Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 39 / 227
NATO’s Emergency Plan for an Orbital Backup Internet https://spectrum.ieee.org/undersea-internet-cables-nato
03/01/2025 22:11:37
QRCode
archive.org
thumbnail

An undersea cable breach would reroute to satellites

spectrum.ieee.org EN 2024 cables information-security internet-traffic nato satellite-communications
Finnish police detain Russian 'ghost fleet' ship crew as cable damage probe continues https://www.euronews.com/my-europe/2025/01/03/police-in-finland-say-eagle-s-crew-detained-as-estlink-2-cable-damage-probe-continues
03/01/2025 12:19:47
QRCode
archive.org

The Eagle S is suspected of damaging the Estlink-2 power cable which runs under the Baltic Sea between Finland and Estonia by dragging its anchor along the seabed on Christmas Day.

Police in Finland say the crew of a Russia-linked tanker suspected of damaging a power cable under the Baltic Sea have been detained indefinitely.

The Eagle S crew consists of 24 people with Finland’s Central Criminal Police imposing movement restrictions on eight.

euronews EN 2025 Finland Russia sabotage cables Balric sea shadow-fleet
New DoubleClickjacking attack exploits double-clicks to hijack accounts https://www.bleepingcomputer.com/news/security/new-doubleclickjacking-attack-exploits-double-clicks-to-hijack-accounts/
03/01/2025 02:39:56
QRCode
archive.org
thumbnail

A new variation of clickjacking attacks called "DoubleClickjacking" lets attackers trick users into authorizing sensitive actions using double-clicks while bypassing existing protections against these types of attacks.

Clickjacking, also known as UI redressing, is when threat actors create malicious web pages that trick visitors into clicking on hidden or disguised webpage elements.

bleepingcomputer Account-Takeover Clickjacking DoubleClickjacking Web-Browser technique
DoubleClickjacking: A New Era of UI Redressing https://www.paulosyibelo.com/2024/12/doubleclickjacking-what.html
03/01/2025 02:39:01
QRCode
archive.org
thumbnail

“Clickjacking” attacks have been around for over a decade, enabling malicious websites to trick users into clicking hidden or disguised buttons they never intended to click . This technique is becoming less practical as modern browsers set all cookies to “SameSite: Lax” by default. Even if an attacker site can frame another website, the framed site would be unauthenticated, because cross-site cookies are not sent. This significantly reduces the risk of successful clickjacking attacks, as most interesting functionality on websites typically requires authentication.

paulosyibelo EN 2024 DoubleClickjacking analysis technique
Introducing the MISP Threat Actor Naming Standard https://www.misp-standard.org/blog/Naming-Threat-Actor/
02/01/2025 22:53:50
QRCode
archive.org

How to name threat actor and adversaries in threat intelligence

misp-standard EN 2024 standards name convention Actor Naming
Cyber attack on Italy's Foreign Ministry, airports claimed by pro-Russian hacker group https://www.reuters.com/technology/cybersecurity/cyber-attack-italys-foreign-ministry-airports-claimed-by-pro-russian-hacker-2024-12-28/
02/01/2025 22:50:55
QRCode
archive.org

Hackers targeted around ten official websites in Italy on Saturday, including the websites of the Foreign Ministry and Milan's two airports, putting them out of action temporarily, the country's cyber security agency said.
The pro-Russian hacker group Noname057(16) claimed the cyber attack on Telegram, saying Italy's "Russophobes get a well deserved cyber response".

reuters EN 2024 Noname057(16) Italy DDoS
New details reveal how hackers hijacked 35 Google Chrome extensions https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/
02/01/2025 10:47:03
QRCode
archive.org
thumbnail

New details have emerged about a phishing campaign targeting Chrome browser extension developers that led to the compromise of at least thirty-five extensions to inject data-stealing code, including those from cybersecurity firm Cyberhaven.

bleepingcomputer EN 2024 Chrome-extension Cyberhaven Data-Theft Facebook OAuth Phishing Supply-Chain-Attack
U.S. Army Soldier Arrested in AT&T, Verizon Extortions – Krebs on Security https://krebsonsecurity.com/2024/12/u-s-army-soldier-arrested-in-att-verizon-extortions/
01/01/2025 22:23:33
QRCode
archive.org

Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by…

krebsonsecurity EN 2024 U.S. Army Soldier busted arrested Verizon Extortions AT&T
Finland identifies seven suspects among crew of alleged Russian 'spy' tanker https://therecord.media/finland-suspects-identified-alleged-russian-spy-ship
31/12/2024 16:59:47
QRCode
archive.org
thumbnail

Seven crew members of the seized ship Eagle S are being treated as suspects as Finland investigates undersea cable sabotage and alleged Russian spying.

therecord.media EN 2024 Finland Russia cable sabotage
Ces hackers israéliens qui s’installent à Barcelone https://www.courrierinternational.com/article/cybersecurite-ces-hackers-israeliens-qui-s-installent-a-barcelone_226052
31/12/2024 13:12:03
QRCode
archive.org
thumbnail

Barcelone se mue en “capitale européenne de la cyberguerre”. Depuis un an et demi, “au moins trois équipes renommées d’experts en piratage informatique”, venus d’Israël, se sont installées dans la capitale de la Catalogne, détaille El Periódico de Catalunya. Le journal espagnol s’appuie sur les informations du quotidien de Tel-Aviv Ha’Aretz, qui a publié le 26 décembre un article sur les hackers “délocalisés” d’Israël vers des pays de l’Union européenne, dont l’Espagne.

courrierinternational FR 2024 Barcelone Espagne spyware Israel cyberguerre
Infocert, in vendita nel deep web milioni di dati di utenti italiani https://www.wired.it/article/infocert-spid-furto-dati/
31/12/2024 12:58:53
QRCode
archive.org
thumbnail

InfoCert, uno dei principali fornitori di identità digitale, ha confermato la violazione annunciata sui forum da criminali informatici. I dati rubati potrebbero essere usati per attacchi phishing mirati

wired IT 2024 spid pubblica-amministrazione data-leak InfoCert Italia
Palo Alto Firewalls Backdoored by Suspected Chinese Hackers https://www.databreachtoday.eu/palo-alto-firewalls-backdoored-by-suspected-chinese-hackers-a-27182
31/12/2024 00:58:46
QRCode
archive.org
thumbnail

A suspected Chinese hacking campaign that began in November is exploiting a vulnerability in Palo Alto firewalls to install a custom malware backdoor for espionage.

databreachtoday EN 2024 Palo-Alto PAN-OS China Northwave CVE-2024-9474 UNC5325 Espionage Littlelamb.Wooltea
China Hacked Treasury Dept. in ‘Major’ Breach, U.S. Says https://www.nytimes.com/2024/12/30/us/politics/china-hack-treasury.html?unlocked_article_code=1.lU4.cvt0.VKdgPzM0c08e&smid=url-share
31/12/2024 00:47:58
QRCode
archive.org

The department notified lawmakers of the episode, which it said was linked to a state-sponsored actor in China.
In a letter informing lawmakers of the episode, the Treasury Department said that it had been notified on Dec. 8 by a third-party software service company, BeyondTrust, that the hacker had obtained a security key that allowed it to remotely gain access to certain Treasury workstations and documents on them

nytimes EN 2024 US Treasury Breach BeyondTrust attribution China Hacked
US Treasury says China accessed government documents in 'major' cyberattack https://techcrunch.com/2024/12/30/us-treasury-says-china-stole-documents-in-major-cyberattack/
31/12/2024 00:45:01
QRCode
archive.org
thumbnail

Treasury officials attributed the December theft of unclassified documents to China.

The Treasury said it was notified on December 8 by BeyondTrust, a company that provides identity access and remote support tech for large organizations and government departments, that hackers had “gained access to a key used by the vendor” for providing remote access technical support to Treasury employees. BeyondTrust disclosed the incident at the time, but did not say how the key was obtained.

techcrunch EN 2024 US Treasury China BeyondTrust cyberattack attribution
Thousands of widely-used public workspaces are leaking data https://www.techradar.com/pro/security/thousands-of-widely-used-public-workspaces-are-leaking-data
29/12/2024 18:26:10
QRCode
archive.org
thumbnail

Following disclosure, Postman implemented additional safeguards

techradar EN 2024 postman data-leak workspaces safeguards public
Massive VW Data Leak Exposed 800,000 EV Owners’ Movements, From Homes To Private Spaces | Carscoops https://www.carscoops.com/2024/12/vw-group-data-breach-exposed-location-info-for-800000-evs/
28/12/2024 12:13:25
QRCode
archive.org
thumbnail

The sensitive information of VW, Audi, Seat, and Skoda EV owners was stored on a poorly secured Amazon cloud account for months

carscoops EN 2024 data-leak Exposed car Skoda EV Seat Audi VW Amazon
Clop ransomware is now extorting 66 Cleo data-theft victims https://www.bleepingcomputer.com/news/security/clop-ransomware-is-now-extorting-66-cleo-data-theft-victims/
28/12/2024 11:58:18
QRCode
archive.org
thumbnail

The Clop ransomware gang started to extort victims of its Cleo data theft attacks and announced on its dark web portal that 66 companies have 48 hours to respond to the demands.

bleepingcomputer EN 2024 Cleo Clop Double-Extortion Extortion Ransomware
Extracting DDosia targets from process memory https://viuleeenz.github.io/posts/2023/05/extracting-ddosia-targets-from-process-memory/
28/12/2024 11:56:08
QRCode
archive.org

This post is part of an analysis that I have carried out during my spare time, motivated by a friend that asked me to have a look at the DDosia project related to the NoName057(16) group. The reason behind this request was caused by DDosia client changes for performing the DDos attacks. Because of that, all procedures used so far for monitoring NoName057(16) activities did not work anymore.

viuleeenz.github.io EN 2023 analysis NoName057(16) DDoSia NoName057 malware binary digital-forensics exploit-development Reverse-engineering
DDosia Project: How NoName057(16) is trying to improve the efficiency of DDoS attacks https://decoded.avast.io/martinchlumecky/ddosia-project-how-noname05716-is-trying-to-improve-the-efficiency-of-ddos-attacks/
28/12/2024 11:54:33
QRCode
archive.org
thumbnail

The new variant of bots implemented an authentication mechanism to communicate with C2 servers and their proxies. Includes IP address blocklisting, presumably to hinder the tracking of the project.

avast EN 2024 2023 Analysis NoName057(16) DDoSia
Cyber firm's Chrome extension hijacked to steal user passwords https://techcrunch.com/2024/12/27/cyberhaven-says-it-was-hacked-to-publish-a-malicious-update-to-its-chrome-extension/
28/12/2024 11:48:00
QRCode
archive.org
thumbnail

The data-loss startup says it was targeted as part of a "wider campaign to target Chrome extension developers."

techcrunch EN 2024 Chrome extension hijacked Cyberhaven
page 39 / 227
4532 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio