Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 4 / 76
1513 résultats taggé 2024  ✕
2024-12 Reference Advisory: Session Smart Router: Mirai malware found on systems when the default password remains unchanged https://supportportal.juniper.net/s/article/2024-12-Reference-Advisory-Session-Smart-Router-Mirai-malware-found-on-systems-when-the-default-password-remains-unchanged?
22/12/2024 20:48:48
QRCode
archive.org

n Wednesday, December 11, 2024, several customers reported suspicious behavior on their Session Smart Network (SSN) platforms. These systems have been infected with the Mirai malware and were subsequently used as a DDOS attack source to other devices accessible by their network. The impacted systems were all using default passwords. Any customer not following recommended best practices and still using default passwords can be considered compromised as the default SSR passwords have been added to the virus database.

juniper EN 2024 advisory SessionSmart Router SSN Mirai default-password
Malicious ads push Lumma infostealer via fake CAPTCHA pages https://www.bleepingcomputer.com/news/security/malicious-ads-push-lumma-infostealer-via-fake-captcha-pages/
22/12/2024 20:47:10
QRCode
archive.org
thumbnail

A large-scale malvertising campaign distributed the Lumma Stealer info-stealing malware through fake CAPTCHA verification pages that prompt users to run PowerShell commands to verify they are not a bot.

bleepingcomputer EN 2024 Captcha ClickFix Information-Stealer Lumma Malvertising Malware PowerShell Security InfoSec Computer-Security
Effective Phishing Campaign Targeting European Companies and Organizations https://unit42.paloaltonetworks.com/european-phishing-campaign/
22/12/2024 20:46:06
QRCode
archive.org
thumbnail

A phishing campaign targeting European companies used fake forms made with HubSpot's Free Form Builder, leading to credential harvesting and Azure account takeover. A phishing campaign targeting European companies used fake forms made with HubSpot's Free Form Builder, leading to credential harvesting and Azure account takeover.

unit42 EN 2024 Phishing Campaign EU Azure takeover HubSpot analysis
APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP https://thehackernews.com/2024/12/apt29-hackers-target-high-value-victims.html
22/12/2024 20:43:52
QRCode
archive.org

The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files.

The activity, which has targeted governments and armed forces, think tanks, academic researchers, and Ukrainian entities, entails adopting a "rogue RDP" technique that was previously documented by Black Hills Information Security in 2022, Trend Micro said in a report.

thehackernews EN 2024 rogue RDP APT29
Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices https://therecord.media/judge-rules-nso-group-liable-for-hack-of-1400-whatsapp-users
22/12/2024 20:40:16
QRCode
archive.org
thumbnail

The precedent-setting ruling from a Northern California federal judge could lead to massive damages against NSO Group, whose notorious spyware has been reportedly used by various governments worldwide.

therecord.media EN 2024 NSO Group liable WhatsApp spyware
BeyondTrust Remote Support SaaS Service Security Investigation https://www.beyondtrust.com/remote-support-saas-service-security-investigation
22/12/2024 20:31:38
QRCode
archive.org

BeyondTrust identified a security incident that involved a limited number of Remote Support SaaS customers. On December 5th, 2024, a root cause analysis into a Remote Support SaaS issue identified an API key for Remote Support SaaS had been compromised. BeyondTrust immediately revoked the API key, notified known impacted customers, and suspended those instances the same day while providing alternative Remote Support SaaS instances for those customers.
12/12/24 While the security incident forensics investigation remains ongoing, there are no material updates to provide at this time. We continue to pursue all possible paths as part of the forensic analysis, with the assistance of external forensic parties, to ensure we conduct as thorough an investigation as possible. We continue to communicate, and work closely with, all known affected customers. We will continue to provide updates here until our investigation is concluded.

beyondtrust EN 2024 SaaS Investigation incident API-key root-cause
Medion hack? BlackBasta ransomware has allegedly copied 1.5 TB of data | heise online https://www.heise.de/en/news/Medion-hack-BlackBasta-ransomware-has-allegedly-copied-1-5-TB-of-data-10216148.html
21/12/2024 00:00:48
QRCode
archive.org
thumbnail

Cyber criminals claim to have successfully attacked Medion, a distributor of electronic products.

heise EN 2024 BlackBasta Cyberangriff Hacking MEDION Ransomware
'AI mafia' gang bombards London restaurant with scathing fake Google reviews to extort £10,000 https://www.dailymail.co.uk/travel/article-14205573/Fake-google-reviews-AI-mafia-restaurant.html?ito=native_share_article-top
20/12/2024 16:02:08
QRCode
archive.org

A shell-shocked owner woke to find a barrage of one-star reviews had dragged her Google rating from 4.9 to 2.3 virtually overnight.

dailymail.co.uk EN 2024 AImafia Google rating London Extortion London restaurant
China 'compromised' Canadian government networks and stole valuable info: spy agency | CBC News https://www.cbc.ca/news/politics/cse-cyber-threats-china-1.7367719
20/12/2024 14:55:59
QRCode
archive.org
thumbnail

Threat actors sponsored by China “compromised” government networks over the past five years and collected valuable information, says a new report from Canada’s cyber spy agency.

cbc.ca EN 2024 Canadian government compromised spy
Ascension: Health data of 5.6 million stolen in ransomware attack https://www.bleepingcomputer.com/news/security/ascension-health-data-of-56-million-stolen-in-ransomware-attack/
20/12/2024 13:09:00
QRCode
archive.org
thumbnail

​Ascension, one of the largest private U.S. healthcare systems, is notifying over 5.6 million patients and employees that their personal and health data was stolen in a May cyberattack linked to the Black Basta ransomware operation.

bleepingcomputer EN 2024 Ascension Data-Breach Healthcare Ransomware Security InfoSec Computer-Security
DigiEver Fix That IoT Thing! https://www.akamai.com/blog/security-research/digiever-fix-that-iot-thing
20/12/2024 09:36:53
QRCode
archive.org
  • A vulnerability in DigiEver DS-2105 Pro DVRs is being exploited to spread malware.

  • The Akamai Security Intelligence Research Team (SIRT) noticed this activity in their honeypots on November 18, 2024.

  • The vulnerability was originally discovered by Ta-Lun Yen and a CVE identifier has been requested by the Akamai SIRT.

  • The malware is a Mirai variant that has been modified to use improved encryption algorithms.

  • We have included a list of indicators of compromise (IoCs) in this blog post to assist in defense against this threat.

akamai EN 2024 mirai DigiEver DS-2105 Pro DVR vulnerability
NotLockBit: A Deep Dive Into the New Ransomware Threat | Qualys Security Blog https://blog.qualys.com/vulnerabilities-threat-research/2024/12/18/notlockbit-a-deep-dive-into-the-new-ransomware-threat
20/12/2024 09:34:29
QRCode
archive.org
thumbnail

NotLockBit is a new and emerging ransomware family that actively mimics the behavior and tactics of the well-known LockBit ransomware.

qualys EN 2024 NotLockBit Ransomware analysis
A new playground: Malicious campaigns proliferate from VSCode to npm https://www.reversinglabs.com/blog/a-new-playground-malicious-campaigns-proliferate-from-vscode-to-npm
20/12/2024 09:27:08
QRCode
archive.org
thumbnail

To avoid compromised packages being introduced as a dependency in a larger project, security teams need to keep an eye peeled for such malicious code.

reversinglabs EN 2024 Malicious VSCode npm Supply-Chain-Attack
The Rise of Alliances: NoName057(16)'s Transformation in 2024 https://www.radware.com/security/threat-advisories-and-attack-reports/the-rise-of-alliances-noname057-16-transformation-in-2024/
20/12/2024 09:25:12
QRCode
archive.org
thumbnail

In the dynamic and rapidly shifting landscape of hacktivism, few entities have managed to capture as much attention as NoName057(16). Once branded as the

radware EN 2024 NoName057(16) NoName057 hacktivism DDoS Alliances
Google Calendar Notifications Bypassing Email Security Policies https://blog.checkpoint.com/securing-user-and-access/google-calendar-notifications-bypassing-email-security-policies/
20/12/2024 09:23:11
QRCode
archive.org
thumbnail

Google Calendar is a tool for organizing schedules and managing time, designed to assist individuals and businesses in planning their days efficiently.

checkpoint EN 2024 Google Calendar Notifications phishing bypass
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? • KELA Cyber Threat Intelligence https://www.kelacyber.com/blog/three-months-after-the-storm-did-cybercriminals-move-to-telegram-alternatives/
20/12/2024 09:19:49
QRCode
archive.org
thumbnail

Introduction Telegram, as previously reported by KELA, is a popular and legitimate messaging platform that has evolved in the past few years into a major platform for cybercriminal activities. Its lack of strict content moderation has made the platform cybercriminals’ playground. They use the platform for distribution of stolen data and hacking tools, publicizing their […]

kelacyber EN 2024 Telegram analysis KELA platform cybercriminals
Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces – Sophos News https://news.sophos.com/en-us/2024/12/19/phishing-platform-rockstar-2fa-trips-and-flowerstorm-picks-up-the-pieces/
20/12/2024 09:18:33
QRCode
archive.org
thumbnail

A sudden disruption of a major phishing-as-a-service provider leads to the rise of another…that looks very familiar 

sophos EN 2024 research analysis phishing-as-a-service Rockstar FlowerStorm
Hacker Leaks Cisco Data https://www.securityweek.com/hacker-leaks-cisco-data/
20/12/2024 09:16:06
QRCode
archive.org

IntelBroker has leaked 2.9 Gb of data stolen recently from a Cisco DevHub instance, but claims it’s only a fraction of the total.

securityweek EN 2024 Cisco DevHub data-leak
Supply Chain Attack on Rspack npm Packages Injects Cryptojac... https://socket.dev/blog/rspack-supply-chain-attack
20/12/2024 09:12:54
QRCode
archive.org
thumbnail

A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.

socket.dev EN 2024 Supply-Chain-Attack Rspack malware npm
DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7 https://www.404media.co/dhs-says-china-russia-iran-and-israel-are-spying-on-people-in-us-with-ss7/
20/12/2024 09:11:28
QRCode
archive.org
thumbnail

The Department of Homeland Security knows which countries SS7 attacks are primarily originating from. Others include countries in Europe, Africa, and the Middle East.

404media EN 2024 SS7 China Russia Iran Israel spy US attacks telco
page 4 / 76
4507 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio