Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 6 / 41
817 résultats taggé 2022  ✕
Connected medical devices are the Achilles' heel of healthcare orgs - Help Net Security https://www.helpnetsecurity.com/2022/12/05/connected-medical-devices-cyberattacks/
05/12/2022 11:29:37
QRCode
archive.org
thumbnail

The rising adoption of connected medical devices is accelerating cyberattacks, according to Capterra’s Medical IoT Survey.

helpnetsecurity EN 2022 IoT connected medical devices statistcs healthcare Survey
Schoolyard Bully Trojan Facebook Credential Stealer - Zimperium https://www.zimperium.com/blog/schoolyard-bully-trojan-facebook-credential-stealer/
05/12/2022 11:17:24
QRCode
archive.org
thumbnail

Zimperium zLabs has discovered a new Android threat campaign, the Schoolyard Bully Trojan, which has been active since 2018 and has spread to over 300,000 victims and is specifically targeting Facebook credentials. To learn more about this new threat, read more on our blog.

zimperium EN 2022 Android Schoolyard-Bully Trojan Facebook schools
Rackspace Cloud Office suffers security breach https://doublepulsar.com/rackspace-cloud-office-suffers-security-breach-958e6c755d7f
05/12/2022 08:52:08
QRCode
archive.org

Thousands of small to medium size businesses are suffering as Rackspace have suffered a security incident on their Hosted Exchange service.

Yesterday, 2nd December 2022, Rackspace announced an outage to their Hosted Exchange Server:

doublepulsar EN 2022 Rackspace Cloud Office breach Exchange
Yvelines : cyberattaque contre l'hôpital André Mignot du centre hospitalier de Versailles https://www.lefigaro.fr/actualite-france/yvelines-cyberattaque-contre-l-hopital-andre-mignot-du-centre-hospitalier-de-versailles-20221204
04/12/2022 13:51:15
QRCode
archive.org
thumbnail

L'accueil des patients est limité et l'hôpital a déjà organisé le transfert de deux patients vers d'autres centres de soins, indique France Info.

lefigaro FR 2022 l'hôpital cyberattaque Mignot
Certpotato – using adcs to privesc from virtual and network service accounts to local system https://sensepost.com/blog/2022/certpotato-using-adcs-to-privesc-from-virtual-and-network-service-accounts-to-local-system/
04/12/2022 11:22:09
QRCode
archive.org

The goal of this blog post is to present a privilege escalation I found while working on ADCS. We will see how it is possible to elevate our privileges to NT AUTHORITY\SYSTEM from virtual and network service accounts of a domain-joined machine (for example from a webshell on a Windows server) using ADCS. I want to call this attack chain “CertPotato” as homage to other *Potato tools and as a way to better remember it.

A popular technique for getting SYSTEM from a virtual or network service account is Delegate 2 Thyself by Charlie Clark. This technique involves using RBCD to elevate your privileges. In this article, I propose an alternative approach to become local SYSTEM using ADCS.

sensepost 2022 EN certpotato adcs privesc escalation
Preparing for a Russian cyber offensive against Ukraine this winter https://blogs.microsoft.com/on-the-issues/2022/12/03/preparing-russian-cyber-offensive-ukraine/
03/12/2022 20:22:37
QRCode
archive.org
thumbnail

As we report more fully below, in the wake of Russian battlefield losses to Ukraine this fall, Moscow has intensified its multi-pronged hybrid technology approach to pressure the sources of Kyiv’s military and political support, domestic and foreign. This approach has included destructive missile and cyber strikes on civilian infrastructure in Ukraine, cyberattacks on Ukrainian and now foreign-based supply chains, and cyber-enabled influence operations[1]—intended to undermine US, EU, and NATO political support for Ukraine, and to shake the confidence and determination of Ukrainian citizens.

Microsoft EN 2022 iridium russia-ukraine-war Russia cyberoffensive analysis winter
Darknet markets generate millions in revenue selling stolen personal data https://arstechnica.com/tech-policy/2022/12/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data/
03/12/2022 18:30:46
QRCode
archive.org
thumbnail

A handful of markets were responsible for trafficking most of the data.

arstechnica EN 2022 Darknet markets data stolen-data-supply-chain
Fuite de données sensibles au Département de la justice à Zurich https://www.rts.ch/info/regions/autres-cantons/13595065-fuite-de-donnees-sensibles-au-departement-de-la-justice-a-zurich.html
03/12/2022 17:46:43
QRCode
archive.org
thumbnail

Une fuite de données secoue le monde politique zurichois, à deux mois des élections cantonales. Entre 2006 et 2012, un ancien prestataire informatique du Département de la justice a omis d'effacer des données parfois sensibles sur des ordinateurs remplacés.

rts FR CH 2022 Fuite Leak Zurich prestataire justice sensibles
The Mystery of Metador | Unpicking Mafalda’s Anti-Analysis Techniques https://www.sentinelone.com/labs/the-mystery-of-metador-unpicking-mafaldas-anti-analysis-techniques/
02/12/2022 21:17:56
QRCode
archive.org
thumbnail

Discover the anti-analysis techniques of the Mafalda implant, a unique, feature-rich backdoor used by the Metador threat actor.

SentinelOne EN 2022 Metador Mafalda Anti-Analysis Techniques
Samsung, LG, Mediatek certificates compromised to sign Android malware https://www.bleepingcomputer.com/news/security/samsung-lg-mediatek-certificates-compromised-to-sign-android-malware/
02/12/2022 15:27:16
QRCode
archive.org
thumbnail

Multiple platform certificates used by Android OEM device vendors to digitally sign core system applications have also been used to sign Android apps containing malware.

bleepingcomputer 2022 Android Certificates LG Malware MediaTek Platform-Certificate Samsung
Google Online Security Blog: Memory Safe Languages in Android 13 https://security.googleblog.com/2022/12/memory-safe-languages-in-android-13.html
02/12/2022 12:45:56
QRCode
archive.org
thumbnail

As the amount of new memory-unsafe code entering Android has decreased, so too has the number of memory safety vulnerabilities. From 2019 to 2022 it has dropped from 76% down to 35% of Android’s total vulnerabilities. 2022 is the first year where memory safety vulnerabilities do not represent a majority of Android’s vulnerabilities.

Google EN 2022 memory-safe Android statistics vulnerabilities memory safety
Lastpass says hackers accessed customer data in new breach https://www.bleepingcomputer.com/news/security/lastpass-says-hackers-accessed-customer-data-in-new-breach/
01/12/2022 06:55:38
QRCode
archive.org
thumbnail

LastPass says unknown attackers breached its cloud storage using information stolen during a previous security incident from August 2022.

The company added that, once in, the threat actors also managed to access customer data stored in the compromised storage service.

bleepingcomputer EN 2022 lastpass GoTo breach cloud
LockBit 3.0 ‘Black’ attacks and leaks reveal wormable capabilities and tooling https://news.sophos.com/en-us/2022/11/30/lockbit-3-0-black-attacks-and-leaks-reveal-wormable-capabilities-and-tooling/
30/11/2022 22:10:11
QRCode
archive.org
thumbnail

Reverse-engineering reveals close similarities to BlackMatter ransomware, with some improvements

sophos EN 2022 LockBit3.0 BlackMatter Reverse-engineering
CashRewindo: How to age domains for an investment scam like fine scotch https://blog.confiant.com/cashrewindo-how-to-age-domains-for-an-investment-scam-like-fine-scotch-a48d22788c84
30/11/2022 09:57:13
QRCode
archive.org

Years-old domains, compromised JS libraries and worldwide-localized content among tactics of this sophisticated attacker.

confiant EN 2022 Medium CashRewindo investment scam analysis
Play, ce nouveau ransomware utilisé contre les Alpes-Maritimes et ITS Group https://www.lemagit.fr/actualites/252527798/Play-ce-nouveau-ransomware-utilise-contre-les-Alpes-Maritimes-et-ITS-Group
29/11/2022 19:28:33
QRCode
archive.org
thumbnail

Les opérateurs de ce rançongiciel ont attendu la fin novembre pour commencer à épingler publiquement leurs victimes et à en divulguer des données. Pour autant, ils sont actifs depuis au moins fin juin.

lemagit FR 2022 play ransonware PlayCrypt
Libye: la mise en examen de la société française Amesys et l'inculpation de deux cadres, confirmées en appel https://www.rfi.fr/fr/afrique/20221125-libye-la-mise-en-examen-de-la-soci%C3%A9t%C3%A9-fran%C3%A7aise-amesys-et-l-inculpation-de-deux-cadres-confirm%C3%A9es-en-appel
27/11/2022 20:41:48
QRCode
archive.org
thumbnail

La cour d'appel de Paris a confirmé cette semaine (lundi), la mise en examen de la société française Amesys pour complicité d'actes de torture dans l'enquête sur la vente d’un programme de cybersurveillance au régime libyen de Mouammar Kadhafi. Deux des chefs de l'entreprise ont été inculpés, ce qui rend la société complice d'exactions en Libye.

rfi FR 2022 Lybie Amesys inculpation
U.S. bans sale and import of some tech from Chinese companies Huawei and ZTE https://www.npr.org/2022/11/26/1139258274/us-ban-tech-china-huawei-zte
27/11/2022 18:50:52
QRCode
archive.org
thumbnail

The five-member FCC said it has voted unanimously to adopt new rules that will block the importation or sale of certain technology products that pose security risks to U.S. critical infrastructure.

npr 2022 EN US ban China Huawei FCC block Politics infrastructure
Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms https://blog.bushidotoken.net/2022/11/detecting-and-fingerprinting.html
27/11/2022 17:18:47
QRCode
archive.org
thumbnail

Cyber threat intelligence largely involves the tracking and studying of the adversaries outside of your network. Gaining counterintelligence about your adversaries' capabilities and weaponry is one of the final building blocks for managing a strong cyber defense. In the pursuit of performing this duty, I have been studying how to discover adversary infrastructure on the internet. One good way of doing this has been via leveraging the scan data available through the popular Shodan search engine. If you've not used it before, Shodan periodically scans the entire internet and makes it available for users to query through. It is often used to monitor networks, look for vulnerabilities, and ensure the security of an organization's perimeter.

bushidotoken en 2022 shodan Infostealer Malware-as-a-Service Detecting howto
WhatsApp data leak: 500 million user records for sale https://cybernews.com/news/whatsapp-data-leak/
26/11/2022 11:29:36
QRCode
archive.org

Someone is allegedly selling up-to-date mobile phone numbers of nearly 500 million WhatsApp users. A data sample investigated by Cybernews likely confirms this to be true.

cybernews WhatsApp EN 2022 leak phone numbers
Ransomware Roundup: Cryptonite Ransomware https://www.fortinet.com/blog/threat-research/Ransomware-Roundup-Cryptonite-Ransomware
24/11/2022 21:02:22
QRCode
archive.org
thumbnail

The latest FortiGuard Labs Threat Signal Ransomware Roundup covers the Cryptonite ransomware, along with protection recommendations. Read more.

fortinet EN 2022 Cryptonite Ransomware FortiGuards-Labs Threat-Research ransomware crypto-ransomware
page 6 / 41
4480 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio