Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 69 / 76
1513 résultats taggé 2024  ✕
Serious Vulnerability in the Internet Infrastructure Fundamental design flaw in DNSSEC discovered https://www.athene-center.de/en/news/press/key-trap
19/02/2024 16:03:59
QRCode
archive.org

he National Research Center for Applied Cybersecurity ATHENE has uncovered a critical flaw in the design of DNSSEC, the Security Extensions of DNS (Domain Name System). DNS is one of the fundamental building blocks of the Internet. The design flaw has devastating consequences for essentially all DNSSEC-validating DNS implementations and public DNS providers, such as Google and Cloudflare. The ATHENE team, led by Prof. Dr. Haya Schulmann from Goethe University Frankfurt, developed “KeyTrap”, a new class of attacks: with just a single DNS packet hackers could stall all widely used DNS implementations and public DNS providers. Exploitation of this attack would have severe consequences for any application using the Internet including unavailability of technologies such as web-browsing, e-mail, and instant messaging. With KeyTrap, an attacker could completely disable large parts of the worldwide Internet. The researchers worked with all relevant vendors and major public DNS providers over several months, resulting in a number of vendor-specific patches, the last ones published on Tuesday, February 13. It is highly recommended for all providers of DNS services to apply these patches immediately to mitigate this critical vulnerability.

athene-center.de EN 2024 DNS DNSSEC Vulnerability CVE-2023-50387 KeyTrap
ESET fixed high-severity local privilege escalation bug in Windows products https://securityaffairs.com/159280/breaking-news/eset-local-privilege-escalation-windows.html
18/02/2024 20:51:07
QRCode
archive.org
thumbnail

Cybersecurity firm ESET has addressed a high-severity elevation of privilege vulnerability in its Windows security solution.

securityaffairs EN 2024 ESET Windows high-severity vulnerability
US agency says it was alerted to breach by contractor CGI Federal | Reuters https://www.reuters.com/technology/us-government-accounting-office-says-it-was-notified-data-breach-by-it-2024-02-12/
18/02/2024 18:48:11
QRCode
archive.org

The U.S. Government Accountability Office said Monday that CGI Federal, an IT contractor and unit of CGI Inc , notified the agency of a data breach last month affecting about 6,000 current and former GAO employees.

reuters EN 2024 CGI data-breach GAO employees US
Poland's PM says authorities in the previous government widely and illegally used Pegasus spyware | AP News https://apnews.com/article/poland-government-pegasus-spyware-tusk-duda-78420fc7099401926d28b5be98669192
18/02/2024 18:46:33
QRCode
archive.org
thumbnail

Poland’s new prime minister says he has documentation proving that state authorities under the previous government used the powerful Pegasus spyware illegally and targeted a “very long” list of hacking victims.

apnews EN 2024 government spyware Malware Politics Poland Pegasus illegally
Cyberattaque : le Centre Hospitalier d’Armentières communique https://www.zataz.com/cyberattaque-le-centre-hospitalier-darmentieres-communique/
18/02/2024 16:20:15
QRCode
archive.org
thumbnail

Après la cyberattaque dont a été victime le Centre Hospitalier d’Armentières dans la nuit du 10 au 11 février 2024, la direction commune CHU de Lille / CH d’Armentières a engagé des mesures d’urgence et de sécurité pour assurer la continuité des soins, garantir la sécurité des patients, et protéger les données face aux attaques des pirates informatiques.

zataz FR France 2024 cyberattaque Armentières Centre Hospitalier Santé
Air Canada must honor refund policy invented by airline’s chatbot https://arstechnica.com/tech-policy/2024/02/air-canada-must-honor-refund-policy-invented-by-airlines-chatbot/
18/02/2024 15:11:38
QRCode
archive.org
thumbnail

Air Canada appears to have quietly killed its costly chatbot support.

arstechnica EN 2024 chatbot legal AirCanada refund policy invented
Code injection or backdoor: A new look at Ivanti’s CVE-2021-44529 https://www.labs.greynoise.io/grimoire/2024-02-what-is-this-old-ivanti-exploit/index.html
18/02/2024 02:35:49
QRCode
archive.org
thumbnail

In 2021, Ivanti patched a vulnerability that they called “code injection”. Rumors say it was a backdoor in an open source project. Let’s find out what actually happened!

greynoise EN 2024 backdoor Ivanti CVE-2021-44529 analysis
Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign https://www.recordedfuture.com/russia-aligned-tag-70-targets-european-government-and-military-mail
17/02/2024 12:58:30
QRCode
archive.org
thumbnail

Insikt Group has observed TAG-70 leveraging cross-site scripting (XSS) vulnerabilities against Roundcube webmail servers in Europe, targeting government, military, and national infrastructure.

recordedfuture EN 2024 Russia-Aligned TAG-70 EU XSS Government Military mail spy
Google launches AI Cyber Defense Initiative to improve security infrastructure https://blog.google/technology/safety-security/google-ai-cyber-defense-initiative/
17/02/2024 10:39:19
QRCode
archive.org
thumbnail

Today, many seasoned security professionals will tell you they’ve been fighting a constant battle against cybercriminals and state-sponsored attackers. They will also tell you that any clear-eyed assessment shows that most of the patches, preventative measures and public awareness campaigns can only succeed at mitigating yesterday’s threats — not the threats waiting in the wings.

That could be changing. As the world focuses on the potential of AI — and governments and industry work on a regulatory approach to ensure AI is safe and secure — we believe that AI represents an inflection point for digital security. We’re not alone. More than 40% of people view better security as a top application for AI — and it’s a topic that will be front and center at the Munich Security Conference this weekend.

blog.google EN 2024 google Cyber-Defense initiative IA Defender-Dilemma
New ‘Magic’ Gmail Security Uses AI And Is Here Now, Google Says https://www.forbes.com/sites/daveywinder/2024/02/15/new-google-security-includes-gmail-magic-protection--ai-cyber-defense-initiative/?sh=37e776727575
17/02/2024 10:31:53
QRCode
archive.org
thumbnail

Google has confirmed a new security scheme which, it says, will help “secure, empower and advance our collective digital future” using AI. Part of this AI Cyber Defence Initiative includes open-sourcing the new, AI-powered, Magika tool that is already being used to help protect Gmail users from potentially problematic content.

forbes EN 2024 google Cyber-Defense initiative file-type tools AI
BMW security lapse exposed sensitive company information, researcher finds https://techcrunch.com/2024/02/14/bmw-security-lapse-exposed-sensitive-company-information-researcher-finds/?ref=news.risky.biz
16/02/2024 23:02:19
QRCode
archive.org
thumbnail

A misconfigured cloud storage server belonging to BMW exposed sensitive company information, including private keys and internal data

techcrunch EN 2024 data-leak bmw storage misconfigured
Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-046a
16/02/2024 09:29:11
QRCode
archive.org

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) conducted an incident response assessment of a state government organization’s network environment after documents containing host and user information, including metadata, were posted on a dark web brokerage site. Analysis confirmed that an unidentified threat actor compromised network administrator credentials through the account of a former employee—a technique commonly leveraged by threat actors—to successfully authenticate to an internal virtual private network (VPN) access point, further navigate the victim’s on-premises environment, and execute various lightweight directory access protocol (LDAP) queries against a domain controller.[1] Analysis also focused on the victim’s Azure environment, which hosts sensitive systems and data, as well as the compromised on-premises environment. Analysis determined there were no indications the threat actor further compromised the organization by moving laterally from the on-premises environment to the Azure environment.

CISA EN 2024 Compromised Account Former-Employee advisory
Vulnerable Fortinet Devices: Low-hanging Fruit for Threat Actors https://cyble.com/blog/vulnerable-fortinet-devices-low-hanging-fruit-for-threat-actors/
16/02/2024 09:22:26
QRCode
archive.org
thumbnail

Cyble analyzes the increasing incidences of vulnerabilities in Fortinet, highlighting the impact they have on Critical Infrastructure.

cyble EN 2024 analysis Fortinet exposed
Spyware startup Variston is losing staff — some say it’s closing https://techcrunch.com/2024/02/15/variston-spyware-losing-staff-some-say-closing/?guccounter=1
16/02/2024 07:44:11
QRCode
archive.org
thumbnail

In July 2021, someone sent Google a batch of malicious code that could be used to hack Chrome, Firefox, and PCs running Microsoft Defender. That code was

techcrunch EN 2024 Variston spayware
Ukrainian national pleads guilty for roles in Zeus, IcedID malware operations https://cyberscoop.com/ukrainian-national-pleads-guilty-for-roles-in-zeus-icedid-malware-operations/
16/02/2024 07:43:32
QRCode
archive.org
thumbnail

Vyacheslav Igorevich Penchukov pleaded guilty to two counts, each of which carries a possible 20-year prison term.

cyberscoop EN 2024 Penchukov Zeus IcedID
Gold Rush is back to APAC: Group-IB unveils first iOS trojan stealing your face https://www.group-ib.com/media-center/press-releases/goldfactory-ios-trojan/
15/02/2024 16:14:38
QRCode
archive.org

Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, has uncovered a new iOS Trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The Trojan, dubbed GoldPickaxe.iOS by Group-IB’s Threat Intelligence unit, has been attributed to a Chinese-speaking threat actor codenamed GoldFactory, responsible for developing a suite of highly sophisticated banking Trojans that also includes the earlier discovered GoldDigger and newly identified GoldDiggerPlus, GoldKefu, and GoldPickaxe for Android. To exploit the stolen biometric data, the threat actor utilizes AI face-swapping services to create deepfakes by replacing their faces with those of the victims. This method could be used by cybercriminals to gain unauthorized access to the victim’s banking account – a new fraud technique, previously unseen by Group-IB researchers. The GoldFactory Trojans target the Asia-Pacific region, specifically — Thailand and Vietnam impersonating local banks and government organizations.

Group-IB’s discovery also marks a rare instance of malware targeting Apple’s mobile operating system. The detailed technical description of the Trojans, analysis of their technical capabilities, and the list of relevant indicators of compromise can be found in Group-IB’s latest blog post.

group-ib EN 2024 research faceid stealer iOS trojan GoldPickaxe.iOS
Threat Intel Accelerates Detection & Response https://www.huntress.com/blog/threat-intel-accelerates-detection-and-response
15/02/2024 14:28:01
QRCode
archive.org
thumbnail

Evidence of a pre-existing exploit was rendered when the Huntress agent was added to an endpoint. Within minutes, and in part through the use of previously published threat intelligence, analysts were able to identify the issue and make recommendations to the customer to remediate the root cause.

huntress EN 2024 analysis endpoint finger.exe IoC
Disrupting malicious uses of AI by state-affiliated threat actors https://openai.com/blog/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors
15/02/2024 14:16:51
QRCode
archive.org
thumbnail

We terminated accounts associated with state-affiliated threat actors. Our findings show our models offer only limited, incremental capabilities for malicious cybersecurity tasks.

openai EN 2024 malicious AI chatGPT
Patch Tuesday - February 2024 https://www.rapid7.com/blog/post/2024/02/13/patch-tuesday-february-2024/
15/02/2024 14:09:53
QRCode
archive.org
thumbnail

Microsoft is addressing 73 vulnerabilities this February 2024 Patch Tuesday, including two (actually, three!) zero-day/exploited-in-the-wild vulnerabilities, both of which are already included on the CISA KEV list. Today also brings patches for two critical remote code execution (RCE) vulnerabilities, and a critical elevation of privilege vulnerability in Exchange. Six browser vulnerabilities were published separately this month, and are not included in the total.

rapid7 EN 2024 PatchTuesday february-2024 CVE-2024-21351 CVE-2024-21412 CVE-2024-21413
Imposer aux messageries de donner leurs clés pour déchiffrer les messages est illégal, estime la CEDH https://www.lemonde.fr/pixels/article/2024/02/15/imposer-aux-messageries-de-donner-leurs-cles-pour-dechiffrer-les-messages-est-illegal-estime-la-cedh_6216695_4408996.html
15/02/2024 13:59:30
QRCode
archive.org
thumbnail

La Cour européenne des droits de l’homme a donné raison à un utilisateur de l’application Telegram visé par une demande du FSB, le service de sécurité intérieure russe. La décision pourrait avoir un impact sur certaines lois en cours de discussion en Europe.

lemonde FR 2024 EU Cour-Européenne déchiffrer illégal messages Telegram
page 69 / 76
4677 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio