Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 56 / 234
Uncovering Apple Vulnerabilities: The diskarbitrationd and storagekitd Audit Story Part 1 https://www.kandji.io/blog/macos-audit-story-part1
13/11/2024 09:15:02
QRCode
archive.org
thumbnail

Kandji's Threat Research team performed an audit on the macOS diskarbitrationd & storagekitd system daemons, uncovering several (now fixed) vulnerabilities

kandji EN 2024 research macOS diskarbitrationd audit storagekitd vulnerabilities
How Italy became an unexpected spyware hub https://therecord.media/how-italy-became-an-unexpected-spyware-hub
12/11/2024 23:24:37
QRCode
archive.org
thumbnail

Italy is home to six major spyware vendors and one supplier, with many smaller and harder-to-track enterprises emerging all the time, experts say.

therecord.media EN 2024 italy spyware hub supplier
VEEAM exploit seen used again with a new ransomware: “Frag https://news.sophos.com/en-us/2024/11/08/veeam-exploit-seen-used-again-with-a-new-ransomware-frag/
11/11/2024 22:39:33
QRCode
archive.org
thumbnail

Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities of this threat cluster, which recently…

sophos EN 2024 VEEAM ransomware Frag CVE-2024-40711
Life on a crooked RedLine: Analyzing the infamous infostealer’s backend https://www.welivesecurity.com/en/eset-research/life-crooked-redline-analyzing-infamous-infostealers-backend/
11/11/2024 22:38:18
QRCode
archive.org

Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules.

welivesecurity EN 2024 analysis RedLine infostealer backend
D-Link won’t fix critical flaw affecting 60,000 older NAS devices https://www.bleepingcomputer.com/news/security/d-link-wont-fix-critical-flaw-affecting-60-000-older-nas-devices/
11/11/2024 12:03:58
QRCode
archive.org
thumbnail

More than 60,000 D-Link network-attached storage devices that have reached end-of-life are vulnerable to a command injection vulnerability with a publicly available exploit.

bleepingcomputer EN 2024 Command-Injection D-Link Exploit Hardware NAS PoC Proof-of-Concept Security InfoSec Computer-Security
Cybercriminals impersonate OpenAI in large-scale phishing attack https://blog.barracuda.com/2024/10/31/impersonate-openai-steal-data
11/11/2024 11:36:47
QRCode
archive.org

Since the launch of ChatGPT, OpenAI has sparked significant interest among both businesses and cybercriminals. While companies are increasingly concerned about whether their existing cybersecurity measures can adequately defend against threats curated with generative AI tools, attackers are finding new ways to exploit them. From crafting convincing phishing campaigns to deploying advanced credential harvesting and malware delivery methods, cybercriminals are using AI to target end users and capitalize on potential vulnerabilities.

Barracuda threat researchers recently uncovered a large-scale OpenAI impersonation campaign targeting businesses worldwide. Attackers targeted their victims with a well-known tactic — they impersonated OpenAI with an urgent message requesting updated payment information to process a monthly subscription.

barracuda EN 2024 phishing ChatGPT OpenAI large-scale impersonation
Booking.com Phishers May Leave You With Reservations https://krebsonsecurity.com/2024/11/booking-com-phishers-may-leave-you-with-reservations/
11/11/2024 11:34:16
QRCode
archive.org

A number of cybercriminal innovations are making it easier for scammers to cash in on your upcoming travel plans. This story examines a recent spear-phishing campaign that ensued when a California hotel had its booking.com credentials stolen. We'll also explore…

krebsonsecurity EN 2024 Booking.com Phishers Reservations scam
Meet Interlock — The new ransomware targeting FreeBSD servers https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/
11/11/2024 09:13:48
QRCode
archive.org
thumbnail

A relatively new ransomware operation named Interlock attacks organizations worldwide, taking the unusual approach of creating an encryptor to target FreeBSD servers.

bleepingcomputer EN 2024 Data-Leak-Site Encryptor Extortion FreeBSD Interlock Ransomware Security InfoSec Computer-Security
DocuSign's Envelopes API abused to send realistic fake invoices https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/
11/11/2024 09:12:51
QRCode
archive.org
thumbnail

Threat actors are abusing DocuSign's Envelopes API to create and mass-distribute fake invoices that appear genuine, impersonating well-known brands like Norton and PayPal.

bleepingcomputer EN 2024 API DocuSign Invoice Phishing Signature Security InfoSec Computer-Security
Threat Campaign Spreads Winos4.0 Through Game Application https://www.fortinet.com/blog/threat-research/threat-campaign-spreads-winos4-through-game-application
11/11/2024 09:10:49
QRCode
archive.org
thumbnail

FortiGuard Labs reveals a threat actor spreads Winos4.0, infiltrating gaming apps and targeting the education sector. Learn more.

fortinet EN 2024 Campaign Spreads Winos4.0 Game Application
North Korean hackers employ new tactics to compromise crypto-related businesses - Help Net Security https://www.helpnetsecurity.com/2024/11/07/north-korean-crypto-related-phishing/
11/11/2024 09:09:03
QRCode
archive.org
thumbnail

North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware.

helpnetsecurity EN 2024 NorthKorea macOS crypto-related malware phishing
Malicious NPM Packages Target Roblox Users with Data-Stealing Malware https://thehackernews.com/2024/11/malicious-npm-packages-target-roblox.html
11/11/2024 09:07:48
QRCode
archive.org

A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber.

"This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available commodity malware, public platforms like GitHub for hosting malicious executables, and communication channels like Discord and Telegram for C2 operations to bypass traditional security measures," Socket security researcher Kirill Boychenko said in a report shared with The Hacker News.

thehackernews EN 2024 Malicious NPM Packages Roblox
Canadian Suspect Arrested Over Snowflake Customer Breach and Extortion Attacks https://thehackernews.com/2024/11/canadian-suspect-arrested-over.html
11/11/2024 09:06:07
QRCode
archive.org

Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year.

The individual in question, Alexander "Connor" Moucka (aka Judische and Waifu), was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request by the U.S.

thehackernews EN Snowflake Connor Moucka busted arrested Judische Waifu
Microchip Technology Reports $21.4 Million Cost From Ransomware Attack https://www.securityweek.com/microchip-technology-reports-21-4-million-cost-from-ransomware-attack/
11/11/2024 08:57:10
QRCode
archive.org

Microchip Technology (NASDAQ: MCHP) revealed in its latest financial report on Tuesday that expenses related to the recent cybersecurity incident reached $21.4 million.

securityweek EN 2024 Microchip Technology cost ransomware
Nokia says hackers leaked third-party app source code https://www.bleepingcomputer.com/news/security/nokia-says-hackers-leaked-third-party-app-source-code/
11/11/2024 08:50:16
QRCode
archive.org
thumbnail

Nokia's investigation of recent claims of a data breach found that the source code leaked on a hacker forum belongs to a third party and company and customer data has not been impacted.

bleepingcomputer EN 2024 Data-Leak Nokia Source-Code Telecommunications Third-Party-Data-Breach Security InfoSec Computer-Security
New Campaign Uses Remcos RAT to Exploit Victims https://www.fortinet.com/blog/threat-research/new-campaign-uses-remcos-rat-to-exploit-victims
08/11/2024 17:16:39
QRCode
archive.org
thumbnail

See how threat actors have abused Remcos to collect sensitive information from victims and remotely control their computers to perform further malicious acts.

Fortinet EN 2024 research Remcos RAT
BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence https://www.sentinelone.com/labs/bluenoroff-hidden-risk-threat-actor-targets-macs-with-fake-crypto-news-and-novel-persistence/
08/11/2024 15:37:11
QRCode
archive.org
thumbnail

SentinelLabs has observed a suspected DPRK threat actor targeting Crypto-related businesses with novel multi-stage malware.

sentinelone EN 2024 BlueNoroff DPRK Crypto businesses multi-stage malware macOS
Government of Canada orders the wind up of TikTok Technology Canada, Inc. following a national security review under the Investment Canada Act https://www.canada.ca/en/innovation-science-economic-development/news/2024/11/government-of-canada-orders-the-wind-up-of-tiktok-technology-canada-inc-following-a-national-security-review-under-the-investment-canada-act.html
08/11/2024 12:02:46
QRCode
archive.org

“As a result of a multi-step national security review process, which involves rigorous scrutiny by Canada’s national security and intelligence community, the Government of Canada has ordered the wind up of the Canadian business carried on by TikTok Technology Canada, Inc. The government is taking action to address the specific national security risks related to ByteDance Ltd.’s operations in Canada through the establishment of TikTok Technology Canada, Inc. The decision was based on the information and evidence collected over the course of the review and on the advice of Canada’s security and intelligence community and other government partners.

Canada EN 2024 order TikTok national-security ByteDance Government intelligence wind-up
Gootloader’s Pivot from SEO Poisoning: PDF Converters Become the New Infection Vector https://gootloader.wordpress.com/2024/11/07/gootloaders-pivot-from-seo-poisoning-pdf-converters-become-the-new-infection-vector/
08/11/2024 08:21:08
QRCode
archive.org
thumbnail

Three weeks ago, Gootloader samples suddenly dried up. This has happened before, so I switched VPNs and tried new locations—coffee shops, friends’, and family’s Wi-Fi networks—but still couldn’t re…

gootloader.wordpress.com EN 2024 Pivot SEO Gootloader Poisoning PDF Converters
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign https://news.sophos.com/en-us/2024/11/06/bengal-cat-lovers-in-australia-get-psspsspssd-in-google-driven-gootloader-campaign/
07/11/2024 16:39:31
QRCode
archive.org
thumbnail

The Internet is full of cats—and in this case, malware-delivering fake cat websites used for very targeted search engine optimization.

sophos EN 2024 Australia Bengal Google-driven Gootloader
page 56 / 234
4670 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio