Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 51 / 229
Visionaries Have Democratised Remote Network Access - Citrix Virtual Apps and Desktops (CVE Unknown) https://labs.watchtowr.com/visionaries-at-citrix-have-democratised-remote-network-access-citrix-virtual-apps-and-desktops-cve-unknown/
13/11/2024 10:53:50
QRCode
archive.org
thumbnail

This one is a privesc bug yielding SYSTEM privileges for any VDI user, which is actually a lot worse than it might initially sound since that’s SYSTEM privileges on the server that hosts all the applications and access is ‘by design’ - allowing an attacker to impersonate any user (including administrators) and monitor behaviour, connectivity.

watchtowr EN Citrix Virtual Apps bug VDI exploit
Threat Hunting Case Study: Uncovering Turla | Intel 471 https://intel471.com/blog/threat-hunting-case-study-uncovering-turla
13/11/2024 09:43:50
QRCode
archive.org
thumbnail

Russia has long been a military power, a nuclear power, a space power and in recent decades, a cyber power. It has been one of the most capable cyber actors, going back to the late 1990s when Russian state hackers stole classified documents and military research from U.S. universities and government agencies. The stolen documents, if stacked on top of one another, would have been taller than the Washington Monument (555 feet or 169 meters). These incidents, dubbed “Moonlight Maze” as described in Thomas Rid’s book “Rise of the Machines,” marked one of the world’s first advanced persistent threat (APT) attacks. Russia’s intelligence and security agencies continue to operate highly skilled groups of offensive attackers. Those APT groups are spread across its intelligence and security agencies and the Ministry of Defense. They engage in a broad range of cyber and influence operations tied to Russia’s strategic objectives. These include exploiting adversary systems, establishing footholds, conducting cyber espionage operations and running disinformation and misinformation campaigns designed to undermine Western narratives. One of the most effective and long-running Russian groups is Turla, a unit known as Center 16 housed within Russia’s Federal Security Service, or FSB. Researchers found that this group, which is active today, may have been connected with Moonlight Maze.

intel471 EN 2024 Turla case-study analysis APT Russia
“Une curiosité malsaine pour le hacking” : au procès du pirate qu ... https://www.zdnet.fr/actualites/une-curiosite-malsaine-pour-le-hacking-au-proces-du-pirate-qui-setait-attaque-au-pass-navigo-401050.htm
13/11/2024 09:42:28
QRCode
archive.org
thumbnail

Etudiant en informatique, fasciné par l’univers des cybercriminels, il est accusé d’avoir lancé des attaques par bourrage d’identifiants à l’automne 2023. Récit d'audience.

zdnet.fr FR 2024 Cybercriminalité contre Île-de-France Mobilités Selkis hacking
2023 Top Routinely Exploited Vulnerabilities | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a
13/11/2024 09:39:18
QRCode
archive.org

In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority targets. In 2023, the majority of the most frequently exploited vulnerabilities were initially exploited as a zero-day, which is an increase from 2022, when less than half of the top exploited vulnerabilities were exploited as a zero-day.

Malicious cyber actors continue to have the most success exploiting vulnerabilities within two years after public disclosure of the vulnerability. The utility of these vulnerabilities declines over time as more systems are patched or replaced. Malicious cyber actors find less utility from zero-day exploits when international cybersecurity efforts reduce the lifespan of zero-day vulnerabilities.

cisa EN 2024 zero-day vulnerabilities 2023 Routinely-Exploited
CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits https://research.checkpoint.com/2024/massive-phishing-campaign-deploys-latest-rhadamanthys-version/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
13/11/2024 09:28:58
QRCode
archive.org
thumbnail
  • Check Point Research is tracking an ongoing, large scale and sophisticated phishing campaign deploying the newest version of the Rhadamanthys stealer (0.7). We dubbed this campaign CopyRh(ight)adamantys.
  • This campaign utilizes a copyright infringement theme to target various regions, including the United States, Europe, East Asia, and South America.
  • The campaign impersonates dozens of companies, while each email is sent to a specific targeted entity from a different Gmail account, adapting the impersonated company and the language per targeted entity. Almost 70% of the impersonated companies are from Entertainment /Media and Technology/Software sectors.
  • Analysis of the lures and targets in this campaign suggests the threat actor uses automation for lures distribution. Due to the scale of the campaign and the variety of the lures and sender emails, there is a possibility that the threat actor also utilized AI tools.
  • One of the main updates in the Rhadamanthys stealer version according to claims by the author, is AI-powered text recognition. However, we discovered that the component introduced by Rhadamanthys does not incorporate any of the modern AI engines, but instead uses much older classic machine learning, typical for OCR software.
checkpoint EN 2024 phishing Rhadamantys analysis Property Intellectual Infringement Baits
Uncovering Apple Vulnerabilities: The diskarbitrationd and storagekitd Audit Story Part 1 https://www.kandji.io/blog/macos-audit-story-part1
13/11/2024 09:15:02
QRCode
archive.org
thumbnail

Kandji's Threat Research team performed an audit on the macOS diskarbitrationd & storagekitd system daemons, uncovering several (now fixed) vulnerabilities

kandji EN 2024 research macOS diskarbitrationd audit storagekitd vulnerabilities
How Italy became an unexpected spyware hub https://therecord.media/how-italy-became-an-unexpected-spyware-hub
12/11/2024 23:24:37
QRCode
archive.org
thumbnail

Italy is home to six major spyware vendors and one supplier, with many smaller and harder-to-track enterprises emerging all the time, experts say.

therecord.media EN 2024 italy spyware hub supplier
VEEAM exploit seen used again with a new ransomware: “Frag https://news.sophos.com/en-us/2024/11/08/veeam-exploit-seen-used-again-with-a-new-ransomware-frag/
11/11/2024 22:39:33
QRCode
archive.org
thumbnail

Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities of this threat cluster, which recently…

sophos EN 2024 VEEAM ransomware Frag CVE-2024-40711
Life on a crooked RedLine: Analyzing the infamous infostealer’s backend https://www.welivesecurity.com/en/eset-research/life-crooked-redline-analyzing-infamous-infostealers-backend/
11/11/2024 22:38:18
QRCode
archive.org

Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules.

welivesecurity EN 2024 analysis RedLine infostealer backend
D-Link won’t fix critical flaw affecting 60,000 older NAS devices https://www.bleepingcomputer.com/news/security/d-link-wont-fix-critical-flaw-affecting-60-000-older-nas-devices/
11/11/2024 12:03:58
QRCode
archive.org
thumbnail

More than 60,000 D-Link network-attached storage devices that have reached end-of-life are vulnerable to a command injection vulnerability with a publicly available exploit.

bleepingcomputer EN 2024 Command-Injection D-Link Exploit Hardware NAS PoC Proof-of-Concept Security InfoSec Computer-Security
Cybercriminals impersonate OpenAI in large-scale phishing attack https://blog.barracuda.com/2024/10/31/impersonate-openai-steal-data
11/11/2024 11:36:47
QRCode
archive.org

Since the launch of ChatGPT, OpenAI has sparked significant interest among both businesses and cybercriminals. While companies are increasingly concerned about whether their existing cybersecurity measures can adequately defend against threats curated with generative AI tools, attackers are finding new ways to exploit them. From crafting convincing phishing campaigns to deploying advanced credential harvesting and malware delivery methods, cybercriminals are using AI to target end users and capitalize on potential vulnerabilities.

Barracuda threat researchers recently uncovered a large-scale OpenAI impersonation campaign targeting businesses worldwide. Attackers targeted their victims with a well-known tactic — they impersonated OpenAI with an urgent message requesting updated payment information to process a monthly subscription.

barracuda EN 2024 phishing ChatGPT OpenAI large-scale impersonation
Booking.com Phishers May Leave You With Reservations https://krebsonsecurity.com/2024/11/booking-com-phishers-may-leave-you-with-reservations/
11/11/2024 11:34:16
QRCode
archive.org

A number of cybercriminal innovations are making it easier for scammers to cash in on your upcoming travel plans. This story examines a recent spear-phishing campaign that ensued when a California hotel had its booking.com credentials stolen. We'll also explore…

krebsonsecurity EN 2024 Booking.com Phishers Reservations scam
Meet Interlock — The new ransomware targeting FreeBSD servers https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/
11/11/2024 09:13:48
QRCode
archive.org
thumbnail

A relatively new ransomware operation named Interlock attacks organizations worldwide, taking the unusual approach of creating an encryptor to target FreeBSD servers.

bleepingcomputer EN 2024 Data-Leak-Site Encryptor Extortion FreeBSD Interlock Ransomware Security InfoSec Computer-Security
DocuSign's Envelopes API abused to send realistic fake invoices https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/
11/11/2024 09:12:51
QRCode
archive.org
thumbnail

Threat actors are abusing DocuSign's Envelopes API to create and mass-distribute fake invoices that appear genuine, impersonating well-known brands like Norton and PayPal.

bleepingcomputer EN 2024 API DocuSign Invoice Phishing Signature Security InfoSec Computer-Security
Threat Campaign Spreads Winos4.0 Through Game Application https://www.fortinet.com/blog/threat-research/threat-campaign-spreads-winos4-through-game-application
11/11/2024 09:10:49
QRCode
archive.org
thumbnail

FortiGuard Labs reveals a threat actor spreads Winos4.0, infiltrating gaming apps and targeting the education sector. Learn more.

fortinet EN 2024 Campaign Spreads Winos4.0 Game Application
North Korean hackers employ new tactics to compromise crypto-related businesses - Help Net Security https://www.helpnetsecurity.com/2024/11/07/north-korean-crypto-related-phishing/
11/11/2024 09:09:03
QRCode
archive.org
thumbnail

North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware.

helpnetsecurity EN 2024 NorthKorea macOS crypto-related malware phishing
Malicious NPM Packages Target Roblox Users with Data-Stealing Malware https://thehackernews.com/2024/11/malicious-npm-packages-target-roblox.html
11/11/2024 09:07:48
QRCode
archive.org

A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber.

"This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available commodity malware, public platforms like GitHub for hosting malicious executables, and communication channels like Discord and Telegram for C2 operations to bypass traditional security measures," Socket security researcher Kirill Boychenko said in a report shared with The Hacker News.

thehackernews EN 2024 Malicious NPM Packages Roblox
Canadian Suspect Arrested Over Snowflake Customer Breach and Extortion Attacks https://thehackernews.com/2024/11/canadian-suspect-arrested-over.html
11/11/2024 09:06:07
QRCode
archive.org

Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year.

The individual in question, Alexander "Connor" Moucka (aka Judische and Waifu), was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request by the U.S.

thehackernews EN Snowflake Connor Moucka busted arrested Judische Waifu
Microchip Technology Reports $21.4 Million Cost From Ransomware Attack https://www.securityweek.com/microchip-technology-reports-21-4-million-cost-from-ransomware-attack/
11/11/2024 08:57:10
QRCode
archive.org

Microchip Technology (NASDAQ: MCHP) revealed in its latest financial report on Tuesday that expenses related to the recent cybersecurity incident reached $21.4 million.

securityweek EN 2024 Microchip Technology cost ransomware
Nokia says hackers leaked third-party app source code https://www.bleepingcomputer.com/news/security/nokia-says-hackers-leaked-third-party-app-source-code/
11/11/2024 08:50:16
QRCode
archive.org
thumbnail

Nokia's investigation of recent claims of a data breach found that the source code leaked on a hacker forum belongs to a third party and company and customer data has not been impacted.

bleepingcomputer EN 2024 Data-Leak Nokia Source-Code Telecommunications Third-Party-Data-Breach Security InfoSec Computer-Security
page 51 / 229
4575 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio