Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 47 / 208
4149 résultats taggé E*N  ✕
2023 Anna Jaques Hospital data breach impacted +310K people https://securityaffairs.com/171801/data-breach/anna-jaques-hospital-data-breach.html
09/12/2024 07:32:06
QRCode
archive.org
thumbnail

Anna Jaques Hospital revealed that the ransomware attack it suffered last year has exposed sensitive health data for over 316,000 patients.

securityaffairs EN 2024 health Hospital AnnaJaques
zizmor would have caught the Ultralytics workflow vulnerability https://blog.yossarian.net/2024/12/06/zizmor-ultralytics-injection
08/12/2024 15:42:01
QRCode
archive.org
thumbnail

TL;DR: zizmor would have caught the vulnerability that caused this…mostly. Read on for details.

yossarian EN 2024 Supply-Chain-Attack zizmor Ultralytics vulnerability workflow
Ultralytics AI model hijacked to infect thousands with cryptominer https://www.bleepingcomputer.com/news/security/ultralytics-ai-model-hijacked-to-infect-thousands-with-cryptominer/
08/12/2024 15:40:38
QRCode
archive.org
thumbnail

The popular Ultralytics YOLO11 AI model was compromised in a supply chain attack to deploy cryptominers on devices running versions 8.3.41 and 8.3.42 from the Python Package Index (PyPI)  

bleepingcomputer EN 2024 Artificial-Intelligence Open-Source Supply-Chain Supply-Chain-Attack Ultralytics
Unveiling Celular 007: An In-Depth Analysis of Brazilian Stalkerware and Strategies for Collective Protection https://interseclab.org/en/unveiling-celular-007-an-in-depth-analysis-of-brazilian-stalkerware-and-strategies-for-collective-protection-2/
08/12/2024 10:28:19
QRCode
archive.org

Key findings from our analysis include:

Advanced Surveillance Capabilities:

  • Utilizes technologies like WebRTC for real-time audio and video streaming.
  • Abuses Accessibility Services to intercept user interactions.

Comprehensive Data Exfiltration:

  • Collects and transmits a wide range of personal data, including messages, call logs, and location information.

Persistence Mechanisms:

  • Employs techniques to remain active on the device, such as auto-start on boot and misuse of device administrator privileges.

Abuse of Legitimate Services:

  • Utilizes Firebase Cloud Messaging to establish command and control channels, disguising its communications as legitimate traffic.

Indicators of Compromise (IoCs):

  • Identified specific URLs, IP addresses, file hashes, and other artifacts associated with Celular 007.

Need for Collective Protection:

  • Highlights the importance of collective defense strategies and community awareness to combat such invasive tools.
interseclab EN 2024 spyware Celular007 Stalkerware Brazil
Protecting Undersea Internet Cables: A Tech Challenge https://spectrum.ieee.org/undersea-internet-cables-protection-tech
08/12/2024 00:51:58
QRCode
archive.org
thumbnail

A recent, alleged Baltic Sea sabotage highlights the system’s fragility

spectrum.ieee.org EN 2024 fiber-optic-cables undersea-cables internet-security reliability technology-and-society maritime-technology underwater-robots
Veeam warns of critical RCE bug in Service Provider Console https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-rce-bug-in-service-provider-console/
07/12/2024 09:55:40
QRCode
archive.org
thumbnail

​Veeam released security updates today to address two Service Provider Console (VSPC) vulnerabilities, including a critical remote code execution (RCE) discovered during internal testing.

VSPC, described by the company as a remote-managed BaaS (Backend as a Service) and DRaaS (Disaster Recovery as a Service) platform, is used by service providers to monitor the health and security of customer backups, as well as manage their Veeam-protected virtual, Microsoft 365, and public cloud workloads.

bleepingcomputer EN 2024 RCE bug DRaaS VSPC Veeam
Cisco warns of continued exploitation of 10-year-old ASA bug https://www.scworld.com/news/cisco-warns-of-continued-exploitation-of-10-year-old-asa-bug
07/12/2024 09:54:14
QRCode
archive.org
thumbnail

Cisco on Dec. 2 updated an advisory from March 18 about a 10-year-old vulnerability in the WebVPN login page of Cisco’s Adaptive Security Appliance (ASA) software that could let an unauthenticated remote attacker conduct a cross-site scripting (XSS) attack.
In its recent update, the Cisco Product Security Incident Response Team (PSIRT) said it became aware of additional attempted exploitation of this vulnerability in the wild last month.

scworld EN 2024 10-year-old ASA bug Cisco CVE-2014-2120
FBI, CISA urge Americans to use secure messaging apps in wake of massive cyberattack https://www.zdnet.com/article/fbi-cisa-urge-americans-to-use-secure-messaging-apps-in-wake-of-massive-cyberattack/
07/12/2024 09:48:34
QRCode
archive.org
thumbnail
zdnet EN 2024 advse CISA FBI US telcos cyberattack secure messaging encrypted
Cloudflare’s developer domains increasingly abused by threat actors https://www.bleepingcomputer.com/news/security/cloudflares-developer-domains-increasingly-abused-by-threat-actors/
05/12/2024 17:10:58
QRCode
archive.org
thumbnail

Cloudflare's 'pages.dev' and 'workers.dev' domains, used for deploying web pages and facilitating serverless computing, are being increasingly abused by cybercriminals for phishing and other malicious activities.

bleepingcomputer EN 2024 Abuse Cloudflare Cloudflare-Pages Cloudflare-Workers Cybercrime Phishing
Black Basta ransomware gang hit BT Group https://securityaffairs.com/171668/breaking-news/black-basta-ransomware-attack-bt-group.html
05/12/2024 16:54:18
QRCode
archive.org
thumbnail

BT Group (formerly British Telecom)'s Conferencing division shut down some of its servers following a Black Basta ransomware attack.

securityaffairs EN 2024 BT Group BlackBasta ransomware
Where There’s Smoke, There’s Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0day https://labs.watchtowr.com/where-theres-smoke-theres-fire-mitel-micollab-cve-2024-35286-cve-2024-41713-and-an-0day/
05/12/2024 16:50:05
QRCode
archive.org
thumbnail
watchtowr EN 2024 Mitel MiCollab CVE-2024-3528 CVE-2024-41713 0day PoC
At least 8 US telcos, dozens of countries impacted by Salt Typhoon breaches, White House says | The Record from Recorded Future News https://therecord.media/eight-telcos-breached-salt-typhoon-nsc
05/12/2024 16:49:26
QRCode
archive.org
thumbnail

Senators briefed on the wide-ranging breaches by Chinese hackers called for action on Wednesday to protect the country's telecommunications networks.

therecord.media EN 2024 telcos US Salt-Typhoon China breaches
Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples https://unit42.paloaltonetworks.com/unique-popular-techniques-lateral-movement-macos/
05/12/2024 16:44:03
QRCode
archive.org
thumbnail

We uncover macOS lateral movement tactics, such as SSH key misuse and AppleScript exploitation. Strategies to counter this attack trend are also discussed. We uncover macOS lateral movement tactics, such as SSH key misuse and AppleScript exploitation. Strategies to counter this attack trend are also discussed.

unit42 EN 2024 macOS ARD AppleScript attacks lateral-movement tactics
Malicious Ads in Search Results Are Driving New Generations of Scams | WIRED https://www.wired.com/story/malicious-ads-in-search-results-are-driving-new-generations-of-scams/
05/12/2024 09:02:29
QRCode
archive.org
thumbnail

The scourge of “malvertising” is nothing new, but the tactic is still so effective that it's contributing to the rise of investment scams and the spread of new strains of malware.

wired EN 2024 Malicious Ads malvertising malware
iVerify Mobile Threat Investigation Uncovers New Pegasus Samples https://iverify.io/blog/iverify-mobile-threat-investigation-uncovers-new-pegasus-samples
05/12/2024 09:01:20
QRCode
archive.org
thumbnail

iVerify’s Mobile Threat Hunting finds Pegasus spyware is more prevalent and capable of infecting a wide range of devices, not just devices of high-risk users.

iVerify EN 2024 Mobile Threat Investigation Uncovers Pegasus
Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud https://www.ic3.gov/PSA/2024/PSA241203
04/12/2024 09:10:07
QRCode
archive.org

The FBI is warning the public that criminals exploit generative artificial intelligence (AI) to commit fraud on a larger scale which increases the believability of their schemes. Generative AI reduces the time and effort criminals must expend to deceive their targets. Generative AI takes what it has learned from examples input by a user and synthesizes something entirely new based on that information. These tools assist with content creation and can correct for human errors that might otherwise serve as warning signs of fraud. The creation or distribution of synthetic content is not inherently illegal; however, synthetic content can be used to facilitate crimes, such as fraud and extortion.1 Since it can be difficult to identify when content is AI-generated, the FBI is providing the following examples of how criminals may use generative AI in their fraud schemes to increase public recognition and scrutiny.

ic3.gov EN 2024 warning Criminals Use Generative AI Financial Fraud recommandations
Police seize Matrix encrypted chat service after spying on criminals https://www.bleepingcomputer.com/news/security/police-seize-matrix-encrypted-chat-service-after-spying-on-criminals/
03/12/2024 16:43:04
QRCode
archive.org
thumbnail

An international law enforcement operation codenamed 'Operation Passionflower' has shut down MATRIX, an encrypted messaging platform used by cybercriminals to coordinate illegal activities while evading police.

bleepingcomputer EN 2024 Arrest Encrypted-Chat Encrypted-Messaging Europol Matrix
CVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMaster - Rhino Security Labs https://rhinosecuritylabs.com/research/cve-2024-1212unauthenticated-command-injection-in-progress-kemp-loadmaster/
03/12/2024 15:37:41
QRCode
archive.org
thumbnail

CVE-2024-1212 is an unauthenticated command injection found in Progress Kemp LoadMaster load balancer's administrator web interface by Rhino Security Labs.

rhinosecuritylabs EN 2024 vulnerability Progress Kemp LoadMaster unauthenticated command injection
Windows Server 2012 Mark of the Web Vulnerability (0day) - and Free Micropatches for it https://blog.0patch.com/2024/11/windows-server-2012-mark-of-web.html
03/12/2024 09:33:44
QRCode
archive.org
thumbnail

Our researchers discovered a previously unknown vulnerability on Windows Server 2012 and Server 2012 R2 that allows an attacker to bypass a ...

0patch EN 2024 WindowsServer2012 0day Mark-of-the-Web Vulnerability
Poland arrests former spy chief in Pegasus spyware probe https://techcrunch.com/2024/12/02/poland-arrests-former-spy-chief-in-pegasus-spyware-probe/
03/12/2024 09:01:50
QRCode
archive.org
thumbnail

The former head of Poland’s internal security agency Piotr Pogonowski was forced to appear in front of a parliamentary committee investigating the alleged abuse of Pegasus spyware in the country.

techcrunch EN 2024 Pegasus Poland arrest parliamentary committee
page 47 / 208
4710 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio