Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 31 / 41
817 résultats taggé 2022  ✕
Critical Privilege Escalation Vulnerability in Jupiter and JupiterX Premium Themes https://www.wordfence.com/blog/2022/05/critical-privilege-escalation-vulnerability-in-jupiter-and-jupiterx-premium-themes/
18/05/2022 23:21:39
QRCode
archive.org
thumbnail

On April 5, 2022, the Wordfence Threat Intelligence team initiated the responsible disclosure process for a set of vulnerabilities in the Jupiter and JupiterX Premium themes and the required JupiterX Core companion plugin for WordPress, which included a critical privilege escalation vulnerability that allowed any user to become an administrator. The plugin developers quickly replied ...Read More

Wordfence 2022 EN JupiterX Wordpress theme Privilege CVE-2022-1654 CVE-2022-1656 CVE-2022-1657 CVE-2022-1658 CVE-2022-1659
Researchers devise iPhone malware that runs even when device is turned off https://arstechnica.com/information-technology/2022/05/researchers-devise-iphone-malware-that-runs-even-when-device-is-turned-off/
18/05/2022 14:59:49
QRCode
archive.org
thumbnail

Research is largely theoretical but exposes an overlooked security issue.

arstechnica EN 2022 iPhone study malware Bluetooth Darmstadt university
CVE-2022-22675: AppleAVD Overflow in AVC_RBSP::parseHRD | 0-days In-the-Wild https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2022/CVE-2022-22675.html
17/05/2022 16:35:10
QRCode
archive.org

Information about 0-days exploited in-the-wild!

CVE-2022-22675 googleprojectzero EN 2022 0-days iOS macOS
La vulnérabilité PetitPotam persiste malgré le patch tuesday https://www.lemondeinformatique.fr/actualites/lire-la-vulnerabilite-petitpotam-persiste-malgre-le-patch-tuesday-86791.html
17/05/2022 15:54:50
QRCode
archive.org
thumbnail

Le dernier correctif de Microsoft relatif à la faille CVE-2022-26925 pour forcer l'authentification à un contrôleur de domaine via le protocole NTML ne met pas un terme aux exploits de vulnérabilités PetitPotam. Les entreprises ont surtout intérêt à adopter de meilleures pratiques et paramétrer correctement leurs pare-feux.

CVE-2022-26925 PetitPotam lemondeinformatique FR 2022 NTML
Eternity, poche centinaia di dollari per un ransomware o un malware per furto dati https://www.italian.tech/blog/sicuri-nella-rete/2022/05/16/news/eternity_poche_centinaia_di_dollari_per_un_ransomware_o_un_malware_per_furto_dati-349771131/
17/05/2022 09:52:28
QRCode
archive.org
thumbnail

Numerosi rapporti ci suggeriscono che gli attacchi basati su codici malevoli rappresentano la maggioranza delle offensive cui osserviamo, tra esse la fanno da padrona i ransomware e gli info-stealer, questi ultimi sono malware concepiti per rubare un gran numero di informazioni dai sistemi infetti. Premesso ciò, chiediamoci quale sia la disponibilità sul mercato criminale di questi strumenti, quali siano i costi ed il modello di vendita.

italiantech IT 2022 Paganini Malware-as-a-Service info-stealer vendita prezzi
Multi-factor Authentication to Generate $27 Billion Globally for Mobile Operators in 2022, Juniper Research Study Finds https://www.businesswire.com/news/home/20220509005459/en/Juniper-Research-Multi-factor-Authentication-to-Generate-27-Billion-Globally-for-Mobile-Operators-in-2022-Juniper-Research-Study-Finds
17/05/2022 09:49:11
QRCode
archive.org
thumbnail

A new study by Juniper Research has found operators will generate $27 billion from the termination of SMS messages related to multi-factor authentication in 2022; an increase from $25 billion in 2021. The research predicts this 5% growth will be driven by increased pressure on digital service providers to offer secure authentication that reduces risk of data breaches and protects user identity. Multi-factor authentication combines multiple credentials to verify a user or transaction. This includes sending an SMS that contains a one‑time password or code to a user’s unique phone number.

businesswire Juniper EN 2022 Multi-factor MFA SMS Research Study Authentication Mobile
Web ad firms scrape email addresses before you know it https://www.theregister.com/2022/05/16/ad_companies_data/
17/05/2022 07:51:33
QRCode
archive.org
thumbnail

Tracking, marketing, and analytics firms have been exfiltrating the email addresses of internet users from web forms prior to submission and without user consent, according to security researchers.

theregister 2022 EN scrape email analytics marketing Tracking privacy exfiltrating research
Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission https://www.usenix.org/conference/usenixsecurity22/presentation/senol
17/05/2022 07:49:07
QRCode
archive.org

Web users enter their email addresses into online forms for a variety of reasons, including signing in or signing up for a service or subscribing to a newsletter. While enabling such functionality, email addresses typed into forms can also be collected by third-party scripts even when users change their minds and leave the site without submitting the form.

usenix form EN 2022 exfiltration submission Study form privacy
US links Thanos and Jigsaw ransomware to 55-year-old doctor https://www.bleepingcomputer.com/news/security/us-links-thanos-and-jigsaw-ransomware-to-55-year-old-doctor/
16/05/2022 22:50:59
QRCode
archive.org
thumbnail

The US Department of Justice today said that Moises Luis Zagala Gonzalez (Zagala), a 55-year-old cardiologist with French and Venezuelan citizenship residing in Ciudad Bolivar, Venezuela, created and rented Jigsaw and Thanos ransomware to cybercriminals.

bleepingcomputer EN 2022 Department-of-Justice DOJ Thanos Jigsaw Ransomware Thanos USA Venezuela
A closer look at Eternity Malware https://blog.cyble.com/2022/05/12/a-closer-look-at-eternity-malware/
16/05/2022 12:00:29
QRCode
archive.org
thumbnail

In this analysis, Cyble looks at the Eternity Malware suite, listing a wide variety of malware for sale on Telegram.

Cyble 2022 EN 2022 Eternity Malware Telegram analysis
macOS Vulnerabilities Hiding in Plain Sight (Black Hat Asia 2022 presentation) https://www.blackhat.com/asia-22/briefings/schedule/#macos-vulnerabilities-hiding-in-plain-sight-26073
16/05/2022 11:52:25
QRCode
archive.org
thumbnail

Sometimes when we publish details and writeups about vulnerabilities we are so focused on the actual bug, that we don't notice others, which might be still hidden inside the details. The same can happen when we read these issues, but if we keep our eyes open we might find hidden gems.
Download Slides

Download Whitepaper

blackhat 2022 session bug writeup presentation macos hidden Vulnerabilities Fitzl offensivesecurity CVE-2021-1815 CVE-2021-30972
EU lands new law to fight off hackers in critical sectors https://www.politico.eu/article/eu-lands-new-law-to-fight-off-hackers-in-critical-sectors/
14/05/2022 09:38:51
QRCode
archive.org
thumbnail

Rules for industries and governments aim to prevent all-out cyber breakdown.

Politico EN 2022 EU directive 5G Bart-Groothuis Communications Critical-infrastructure Cyber-Espionage Cybercrime Cybersecurity Data-flows Digital-Industry Eva-Maydell Hackers Internet-of-Things Network-security Privacy Supply-chain-security Telecoms Telecoms-Infrastructure
The Linux Foundation and Open Source Software Security Foundation (OpenSSF) Gather Industry and Government Leaders for Open Source Software Security Summit II https://www.prnewswire.com/news-releases/the-linux-foundation-and-open-source-software-security-foundation-openssf-gather-industry-and-government-leaders-for-open-source-software-security-summit-ii-301546671.html
14/05/2022 09:36:41
QRCode
archive.org
thumbnail

The Linux Foundation and the Open Source Software Security Foundation (OpenSSF) brought together over 90 executives from 37 companies and...

The-Linux-Foundation opensource 2022 EN Security
Known macOS Vulnerabilities Led Researcher to Root Out New Flaws https://www.darkreading.com/endpoint/known-macos-vulnerabilities-led-researcher-to-root-out-new-flaws
12/05/2022 23:27:36
QRCode
archive.org
thumbnail

Researcher shares how he unearthed newer bugs in Apple's operating system by closer scrutiny of previous research, including vulnerabilities that came out of the Pwn2Own competition.

darkreading macOS EN 2022 bugs Apple vulnerabilities Fitzl XCSSET
Patch tuesday mai 2022 : 74 failles corrigées dont 1 exploitée https://www.lemondeinformatique.fr/actualites/lire-patch-tuesday-mai-2022-74-failles-corrigees-dont-1-exploitee-86733.html
11/05/2022 17:48:34
QRCode
archive.org
thumbnail

La dernière salve de correctifs de Microsoft comble 74 vulnérabilités incluant 7 de niveau critique. Classée comme importante et d'un score CVSS de 8.1, la faille CVE-2022-26925 de type Windows LSA Spoofing est à corriger d'urgence.

lemondeinformatique FR Patch-Tuesday vulnérabilités 2022 mai
Russia hacked an American satellite company one hour before the Ukraine invasion https://www.technologyreview.com/2022/05/10/1051973/russia-hack-viasat-satellite-ukraine-invasion
11/05/2022 14:08:50
QRCode
archive.org
thumbnail

The attack on Viasat showcases cyber’s emerging role in modern warfare.

technologyreview EN 2022 cyberwar russia-ukraine-war Viasat satellite warfare
npm Supply Chain Attack Targeting Germany-Based Companies https://jfrog.com/blog/npm-supply-chain-attack-targets-german-based-companies/
11/05/2022 11:32:33
QRCode
archive.org
thumbnail

The JFrog Security Research team identified and quickly disclosed new npm malicious packages aimed at compromising leading industrial organizations

jfrog 2022 EN Supply Chain supplychain industrial npm attack research
Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/
11/05/2022 11:25:36
QRCode
archive.org
thumbnail

Microsoft coined the term “human-operated ransomware” to clearly define a class of attack driven by expert humane intelligence at every step of the attack chain and culminate in intentional business disruption and extortion. In this blog, we explain the ransomware-as-a-service affiliate model and disambiguate between the attacker tools and the various threat actors at play during a security incident.

microsoft ransomware Ransomware-as-a-service EN 2022 affiliate
Costa Rica declares national emergency after Conti ransomware attacks https://www.bleepingcomputer.com/news/security/costa-rica-declares-national-emergency-after-conti-ransomware-attacks/
10/05/2022 19:48:37
QRCode
archive.org
thumbnail

The Costa Rican President Rodrigo Chaves has declared a national emergency following cyber attacks from Conti ransomware group on multiple government bodies.

BleepingComputer also observed Conti published most of the 672 GB dump that appears to contain data belonging to the Costa Rican government agencies.

The declaration was signed into law by Chaves on Sunday, May 8th, same day as the economist and former Minister of Finance effectively became the country's 49th and current president.

bleepingcomputer EN 2022 Conti ransomware leak Costarica emergency
L’Europe de la cyberdéfense https://www.rfi.fr/fr/podcasts/nouvelles-technologies/20220507-l-europe-de-la-cyberd%C3%A9fense
10/05/2022 15:18:17
QRCode
archive.org
thumbnail

Si depuis l’offensive Russe en Ukraine, le « cyber Pearl Harbor » tant redouté n'a pas fait la Une de l’actualité, les assauts contre les infrastructures numériques de l’Ukraine et incidemment dans le reste de l’Europe ont bien été constatés.

rfi FR 2022 EU Europe Paris cyberdefense conflit hybride
page 31 / 41
4832 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn