Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 49 / 76
1513 résultats taggé 2024  ✕
Exploiting the Cloud: How SMS Scammers are using Amazon, Google and IBM Cloud Services to Steal Customer Data https://www.enea.com/insights/exploiting-the-cloud-how-sms-scammers-are-using-amazon-google-and-ibm-cloud-services-to-steal-customer-data/
25/05/2024 22:06:37
QRCode
archive.org
thumbnail

Discover how SMS scammers are exploiting cloud storage to host scam websites with the intention of stealing sensitive information

enea EN 2024 SMS scammers IBM Cloud Services Amazon Google
New ShrinkLocker ransomware uses BitLocker to encrypt your files https://www.bleepingcomputer.com/news/security/new-shrinklocker-ransomware-uses-bitlocker-to-encrypt-your-files/
25/05/2024 22:01:44
QRCode
archive.org
thumbnail

A new ransomware strain called ShrinkLocker creates a new boot partition to encrypt corporate systems using Windows BitLocker.

bleepingcomputer EN 2024 BitLocker Encryption Ransomware ShrinkLocker Windows Security InfoSec Computer-Security
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail https://thehackernews.com/2024/05/cyber-criminals-exploit-github-and.html
25/05/2024 21:59:33
QRCode
archive.org

A "multi-faceted campaign" has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking trojans such as Atomic (aka AMOS), Vidar, Lumma (aka LummaC2), and Octo by impersonating credible software like 1Password, Bartender 5, and Pixelmator Pro.

thehackernews EN 2024 GitHub FileZilla AMOS impersonating software 1Password fake
Foxit PDF “Flawed Design” Exploitation https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/
25/05/2024 21:57:16
QRCode
archive.org
thumbnail

PDF (Portable Document Format) files have become an integral part of modern digital communication. Renowned for their universality and fidelity, PDFs offer a robust platform for sharing documents across diverse computing environments. PDFs have evolved into a standard format for presenting text, images, and multimedia content with consistent layout and formatting, irrespective of the software, hardware, or operating system used to view them. This versatility has made PDFs indispensable in fields ranging from business and academia to government and personal use, serving as a reliable means of exchanging information in a structured and accessible manner.

checkpoint EN 2024 Foxit PDF Exploitation
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations — Elastic Security Labs https://www.elastic.co/security-labs/invisible-miners-unveiling-ghostengine
25/05/2024 21:56:36
QRCode
archive.org
thumbnail

Elastic Security Labs has identified REF4578, an intrusion set incorporating several malicious modules and leveraging vulnerable drivers to disable known security solutions (EDRs) for crypto mining.

elastic EN 2024 GHOSTENGINE REF4578
A Catalog of Hazardous AV Sites – A Tale of Malware Hosting https://www.trellix.com/blogs/research/a-catalog-of-hazardous-av-sites-a-tale-of-malware-hosting/
25/05/2024 21:52:52
QRCode
archive.org

In mid-April 2024, Trellix Advanced Research Center team members observed multiple fake AV sites hosting highly sophisticated malicious files such as APK, EXE and Inno setup installer that includes Spy and Stealer capabilities. Hosting malicious software through sites which look legitimate is predatory to general consumers, especially those who look to protect their devices from cyber-attacks. The hosted websites made to look legitimate are listed below.

trellix EN 2024 fake antivirus AV malicious research
Putin hijacked Austria’s spy service. Now he's going after its government https://www.politico.eu/article/vladimir-putin-austria-spy-service-bvt-government-intelligence-wirecard-jan-marsalek-freedom-party/
25/05/2024 21:44:05
QRCode
archive.org
thumbnail

Intelligence officials suspect Wirecard COO Jan Marsalek of colluding with the far-right Freedom Party on Moscow’s behalf. 

politico EN 2024 Austria EU-Russia-relations Far-right Foreign-policy Herbert-Kickl Intelligence spy
Hacker defaces spyware app’s site, dumps database and source code https://www.bleepingcomputer.com/news/security/hacker-defaces-spyware-apps-site-dumps-database-and-source-code/
25/05/2024 10:09:20
QRCode
archive.org
thumbnail

​​A hacker has defaced the website of the pcTattletale spyware application, found on the booking systems of several Wyndham hotels in the United States, and leaked over a dozen archives containing database and source code data.

bleepingcomputer EN 2024 defaced pcTattletale spyware hacked
Stark Industries Solutions: An Iron Hammer in the Cloud https://krebsonsecurity.com/2024/05/stark-industries-solutions-an-iron-hammer-in-the-cloud/
24/05/2024 15:16:34
QRCode
archive.org

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and…

krebsonsecurity EN 2024 Stark-Industries-Solutions
Why Your Wi-Fi Router Doubles as an Apple AirTag https://krebsonsecurity.com/2024/05/why-your-wi-fi-router-doubles-as-an-apple-airtag/
24/05/2024 15:09:30
QRCode
archive.org

Apple and the satellite-based broadband service Starlink each recently took steps to address new research into the potential security and privacy implications of how their services geo-locate devices. Researchers from the University of Maryland say they relied on publicly available…

krebsonsecurity EN 2024 Wi-Fi Router Apple WPS privacy location
Malicious PyPI packages targeting highly specific MacOS machines https://securitylabs.datadoghq.com/articles/malicious-pypi-package-targeting-highly-specific-macos-machines/
24/05/2024 11:22:40
QRCode
archive.org
thumbnail

In this post, we analyze a cluster of malicious PyPI packages targeting specific MacOS machines.

datadoghq EN 2024 macos PyPI packages Supply-chain-attack
How Apple Wi-Fi Positioning System can be abused to track people around the globe https://www.theregister.com/AMP/2024/05/23/apple_wifi_positioning_system/
24/05/2024 06:50:26
QRCode
archive.org
thumbnail

Academics have suggested that Apple's Wi-Fi Positioning System (WPS) can be abused to create a global privacy nightmare.

In a paper titled, "Surveilling the Masses with Wi-Fi-Based Positioning Systems," Erik Rye, a PhD student at the University of Maryland (UMD) in the US, and Dave Levin, associate professor at UMD, describe how the design of Apple's WPS facilitates mass surveillance, even of those not using Apple devices.

theregister EN 2024 Apple Wi-Fi Positioning WPS privacy abused
A root-server at the Internet’s core lost touch with its peers. We still don’t know why. https://arstechnica.com/security/2024/05/dns-glitch-that-threatened-internet-stability-fixed-cause-remains-unclear/
23/05/2024 21:10:50
QRCode
archive.org
thumbnail

For 4 days, the c-root server maintained by Cogent lost touch with its 12 peers.

arstechnica EN 2024 DNS c-root Cogent delay
Les retards du serveur racine C https://www.bortzmeyer.org/c-root-retard.html
23/05/2024 21:09:52
QRCode
archive.org

On fait souvent remarquer que c'est pendant les pannes qu'on peut le mieux observer comment un système marche. Les perturbations qui affectent le serveur racine du DNS identifié par la lettre C sont donc l'occasion d'apprendre comment fonctionne ce système des serveurs racine.

bortzmeyer FR 2024 root DNS c.root-servers.net retard cogent
CVE-2024-4978: Backdoored Justice AV Solutions Viewer Software Used in Apparent Supply Chain Attack | Rapid7 Blog https://www.rapid7.com/blog/post/2024/05/23/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack/
23/05/2024 16:57:07
QRCode
archive.org
thumbnail

Justice AV Solutions (JAVS) is a U.S.-based company specializing in digital audio-visual recording solutions for courtroom environments. According to the vendor’s website, JAVS technologies are used in courtrooms, chambers and jury rooms, jail and prison facilities, and council, hearing, and lecture rooms. Their company website cites over 10,000 installations of their technologies worldwide.

rapid7 EN 2024 Backdoored JusticeAV US CVE-2024-4978
When privacy expires: how I got access to tons of sensitive citizen data after buying cheap domains https://inti.io/p/when-privacy-expires-how-i-got-access
22/05/2024 19:41:24
QRCode
archive.org

Cybersecurity has always been transient: what is deemed to be secure today, may be considered easily hackable tomorrow. Domain names in web and e-mail addresses, such as info@inti.io, are leased in time. This means that if nobody thinks of renewing them after they expire, they will be put up for sale. It made me wonder what would happen to the graveyard of cloud accounts attached to the e-mail addresses that once belonged to these expired domains.

inti.io EN 2024 privacy expired domains research
Criminal record database of millions of Americans dumped online https://www.malwarebytes.com/blog/news/2024/05/criminal-record-database-of-millions-of-americans-dumped-online
22/05/2024 13:20:08
QRCode
archive.org
thumbnail

A notorious cybercriminal involved in breaches has released a database containing 70 million US criminal records.

malwarebytes EN 2024 US Criminal record database leak dumped
CVE-2023-34992: Fortinet FortiSIEM Command Injection Deep-Dive https://www.horizon3.ai/attack-research/cve-2023-34992-fortinet-fortisiem-command-injection-deep-dive/
20/05/2024 14:35:51
QRCode
archive.org
thumbnail

CVE-2023-34992 Fortinet FortiSIEM Command Injection Deep-Dive and Indicators of Compromise. This blog details a command injection vulnerability which allows an unauthenticated attacker to access the FortiSIEM server as root to execute arbitrary commands.

horizon3 EN 2024 cve-2023-34992 research PoC FortiSIEM IoCs
Così le autorità sono arrivate Dmitry Yuryevich Khoroshev, il leader di LockBit https://www.securityinfo.it/2024/05/20/cosi-le-autorita-sono-arrivate-dmitry-yuryevich-khoroshev-il-leader-di-lockbit/
20/05/2024 10:33:17
QRCode
archive.org
thumbnail

USA, UK e Australia dicono di aver trovate il leader russo della più pericolosa organizzazione di ransomware al mondo. Ma avranno davvero ragione?

securityinfo IT 2024 Khoroshev LockBitSupp
'Got that boomer!': How cybercriminals steal one-time passcodes for SIM swap attacks and raiding bank accounts | TechCrunch https://techcrunch.com/2024/05/13/cyber-criminals-stealing-one-time-passcodes-sim-swap-raiding-bank-accounts/
20/05/2024 10:16:50
QRCode
archive.org
thumbnail

The incoming phone call flashes on a victim’s phone. It may only last a few seconds, but can end with the victim handing over codes that give cybercriminals the ability to hijack their online accounts or drain their crypto and digital wallets.

“This is the PayPal security team here. We’ve detected some unusual activity on your account and are calling you as a precautionary measure,” the caller’s robotic voice says. “Please enter the six-digit security code that we’ve sent to your mobile device.”

techcrunch EN 2024 scam passcode PayPal SIM swap attacks SIM-swapping
page 49 / 76
4595 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio