Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 3 / 5
83 résultats taggé arstechnica  ✕
Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet | Ars Technica https://arstechnica.com/security/2023/11/thousands-of-routers-and-cameras-vulnerable-to-new-0-day-attacks-by-hostile-botnet/
24/11/2023 13:49:34
QRCode
archive.org
thumbnail

Internet scans show 7,000 devices may be vulnerable. The true number could be higher.

arstechnica EN 2023 0-day routers cameras mirai
In a first, cryptographic keys protecting SSH connections stolen in new attack | Ars Technica https://arstechnica.com/security/2023/11/hackers-can-steal-ssh-cryptographic-keys-in-new-cutting-edge-attack/
16/11/2023 07:15:01
QRCode
archive.org
thumbnail

An error as small as a single flipped memory bit is all it takes to expose a private key.
The vulnerability occurs when there are errors during the signature generation that takes place when a client and server are establishing a connection. It affects only keys using the RSA cryptographic algorithm, which the researchers found in roughly a third of the SSH signatures they examined. That translates to roughly 1 billion signatures out of the 3.2 billion signatures examined. Of the roughly 1 billion RSA signatures, about one in a million exposed the private key of the host.

arstechnica EN 2023 SSH RSA cryptographic algorithm error vulnerability
Intel fixes high-severity CPU bug that causes “very strange behavior” https://arstechnica.com/security/2023/11/intel-fixes-high-severity-cpu-bug-that-causes-very-strange-behavior/
16/11/2023 06:30:27
QRCode
archive.org
thumbnail

Among other things, bug allows code running inside a VM to crash hypervisors.

arstechnica EN 2023 reptar Intel CPU CVE-2023-23583 bug
Microsoft profiles new threat group with unusual but effective practices https://arstechnica.com/security/2023/10/microsoft-profiles-new-threat-group-with-unusual-but-effective-practices/
02/11/2023 11:26:09
QRCode
archive.org
thumbnail

Octo Tempest employs tactics that many of its targets aren't prepared for.

arstechnica Microsoft EN 2023 OctoTempest practices Tactics TTP
Hackers can force iOS and macOS browsers to divulge passwords and much more https://arstechnica.com/security/2023/10/hackers-can-force-ios-and-macos-browsers-to-divulge-passwords-and-a-whole-lot-more/
25/10/2023 20:34:57
QRCode
archive.org
thumbnail

iLeakage is practical and requires minimal resources. A patch isn't (yet) available.

arstechnica EN 2023 ileakage macos ios speculative
Vulnerable Arm GPU drivers under active exploitation. Patches may not be available | Ars Technica https://arstechnica.com/security/2023/10/vulnerable-arm-gpu-drivers-under-active-exploitation-patches-may-not-be-available/?
03/10/2023 21:39:01
QRCode
archive.org
thumbnail

Vulnerability allows attackers to tamper with data stored in device memory.

arstechnica EN 2023 CVE-2023-4211Mali GPU ARM
Critical vulnerabilities in Exim threaten over 250k email servers worldwide | Ars Technica https://arstechnica.com/security/2023/09/critical-vulnerabilities-in-exim-threaten-over-250k-email-servers-worldwide/
02/10/2023 18:47:43
QRCode
archive.org
thumbnail

Remote code execution requiring no authentication fixed. 2 other RCEs remain unpatched.

arstechnica EN 2023 Exim CVE-2023-42115 RCE
How Google Authenticator made one company’s network breach much, much worse https://arstechnica.com/security/2023/09/how-google-authenticator-gave-attackers-one-companys-keys-to-the-kingdom
16/09/2023 12:21:15
QRCode
archive.org
thumbnail

Google's app for generating MFA codes syncs to user accounts by default. Who knew?

arstechnica EN 2023 MFA GoogleAuthenticator
With 0-days hitting Chrome, iOS, and dozens more this month, is no software safe? | Ars Technica https://arstechnica.com/security/2023/09/with-0-days-hitting-chrome-ios-and-dozens-more-this-month-is-no-software-safe/
14/09/2023 00:26:45
QRCode
archive.org
thumbnail

With 70 zero-days uncovered so far this year, 2023 is on track to set a new record.

arstechnica EN 2023 0-days record
North Korea-backed hackers target security researchers with 0-day https://arstechnica.com/security/2023/09/north-korea-backed-hackers-target-security-researchers-with-0-day/
11/09/2023 23:03:12
QRCode
archive.org
thumbnail

Google researchers say currently unfixed vulnerability affects a popular software package.

arstechnica EN 2023 North-Korea security researchers 0-day popular software
WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April | Ars Technica https://arstechnica.com/security/2023/08/winrar-0-day-that-uses-poisoned-jpg-and-txt-files-under-exploit-since-april/
24/08/2023 08:39:23
QRCode
archive.org
thumbnail

Vulnerability allows hackers to execute malicious code when targets open malicious ZIP files.

arstechnica EN WinRAR 0-day CVE-2023-38831
Microsoft takes pains to obscure role in 0-days that caused email breach https://arstechnica.com/security/2023/07/microsoft-takes-pains-to-obscure-role-in-0-days-that-caused-email-breach/
16/07/2023 01:43:21
QRCode
archive.org
thumbnail

Critics also decry Microsoft's "pay-to-play" monitoring that detected intrusions.

arstechnica EN 2023 Storm0558 intrusion token AAD
WordPress plugin installed on 1 million+ sites logged plaintext passwords https://arstechnica.com/security/2023/07/wordpress-plugin-installed-on-1-million-sites-logged-plaintext-passwords
15/07/2023 14:00:20
QRCode
archive.org
thumbnail

AIOS bills itself as an "all-in-one" security solution. A just-fixed bug undermined that.

arstechnica EN 2023 WordPress plugin AIOS bug plaintext passwords
Hackers exploit gaping Windows loophole to give their malware kernel access https://arstechnica.com/security/2023/07/hackers-exploit-gaping-windows-loophole-to-give-their-malware-kernel-access/
12/07/2023 09:37:03
QRCode
archive.org
thumbnail

Microsoft blocks a new batch of system drivers, but the loophole empowering them remains.

arstechnica EN 2023 Windows malicious drivers loophole 2015
Mass exploitation of critical MOVEit flaw is ransacking orgs big and small | Ars Technica https://arstechnica.com/information-technology/2023/06/mass-exploitation-of-critical-moveit-flaw-is-ransacking-orgs-big-and-small/
07/06/2023 07:46:55
QRCode
archive.org
thumbnail

SQL injection attacks on MOVEit file-transfer service likely to get worse.

arstechnica EN 2023 CVE-2023-34362 MOVEit
“Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware | Ars Technica https://arstechnica.com/information-technology/2023/06/clickless-ios-exploits-infect-kaspersky-iphones-with-never-before-seen-malware/
02/06/2023 13:27:34
QRCode
archive.org
thumbnail

"Operation Triangulation" stole mic recordings, photos, geolocation, and more.

arstechnica EN 2023 Triangulation iOS Apple kaspersky Russia spyware NSA
Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones https://arstechnica.com/information-technology/2023/05/hackers-can-brute-force-fingerprint-authentication-of-android-devices/
28/05/2023 14:11:44
QRCode
archive.org
thumbnail

Researchers have devised a low-cost smartphone attack that cracks the authentication fingerprint used to unlock the screen and perform other sensitive actions on a range of Android devices in as little as 45 minutes.

arstechnica EN 2023 BrutePrint low-cost smartphone attack fingerprint authentication attack
Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days https://arstechnica.com/information-technology/2023/05/inner-workings-revealed-for-predator-the-android-malware-that-exploited-5-0-days/
28/05/2023 13:46:18
QRCode
archive.org
thumbnail

Spyware is sold to countries including Egypt, Indonesia, Oman, Saudi Arabia, and Serbia.
Smartphone malware sold to governments around the world can surreptitiously record voice calls and nearby audio, collect data from apps such as Signal and WhatsApp, and hide apps or prevent them from running upon device reboots, researchers from Cisco’s Talos security team have found.

arstechnica EN 2023 Smartphone PREDATOR 0-days spyware Android
Apple uses iOS and macOS Rapid Security Response feature for the first time https://arstechnica.com/gadgets/2023/05/seven-months-in-ios-and-macos-get-their-first-rapid-security-updates/
02/05/2023 07:03:36
QRCode
archive.org
thumbnail

When it announced iOS 16, iPadOS 16, and macOS Ventura at its Worldwide Developers Conference last summer, one of the features Apple introduced was something called "Rapid Security Response." The feature is meant to enable quicker and more frequent security patches for Apple's newest operating systems, especially for WebKit-related flaws that affect Safari and other apps that use Apple's built-in browser engine.

arstechnica EN 2023 iOS16 Ventura macos Rapid-Security-Response RSR
Android app from China executed 0-day exploit on millions of devices | Ars Technica https://arstechnica.com/information-technology/2023/03/android-app-from-china-executed-0-day-exploit-on-millions-of-devices/
03/04/2023 18:11:01
QRCode
archive.org
thumbnail

Fast-growing e-commerce app Pinduoduo had an EvilParcel stow-away.

arstechnica EN 2023 Pinduoduo EvilParcel 0-day exploit
page 3 / 5
4580 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio