Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 5 / 59
1170 résultats taggé 2023  ✕
Healthcare software provider data breach impacts 2.7 million https://www.bleepingcomputer.com/news/security/healthcare-software-provider-data-breach-impacts-27-million/
21/12/2023 10:30:36
QRCode
archive.org
thumbnail

ESO Solutions, a provider of software products for healthcare organizations and fire departments, disclosed that data belonging to 2.7 million patients has been compromised as a result of a ransomware attack.

bleepingcomputer EN 2023 Data-Breach ESO-Solutions Healthcare Hospital Ransomware
SSH protects the world’s most sensitive networks. It just got a lot weaker https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
20/12/2023 21:06:18
QRCode
archive.org
thumbnail

Novel Terrapin attack uses prefix truncation to downgrade the security of SSH channels.

arstechnica EN 2023 Terrapin SSH downgrade attack
Snikt! Rhysida dumps more than a terabyte of Insomniac Games’ internal data https://www.cyberdaily.au/culture/9959-snikt-rhysida-dumps-more-than-a-terabyte-of-insomniac-games-internal-data
20/12/2023 21:04:45
QRCode
archive.org
thumbnail

The Rhysida ransomware gang publishes 98 per cent of leaked data minutes after the ransom deadline passes – Wolverine game files included.

cyberdaily EN 2023 Rhysida ransomware Insomniac Games data-breach
Qakbot's Back, But Don't Y'all Panic: A Southern Tech Talk https://itssecurityyall.substack.com/p/qakbots-back-but-dont-yall-panic
20/12/2023 21:01:49
QRCode
archive.org
thumbnail

Qakbot, a versatile malware threat, returned after a takedown in August. The new campaign targets the hospitality industry with IRS-themed phishing emails containing malicious PDFs. Microsoft identified the attack, offering two IP addresses for blocking and a way to detect the malware's digital signature.

itssecurityyall EN 2023 Qakbot return malware hospitality IRS-themed
Unveiling VISS: a revolutionary approach to vulnerability impact scoring https://www.zoom.com/en/blog/viss-approach-to-vulnerability-impact-scoring/
20/12/2023 20:59:39
QRCode
archive.org
thumbnail

Our open-source vulnerability impact scoring system is now available and enhances incident response capabilities. Here's how VISS is unique.

zoom EN 2023 VISS vulnerability impact scoring
Web injections are back on the rise: 40+ banks affected by new malware campaign https://securityintelligence.com/posts/web-injections-back-on-rise-banks-affected-danabot-malware/
20/12/2023 20:51:20
QRCode
archive.org
thumbnail

DanaBot is a sophisticated banking trojan targeting financial institutions and their customers. Now, a new global campaign has put more users at risk.

securityintelligence EN 2023 DanaBot banking trojan malware
Terrapin attacks can downgrade security of OpenSSH connections https://www.bleepingcomputer.com/news/security/terrapin-attacks-can-downgrade-security-of-openssh-connections/
20/12/2023 20:48:09
QRCode
archive.org
thumbnail

Academic researchers developed a new attack called Terrapin that manipulates sequence numbers during the handshake process to breaks the SSH channel integrity when certain widely-used encryption modes are used.

bleepingcomputer EN 2023 Cyberattack Encryption Man-In-The-Middle-Attack SSH Terrapin Vulnerability
Xfinity waited to patch critical Citrix Bleed 0-day. Now it’s paying the price https://arstechnica.com/security/2023/12/hack-of-unpatched-comcast-servers-results-in-stolen-personal-data-including-passwords/
20/12/2023 20:46:07
QRCode
archive.org
thumbnail

Data for almost 36 million customers now in the hands of unknown hackers.

arstechnica EN 2023 Citrix-Bleed 0-day Xfinity data-breach
Ransomware : Alphv/BlackCat, touché et presque coulé ? https://www.lemagit.fr/actualites/366563912/Ransomware-Alphv-est-tombe-mais-BlackCat-sest-releve
19/12/2023 15:16:50
QRCode
archive.org

Le site vitrine de la franchise Alphv/BlackCat affiche désormais un message indiquant qu’il a été saisi par les autorités. Mais une vitrine alternative est en ligne, mais le coup est très sérieux.

lemagit FR 2023 Alphv BlackCat Alphv-BlackCat Ransomware vitrine
Justice Department Disrupts Prolific ALPHV/Blackcat Ransomware Variant | United States Department of Justice https://www.justice.gov/opa/pr/justice-department-disrupts-prolific-alphvblackcat-ransomware-variant
19/12/2023 15:12:33
QRCode
archive.org
thumbnail

The Justice Department announced today a disruption campaign against the Blackcat ransomware group — also known as ALPHV or Noberus — that has targeted the computer networks of more than 1,000 victims and caused harm around the world since its inception, including networks that support U.S. critical infrastructure.

justice.gov EN 2023 ALPHV Blackcat ransomware group Disrupts announce
Authorities claim seizure of notorious ALPHV ransomware gang's dark web leak site | TechCrunch https://techcrunch.com/2023/12/19/alphv-blackcat-ransomware-seizure/
19/12/2023 15:10:57
QRCode
archive.org
thumbnail

The FBI says it has released a decryption tool allowing hundreds of ALPHV/BlackCat victims to restore their scrambled files.

techcrunch EN 2023 ALPHV BlackCat cyberattack cybersecurity law-enforcement ransomware seizure
Vans, Supreme owner VF Corp. says personal data stolen and orders impacted in suspected ransomware attack | TechCrunch https://techcrunch.com/2023/12/18/vans-supreme-vf-corporation-personal-data-stolen-orders-impacted-ransomware/
19/12/2023 14:54:55
QRCode
archive.org
thumbnail

The U.S.-based owner of apparel brands including Vans, Supreme and The North Face says it cannot fulfill customer orders after a cyberattack.

techcrunch EN 2023 cyberattack data-breach ransomware Supreme Vans
Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains https://unit42.paloaltonetworks.com/detecting-malicious-stockpiled-domains/
19/12/2023 14:52:21
QRCode
archive.org
thumbnail

Using machine learning to target stockpiled malicious domains, the results of our detection pipeline tool highlight campaigns from phishing to scams.

unit42 EN 2023 TTP technique stockpiled DNS Malicious Early-Detection
The Curious Case of Predatory Sparrow https://sites.google.com/darkcell.se/www/sparrows
19/12/2023 14:39:10
QRCode
archive.org
thumbnail

Reconstructing the Attack from a 4th party collector’s point of view
Hamid Kashfi

[Update: December 18th, 2023]: On 18th December, Predator Sparrows launched a second
attack against the fuel distribution system in Iran, similar to their previous operation in 2021.
Since 2021, Iranian officials or third-party security vendors have not published any analysis or
technical details about the original attack, which is not unusual. Their screenshots from the
latest attacks provide some clues that only confirm our previous work, indicating connections to
the “Yaas Arghavani” company, a VSAT and POS service provider for the fuel distribution
system. The following is an old draft from December 2021, which I wrote for peer eyes rather
than public view. The original draft focused on the first attack against the fuel distribution
system. Still, some remarks remain valid and relevant to the recent attack on 18 Dec 2023, as
little has changed regarding how the system works. The same infrastructure, same suppliers,
and same 3rd party vendors, so we are likely just talking about a different attack vector and
entry point from the previous case. I will probably draft a new note about the recent attack from
scratch soon and when more details are gathered rather than updating the old speculative work.

darkcell.se EN 2023 Predatory-Sparrow Attack Iran Yaas-Arghavani analysis distribution system
FBI: Play ransomware gang has attacked 300 orgs since 2022 https://therecord.media/play-ransomware-targets-hundreds
18/12/2023 22:51:46
QRCode
archive.org
thumbnail

Since it appeared in July 2022, Play ransomware has launched devastating attacks on municipalities and critical infrastructure, agencies said.

therecord EN 2023 Play ransomware FBI report municipalities infrastructure 2022
SMTP Smuggling - Spoofing E-Mails Worldwide https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
18/12/2023 13:20:04
QRCode
archive.org
thumbnail

Introducing a novel technique for e-mail spoofing

sec-consult EN 2023 e-mail spoofing technique
Sophos has patched EOL Firewall versions against a critical flaw exploited in the wild, after identifying a new exploit. https://www.securityweek.com/sophos-patches-eol-firewalls-against-exploited-vulnerability/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
18/12/2023 11:24:18
QRCode
archive.org

UK-based cybersecurity firm Sophos this week announced patches for an exploited vulnerability in Firewall versions that have reached End-of-Life (EOL).

The critical-severity flaw, tracked as CVE-2022-3236, was found to impact versions 19.0 MR1 (19.0.1) and older of the product. It was originally patched in September 2022, but only in supported versions of Sophos Firewall.

Sophos describes the security defect as a code injection issue in the Firewall’s User Portal and Webadmin components, allowing attackers to achieve remote code execution (RCE).

securityweek EN 2023 Sophos CVE-2022-3236 critical-severity EOL Firewall patch
7 December 2023 - Apache Struts version 6.3.0.2 General Availability https://struts.apache.org/announce-2023?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118#a20231207-1
18/12/2023 11:21:46
QRCode
archive.org

7 December 2023 - Apache Struts version 6.3.0.2 General Availability

The Apache Struts group is pleased to announce that Apache Struts version 6.3.0.2 is available as a “General Availability” release. The GA designation is our highest quality grade.

The Apache Struts is an elegant, extensible framework for creating enterprise-ready Java web applications. The framework has been designed to streamline the full development cycle, from building, to deploying, to maintaining applications over time.

This version addresses a potential security vulnerability identified as CVE-2023-50164 and described in S2-066 - please read the mentioned security bulletins for more details. This is a drop-in replacement and upgrade should be straightforward.

apache.org EN 2023 CVE-2023-50164 Apache Struts annonce Vulnerability
Ukrainian cellular and Internet still out, 1 day after suspected Russian cyberattack | Ars Technica https://arstechnica.com/security/2023/12/ukrainian-cells-and-internet-still-out-1-day-after-suspected-russian-cyberattack/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
18/12/2023 11:20:12
QRCode
archive.org
thumbnail

Hackers tied to Russian military take responsibility for hack on Ukraine's biggest provider.

arstechnica EN 2023 Russia-Ukraine-war Russia cellular Ukraine Kyivstar
Rhadamanthys v0.5.0 - a deep dive into the stealer’s components https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/
18/12/2023 11:04:16
QRCode
archive.org
thumbnail
  • The Rhadamanthys stealer is a multi-layer malware, sold on the black market, and frequently updated. Recently the author released a new major version, 0.5.0.
  • In the new version, the malware expands its stealing capabilities and also introduces some general-purpose spying functions.
  • A new plugin system makes the malware expandable for specific distributor needs.
  • The custom executable formats, used for modules, are unchanged since our last publication (XS1 and XS2 formats are still in distribution).
  • Check Point Research (CPR) provides a comprehensive review of the agent modules, presenting their capabilities and implementation, with a focus on how the stealer components are loaded and how they work.
checkpoint EN 2023 Rhadamanthys stealer malware analysis
page 5 / 59
4845 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn