Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 34 / 202
4021 résultats taggé EN  ✕
Banshee: The Stealer That "Stole Code" From MacOS XProtect https://research.checkpoint.com/2025/banshee-macos-stealer-that-stole-code-from-macos-xprotect/
19/01/2025 10:41:52
QRCode
archive.org
thumbnail

Since September, Check Point Research has been monitoring a new version of the Banshee macOS stealer, a malware linked to Russian-speaking cyber criminals targeting macOS users.
This new version had been undetected for over two months until the original version of Banshee Stealer was leaked on XSS forums, which resembled similarities with the malware’s core functionality.
One notable difference between the leaked source code and the version discovered by Check Point Research is the use of a string encryption algorithm. This algorithm is the same as Apple uses in its Xprotect antivirus engine for MacOS.
One method of distributing Banshee Stealer involved malicious GitHub repositories, targeting Windows users with Lumma Stealer and macOS users with Banshee Stealer.
Banshee operated as a ‘stealer-as-a-service’, priced at $3,000, and was advertised through Telegram and forums such as XSS and Exploit. On November 23, 2024, the malware’s source code was leaked, leading the author to shut down the operations the following day.
Despite shutting down the operation, threat actors continue to distribute the new version of Banshee via phishing websites.

checkpoint EN 2025 macOS Banshee XProtect stealer undetected
Bolstering the cybersecurity of the healthcare sector https://commission.europa.eu/news/bolstering-cybersecurity-healthcare-sector-2025-01-15_en
19/01/2025 10:33:20
QRCode
archive.org
thumbnail

The Commission has presented an EU Action Plan to strengthen the cybersecurity of hospitals and healthcare providers. This initiative is a key priority within the first 100 days of the new mandate, aiming to create a safer and more secure environment for patients.

In 2023 alone, EU countries reported 309 significant cybersecurity incidents targeting the healthcare sector – more than any other critical sector. As healthcare providers increasingly use digital health records, the risk of data-related threats continues to rise. Many systems can be affected, including electronic health records, hospital workflow systems, and medical devices. Such threats can compromise patient care and even put lives at risk.

commission.europa.eu EN 2025 cybersecurity healthcare sector plan helath EU
Passkeys: they're not perfect but they're getting better https://www.ncsc.gov.uk/blog-post/passkeys-not-perfect-getting-better
19/01/2025 10:31:08
QRCode
archive.org
thumbnail

Now we’re in 2025, a lot more services are offering passkeys as a replacement for passwords and the NCSC believes they are the future of modern authentication. However, there are still some significant bumps in the road ahead. Here we set out the case for mass adoption of passkeys and outline the remaining issues which are hindering their widespread implementation. The NCSC will work alongside industry to help resolve these problems and help to get passkeys over the line.

ncsc.gov.uk EN 2025 UK Passkeys betterpasswords
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344 https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/
19/01/2025 10:28:27
QRCode
archive.org
thumbnail

ESET researchers have discovered a vulnerability that allows bypassing UEFI Secure Boot, affecting the majority of UEFI-based systems. This vulnerability, assigned CVE-2024-7344, was found in a UEFI application signed by Microsoft’s Microsoft Corporation UEFI CA 2011 third-party UEFI certificate. Exploitation of this vulnerability leads to the execution of untrusted code during system boot, enabling potential attackers to easily deploy malicious UEFI bootkits (such as Bootkitty or BlackLotus) even on systems with UEFI Secure Boot enabled, regardless of the installed operating system.

welivesecurity EN 2025 CVE-2024-7344 UEFI Secure Boot vulnerability certificate
sfewer-r7's assessment of CVE-2025-0282 https://attackerkb.com/topics/WzjO6MNGY3/cve-2025-0282
19/01/2025 10:25:54
QRCode
archive.org
thumbnail

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.

AttackerKB EN 2025 CVE-2025-0282 Ivanti Connect Secure PoC ZTA gateways
Chinese hackers breached US government office that assesses foreign investments for national security risks https://edition.cnn.com/2025/01/10/politics/chinese-hackers-breach-committee-on-foreign-investment-in-the-us/index.html
19/01/2025 10:23:03
QRCode
archive.org
thumbnail

Chinese hackers breached the US government office that reviews foreign investments for national security risks, three US officials familiar with the matter told CNN.

The theft, which has not previously been reported, underscores Beijing’s keen interest in spying on a US government office that has broad powers to block Chinese investment in the US as tensions between the world’s two superpowers remain high.

The breach was part of a broader incursion by the hackers into the Treasury Department’s unclassified system. The office targeted by the hackers, the Committee on Foreign Investment in the US (CFIUS), in December gained greater authority to scrutinize real estate sales near US military bases. US lawmakers and national security officials have grown increasingly worried that the Chinese government or its proxies could use land acquisitions to spy on those bases.

cnn EN 2025 US government China breach foreign investments CFIUS
EU law enforcement training agency data breach: Data of 97,000 individuals compromised - Help Net Security https://www.helpnetsecurity.com/2025/01/13/eu-law-enforcement-training-agency-data-breach-cepol/
19/01/2025 09:13:59
QRCode
archive.org
thumbnail

Personal data of nearly 100,000 individuals that have participated in trainings organized by EU CEPOL has potentially been compromised.

helpnetsecurity EN 2025 EU CEPOL data-leak trainings law enforcement LEEd
French submarine crew accidentally leak sensitive information through Strava app | Euronews https://www.euronews.com/2025/01/15/french-submarine-crew-accidentally-leak-sensitive-information-through-strava-app
19/01/2025 09:10:56
QRCode
archive.org
thumbnail

France's Navy personnel revealed classified information about submarine patrols through the Strava fitness app, found an investigation by Le Monde.

euronews EN 2025 strava leak sensitive information military France submarine
Ransomware roundup: 2024 end-of-year report - Comparitech https://www.comparitech.com/news/ransomware-roundup-2024-end-of-year-report/
19/01/2025 09:06:31
QRCode
archive.org
thumbnail

In 2024, ransomware groups claimed responsibility for 5,461 successful ransomware attacks on organizations worldwide. 1,204 of these attacks were confirmed by the targeted organizations. The rest were claimed by ransomware groups on their data leak sites, but have not been acknowledged by the targets.

comparitech EN 2025 2024 report ransomware confirmed statistcs
Analysis of Threat Actor Data Postin https://www.https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-data-posting.com/blog/psirt-blogs/analysis-of-threat-actor-data-posting
17/01/2025 11:42:17
QRCode
archive.org

This blog analysis regarding a recent threat actor posting, which claims to offer compromised configuration and VPN credentials from FortiGate devices, provides factual information to help our customers better understand the situation and make informed decisions.

fortinet EN analysis Exposure config.conf CVE-2022-40684 analysis
Gootloader inside out – Sophos News https://news.sophos.com/en-us/2025/01/16/gootloader-inside-out/
17/01/2025 11:37:28
QRCode
archive.org
thumbnail

Open-source intelligence reveals the server-side code of this pernicious SEO-driven malware – without needing a lawyer afterward

sophos EN 2025 Gootloader analysis SEO-driven
2022 zero day was used to raid Fortigate firewall configs. Somebody just released them. https://doublepulsar.com/2022-zero-day-was-used-to-raid-fortigate-firewall-configs-somebody-just-released-them-a7a74e0b0c7f
16/01/2025 10:18:21
QRCode
archive.org

Back in 2022, Fortinet warned that somebody had a zero day vulnerability and was using it to exploit Fortigate firewalls https://www.fortinet.com/blog/psirt-blogs/update-regarding-cve-2022-40684

Today, Belsen Group publicly released Fortigate firewall configs from just over 15k unique devices:

doublepulsar EN 2025 2022 cve-2022-40684 Fortigate dump
Over 5,000 WordPress sites caught in WP3.XYZ malware attack https://cside.dev/blog/over-5k-wordpress-sites-caught-in-wp3xyz-malware-attack
15/01/2025 21:31:20
QRCode
archive.org
thumbnail

Third-party scripts are a key part of the supply chain, giving 3rd party access to sensitive data or allowing malicious actions in the browser of your user. c/side helps you regain control over your website.

cside.dev EN 2025 Wordpress WP3.XYZ malware attack
IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader https://www.kelacyber.com/blog/intelbroker-unmasked-kelas-in-depth-analysis-of-a-cybercrime-leader/
15/01/2025 21:30:25
QRCode
archive.org
thumbnail

Introduction In the ever-evolving world of cybercrime, IntelBroker has emerged as one of its most prominent figures. Known for his high-profile breaches, IntelBroker’s actions have shaken both corporations and government entities alike. At KELA, our deep dive into his online presence has revealed valuable insights, with OSINT traces playing a pivotal role in uncovering his […]

kelacyber EN 2025 Analysis IntelBroker Unmasked
Luxembourg government websites knocked offline in latest cyberattack | Luxembourg Times https://www.luxtimes.lu/luxembourg/luxembourg-government-websites-knocked-offline-in-latest-cyberattack/33948495.html
15/01/2025 21:27:44
QRCode
archive.org
thumbnail

Several websites were inaccessible for a two-hour period on Friday afternoon

luxtimes EN 2025 DDoS cyberattack Luxembourg government
Ministers consider ban on all UK public bodies making ransomware payments | Cybercrime | The Guardian https://www.theguardian.com/technology/2025/jan/14/ministers-consider-ban-on-all-uk-public-bodies-making-ransomware-payments
15/01/2025 09:11:56
QRCode
archive.org
thumbnail

Prohibition would bring the NHS, schools and local councils into line with government departments

theguardian EN 2024 UK ransomware payment banned government
Cyberhaven Incident https://www.extensiontotal.com/cyberhaven-incident-live
15/01/2025 08:25:52
QRCode
archive.org

Stay updated on the latest developments of the Chrome Web Store incident involving Cyberhaven's compromised extension. Follow live updates, detailed analysis, impacted extensions, and expert recommendations for safeguarding your organization against similar attacks

extensiontotal EN 2025 Extensions Chrome-extension compromised hijacked list Cyberhaven
Telefonica Breach Exposes Jira Tickets, Customer Data https://www.darkreading.com/cyberattacks-data-breaches/telefonica-breach-exposes-jira-tickets-customer-data?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
15/01/2025 07:39:06
QRCode
archive.org
thumbnail

The Hellcat ransomware group has stolen roughly 5,000 documents, potentially containing confidential information, from the telecom giant's internal database.

darkreading EN 2025 Data-Breaches Telefonica Hellcat ransomware
Cracking the Code: How Banshee Stealer Targets macOS Users https://blog.checkpoint.com/research/cracking-the-code-how-banshee-stealer-targets-macos-users/
13/01/2025 21:02:34
QRCode
archive.org
thumbnail

Executive Summary: Since September, Check Point Research (CPR) has been monitoring a new version of the Banshee macOS Stealer, a malware that steals

checkpoint EN 2025 banshee malware macOS analysis
Ransomware abuses Amazon AWS feature to encrypt S3 buckets https://www.bleepingcomputer.com/news/security/ransomware-abuses-amazon-aws-feature-to-encrypt-s3-buckets/
13/01/2025 20:12:07
QRCode
archive.org
thumbnail

A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.

bleepingcomputer EN 2025 Encryption Ransomware Computer S3 Amazon AES Security AWS
page 34 / 202
4582 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio