Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 42 / 76
1513 résultats taggé 2024  ✕
GrimResource - Microsoft Management Console for initial access and evasion https://www.elastic.co/security-labs/grimresource
25/06/2024 16:40:55
QRCode
archive.org
thumbnail

Elastic researchers uncovered a new technique, GrimResource, which allows full code execution via specially crafted MSC files. It underscores a trend of well-resourced attackers favoring innovative initial access methods to evade defenses.

elastic.co EN 2024 GrimResource MSC technique evasion initial-access
Stop Using cdn.polyfill.io Now https://blog.huli.tw/2024/06/25/en/stop-using-polyfill-io/
25/06/2024 16:38:13
QRCode
archive.org
thumbnail

Polyfill.io is a service that automatically provides front-end polyfills, making it very convenient to use. You just need to select the functionality you want to polyfill and then include a JavaScript

huli.tw EN 2024 polyfill Polyfill.io cdn
Activités d’influence et désinformation: le Conseil fédéral insiste sur la résilience et renforce l’analyse et la coordination https://www.admin.ch/gov/fr/accueil/documentation/communiques.msg-id-101494.html
25/06/2024 16:29:47
QRCode
archive.org

Lors de sa séance du 19 juin 2024, le Conseil fédéral a approuvé le rapport établi en réponse au postulat 22.3006 de la Commission de la politique de sécurité du Conseil national «État des lieux relatif à la menace que constituent pour la Suisse les campagnes de désinformation». Le rapport montre l’impact sur le pays des activités d’influence dans l’espace de l’information, les éléments caractéristiques pertinents dans ce contexte et les mesures supplémentaires que le Conseil fédéral entend prendre pour contrer ces menaces.

admin.ch FR CH 2024 Communiqué désinformation influence
Recent Zyxel NAS Vulnerability Exploited by Botnet https://www.securityweek.com/recent-zyxel-nas-vulnerability-exploited-by-botnet/
25/06/2024 15:25:56
QRCode
archive.org

A recently disclosed critical-severity vulnerability in discontinued Zyxel NAS devices is already exploited in botnet attacks, the Shadowserver Foundation warns.

Tracked as CVE-2024-29973, the issue is described as a code injection flaw that can be exploited remotely without authentication. It was introduced last year, when Zyxel patched CVE-2023-27992, a similar code injection bug.

“While patching this vulnerability, they added a new endpoint which uses the same approach as the old ones, and while doing so, implemented the same mistakes as its predecessors,” explains Outpost24 security researcher Timothy Hjort, who discovered and reported the security defect.

securityweek EN 2024 Mirai-like CVE-2024-29973 Zyxel
Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1) https://www.ambionics.io/blog/iconv-cve-2024-2961-p1
25/06/2024 09:19:25
QRCode
archive.org
thumbnail

A few months ago, I stumbled upon a 24 years old buffer overflow in the glibc, the base library for linux programs. Despite being reachable in multiple well-known libraries or executables, it proved rarely exploitable — while it didn't provide much leeway, it required hard-to-achieve preconditions. Looking for targets lead mainly to disappointment. On PHP however, the bug shone, and proved useful in exploiting its engine in two different ways.

ambionics EN 2024 cve-2024-2961 glibc linux PHP
CISA confirms hackers may have accessed data from chemical facilities during January incident https://therecord.media/cisa-confirms-hackers-chemical-facilities
25/06/2024 09:03:06
QRCode
archive.org
thumbnail

The agency found no evidence that hackers exfiltrated information but noted the intrusion “may have resulted in the potential unauthorized access” to security plans, vulnerability assessments and user accounts within a national system to protect the chemicals sector.

therecord.media EN 2024 CISA confirms hackers CSAT Critical-infrastructure
New attack uses MSC files and Windows XSS flaw to breach networks https://www.bleepingcomputer.com/news/security/new-grimresource-attack-uses-msc-files-and-windows-xss-flaw-to-breach-networks/
25/06/2024 09:01:37
QRCode
archive.org
thumbnail

A novel command execution technique dubbed 'GrimResource' uses specially crafted MSC (Microsoft Saved Console) and an unpatched Windows XSS flaw to perform code execution via the Microsoft Management Console.

bleepingcomputer EN 2024 Attack GrimResource Microsoft MSC Windows XSS
Probllama: Ollama Remote Code Execution Vulnerability (CVE-2024-37032) https://www.wiz.io/blog/probllama-ollama-vulnerability-cve-2024-37032
25/06/2024 08:51:44
QRCode
archive.org
thumbnail

Wiz Research discovered CVE-2024-37032, an easy-to-exploit Remote Code Execution vulnerability in the open-source AI Infrastructure project Ollama.

wiz EN 2024 CVE-2024-37032 Overview Mitigations Ollama AI Infrastructure easy-to-exploit RCE
Malvertising Campaign Leads to Execution of Oyster Backdoor https://www.rapid7.com/blog/post/2024/06/17/malvertising-campaign-leads-to-execution-of-oyster-backdoor/
25/06/2024 00:00:43
QRCode
archive.org
thumbnail

Rapid7 observed a recent malvertising campaign luring users to download malicious installers for popular software like Google Chrome and Microsoft Teams.

rapid7 EN 2024 Malvertising Oyster Backdoor
RansomHub Draws in Affiliates with Multi-OS Capability and High Commission Rates https://www.recordedfuture.com/ransomhub-draws-in-affiliates-with-multi-os-capability-and-high-commission-rates
24/06/2024 20:15:50
QRCode
archive.org
thumbnail

Discover how RansomHub's ransomware-as-a-service targets Windows, Linux, and ESXi systems.

recordedfuture EN 2024 analysis RansomHub ESXi Linux Multi-OS
XZ backdoor behavior inside OpenSSH https://securelist.com/xz-backdoor-part-3-hooking-ssh/113007/
24/06/2024 16:44:07
QRCode
archive.org
thumbnail

In this article, we analyze XZ backdoor behavior inside OpenSSH, after it has achieved RSA-related function hook.

securelist EN 2024 Backdoor Cyber-espionage Linux Malware Malware-Descriptions Malware-Technologies SSH Targeted-attacks XZ
Cyber attack compromised Indonesia data centre, ransom sought https://www.reuters.com/technology/cybersecurity/cyber-attack-compromised-indonesia-data-centre-ransom-sought-reports-antara-2024-06-24/
24/06/2024 15:14:29
QRCode
archive.org

A cyber attacker compromised Indonesia's national data centre, disrupting immigration checks at airports, and asked for an $8 million ransom, the country's communications minister told Reuters on Monday.
The attack disrupted several government services, most notably at airports last week, with long lines forming at immigration desks. Automated passport machines were now functioning, the communications ministry said.

reuters EN 2024 Indonesia LockBit3.0 airports
Levi Strauss notifies customers of cyberattack https://cybernews.com/news/levi-strauss-jeans-cyberattack/
24/06/2024 12:56:29
QRCode
archive.org

Personal information, including partial payment details, may have been obtained by bad actors during an automated credential-stuffing attack on Levi’s online store.

The maker of the famous Levi’s denim jeans reported that over 72,000 accounts were affected during a “security incident” that was detected on July 13th.

cybernews EN 2024 Levi's incident data-breach credential-stuffing
More than 12,000 Santander employees in US affected by Snowflake breach https://therecord.media/santander-employees-bank-breach-affected
24/06/2024 11:31:55
QRCode
archive.org
thumbnail

The Spanish banking giant was one of the first organizations to report a breach in the Snowflake incident, which is now known to have affected about 165 organizations.

therecord.media EN 2024 Santander Snowflake US affected breach
Facebook PrestaShop module exploited to steal credit cards https://www.bleepingcomputer.com/news/security/facebook-prestashop-module-exploited-to-steal-credit-cards/
24/06/2024 11:26:54
QRCode
archive.org
thumbnail

Hackers are exploiting a flaw in a premium Facebook module for PrestaShop named pkfacebook to deploy a card skimmer on vulnerable e-commerce sites and steal people's payment credit card details.

bleepingcomputer EN 2024 E-Commerce Prestashop SQL-Injection Vulnerability Website
Rafel RAT, Android Malware from Espionage to Ransomware Operations https://research.checkpoint.com/2024/rafel-rat-android-malware-from-espionage-to-ransomware-operations/
24/06/2024 08:51:05
QRCode
archive.org
thumbnail

Android, Google’s most popular mobile operating system, powers billions of smartphones and tablets globally. Known for its open-source nature and flexibility, Android offers users a wide array of features, customization options, and access to a vast ecosystem of applications through the Google Play Store and other sources.

However, with its widespread adoption and open environment comes the risk of malicious activity. Android malware, a malicious software designed to target Android devices, poses a significant threat to users’ privacy, security, and data integrity. These malicious programs come in various forms, including viruses, Trojans, ransomware, spyware, and adware, and they can infiltrate devices through multiple vectors, such as app downloads, malicious websites, phishing attacks, and even system vulnerabilities.

checkpoint EN 2024 Rafel RAT Android Malware Ransomware Operations
Mailcow Mail Server Flaws Expose Servers to Remote Code Execution https://thehackernews.com/2024/06/mailcow-mail-server-flaws-expose.html
23/06/2024 16:21:54
QRCode
archive.org
thumbnail

Discover critical vulnerabilities in Mailcow server software allowing remote code execution and XSS attacks.

thehackernews EN 2024 Mailcow RCE CVE-2024-30270 CVE-2024-31204
UK government weighs action against Russian hackers over NHS records theft https://www.theguardian.com/society/article/2024/jun/21/uk-national-crime-agency-russian-ransomware-hackers-qilin-nhs-patient-records
23/06/2024 16:20:00
QRCode
archive.org
thumbnail

National Crime Agency may take retaliatory measures after Qilin gang steals data covering 300m patient interactions

theguardian EN 2024 Qilin retaliatory measures
Threat Actor Claims AMD and Apple Breaches https://www.infosecurity-magazine.com/news/threat-actor-amd-apple-breaches/
21/06/2024 18:35:29
QRCode
archive.org
thumbnail

Notorious threat actor IntelBroker is claiming to have © data from Apple and AMD

infosecurity-magazine EN 2024 IntelBroker Apple AMD stolen Data-Breach
Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models https://googleprojectzero.blogspot.com/2024/06/project-naptime.html
21/06/2024 18:02:02
QRCode
archive.org
thumbnail

At Project Zero, we constantly seek to expand the scope and effectiveness of our vulnerability research. Though much of our work still relies on traditional methods like manual source code audits and reverse engineering, we're always looking for new approaches.

As the code comprehension and general reasoning ability of Large Language Models (LLMs) has improved, we have been exploring how these models can reproduce the systematic approach of a human security researcher when identifying and demonstrating security vulnerabilities. We hope that in the future, this can close some of the blind spots of current automated vulnerability discovery approaches, and enable automated detection of "unfuzzable" vulnerabilities.

googleprojectzero EN 2024 Offensive Project-Naptime LLM
page 42 / 76
4560 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio