Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 44 / 228
'Operation Digital Eye' Attack Targets European IT Orgs https://www.darkreading.com/cyberattacks-data-breaches/operation-digital-eye-attack-targets-european-it-orgs
10/12/2024 12:16:03
QRCode
archive.org
thumbnail

A Chinese threat actor infiltrated several IT and security companies in a bring-your-own VS code, with an eye to carrying out a supply-chain-based espionage attack.

darkreading EN 2024 Cyberattacks Data-Breaches Application-Security bring-your-own VS code EU
Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Security Research https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/
10/12/2024 10:31:54
QRCode
archive.org
thumbnail

In this article, I explained how I could compromise the sysupgrade.openwrt.org service by exploiting the command injection and the SHA-256 collision.
As I never found the hash collision attack in a real-world application, I was surprised that I could successfully exploit it by brute-forcing hashes.

flatt.tech EN 2024 Hash-collision OpenWrt Command-injection SHA-256 Supply-chain
Fraudulent shopping sites tied to cybercrime marketplace taken offline https://www.europol.europa.eu/media-press/newsroom/news/fraudulent-shopping-sites-tied-to-cybercrime-marketplace-taken-offline
10/12/2024 09:00:53
QRCode
archive.org
thumbnail

The investigation began in the autumn of 2022, following reports of fraudulent phone calls in which scammers impersonated bank employees to extract sensitive information, such as addresses and security answers, from victims. The stolen data was traced back to a specialised online marketplace that operated as a central hub for the trade of illegally obtained information.A central hub for cyber...

europol EN 2024 Fraudulent shopping marketplace MansonMarket
On These Apps, the Dark Promise of Mothers Sexually Abusing Children https://www.nytimes.com/2024/12/07/us/child-abuse-apple-google-apps.html
09/12/2024 20:49:11
QRCode
archive.org

Smartphone apps downloaded from Apple and Google can allow parents and other abusers to connect with pedophiles who pay to watch — and direct — criminal behavior.

nytimes EN 2024 investigation BigoLive abuse stream child Apps Apple Google pedophiles criminal
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA https://www.volexity.com/blog/2024/11/15/brazenbamboo-weaponizes-forticlient-vulnerability-to-steal-vpn-credentials-via-deepdata/
09/12/2024 18:54:45
QRCode
archive.org
thumbnail
volexity EN VPN analysis FortiClient Vulnerability BrazenBamboo DEEPDATA stealer
What a new threat report says about Mac malware in 2024 https://appleinsider.com/articles/24/12/04/what-a-new-threat-report-says-about-mac-malware-in-2024
09/12/2024 14:02:09
QRCode
archive.org
thumbnail

Apple's macOS has been under siege in 2024 as malware-as-a-service platforms and AI-driven threats make the year a turning point for Mac security.

appleinsider EN 2024 Apple macOS AI-driven Mac security malware-as-a-service
Moonlock's 2024 macOS threat report https://moonlock.com/moonlock-2024-macos-threat-report
09/12/2024 14:00:04
QRCode
archive.org
thumbnail

A deep dive into macOS malware this year.

moonlock EN 2024 macOS malware report
Why Phishers Love New TLDs Like .shop, .top and .xyz https://krebsonsecurity.com/2024/12/why-phishers-love-new-tlds-like-shop-top-and-xyz/
09/12/2024 13:54:53
QRCode
archive.org

Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) -- such as .shop, .top, .xyz -- that attract scammers with rock-bottom…

krebsonsecurity EN 2024 TLDs Phishing scammers
Zero-Day: How Attackers Use Corrupted Files to Bypass Detection https://any.run/cybersecurity-blog/corrupted-files-attack/
09/12/2024 12:13:02
QRCode
archive.org
thumbnail

See technical analysis of a zero-day attack that uses corrupted malicious files to bypass detection by advanced security systems.

any.run EN 2024 Corrupted Files Bypass Detection Analysis
Unidentified Threat Actor Utilizes Android Malware to Target High-Value Assets in South Asia https://www.cyfirma.com/research/unidentified-threat-actor-utilizes-android-malware-to-target-high-value-assets-in-south-asia/
09/12/2024 11:43:26
QRCode
archive.org
thumbnail

The team at CYFIRMA analyzed a malicious Android sample designed to target high-value assets in Southern Asia. This sample, attributed to an unknown threat actor, was generated using the Spynote Remote Administration Tool. While the specifics of the targeted asset remain confidential, it is likely that such a target would attract the interest of APT groups. However, we are restricted from disclosing further details about the actual target and its specific region. For a comprehensive analysis, please refer to the detailed report

cyfirma EN 2024 Unidentified Threat Actor Malware research Android Spynote Remote Administration Tool
Log In POLITICO Pro Home Latest news Romanian elections War in Ukraine French political crisis Newsletters Podcasts Poll of Polls Policy news Events News Politics Hungarian CIA reportedly spied on EU officials https://www.politico.eu/article/hungary-viktor-orban-cia-spy-wiretap-hack-laptop-eu-officials-information-office-budapest-olaf/
09/12/2024 11:33:39
QRCode
archive.org
thumbnail

Officials from EU anti-fraud office were allegedly followed, wiretapped and had their laptops hacked by Hungary’s intelligence agency.

politico EN 2024 Espionage European-politics Hungarian-politics Hungary Intelligence Law-enforcement MEPs Spying Spyware Viktor-Orbán
Tuta has suffered multiple DDoS attacks in one week – but it claims privacy has not been compromised https://www.techradar.com/computing/cyber-security/tuta-has-suffered-multiple-ddos-attacks-in-one-week-but-it-claims-privacy-has-not-been-compromised
09/12/2024 11:19:41
QRCode
archive.org
thumbnail

Some users are still lamenting issues in using the encrypted email service

techradar EN 2024 DDoS attacks Tuta mail
Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windows https://www.cadosecurity.com/blog/meeten-malware-threat
09/12/2024 11:15:19
QRCode
archive.org
thumbnail

Cado Security Labs details the discovery of a new cross-platform information stealer malware dubbed "Meeten" targeting macOS and Windows users.

cadosecurity EN 2024 Cross-Platform Threat Meeten EN 2024 macOS Windows
Ransomware hackers target NHS hospitals with new cyberattacks https://techcrunch.com/2024/12/04/ransomware-hackers-target-nhs-hospitals-with-new-cyberattacks/
09/12/2024 11:03:43
QRCode
archive.org
thumbnail

Two NHS trusts in England have been hacked in recent weeks, the latest attacks to hit the national health service.

techcrunch EN 2024 INCRansomware NHS UK health ransomware
8 US telcos compromised, FBI advises Americans to use encrypted communications - Help Net Security https://www.helpnetsecurity.com/2024/12/05/us-telcos-compromised-fbi-advises-use-of-encrypted-communications/
09/12/2024 10:54:13
QRCode
archive.org
thumbnail

FBI and CISA officials have advised Americans to use encrypted call and messaging apps to protect their communications from threat actors.

helpnetsecurity EN 2024 telcos US encrypted call advise FBI CISA
Enhanced Visibility and Hardening Guidance for Communications Infrastructure https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
09/12/2024 08:46:37
QRCode
archive.org

This guide provides network engineers and defenders of communications infrastructure with best practices to strengthen their visibility and harden their network

cisa EN 2024 guide visibility Hardening US Communications Infrastructure
2023 Anna Jaques Hospital data breach impacted +310K people https://securityaffairs.com/171801/data-breach/anna-jaques-hospital-data-breach.html
09/12/2024 07:32:06
QRCode
archive.org
thumbnail

Anna Jaques Hospital revealed that the ransomware attack it suffered last year has exposed sensitive health data for over 316,000 patients.

securityaffairs EN 2024 health Hospital AnnaJaques
zizmor would have caught the Ultralytics workflow vulnerability https://blog.yossarian.net/2024/12/06/zizmor-ultralytics-injection
08/12/2024 15:42:01
QRCode
archive.org
thumbnail

TL;DR: zizmor would have caught the vulnerability that caused this…mostly. Read on for details.

yossarian EN 2024 Supply-Chain-Attack zizmor Ultralytics vulnerability workflow
Ultralytics AI model hijacked to infect thousands with cryptominer https://www.bleepingcomputer.com/news/security/ultralytics-ai-model-hijacked-to-infect-thousands-with-cryptominer/
08/12/2024 15:40:38
QRCode
archive.org
thumbnail

The popular Ultralytics YOLO11 AI model was compromised in a supply chain attack to deploy cryptominers on devices running versions 8.3.41 and 8.3.42 from the Python Package Index (PyPI)  

bleepingcomputer EN 2024 Artificial-Intelligence Open-Source Supply-Chain Supply-Chain-Attack Ultralytics
Unveiling Celular 007: An In-Depth Analysis of Brazilian Stalkerware and Strategies for Collective Protection https://interseclab.org/en/unveiling-celular-007-an-in-depth-analysis-of-brazilian-stalkerware-and-strategies-for-collective-protection-2/
08/12/2024 10:28:19
QRCode
archive.org

Key findings from our analysis include:

Advanced Surveillance Capabilities:

  • Utilizes technologies like WebRTC for real-time audio and video streaming.
  • Abuses Accessibility Services to intercept user interactions.

Comprehensive Data Exfiltration:

  • Collects and transmits a wide range of personal data, including messages, call logs, and location information.

Persistence Mechanisms:

  • Employs techniques to remain active on the device, such as auto-start on boot and misuse of device administrator privileges.

Abuse of Legitimate Services:

  • Utilizes Firebase Cloud Messaging to establish command and control channels, disguising its communications as legitimate traffic.

Indicators of Compromise (IoCs):

  • Identified specific URLs, IP addresses, file hashes, and other artifacts associated with Celular 007.

Need for Collective Protection:

  • Highlights the importance of collective defense strategies and community awareness to combat such invasive tools.
interseclab EN 2024 spyware Celular007 Stalkerware Brazil
page 44 / 228
4543 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio