Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 31 / 59
1170 résultats taggé 2023  ✕
Unmasking the Meduza Stealer: Comprehensive Analysis & Countermeasures https://www.uptycs.com/blog/what-is-meduza-stealer-and-how-does-it-work
07/07/2023 13:55:01
QRCode
archive.org
thumbnail

Read Uptycs' analysis of the newly discovered Meduza Stealer malware targeting Windows users, revealing capabilities, potential impact & mitigation steps.

Uptycs EN 2023 meduza Stealer Windows analysis
Hacks targeting British exam boards raise fears of students cheating https://therecord.media/exam-boards-uk-data-breach
06/07/2023 22:47:21
QRCode
archive.org
thumbnail

One incident affected the OCR and Pearson Edexcel examiners, and another hit AQA, Britain's largest exam board.

therecord EN 2023 hacker exam Pearson cheating OCR
Port of Nagoya cyberattack: Japanese port paralysed by LockBit https://techmonitor.ai/technology/cybersecurity/port-of-nagoya-cyberattack-lockbit-ransomware
06/07/2023 07:27:53
QRCode
archive.org
thumbnail

Japan’s biggest port, the Port of Nagoya, has been shut down after a cyberattack by the LockBit ransomware gang. The Russian cybercriminals have been on a crime spree this week, claiming ten new victims in the last five days.

techmonitor EN 2023 Port Nagoya LockBit Japan
BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection - https://www.sentinelone.com/blog/bluenoroff-how-dprks-macos-rustbucket-seeks-to-evade-analysis-and-detection/
05/07/2023 21:58:26
QRCode
archive.org
thumbnail

Threat actors are using increasingly sophisticated forms of evasion and anti-analysis as they respond to increased attention to macOS security in the enterprise.

sentinelone EN 2023 BlueNoroff DPRK macOS RustBucket Evade analysis
Suspected key figure of notorious cybercrime group arrested in joint operation https://www.interpol.int/en/News-and-Events/News/2023/Suspected-key-figure-of-notorious-cybercrime-group-arrested-in-joint-operation
05/07/2023 19:07:32
QRCode
archive.org
thumbnail

Operation Nervone has dealt a significant blow to the OPERA1ER group.

interpol EN 2023 OPERA1ER cybercrime arrested
Clop Ransomware: History, Timeline, And Adversary Simulation https://fourcore.io/blogs/clop-ransomware-history-adversary-simulation
05/07/2023 10:30:44
QRCode
archive.org
thumbnail

The infamous Clop ransomware, mainly known as Cl0p, targets various industries and organizations, extorting data for a huge amount of ransom. It advances actively with new emerging campaigns. This blog walks through the Clop timeline, Mitre TTPs and their emulation.

fourcore EN 2023 Cl0p History Timeline TTP ransomware analysis
BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising https://thehackernews.com/2023/07/blackcat-operators-distributing.html
05/07/2023 09:30:26
QRCode
archive.org
thumbnail

Threat actors associated with the BlackCat ransomware have been observed employing malvertising tricks to distribute rogue installers of the WinSCP file transfer application.

thehackernews EN 2023 BlackCat Ransomware Disguised WinSCP Malvertising
Campagne MOVEit : Cl0p divulgue une grande quantité de données volées à Cegedim https://www.lemagit.fr/actualites/366542375/Campagne-MOVEit-Cl0p-commence-a-divulguer-les-donnees-volees-a-Cegedim
05/07/2023 09:25:43
QRCode
archive.org
thumbnail

Le groupe Cl0p a poursuivi la diffusion des données volées à Cegedim à l’occasion de sa campagne de cyberattaques contre les instances MOVEit Transfer. Il met désormais à disposition plus de 1,5 To de données.

lemagit FR 2023 Cl0p Cegedim ransomware
Au mois de juin, la menace des infostealers n’a pas faibli https://www.lemagit.fr/actualites/366543415/Au-mois-de-juin-la-menace-des-infostealers-na-pas-faibli
04/07/2023 22:31:57
QRCode
archive.org
thumbnail

Plus furtive et discrète que les cyberattaques avec rançongiciel, la menace des maliciels dérobeurs se maintient à un niveau élevé. Panorama de la menace en collaboration avec Sekoia.io.

lemagit FR 2023 infostealers juin2023
Following NoName057(16) DDoSia Project’s Targets https://blog.sekoia.io/following-noname05716-ddosia-projects-targets/
04/07/2023 08:30:18
QRCode
archive.org
thumbnail

DDoSia is a DDoS attack toolkit used by the pro-Russia hacktivist group NoName057(16) against countries critical the invasion of Ukraine.

sekoia EN 2023 DDOSIA NoName057(16)
Chinese Threat Actors Targeting Europe in SmugX Campaign https://research.checkpoint.com/2023/chinese-threat-actors-targeting-europe-in-smugx-campaign/
03/07/2023 21:47:15
QRCode
archive.org
thumbnail

In the last couple of months, Check Point Research (CPR) has been tracking the activity of a Chinese threat actor targeting Foreign Affairs ministries and embassies in Europe. Combined with other Chinese activity previously reported by Check Point Research, this represents a larger trend within the Chinese ecosystem, pointing to a shift to targeting European entities, with a focus on their foreign policy.

The activity described in this report, utilizes HTML Smuggling to target governmental entities in Eastern Europe. This specific campaign has been active since at least December 2022, and is likely a direct continuation of a previously reported campaign attributed to RedDelta (and also to Mustang Panda, to some extent).

checkpoint EN 2023 SmugX Europe research HTML Smuggling MustangPanda
Detecting Popular Cobalt Strike Malleable C2 Profile Techniques https://unit42.paloaltonetworks.com/cobalt-strike-malleable-c2/
03/07/2023 21:20:44
QRCode
archive.org
thumbnail

We examine malicious Cobalt Strike case studies with distinct techniques using Malleable C2 profiles.

unit42 EN 2023 CobaltStrike Malleable C2 Profile Techniques
Malvertising Used as Entry Vector for BlackCat Actors Also Leverage SpyBoy Terminator https://www.trendmicro.com/en_us/research/23/f/malvertising-used-as-entry-vector-for-blackcat-actors-also-lever.html
03/07/2023 08:56:21
QRCode
archive.org
thumbnail

We found that malicious actors used malvertising to distribute malware via cloned webpages of legitimate organizations. The distribution involved a webpage of the well-known application WinSCP, an open-source Windows application for file transfer. We were able to identify that this activity led to a BlackCat (aka ALPHV) infection, and actors also used SpyBoy, a terminator that tampers with protection provided by agents.

trendmicro EN 2023 malware endpoints BlackCat WinSCP report SpyBoy GoogleAds
Decrypted: Akira Ransomware https://decoded.avast.io/threatresearch/decrypted-akira-ransomware/
03/07/2023 07:29:08
QRCode
archive.org
thumbnail

Researchers for Avast have developed a decryptor for the Akira ransomware and released it for public download. The Akira ransomware appeared in March 2023 and since then, the gang claims successful attacks on various organizations in the education, finance and real estate industries, amongst others.

avast EN 2023 Akira decryptor Windows ransomware
NCSC marks 20th anniversary of first response to state-sponsored cyber attack https://www.ncsc.gov.uk/news/20th-anniversary-of-first-response-to-state-sponsored-cyber-attack
03/07/2023 07:27:20
QRCode
archive.org
thumbnail

In June 2003, GCHQ experts were involved in responding to a cyber attack against the UK Government for the first time.

NCSC.GOV.UK EN 2023 anniversary response APT cyber attack UK
TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant https://www.securityweek.com/tsmc-says-supplier-hacked-after-ransomware-group-claims-attack-on-chip-giant/
03/07/2023 07:20:09
QRCode
archive.org
thumbnail

The LockBit ransomware group claims to have hacked Taiwan Semiconductor Manufacturing Company (TSMC), but the chip giant says only one of its suppliers was breached.

The notorious cybercrime group announced on Thursday on its website that it targeted TSMC, suggesting — based on the $70 million ransom demand — that it has stolen vast amounts of sensitive information. The victim was initially given seven days to respond, but the deadline has been extended to August 6 at the time of writing.

securityweek EN 2023 LockBit TSMC ransomware
Hacker stehlen bei der Fedpol sensible Daten zu Bundesräten und Botschaften https://archive.ph/kKQSV#selection-871.0-1093.463
02/07/2023 12:00:14
QRCode
archive.org

Dokumente der Bundespolizei Fedpol sind im Darknet gelandet ­- darunter auch Schutzmassnahmen für ausländische Botschaften und den Bundesrat.

nzz.ch DE 2023 xplain Fedpol Schweiz NZZ-Magazin Bundesrat
A cause de la cyberattaque contre Xplain, des secrets d'Etat sont en ligne https://www.blick.ch/fr/news/suisse/cyberattaque-contre-xplain-des-secrets-detat-se-retrouvent-sur-le-darknet-id18716115.html
02/07/2023 11:40:21
QRCode
archive.org
thumbnail

Après la cyberattaque contre Xplain – un des prestataires de la Confédération – les dispositifs de sécurité détaillés de Fedpol et des données de connexions de certains offices fédéraux se retrouvent sur le Darknet. Le Parlement demande des comptes.

blick FR 2023 Xplain cyberattaque RedNotice Fedpol Darknet
Des données confidentielles sur des conseillers fédéraux volées lors de la cyberattaque https://www.rts.ch/info/suisse/14146293-des-donnees-confidentielles-sur-des-conseillers-federaux-volees-lors-de-la-cyberattaque.html
02/07/2023 11:16:19
QRCode
archive.org
thumbnail

Des pirates informatiques ont dérobé des documents confidentiels du Service fédéral de sécurité (SFS) lors de l'attaque contre le prestataire de la Confédération Xplain, selon des informations concordantes des médias. Des fichiers ont été publiés sur le DarkNet.

rts FR 2023 suisse SFS confidentielles conseillers-fédéraux Xplain Confédération
CVE-2023-27997 is Exploitable, and 69% of FortiGate… https://bishopfox.com/blog/cve-2023-27997-exploitable-and-fortigate-firewalls-vulnerable
01/07/2023 11:37:40
QRCode
archive.org
thumbnail

Bishop Fox internally developed an exploit for CVE-2023-27997, a heap overflow in FortiOS—the OS behind FortiGate firewalls—that allows remote code execution. There are 490,000 affected SSL VPN interfaces exposed on the internet, and roughly 69% of them are currently unpatched. You should patch yours now

bishopfox EN 2023 FortiGate CVE-2023-27997
page 31 / 59
4838 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn