Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 37 / 207
4130 résultats taggé E*N  ✕
48,000+ internet-facing Fortinet firewalls still open to attack https://www.helpnetsecurity.com/2025/01/22/48000-internet-facing-fortinet-firewalls-still-open-to-attack/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
27/01/2025 09:28:40
QRCode
archive.org
thumbnail

Too many Fortinet firewalls vulnerable to attack via CVE-2024-55591 are still accessible from the Internet.

helpnetsecurity EN 2025 shodan CVE-2024-55591Fortinet firewalls
Sweden launches sabotage probe after another data cable damaged in Baltic Sea Europe https://www.france24.com/en/europe/20250126-another-undersea-cable-damaged-in-baltic-sea-latvia-dispatches-warship
27/01/2025 09:27:17
QRCode
archive.org

Another undersea data cable, this time connecting Sweden and Latvia, has been severed in the Baltic Sea, officials from both countries said Sunday. The incident prompted Sweden to launch a criminal probe into the matter and seize a "suspect vessel" vessel headed for Russia.

france24 EN 2025 cable Sweden Latvia Baltic undersea sabotage Russia
The J-Magic Show: Magic Packets and Where to find them - Lumen Blog https://blog.lumen.com/the-j-magic-show-magic-packets-and-where-to-find-them/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
27/01/2025 09:23:20
QRCode
archive.org
thumbnail

A backdoor tailored to Juniper routers that hides the activation signal in regular traffic using “Magic Packets” to give access to an attacker

lumen EN 2025 J-Magic Magic Packets Juniper cd00r
HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code https://www.sentinelone.com/blog/hellcat-and-morpheus-two-brands-one-payload-as-ransomware-affiliates-drop-identical-code/
27/01/2025 09:19:08
QRCode
archive.org
thumbnail

Analysis of payloads suggest affiliates may be using a shared codebase or common builder to deploy attacks under different RaaS brand names.

sentinelone EN 2025 HellCat Morpheus Brands Payload analysis
2024 macOS Malware Review | Infostealers, Backdoors, and APT Campaigns Targeting the Enterprise https://www.sentinelone.com/blog/2024-macos-malware-review-infostealers-backdoors-and-apt-campaigns-targeting-the-enterprise/?mkt_tok=MzI3LU1OTS0wODcAAAGYOORAuRtyZRpFfW2HT_OkOPDtCNQed2DXhifpYTkwjSoaS1D9FULGtQV0GdEu3K_QhZjdKwK9kQe3cmRKlxg0hyHnPJ1LJPoE41DHo4gx-3PX89Q
27/01/2025 09:17:52
QRCode
archive.org
thumbnail

Learn about the key macOS malware families from 2024, including tactics, IoCs, opportunities for detection, and links to further reading.

sentinelone EN 2025 204 review macOS malware IoCs
How A Large-Scale Russian Botnet Operation Stays Under the Radar https://blogs.infoblox.com/threat-intelligence/one-mikro-typo-how-a-simple-dns-misconfiguration-enables-malware-delivery-by-a-russian-botnet/
26/01/2025 12:15:21
QRCode
archive.org
thumbnail

Russian threat actors combine domain name vulnerabilities with hidden router proxy techniques to scale their attacks while remaining shielded from detection.

infoblox EN 2025 Mikrotik Botnet Russia proxy Large-Scale
Security Advisory SNWLID-2025-0002 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002
24/01/2025 16:42:03
QRCode
archive.org

Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.

IMPORTANT: SonicWall PSIRT has been notified of possible active exploitation of the referenced vulnerability by threat actors. We strongly advises users of the SMA1000 product to upgrade to the hotfix release version to address the vulnerability.

Please note that SonicWall Firewall and SMA 100 series products are not affected by this vulnerability.

SonicWall EN 2025 CVE-2025-23006 advisory
fasthttp Used in New Bruteforce Campaign https://www.speartip.com/fasthttp-used-in-new-bruteforce-campaign/
24/01/2025 16:10:17
QRCode
archive.org
thumbnail

SpearTip Security Operations Center, together with the SaaS Alerts team, identified an emerging threat involving the fastHTTP library

speartip EN 2025 fastHTTP library Bruteforce Campaign
Targeted supply chain attack against Chrome browser extensions https://blog.sekoia.io/targeted-supply-chain-attack-against-chrome-browser-extensions/
24/01/2025 09:22:51
QRCode
archive.org
thumbnail

In this blog post, learn about the supply chain attack targeting Chrome browser extensions and the associated targeted phishing campaign.

sekoia EN 2025 supply chain attack Chrome extensions
Government and university websites targeted in ScriptAPI[.]dev client-side attack - c/side https://cside.dev/blog/government-and-university-websites-targeted-in-scriptapi-dev-client-side-attack
24/01/2025 09:20:53
QRCode
archive.org
thumbnail

Yesterday we discovered another client-side JavaScript attack targeting +500 websites, including governments and universities. The injected scripts create hidden links in the Document Object Model (DOM), pointing to external websites, a programming interface for web documents.

cside.dev EN 2025 skimmer cyber DSS client-side PCI policies c/side website javascript card development web attack browser chain breaches content manager vulnerability data magecart supply client/side credit security tag v4 script formjacking
Hundreds of fake Reddit sites push Lumma Stealer malware https://www.bleepingcomputer.com/news/security/hundreds-of-fake-reddit-sites-push-lumma-stealer-malware/
24/01/2025 08:37:31
QRCode
archive.org
thumbnail

Hackers are distributing close to 1,000 web pages mimicking Reddit and the WeTransfer file sharing service that lead to downloading the Lumma Stealer malware.

bleepingcomputer EN 2025 Impersonation Information-Stealer Infostealer Lumma Malware Reddit WeTransfer
Google launches customizable Web Store for Enterprise extensions https://www.bleepingcomputer.com/news/google/google-launches-customizable-web-store-for-enterprise-extensions/
24/01/2025 08:28:45
QRCode
archive.org
thumbnail

Google has officially launched its Chrome Web Store for Enterprises, allowing organizations to create a curated list of extensions that can be installed in employees' web browsers.

bleepingcomputer EN 2025 Browser-Extension Chrome-Web-Store Enterprise Google Google-Chrome
Malware Redirects WordPress Traffic to Harmful Sites https://blog.sucuri.net/2025/01/malware-redirects-wordpress-traffic-to-harmful-sites.html
24/01/2025 08:25:40
QRCode
archive.org
thumbnail

Learn about the steps we took to uncover and neutralize a malware infection redirecting WordPress traffic to dangerous URLs.

sucuri EN 2025 WP Wordpress Redirect theme injection URL
Russian Cyber Army. Who is it? https://molfar.com/en/blog/russian-cyber-army
24/01/2025 08:14:42
QRCode
archive.org

In December 2023, the Molfar website experienced a DDoS attack. This occurred immediately after the publication of our extensive investigation into the production of Shaheds and Lancets, which included the deanon of the family of chief designer Zakharov. Recently, Molfar discovered who was behind that DDos attack.

Molfar's OSINT analysts, in collaboration with the DC8044 F33d community team, identified several Russian hackers allegedly connected to Russian state structures and received funding from them. Some of these individuals are Ukrainian.

molfar EN 2025 OSINT doxing NoName057 Russian Cyber army
MasterCard DNS Error Went Unnoticed for Years https://krebsonsecurity.com/2025/01/mastercard-dns-error-went-unnoticed-for-years/
22/01/2025 22:39:48
QRCode
archive.org

The payment card giant MasterCard just fixed a glaring error in its domain name server settings that could have allowed anyone to intercept or divert Internet traffic for the company by registering an unused domain name. The misconfiguration persisted for…

krebsonsecurity EN 2025 MasterCard DNS Error Misconfiguration DNS
Rsync contains six vulnerabilities https://kb.cert.org/vuls/id/952657
22/01/2025 22:38:41
QRCode
archive.org

Rsync, a versatile file-synchronizing tool, contains six vulnerabilities present within versions 3.3.0 and below. Rsync can be used to sync files between remote and local computers, as well as storage devices. The discovered vulnerabilities include heap-buffer overflow, information leak, file leak, external directory file-write,–safe-links bypass, and symbolic-link race condition.

cert.org EN 2025 CVE-2024-12084 advisory CVE-2024-12747 CVE-2024-12085 CVE-2024-12088 CVE-2024-12086 CVE-2024-12087
A look at the recent rsync vulnerability https://lwn.net/SubscriberLink/1005302/0eac0cf6f7cd7504/
22/01/2025 22:36:48
QRCode
archive.org

On January 14, Nick Tait announced the discovery of six vulnerabilities in rsync, the popular file-synchronization tool. While software vulnerabilities are not uncommon, the most serious one he announced allows for remote code execution on servers that run rsyncd — and possibly other configurations. The bug itself is fairly simple, but this event provides a nice opportunity to dig into it, show why it is so serious, and consider ways the open-source community can prevent such mistakes in the future.

The vulnerabilities were found by two groups of researchers: Simon Scannell, Pedro Gallegos, and Jasiel Spelman from Google's Cloud Vulnerability Research identified five of them, including the most serious one. Aleksei Gorban, a security researcher at TikTok, discovered the sixth — a race condition in how rsync handles symbolic links.

LWN.net EN 2025 rsync vulnerability CVE-2024-12084
Swiss cities targeted by Russian hackers during WEF https://www.swissinfo.ch/eng/workplace-switzerland/schaffhausen-and-geneva-also-affected-by-russian-hacker-attacks/88763740
22/01/2025 21:22:53
QRCode
archive.org
thumbnail

Russian hackers have targeted canton Schaffhausen and the cities of Geneva and Sierre, paralysing their websites on Wednesday morning.

swissinfo EN 2025 Noname057(16) DDoS Wef
Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog https://blog.qualys.com/vulnerabilities-threat-research/2025/01/21/mass-campaign-of-murdoc-botnet-mirai-a-new-variant-of-corona-mirai
21/01/2025 17:43:02
QRCode
archive.org
thumbnail

The Qualys Threat Research Unit has uncovered a large-scale, ongoing operation within the Mirai campaign, dubbed Murdoc Botnet.

qualys EN 2025 Murdoc Botnet Mirai analysis
Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4 https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/
21/01/2025 16:41:46
QRCode
archive.org
thumbnail

2024 ended with a bang. Cloudflare mitigated another record-breaking DDoS attack peaking at 5.6 Tbps. Overall, Cloudflare mitigated 21.3 million DDoS attacks in 2024, representing a 53% increase compared to 2023.

cloudflare EN 2025 DDoS mitigated record-breaking
page 37 / 207
4687 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio