Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 58 / 76
1513 résultats taggé 2024  ✕
Unveiling the Fallout: Operation Cronos' Impact on LockBit Following Landmark Disruption https://www.trendmicro.com/en_us/research/24/d/operation-cronos-aftermath.html
05/04/2024 09:06:03
QRCode
archive.org
thumbnail
  • On Feb. 19, 2024, Operation Cronos, a targeted law enforcement action, caused outages on LockBit-affiliated platforms, significantly disrupting the notorious ransomware group's operations.
  • LockBit’s downtime was quickly followed by a takeover of its leak site by the UK’s National Crime Agency (NCA), spotlighting the concerted international effort against cybercrime.
  • Authorities leveraged the compromised LockBit leak site to distribute information about the group and its operations, announce arrests, sanctions, cryptocurrency seizure, and more. This demonstrated support for affected businesses and cast doubt on LockBit's promises regarding data deletion post-ransom payment — emphasizing that paying ransoms is not the best course of action.
  • Trend Micro analyzed LockBit-NG-Dev, an in-development version of the ransomware. Key findings indicated a shift to a .NET core, which allows it to be more platform-agnostic and emphasizes the need for new security detection techniques.
  • The leak of LockBit's back-end information offered a glimpse into its internal workings and disclosed affiliate identities and victim data, potentially leading to a drop in trust and collaboration within the cybercriminal network.
  • The sentiments of the cybercrime community to LockBit's disruption ranged from satisfaction to speculation about the group’s future, hinting at the significant impact of the incident on the ransomware-as-a-service (RaaS) industry. Businesses can expect shifts in RaaS tactics and should enhance preparedness against potential reformations of the disrupted group and its affiliates.
  • Contrary to what the group themselves have stated, activities observed post-disruption would indicate that Operation Chronos has a significant impact on the group’s activities.
trendmicro EN 2024 research LockBit Operation-Cronos impact
Ukraine gives award to foreign vigilantes for hacks on Russia https://www.bbc.com/news/technology-68722542
05/04/2024 09:03:55
QRCode
archive.org
thumbnail

The foreign hackers had stolen data from Russian military firms and hacked cameras to spy on troops.

bbc EN 2024 Ukraine foreign-hackers award Russia-Ukraine-war
HTTP/2 CONTINUATION Flood: Technical Details https://nowotarski.info/http2-continuation-flood-technical-details/
05/04/2024 08:50:16
QRCode
archive.org

Deep technical analysis of the CONTINUATION Flood: a class of vulnerabilities within numerous HTTP/2 protocol implementations. In many cases, it poses a more severe threat compared to the Rapid Reset: a single machine (and in certain instances, a mere single TCP connection or a handful of frames) has the potential to disrupt server availability, with consequences ranging from server crashes to substantial performance degradation. Remarkably, requests that constitute an attack are not visible in HTTP access logs. **A simplified security advisory and the list of affected projects can be found in: http2-continuation-flood

nowotarski EN 2024 CONTINUATION-flood HTTP/2 DoS technical-details
Kobold letters https://lutrasecurity.com/en/articles/kobold-letters/
04/04/2024 20:29:04
QRCode
archive.org
thumbnail

Anyone who has had to deal with HTML emails on a technical level has probably reached the point where they wanted to quit their job or just set fire to all the mail clients due to their inconsistent implementations. But HTML emails are not just a source of frustration, they can also be a serious security risk.

lutrasecurity email EN 2024 HTML Kobold-letters
Security Flaw in WP-Members Plugin Leads to Script Injection https://www.securityweek.com/security-flaw-in-wp-members-plugin-leads-to-script-injection/
04/04/2024 19:04:25
QRCode
archive.org

Attackers could exploit a high-severity cross-site Scripting (XSS) vulnerability in the WP-Members Membership WordPress plugin to inject arbitrary scripts into web pages, according to an advisory from security firm Defiant.

securityweek EN 2024 plugin WP Wordpress WP-Members Injection vulnerability
Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks https://www.bleepingcomputer.com/news/security/ivanti-fixes-vpn-gateway-vulnerability-allowing-rce-dos-attacks/#google_vignette
04/04/2024 19:02:02
QRCode
archive.org
thumbnail

IT security software company Ivanti has released patches to fix multiple security vulnerabilities impacting its Connect Secure and Policy Secure gateways.

bleepingcomputer EN 2024 Connect-Secure Denial-of-Service DoS Ivanti Policy-Secure RCE Remote-Code-Execution Security InfoSec Computer-Security
Google sues alleged China crypto app racketeers: Report https://cointelegraph.com/news/google-sues-china-crypto-app-racketeers-report
04/04/2024 18:59:53
QRCode
archive.org

Google’s parent company, Alphabet, has filed a lawsuit against two people based in China for using the company’s platform for scam cryptocurrency apps that amassed over 100,000 downloads.

Alphabet claims that scammers used its platforms, Google Play and YouTube, to upload and advertise fraudulent crypto apps.

cointelegraph EN 2024 China crypto-scammers Alphabet lawsuit pig-butchering
IntelBroker Leaks Alleged National Security Data Tied to US Contractor Acuity Inc. https://www.hackread.com/intelbroker-us-national-security-data-contractor-acuity/
04/04/2024 18:53:00
QRCode
archive.org
thumbnail

The IntelBroker hacker and their affiliates have leaked a trove of sensitive records, which they claim jeopardize the United States national security.

hackread EN 2024 IntelBroker Leaks US Contractor Acuity
North Korea’s Post-Infection Python Payloads – One Night in Norfolk https://norfolkinfosec.com/north-koreas-post-infection-python-payloads/
04/04/2024 13:29:13
QRCode
archive.org

Throughout the past few months, several publications have written about a North Korean threat actor group’s use of NPM packages to deploy malware to developers and other unsuspecting victims. This blog post provides additional details regarding the second and third-stage malware in these attacks, which these publications have only covered in limited detail.

norfolkinfosec EN 2024 NPM packages Phlyum malware North-Korea phyton payloads
A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask https://www.wired.com/story/p4x-north-korea-internet-hacker-identity-reveal/
04/04/2024 13:28:34
QRCode
archive.org
thumbnail

As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to show the US military how it can—and should—adopt his methods.

wired EN 2024 P4x North-Korea Vigilante military attack
Ukrainian cybersecurity official reveals structure of Russian hacker groups https://www.ukrinform.net/rubric-ato/3848343-ukrainian-cybersecurity-official-reveals-structure-of-russian-hacker-groups.html
04/04/2024 13:27:46
QRCode
archive.org
thumbnail

Russian hacker groups are military units with code names that are part of the Main Intelligence Directorate of the General Staff and the Federal Security Service of the Russian Federation. — Ukrinform.

ukrinform EN 2024 Russia-Ukraine-war Russia code-names structure hacker-groups
Exclusive: Hackers stole Russian prisoner database to avenge death of Navalny https://edition.cnn.com/2024/03/31/politics/navalny-russian-prisoner-database-hack/index.html?ref=news.risky.biz
04/04/2024 13:24:32
QRCode
archive.org
thumbnail

Within hours of opposition leader Alexey Navalny’s death in February in a Russian prison, a group of anti-Kremlin hackers went looking for revenge.

cnn 2024 EN anti-Kremlin hackers stole prisoner database Russia Data-Breach
DJI Mavic 3 Drone Research: Vulnerability Analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis
03/04/2024 23:00:22
QRCode
archive.org
thumbnail

Nozomi Networks Labs found 9 vulnerabilities in DJI drones - we outline the research process for identifying and mitigating these security issues.

nozominetworks EN 2024 DJI drones vulnerabilities Analysis
Threat Actors Deliver Malware via YouTube Video Game Cracks https://www.proofpoint.com/uk/blog/threat-insight/threat-actors-deliver-malware-youtube-video-game-cracks
03/04/2024 22:58:20
QRCode
archive.org
thumbnail

Key takeaways  Proofpoint identified multiple YouTube channels distributing malware by promoting cracked and pirated video games and related content.  The video descriptions include links leading t...

proofpoint EN 2024 Malware YouTube Video Game Cracks
Microsoft could have prevented Chinese cloud email hack, US cyber report says https://www.theverge.com/2024/4/3/24119787/microsoft-cloud-email-hack-china-us-cyber-report
03/04/2024 22:54:04
QRCode
archive.org
thumbnail

Microsoft needs a security culture overhaul, a US report concludes. The software giant could have prevented a cloud email hack in 2023.

theverge EN 2024 Microsoft cloud email cascade-of-security-failures Storm0558 DHS
‘The Manipulaters’ Improve Phishing, Still Fail at Opsec https://krebsonsecurity.com/2024/04/the-manipulaters-improve-phishing-still-fail-at-opsec/
03/04/2024 18:06:08
QRCode
archive.org

Roughly nine years ago, KrebsOnSecurity profiled a Pakistan-based cybercrime group called "The Manipulaters," a sprawling web hosting network of phishing and spam delivery platforms. In January 2024, The Manipulaters pleaded with this author to unpublish previous stories about their work,…

krebsonsecurity EN 2024 Pakistan-based cybercrime TheManipulaters
Enregistré à son insu, son entretien RH finit sur le darknet https://www.20min.ch/fr/story/suisse-enregistre-a-son-insu-son-entretien-rh-finit-sur-le-darknet-103073627
03/04/2024 17:47:15
QRCode
archive.org
thumbnail

Les données d’une agence d’intérim bâloise ont été piratées. Le directeur s’exprime.

20min FR 2024 data-leak suisse ransomware DasTeam
The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind https://www.wired.com/story/jia-tan-xz-backdoor/
03/04/2024 17:16:13
QRCode
archive.org
thumbnail

The thwarted XZ Utils supply chain attack was years in the making. Now, clues suggest nation-state hackers were behind the persona that inserted the malicious code.

wired EN 2024 XZ vulnerabilities linux open-source hackers JiaT75
XZ Utils Supply Chain Puzzle: Binarly Ships Free Scanner for CVE-2024-3094 Backdoor https://www.binarly.io/blog/xz-utils-supply-chain-puzzle-binarly-ships-free-scanner-for-cve-2024-3094-backdoor
03/04/2024 17:01:35
QRCode
archive.org

On March 29, right before Easter weekend, we received notifications about something unusual happening with the open-source project XZ Utils, which provides lossless data compression on virtually all Unix-like operating systems, including Linux.

The initial warning was sent to the Open Source Security mailing list sent by Andres Freund, who discovered that XZ Utils versions 5.6.0 and 5.6.1 are impacted by a backdoor. A few hours later, the US government’s CISA and OpenSSF warned about a critical problem: an installed XZ backdoored version could lead to unauthorized remote access.

binarly EN 2024 XZ Supply-chain-attack CVE-2024-3094 Scanner
China-linked Hackers Deploy New 'UNAPIMON' Malware for Stealthy Operations https://thehackernews.com/2024/04/china-linked-hackers-deploy-new.html
03/04/2024 16:55:15
QRCode
archive.org

A threat activity cluster tracked as Earth Freybug has been observed using a new malware called UNAPIMON to fly under the radar.

"Earth Freybug is a cyberthreat group that has been active since at least 2012 that focuses on espionage and financially motivated activities," Trend Micro security researcher Christopher So said in a report published today.

thehackernews EN 2024 China-linked UNAPIMON APT41Malware
page 58 / 76
4623 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio