Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 33 / 227
South Africa’s government-run weather service knocked offline by cyberattack | The Record from Recorded Future News https://therecord.media/south-african-weather-service-cyberattack?is=09685296f9ea1fb2ee0963f2febaeb3a55d8fb1eddbb11ed4bd2da49d711f2c7
01/02/2025 10:26:21
QRCode
archive.org

A cyberattack has forced the government-run South African Weather Service (SAWS) offline, limiting access to a critical service used by the country’s airlines, farmers and allies.

The website for SAWS has been down since Sunday evening, according to a statement posted to social media. SAWS has had to use Facebook, X and other sites to share daily information on thunderstorms, wildfires and other weather events.

therecord.media South Africa EN 2025 SAWS cyberattack government Weather
Active Exploitation of Zero-day Zyxel CPE Vulnerability (CVE-2024-40891) https://www.greynoise.io/blog/active-exploitation-of-zero-day-zyxel-cpe-vulnerability-cve-2024-40891?is=09685296f9ea1fb2ee0963f2febaeb3a55d8fb1eddbb11ed4bd2da49d711f2c7
01/02/2025 10:25:11
QRCode
archive.org
thumbnail

After identifying a significant overlap between IPs exploiting CVE-2024-40891 and those classified as Mirai, the team investigated a recent variant of Mirai and confirmed that the ability to exploit CVE-2024-40891 has been incorporated into some Mirai strains.

‍GreyNoise is observing active exploitation attempts targeting a zero-day critical command injection vulnerability in Zyxel CPE Series devices tracked as CVE-2024-40891. At this time, the vulnerability is not patched, nor has it been publicly disclosed. Attackers can leverage this vulnerability to execute arbitrary commands on affected devices, leading to complete system compromise, data exfiltration, or network infiltration. At publication, Censys is reporting over 1,500 vulnerable devices online.

greynoise EN 2025 CVE-2024-40891 active exploitation zero-day
Norway seizes ship suspected of sabotage, says crew are Russian nationals https://therecord.media/norway-seizes-ship-suspected-sabotage
31/01/2025 16:13:20
QRCode
archive.org
thumbnail

The Silver Dania is the third ship detained in recent weeks over concerns of intentional damage to subsea infrastructure in the Baltic Sea.

therecord.media EN 2025 Norway cable sabotage Russia Baltic Sea
10,000 WordPress Websites Found Delivering MacOS and Windows Malware https://cside.dev/blog/10-000-wordpress-websites-found-delivering-macos-and-microsoft-malware
30/01/2025 09:16:23
QRCode
archive.org
thumbnail

Third-party scripts are a key part of the supply chain, giving 3rd party access to sensitive data or allowing malicious actions in the browser of your user. c/side helps you regain control over your website.

cside.dev EN 2025 WordPress MacOS Windows Malware
Hacker forums Cracked, Nulled and others, seized under FBI's 'Operation Talent' https://cybernews.com/cybercrime/hacker-forums-cracked-nulled-mysellix-starkrdp-siezed-fbi-operation-talent/
30/01/2025 08:52:17
QRCode
archive.org

Hacker forums Cracked[.]io, Nulled[.]to, MySellIX[.]io, and StarkRDP[.]io on Wednesday are seized by the FBI, Europol, and international law enforcement as part of ‘Operation Talent.’

A large ‘‘Operation Talent’ seizure poster was splashed across most of the shady websites by Wednesday afternoon.

cybernews EN 2025 Cracked Nulled MySellIX forum seized Operation-Talent FBI Europol
Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak
30/01/2025 08:33:14
QRCode
archive.org
thumbnail

A publicly accessible database belonging to DeepSeek allowed full control over database operations, including the ability to access internal data. The exposure includes over a million lines of log streams with highly sensitive information.

wiz EN 2025 DeepSeek data-leak exposure database
(Non-US) :: DSL-3788 :: H/W Rev. Ax/Bx :: F/W v1.01R1B036_EU_EN :: Unauthenticated Remote Code Execution (RCE) Vulnerability https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10418
29/01/2025 22:24:38
QRCode
archive.org

On November 25, 2024, a third party, from SECURE NETWORK BVTECH, reported the D-Link DSL-3788 hardware revision B2 with firmware version vDSL-3788_fw_revA1_1.01R1B036_EU_EN or below, of a Unauthenticated Remote Code Execution (RCE) vulnerability.

When D-Link became aware of the reported security issues, we promptly started investigating and developing security patches. Patches were release within the 90-day of the report of the vulnerabilities.

dlink EN 2025 announcement DSL-3788 hardware RCE vulnerability
New TorNet backdoor seen in widespread campaign https://blog.talosintelligence.com/new-tornet-backdoor-campaign/
29/01/2025 22:23:37
QRCode
archive.org
thumbnail

Cisco Talos discovered an ongoing malicious campaign operated by a financially motivated threat actor targeting users, predominantly in Poland and Germany.

  • The actor has delivered different payloads, including Agent Tesla, Snake Keylogger, and a new undocumented backdoor we are calling TorNet, dropped by PureCrypter malware.
  • The actor is running a Windows scheduled task on victim machines—including on endpoints with a low battery—to achieve persistence.
  • The actor also disconnects the victim machine from the network before dropping the payload and then connects it back to the network, allowing them to evade detection by cloud antimalware solutions.
  • We also found that the actor connects the victim’s machine to the TOR network using the TorNet backdoor for stealthy command and control (C2) communications and detection evasion.
talosintelligence EN 2025 TorNet backdoor campaign Poland Germany analysis malware
Cyber-attacks: three individuals added to EU sanctions list for malicious cyber activities against Estonia https://www.consilium.europa.eu/en/press/press-releases/2025/01/27/cyber-attacks-three-individuals-added-to-eu-sanctions-list-for-malicious-cyber-activities-against-estonia/
29/01/2025 22:20:17
QRCode
archive.org

The Council imposed restrictive measures on three individuals involved in cyber-attacks against Estonia.

consilium EN 2025 Cyber-attacks EU three individuals sanctions Estonia
After security breach at D-Trust: CCC speaks of "cyber window-dressing" | heise online https://www.heise.de/en/news/After-security-breach-at-D-Trust-CCC-speaks-of-cyber-window-dressing-10256579.html
29/01/2025 17:35:00
QRCode
archive.org
thumbnail

The Chaos Computer Club demands that the trust service provider D-Trust take responsibility and abolish the hacker paragraph.

heise 2025 D-Trust Chaos-Computer-Club hacker API open
Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor https://www.tenable.com/blog/salt-typhoon-an-analysis-of-vulnerabilities-exploited-by-this-state-sponsored-actor?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
29/01/2025 11:11:31
QRCode
archive.org
thumbnail

Salt Typhoon, a state-sponsored actor linked to the People’s Republic of China, has breached at least nine U.S.-based telecommunications companies with the intent to target high profile government and political figures. Tenable Research examines the tactics, techniques and procedures of this threat actor.

tenable EN 2025 Salt-Typhoon Analysis vulnerabilies State-Sponsored
Updated: Frederick Health takes systems offline due to ransomware attack https://www.fredericknewspost.com/news/health/hospitals_and_doctors/updated-frederick-health-takes-systems-offline-due-to-ransomware-attack/article_7d37a7f5-6d2e-52a1-8a23-c239914f2bb9.html
29/01/2025 09:01:52
QRCode
archive.org
thumbnail

Frederick Health Hospital's emergency department was not accepting new patients on Monday morning, according to a state emergency medical services website.

fredericknewspost EN 2025 US health ransomware cyberattack Hospital
Unmasking FleshStealer: A New Infostealer Threat in 2025 https://flashpoint.io/blog/fleshstealer-infostealer-threat-2025/
29/01/2025 08:51:53
QRCode
archive.org
thumbnail

We dive into FleshStealer, a new strain of information-stealing malware—explaining what it is and its potential impact on organizations.

flashpoint EN 2025 Infostealer analysis Infostealer
OpenAI launches ChatGPT Gov for U.S. government agencies https://www.cnbc.com/2025/01/28/openai-launches-chatgpt-gov-for-us-government-agencies.html
29/01/2025 08:49:50
QRCode
archive.org
thumbnail

OpenAI on Tuesday announced the launch of ChatGPT for government agencies in the U.S. ...It allows government agencies, as customers, to feed “non-public, sensitive information” into OpenAI’s models while operating within their own secure hosting environments, OpenAI CPO Kevin Weil told reporters during a briefing Monday.

cnbc EN 2025 US OpenAI ChatGPT government sensitive information
Apple fixes this year’s first actively exploited zero-day bug https://www.bleepingcomputer.com/news/security/apple-fixes-this-years-first-actively-exploited-zero-day-bug/
28/01/2025 08:34:50
QRCode
archive.org
thumbnail

​Apple has released security updates to fix this year's first zero-day vulnerability, tagged as actively exploited in attacks targeting iPhone users.

bleepingcomputer EN 2025 Actively-Exploited Apple iOS iPhone Zero-Day
Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware https://thedfirreport.com/2025/01/27/cobalt-strike-and-a-pair-of-socks-lead-to-lockbit-ransomware/
27/01/2025 21:05:23
QRCode
archive.org
thumbnail

Key Takeaways This intrusion began with the download and execution of a Cobalt Strike beacon that impersonated a Windows Media Configuration Utility. The threat actor used Rclone to exfiltrate data…

thedfirreport EN 2025 Cobalt Strike LockBit Ransomware Rclone mega.io DFIR
UnitedHealth updates number of data breach victims to 190 million https://therecord.media/unitedhealth-updates-change-healthcare-data-breach-190-million?ref=metacurity.com
27/01/2025 21:00:37
QRCode
archive.org
thumbnail

The 2024 ransomware attack on Change Healthcare exposed the data of about 190 million people, according to an update from parent company UnitedHealth Group.

therecord.media EN 2025 ransomware UnitedHealth Group Change Healthcare
Mysterious backdoor found on select Juniper routers https://www.theregister.com/2025/01/25/mysterious_backdoor_juniper_routers/
27/01/2025 16:23:18
QRCode
archive.org
thumbnail

Someone has been quietly backdooring selected Juniper routers around the world in key sectors including semiconductor, energy, and manufacturing, since at least mid-2023.

The devices were infected with what appears to be a variant of cd00r, a publicly available "invisible backdoor" designed to operate stealthily on a victim's machine by monitoring network traffic for specific conditions before activating.

theregister EN 2025 backdooring Juniper cd00r backdoor
48,000+ internet-facing Fortinet firewalls still open to attack https://www.helpnetsecurity.com/2025/01/22/48000-internet-facing-fortinet-firewalls-still-open-to-attack/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
27/01/2025 09:28:40
QRCode
archive.org
thumbnail

Too many Fortinet firewalls vulnerable to attack via CVE-2024-55591 are still accessible from the Internet.

helpnetsecurity EN 2025 shodan CVE-2024-55591Fortinet firewalls
Sweden launches sabotage probe after another data cable damaged in Baltic Sea Europe https://www.france24.com/en/europe/20250126-another-undersea-cable-damaged-in-baltic-sea-latvia-dispatches-warship
27/01/2025 09:27:17
QRCode
archive.org

Another undersea data cable, this time connecting Sweden and Latvia, has been severed in the Baltic Sea, officials from both countries said Sunday. The incident prompted Sweden to launch a criminal probe into the matter and seize a "suspect vessel" vessel headed for Russia.

france24 EN 2025 cable Sweden Latvia Baltic undersea sabotage Russia
page 33 / 227
4527 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio