Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 47 / 76
1513 résultats taggé 2024  ✕
Hackers phish finance orgs using trojanized Minesweeper clone https://www.bleepingcomputer.com/news/security/hackers-phish-finance-orgs-using-trojanized-minesweeper-clone/
01/06/2024 13:47:13
QRCode
archive.org
thumbnail

Hackers are utilizing code from a Python clone of Microsoft's venerable Minesweeper game to hide malicious scripts in attacks on European and US financial organizations.

bleepingcomputer EN 2024 Minesweeper RAT Remote-Access Remote-Access-Trojan Ukraine
Space secrets security update https://huggingface.co/blog/space-secrets-disclosure
01/06/2024 13:35:04
QRCode
archive.org
thumbnail

We’re on a journey to advance and democratize artificial intelligence through open source and open science.

huggingface EN 2024 incident breach secrets AI tokens
Ticketmaster confirms data breach with a SEC filing https://stackdiary.com/ticketmaster-confirms-data-breach-with-a-sec-filing/
01/06/2024 12:00:29
QRCode
archive.org
thumbnail

Live Nation Entertainment, also known as Ticketmaster, has submitted an official Form 8-K with the U.S. Securities and Exchange Commission (SEC),

stackdiary EN 2024 Ticketmaster SEC data-breach
Hacker Releases Jailbroken "Godmode" Version of ChatGPT https://futurism.com/hackers-jailbroken-chatgpt-godmode
01/06/2024 10:41:17
QRCode
archive.org
thumbnail

A hacker has released a jailbroken version of ChatGPT called "GODMODE GPT."

Earlier today, a self-avowed white hat operator and AI red teamer who goes by the name Pliny the Prompter took to X-formerly-Twitter to announce the creation of the jailbroken chatbot, proudly declaring that GPT-4o, OpenAI's latest large language model, is now free from its guardrail shackles.

futurism EN 2024 chatgpt jailbroken GODMODE
Zero Day Initiative — CVE-2024-30043: Abusing URL Parsing Confusion to Exploit XXE on SharePoint Server and Cloud https://www.zerodayinitiative.com/blog/2024/5/29/cve-2024-30043-abusing-url-parsing-confusion-to-exploit-xxe-on-sharepoint-server-and-cloud#/
31/05/2024 09:47:53
QRCode
archive.org
thumbnail

Yes, the title is right. This blog covers an XML eXternal Entity (XXE) injection vulnerability that I found in SharePoint. The bug was recently patched by Microsoft. In general, XXE vulnerabilities are not very exciting in terms of discovery and related technical aspects. They may sometimes be fun t

zerodayinitiative EN 2024 SharePoint XML eXternal vulnerability CVE-2024-30043
Spyware maker pcTattletale says it's 'out of business' and shuts down after data breach | TechCrunch https://techcrunch.com/2024/05/28/pctattletale-spyware-shutters-data-breach/?ref=news.risky.biz&guccounter=1
31/05/2024 09:39:21
QRCode
archive.org
thumbnail

The spyware maker's founder, Bryan Fleming, said pcTattletale is "out of business and completely done," following a data breach.

techcrunch EN 2024 spyware pcTattletale out-of-business data-breach
Exiled, then spied on: Civil society in Latvia, Lithuania, and Poland targeted with Pegasus spyware https://www.accessnow.org/publication/civil-society-in-exile-pegasus/?ref=news.risky.biz
31/05/2024 09:38:58
QRCode
archive.org
thumbnail

At least seven more Russian, Belarusian, Latvian, and Israeli journalists and activists have been targeted with Pegasus within the EU.

accessnow EN 2024 Pegasus EU spyware Belarusia Russia Latvia Israel
‘Operation Endgame’ Hits Malware Delivery Platforms https://krebsonsecurity.com/2024/05/operation-endgame-hits-malware-delivery-platforms/
31/05/2024 09:17:02
QRCode
archive.org

Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the most popular cybercrime platforms for delivering ransomware and data-stealing malware. Dubbed "the largest ever operation against botnets," the international effort…

krebsonsecurity EN 2024 Operation-Endgame
Active exploitation of unauthenticated stored XSS vulnerabilities in WordPress Plugins https://www.fastly.com/blog/active-exploitation-unauthenticated-stored-xss-vulnerabilities-wordpress/
31/05/2024 09:16:16
QRCode
archive.org
thumbnail

We have observed active exploitation attempts targeting three high-severity CVEs: CVE-2024-2194, CVE-2023-6961, and CVE-2023-40000.

fastly EN 2024 Wordpress XSS exploitation CVE-2024-2194 CVE-2023-6961 CVE-2023-40000
La nouvelle identité électronique étatique suisse https://swissprivacy.law/302/
31/05/2024 09:12:58
QRCode
archive.org

Après avoir été rejetée aux urnes le 7 mars 2021, la réglementation sur l’identité électronique renaît de ses cendres avec une nouvelle approche qui donne le rôle principal à l’État comme exploitant d’une infrastructure de confiance et comme émetteur de l’e-ID. La nouvelle infrastructure permet également aux acteurs publics et privé d'émettre d'autres justificatifs électroniques. Le nouveau projet de loi est actuellement entre les mains du Parlement fédéral.

swissprivacy FR CH 2024 eid suisse identité-éléctronique legal
OpenAI finds Russian, Chinese propaganda campaigns used its tech https://www.washingtonpost.com/technology/2024/05/30/openai-disinfo-influence-operations-china-russia/?pwapi_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJyZWFzb24iOiJnaWZ0IiwibmJmIjoxNzE3MDQxNjAwLCJpc3MiOiJzdWJzY3JpcHRpb25zIiwiZXhwIjoxNzE4NDIzOTk5LCJpYXQiOjE3MTcwNDE2MDAsImp0aSI6IjZmZmEwZWIxLWJiZDItNDBmMi05ZTQ1LWZjYTI3N2U5ODE0MyIsInVybCI6Imh0dHBzOi8vd3d3Lndhc2hpbmd0b25wb3N0LmNvbS90ZWNobm9sb2d5LzIwMjQvMDUvMzAvb3BlbmFpLWRpc2luZm8taW5mbHVlbmNlLW9wZXJhdGlvbnMtY2hpbmEtcnVzc2lhLyJ9.lZy8-t9Wf1mDTHueMt7j0kCTV8XAifSEbK8hmsBd3bk
31/05/2024 08:02:03
QRCode
archive.org
thumbnail

Covert propagandists have already begun using generative artificial intelligence to boost their influence operations.

washingtonpost EN 2024 OpenAI chatgpt China Russia propaganda
CVE-2024-34331: Parallels Repack Privilege Escalation https://khronokernel.com/macos/2024/05/30/CVE-2024-34331.html
30/05/2024 19:50:15
QRCode
archive.org

Another day, another accidental exploit 🥳. This time abusing Parallels Desktop’s trust in macOS installers, gaining local privilege escalation!

khronokernel EN 2024 Parallels Repack Privilege Escalation CVE-2024-34331
The Pumpkin Eclipse https://blog.lumen.com/the-pumpkin-eclipse/
30/05/2024 18:31:25
QRCode
archive.org
thumbnail

Executive Summary Lumen Technologies’ Black Lotus Labs identified a destructive event, as over 600,000 small office/home office (SOHO) routers were taken offline belonging to a single internet service provider (ISP). The incident took place over a 72-hour period between October 25-27, rendered the infected devices permanently inoperable, and required a hardware-based replacement. Public scan data Lumen Technologies’ Black Lotus Labs identified a destructive event, as over 600,000 small office/home office (SOHO) routers were taken offline belonging to a single internet service provider (ISP).

lumen EN 2024 IoT routers destructive SOHO ISP 72-hour Chalubo
Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities https://thehackernews.com/2024/05/researchers-uncover-active-exploitation.html?m=1
30/05/2024 16:30:28
QRCode
archive.org

Researchers have discovered several vulnerabilities in popular WordPress plugins that allow attackers to create rogue admin accounts.
#attacks #breach #computer #cyber #data #hack #hacker #hacking #how #information #malware #network #news #ransomware #security #software #the #to #today #updates #vulnerability

thehackernews EN 2024 WordPress Plugin Vulnerabilities
LilacSquid: The stealthy trilogy of PurpleInk, InkBox and InkLoader https://blog.talosintelligence.com/lilacsquid/
30/05/2024 14:52:52
QRCode
archive.org
thumbnail

Multiple TTPs utilized in this campaign bear some overlap with North Korean APT groups.

talosintelligence EN 2024 TTP LilacSquid research
Data breach exposes details of 25,000 current and former BBC employees https://www.theguardian.com/media/article/2024/may/29/data-breach-exposes-details-of-25000-current-and-former-bbc-employees
30/05/2024 14:34:05
QRCode
archive.org
thumbnail

Data breach at pension scheme being taken ‘extremely seriously’, but broadcaster says there is no evidence of a ransomware attack

theguardian EN 2024 BBC data-breach employees
Check Point - Wrong Check Point (CVE-2024-24919) https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/
30/05/2024 14:30:24
QRCode
archive.org
thumbnail

Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This time, it is Check Point who is the focus of our penetrative gaze.

Check Point, for those unaware, is the vendor responsible for the 'CloudGuard Network Security' appliance, yet another device claiming to be secure and hardened. Their slogan - "you deserve the best security" - implies they are a company you can trust with the security of your network. A bold claim.

watchtowr EN 2024 CVE-2024-24919 checkpoint analysis patch-diff
An Anonymous Source Shared Thousands of Leaked Google Search API Documents with Me; Everyone in SEO Should See Them https://sparktoro.com/blog/an-anonymous-source-shared-thousands-of-leaked-google-search-api-documents-with-me-everyone-in-seo-should-see-them/
30/05/2024 13:50:20
QRCode
archive.org
thumbnail

On Sunday, May 5th, I received an email from a person claiming to have access to a massive leak of API documentation from inside Google’s Search division.

sparktoro EN 2024 Google Leak Search API
macOS version of elusive 'LightSpy' spyware tool discovered https://www.bleepingcomputer.com/news/security/macos-version-of-elusive-lightspy-spyware-tool-discovered/
30/05/2024 12:05:37
QRCode
archive.org
thumbnail

A macOS version of the LightSpy surveillance framework has been discovered, confirming the extensive reach of a tool only previously known for targeting Android and iOS devices.

bleepingcomputer EN 2024 Apple LightSpy Malware Spyware
Operators of 911 S5 residential proxy service subjected to US sanctions https://www.scmagazine.com/brief/operators-of-911-s5-residential-proxy-service-subjected-to-us-sanctions
30/05/2024 10:15:48
QRCode
archive.org
thumbnail

Chinese nationals Yunhe Wang, Jingping Liu, and Yanni Zheng have been sanctioned by the U.S. Treasury Department for operating the residential proxy service 911 S5, which was a botnet comprised of over 19 million residential IP addresses that had been used to support various cybercrime groups' COVID-19 relief scams and bomb threats, Ars Technica reports.

scmagazine EN 2024 911 S5 residential-proxy botnet US China Operators arrested
page 47 / 76
4594 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio