Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 56 / 204
4067 résultats taggé EN  ✕
Agence France-Presse says cyberattack targeted IT systems https://therecord.media/afp-cyberattack-targeted-it-systems
02/10/2024 08:04:25
QRCode
archive.org
thumbnail

Agence France-Presse, known by most as AFP, said the attack affected “part of its delivery service to clients.”

therecord.media EN 2024 Agence France-Presse Cyberattack
Crucial Texas hospital system turning ambulances away after ransomware attack https://therecord.media/crucial-hospital-texas-ransomware-attackc
02/10/2024 08:01:03
QRCode
archive.org
thumbnail

One of the largest hospitals in West Texas has been forced to divert ambulances after a ransomware attack shut down many of its systems last Thursday.

The University Medical Center Health System in Lubbock confirmed on Friday that IT outages are being caused by a ransomware incident.

therecord.media EN 2024 US Texas Ransomware Health Healthcare
LockBit power cut: four new arrests and financial sanctions against affiliates | Europol https://www.europol.europa.eu/media-press/newsroom/news/lockbit-power-cut-four-new-arrests-and-financial-sanctions-against-affiliates
01/10/2024 21:40:21
QRCode
archive.org
thumbnail

These are some of the results of the third phase of Operation Cronos, a long-running collective effort of law enforcement authorities from 12 countries, Europol and Eurojust, who joined forces to effectively disrupt at all levels the criminal operations of the LockBit ransomware group. These actions follow the massive disruption of LockBit infrastructure in February 2024, as well as the large series of sanctions and operational actions that took place against LockBit administrators in May and subsequent months.

Between 2021 and 2023, LockBit was the most widely employed ransomware variant globally with a notable number of victims claimed on its data leak site. Lockbit operated on the ransom as a service model. The core group sold access to affiliates and received portions of the collected ransom payments. Entities deploying LockBit ransomware attacks had targeted organisations of various sizes spanning critical infrastructure sectors such as financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing and transportation. Reflecting the considerable number of independent affiliates involved, LockBit ransomware attacks display significant variation in observed tactics, techniques and procedures.
#2024 #EN #Eurojust #LockBit #busted #disrupt #europol

EN europol Eurojust LockBit 2024 busted disrupt
Critical flaw in NVIDIA Container Toolkit allows full host takeover https://www.bleepingcomputer.com/news/security/critical-flaw-in-nvidia-container-toolkit-allows-full-host-takeover/
01/10/2024 11:16:27
QRCode
archive.org
thumbnail

A critical vulnerability in NVIDIA Container Toolkit impacts all AI applications in a cloud or on-premise environment that rely on it to access GPU resources.

bleepingcomputer EN 2024 AI Artificial-Intelligence Cloud Cloud-Security Container-Escape NVIDIA Vulnerability Security InfoSec Computer-Security
Storm-0501: Ransomware attacks expanding to hybrid cloud environments https://www.microsoft.com/en-us/security/blog/2024/09/26/storm-0501-ransomware-attacks-expanding-to-hybrid-cloud-environments/
01/10/2024 11:14:18
QRCode
archive.org
thumbnail

Microsoft has observed the threat actor tracked as Storm-0501 launching a multi-staged attack where they compromised hybrid cloud environments and performed lateral movement from on-premises to cloud environment, leading to data exfiltration, credential theft, tampering, persistent backdoor access, and ransomware deployment. The said attack targeted multiple sectors in the United States, including government, manufacturing, transportation, and law enforcement. Storm-0501 is a financially motivated cybercriminal group that uses commodity and open-source tools to conduct ransomware operations.

microsoft EN 2024 Storm-0501 Embargo hybrid-cloud cloud Ransomware
CVE-2024-8353 (CVSS 10): Critical GiveWP Flaw, 100k WordPress Sites at Risk https://securityonline.info/cve-2024-8353-critical-givewp-flaw-100k-wordpress-sites-at-risk/
30/09/2024 22:42:52
QRCode
archive.org
thumbnail

Discover the details of the critical vulnerability CVE-2024-8353 in GiveWP donation plugin for WordPress and the potential impact on your website.

securityonline EN 204 CVE-2024-8353 GiveWP WP WordPress
Inside the Dragon: DragonForce Ransomware Group https://www.group-ib.com/blog/dragonforce-ransomware/
30/09/2024 21:24:58
QRCode
archive.org

in light of the escalating frequency and complexity of ransomware attacks, are security leaders confident in their organization’s defenses? According to Group-IB’s Hi-Tech Crime Trends 2023/2024 Report, ransomware will have an increasingly significant impact in 2024 and beyond. Key trends driving this include the expansion of the Ransomware-as-a-Service (RaaS) market, the proliferation of stolen data on Dedicated Leak Sites (DLS), and a rise in affiliate programs.

group-ib EN 2024 DragonForce Ransomware Ransomware-as-a-Service
Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware https://thedfirreport.com/2024/09/30/nitrogen-campaign-drops-sliver-and-ends-with-blackcat-ransomware/
30/09/2024 13:56:46
QRCode
archive.org
thumbnail

In November 2023, we identified a BlackCat ransomware intrusion started by Nitrogen malware hosted on a website impersonating Advanced IP Scanner.
Nitrogen was leveraged to deploy Sliver and Cobalt Strike beacons on the beachhead host and perform further malicious actions. The two post-exploitation frameworks were loaded in memory through Python scripts.
After obtaining initial access and establishing further command and control connections, the threat actor enumerated the compromised network with the use of PowerSploit, SharpHound, and native Windows utilities. Impacket was employed to move laterally, after harvesting domain credentials.
The threat actor deployed an opensource backup tool call Restic on a file server to exfiltrate share data to a remote server.
Eight days after initial access the threat actor modified a privileged user password and deployed BlackCat ransomware across the domain using PsExec to execute a batch script.
Six rules were added to our Private Ruleset related to this intrusion.

thedfirreport EN 2024 BlackCat ransomware Advanced-IP-Scanner
Banks: Zurich asset manager hit by massive hacker attack https://www.bluewin.ch/en/news/zurich-asset-manager-hit-by-massive-hacker-attack-2384122.html
29/09/2024 19:25:07
QRCode
archive.org
thumbnail

Extensive data leak in Switzerland: The Zurich-based asset manager Boreal Capital Management has been attacked by a hacker group, with data from around 700 current and former clients being stolen and published, according to media reports.

bluewin EN 2024 data-leak data-breach Switzerland Zurich-based Boreal Capital Management Darknet
Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments | Wiz Blog https://www.wiz.io/blog/wiz-research-critical-nvidia-ai-vulnerability
29/09/2024 19:11:38
QRCode
archive.org
thumbnail

Critical severity vulnerability CVE-2024-0132 affecting NVIDIA Container Toolkit and GPU Operator presents high risk to AI workloads and environments.

wiz EN 2024 Nvidia CVE-2024-0132 Container AI-workloads Toolkit GPU-Operator vulnerability GPU
U.S. Indicts 2 Top Russian Hackers, Sanctions Cryptex https://krebsonsecurity.com/2024/09/u-s-indicts-2-top-russian-hackers-sanctions-cryptex/
29/09/2024 19:01:56
QRCode
archive.org

The United States today unveiled sanctions and indictments against the alleged proprietor of Joker's Stash, a now-defunct cybercrime store that peddled tens of millions of payment cards stolen in some of the largest data breaches of the past decade. The…

krebsonsecurity EN 2024 UK Joker-Stash cybercrime Taleon cryptex busted
CVE-2024-36435 Deep-Dive: The Year’s Most Critical BMC Security Flaw https://www.binarly.io/blog/cve-2024-36435-deep-dive-the-years-most-critical-bmc-security-flaw
29/09/2024 18:56:35
QRCode
archive.org

The Binarly REsearch team has consistently uncovered security vulnerabilities in the Baseboard Management Controller (BMC) firmware -- a critical component of modern data center infrastructure. These vulnerabilities can be exploited remotely by threat actors, posing significant risk to enterprises.

In a previous report, “Old But Gold: The Underestimated Potency of Decades-Old Attacks on BMC Security,” we documented the BMC architecture in detail and showed that it is still possible to find classes of vulnerabilities known from the early 2000s.

binarly EN 2024 BMC firmware CVE-2024-36435 flow Supermicro research
Hacker behind Snowflake customer data breaches remains active https://cyberscoop.com/snowflake-hacker-judische-labscon-2024/
29/09/2024 18:42:56
QRCode
archive.org
thumbnail

The hacker, known as Judische, has extorted $2.7 million as part of the attacks on Snowflake customers.

cyberscoop EN 2024 Snowflake Judische SiegedSec The-Comm
Deloitte Says No Threat to Sensitive Data After Hacker Claims Server Breach https://www.securityweek.com/deloitte-says-no-threat-to-sensitive-data-after-hacker-claims-server-breach/
29/09/2024 18:39:32
QRCode
archive.org

A notorious hacker has announced the theft of data from an improperly protected server allegedly belonging to Deloitte.

The hacker known as IntelBroker announced late last week on the BreachForums cybercrime forum the availability of “internal communications” obtained from Deloitte, specifically an internet-exposed Apache Solr server that was accessible with default credentials.

securityweek EN 2024 Deloitte IntelBroker data-breach exposed Apache Solr
Hacking Kia: Remotely Controlling Cars With Just a License Plate https://samcurry.net/hacking-kia
29/09/2024 09:20:38
QRCode
archive.org
thumbnail

On June 11th, 2024, we discovered a set of vulnerabilities in Kia vehicles that allowed remote control over key functions using only a license plate. These attacks could be executed remotely on any hardware-equipped vehicle in about 30 seconds, regardless of whether it had an active Kia Connect subscription.

Additionally, an attacker could silently obtain personal information, including the victim's name, phone number, email address, and physical address. This would allow the attacker to add themselves as an invisible second user on the victim's vehicle without their knowledge.

samcurry EN 2024 iot Kia vehicles license plate Kia_connect remote-control car
Meta fined $102 million for storing passwords in plain text https://www.engadget.com/big-tech/meta-fined-102-million-for-storing-passwords-in-plain-text-110049679.html?guccounter=1
28/09/2024 17:24:46
QRCode
archive.org
thumbnail

The Irish Data Protection Commission (DPC) has fined Meta €91 million for a 2019 incident wherein the company stored millions of Facebook and Instagram passwords in plain text.

engadget EN 2024 Ireland DPC 2019 Instagram-passwords readable-format plain-text security-breach Meta
A Member of SiegedSec Group Arrested by FBI https://dailydarkweb.net/member-of-siegedsec-group-arrested-by-fbi/
28/09/2024 10:23:30
QRCode
archive.org

A key member of the notorious hacker group SiegedSec was arrested today by federal authorities. The arrest came just hours after the hacker published a provocative manifesto titled “The Conscience of a Catgirl.” The document offers sharp criticisms of governments, corporations, and the state of modern surveillance, right before the hacker was taken into custody.

dailydarkweb EN 2024 busted SiegedSec FBI judische
CrowdStrike Overhauls Testing and Rollout Procedures to Avoid System Crashes https://www.securityweek.com/crowdstrike-overhauls-testing-and-rollout-procedures-to-avoid-bsod-crashes/?is=09685296f9ea1fb2ee0963f2febaeb3a55d8fb1eddbb11ed4bd2da49d711f2c7
28/09/2024 10:10:30
QRCode
archive.org

CrowdStrike says it has revamped several testing, validation, and update rollout processes to prevent a repeat of the embarrassing July outage that caused widespread disruption on Windows systems around the world.

securityweek EN 2024 CrowdStrike revamped testing incident validation System Crashes
OpenPLC OpenPLC_v3 OpenPLC Runtime EtherNet/IP parser stack-based buffer overflow vulnerability https://talosintelligence.com/vulnerability_reports/TALOS-2024-2005?is=09685296f9ea1fb2ee0963f2febaeb3a55d8fb1eddbb11ed4bd2da49d711f2c7
28/09/2024 10:09:51
QRCode
archive.org

A stack-based buffer overflow vulnerability exists in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC _v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted EtherNet/IP request can lead to remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.

talosintelligence EN 2024 vulnerability report OpenPLC CVE-2024-34026
10 security bugs put fuel storage tanks at risk of attacks https://www.theregister.com/2024/09/24/security_bugs_fuel_storage_tanks/?is=09685296f9ea1fb2ee0963f2febaeb3a55d8fb1eddbb11ed4bd2da49d711f2c7
28/09/2024 10:08:49
QRCode
archive.org
thumbnail

Tens of thousands of fuel storage tanks in critical infrastructure facilities remain vulnerable to zero-day attacks due to buggy Automatic Tank Gauge systems from multiple vendors, say infosec researchers.

Automatic Tank Gauges (ATGs) are used to monitor fuel levels in storage tanks and ensure that the tanks don't leak. The ten CVEs disclosed today were found in products from several different vendors: Dover Fueling Solutions (DFS), OPW Fuel Management Systems (owned by DFS), Franklin Fueling Systems, and OMNTEC.

theregister EN 2024 CVE-2024-45066 CVE-2024-43693 ATG fuel storage tanks SFS OMNTEC
page 56 / 204
4638 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio