Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 62 / 76
1513 résultats taggé 2024  ✕
Darknet marketplace Nemesis Market seized by German police https://www.bleepingcomputer.com/news/security/darknet-marketplace-nemesis-market-seized-by-german-police/
22/03/2024 17:21:23
QRCode
archive.org
thumbnail

The German police have seized infrastructure for the darknet Nemesis Market cybercrime marketplace in Germany and Lithuania, disrupting the site's operation.

bleepingcomputer EN 2024 Nemesis Germany Seizure Darknet Takedown BKA Market
Large-Scale StrelaStealer Campaign in Early 2024 https://unit42.paloaltonetworks.com/strelastealer-campaign/
22/03/2024 12:15:51
QRCode
archive.org
thumbnail

We unravel the details of two large-scale StrelaStealer campaigns from 2023 and 2024. This email credential stealer has a new variant delivered through zipped JScript.
#2024 #Campaign #EN #JScript #StrelaStealer #analysis #paloaltonetworks

analysis EN 2024 JScript paloaltonetworks StrelaStealer Campaign
Google Online Security Blog: Vulnerability Reward Program: 2023 Year in Review https://security.googleblog.com/2024/03/vulnerability-reward-program-2023-year.html
22/03/2024 12:13:50
QRCode
archive.org
thumbnail

Last year, we again witnessed the power of community-driven security efforts as researchers from around the world contributed to help us identify and address thousands of vulnerabilities in our products and services. Working with our dedicated bug hunter community, we awarded $10 million to our 600+ researchers based in 68 countries.

security.googleblog EN 2024 reward bug-bounty Google 2023 year
The iSOON Disclosure: Exploring the Integrated Operations Platform https://bishopfox.com/blog/the-isoon-disclosure-exploring-the-integrated-operations-platform
22/03/2024 09:14:22
QRCode
archive.org
thumbnail

Bishop Fox examines the iSoon data disclosure from an offensive security perspective and an analysis of the platform's capabilities, design, features.

Bishop-Fox bishopfox EN 2024 iSOON Integrated Operations Platform China analysis
Ransomware Recruitment Efforts Following Law Enforcement Disruption https://www.guidepointsecurity.com/blog/t-o-x-i-n-b-i-o-ransomware-recruitment-efforts-following-law-enforcement-disruption/
22/03/2024 09:06:54
QRCode
archive.org
thumbnail

In late 2023 and early 2024, the ransomware ecosystem experienced repeated disruption of its most prolific Ransomware-as-a-Service (RaaS) groups at the hands of international Law Enforcement (LE). Alphv’s dark web data leak site was seized, then unseized, then re-seized in a December 2023 law enforcement operation that seemingly failed to deter the group – until AlphV ultimately claimed to disband via an apparent exit scam, immediately following a high-profile attack against Change Healthcare in March 2024. LockBit experienced a far more dramatic and well-marketed disruption, “Operation Cronos,” in February 2024, leading to the compromise of its infrastructure, internal operational details, and data. While LockBit has ostensibly continued operations, its highly publicized disruption raises the question of whether the group will be able to continue operating and attracting affiliates at the level they once enjoyed.

guidepointsecurity EN 2024 Ransomware Recruitment Disruption Operation-Cronos
Trezor X Account Hacked, Shills Fake Crypto https://www.ccn.com/news/trezor-account-hacked-shills-fake-crypto/
22/03/2024 08:56:29
QRCode
archive.org
  • Trezor’s official X account was compromised, likely due to a SIM swap attack, and used to promote a fake token presale.
  • ZachXBT and crypto security firm Scam Sniffer identified the fraudulent activity, preventing wider user losses.
  • Despite compromising Trezor’s account, the hacker only managed to steal a paltry $8,100.
ccn EN 2024 twitter X Trezor SIM-swapping Crypto Account
Apple Sued for Prioritizing Market Dominance Over Security https://www.databreachtoday.eu/apple-sued-for-prioritizing-market-dominance-over-security-a-24687
22/03/2024 08:29:41
QRCode
archive.org
thumbnail

The U.S. Department of Justice in a lawsuit filed Thursday is accusing Apple of discarding user security and privacy protections as part of a broader effort to

databreachtoday EN 2024 Apple Apple-lawsuit DOJ security privacy dominance
OpenAI's chatbot store is filling up with spam https://techcrunch.com/2024/03/20/openais-chatbot-store-is-filling-up-with-spam/?guccounter=1
21/03/2024 17:26:19
QRCode
archive.org
thumbnail

When OpenAI CEO Sam Altman announced GPTs, custom chatbots powered by OpenAI's generative AI models, onstage at the company's first-ever developer

techcrunch EN 2024 ai apps chatbots chatgpt gpt-store gpts openai copyright leagal spam
Exploit released for Fortinet RCE bug used in attacks, patch now https://www.bleepingcomputer.com/news/security/exploit-released-for-fortinet-rce-bug-used-in-attacks-patch-now/
21/03/2024 16:51:25
QRCode
archive.org
thumbnail

Security researchers have released a proof-of-concept (PoC) exploit for a critical vulnerability in Fortinet's FortiClient Enterprise Management Server (EMS) software, which is now actively exploited in attacks.

bleepingcomputer EN 2024 Actively-Exploited Exploit Fortinet PoC Proof-of-Concept RCE Remote-Code-Execution SQL-Injection CVE-2023-48788
Unpatchable vulnerability in Apple chip leaks secret encryption keys https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/
21/03/2024 16:50:21
QRCode
archive.org
thumbnail

Fixing newly discovered side channel will likely take a major toll on performance.

arstechnica EN 2024 gofetch Side-Channel encryption keys
Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds | WIRED https://www.wired.com/story/saflok-hotel-lock-unsaflok-hack-technique/
21/03/2024 15:27:07
QRCode
archive.org
thumbnail

The company behind the Saflok-brand door locks is offering a fix, but it may take months or years to reach some hotels.

wired EN 2024 vulnerabilities Saflok Keycard Lock hotel door NCF
Understanding and Responding to Distributed Denial-Of-Service Attacks https://www.cisa.gov/resources-tools/resources/understanding-and-responding-distributed-denial-service-attacks
21/03/2024 15:20:36
QRCode
archive.org

This joint guide, Understanding and Responding to Distributed Denial-Of-Service Attacks, addresses the specific needs and challenges faced by organizations in defending against DDoS attacks. The guidance now includes detailed insight into three different types of DDoS techniques:

  • Volumetric, attacks aiming to consume available bandwidth.

  • Protocol, attacks which exploit vulnerabilities in network protocols.

  • Application, attacks targeting vulnerabilities in specific applications or running services.

CISA EN 2024 DDoS guidance US Denial-Of-Service Attacks
Microsoft Threat Intelligence unveils targets and innovative tactics amidst tax season https://www.microsoft.com/en-us/security/blog/2024/03/20/microsoft-threat-intelligence-unveils-targets-and-innovative-tactics-amidst-tax-season/
21/03/2024 09:25:41
QRCode
archive.org
thumbnail

Read the new Microsoft Threat Intelligence tax season report to learn about the techniques that threat actors use to mislead taxpayers.

microsoft EN 2024 phishing tax HTML lure
Managing Attack Surface | Huntress Blog https://www.huntress.com/blog/managing-attack-surface
21/03/2024 09:23:51
QRCode
archive.org
thumbnail

Huntress recently detected interesting activity on an endpoint; a threat actor was attempting to establish a foothold on an endpoint by using commands issued via MSSQL to upload a reverse shell accessible from the web server. All attempts were obviated by MAV and process detections, but boy-howdy, did they try!

huntress EN 2024 attack IoCs MSSQL reverse-shell
The Updated APT Playbook: Tales from the Kimsuky threat actor group | Rapid7 Blog https://www.rapid7.com/blog/post/2024/03/20/the-updated-apt-playbook-tales-from-the-kimsuky-threat-actor-group/
21/03/2024 08:45:29
QRCode
archive.org
thumbnail

Within Rapid7 Labs we continually track and monitor threat groups. As part of this process, we routinely identify evolving tactics from threat groups in what is an unceasing game of cat and mouse.

Rapid7 EN 2024 APT TTPs Kimsuky Black Banshee Thallium North-Korea
Windows 11, Tesla, and Ubuntu Linux hacked at Pwn2Own Vancouver https://www.bleepingcomputer.com/news/security/windows-11-tesla-and-ubuntu-linux-hacked-at-pwn2own-vancouver/
21/03/2024 08:42:41
QRCode
archive.org
thumbnail

On the first day of Pwn2Own Vancouver 2024, contestants demoed Windows 11, Tesla, and Ubuntu Linux zero-day vulnerabilities and exploit chains to win $732,500 and a Tesla Model 3 car.

bleepingcomputer EN 2024 Competition Exploit Hacking Linux Pwn2Own Tesla Windows Windows-11 Zero-Day
Ivanti fixes critical Standalone Sentry bug reported by NATO https://www.bleepingcomputer.com/news/security/ivanti-fixes-critical-standalone-sentry-bug-reported-by-nato/
20/03/2024 22:40:25
QRCode
archive.org
thumbnail

Ivanti warned customers to immediately patch a critical severity Standalone Sentry vulnerability reported by NATO Cyber Security Centre researchers.

bleepingcomputer EN 2024 Ivanti NATO Vulnerability Security InfoSec Computer-Security
AceCryptor malware has surged in Europe, researchers say https://therecord.media/acecryptor-malware-surge-europe-remcos
20/03/2024 22:39:09
QRCode
archive.org
thumbnail

Researchers at ESET say they spotted thousands of new infections with AceCryptor, which allows malware to slip into systems without being detected by anti-virus software.

therecord.media EN 2024 ESET AceCryptor malware
Microsoft Copilot for Security: General Availability details https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/microsoft-copilot-for-security-general-availability-details/ba-p/4079970
20/03/2024 22:33:51
QRCode
archive.org
thumbnail

Microsoft Copilot for Security will be generally available on April 1st. Read this blog to learn about new productivity research, product capabilities,..

techcommunity.microsoft EN 2024 AI Microsoft Copilot for Security annonce tool
Loop DoS: New Denial-of-Service attack targets application-layer protocols https://cispa.de/en/loop-dos
20/03/2024 15:26:21
QRCode
archive.org
thumbnail

A new Denial-of-Service (DoS) attack targets application-layer protocols that draw on the User Datagram Protocol (UDP) for end-to-end communication. The vulnerability affects both legacy and contemporary protocols. Discovered by Christian Rossow and Yepeng Pan, the attack puts an estimated 300,000 Internet hosts and their networks at risk.

cispa.de EN 2024 DoS Denial-of-Service UDP vulnerability Application-Layer
page 62 / 76
4668 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio