Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 4 / 5
81 résultats taggé google  ✕
À propos du chiffrement côté client - Aide Administrateur Google Workspace https://support.google.com/a/answer/10741897
18/12/2022 22:26:30
QRCode
archive.org

Vous pouvez chiffrer les données de votre organisation à l'aide de vos propres clés de chiffrement, en plus du chiffrement par défaut fourni par Google Workspace. Avec le chiffrement côté client (CSE) Google Workspace, le chiffrement du contenu est géré dans le navigateur du client avant la transmission ou le stockage des données dans le cloud via Google Drive. De cette façon, les serveurs Google ne peuvent pas accéder à vos clés de chiffrement ni déchiffrer vos données. Après avoir configuré le CSE, vous pouvez choisir quels utilisateurs peuvent créer du contenu chiffré côté client et le partager en interne ou en externe.

Google Workspace 2022 FR chiffrement
Google Online Security Blog: Memory Safe Languages in Android 13 https://security.googleblog.com/2022/12/memory-safe-languages-in-android-13.html
02/12/2022 12:45:56
QRCode
archive.org
thumbnail

As the amount of new memory-unsafe code entering Android has decreased, so too has the number of memory safety vulnerabilities. From 2019 to 2022 it has dropped from 76% down to 35% of Android’s total vulnerabilities. 2022 is the first year where memory safety vulnerabilities do not represent a majority of Android’s vulnerabilities.

Google EN 2022 memory-safe Android statistics vulnerabilities memory safety
Google pushes emergency Chrome update to fix 8th zero-day in 2022 https://www.bleepingcomputer.com/news/security/google-pushes-emergency-chrome-update-to-fix-8th-zero-day-in-2022/
25/11/2022 11:29:34
QRCode
archive.org
thumbnail

Google has released an emergency security update for the desktop version of the Chrome web browser, addressing the eighth zero-day vulnerability exploited in attacks this year.

bleepingcomputer Google Google-Chrome Vulnerability Web-Browser Zero-Day patch CVE-2022-3723 CVE-2022-3075 CVE-2022-2856 CVE-2022-2294 CVE-2022-1364 CVE-2022-1096 CVE-2022-0609
Making Cobalt Strike harder for threat actors to abuse https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse
20/11/2022 20:31:00
QRCode
archive.org
thumbnail

Cobalt Strike, the popular tool used by red teams to test the resilience of their cyber defenses, has seen many iterations and improvements over the last decade. First released in 2012, it was originally the commercial spinoff of the open-source Armitage project that added a graphical user interface (GUI) to the Metasploit framework to help security practitioners detect software vulnerabilities more quickly.

google EN 2022 Cobalt-Strike YARA rules detect
Software Delivery Shield protects the software supply chain https://cloud.google.com/blog/products/devops-sre/introducing-software-delivery-shield-from-google-cloud
14/10/2022 13:43:39
QRCode
archive.org
thumbnail

Software Delivery Shield, a software supply chain security solution, can enhance the security posture along the supply chain from dev to production.

google EN blog cloud supplychain supply-chain solution dev shield announcement
A Dad Took Photos of His Naked Toddler for the Doctor. Google Flagged Him as a Criminal. https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html
22/08/2022 14:27:13
QRCode
archive.org

Google has an automated tool to detect abusive images of children. But the system can get it wrong, and the consequences are serious.

nytimes EN 2022 CSAM scan Photos Naked Toddler Google children Criminal
Google And Cloudflare Are Changing The Trust Infrastructure of the Internet: A Long Goodbye to RSA and a Hello to ECC and ECDSA https://medium.com/asecuritysite-when-bob-met-alice/google-and-cloudflare-are-changing-the-trust-infrastructure-of-the-internet-a-long-goodbye-to-rsa-74982d37949c
20/08/2022 10:16:06
QRCode
archive.org
thumbnail

The RSA method was created by Rivest, Shamir and Adleman in 1978, and it is still used to encrypt and sign for data. The core of trust on the Internet is the usage of PKI, and where Web sites have a…

asecuritysite-when-bob-met-alice Médium EN RSA PKI ECDSA ECC Clouflare Google Buchanan
Bypass phishing detections with Google Translate https://certitude.consulting/blog/en/bypass-phishing-detections-with-google-translate-2/
19/08/2022 09:52:00
QRCode
archive.org

A new wave of phishing is currently circulating (a related story from derstandard.at newspaper can be found here). Documents are said to have been sent to you from a scanner, which you can allegedly download, as can be seen in the following image

certitude EN 2022 phishing Google translate bypass detection Technique
Comprehensive Threat Intelligence: Cisco Talos shares insights related to recent cyber attack on Cisco https://blog.talosintelligence.com/2022/08/recent-cyber-attack.html?m=1
11/08/2022 20:22:21
QRCode
archive.org
thumbnail
  • On May 24, 2022, Cisco became aware of a potential compromise. Since that point, Cisco Security Incident Response (CSIRT) and Cisco Talos have been working to remediate.
  • During the investigation, it was determined that a Cisco employee’s credentials were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronized.
talosintelligence EN 2022 Cisco attack Google sync password insights
Google ads lead to major malvertising campaign https://blog.malwarebytes.com/threat-intelligence/2022/07/google-ads-lead-to-major-malvertising-campaign/
20/07/2022 22:38:50
QRCode
archive.org
thumbnail

Scammers go mainstream by hijacking top Google searches and replacing them with malicious ads.

malwarebytes EN 2022 ads Google abuse malvertising scammers
Google Let Sberbank-Owned RuTarget Harvest User Data for Months https://www.propublica.org/article/google-russia-rutarget-sberbank-sanctions-ukraine
09/07/2022 18:43:48
QRCode
archive.org
thumbnail

The internet giant may have provided Sberbank-owned RuTarget with unique mobile phone IDs, IP addresses, location information and details about users’ interests and online activity.

Propublica EN 2022 rutarget harvesting Russia Google ad
Exclusive: Russian hackers are linked to new Brexit leak website, Google says https://www.reuters.com/technology/exclusive-russian-hackers-are-linked-new-brexit-leak-website-google-says-2022-05-25/
26/05/2022 18:22:05
QRCode
archive.org
thumbnail

A new website that published leaked emails from several leading proponents of Britain's exit from the European Union is tied to Russian hackers, according to a Google cybersecurity official and the former head of UK foreign intelligence.

Reuters EN 2022 Brexit exclusive russian Google UK Russia EU leaks intelligence
Apple, Google and Microsoft Commit to Expanded Support for FIDO Standard to Accelerate Availability of Passwordless Sign-Ins https://fidoalliance.org/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard-to-accelerate-availability-of-passwordless-sign-ins/
06/05/2022 16:19:39
QRCode
archive.org
thumbnail

Faster, easier and more secure sign-ins will be available to consumers across leading devices and platforms  Mountain View, California, MAY 5, 2022  – In a joint effort to make the web […]

FIDO fidoalliance EN 2022 Google Apple Microsoft Passwordless password Standard
Google Online Security Blog: The Package Analysis Project: Scalable detection of malicious open source packages https://security.googleblog.com/2022/04/the-package-analysis-project-scalable.html
03/05/2022 09:58:30
QRCode
archive.org
thumbnail

Despite open source software’s essential role in all software built today, it’s far too easy for bad actors to circulate malicious packages that attack the systems and users running that software. Unlike mobile app stores that can scan for and reject malicious contributions, package repositories have limited resources to review the thousands of daily updates and must maintain an open model where anyone can freely contribute. As a result, malicious packages like ua-parser-js, and node-ipc are regularly uploaded to popular repositories despite their best efforts, with sometimes devastating consequences for users.

google 2022 EN opensource Package Analysis Project malicious packages
Google's WiFi snoop - who knew and who didn't? https://www.theregister.com/2010/05/18/google_street_view_wifi_analysis/
28/03/2022 14:24:56
QRCode
archive.org

The meaning of 'mistake'

theregister EN 2010 WiFi Google snoop privacy personal-data
EU and UK launch antitrust investigation into Google and Meta’s adtech dealings - The Verge https://www.theverge.com/2022/3/11/22972384/eu-uk-antitrust-investigation-google-meta-facebook-jedi-blue-adtech-deal
11/03/2022 11:33:54
QRCode
archive.org
thumbnail

They’re accused of colluding to carve up the advertising market between them

theverge EU UK EN 2022 antitrust investigation Google Meta advertising adtech legal
An update on the threat landscape https://blog.google/threat-analysis-group/update-threat-landscape-ukraine/
08/03/2022 14:28:40
QRCode
archive.org
thumbnail

Online security is extremely important for people in Ukraine and the surrounding region right now. Government agencies, independent newspapers and public service providers need it to function and individuals need to communicate safely. Google’s Threat Analysis Group (TAG) has been working around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.

google threat analysis 2022 EN Ukraine TAG GoogleTAG informations APT28 UNC1151 Ghostwriter FancyBear MustangPanda
Google follows YouTube in cutting off ad revenue to Russian state media https://edition.cnn.com/2022/02/28/tech/google-russia-media-cut-off-ad-revenue-intl-hnk/index.html
28/02/2022 14:08:45
QRCode
archive.org
thumbnail

Google will no longer allow Russian state media outlets to run ads, following a similar decision on Saturday by the tech giant's video subsidiary, YouTube.

cnn 2022 Google Russia monetize RT revenue cyberwar media ads
Analyzing a watering hole campaign using macOS exploits https://blog.google/threat-analysis-group/analyzing-watering-hole-campaign-using-macos-exploits/
15/02/2022 10:33:08
QRCode
archive.org
thumbnail

To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild. In late August 2021, TAG discovered watering hole attacks targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group. The watering hole served an XNU privilege escalation vulnerability (CVE-2021-30869) unpatched in macOS Catalina, which led to the installation of a previously unreported backdoor.

macOS EN google wateringhole exploit CVE-2021-30869
Google Online Security Blog: Vulnerability Reward Program: 2021 Year in Review https://security.googleblog.com/2022/02/vulnerability-reward-program-2021-year.html
14/02/2022 08:13:47
QRCode
archive.org
thumbnail

Last year was another record setter for our Vulnerability Reward Programs (VRPs). Throughout 2021, we partnered with the security researcher community to identify and fix thousands of vulnerabilities – helping keep our users and the internet safe.

Google reward bugbounty 2021 vulnerabilities data report EN
page 4 / 5
4481 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio