Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 64 / 76
1513 résultats taggé 2024  ✕
Microsoft publie son outil interne de test de sécu d'IA générative https://www.zdnet.fr/actualites/microsoft-publie-son-outil-interne-de-test-de-secu-d-ia-generative-39964464.htm
17/03/2024 14:46:49
QRCode
archive.org
thumbnail

PyRIT peut générer des milliers de messages malveillants pour tester un modèle d'IA générative, et même évaluer sa réponse.

ZDNet 2024 FR outil PyRIT Microsoft test IA
France Travail : la CNIL enquête sur la fuite de données et donne des conseils pour se protéger https://www.cnil.fr/fr/france-travail-la-cnil-enquete-sur-la-fuite-de-donnees-et-donne-des-conseils-pour-se-proteger
15/03/2024 16:02:32
QRCode
archive.org

Quelles données personnelles sont concernées ? Le 8 mars, France Travail (anciennement Pôle emploi) et Cap emploi ont informé la CNIL avoir été victime d’une intrusion dans leurs systèmes d’information. Cette attaque aurait potentiellement permis l’extraction de données de 43 millions d’usagers. Ce nombre, à confirmer, concerne les personnes actuellement inscrites sur la liste des demandeurs d'emploi ou qui l’ont été au cours des 20 dernières années, ainsi que des personnes ayant un espace candidat sur francetravail.fr.

CNIL FR 2024 Pôle-emploi France-Travail intrusion leak
Exclusive: After LockBit’s takedown, its purported leader vows to hack on https://therecord.media/after-lockbit-takedown-its-purported-leader-vows-to-hack-on
15/03/2024 14:55:28
QRCode
archive.org
thumbnail

This week, the Click Here podcast landed a rare interview with the purported leader of the LockBit ransomware group – he goes by the name LockBitSupp. He’s under pressure because last month an international police operation infiltrated the group and seized not just their platform, but their hacking tools, cryptocurrency accounts and source code ending a four year ransomware rampage.

therecord.media EN 2024 LockBit LockBitSupp ransomware
Google Chrome gets real-time phishing protection later this month https://www.bleepingcomputer.com/news/google/google-chrome-gets-real-time-phishing-protection-later-this-month/amp/
14/03/2024 23:32:00
QRCode
archive.org
thumbnail

Google will roll out a Safe Browsing update later this month that will provide real-time malware and phishing protection to all Chrome users, without compromising their browsing privacy.

The company launched Safe Browsing in 2005 to defend users against web phishing attacks and has since upgraded it to block malicious domains that push malware, unwanted software, and various social engineering schemes.

bleepingcomputer EN 2024 solution Browsing Phishing Enhanced Chrome Google Safe Privacy Safe-Browsing browser
The Architects of Evasion: a Crypters Threat Landscape https://blog.sekoia.io/the-architects-of-evasion-a-crypters-threat-landscape/
14/03/2024 18:18:31
QRCode
archive.org
thumbnail

Learn about key concepts and different crypters-related activities as well as the lucrative ecosystem of malicious groups that exploit them.

sekoia EN 2024 Crypters Evasion analysis
Kubernetes Vulnerability Allows Remote Code Execution on Windows Endpoints https://www.securityweek.com/kubernetes-vulnerability-allows-remote-code-execution-on-windows-endpoints/
14/03/2024 11:45:58
QRCode
archive.org

The exploitation of a high-severity Kubernetes vulnerability can lead to arbitrary code execution with System privileges on all Windows endpoints in a cluster, Akamai warns.

The issue, tracked as CVE-2023-5528 and impacting default Kubernetes installations, exists in the way the open source container orchestration system processes YAML files, which it uses for virtually every function.

In some regards, the vulnerability is like CVE-2023-3676, a lack of sanitization in the subPath parameter in YAML files leading to code injection when creating pods with volumes.

securityweek EN 2024 Kubernetes cmd Windows CVE-2023-5528
DarkGate Opens Organizations for Attack via Skype, Teams https://www.trendmicro.com/en_us/research/23/j/darkgate-opens-organizations-for-attack-via-skype-teams.html
14/03/2024 11:31:55
QRCode
archive.org
thumbnail

From July to September, we observed the DarkGate campaign (detected by Trend Micro as TrojanSpy.AutoIt.DARKGATE.AA) abusing instant messaging platforms to deliver a VBA loader script to victims. This script downloaded and executed a second-stage payload consisting of a AutoIT scripting containing the DarkGate malware code. It’s unclear how the originating accounts of the instant messaging applications were compromised, however is hypothesized to be either through leaked credentials available through underground forums or the previous compromise of the parent organization.

trendmicro EN 2024 malware DarkGate Skype Teams
Salt Labs research finds security flaws within ChatGPT Ecosystem (Remediated) https://salt.security/blog/security-flaws-within-chatgpt-extensions-allowed-access-to-accounts-on-third-party-websites-and-sensitive-data
14/03/2024 11:00:20
QRCode
archive.org
thumbnail

Salt Labs researchers identified generative AI ecosystems as a new interesting attack vector. vulnerabilities found during this research on ChatGPT ecosystem could have granted access to accounts of users, including GitHub repositories, including 0-click attacks.

salt.security EN 2024 ChatGPT flaws plugins
Researchers found multiple flaws in ChatGPT plugins https://securityaffairs.com/160447/hacking/chatgpt-plugins-vulnerabilities.html
14/03/2024 10:57:09
QRCode
archive.org
thumbnail

Researchers from Salt Security discovered three types of vulnerabilities in ChatGPT plugins that can be could have led to data exposure and account takeovers.

ChatGPT plugins are additional tools or extensions that can be integrated with ChatGPT to extend its functionalities or enhance specific aspects of the user experience. These plugins may include new natural language processing features, search capabilities, integrations with other services or platforms, text analysis tools, and more. Essentially, plugins allow users to customize and tailor the ChatGPT experience to their specific needs.

securityaffairs EN 2024 flows ChatGPT plugins researchers
Secret Backdoor Codes in Safe Locks https://www.404media.co/email/9c16c892-dc0f-4733-9b50-c0ba846dee47/
13/03/2024 14:42:43
QRCode
archive.org
thumbnail

Senator Ron Wyden has found that the DoD banned the use of such locks for U.S. government systems, but deliberately kept information about the backdoors from the public.

404media EN 2024 Safe backdoor US DoD Safe-Locks
GhostSec’s joint ransomware operation and evolution of their arsenal https://blog.talosintelligence.com/ghostsec-ghostlocker2-ransomware/
13/03/2024 13:24:21
QRCode
archive.org
thumbnail

Cisco Talos observed a surge in GhostSec, a hacking group’s malicious activities since this past year. GhostSec has evolved with a new GhostLocker 2.0 ransomware, a Golang variant of the GhostLocker ransomware.

talosintelligence EN 2024 GhostSec ransomware GhostLocker
World’s first major act to regulate AI passed by European lawmakers https://www.cnbc.com/2024/03/13/european-lawmakers-endorse-worlds-first-major-act-to-regulate-ai.html
13/03/2024 13:23:46
QRCode
archive.org
thumbnail

The European Union Parliament on Wednesday approved the world's first major set of regulatory ground rules to govern the mediatized artificial intelligence at the forefront of tech investment.

cnbc EN 2024 legal EU AI regulation
LockBit ransomware affiliate gets four years in jail, to pay $860k https://www.bleepingcomputer.com/news/security/lockbit-ransomware-affiliate-gets-four-years-in-jail-to-pay-860k/
13/03/2024 13:22:45
QRCode
archive.org
thumbnail

Russian-Canadian cybercriminal Mikhail Vasiliev has been sentenced to four years in prison by an Ontario court for his involvement in the LockBit ransomware operation.
#Canada #Case #Computer #Court #InfoSec #Legal #LockBit #Prison #Ransomware #Security

bleepingcomputer EN 2024 Prison LockBit Court Ransomware Case Legal Canada
JetBrains vulnerability exploitation highlights debate over 'silent patching' https://therecord.media/jetbrains-rapid7-silent-patching-dispute
13/03/2024 09:22:58
QRCode
archive.org
thumbnail

Czech software giant JetBrains harshly criticized security company Rapid7 this week following a dispute over two recently-discovered vulnerabilities.

therecord.media EN 2024 JetBrains vulnerability exploitation silent-patching
Incognito Darknet Market Mass-Extorts Buyers, Sellers https://krebsonsecurity.com/2024/03/incognito-darknet-market-mass-extorts-buyers-sellers/
12/03/2024 18:32:19
QRCode
archive.org

Borrowing from the playbook of ransomware purveyors, the darknet narcotics bazaar Incognito Market has begun extorting all of its vendors and buyers, threatening to publish cryptocurrency transaction and chat records of users who refuse to pay a fee ranging from…

krebsonsecurity EN 2024 Incognito Darknet Market Mass-Extorts Buyers
Plusieurs ministères visés par des attaques informatiques depuis dimanche, annonce Matignon https://www.lemonde.fr/pixels/article/2024/03/11/des-services-de-l-etat-vises-par-plusieurs-attaques-informatiques-depuis-dimanche-annonce-matignon_6221398_4408996.html
12/03/2024 10:22:06
QRCode
archive.org
thumbnail

Si ces attaques, qui ont commencé dimanche soir, ont été d’une « intensité inédite », les services du premier ministre ont précisé lundi que leur impact avait été « réduit ». Elles ont été revendiquées par Anonymous Sudan, qui regroupe des militants prorusses.

lemonde FR 2024 France DDoS Anonymous Anonymous-Sudan prorusses
La Commission se félicite de l'accord politique obtenu sur le règlement relatif à la cybersolidarité https://ec.europa.eu/commission/presscorner/detail/fr/ip_24_1332
12/03/2024 10:07:01
QRCode
archive.org
thumbnail

La Commission se félicite de l'accord politique auquel le Parlement européen et le Conseil sont parvenus la nuit dernière concernant le règlement sur la cybersolidarité, proposé par la Commission en avril 2023.

Le règlement sur la cybersolidarité renforcera la solidarité au niveau de l'UE afin de mieux détecter les menaces et incidents de cybersécurité, de mieux s'y préparer et de mieux y réagir. Cet accord intervient à un moment crucial pour la cybersécurité de l'UE, étant donné que le paysage des cybermenaces dans l'UE continue d'être affecté par les événements géopolitiques.

europa EU 2024 FR cybersolidarité accord politique cyber-bouclier règlement
Exploiting CVE-2024-21378 – Remote Code Execution in Microsoft Outlook https://www.netspi.com/blog/technical/red-team-operations/microsoft-outlook-remote-code-execution-cve-2024-21378/
11/03/2024 15:45:31
QRCode
archive.org

Learn how NetSPI discovered that Microsoft Outlook was vulnerable to authenticated remote code execution (RCE) via synced form objects.

netspi EN 2024 CVE-2024-21378 RCE vulnerability Outlook
Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities/
11/03/2024 11:26:35
QRCode
archive.org
thumbnail
  • Magnet Goblin is a financially motivated threat actor that quickly adopts and leverages 1-day vulnerabilities in public-facing services as an initial infection vector. At least in one case of Ivanti Connect Secure VPN (CVE-2024-21887), the exploit entered the group’s arsenal as fast as within 1 day after a POC for it was published.
  • Campaigns that we were able to attribute to this actor targeted Ivanti, Magento, Qlink Sense and possibly Apache ActiveMQ.
  • Analysis of the actor’s recent Ivanti Connect Secure VPN campaign revealed a novel Linux version of a malware called NerbianRAT, in addition to WARPWIRE, a JavaScript credential stealer.
  • The actor’s arsenal also includes MiniNerbian, a small Linux backdoor, and remote monitoring and management (RMM) tools for Windows like ScreenConnect and AnyDesk.
checkpoint EN 2024 Magnet-Goblin 1-day vulnerability Linux NerbianRAT
CISA forced to take two systems offline last month after Ivanti compromise https://therecord.media/cisa-takes-two-systems-offline-following-ivanti-compromise
08/03/2024 20:07:38
QRCode
archive.org
thumbnail

Hackers breached the systems of the Cybersecurity and Infrastructure Security Agency (CISA) in February through vulnerabilities in Ivanti products, officials said.

therecord.media EN 2024 CISA Ivanti Gateway comprimised offline CVE-2023-46805 CVE-2024-21887 CVE-2024-21893
page 64 / 76
4677 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio