Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 36 / 41
817 résultats taggé 2022  ✕
Ukraine warns of InvisiMole attacks tied to state-sponsored Russian hackers https://www.zdnet.com/article/ukraine-warns-of-invisimole-attacks-tied-to-state-sponsored-russian-hackers/
21/03/2022 21:02:35
QRCode
archive.org
thumbnail

InvisiMole has been collaborating with the Gamaredon APT for years.

InvisiMole APT EN 2022 Russia state-sponsored ukraine zdnet phishing cyberwar
Gas Is Too Expensive; Let’s Make It Cheap! https://securelist.com/expensive-gas/83542/
20/03/2022 00:08:33
QRCode
archive.org
thumbnail

A search online lead me to a discovery I didn’t think was possible nowadays. I realized almost immediately that critical security issues were probably involved. I found that out of the many tens of thousands of gas stations the company claimed to have installed their product in, 1,000 are remotely hackable.

Internet-of-Things securelist gas-station EN 2022 shodan IoT research hacking
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus | Ars Technica https://arstechnica.com/information-technology/2022/03/sabotage-code-added-to-popular-npm-package-wiped-files-in-russia-and-belarus/
20/03/2022 00:02:22
QRCode
archive.org
thumbnail

When code with millions of downloads nukes user files, bad things can happen.

Sabotage arstechnica EN 2022 NPM Russia cyberwar node-ipc package CVE-2022-23812
OpenSSL plombé par une importante faille de sécurité https://www.lemondeinformatique.fr/actualites/lire-openssl-plombe-par-une-importante-faille-de-securite-86156.html
19/03/2022 23:57:27
QRCode
archive.org
thumbnail

La bibliothèque de chiffrement web open source OpenSSL est affectée par une vulnérabilité pouvant servir à des attaques par déni de service. Les versions 1.0.2, 1.1.1 et 3.0 doivent être mises à jour dès que possible.

lemondeinformatique FR 2022 OpenSSL DoS CVE-2022-0778 vulnérabilité
Popular NPM Package Updated to Wipe Russia, Belarus Systems to Protest Ukraine Invasion https://thehackernews.com/2022/03/popular-npm-package-updated-to-wipe.html
19/03/2022 23:54:09
QRCode
archive.org

In what's an act of deliberate sabotage, the developer behind the popular "node-ipc" NPM package shipped a new tampered version to condemn Russia's invasion of Ukraine, raising concerns about security in the open-source and the software supply chain.

thehackernews EN 2022 node-ipc developer cyberwar NPM supplychain sabotage CVE-2022-23812
L’Ukraine reconnaît « une énorme perte de communication » après la cyberattaque contre le satellite KA-SAT https://www.lemonde.fr/pixels/article/2022/03/15/l-ukraine-reconnait-une-enorme-perte-de-communication-apres-la-cyberattaque-contre-le-satellite-ka-sat_6117632_4408996.html#xtor=AL-32280270-%5Btwitter%5D-%5Bios%5D
16/03/2022 11:40:00
QRCode
archive.org
thumbnail

Lors d’une conférence de presse, un responsable ukrainien a, pour la première fois, donné des détails sur les conséquences de cette cyberattaque.

lemonde cyberattaque satellite KASAT FR 2022 Ukraine cyberwar
PROPHET SPIDER Exploits Citrix ShareFile https://www.crowdstrike.com/blog/prophet-spider-exploits-citrix-sharefile/
16/03/2022 08:46:41
QRCode
archive.org
thumbnail

At the start of 2022, CrowdStrike Intelligence and CrowdStrike Services investigated an incident in which PROPHET SPIDER exploited CVE-2021-22941 — a remote code execution (RCE) vulnerability impacting Citrix ShareFile Storage Zones Controller — to compromise a Microsoft Internet Information Services (IIS) web server. The adversary exploited the vulnerability to deploy a webshell that enabled the downloading of additional tools. This incident highlights how PROPHET SPIDER continues to evolve their tradecraft while continuing to exploit known web-server vulnerabilities.

CrowdStrike PROPHETSPIDER EN 2022 CVE-2021-22941RCE webshell ShareFile vulnerability Citrix
Cyber-attaques en Suisse sur des particuliers? «On ne peut rien exclure» https://www.watson.ch/fr/!564691503
14/03/2022 00:48:58
QRCode
archive.org
thumbnail

Interview | La Suisse doit s'attendre à des cyberattaques après les sanctions contre la Russie. Seot questions à Solange Ghernaouti, experte en cybersécurité.

guerre Russie Cybercrime Suisse Interview CH 2022 FR watson Ghernaouti
Raccoon Stealer: “Trash panda” abuses Telegram https://decoded.avast.io/vladimirmartyanov/raccoon-stealer-trash-panda-abuses-telegram/
14/03/2022 00:34:57
QRCode
archive.org
thumbnail

We recently came across a stealer, called Raccoon Stealer, a name given to it by its author. Raccoon Stealer uses the Telegram infrastructure to store and update actual C&C addresses.  Raccoon Stealer is a password stealer capable of stealing not just passwords, but various types of data, including: Cookies, saved logins and forms data from […]

avast stealer EN 2022 RaccoonStealer Telegram research malware passwordstealer
Cyber Security Incident Pushes Ubisoft to Issue Internal Password Reset https://www.hackread.com/ubisoft-employee-passwordresets-cyber-security-incident/
12/03/2022 20:13:48
QRCode
archive.org
thumbnail

It is unclear what type of “Cyber Security Incident” Ubisoft suffered but on Telegram LAPSUS$ hacking group responded to the news with smirking face emoji suggesting their alleged involvement.

ubisoft en 2022 hackread LAPSUS$
Exclusive: U.S. spy agency probes sabotage of satellite internet during Russian invasion, sources say | Reuters https://www.reuters.com/world/europe/exclusive-us-spy-agency-probes-sabotage-satellite-internet-during-russian-2022-03-11/
12/03/2022 09:09:42
QRCode
archive.org
thumbnail

Western intelligence agencies are investigating a cyberattack by unidentified hackers that disrupted broadband satellite internet access in Ukraine coinciding with Russia's invasion, according to three people with direct knowledge of the incident.

reuters Viasat en 2022 sabotage Ukraine ukraine-war intelligence russia
Armis Finds Three Critical Zero-Day Vulnerabilities in APC Smart-UPS Devices, Dubbed "TLStorm," Exposing More than 20 Million Enterprise Devices https://www.prnewswire.com/news-releases/armis-finds-three-critical-zero-day-vulnerabilities-in-apc-smart-ups-devices-dubbed-tlstorm-exposing-more-than-20-million-enterprise-devices-301497137.html
11/03/2022 20:27:21
QRCode
archive.org
thumbnail

Vulnerabilities found in widely-used Uninterruptible Power Supplies could allow attackers to bypass security features and remotely take over or damage critical industrial, medical, and enterprise devices

TLStorm armis UPS APC prnewswire 2022 EN vulnerability
EU and UK launch antitrust investigation into Google and Meta’s adtech dealings - The Verge https://www.theverge.com/2022/3/11/22972384/eu-uk-antitrust-investigation-google-meta-facebook-jedi-blue-adtech-deal
11/03/2022 11:33:54
QRCode
archive.org
thumbnail

They’re accused of colluding to carve up the advertising market between them

theverge EU UK EN 2022 antitrust investigation Google Meta advertising adtech legal
BRANCH HISTORY INJECTION https://www.vusec.net/projects/bhi-spectre-bhb/?s=09
11/03/2022 10:09:52
QRCode
archive.org

On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks
BHI (or Spectre-BHB) is a revival of cross-privilege Spectre-v2 attacks on modern systems deploying in-hardware defenses. And we have a very neat end-to-end exploit leaking arbitrary kernel memory on modern Intel CPUs to prove it (PoC||GTFO right?).

vusec 2022 EN analysis spectre exploit speculative cross-privilege attack
Denmark: Datatilsynet publishes guidance on use of cloud technologies https://www.dataguidance.com/news/denmark-datatilsynet-publishes-guidance-use-cloud
11/03/2022 09:24:38
QRCode
archive.org

The Danish data protection authority ('Datatilsynet') announced, on 9 March 2022, that it had published a new guide on the use of cloud services, as well as a short overview of frequently asked questions ('FAQs'). In particular, the Datatilsynet stated that the new guide is targeted at data controllers and notes the considerations which data controllers must keep in mind when using a cloud service, including an outline of the pitfalls, opportunities, and obligations that arise when using such technologies.
Document PDF

Denmark dataguidance EN 2022 guidance cloud privacy legal EU Datatilsynet
Iranian linked conglomerate MuddyWater comprised of regionally focused subgroups https://blog.talosintelligence.com/2022/03/iranian-supergroup-muddywater.html
10/03/2022 16:30:02
QRCode
archive.org
thumbnail

Cisco Talos has observed new cyber attacks targeting Turkey and other Asian countries we believe with high confidence are from groups operating under the MuddyWater umbrella of APT groups. U.S. Cyber Command recently connected MuddyWater to Iran's Ministry of Intelligence and Security (MOIS).

talosintelligence Iranian EN 2022 APT research MuddyWater Turkey SloughRAT RAT
Guerre en Ukraine : les utilisateurs du réseau satellitaire Viasat victimes d’une cyberattaque https://www.lemonde.fr/pixels/article/2022/03/08/guerre-en-ukraine-les-utilisateurs-du-reseau-satellitaire-viasat-victiment-d-une-cyberattaque_6116600_4408996.html
09/03/2022 16:45:05
QRCode
archive.org
thumbnail

Des milliers de particuliers et d’entreprises européennes sont sans connexion depuis le 24 février. De plus en plus d’éléments pointent vers le sabotage d’un satellite, en lien avec le conflit ukrainien.

Ukraine FR 2022 cyberwar lemonde Viasat sabotage satellite firmware
Weaponizing Middleboxes for TCP Reflected Amplification https://geneva.cs.umd.edu/posts/usenix21-weaponizing-censors/
09/03/2022 09:30:38
QRCode
archive.org

Geneva is a genetic algorithm that automatically learns how to evade nation state censors.

Amplification DDoS research Middleboxes censure DDoS EN 2022 Weaponizing
CVE-2022-26143: TP240PhoneHome Reflection/Amplification DDoS Attack Vector https://www.akamai.com/blog/security/phone-home-ddos-attack-vector
09/03/2022 08:57:18
QRCode
archive.org

A new reflection/amplification distributed denial of service (DDoS) vector with a record-breaking potential amplification ratio of 4,294,967,296:1 has been abused by attackers in the wild to launch multiple high-impact DDoS attacks.

CVE-2022-26143 Akamai reflection amplification DDoS attacks EN 2022
New method that amplifies DDoSes by 4 billion-fold. What could go wrong? https://arstechnica.com/information-technology/2022/03/ddosers-use-new-method-capable-of-amplifying-traffic-by-a-factor-of-4-billion/
09/03/2022 08:55:36
QRCode
archive.org
thumbnail

New method also stretches out DDoS durations to 14 hours.

DDoS arstechnica EN 2022 amplification
page 36 / 41
4836 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn