Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 48 / 203
4050 résultats taggé EN  ✕
Government of Canada orders the wind up of TikTok Technology Canada, Inc. following a national security review under the Investment Canada Act https://www.canada.ca/en/innovation-science-economic-development/news/2024/11/government-of-canada-orders-the-wind-up-of-tiktok-technology-canada-inc-following-a-national-security-review-under-the-investment-canada-act.html
08/11/2024 12:02:46
QRCode
archive.org

“As a result of a multi-step national security review process, which involves rigorous scrutiny by Canada’s national security and intelligence community, the Government of Canada has ordered the wind up of the Canadian business carried on by TikTok Technology Canada, Inc. The government is taking action to address the specific national security risks related to ByteDance Ltd.’s operations in Canada through the establishment of TikTok Technology Canada, Inc. The decision was based on the information and evidence collected over the course of the review and on the advice of Canada’s security and intelligence community and other government partners.

Canada EN 2024 order TikTok national-security ByteDance Government intelligence wind-up
Gootloader’s Pivot from SEO Poisoning: PDF Converters Become the New Infection Vector https://gootloader.wordpress.com/2024/11/07/gootloaders-pivot-from-seo-poisoning-pdf-converters-become-the-new-infection-vector/
08/11/2024 08:21:08
QRCode
archive.org
thumbnail

Three weeks ago, Gootloader samples suddenly dried up. This has happened before, so I switched VPNs and tried new locations—coffee shops, friends’, and family’s Wi-Fi networks—but still couldn’t re…

gootloader.wordpress.com EN 2024 Pivot SEO Gootloader Poisoning PDF Converters
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign https://news.sophos.com/en-us/2024/11/06/bengal-cat-lovers-in-australia-get-psspsspssd-in-google-driven-gootloader-campaign/
07/11/2024 16:39:31
QRCode
archive.org
thumbnail

The Internet is full of cats—and in this case, malware-delivering fake cat websites used for very targeted search engine optimization.

sophos EN 2024 Australia Bengal Google-driven Gootloader
A New Era of macOS Sandbox Escapes: Diving into an Overlooked Attack Surface and Uncovering 10+ New Vulnerabilities – Mickey's Blogs – Exploring the world with my sword of debugger :) https://jhftss.github.io/A-New-Era-of-macOS-Sandbox-Escapes/
07/11/2024 12:05:33
QRCode
archive.org

A New Era of macOS Sandbox Escapes: Diving into an Overlooked Attack Surface and Uncovering 10+ New Vulnerabilities
This is a blog post for my presentation at the conference POC2024. The slides are uploaded here.

In the macOS system, most processes are running in a restricted sandbox environment, whether they are Apple’s own services or third-party applications. Consequently, once an attacker gains Remote Code Execution (RCE) from these processes, their capabilities are constrained. The next step for the attacker is to circumvent the sandbox to gain enhanced execution capabilities and broader file access permissions.

But how to discover sandbox escape vulnerabilities? Upon reviewing the existing issues, I unearthed a significant overlooked attack surface and a novel attack technique. This led to the discovery of multiple new sandbox escape vulnerabilities: CVE-2023-27944, CVE-2023-32414, CVE-2023-32404, CVE-2023-41077, CVE-2023-42961, CVE-2024-27864, CVE-2023-42977, and more.

jhftss EN 2024 macOS research vulnerabilies Sandbox Escapes CVE-2023-27944 CVE-2023-32414 CVE-2023-32404 CVE-2023-41077 CVE-2023-42961 CVE-2024-27864 CVE-2023-42977
Cyberattack disables tracking systems and panic alarms on British prison vans https://therecord.media/british-prison-vans-cyberattack
07/11/2024 08:30:49
QRCode
archive.org
thumbnail

Microlise, a telematics company, said a network intrusion affected services that it provides to British prisoner escort vans.

therecord.media EN 2024 Microlise UK telematics company prisoner escort vans
Interpol operation nets 41 arrests, takedown of 22,000 malicious IPs https://therecord.media/interpol-operation-arrests-takedowns
06/11/2024 09:08:23
QRCode
archive.org
thumbnail

The global operation was intended to root out malicious IP addresses used for phishing, ransomware and infostealer malware.

therecord.media EN 2024 Interpol Operation-Synergia takedown
EDR Bypass Testing Reveals Extortion Actor's Toolkit https://unit42.paloaltonetworks.com/edr-bypass-extortion-attempt-thwarted/
05/11/2024 15:54:13
QRCode
archive.org
thumbnail

A threat actor attempted to use an AV/EDR bypass tool in an extortion attempt. Instead, the tool provided Unit 42 insight into the threat actor.

paloaltonetworks EN 2024 EDR Bypass Testing Toolkit CortexXDR EDR
ClickFix tactic: Revenge of detection https://blog.sekoia.io/clickfix-tactic-revenge-of-detection/
05/11/2024 14:27:46
QRCode
archive.org
thumbnail

Detect the ClickFix tactic: a social engineering technique using fake video calls and CAPTCHA pages to deploy malicious code.

sekoia EN 2024 ClickFix tactic
Cisco notifies ‘limited set’ of customers after hacker accessed non-public files https://therecord.media/cisco-notifies-limited-set-of-customers-hacker-accessed-non-public-info
05/11/2024 10:21:44
QRCode
archive.org
thumbnail

The company has said it didn't suffer a breach, but announced a threat actor downloaded data on a public-facing DevHub environment.

therecord.media EN 2024 Cisco Data-Breach
Schneider Electric confirms dev platform breach after hacker steals data https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/
04/11/2024 20:31:15
QRCode
archive.org
thumbnail

Schneider Electric has confirmed a developer platform was breached after a threat actor claimed to steal 40GB of data from the company's JIRA server.

bleepingcomputer EN 2024 Data-Breach Developer-Environment Jira Schneider-Electric Security InfoSec Computer-Security
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging - Securonix https://www.securonix.com/blog/crontrap-emulated-linux-environments-as-the-latest-tactic-in-malware-staging/
04/11/2024 16:55:53
QRCode
archive.org
thumbnail

In a rather novel attack chain, attackers deploy a custom-made emulated QEMU Linux box to persist on endpoints, delivered through phishing emails.

securonix EN 2024 Linux CRON#TRAP QEMU phishing emails
The story behind HISAA https://www.theregister.com/2024/10/29/hold_the_story_behind_the/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
04/11/2024 08:44:10
QRCode
archive.org
thumbnail

Health care breaches lead to legislation
Highlights of the new standard include:

  • Performing and documenting a security risk analysis of exposure
  • Documentation of a business continuity plan (BCP)
  • Stress test of resiliency and documentation of any planned changes to the BCP
  • A signed statement by both the CEO and CISO of compliance
  • A third-party audit to certify compliance (no later than six months after enactment)
theregister EN 2024 HISAA standard legal US health legislation
SmokeBuster Tool https://www.zscaler.com/blogs/security-research/smokebuster-keeping-systems-smokeloader-free
04/11/2024 07:06:54
QRCode
archive.org
thumbnail
  • ThreatLabz has developed a tool named SmokeBuster to detect, analyze, and remediate infections.
  • SmokeBuster supports 32-bit and 64-bit instances of SmokeLoader and versions 2017-2022. The tool is compatible with Windows 7 to Windows 11.
  • SmokeLoader is a malware downloader that originated in 2011. The malware is primarily designed to deliver second-stage payloads, which include information stealers and ransomware.
  • Despite a major disruption by Operation Endgame in May 2024, SmokeLoader continues to be used by numerous threat groups largely due to numerous cracked versions publicly available on the internet.
  • The last four versions of SmokeLoader contain coding flaws that significantly impact an infected system’s performance.
zscaler EN 2024 tool SmokeBuster SmokeLoader Operation-Endgame
Censorship Attack against the Tor network https://osservatorionessuno.org/blog/2024/10/censorship-attack-against-the-tor-network/
04/11/2024 07:00:25
QRCode
archive.org

In the last few days, many Tor relay operators - mainly hosting relay nodes on providers like Hetzner - began receiving abuse notices.
All the abuses reported many failed SSH login attempts - part of a brute force attack - coming from their Tor relays.

Tor relays normally only transport traffic between a guard and an exit node of the Tor network, and per-se should not perform any SSH connections to internet-facing hosts, let alone performing SSH brute force attacks.

osservatorionessuno EN 2024 Tor network spoofing attack relays SSH
Massive hack-for-hire scandal rocks Italian political elites https://www.politico.eu/article/hacking-scandal-italy-matteo-renzi-sergio-mattarella-equalize-nunzio-samuele-calamucci/
04/11/2024 06:58:50
QRCode
archive.org
thumbnail

The president and former prime minister were among targets of hackers selling highly sensitive data.

politico EN 2024 Italy Breaches Giorgia Data Exfiltration hack-for-hire
Cyber attack on pharmaceutical distributor AEP https://www.heise.de/en/news/Cyber-attack-on-pharmaceutical-distributor-AEP-10001220.html
04/11/2024 06:55:28
QRCode
archive.org
thumbnail

AEP GmbH was the victim of a targeted cyber attack on October 28, which led to the partial encryption of the company's IT systems. The company's own security systems detected the attack. The company provides information about this on its website.

heise EN 2024 Germany ransomware Digital Pharmaindustrie Lösegeld Health Apotheken
DDoS site Dstat.cc seized and two suspects arrested in Germany https://www.bleepingcomputer.com/news/security/ddos-site-dstatcc-seized-and-two-suspects-arrested-in-germany/
01/11/2024 16:17:33
QRCode
archive.org
thumbnail

The Dstat.cc DDoS review platform has been seized by law enforcement, and two suspects have been arrested after the service helped fuel distributed denial-of-service attacks for years.

bleepingcomputer EN 2024 Arrest BKA DDoS Dstat.cc Germany Operation-PowerOff
Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack https://www.wired.com/story/synology-zero-click-vulnerability/
01/11/2024 16:06:26
QRCode
archive.org
thumbnail

A vulnerability categorized as “critical” in a photo app installed by default on Synology network-attached storage devices could give attackers the ability to steal data and worse.

wired EN 2024 Synology photos vulnerabilities RCE Pwn2Own critical vulnerability
Botnet 7777: Are You Betting on a Compromised Router? https://www.team-cymru.com/post/botnet-7777-are-you-betting-on-a-compromised-router
01/11/2024 10:20:17
QRCode
archive.org
thumbnail

Discover the latest insights on the Quad7 / 7777 botnet in our detailed analysis. Learn about the expansion of this resilient threat, its targeting patterns, and proactive measures to defend against compromised routers. Stay informed with our up-to-date findings and recommendations.

team-cymru EN 2024 Quad7 analysis botnet
A glimpse into the Quad7 operators' next moves and associated botnets https://blog.sekoia.io/a-glimpse-into-the-quad7-operators-next-moves-and-associated-botnets/
01/11/2024 10:18:13
QRCode
archive.org
thumbnail

Uncover the secrets of the Quad7 botnet and its ever-evolving toolset. Learn about the new backdoors and protocols used by these operators.

sekoia EN 2024 Quad7 botnet CovertNetwork-1658 analysis
page 48 / 203
4616 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio