot-vacuums iRobot Roomba Amazon artificial-intelligence machine-learning computer-vision internet-of-things surveillance privacy Federal-Trade-Commission
Guardian hit by serious IT incident believed to be ransomware attack https://www.theguardian.com/media/2022/dec/21/guardian-hit-by-serious-it-incident-believed-to-be-ransomware-attack
21/12/2022 20:00:59
QRCode
archive.org
thumbnail

Incident has hit parts of media company’s technology infrastructure, with staff told to work from home

theguardian EN 2022 incident ransomware attack
Okta's source code stolen after GitHub repositories hacked https://www.bleepingcomputer.com/news/security/oktas-source-code-stolen-after-github-repositories-hacked/
21/12/2022 11:05:22
QRCode
archive.org
thumbnail

In a 'confidential' email notification sent by Okta and seen by BleepingComputer, the company states that attackers gained access to its GitHub repositories this month and stole the company's source code.

bleepingcomputer en 2022 GitHub Okta Source-Code Theft
2022: A Look Back On A Year Of Mass Exploitation https://www.greynoise.io/blog/2022-a-look-back-on-a-year-of-mass-exploitation
21/12/2022 00:08:18
QRCode
archive.org
thumbnail

Researchers at GreyNoise Intelligence have added over 230 tags since January 1, 2022, which include detections for over 160 CVEs. In today’s release of the GreyNoise Intelligence 2022 "Year of Mass Exploits" retrospective report, we showcase four of 2022's most pernicious and pwnable vulnerabilities.

greynoise 2022 EN review Intelligence retrospective
SentinelSneak: Malicious PyPI module poses as security software development kit https://blog.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk
21/12/2022 00:05:00
QRCode
archive.org
thumbnail

A malicious Python file found on the PyPI repo adds backdoor and data exfiltration features to what appears to be a legitimate SDK client from SentinelOne.

reversinglabs EN 2022 PyPI Supply-chain-security Python exfiltration module kit
CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange https://securelist.com/cve-2022-41040-and-cve-2022-41082-zero-days-in-ms-exchange/108364/
20/12/2022 17:56:09
QRCode
archive.org
thumbnail

At the end of September, GTSC reported the finding of two 0-day vulnerabilities in Microsoft Exchange Server, CVE-2022-41040 and CVE-2022-41082. The cybersecurity community dubbed the pair of vulnerabilities ProxyNotShell.

securelist EN 2022 DLL-hijacking Malware-Descriptions Microsoft-Exchange Trojan Vulnerabilities-and-exploits Zero-day CVE-2022-41040 CVE-2022-41082 analysis
Get root on macOS 13.0.1 with CVE-2022-46689, the macOS Dirty Cow bug https://worthdoingbadly.com/macdirtycow/
19/12/2022 11:39:02
QRCode
archive.org

Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple’s XNU source.

worthdoingbadly EN 2022 CVE-2022-46689 macOS dirtycow
GoTrim: Go-based Botnet Actively Brute Forces WordPress Websites https://www.fortinet.com/blog/threat-research/gotrim-go-based-botnet-actively-brute-forces-wordpress-websites
19/12/2022 11:05:36
QRCode
archive.org
thumbnail

FortiGuard Labs encountered an unreported CMS scanner and brute forcer written in the Go programming language. Read our analysis of the malware and how this active botnet scans and compromises websites.

fortinet EN 2022 analysis malware scanner Wordpress go brute-force-attack FortiGuards-Labs Threat-Research botnet
À propos du chiffrement côté client - Aide Administrateur Google Workspace https://support.google.com/a/answer/10741897
18/12/2022 22:26:30
QRCode
archive.org

Vous pouvez chiffrer les données de votre organisation à l'aide de vos propres clés de chiffrement, en plus du chiffrement par défaut fourni par Google Workspace. Avec le chiffrement côté client (CSE) Google Workspace, le chiffrement du contenu est géré dans le navigateur du client avant la transmission ou le stockage des données dans le cloud via Google Drive. De cette façon, les serveurs Google ne peuvent pas accéder à vos clés de chiffrement ni déchiffrer vos données. Après avoir configuré le CSE, vous pouvez choisir quels utilisateurs peuvent créer du contenu chiffré côté client et le partager en interne ou en externe.

Google Workspace 2022 FR chiffrement
Support King, banned by FTC, linked to new phone spying operation https://techcrunch.com/2022/12/17/support-king-ftc-spytrac
18/12/2022 15:11:39
QRCode
archive.org
thumbnail

year after it was banned by the Federal Trade Commission, a notorious phone surveillance company is back in all but name, a TechCrunch investigation has found.

A groundbreaking FTC order in 2021 banned the stalkerware app SpyFone, its parent company Support King, and its chief executive Scott Zuckerman from the surveillance industry. The order, unanimously approved by the regulator’s five sitting commissioners, also demanded that Support King delete the phone data it illegally collected and notify victims that its app was secretly installed on their device.

techcrunch EN 2022 SupportKing stalkerware SpyFone FTC banned
Google ads lead to fake software pages pushing IcedID (Bokbot) https://isc.sans.edu/diary/Google+ads+lead+to+fake+software+pages+pushing+IcedID+Bokbot/29344
18/12/2022 12:00:59
QRCode
archive.org
thumbnail

Fake sites for popular software have occasionally been used by cyber criminal groups to push malware. Campaigns pushing IcedID malware (also known as Bokbot) also use this method as a distribution technique (we also commonly see IcedID sent through email).

SANS EN 2022 googleads bokbot fake software ads abusing delivery IceID
New Ransom Payment Schemes Target Executives, Telemedicine https://krebsonsecurity.com/2022/12/new-ransom-payment-schemes-target-executives-telemedicine/
18/12/2022 11:28:39
QRCode
archive.org

Ransomware groups are constantly devising new methods for infecting victims and convincing them to pay up, but a couple of strategies tested recently seem especially devious. The first centers on targeting healthcare organizations that offer consultations over the Internet and sending them booby-trapped medical records for the “patient.” The other involves carefully editing email inboxes of public company executives to make it appear that some were involved in insider trading.

krebsonsecurity EN 2022 executives ransom healthcare Venus CL0P infiltration
How ChatGPT can turn anyone into a ransomware and malware threat actor   https://venturebeat-com.cdn.ampproject.org/c/s/venturebeat.com/security/chatgpt-ransomware-malware/amp/
16/12/2022 09:09:24
QRCode
archive.org
thumbnail

Ever since OpenAI launched ChatGPT at the end of November, commentators on all sides have been concerned about the impact AI-driven content-creation will have, particularly in the realm of cybersecurity. In fact, many researchers are concerned that generative AI solutions will democratize cybercrime.

venturebeat EN 2022 ChatGPT cybercrime generative AI
page 3 / 41
4259 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio