Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 33 / 202
4021 résultats taggé EN  ✕
Hundreds of fake Reddit sites push Lumma Stealer malware https://www.bleepingcomputer.com/news/security/hundreds-of-fake-reddit-sites-push-lumma-stealer-malware/
24/01/2025 08:37:31
QRCode
archive.org
thumbnail

Hackers are distributing close to 1,000 web pages mimicking Reddit and the WeTransfer file sharing service that lead to downloading the Lumma Stealer malware.

bleepingcomputer EN 2025 Impersonation Information-Stealer Infostealer Lumma Malware Reddit WeTransfer
Google launches customizable Web Store for Enterprise extensions https://www.bleepingcomputer.com/news/google/google-launches-customizable-web-store-for-enterprise-extensions/
24/01/2025 08:28:45
QRCode
archive.org
thumbnail

Google has officially launched its Chrome Web Store for Enterprises, allowing organizations to create a curated list of extensions that can be installed in employees' web browsers.

bleepingcomputer EN 2025 Browser-Extension Chrome-Web-Store Enterprise Google Google-Chrome
Malware Redirects WordPress Traffic to Harmful Sites https://blog.sucuri.net/2025/01/malware-redirects-wordpress-traffic-to-harmful-sites.html
24/01/2025 08:25:40
QRCode
archive.org
thumbnail

Learn about the steps we took to uncover and neutralize a malware infection redirecting WordPress traffic to dangerous URLs.

sucuri EN 2025 WP Wordpress Redirect theme injection URL
Russian Cyber Army. Who is it? https://molfar.com/en/blog/russian-cyber-army
24/01/2025 08:14:42
QRCode
archive.org

In December 2023, the Molfar website experienced a DDoS attack. This occurred immediately after the publication of our extensive investigation into the production of Shaheds and Lancets, which included the deanon of the family of chief designer Zakharov. Recently, Molfar discovered who was behind that DDos attack.

Molfar's OSINT analysts, in collaboration with the DC8044 F33d community team, identified several Russian hackers allegedly connected to Russian state structures and received funding from them. Some of these individuals are Ukrainian.

molfar EN 2025 OSINT doxing NoName057 Russian Cyber army
MasterCard DNS Error Went Unnoticed for Years https://krebsonsecurity.com/2025/01/mastercard-dns-error-went-unnoticed-for-years/
22/01/2025 22:39:48
QRCode
archive.org

The payment card giant MasterCard just fixed a glaring error in its domain name server settings that could have allowed anyone to intercept or divert Internet traffic for the company by registering an unused domain name. The misconfiguration persisted for…

krebsonsecurity EN 2025 MasterCard DNS Error Misconfiguration DNS
Rsync contains six vulnerabilities https://kb.cert.org/vuls/id/952657
22/01/2025 22:38:41
QRCode
archive.org

Rsync, a versatile file-synchronizing tool, contains six vulnerabilities present within versions 3.3.0 and below. Rsync can be used to sync files between remote and local computers, as well as storage devices. The discovered vulnerabilities include heap-buffer overflow, information leak, file leak, external directory file-write,–safe-links bypass, and symbolic-link race condition.

cert.org EN 2025 CVE-2024-12084 advisory CVE-2024-12747 CVE-2024-12085 CVE-2024-12088 CVE-2024-12086 CVE-2024-12087
A look at the recent rsync vulnerability https://lwn.net/SubscriberLink/1005302/0eac0cf6f7cd7504/
22/01/2025 22:36:48
QRCode
archive.org

On January 14, Nick Tait announced the discovery of six vulnerabilities in rsync, the popular file-synchronization tool. While software vulnerabilities are not uncommon, the most serious one he announced allows for remote code execution on servers that run rsyncd — and possibly other configurations. The bug itself is fairly simple, but this event provides a nice opportunity to dig into it, show why it is so serious, and consider ways the open-source community can prevent such mistakes in the future.

The vulnerabilities were found by two groups of researchers: Simon Scannell, Pedro Gallegos, and Jasiel Spelman from Google's Cloud Vulnerability Research identified five of them, including the most serious one. Aleksei Gorban, a security researcher at TikTok, discovered the sixth — a race condition in how rsync handles symbolic links.

LWN.net EN 2025 rsync vulnerability CVE-2024-12084
Swiss cities targeted by Russian hackers during WEF https://www.swissinfo.ch/eng/workplace-switzerland/schaffhausen-and-geneva-also-affected-by-russian-hacker-attacks/88763740
22/01/2025 21:22:53
QRCode
archive.org
thumbnail

Russian hackers have targeted canton Schaffhausen and the cities of Geneva and Sierre, paralysing their websites on Wednesday morning.

swissinfo EN 2025 Noname057(16) DDoS Wef
Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog https://blog.qualys.com/vulnerabilities-threat-research/2025/01/21/mass-campaign-of-murdoc-botnet-mirai-a-new-variant-of-corona-mirai
21/01/2025 17:43:02
QRCode
archive.org
thumbnail

The Qualys Threat Research Unit has uncovered a large-scale, ongoing operation within the Mirai campaign, dubbed Murdoc Botnet.

qualys EN 2025 Murdoc Botnet Mirai analysis
Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4 https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/
21/01/2025 16:41:46
QRCode
archive.org
thumbnail

2024 ended with a bang. Cloudflare mitigated another record-breaking DDoS attack peaking at 5.6 Tbps. Overall, Cloudflare mitigated 21.3 million DDoS attacks in 2024, representing a 53% increase compared to 2023.

cloudflare EN 2025 DDoS mitigated record-breaking
Malicious extensions circumvent Google’s remote code ban https://palant.info/2025/01/20/malicious-extensions-circumvent-googles-remote-code-ban/
21/01/2025 09:30:06
QRCode
archive.org
thumbnail

This blog post looks into how 62 malicious extensions circumvent Google’s restrictions of remote code execution in extensions. One group of extensions is associated with the company Phoenix Invicta, another with Technosense Media. The largest group around Sweet VPN hasn’t been attributed yet.

palant EN 2025 palant malicious extensions Google Chrome
Qbot is Back.Connect https://medium.com/walmartglobaltech/qbot-is-back-connect-2d774052369f
21/01/2025 09:29:03
QRCode
archive.org

In addition to the new backConnect malware developed by Qbot operators, research has emerged tying zloader[4] activity to that of the BlackBasta ransomware operation. It is highly likely this new side loading backConnect malware has been or is going to be utilized to further ransomware attacks.

walmartglobaltech EN 2025 qbot back.connect malware operators BlackBasta
Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop https://gbhackers.com/researchers-accessed-windows-bitlocker-encrypted-files/
20/01/2025 16:29:44
QRCode
archive.org
thumbnail

Cybersecurity researchers have uncovered a major flaw in the Windows BitLocker encryption system, allowing attackers to access encrypted data.

gbhackers EN 2025 BitLocker Encrypted bitpixie CVE-2023-21563
HPE Investigating Breach Claims After Hacker Offers to Sell Data - SecurityWeek https://www.securityweek.com/hpe-investigating-breach-claims-after-hacker-offers-to-sell-data/
20/01/2025 13:56:13
QRCode
archive.org

HPE investigating claims by the hacker IntelBroker, who is offering to sell source code and other data allegedly stolen from the tech giant.

securityweek EN 2025 HPE IntelBroker Data-Breach HewlettPackard
IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024 https://www.trendmicro.com/en_us/research/25/a/iot-botnet-linked-to-ddos-attacks.html
20/01/2025 08:53:40
QRCode
archive.org
thumbnail

Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras.

trendmicro EN 2025 malware iot research report cyber-threats DDoS IoT botnet cameras
Will the Real Volt Typhoon Please Stand Up? https://censys.com/will-the-real-volt-typhoon-please-stand-up/
20/01/2025 07:31:49
QRCode
archive.org
thumbnail

Despite both technical exposure by researchers and law enforcement disruption, this infrastructure has remained uncharacteristically consistent, only changing hosting providers. Given the contrasting high level of sophistication between Volt Typhoon’s activity within target organizations and their proxy network, it is possible the KV Botnet is operated by a party other than Volt Typhoon.

censys EN 2025 research Volt-Typhoon KVBotnet exposure
Gootloader inside out https://news.sophos.com/en-us/2025/01/16/gootloader-inside-out/
20/01/2025 07:31:02
QRCode
archive.org
thumbnail

The Gootloader malware family uses a distinctive form of social engineering to infect computers: Its creators lure people to visit compromised, legitimate WordPress websites using hijacked Google search results, present the visitors to these sites with a simulated online message board, and link to the malware from a simulated “conversation” where a fake visitor asks a fake site admin the exact question that the victim was searching for an answer to.

sophos EN 2025 analysis Gootloader
FBI Warns iPhone, Android, Windows Users—Do Not Install These Apps https://www.forbes.com/sites/zakdoffman/2025/01/18/fbi-warns-apple-google-microsoft-users-do-not-install-these-apps/
19/01/2025 10:47:38
QRCode
archive.org
thumbnail

The concept is simple, the FBI explains: “Scammers impersonate bank reps to convince victims that hackers have infiltrated their financial account. Victims are urged to move their money fast to protect their assets. In reality, there was never a hacker, and the money that was wired is now fully controlled by the scammer.”

forbes EN 2025 the-Phantom-Hacker bank scam move money
RansomHub Affiliate leverages Python-based backdoor https://www.guidepointsecurity.com/blog/ransomhub-affiliate-leverage-python-based-backdoor/
19/01/2025 10:46:28
QRCode
archive.org
thumbnail

In an incident response in Q4 of 2024, GuidePoint Security identified evidence of a threat actor utilizing a Python-based backdoor to maintain access to compromised endpoints. The threat actor later leveraged this access to deploy RansomHub encryptors throughout the entire impacted network. ReliaQuest documented an earlier version of this malware on their website in February 2024.

guidepointsecurity EN 2025 incident-response Python-based backdoor ransomware RansomHub SocGholish FakeUpdate
The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads https://www.malwarebytes.com/blog/news/2025/01/the-great-google-ads-heist-criminals-ransack-advertiser-accounts-via-fake-google-ads
19/01/2025 10:44:55
QRCode
archive.org
thumbnail

Online criminals are targeting individuals and businesses that advertise via Google Ads by phishing them for their credentials — ironically — via fraudulent Google ads.

The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages. We believe their goal is to resell those accounts on blackhat forums, while also keeping some to themselves to perpetuate these campaigns.

This is the most egregious malvertising operation we have ever tracked, getting to the core of Google’s business and likely affecting thousands of their customers worldwide. We have been reporting new incidents around the clock and yet keep identifying new ones, even at the time of publication.

malwarebytes EN 2025 GoogleAds malvertising phishing
page 33 / 202
4582 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio