Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 46 / 251
SMS Pumping: How Criminals Turn Your Messaging Service into Their Cash Machine https://www.group-ib.com/blog/sms-pumping/
09/04/2025 09:32:49
QRCode
archive.org
  • A fraudster develops or uses an automated bot or low-skilled workforce to trigger actions such as fake account creation, OTP requests, or password resets. These bots or human bots mimic real user activity, often bypassing security measures through direct API calls.
  • These actions trigger SMS messages, which are sent to phone numbers controlled by the fraudster, creating inflated traffic.
  • The fraudster collaborates with a “rogue party,” often a corrupt telecom provider or intermediary with access to SMS routing infrastructure.
  • The rogue party intercepts the inflated SMS traffic, typically avoiding message delivery to reduce costs. Instead, they route the traffic to numbers they control.
  • The rogue party earns revenue by collecting funds from the inflated SMS traffic, benefiting from volume-based pricing or other arrangements.
group-ib EN 2025 SMS Pumping Messaging SMS-pumping
Anatomy of an LLM RCE https://www.cyberark.com/resources/all-blog-posts/anatomy-of-an-llm-rce
09/04/2025 06:45:55
QRCode
archive.org
thumbnail

As large language models (LLMs) become more advanced and are granted additional capabilities by developers, security risks increase dramatically. Manipulated LLMs are no longer just a risk of...

cyberark EN 2025 LLM RCE analysis AI
EncryptHub's dual life: Cybercriminal vs Windows bug-bounty researcher https://www.bleepingcomputer.com/news/security/encrypthubs-dual-life-cybercriminal-vs-windows-bug-bounty-researcher/
08/04/2025 08:36:46
QRCode
archive.org
thumbnail

EncryptHub, a notorious threat actor linked to breaches at 618 organizations, is believed to have reported two Windows zero-day vulnerabilities to Microsoft, revealing a conflicted figure straddling the line between cybercrime and security research.

bleepingcomputer EN 2025 Cybercrime EncryptHub Hacker Microsoft Threat-Actor White-Hat-Hacker Zero-Day
La Suisse signe la Convention du Conseil de l’Europe sur l’intelligence artificielle https://swissprivacy.law/344/
08/04/2025 07:33:01
QRCode
archive.org

Le conseiller fédéral Albert Rösti signera aujourd’hui à Strasbourg la Convention-cadre du Conseil de l’Europe sur l’intelligence artificielle. Par cet acte, la Suisse rejoint les États signataires d’un premier instrument juridiquement contraignant au niveau international visant à encadrer le développement et l’utilisation de l’IA dans le respect des droits fondamentaux

swissprivacy.law FR CH 2025 Convention Conseil Europe IA intelligence artificielle Suisse acte
Russia arrests CEO of tech company linked to Doppelgänger disinformation campaign https://therecord.media/doppelganger-ceo-arrests-russia-tech
07/04/2025 21:19:47
QRCode
archive.org
thumbnail

Two other employees at the St. Petersburg-based hosting provider Azea Group were arrested. The company has alleged links to state-sponsored disinformation campaigns and cybercriminal infrastructure.

therecord.media EN 2025 Doppelgänger Azea Russia arrested
Carding tool abusing WooCommerce API downloaded 34K times on PyPI https://www.bleepingcomputer.com/news/security/carding-tool-abusing-woocommerce-api-downloaded-34k-times-on-pypi/?ref=metacurity.com
07/04/2025 21:10:54
QRCode
archive.org
thumbnail

A newly discovered malicious PyPi package named 'disgrasya' that abuses legitimate WooCommerce stores for validating stolen credit cards has been downloaded over 34,000 times from the open-source package platform.

bleepingcomputer EN 2025 Carding Credit-Card Packages PyPI Python WooCommerce
Someone hacked ransomware gang Everest’s leak site https://techcrunch.com/2025/04/07/someone-hacked-everest-ransomware-gang-dark-web-leak-site/
07/04/2025 21:10:06
QRCode
archive.org
thumbnail

"Don't do crime," the ransomware gang's dark web leak site reads.

techcrunch EN 2025 hacked ransomware Everest leak-site
British Army and Royal Navy hit by cyberattacks from pro-Russian and pro-Palestinian hackers | The Standard https://www.standard.co.uk/news/uk/british-army-royal-navy-cyberattacks-pro-russia-palestine-hackers-b1221112.html?ref=metacurity.com
07/04/2025 21:07:56
QRCode
archive.org
thumbnail

The group, known as the Holy League, is said to be made up of around 90 hacktivist collectives united by opposition to Western liberal values

standard EN 2025 Russian Cyberattack Ukraine British GCHQ cyberattacks Holy-League
Conseil fédéral: des données privées exposées en ligne https://www.20min.ch/fr/story/securite-les-numeros-de-conseillers-federaux-accessibles-en-trois-clics-103319370
07/04/2025 13:55:18
QRCode
archive.org
thumbnail

Des informations confidentielles concernant des membres du Conseil fédéral suisse et de hauts responsables de la sécurité sont accessibles au public.

20min FR CH Suisse Conseil fédéral informations confidentielles
IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINX https://www.sentinelone.com/blog/ingressnightmare-critical-unauthenticated-rce-vulnerabilities-in-kubernetes-ingress-nginx/?mkt_tok=MzI3LU1OTS0wODcAAAGZoSqCgJKW8GZrBlMYPeWfury7MVslnp5B4LAsxkQ_lfeW4FYUibpoiQPkuEZi9F9G7G8U_gruF2jLoiVTDCdKDqL26IdIvfIP74OJCs1lLOF4Hlg
07/04/2025 09:55:41
QRCode
archive.org
thumbnail

We share actionable mitigation and detection strategies against IngressNightmare so you can protect against possible exploitation in runtime.

sentinelone EN 2025 IngressNightmare ritical Unauthenticated RCE Kubernetes Vulnerabilities
Google Online Security Blog: Google announces Sec-Gemini v1, a new experimental cybersecurity model https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html?m=1
07/04/2025 06:43:07
QRCode
archive.org
thumbnail

Today, we’re announcing Sec-Gemini v1, a new experimental AI model focused on advancing cybersecurity AI frontiers.

As outlined a year ago, defenders face the daunting task of securing against all cyber threats, while attackers need to successfully find and exploit only a single vulnerability. This fundamental asymmetry has made securing systems extremely difficult, time consuming and error prone. AI-powered cybersecurity workflows have the potential to help shift the balance back to the defenders by force multiplying cybersecurity professionals like never before.

security.googleblog EN 2025 Sec-Gemini IA announce experimental cybersecurity model
One Time Pwnage: SEAL Releases Advisory On SLOVENLY COMET https://www.securityalliance.org/news/2025-03-slovenly-comet
07/04/2025 06:41:17
QRCode
archive.org
thumbnail

A new threat actor is exploiting privileged access in the SMS supply chain to intercept OTP codes and other messages.

securityalliance EN 2025 SMS supply-chain Argentina OTP SLOVENLY-COMET
Europcar GitLab breach exposes data of up to 200,000 customers https://www.bleepingcomputer.com/news/security/europcar-gitlab-breach-exposes-data-of-up-to-200-000-customers/
07/04/2025 06:40:01
QRCode
archive.org
thumbnail

A hacker breached the GitLab repositories of multinational car-rental company Europcar Mobility Group and stole source code for Android and iOS applications, as well as some personal information belonging to up to 200,000 users.
#Android #Breach #Code #Computer #Data #Europcar #GitLab #InfoSec #Security #Source #iOS

Android Code Europcar GitLab Data Security iOS Breach Computer Source InfoSec
Someone is trying to recruit security researchers in bizarre hacking campaign  | TechCrunch https://techcrunch.com/2025/04/01/someone-is-trying-to-recruit-security-researchers-in-bizarre-hacking-campaign/
06/04/2025 11:33:18
QRCode
archive.org
thumbnail

Are you willing to hack and take control of Chinese websites for a random person for up to $100,000 a month?

Someone is making precisely that tantalizing, bizarre, and clearly sketchy job offer. The person is using what looks like a series of fake accounts with avatars displaying photos of attractive women and sliding into the direct messages of several cybersecurity professionals and researchers on X in the last couple of weeks.

techcrunch EN 2025 recruit security researchers bizarre job offer cybersecurity fake professionals
Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon https://unit42.paloaltonetworks.com/qr-code-phishing/
06/04/2025 11:31:16
QRCode
archive.org
thumbnail
Surge in Palo Alto Networks Scanner Activity Indicates Possible Upcoming Threats https://www.greynoise.io/blog/surge-palo-alto-networks-scanner-activity
06/04/2025 11:29:52
QRCode
archive.org
thumbnail

GreyNoise has observed a significant surge in login scanning activity targeting Palo Alto Networks PAN-OS GlobalProtect portals. Over the last 30 days, nearly 24,000 unique IP addresses have attempted to access these portals. The pattern suggests a coordinated effort to probe network defenses and identify exposed or vulnerable systems, potentially as a precursor to targeted exploitation.

Recent patterns observed by GreyNoise suggest that this activity may signal the emergence of new vulnerabilities in the near future:

“Over the past 18 to 24 months, we’ve observed a consistent pattern of deliberate targeting of older vulnerabilities or well-worn attack and reconnaissance attempts against specific technologies,” said Bob Rudis, VP of Data Science at GreyNoise. “These patterns often coincide with new vulnerabilities emerging 2 to 4 weeks later.”

greynoise EN 2025 Palo Alto Networks Scanner Activity PAN-OS GlobalProtect portals
TTP - Apple Offers Apps With Ties to Chinese Military https://www.techtransparencyproject.org/articles/apple-offers-apps-with-ties-to-chinese-military
06/04/2025 11:24:48
QRCode
archive.org
thumbnail

Millions of Americans have downloaded apps that secretly route their internet traffic through Chinese companies, according to an investigation by the Tech Transparency Project (TTP), including several that were recently owned by a sanctioned firm with links to China’s military.

TTP’s investigation found that one in five of the top 100 free virtual private networks in the U.S. App Store during 2024 were surreptitiously owned by Chinese companies, which are obliged to hand over their users’ browsing data to the Chinese government under the country’s national security laws. Several of the apps traced back to Qihoo 360, a firm declared by the Defense Department to be a “Chinese Military Company." Qihoo did not respond to questions about its app-related holdings.

techtransparencyproject EN 2025 Apple Chinese Military VPN ios AppStore
Outlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective — Elastic Security Labs https://www.elastic.co/security-labs/outlaw-linux-malware
06/04/2025 11:21:09
QRCode
archive.org
thumbnail

OUTLAW is a persistent yet unsophisticated auto-propagating coinminer package observed across multiple versions over the past few years [1], [2], [3], [4]. Despite lacking stealth and advanced evasion techniques, it remains active and effective by leveraging simple but impactful tactics such as SSH brute-forcing, SSH key and cron-based persistence, and manually modified commodity miners and IRC channels. This persistence highlights how botnet operators can achieve widespread impact without relying on sophisticated techniques.

elastic EN 2025 OUTLOW linux malware analisys
Royal Mail Group Loses 144GB to Infostealers: Same Samsung Hacker, Same 2021 Infostealer Log | InfoStealers https://www.infostealers.com/article/royal-mail-group-loses-144gb-to-infostealers-same-samsung-hacker-same-2021-infostealer-log/
06/04/2025 11:17:46
QRCode
archive.org
thumbnail

Just days after reporting on the Samsung Tickets data breach, another massive leak has surfaced, this time targeting Royal Mail Group, a British institution with over 500 years of history.

On April 2, 2025, a threat actor known as “GHNA” posted on BreachForums, announcing the release of 144GB of data stolen from Royal Mail Group. The breach, once again facilitated through Spectos, a third-party service provider, exposes personally identifiable information (PII) of customers, confidential documents, internal Zoom meeting video recordings, delivery location datasets, a WordPress SQL database for mailagents.uk, Mailchimp mailing lists, and more.

infostealers EN025 UK GHNA BreachForums Data-Leak Royal-Mail
Oracle privately confirms Cloud breach to customers https://www.bleepingcomputer.com/news/security/oracle-privately-confirms-cloud-breach-to-customers/
04/04/2025 16:34:39
QRCode
archive.org
thumbnail

Oracle has finally acknowledged to some customers that attackers have stolen old client credentials after breaching a

bleepingcomputer EN 2025 Breach Data-Breach Data-Leak Oracle Oracle-Cloud Oracle-Health
page 46 / 251
5001 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn