Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 50 / 51
1012 résultats taggé 2025  ✕
IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader https://www.kelacyber.com/blog/intelbroker-unmasked-kelas-in-depth-analysis-of-a-cybercrime-leader/
15/01/2025 21:30:25
QRCode
archive.org
thumbnail

Introduction In the ever-evolving world of cybercrime, IntelBroker has emerged as one of its most prominent figures. Known for his high-profile breaches, IntelBroker’s actions have shaken both corporations and government entities alike. At KELA, our deep dive into his online presence has revealed valuable insights, with OSINT traces playing a pivotal role in uncovering his […]

kelacyber EN 2025 Analysis IntelBroker Unmasked
Luxembourg government websites knocked offline in latest cyberattack | Luxembourg Times https://www.luxtimes.lu/luxembourg/luxembourg-government-websites-knocked-offline-in-latest-cyberattack/33948495.html
15/01/2025 21:27:44
QRCode
archive.org
thumbnail

Several websites were inaccessible for a two-hour period on Friday afternoon

luxtimes EN 2025 DDoS cyberattack Luxembourg government
Cyberhaven Incident https://www.extensiontotal.com/cyberhaven-incident-live
15/01/2025 08:25:52
QRCode
archive.org

Stay updated on the latest developments of the Chrome Web Store incident involving Cyberhaven's compromised extension. Follow live updates, detailed analysis, impacted extensions, and expert recommendations for safeguarding your organization against similar attacks

extensiontotal EN 2025 Extensions Chrome-extension compromised hijacked list Cyberhaven
Telefonica Breach Exposes Jira Tickets, Customer Data https://www.darkreading.com/cyberattacks-data-breaches/telefonica-breach-exposes-jira-tickets-customer-data?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
15/01/2025 07:39:06
QRCode
archive.org
thumbnail

The Hellcat ransomware group has stolen roughly 5,000 documents, potentially containing confidential information, from the telecom giant's internal database.

darkreading EN 2025 Data-Breaches Telefonica Hellcat ransomware
Victime d'une cyberattaque début décembre, VidyMed a restauré les données ciblées (update) https://www.ictjournal.ch/news/2025-01-14/victime-dune-cyberattaque-debut-decembre-vidymed-a-restaure-les-donnees-ciblees
14/01/2025 22:32:36
QRCode
archive.org
thumbnail

Ciblée par une cyberattaque début décembre, VidyMed avait directement coupé l’accès aux systèmes pour contenir l’im

ictjournal FR CH Suisse 2025 Vidymed ransomware cyberattaque restauration données
Cracking the Code: How Banshee Stealer Targets macOS Users https://blog.checkpoint.com/research/cracking-the-code-how-banshee-stealer-targets-macos-users/
13/01/2025 21:02:34
QRCode
archive.org
thumbnail

Executive Summary: Since September, Check Point Research (CPR) has been monitoring a new version of the Banshee macOS Stealer, a malware that steals

checkpoint EN 2025 banshee malware macOS analysis
Ransomware abuses Amazon AWS feature to encrypt S3 buckets https://www.bleepingcomputer.com/news/security/ransomware-abuses-amazon-aws-feature-to-encrypt-s3-buckets/
13/01/2025 20:12:07
QRCode
archive.org
thumbnail

A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.

bleepingcomputer EN 2025 Encryption Ransomware Computer S3 Amazon AES Security AWS
UK domain giant Nominet confirms cybersecurity incident linked to Ivanti VPN hacks | TechCrunch https://techcrunch.com/2025/01/13/uk-domain-giant-nominet-confirms-cybersecurity-incident-linked-to-ivanti-vpn-hacks/
13/01/2025 13:25:29
QRCode
archive.org
thumbnail

Nominet, the U.K. domain registry that maintains .co.uk domains, has experienced a cybersecurity incident that it confirmed is linked to the recent

techcrunch EN 2025 UK incident Ivanti Nominet
Scholastic Hack: Furry Finds 8 Million People Exposed https://www.dailydot.com/debug/furry-hacks-scholastic-8-million-records-stolen/
13/01/2025 08:45:58
QRCode
archive.org
thumbnail

Scholastic hack: A furry breached the education company Scholastic this month and stole data on 8 million people, the Daily Dot has learned.

dailydot EN 2025 Scholastic Hack Data-Breach
Industrial networking manufacturer Moxa reports 'critical' router bugs https://cyberscoop.com/industrial-networking-manufacturer-moxa-reports-critical-router-bugs/
12/01/2025 21:13:47
QRCode
archive.org
thumbnail

Firmware in cellular routers, secure routers and network security appliances made by Moxa are vulnerable to a pair of high severity bugs.

cyberscoop EN 2025 vulnerability Firmware Moxa iot CVE-2024-9138 CVE-2024-9140
Backdooring Your Backdoors - Another $20 Domain, More Governments https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/
12/01/2025 21:07:29
QRCode
archive.org
thumbnail

After the excitement of our .MOBI research, we were left twiddling our thumbs. As you may recall, in 2024, we demonstrated the impact of an unregistered domain when we subverted the TLS/SSL CA process for verifying domain ownership to give ourselves the ability to issue valid and trusted TLS/

watchtowr EN 2025 backdoor infrastructure abandoned access analysis hack research hackback
Inside FireScam : An Information Stealer with Spyware Capabilities https://www.cyfirma.com/research/inside-firescam-an-information-stealer-with-spyware-capabilities/
12/01/2025 21:05:08
QRCode
archive.org
thumbnail
  • FireScam is an information stealing malware with spyware capabilities.
    It is distributed as a fake ‘Telegram Premium’ APK via a phishing website hosted on the GitHub.io domain, mimicking the RuStore app store.
  • The phishing website delivers a dropper that installs the FireScam malware disguised as the Telegram Premium application.
  • The malware exfiltrates sensitive data, including notifications, messages, and other app data, to a Firebase Realtime Database endpoint.
  • FireScam monitors device activities such as screen state changes, e-commerce transactions, clipboard activity, and user engagement to gather valuable information covertly.
  • Captures notifications across various apps, including system apps, to potentially steal sensitive information and track user activities.
  • It employs obfuscation techniques to hide its intent and evade detection by security tools and researchers.
  • FireScam performs checks to identify if it is running in an analysis or virtualized environment.
  • The malware leverages Firebase for command-and-control communication, data storage, and to deliver additional malicious payloads.
  • Exfiltrated data is temporarily stored in the Firebase Realtime Database, filtered for valuable content, and later removed.
  • The Firebase database reveals potential Telegram IDs linked to the threat actors and contains URLs to other malware specimens hosted on the phishing site.
  • By exploiting the popularity of messaging apps and other widely used applications, FireScam poses a significant threat to individuals and organizations worldwide.
cyfirma EN 2025 FireScam Telegram Premium analysis fake apk android malware
“Can you try a game I made?” Fake game sites lead to information stealers https://www.malwarebytes.com/blog/news/2025/01/can-you-try-a-game-i-made-fake-game-sites-lead-to-information-stealers
12/01/2025 21:02:28
QRCode
archive.org
thumbnail

Invitations to try a beta lead to a fake game website where victims will get an information stealer instead of the promised game

malwarebytes EN 2025 Fake game sites stealers Nova Ageo Stealer
Telegram hands over data on thousands of users to US law enforcement https://www.bleepingcomputer.com/news/legal/telegram-hands-over-data-on-thousands-of-users-to-us-law-enforcement/
12/01/2025 20:58:46
QRCode
archive.org
thumbnail

Telegram reveals that the communications platform has fulfilled 900 U.S. government requests, sharing the phone number or IP address information of 2,253 users with law enforcement.

bleepingcomputer EN 2025 Cybercrime Law-Enforcement Legal Privacy Telegram Transparency User-Data
Microsoft moves to disrupt hacking-as-a-service scheme that’s bypassing AI safety measures https://cyberscoop.com/microsoft-generative-ai-lawsuit-hacking/
12/01/2025 20:55:44
QRCode
archive.org
thumbnail

The defendants used stolen API keys to gain access to devices and accounts with Microsoft’s Azure OpenAI service, which they then used to generate “thousands” of images that violated content restrictions.

cyberscoop EN 2025 Microsoft hacking-as-a-service stolen API keys images Azure OpenAI
Green Bay Packers' online store hacked to steal credit cards https://www.bleepingcomputer.com/news/security/green-bay-packers-online-store-hacked-to-steal-credit-cards/
12/01/2025 20:54:17
QRCode
archive.org
thumbnail

The Green Bay Packers American football team is notifying fans that a threat actor hacked its official online retail store in October and injected a card skimmer script to steal customers' personal and payment information.

bleepingcomputer EN 2025 Breach Credit-Card Data-Breach Football Green-Bay-Packers MageCart NFL Payment-Information Skimmer USA
UN aviation agency ‘investigating’ security breach after hacker claims theft of personal data https://techcrunch.com/2025/01/07/un-aviation-agency-investigating-security-breach-after-hacker-claims-theft-of-personal-data/
12/01/2025 20:53:08
QRCode
archive.org
thumbnail

ICAO says the incident was allegedly linked to a hacker 'known for targeting international organizations'

techcrunch EN 2025 Investigation ICAO incident aviation
Drones, Exploding Parcels and Sabotage: How Hybrid Tactics Target the West https://www.nytimes.com/2025/01/04/world/europe/nato-attacks-drones-exploding-parcels-hybrid.html?unlocked_article_code=1.oU4.HjSw.lzu7TZpcAHCn
11/01/2025 14:58:30
QRCode
archive.org

Russia and other hostile states have become increasingly brazen in adopting “gray zone” attacks against Europe and the United States, leaving defense officials with a dilemma: How to respond?

nytimes EN 2025 Drones Sabotage Hybrid-War EU US NATO gray-zone
Panne des systèmes informatiques de la Confédération, en raison d'une attaque DDoS https://www.ncsc.admin.ch/ncsc/fr/home/aktuell/im-fokus/2025/ddos-2024-10-01.html
11/01/2025 11:58:53
QRCode
archive.org

Vendredi matin 10 janvier, l’administration fédérale a été perturbée pendant environ 45 minutes par une panne des systèmes informatiques, en raison d’une attaque DDoS. La téléphonie, Outlook, différents sites Internet de la Confédération ainsi que des applications spécialisées ont entre autres été affectés. Les contre-mesures ont permis de stabiliser la situation.

OFCS Govcert FR 2025 DDoS Panne
Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit https://www.trendmicro.com/en_us/research/25/a/information-stealer-masquerades-as-ldapnightmare-poc-exploit.html
09/01/2025 16:45:09
QRCode
archive.org
thumbnail

In December 2024, two critical vulnerabilities in Microsoft's Windows Lightweight Directory Access Protocol (LDAP) were addressed via Microsoft’s monthly Patch Tuesday release. Both vulnerabilities were deemed as highly significant due to the widespread use of LDAP in Windows environments:

CVE-2024-49112: A remote code execution (RCE) bug that attackers can exploit by sending specially crafted LDAP requests, allowing them to execute arbitrary code on the target system.
CVE-2024-49113: A denial-of-service (DoS) vulnerability that can be exploited to crash the LDAP service, leading to service disruptions.
In this blog entry, we discuss a fake proof-of-concept (PoC) exploit for CVE-2024-49113 (aka LDAPNightmare) designed to lure security researchers into downloading and executing information-stealing malware.

trendmicro EN 2025 malware Stealer research LDAPNightmare fake PoC CVE-2024-49113
page 50 / 51
4896 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn