Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 48 / 228
Emerging Details of Chinese Hack Leave U.S. Officials Increasingly Concerned https://www.nytimes.com/2024/11/22/us/politics/chinese-hack-telecom-white-house.html
25/11/2024 16:13:27
QRCode
archive.org

Leaders of the big telecommunications companies were summoned to the White House to discuss strategies for overhauling the security of the nation’s telecommunications networks amid growing alarm at the scope of a Chinese hack.

nytimes EN 2024 China US telecom Officials Salt-Typhoon
CyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attacks https://www.sentinelone.com/labs/cybervolk-a-deep-dive-into-the-hacktivists-tools-and-ransomware-fueling-pro-russian-cyber-attacks/
25/11/2024 15:16:57
QRCode
archive.org
thumbnail

A loose collective of mostly low-skilled actors, CyberVolk absorbs and adapts a wide array of destructive malware for use against political targets.

sentinelone EN 2024 CyberVolk collective pro-Russian
7-Zip flaw enables code smuggling with manipulated archives https://www.heise.de/en/news/7-Zip-flaw-enables-code-smuggling-with-manipulated-archives-10083922.html
25/11/2024 10:43:37
QRCode
archive.org
thumbnail

Attackers can use manipulated archives to try to inject malicious code into 7-Zip users. An update is available.

heise.de EN 2024 7-Zip vulnerability CVE-2024-11477
China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike https://www.recordedfuture.com/research/china-nexus-tag-112-compromises-tibetan-websites
24/11/2024 10:04:10
QRCode
archive.org
thumbnail

In a recent cyber campaign, the Chinese state-sponsored threat group TAG-112 compromised two Tibetan websites, Tibet Post and Gyudmed Tantric University, to deliver the Cobalt Strike malware. Recorded Future’s Insikt Group discovered that the attackers embedded malicious JavaScript in these sites, which spoofed a TLS certificate error to trick visitors into downloading a disguised security certificate. This malware, often used by threat actors for remote access and post-exploitation, highlights a continued cyber-espionage focus on Tibetan entities. TAG-112’s infrastructure, concealed using Cloudflare, links this campaign to other China-sponsored operations, particularly TAG-102 (Evasive Panda).

recordedfuture EN 2024 EvasivePanda TAG-112 Tibet China CobaltStrike malware
Fintech Giant Finastra Investigating Data Breach https://krebsonsecurity.com/2024/11/fintech-giant-finastra-investigating-data-breach/
24/11/2024 09:59:10
QRCode
archive.org

The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world’s top 50 banks, notified customers of the security incident after a cybercriminal began selling more than 400 gigabytes of data purportedly stolen from the company.

krebsonsecurity 2024 EN Fintech Finastra Data-Breach
Apple fixes two zero-days used in attacks on Intel-based Macs https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-days-used-in-attacks-on-intel-based-macs/
23/11/2024 10:10:00
QRCode
archive.org
thumbnail

Apple released emergency security updates to fix two zero-day vulnerabilities that were exploited in attacks on Intel-based Mac systems.

"Apple is aware of a report that this issue may have been exploited," the company said in an advisory issued on Tuesday.

The two bugs were found in the macOS Sequoia JavaScriptCore (CVE-2024-44308) and WebKit (CVE-2024-44309) components of macOS.

bleepingcomputer EN 2024 CVE-2024-44309 CVE-2024-44308 macos JavaScriptCore WebKit exploited
Qualys TRU Uncovers Five Local Privilege Escalation Vulnerabilities in needrestart | Qualys Security Blog https://blog.qualys.com/vulnerabilities-threat-research/2024/11/19/qualys-tru-uncovers-five-local-privilege-escalation-vulnerabilities-in-needrestart
23/11/2024 10:09:11
QRCode
archive.org
thumbnail

The Qualys Threat Research Unit (TRU) has identified five Local Privilege Escalation (LPE) vulnerabilities within the needrestart component, which is installed by default on Ubuntu Server. These vulnerabilities can be exploited by any unprivileged user to gain full root access without requiring user interaction. The identified flaws have been assigned the CVE identifiers CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003, highlighting the need for immediate remediation to protect system integrity.

Our TRU team has successfully developed functional exploits for these vulnerabilities. While we will not disclose our exploits, please be aware that these vulnerabilities are easily exploitable, and other researchers may release working exploits shortly following this coordinated disclosure.

These vulnerabilities have been present since the introduction of interpreter support in needrestart version 0.8, released in April 2014.

qualys EN 2024 TRU LPE vulnerabilities UbuntuServer CVE-2024-48990 CVE-2024-48991 CVE-2024-48992 CVE-2024-10224
Plusieurs comptes Telegram de députés ont été piratés https://www.politico.eu/article/plusieurs-comptes-telegram-de-deputes-ont-ete-pirates/
22/11/2024 21:51:23
QRCode
archive.org
thumbnail

Les services de l’Assemblée nationale ont alerté l’ensemble des députés après le piratage.

politico FR 2024 Telegram France Assemblé piratés députés
Feds Charge Five Men in ‘Scattered Spider’ Roundup – Krebs on Security https://krebsonsecurity.com/2024/11/feds-charge-five-men-in-scattered-spider-roundup/
22/11/2024 14:20:50
QRCode
archive.org

Federal prosecutors in Los Angeles this week unsealed criminal charges against five men alleged to be members of a hacking group responsible for dozens of cyber intrusions at major U.S. technology companies between 2021 and 2023, including LastPass, MailChimp, Okta,…

krebsonsecurity EN 2024 Scattered-Spider busted
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2024/11/22/microsoft-shares-latest-intelligence-on-north-korean-and-chinese-threat-actors-at-cyberwarcon/
22/11/2024 14:09:27
QRCode
archive.org
thumbnail

At CYBERWARCON 2024, Microsoft Threat Intelligence analysts will share research and insights on North Korean and Chinese threat actors representing years of threat actor tracking, infrastructure monitoring and disruption, and their attack tooling.

microsoft EN 2024 CYBERWARCON DPRK North-Korea China analysis intlligence
Seeing Through a GLASSBRIDGE: Understanding the Digital Marketing Ecosystem Spreading Pro-PRC Influence Operations https://cloud.google.com/blog/topics/threat-intelligence/glassbridge-pro-prc-influence-operations/?hl=en
22/11/2024 14:05:56
QRCode
archive.org
thumbnail

GLASSBRIDGE is an umbrella group of four different companies that operate networks of inauthentic news sites and newswire services.

Mandiant EN 2024 GLASSBRIDGE fake news newswire services Haixun fake-news China
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack | WIRED https://www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/
22/11/2024 14:02:52
QRCode
archive.org
thumbnail

In a first, Russia's APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street.

wired EN 2024 russia hacking Wi-Fi espionage hijacking APT28
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks https://www.intrinsec.com/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks/
21/11/2024 17:17:03
QRCode
archive.org
  • The Russian autonomous system PROSPERO (AS200593) could be linked with a high level of confidence to Proton66 (AS198953), another Russian AS, that we believe to be connected to the bulletproof services named ‘SecureHost‘ and ‘BEARHOST‘. We notably observed that both network’s configurations are almost identical in terms of peering agreements and their respective share of loads throughout time.
  • Amongst the activities shared by the two networks, we noticed that both GootLoader and SpyNote malwares recently changed their infrastructure of command-and-control servers and phishing pages from to Proton66. Additionally, the domains hosting the phishing pages deploying SpyNote were hosted on either one of the two AS and had already been used in previous campaigns delivering revoked AnyDesk and LiveChat versions for both Windows and Mac.
  • Regarding the other malicious activities found on PROSPERO’s IPs, we found that throughout September, multiple SMS spam campaigns targeting citizens from various countries were leading to phishing domains hosted on PROSPERO and Proton66. While most phishing templates were usurping bank login pages to steal credit card details, we also noticed that some of them were used to deploy android spywares such as Coper (a.k.a. Octo).
  • SocGholish, another initial access broker (IAB) that we found to be hosting a major part of its infrastructure on Proton66, continues to leverage this autonomous system to host fingerprinting scripts contained on the websites it infects. Along SocGholish, we found out that FakeBat, another loader that infects systems through compromised websites, was using the same IPs to host both screening and redirection script
intrinsec EN 2024 AS200593 AS198953 PROSPERO GootLoader SpyNote Russia bulletproof BEARHOST SocGholish
FortiClient VPN Logging Blind Spot Revealed https://pentera.io/blog/FortiClient-VPN_logging-blind-spot-revealed/
21/11/2024 16:01:38
QRCode
archive.org
thumbnail

Security research that presents a method to automatically validate credentials against Fortinet VPN servers by uncovering an exploit that attackers can use to compromise countless organizations.

pentera EN research Fortinet VPN Logging Blind Spot brute-force
Cinq membres du groupe de pirates Scattered Spider arrêtés https://www.lemonde.fr/pixels/article/2024/11/21/cinq-membres-du-groupe-de-pirates-scattered-spider-arretes_6407020_4408996.html
21/11/2024 14:59:18
QRCode
archive.org
thumbnail

Quatre Américains et un Britannique sont désormais poursuivis pour leur implication dans ce groupe, accusé notamment d’avoir piraté les casinos MGM Resorts. Spécialisé dans l’hameçonnage, ce collectif pourrait être l’émanation d’une vaste communauté de pirates anglophones.

pixels FR 2024 lemonde ScatteredSpider busted arrêtés cybercriminels jeunes
INPS Servizi sotto attacco ransomware. Dati a rischio e sito irraggiungibile | DDay.it https://www.dday.it/redazione/51178/inps-servizi-sotto-attacco-ransomware-dati-a-rischio-e-sito-irraggiungibile
21/11/2024 14:54:48
QRCode
archive.org
thumbnail

L’attacco è avvenuto il 18 novembre ma è stato comunicato il giorno dopo attraverso l’avviso di un ente che si serve di INPS Servizi

dday IT 1014 Italia INPS Servizi ransomware
Ruag développe un smartphone pour l'armée suisse https://www.digitec.ch/fr/page/ruag-developpe-un-smartphone-pour-larmee-suisse-35665
21/11/2024 09:59:29
QRCode
archive.org

Dans le cadre d'un nouveau projet, le groupe technologique Ruag modifie un smartphone Samsung pour les institutions gouvernementales et les autorités telles que l'armée et les organisations à gyrophare.

Un smartphone appelé "Guardian" est un nouveau projet de communication sécurisée. C'est l'entreprise d'armement Ruag MRO qui en est responsable. Le prototype actuel devrait également fonctionner par satellite dans un avenir proche. Ruag collabore avec Wisekey, une société de sécurité genevoise, pour la connexion par satellite. C'est ce que rapportent plusieurs médias suisses comme le "Walliser Bote" et "Watson".

digitec FR 2024 Ruag smartphone armée suisse
750 000 fichiers et dossiers patients sensibles français en fuite sur le dark web, que se passe-t-il ? https://www.clubic.com/actualite-544139-fichiers-et-dossiers-patients-sensibles-francais-en-fuite-sur-le-dark-web-que-se-passe-t-il.html
21/11/2024 09:50:23
QRCode
archive.org
thumbnail

[Article mis à jour le 19 novembre 2024 à 17h40] Un cybercriminel a mis en ligne, mardi, une base de données contenant les informations hospitalières et personnelles de plus de 750 000 personnes. Celui-ci revendique une fuite de données du logiciel de gestion médicale Mediboard.

clubic FR 2024 santé médicaux hôpitaux near2tlg dataleak Mediboard softway
Threat Actors Hijack Misconfigured Servers for Live Sports Streaming https://www.aquasec.com/blog/threat-actors-hijack-misconfigured-servers-for-live-sports-streaming/
21/11/2024 09:33:49
QRCode
archive.org
thumbnail

Learn how Nautilus threat-hunting operation analyzed attackers exploiting misconfigured JupyterLab for illegal stream ripping with Traceeshark.

aquasec EN 2024 JupyterLab illegal streaming hacked Traceeshark
Picard victime d’une fuite de données, des milliers de clients touchés https://www.lefigaro.fr/secteur/high-tech/picard-victime-d-une-cyberattaque-des-milliers-de-clients-touches-20241112
21/11/2024 00:24:55
QRCode
archive.org
thumbnail

L’enseigne de surgelés a averti mardi une partie des clients de son programme de fidélité que leurs données sont dans la nature.

lefigaro FR 2024 Picard fuite données
page 48 / 228
4557 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio