Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 33 / 233
DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunch https://techcrunch.com/2025/03/11/doge-axes-cisa-red-team-staffers-amid-ongoing-federal-cuts/
12/03/2025 10:20:47
QRCode
archive.org
thumbnail

Affected staff say more than 100 employees working to protect U.S. government networks were ‘axed’ with no prior warning

techcrunch EN 2025 DOGE US redteam CISA staffers
Medusa Ransomware Activity Continues to Increase https://www.security.com/threat-intelligence/medusa-ransomware-attacks
12/03/2025 10:01:48
QRCode
archive.org
thumbnail

Attacks using this ransomware have displayed consistent TTPs and grown steadily since 2023.

security.com EN 2025 Symantec ransomware TTPs Medusa analysis
GreyNoise Detects Mass Exploitation of Critical PHP-CGI Vulnerability (CVE-2024-4577) https://www.greynoise.io/blog/mass-exploitation-critical-php-cgi-vulnerability-cve-2024-457?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
12/03/2025 08:36:52
QRCode
archive.org
thumbnail

‍GreyNoise data confirms that exploitation of CVE-2024-4577 extends far beyond initial reports. Attack attempts have been observed across multiple regions, with notable spikes in the United States, Singapore, Japan, and other countries throughout January 2025.

greynoise EN 2025 CVE-2024-4577 PHP-CGI Exploitation
Google paid $12 million in bug bounties last year to security researchers https://www.bleepingcomputer.com/news/security/google-paid-12-million-in-bug-bounties-last-year-to-security-researchers/
11/03/2025 08:46:29
QRCode
archive.org
thumbnail

Google paid almost $12 million in bug bounty rewards to 660 security researchers who reported security bugs through the company's Vulnerability Reward Program (VRP) in 2024.

bleepingcomputer EN 2025 Bug-Bounty Bug-Bounty-Program Google Vulnerability-Rewards-Program
Swiss critical sector faces new 24-hour cyberattack reporting rule https://www.bleepingcomputer.com/news/security/swiss-critical-sector-faces-new-24-hour-cyberattack-reporting-rule/
11/03/2025 08:24:51
QRCode
archive.org
thumbnail

Switzerland's National Cybersecurity Centre (NCSC) has announced a new reporting obligation for critical infrastructure organizations in the country, requiring them to report cyberattacks to the agency within 24 hours of their discovery.

bleepingcomputer EN 2025 Cyber-Incident Cybersecurity Law Legal Switzerland
ENQUETE. "TrackingFiles" : comment la vie privée de militaires, de diplomates et du personnel politique français est exposée par les données de géolocalisation https://www.francetvinfo.fr/internet/securite-sur-internet/enquete-trackingfiles-comment-la-vie-privee-de-militaires-de-diplomates-et-du-personnel-politique-francais-est-exposee-par-les-donnees-de-geolocalisation_7099947.html
08/03/2025 22:40:58
QRCode
archive.org
thumbnail

En collaboration avec "L'Œil du 20 heures", franceinfo a enquêté sur des données de géolocalisation de millions de téléphones en France, permettant d'identifier la vie privée de salariés de l'armée, de la DGSE, de lieux de pouvoir ou d'autres sites sensibles.

francetvinfo FR 2025 TrackingFiles privacy enquête géolocalisation data-broker France militaires
Undocumented "backdoor" found in Bluetooth chip used by a billion devices https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/
08/03/2025 22:32:59
QRCode
archive.org
thumbnail

The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented

bleepingcomputer EN 2025 Espressif Backdoor Bluetooth Chips ESP32 Hardware China
DPRK IT Fraud Network Uses GitHub to Target Global Companies https://nisos.com/research/dprk-github-employment-fraud/
08/03/2025 12:04:29
QRCode
archive.org
thumbnail

DPRK IT workers exploit GitHub to pose as Asian developers, securing remote jobs to fund missile and nuclear programs.

nisos.com EN 2025 DPRK North-Korea GitHub developers jobs fake Personas
North Korean Fake IT Workers Leverage GitHub to Build Personas https://www.infosecurity-magazine.com/news/north-korean-fake-it-workers-github/?ref=metacurity.com
08/03/2025 12:02:30
QRCode
archive.org
thumbnail

Nisos has found six personas leveraging new and existing GitHub accounts to get developer jobs in Japan and the US

infosecurity-magazine EN 2025 GitHub North-Korea Personas
Data breach at Japanese telecom giant NTT hits 18,000 companies https://www.bleepingcomputer.com/news/security/data-breach-at-japanese-telecom-giant-ntt-hits-18-000-companies/
07/03/2025 15:37:15
QRCode
archive.org
thumbnail

Japanese telecommunication services provider NTT Communications Corporation (NTT) is warning almost 18,000 corporate customers that their information was compromised during a cybersecurity incident.

bleepingcomputer EN 2025 Customer-Data Data-Breach Japan NTT
Thousands of websites hit by four backdoors in 3rd party JavaScript attack https://cside.dev/blog/thousands-of-websites-hit-by-four-backdoors-in-3rd-party-javascript-attack
07/03/2025 09:00:46
QRCode
archive.org
thumbnail

While analyzing threats targeting WordPress frameworks, we found an attack where a single 3rd party JavaScript file was used to inject four separate backdoors into 1,000 compromised websites using cdn.csyndication[.]com/.

c/side EN 2025 client-side web development WordPress backdoors JavaScript cdn.csyndication.com
Silk Typhoon targeting IT supply chain https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/
07/03/2025 08:52:49
QRCode
archive.org
thumbnail

Silk Typhoon is a Chinese state actor focused on espionage campaigns targeting a wide range of industries in the US and throughout the world. In recent months, Silk Typhoon has shifted to performing IT supply chain attacks to gain access to targets. In this blog, we provide an overview of the threat actor along with insight into their recent activity as well as their longstanding tactics, techniques, and procedures (TTPs), including a persistent interest in the exploitation of zero-day vulnerabilities in various public-facing appliances and moving from on-premises to cloud environments.

microsoft EN 2025 SilkTyphoon China supply-chain APT27 CVE-2025-0282
District of Columbia | Chinese Nationals with Ties to the PRC Government and “APT27” Charged in a Computer Hacking Campaign for Profit, Targeting Numerous U.S. Companies, Institutions, and Municipalities | United States Department of Justice https://www.justice.gov/usao-dc/pr/chinese-nationals-ties-prc-government-and-apt27-charged-computer-hacking-campaign-profit
07/03/2025 08:43:25
QRCode
archive.org
thumbnail

A federal judge in Washington, D.C., today, unsealed two separate indictments that allege Chinese nationals Yin Kecheng, 38, (尹 可成) a/k/a “YKC” (“YIN”) and Zhou Shuai, 45, (周帅) a/k/a “Coldface” (“ZHOU”) violated various federal statutes by participating in years-long, sophisticated computer hacking conspiracies that successfully targeted a wide variety of U.S.-based victims

justice.gov EN 2025 PRC indictment APT27 hacking US China
Blog: Zen and the Art of Microcode Hacking https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking
06/03/2025 08:22:53
QRCode
archive.org
thumbnail

This blog post covers the full details of EntrySign, the AMD Zen microcode signature validation vulnerability recently discovered by the Google Security team.

bughunters.google.com EN 2025 Zen Hacking AMD microcode signature vulnerability
Cisco warns of Webex for BroadWorks flaw exposing credentials https://www.bleepingcomputer.com/news/security/cisco-warns-of-webex-for-broadworks-flaw-exposing-credentials/
04/03/2025 20:09:51
QRCode
archive.org
thumbnail

Cisco warned customers today of a vulnerability in Webex for BroadWorks that could let unauthenticated attackers access credentials remotely.

bleepingcomputer EN 2025 Credentials Computer Cisco WebEx Broadworks
Havoc: SharePoint with Microsoft Graph API turns into FUD C2 https://www.fortinet.com/blog/threat-research/havoc-sharepoint-with-microsoft-graph-api-turns-into-fud-c2
04/03/2025 08:29:11
QRCode
archive.org

ForitGuard Lab reveals a modified Havoc deployed by a ClickFix phishing campaign. The threat actor hides each stage behind SharePoint and also uses it as a C2.

FortiGuard-Labs-Threat-Research EN 2025 C2-server ClickFix SharePoint campaign
New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran https://www.greynoise.io/blog/new-ddos-botnet-discovered
03/03/2025 20:46:23
QRCode
archive.org
thumbnail

A newly discovered global cyber threat is rapidly expanding, infecting tens of thousands of internet-connected devices to launch powerful cyberattacks.

greynoise EN 2025 analysis botnet internet-connected devices to Iran
Des cybercriminels s'en prennent à Cistec, fournisseur suisse de système clinique | ICTjournal https://www.ictjournal.ch/news/2025-03-03/des-cybercriminels-sen-prennent-a-cistec-fournisseur-suisse-de-systeme-clinique
03/03/2025 20:45:44
QRCode
archive.org
thumbnail

Cistec, fournisseur suisse de système d'information d'information clinique, d'une attaque par ransom

ictjournal FR CH 2025 Cistec SIH ransomware
Guerre en Ukraine : trois années d’opérations informationnelles russes https://www.sgdsn.gouv.fr/publications/guerre-en-ukraine-trois-annees-doperations-informationnelles-russes
03/03/2025 11:22:46
QRCode
archive.org

Ce rapport présente sous la forme d’une synthèse les principaux modes opératoires informationnels observés depuis trois ans, dont la majeure partie est apparue en corollaire de la guerre d’agression menée par la Russie en Ukraine.

sgdsn.gouv.fr FR 2025 rapport opérations informationnelles Russie Ukraine
Doppelgänger: New disinformation campaigns spreading on social media through Russian networks https://www.intrinsec.com/doppelganger-new-disinformation-campaigns-spreading-on-social-media-through-russian-networks/?cn-reloaded=1
03/03/2025 11:20:47
QRCode
archive.org

This report presents:

  • The intrusion set commonly known as Doppelgänger continues to spread disinformation narratives on social medias such as X, through bot accounts specifically made for such campaigns.
  • As for its previous campaigns, Doppelgänger pushes its anti-western narrative on pages spoofing the medias of the targeted countries, such as France, Germany, Italy, Ukraine, and Israel. The disinformation campaign aims to manipulate public opinion by exploiting sensitive issues and exacerbating social and geopolitical divisions.
  • The linguistic characteristics of the articles suggest that some of them were translated from Russian or edited by Russian natives, reinforcing the hypothesis that they are of Russian origin.
  • In order to bypass both manual and automatic moderation on social media platforms, Doppelgänger continues to leverage Kehr[.]io, a redirection provider advertised on Russian speaking underground forums. This service hosts its infrastructure on IPs announced by English companies managed by Ukrainian and Belarusian individuals that we could connect with a high level of confidence to bulletproof network hosting solutions.
  • The disinformation campaigns remain ongoing.
intrinsec EN 2025 Doppelgänger Russia disifnormation campaigns
page 33 / 233
4651 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio