Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 69 / 232
Breaking down CVE-2024–38063: remote exploitation of the Windows kernel https://bi-zone.medium.com/breaking-down-cve-2024-38063-remote-exploitation-of-the-windows-kernel-bdae36f5f61d
03/09/2024 14:57:01
QRCode
archive.org

We have examined the Windows TCP/IP network stack flaw that could grant adversaries remote access with maximum privileges. Exploiting CVE-2024–38063 does not imply any action on the part of the user…

bi-zone.medium.com EN 2024 CVE-2024–38063 IPv6 PoC analysis
Owners of 1-Time Passcode Theft Service Plead Guilty https://krebsonsecurity.com/2024/09/owners-of-1-time-passcode-theft-service-plead-guilty/
03/09/2024 08:31:47
QRCode
archive.org

Three men in the United Kingdom have pleaded guilty to operating otp[.]agency, a once popular online service that helped attackers intercept the one-time passcodes (OTPs) that many websites require as a second authentication factor in addition to passwords. Launched in…

krebsonsecurity EN 2024 UK OTP Multi-Factor-Authentication One-time-Password OTP OTP.Agency MFA
Admins of MFA bypass service plead guilty to fraud https://www.bleepingcomputer.com/news/legal/admins-of-mfa-bypass-service-plead-guilty-to-fraud/
03/09/2024 08:28:47
QRCode
archive.org
thumbnail

Three men have pleaded guilty to running OTP.Agency, an online platform that provided social engineering help to obtain one-time passcodes from customers of various banks and services in the U.K.

bleepingcomputer EN 2024 Cybercrime Legal Multi-Factor-Authentication One-time-Password OTP OTP.Agency MFA
Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html
02/09/2024 18:37:02
QRCode
archive.org
thumbnail

We provide a technical analysis on how CVE-2023-22527 can be exploited by malicious actors for cryptojacking attacks that can spread across the victim’s system.

trendmicro EN 2024 Cryptojacking via CVE-2023-22527 Atlassian Confluence analysis
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort” https://www.proofpoint.com/us/blog/threat-insight/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort
02/09/2024 18:34:01
QRCode
archive.org
thumbnail

Key findings  Proofpoint researchers identified an unusual campaign delivering malware that the threat actor named “Voldemort”.   Proofpoint assesses with moderate confidence the goal of the activi...

proofpoint EN 2024 Voldemort campaign impots tax Malware Espionage
Identity of Notorious Hacker USDoD Revealed https://www.securityweek.com/true-identity-of-notorious-hacker-usdod-revealed/
02/09/2024 18:32:08
QRCode
archive.org

The notorious hacker USDoD, who is best known for high-profile data leaks, appears to be a man from Brazil, according to investigations conducted by CrowdStrike and others.

Over the past few years, USDoD, aka EquationCorp, has leaked vast amounts of information stolen from major organizations. His targets include the FBI’s InfraGard portal, Airbus, credit reporting firm TransUnion, background checking service National Public Data (NPD), and many others.

securityweek EN 2024 USDoD Identity EquationCorp
Behind the arrest of Telegram boss, a small Paris cybercrime unit with big ambitions https://www.reuters.com/world/europe/behind-arrest-telegram-boss-small-paris-cybercrime-unit-with-big-ambitions-2024-08-30/
02/09/2024 18:03:51
QRCode
archive.org
  • Durov's arrest marks a shift in dealing with tech chiefs
  • Brousse's unit goes after its biggest ever target
  • Legal experts question the prosecution's argument

The investigation into Telegram boss Pavel Durov that has fired a warning shot to global tech titans was started by a small cybercrime unit within the Paris prosecutor's office, led by 38-year-old Johanna Brousse.
The arrest of Durov, 39, last Saturday marks a significant shift in how some global authorities may seek to deal with tech chiefs reluctant to police illegal content on their platforms.
The arrest signalled the mettle of the J3 cybercrime unit, but the true test of its ambitions will be whether Brousse can secure a conviction based on a largely untested legal argument, lawyers said.

reuters EN 2024 Durov Telegram cybercrime J3
Après un ransomware, l'université Paris-Saclay lance un site provisoire https://www.lemondeinformatique.fr/actualites/lire-apres-un-ransomware-l-universite-paris-saclay-lance-un-site-provisoire-94554.html
02/09/2024 17:58:40
QRCode
archive.org
thumbnail

Comme d’autres services publics avant elle, l’université Paris-Saclay a subi une cyberattaque par le biais d’un ransomware sur ses serveurs. L’attaque qui a eu lieu le 11 août a affecté les services centraux de l’établissement, ainsi que ses composantes (facultés, IUT, Polytech Paris-Saclay, Observatoire des sciences de l’univers). Sont notamment indisponibles un certain nombre de services comme la messagerie électronique, l’intranet, les espaces partagés et certaines applications métier. Un site provisoire a été mis en ligne afin d’assurer, durant les prochaines semaines, la communication auprès des personnels et des étudiants. Une foire aux questions, relative à la cyberattaque, régulièrement complétée et actualisée y est affichée.

lemondeinformatique FR France Paris Université education ransomware Paris-Saclay
Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant https://unit42.paloaltonetworks.com/global-protect-vpn-spoof-distributes-wikiloader/
02/09/2024 16:28:57
QRCode
archive.org
thumbnail

Unit 42 discusses WikiLoader malware spoofing GlobalProtect VPN, detailing evasion techniques, malicious URLs, and mitigation strategies. Unit 42 discusses WikiLoader malware spoofing GlobalProtect VPN, detailing evasion techniques, malicious URLs, and mitigation strategies.

unit42 EN 2024 WikiLoader malware spoofing GlobalProtect VPN
Fake Google Authenticator Website Installs Malware https://any.run/cybersecurity-blog/fake-google-authenticator-campaign/
02/09/2024 11:46:48
QRCode
archive.org
thumbnail

See how adversaries are impersonating Google Authenticator in Google Ads to deliver the DeerStealer information-stealing malware. 

any.run EN 2024 Google Authenticator GoogleAds fake malvertising
Cicada 3301 - Ransomware-as-a-Service - Technical Analysis https://www.truesec.com/hub/blog/dissecting-the-cicada
02/09/2024 11:35:55
QRCode
archive.org
thumbnail

Discover the latest insights on the emerging ransomware group Cicada3301, first detected in June 2024. Truesec's investigation reveals key findings about this group, named after a famous cryptography game, now targeting multiple victims.

truesec EN 2024 Cicada3301 ransomware emerging cryptography Analysis
Docker-OSX image used for security research hit by Apple DMCA takedown https://www.bleepingcomputer.com/news/security/docker-osx-image-used-for-security-research-hit-by-apple-dmca-takedown/
02/09/2024 11:33:30
QRCode
archive.org
thumbnail

The popular Docker-OSX project has been removed from Docker Hub after Apple filed a DMCA (Digital Millennium Copyright Act) takedown request, alleging that it violated its copyright.

bleepingcomputer EN 2024 Apple DMCA Docker-Hub Legal macOS
Cybercriminals operating ransomware as a service from overseas continue to be responsible for most high-profile cybercrime attacks against the UK https://www.nationalcrimeagency.gov.uk/threats/nsa-cyber-2024
30/08/2024 11:23:23
QRCode
archive.org

The deployment of ransomware remains the greatest serious and organised cybercrime threat, the largest cybersecurity threat, and also poses a risk to the UK’s national security. Ransomware attacks can have a significant impact on victims due to financial, data, and service losses, which can lead to business closure, inaccessible public services, and compromised customer data. Threat actors are typically based in overseas jurisdictions where limited cooperation makes it challenging for UK law enforcement to disrupt their activities.

nationalcrimeagency.gov.uk EN 2024 ransomware report assassment cybercrime UK
Germany's Sovereign Tech Fund Puts Over $750K Into FreeBSD Infrastructure Projects https://fossforce.com/2024/08/germanys-sovereign-tech-fund-puts-over-750k-into-freebsd-infrastructure-projects/
30/08/2024 09:00:26
QRCode
archive.org
thumbnail

The FreeBSD Foundation will organize and manage the projects that STF is funding, which mainly focuses on security.

fossforce EN 2024 Germany FreeBSD security Sovereign
Fake Palo Alto GlobalProtect used as lure to backdoor enterprises https://www.bleepingcomputer.com/news/security/fake-palo-alto-globalprotect-used-as-lure-to-backdoor-enterprises/
30/08/2024 08:27:26
QRCode
archive.org
thumbnail

Threat actors target Middle Eastern organizations with malware disguised as the legitimate Palo Alto GlobalProtect Tool that can steal data and execute remote PowerShell commands to infiltrate internal networks further.

bleepingcomputer EN 2024 fake Malware Middle-East Palo-Alto-Networks
Dutch cabinet bans phones in meetings over espionage fears https://www.politico.eu/article/smartphones-banned-from-dutch-government-meetings-over-espionage-risk/
30/08/2024 08:21:10
QRCode
archive.org
thumbnail

Devices are kept in vault during weekly gatherings, prime minister said.

politico EN 2024 policy Intelligence Risk-and-compliance Netherlands espionage Smartphones cabinet
Scam Sites at Scale: LLMs Fueling a GenAI Criminal Revolution https://www.netcraft.com/blog/llms-fueling-gen-ai-criminal-revolution/
29/08/2024 20:31:22
QRCode
archive.org
thumbnail

This article explores Netcraft’s research into the use of generative artificial intelligence (GenAI) to create text for fraudulent websites in 2024. Insight ...

netcraft EN 2024 research Scam Sites GenAI websites
State-backed attackers and commercial surveillance vendors repeatedly use the same exploits https://blog.google/threat-analysis-group/state-backed-attackers-and-commercial-surveillance-vendors-repeatedly-use-the-same-exploits/
29/08/2024 16:50:41
QRCode
archive.org
thumbnail

We’re sharing an update on suspected state-backed attacker APT29 and the use of exploits identical to those used by Intellexa and NSO.

GoogleTAG EN 2024 Mongolia APT29 NSO State-backed attackers identical
Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day https://www.akamai.com/blog/security-research/2024-corona-mirai-botnet-infects-zero-day-sirt
29/08/2024 16:36:22
QRCode
archive.org
  • The Akamai Security Intelligence and Response Team (SIRT) has observed a botnet campaign that is abusing several previously exploited vulnerabilities, as well as a zero-day vulnerability discovered by the SIRT.

  • CVE-2024-7029 (discovered by Aline Eliovich) is a command injection vulnerability found in the brightness function of AVTECH closed-circuit television (CCTV) cameras that allows for remote code execution (RCE).

  • Once injected, the botnet spreads a Mirai variant with string names that reference the COVID-19 virus that has been seen since at least 2020.

  • We have included a list of indicators of compromise (IOCs) to assist in defense against this threat.

akamai EN 2024 botnet Mirai AVTECH zero-day vulnerability CCTV CVE-2024-7029
Hacktivist Response to Telegram CEO Arrest https://cyberknow.substack.com/p/hacktivist-response-to-telegram-ceo
29/08/2024 12:42:08
QRCode
archive.org

Telegram is vital to hacktivist groups and their operations. They would have limited platforms to operate on without Telegram, they try X but are often shut-down and they would likely get drowned out if they tried to operate on underground forums.

cyberknow EN 2024 #opdurov Telegram hacktivists
page 69 / 232
4623 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio