Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 35 / 227
Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4 https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/
21/01/2025 16:41:46
QRCode
archive.org
thumbnail

2024 ended with a bang. Cloudflare mitigated another record-breaking DDoS attack peaking at 5.6 Tbps. Overall, Cloudflare mitigated 21.3 million DDoS attacks in 2024, representing a 53% increase compared to 2023.

cloudflare EN 2025 DDoS mitigated record-breaking
Malicious extensions circumvent Google’s remote code ban https://palant.info/2025/01/20/malicious-extensions-circumvent-googles-remote-code-ban/
21/01/2025 09:30:06
QRCode
archive.org
thumbnail

This blog post looks into how 62 malicious extensions circumvent Google’s restrictions of remote code execution in extensions. One group of extensions is associated with the company Phoenix Invicta, another with Technosense Media. The largest group around Sweet VPN hasn’t been attributed yet.

palant EN 2025 palant malicious extensions Google Chrome
Qbot is Back.Connect https://medium.com/walmartglobaltech/qbot-is-back-connect-2d774052369f
21/01/2025 09:29:03
QRCode
archive.org

In addition to the new backConnect malware developed by Qbot operators, research has emerged tying zloader[4] activity to that of the BlackBasta ransomware operation. It is highly likely this new side loading backConnect malware has been or is going to be utilized to further ransomware attacks.

walmartglobaltech EN 2025 qbot back.connect malware operators BlackBasta
Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop https://gbhackers.com/researchers-accessed-windows-bitlocker-encrypted-files/
20/01/2025 16:29:44
QRCode
archive.org
thumbnail

Cybersecurity researchers have uncovered a major flaw in the Windows BitLocker encryption system, allowing attackers to access encrypted data.

gbhackers EN 2025 BitLocker Encrypted bitpixie CVE-2023-21563
HPE Investigating Breach Claims After Hacker Offers to Sell Data - SecurityWeek https://www.securityweek.com/hpe-investigating-breach-claims-after-hacker-offers-to-sell-data/
20/01/2025 13:56:13
QRCode
archive.org

HPE investigating claims by the hacker IntelBroker, who is offering to sell source code and other data allegedly stolen from the tech giant.

securityweek EN 2025 HPE IntelBroker Data-Breach HewlettPackard
IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024 https://www.trendmicro.com/en_us/research/25/a/iot-botnet-linked-to-ddos-attacks.html
20/01/2025 08:53:40
QRCode
archive.org
thumbnail

Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras.

trendmicro EN 2025 malware iot research report cyber-threats DDoS IoT botnet cameras
Will the Real Volt Typhoon Please Stand Up? https://censys.com/will-the-real-volt-typhoon-please-stand-up/
20/01/2025 07:31:49
QRCode
archive.org
thumbnail

Despite both technical exposure by researchers and law enforcement disruption, this infrastructure has remained uncharacteristically consistent, only changing hosting providers. Given the contrasting high level of sophistication between Volt Typhoon’s activity within target organizations and their proxy network, it is possible the KV Botnet is operated by a party other than Volt Typhoon.

censys EN 2025 research Volt-Typhoon KVBotnet exposure
Gootloader inside out https://news.sophos.com/en-us/2025/01/16/gootloader-inside-out/
20/01/2025 07:31:02
QRCode
archive.org
thumbnail

The Gootloader malware family uses a distinctive form of social engineering to infect computers: Its creators lure people to visit compromised, legitimate WordPress websites using hijacked Google search results, present the visitors to these sites with a simulated online message board, and link to the malware from a simulated “conversation” where a fake visitor asks a fake site admin the exact question that the victim was searching for an answer to.

sophos EN 2025 analysis Gootloader
FBI Warns iPhone, Android, Windows Users—Do Not Install These Apps https://www.forbes.com/sites/zakdoffman/2025/01/18/fbi-warns-apple-google-microsoft-users-do-not-install-these-apps/
19/01/2025 10:47:38
QRCode
archive.org
thumbnail

The concept is simple, the FBI explains: “Scammers impersonate bank reps to convince victims that hackers have infiltrated their financial account. Victims are urged to move their money fast to protect their assets. In reality, there was never a hacker, and the money that was wired is now fully controlled by the scammer.”

forbes EN 2025 the-Phantom-Hacker bank scam move money
RansomHub Affiliate leverages Python-based backdoor https://www.guidepointsecurity.com/blog/ransomhub-affiliate-leverage-python-based-backdoor/
19/01/2025 10:46:28
QRCode
archive.org
thumbnail

In an incident response in Q4 of 2024, GuidePoint Security identified evidence of a threat actor utilizing a Python-based backdoor to maintain access to compromised endpoints. The threat actor later leveraged this access to deploy RansomHub encryptors throughout the entire impacted network. ReliaQuest documented an earlier version of this malware on their website in February 2024.

guidepointsecurity EN 2025 incident-response Python-based backdoor ransomware RansomHub SocGholish FakeUpdate
The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads https://www.malwarebytes.com/blog/news/2025/01/the-great-google-ads-heist-criminals-ransack-advertiser-accounts-via-fake-google-ads
19/01/2025 10:44:55
QRCode
archive.org
thumbnail

Online criminals are targeting individuals and businesses that advertise via Google Ads by phishing them for their credentials — ironically — via fraudulent Google ads.

The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages. We believe their goal is to resell those accounts on blackhat forums, while also keeping some to themselves to perpetuate these campaigns.

This is the most egregious malvertising operation we have ever tracked, getting to the core of Google’s business and likely affecting thousands of their customers worldwide. We have been reporting new incidents around the clock and yet keep identifying new ones, even at the time of publication.

malwarebytes EN 2025 GoogleAds malvertising phishing
Banshee: The Stealer That "Stole Code" From MacOS XProtect https://research.checkpoint.com/2025/banshee-macos-stealer-that-stole-code-from-macos-xprotect/
19/01/2025 10:41:52
QRCode
archive.org
thumbnail

Since September, Check Point Research has been monitoring a new version of the Banshee macOS stealer, a malware linked to Russian-speaking cyber criminals targeting macOS users.
This new version had been undetected for over two months until the original version of Banshee Stealer was leaked on XSS forums, which resembled similarities with the malware’s core functionality.
One notable difference between the leaked source code and the version discovered by Check Point Research is the use of a string encryption algorithm. This algorithm is the same as Apple uses in its Xprotect antivirus engine for MacOS.
One method of distributing Banshee Stealer involved malicious GitHub repositories, targeting Windows users with Lumma Stealer and macOS users with Banshee Stealer.
Banshee operated as a ‘stealer-as-a-service’, priced at $3,000, and was advertised through Telegram and forums such as XSS and Exploit. On November 23, 2024, the malware’s source code was leaked, leading the author to shut down the operations the following day.
Despite shutting down the operation, threat actors continue to distribute the new version of Banshee via phishing websites.

checkpoint EN 2025 macOS Banshee XProtect stealer undetected
Europe readies ‘action plan’ to secure hospitals from crippling cyberattacks – POLITICO https://www.politico.eu/article/europe-rushes-to-secure-hospitals-from-crippling-cyberattacks/
19/01/2025 10:34:19
QRCode
archive.org
thumbnail

A spate of devastating attacks on the health care sector prompts Brussels to ramp up funding and threat intelligence.

politico 2025 EU devastating attacks Hospitals helath action-plan
Bolstering the cybersecurity of the healthcare sector https://commission.europa.eu/news/bolstering-cybersecurity-healthcare-sector-2025-01-15_en
19/01/2025 10:33:20
QRCode
archive.org
thumbnail

The Commission has presented an EU Action Plan to strengthen the cybersecurity of hospitals and healthcare providers. This initiative is a key priority within the first 100 days of the new mandate, aiming to create a safer and more secure environment for patients.

In 2023 alone, EU countries reported 309 significant cybersecurity incidents targeting the healthcare sector – more than any other critical sector. As healthcare providers increasingly use digital health records, the risk of data-related threats continues to rise. Many systems can be affected, including electronic health records, hospital workflow systems, and medical devices. Such threats can compromise patient care and even put lives at risk.

commission.europa.eu EN 2025 cybersecurity healthcare sector plan helath EU
Passkeys: they're not perfect but they're getting better https://www.ncsc.gov.uk/blog-post/passkeys-not-perfect-getting-better
19/01/2025 10:31:08
QRCode
archive.org
thumbnail

Now we’re in 2025, a lot more services are offering passkeys as a replacement for passwords and the NCSC believes they are the future of modern authentication. However, there are still some significant bumps in the road ahead. Here we set out the case for mass adoption of passkeys and outline the remaining issues which are hindering their widespread implementation. The NCSC will work alongside industry to help resolve these problems and help to get passkeys over the line.

ncsc.gov.uk EN 2025 UK Passkeys betterpasswords
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344 https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/
19/01/2025 10:28:27
QRCode
archive.org
thumbnail

ESET researchers have discovered a vulnerability that allows bypassing UEFI Secure Boot, affecting the majority of UEFI-based systems. This vulnerability, assigned CVE-2024-7344, was found in a UEFI application signed by Microsoft’s Microsoft Corporation UEFI CA 2011 third-party UEFI certificate. Exploitation of this vulnerability leads to the execution of untrusted code during system boot, enabling potential attackers to easily deploy malicious UEFI bootkits (such as Bootkitty or BlackLotus) even on systems with UEFI Secure Boot enabled, regardless of the installed operating system.

welivesecurity EN 2025 CVE-2024-7344 UEFI Secure Boot vulnerability certificate
sfewer-r7's assessment of CVE-2025-0282 https://attackerkb.com/topics/WzjO6MNGY3/cve-2025-0282
19/01/2025 10:25:54
QRCode
archive.org
thumbnail

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.

AttackerKB EN 2025 CVE-2025-0282 Ivanti Connect Secure PoC ZTA gateways
Chinese hackers breached US government office that assesses foreign investments for national security risks https://edition.cnn.com/2025/01/10/politics/chinese-hackers-breach-committee-on-foreign-investment-in-the-us/index.html
19/01/2025 10:23:03
QRCode
archive.org
thumbnail

Chinese hackers breached the US government office that reviews foreign investments for national security risks, three US officials familiar with the matter told CNN.

The theft, which has not previously been reported, underscores Beijing’s keen interest in spying on a US government office that has broad powers to block Chinese investment in the US as tensions between the world’s two superpowers remain high.

The breach was part of a broader incursion by the hackers into the Treasury Department’s unclassified system. The office targeted by the hackers, the Committee on Foreign Investment in the US (CFIUS), in December gained greater authority to scrutinize real estate sales near US military bases. US lawmakers and national security officials have grown increasingly worried that the Chinese government or its proxies could use land acquisitions to spy on those bases.

cnn EN 2025 US government China breach foreign investments CFIUS
New Star Blizzard spear-phishing campaign targets WhatsApp accounts | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2025/01/16/new-star-blizzard-spear-phishing-campaign-targets-whatsapp-accounts/
19/01/2025 09:27:38
QRCode
archive.org
thumbnail

In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group. This is the first time we have identified a shift in Star Blizzard’s longstanding tactics, techniques, and procedures (TTPs) to leverage a […]

microsoft Threat Intelligence Star-Blizzard WhatsApp spear-phishing campaign research
EU law enforcement training agency data breach: Data of 97,000 individuals compromised - Help Net Security https://www.helpnetsecurity.com/2025/01/13/eu-law-enforcement-training-agency-data-breach-cepol/
19/01/2025 09:13:59
QRCode
archive.org
thumbnail

Personal data of nearly 100,000 individuals that have participated in trainings organized by EU CEPOL has potentially been compromised.

helpnetsecurity EN 2025 EU CEPOL data-leak trainings law enforcement LEEd
page 35 / 227
4527 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio