Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 37 / 41
817 résultats taggé 2022  ✕
Belarus conducted widespread phishing campaigns against Ukraine, Poland, Google says https://www.washingtonpost.com/technology/2022/03/07/russia-belarus-conducted-widespread-phishing-campaigns-ukraine-google-says/
09/03/2022 08:50:49
QRCode
archive.org
thumbnail

Belarus conducted widespread phishing attacks against members of the Polish military as well as Ukrainian officials, security researchers said Monday, providing more evidence that its role in Russia’s invasion of Ukraine has gone beyond serving as a staging area for Russian troops

GoogleTAG Belarus EN 2022 Russia cyberwar phishing FancyBear washingtonpost
NSA Releases Network Infrastructure Security Guidance https://www.cisa.gov/uscert/ncas/current-activity/2022/03/03/nsa-releases-network-infrastructure-security-guidance
09/03/2022 08:16:42
QRCode
archive.org

The National Security Agency (NSA) has released a new Cybersecurity Technical Report (CTR): Network Infrastructure Security Guidance. The report captures best practices based on the depth and breadth of experience in supporting customers and responding to threats.
Recommendations include perimeter and internal network defenses to improve monitoring and access controls throughout the network.

PDF Document

uscert csirt CISA NSA Guidance Network howto bestpractices 2022 EN
Quid des sanctions en matière de cyber ? https://incyber.fr/vue-europe-quid-sanctions-matiere-cyber/
08/03/2022 15:46:15
QRCode
archive.org

Si les sanctions économiques contre la Russie ont un impact significatif, il en est autrement de celles imposées dans le domaine cyber.

incyber FR 2022 cyber attribution EU sanctions cybertool
An update on the threat landscape https://blog.google/threat-analysis-group/update-threat-landscape-ukraine/
08/03/2022 14:28:40
QRCode
archive.org
thumbnail

Online security is extremely important for people in Ukraine and the surrounding region right now. Government agencies, independent newspapers and public service providers need it to function and individuals need to communicate safely. Google’s Threat Analysis Group (TAG) has been working around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.

google threat analysis 2022 EN Ukraine TAG GoogleTAG informations APT28 UNC1151 Ghostwriter FancyBear MustangPanda
2 New Mozilla Firefox 0-Day Bugs Under Active Attack — Patch Your Browser ASAP! https://thehackernews.com/2022/03/2-new-mozilla-firefox-0-day-bugs-under.html?m=1
07/03/2022 18:13:13
QRCode
archive.org

Mozilla has pushed out-of-band software updates to its Firefox web browser to contain two high-impact security vulnerabilities, both of which it says are being actively exploited in the wild.

CVE-2022-26485 CVE-2022-26486 firefox thehackernews en 2022 browser patch vulnerability Mozilla XSLT
Samsung confirms hackers stole Galaxy devices source code https://www.bleepingcomputer.com/news/security/samsung-confirms-hackers-stole-galaxy-devices-source-code/
07/03/2022 17:47:33
QRCode
archive.org
thumbnail

Samsung Electronics confirmed on Monday that its network was breached and the hackers stole confidential information, including source code present in Galaxy smartphones.

bleepingcomputer Lapsus$ Samsung Galaxy EN 2022 confidential DataBreach sourcecode
The Dirty Pipe Vulnerability — The Dirty Pipe Vulnerability documentation https://dirtypipe.cm4all.com/
07/03/2022 16:07:02
QRCode
archive.org

This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes.

It is similar to CVE-2016-5195 “Dirty Cow” but is easier to exploit.

The vulnerability was fixed in Linux 5.16.11, 5.15.25 and 5.10.102.

CVE-2022-0847 dirtypipe Linux Kernel arbitrary privilege escalation vulnerability EN 2022
Escaping privileged containers for fun https://pwning.systems/posts/escaping-containers-for-fun/
07/03/2022 08:22:11
QRCode
archive.org

Despite the fact that it is not a 'real' vulnerability, escaping privileged Docker containers is nevertheless pretty funny. And because there will always be people who will come up with reasons or excuses to run a privileged container (even though you really shouldn't), this could really be handy at some point in the future

escape docker kubernetes pwningsystems EN 2022 escalation
Hackers leak 190GB of alleged Samsung data, source code https://www.bleepingcomputer.com/news/security/hackers-leak-190gb-of-alleged-samsung-data-source-code/
06/03/2022 20:22:16
QRCode
archive.org
thumbnail

The Lapsus$ data extortion group leaked today a huge collection of confidential data they claim to be from Samsung Electronics, the South Korean giant consumer electronics company.

DataBreach DataLeak Lapsus$ Samsung bleepingcomputer 2022 EN confidential
Cybercriminals who breached Nvidia issue one of the most unusual demands ever https://arstechnica.com/information-technology/2022/03/cybercriminals-who-breached-nvidia-issue-one-of-the-most-unusual-demands-ever/
06/03/2022 18:43:49
QRCode
archive.org
thumbnail

Chipmaker has until Friday to comply or see its crown-jewel source code released.

Nvidia 2022 EN ransom demands code arstechnica
Malware now using stolen NVIDIA code signing certificates https://www.bleepingcomputer.com/news/security/malware-now-using-stolen-nvidia-code-signing-certificates/
06/03/2022 10:28:17
QRCode
archive.org
thumbnail

Threat actors are using stolen NVIDIA code signing certificates to sign malware to appear trustworthy and allow malicious drivers to be loaded in Windows.

This week, NVIDIA confirmed that they suffered a cyberattack that allowed threat actors to steal employee credentials and proprietary data.

bleepingcomputer Nvidia certificates malware EN 2022 code signing
Crypto Bug in Samsung Galaxy Devices: Breaking Trusted Execution Environments (TEEs) https://medium.com/asecuritysite-when-bob-met-alice/crypto-bug-in-samsung-galaxy-devices-breaking-trusted-execution-environments-tees-b442f9dea77f
06/03/2022 09:54:50
QRCode
archive.org
thumbnail

If you use an Apple Macbook, it’s likely that you have a secret enclave for important secrets — such as your encryption keys. These keys define the core of the trust infrastructure on the device — and protect applications from stealing these secrets. The TEE also allows isolation between code which is fully trusted, and code that cannot be fully trusted. If this did not happen, we could install applications on our computer which would discover our login password and steal the encryption used used to key things secret and trusted.

asecuritysite bug samsung galaxy EN 2022 CVE-2021-25444 medium CVE-2021–25490
Scam E-Mail Impersonating Red CrossScam E-Mail Impersonating Red Cross https://isc.sans.edu/diary/28404
05/03/2022 14:08:56
QRCode
archive.org
thumbnail

Earlier today, I received a scam email that impersonates the Ukrainian Red Cross. It attempts to solicit donations via Bitcoin. The email is almost certainly not related to any valid Red Cross effort.
There are some legitimate efforts to collect donations for Ukraine using crypto-currencies. This scam may take advantage of these efforts.

sansedu 2022 EN redcross scam war donations email
New Security Vulnerability Affects Thousands of Self-Managed GitLab Instances https://thehackernews.com/2022/03/new-security-vulnerability-affects.html
04/03/2022 21:57:58
QRCode
archive.org

Researchers have disclosed details of a new security vulnerability in GitLab, an open-source DevOps software, that could potentially allow a remote, unauthenticated attacker to recover user-related information.

GitLab thehackernews 2022 EN vulnerability opensource CVE-2021-4191
Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement https://www.proofpoint.com/us/blog/threat-insight/asylum-ambuscade-state-actor-uses-compromised-private-ukrainian-military-emails
04/03/2022 09:15:27
QRCode
archive.org
thumbnail
  • Proofpoint has identified a likely nation-state sponsored phishing campaign using a possibly compromised Ukrainian armed service member’s email account to target European government personnel involved in managing the logistics of refugees fleeing Ukraine.
  • The email included a malicious macro attachment which attempted to download a Lua-based malware dubbed SunSeed.
  • The infection chain used in this campaign bears significant similarities to a historic campaign Proofpoint observed in July 2021, making it likely the same threat actor is behind both clusters of activity.
  • Proofpoint is releasing this report in an effort to balance accuracy with responsibility to disclose actionable intelligence during a time of high-tempo conflict.
APT Russia Ukraine Government Military proofpoint EN 2022 phishing refugees SunSeed
L'Anssi sème le doute sur l'usage des solutions Kaspersky https://www.lemondeinformatique.fr/actualites/lire-l-anssi-seme-le-doute-sur-l-usage-des-solutions-kaspersky-86009.html
04/03/2022 09:08:04
QRCode
archive.org
thumbnail

Dans un exercice d'équilibriste, l'Anssi a demandé aux entreprises de s'interroger sur l'utilisation des solutions de l'éditeur Kaspersky du fait des liens avec la Russie. Elle prône à moyen terme une diversification des outils de sécurité.

lemondeinformatique 2022 FR Kaspersky Russie menace
Tensions internationales – Menace cyber https://www.cert.ssi.gouv.fr/cti/CERTFR-2022-CTI-001/
04/03/2022 09:06:34
QRCode
archive.org

Les tensions internationales actuelles causées par l’invasion de l’Ukraine par la Russie s’accompagnent d’effets dans le cyberespace. Si les combats en Ukraine sont principalement conventionnels, l’ANSSI constate l’usage de cyberattaques dans le cadre du conflit. Dans un espace numérique sans frontières, ces cyberattaques peuvent affecter des entités françaises et il convient sans céder à la panique de l’anticiper et de s’y préparer. Aussi, afin de réduire au maximum la probabilité de tels événements et d’en limiter les effets, l’ANSSI partage des bonnes pratiques de sécurité ainsi que des éléments sur la menace et invite l’ensemble des acteurs à s’en saisir. A cette fin, ce bulletin centralise et diffuse les éléments d’intérêt cyber en lien avec le contexte actuel pour favoriser le renforcement du niveau de protection de l’ensemble des entités françaises. Il sera mis à jour régulièrement.

ANSSI CERTFR FR 2022 cybermenace Russie Kaspersky rapport menace
Cyber Realism in a Time of War https://www.lawfareblog.com/cyber-realism-time-war
03/03/2022 21:16:47
QRCode
archive.org
thumbnail

Activity in the digital domain may affect the war in Eastern Europe at the margins, but it will not decide it. That should tell us something about the West’s cyber posture.

politics lawfareblog weapon EN 2022 analysis Cybersecurity realism opinion
Conti Ransomware https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/
03/03/2022 09:52:55
QRCode
archive.org

A Ukrainian security researcher this week leaked several years of internal chat logs and other sensitive data tied to Conti, an aggressive and ruthless Russian cybercrime group that focuses on deploying its ransomware to companies with more than $100 million…

Krebs Conti NSA cybercrime contileak EN 2022 krebsonsecurity
Phishing attacks target countries aiding Ukrainian refugees https://www.bleepingcomputer.com/news/security/phishing-attacks-target-countries-aiding-ukrainian-refugees/
02/03/2022 14:41:10
QRCode
archive.org
thumbnail

A spear-phishing campaign likely coordinated by a state-backed threat actor has been targeting European government personnel providing logistics support to Ukrainian refugees.

Belarus Europe Ghostwriter Malware Phishing TA445 Ukraine UNC1151 bleepingcomputer EN 2022 refugees
page 37 / 41
4836 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn