Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 32 / 41
817 résultats taggé 2022  ✕
Dissecting Saintstealer https://blog.cyble.com/2022/04/27/dissecting-saintstealer/
10/05/2022 15:09:32
QRCode
archive.org
thumbnail

Cyble Analyzes Saintstealer, an infostealer using a C&C server with known links to other popular infostealers.

Cyble 2022 EN Saintstealer infostealer
Russian TVs, search engines hacked on Victory Day with antiwar message https://www.washingtonpost.com/world/2022/05/09/russia-tv-hack-victory-day-ukraine-war/
10/05/2022 13:27:46
QRCode
archive.org
thumbnail

Russians using smart TVs reported seeing something atypical: A message appeared instead of the usual listing of channels. “The blood of thousands of Ukrainians and hundreds of murdered children is on your hands,” read the message that took over their screens. “TV and the authorities are lying. No to war.”

washingtonpost 2022 EN russian TV hacked smart
Apple, Google, and Microsoft commit to expanded support for FIDO standard https://www.apple.com/newsroom/2022/05/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard/
10/05/2022 09:56:44
QRCode
archive.org
thumbnail

Faster, easier, and more secure sign-ins will be available to consumers across leading devices and platforms.

Apple newsroom EN 2022 FIDO standard
Vulnerability Analysis - CVE-2022-1388 https://www.randori.com/blog/vulnerability-analysis-cve-2022-1388/
09/05/2022 19:01:08
QRCode
archive.org
thumbnail

CVE-2022-1388 is a critical vulnerability (CVSS 9.8) in the management interface of F5 Networks’ BIG-IP solution that enables an unauthenticated attacker to gain remote code execution on the system through bypassing F5’s iControl REST authentication. The vulnerability was first discovered by F5’s internal product security team and disclosed publicly on May 4, 2022.

CVE-2022-1388 randori EN 2022 critical vulnerability F5 BIG-IP RCE
From the Front Lines | Unsigned macOS oRAT Malware Gambles For The Win https://www.sentinelone.com/blog/from-the-front-lines-unsigned-macos-orat-malware-gambles-for-the-win/
09/05/2022 18:58:30
QRCode
archive.org
thumbnail

Researchers looking into a new APT group targeting gambling sites with a variety of cross-platform malware recently identified a version of oRAT malware targeting macOS users and written in Go. While neither RATs nor Go malware are uncommon on any platform, including the Mac, the development of such a tool by a previously unknown APT is an interesting turn, signifying the increasing need for threat actors to address the rising occurrence of Macs among their intended targets and victims. In this post, we dig deeper into the technical details of this novel RAT to understand better how it works and how security teams can detect it in their environments.

SentinelOne EN 2022 macos oRat Go APT RAT
Russia to Rent Tech-Savvy Prisoners to Corporate IT? https://krebsonsecurity.com/2022/05/russia-to-rent-tech-savvy-prisoners-to-corporate-it/
08/05/2022 11:59:23
QRCode
archive.org

Faced with a brain drain of smart people fleeing the country following its invasion of Ukraine, the Russian Federation is floating a new strategy to address a worsening shortage of qualified information technology experts: Forcing tech-savvy people within the nation's…

krebsonsecurity EN 2022 Russia russia-ukraine-war prisoners strategy
BPFDoor — an active Chinese global surveillance tool https://doublepulsar.com/bpfdoor-an-active-chinese-global-surveillance-tool-54b078f1a896
07/05/2022 17:54:58
QRCode
archive.org
doublepulsar EN 2022 BPFDoor nix unix surveillance Chinese implant backdoor
Fuzzing ClamAV with real malware samples https://mmmds.pl/clamav/
07/05/2022 11:10:09
QRCode
archive.org
mmmds EN 2022 ClamAV fuzzing CVE-2022-20770 CVE-2022-20771 CVE-2022-20785 CVE-2022-20792
MacOS Two-machine Kernel Debugging https://www.diverto.hr/en/blog/2022-03-06-macos-two-Machine-kernel-debugging/
06/05/2022 18:33:27
QRCode
archive.org
thumbnail

Diverto is an information security company. We provide consulting and managed services.

MacOS diverto 2022 EN howto kernel Debugging
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation
06/05/2022 16:55:57
QRCode
archive.org
thumbnail

Cybereason recently an attack assessed to be the work of Chinese APT Winnti that operated undetected, siphoning intellectual property and sensitive data - the two companion reports examine the tactics and techniques of the overall campaign as well as more detailed analysis of the malware arsenal and exploits used...

cybereason 2022 EN CuckooBees Winnti APT APT41 intellectual property siphoning Theft
Apple, Google and Microsoft Commit to Expanded Support for FIDO Standard to Accelerate Availability of Passwordless Sign-Ins https://fidoalliance.org/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard-to-accelerate-availability-of-passwordless-sign-ins/
06/05/2022 16:19:39
QRCode
archive.org
thumbnail

Faster, easier and more secure sign-ins will be available to consumers across leading devices and platforms  Mountain View, California, MAY 5, 2022  – In a joint effort to make the web […]

FIDO fidoalliance EN 2022 Google Apple Microsoft Passwordless password Standard
Nozomi Networks Discovers Unpatched DNS Bug in Popular C Standard Library Putting IoT at Risk https://www.nozominetworks.com/blog/nozomi-networks-discovers-unpatched-dns-bug-in-popular-c-standard-library-putting-iot-at-risk/
04/05/2022 10:41:30
QRCode
archive.org
thumbnail

Nozomi Networks Labs has disclosed an unpatched vulnerability affecting the DNS of popular C standard libraries potentially in use by millions of IoT devices: uClibc and uClibc-ng.

Nozomi EN 2022 C uClibc uClibc-ng vulnerability ICS-VU-638779
UNC3524: Eye Spy on Your Email https://www.mandiant.com/resources/unc3524-eye-spy-email
03/05/2022 17:16:56
QRCode
archive.org
thumbnail

We introduce UNC3524, a newly discovered suspected espionage threat actor targeting corporate emails.

Mandiant EN 2022 Email espionage corporate emails QUIETEXIT
Google Online Security Blog: The Package Analysis Project: Scalable detection of malicious open source packages https://security.googleblog.com/2022/04/the-package-analysis-project-scalable.html
03/05/2022 09:58:30
QRCode
archive.org
thumbnail

Despite open source software’s essential role in all software built today, it’s far too easy for bad actors to circulate malicious packages that attack the systems and users running that software. Unlike mobile app stores that can scan for and reject malicious contributions, package repositories have limited resources to review the thousands of daily updates and must maintain an open model where anyone can freely contribute. As a result, malicious packages like ua-parser-js, and node-ipc are regularly uploaded to popular repositories despite their best efforts, with sometimes devastating consequences for users.

google 2022 EN opensource Package Analysis Project malicious packages
Spanish prime minister’s phone ‘targeted with Pegasus spyware’ https://www.theguardian.com/world/2022/may/02/spain-prime-minister-pedro-sanchez-phone-pegasus-spyware
03/05/2022 07:47:19
QRCode
archive.org
thumbnail

The Spanish government has said the mobile phones of the prime minister, Pedro Sánchez, and the defence minister, Margarita Robles, were both infected last year with the Pegasus spyware that its manufacturers claim is available only to state agencies.

theguardian en 2022 pegasus minister Spain spy
Russia’s cyber warfare against Ukraine more nuanced than expected https://thehill.com/policy/cybersecurity/3472214-russias-cyber-warfare-against-ukraine-more-nuanced-than-expected/
02/05/2022 15:49:41
QRCode
archive.org
thumbnail

Russia’s approach to cyber warfare against Ukraine has proved more subtle so far than many expected. This week’s Microsoft report on the operations reveals that Moscow-backed hackers have launched more than 200 cyberattacks against Ukraine, including nearly 40 destructive ones that targeted the country’s government organizations and critical sectors.  Cyber experts say the analysis suggests…

thehill EN 2022 cyberwarfare Russia Ukraine nuanced
Introducing Package Analysis: Scanning open source packages for malicious behavior https://openssf.org/blog/2022/04/28/introducing-package-analysis-scanning-open-source-packages-for-malicious-behavior/
02/05/2022 10:50:10
QRCode
archive.org

Today we’re pleased to announce the initial prototype version of the Package Analysis project, an OpenSSF project addressing the challenge of identifying malicious packages in popular open source repositories. In just one month of analysis, the project identified more than 200 malicious packages uploaded to PyPI and npm.

openssf EN 2022 Analysis Scan opensource packages Package behavior
How the French fiber optic cable attacks accentuate critical infrastructure vulnerabilities https://www.cyberscoop.com/french-fiber-optic-cables-attack-critical-infrastructure/
01/05/2022 18:31:34
QRCode
archive.org
thumbnail

The pictures show neatly trimmed fiber optic cables dug up from underground behind what appears to be a well-hidden grate. The apparent simplicity of the sabotage is all the more harrowing in light of how extensively it disrupted Internet service in France, experts said.

cyberscoop 2022 en fiber optical cable attack French
2021 Top Routinely Exploited Vulnerabilities | CISA https://www.cisa.gov/uscert/ncas/alerts/aa22-117a
28/04/2022 13:58:05
QRCode
archive.org

This joint Cybersecurity Advisory (CSA) was coauthored by cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom: the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS),

cisa uscert csirt cert U.-S.-Computer-Emergency-Readiness top 2021 top2021 EN 2022 Vulnerabilities
Jamf Threat Labs identifies Safari vulnerability (CVE-2022-22616) allowing for Gatekeeper bypass https://www.jamf.com/blog/jamf-threat-labs-safari-vuln-gatekeeper-bypass/
28/04/2022 10:52:08
QRCode
archive.org
thumbnail

The identified vulnerability allows bypassing of Gatekeeper security and app notorization, has been patched by Apple.

jamf 2022 EN Safari CVE-2022-22616 Gatekeeper Apple macOS
page 32 / 41
4832 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn