Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 7 / 41
817 résultats taggé 2022  ✕
Suisse: Une cyberattaque bloque la comptabilité de milliers de sociétés https://www.20min.ch/fr/story/des-milliers-de-pme-privees-de-logiciel-de-compta-954997709130
24/11/2022 10:22:25
QRCode
archive.org
thumbnail

Victime du piratage de son hébergeur cloud, le logiciel de gestion d'entreprise Winbiz ne peut pas être utilisé depuis lundi. Le retour à la normale prendra du temps.

20min FR CH 2022 Winbiz inforpro piratage cloud hébergeur
Des dizaines de milliers d'entreprises victimes indirectes d'une cyberattaque https://www.rts.ch/info/economie/13570369-des-dizaines-de-milliers-dentreprises-victimes-indirectes-dune-cyberattaque.html
24/11/2022 10:21:21
QRCode
archive.org
thumbnail

Plus de 45'000 PME et près d'un millier de fiduciaires suisses ne peuvent plus utiliser leur logiciel de gestion "Winbiz cloud", accessible en ligne. La faute à une attaque informatique qui a touché l'hébergeur bernois Infopro. La situation devrait perdurer jusqu'à ce week-end.

rts CH FR 2022 Winbiz fiduciaires Infopro attaque
Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice | Proofpoint US https://www.proofpoint.com/us/blog/threat-insight/nighthawk-and-coming-pentest-tool-likely-gain-threat-actor-notice
23/11/2022 22:57:25
QRCode
archive.org
thumbnail

Key Takeaways

  • Nighthawk is an advanced C2 framework intended for red team operations through commercial licensing.
  • Proofpoint researchers observed initial use of the framework in September 2022 by a likely red team.
  • We have seen no indications at this time that leaked versions of Nighthawk are being used by attributed threat actors in the wild.
  • The tool has a robust list of configurable evasion techniques that are referenced as “opsec” functions throughout its code.
    P* roofpoint researchers expect Nighthawk will show up in threat actor campaigns as the tool becomes more widely recognized or as threat actors search for new, more capable tools to use against targets.
proofpoint EN 2022 redteam tool Nighthawk C2 framework threat
ViperSoftX: Hiding in System Logs and Spreading VenomSoftX - Avast Threat Labs https://decoded.avast.io/janrubin/vipersoftx-hiding-in-system-logs-and-spreading-venomsoftx/
23/11/2022 22:48:29
QRCode
archive.org

ViperSoftX is a multi-stage stealer that exhibits interesting hiding capabilities. Other than stealing cryptocurrencies, it also spreads the VenomSoftX browser extension, which performs man-in-the-browser attacks.

avast 2022 EN ViperSoftX multi-stage stealer analysis browser extension man-in-the-browser
Android SharkBot Droppers on Google Play Underline Platform's Security Needs https://www.bitdefender.com/blog/labs/android-sharkbot-droppers-on-google-play-underlines-platforms-security-needs/
22/11/2022 21:24:35
QRCode
archive.org
thumbnail

A common theme we've noticed in the last few months consists of malicious apps
distributed directly from the Google Play Store.

bitdefender EN 2022 SharkBot Android GooglePlay malicious apps
Why would you want to hack Electric Vehicle Charging Stations? https://blog.lukaszolejnik.com/why-would-you-want-to-hack-electric-vehicle-charging-stations/
22/11/2022 21:17:08
QRCode
archive.org
thumbnail

A Russian zero-day exploit purchase site is interested in tools for hacking of Electric Vehicle Charging Stations. This raises a number of questions. Why would anybody want to hack such targets? Also, why would Russian entities (in particular) be interested in such targets? The best answer to these is “good question!”, and let's put politics aside. Let’s explore the potential cybersecurity risks of electric vehicle charging station, assuming the ability of compromising them at a scale, having some kind of tools. It turns out that this is a fascinating security problem!

lukaszolejnik EN 2022 cyber-risk cyberwarfare security 0-day Vehicle Charging Stations
Researchers Explore Hacking VirusTotal to Find Stolen Credentials https://www.darkreading.com/threat-intelligence/researchers-explore-hacking-virustotal-to-find-stolen-credentials
22/11/2022 15:57:11
QRCode
archive.org
thumbnail

VirusTotal can be used to collect large amounts of credentials without infecting an organization or buying them online, researchers found.

darkreading EN 2022 threat-intelligence VirusTotal Credentials
Over 2 million users Affected with Browser Hijackers https://blog.cyble.com/2022/11/22/over-2-million-users-affected-with-browser-hijackers/
22/11/2022 08:53:55
QRCode
archive.org
thumbnail

Cyble Research & Intelligence Labs analyzes the recent surge in users being infected by Browser Hijackers using Chrome plugins.

cyble 2022 EN Browser Hijackers infected Chrome plugins
Aurora: a rising stealer flying under the radar https://blog.sekoia.io/aurora-a-rising-stealer-flying-under-the-radar/
21/11/2022 20:56:10
QRCode
archive.org
thumbnail

Since September 2022, Aurora malware is advertised as an infostealer and several traffers teams announced they added it to their malware toolset.

sekoia 2022 EN infostealer malware technical analysis IoCs Malware-as-a-Service
A Leak Details Apple's Secret Dirt on Corellium, a Trusted Security Startup https://www.wired.com/story/corellium-nso-group-darkmatter-apple-lawsuit/
21/11/2022 16:29:27
QRCode
archive.org
thumbnail

A 500-page document reviewed by WIRED shows Corellium engaged with several controversial companies, including spyware maker NSO Group.

wired EN 2022 apple Corellium privacy hacking leak NSO
Le ministre de l'Éducation nationale ne veut pas de Microsoft Office 365 ni de Google Workspace https://siecledigital.fr/2022/11/17/le-ministre-de-leducation-nationale-ne-veut-pas-de-microsoft-office-365-ni-de-google-workspace/
21/11/2022 11:14:27
QRCode
archive.org
thumbnail

Le ministère de l'Éducation nationale confirme ne pas vouloir des offres de Microsoft Office 365 et de Google Workspace dans les écoles.

siecledigital FR 2022 Éducation Office365 Google-Workspace écoles
Endurance Ransomware Claims Breach of US Federal Government https://www.secplicity.org/2022/11/17/endurance-ransomware-claims-breach-of-us-federal-government/
21/11/2022 10:51:04
QRCode
archive.org
thumbnail

The WatchGuard Security Team spends a lot of time chasing ransomware extortion groups throughout the dark web. So, it only fits that one of the newer ransomware extortion groups is named Endurance Ransomware. It appears this “group” is one individual known as IntelBroker, who has allegedly breached several entities of the US government and two […]

secplicity EN 2022 WatchGuard ransomware Endurance US
Vanuatu: Hackers strand Pacific island government for over a week https://www.bbc.com/news/world-asia-63632129
21/11/2022 10:48:58
QRCode
archive.org
thumbnail

Vanuatu - an island courted by the US and China - has been stranded offline for over a week.

BBC EN 2022 Vanuatu ransomware government
Threat actors exploiting Twitter changes after Musk takeover, research shows https://therecord.media/threat-actors-exploiting-twitter-changes-after-musk-takeover-research-shows/
21/11/2022 10:26:53
QRCode
archive.org

The Record by Recorded Future gives exclusive, behind-the-scenes access to leaders, policymakers, researchers, and the shadows of the cyber underground.

therecord EN 2022 Twitter Musk exploiting
Control Your Types or Get Pwned: Remote Code Execution in Exchange PowerShell Backend https://www.zerodayinitiative.com/blog/2022/11/14/control-your-types-or-get-pwned-remote-code-execution-in-exchange-powershell-backend
21/11/2022 09:57:13
QRCode
archive.org
thumbnail

By now you have likely already heard about the in-the-wild exploitation of Exchange Server, chaining CVE-2022-41040 and CVE-2022-41082. It was originally submitted to the ZDI program by the researcher known as “DA-0x43-Dx4-DA-Hx2-Tx2-TP-S-Q from GTSC”. After successful validation, it was immediately

zerodayinitiative EN 2022 0-day CVE-2022-41040 CVE-2022-41082 PowerShell
Exploit released for actively abused ProxyNotShell Exchange bug https://www.bleepingcomputer.com/news/security/exploit-released-for-actively-abused-proxynotshell-exchange-bug/
21/11/2022 09:11:59
QRCode
archive.org
thumbnail

Proof-of-concept exploit code has been released online for two actively exploited and high-severity vulnerabilities in Microsoft Exchange, collectively known as ProxyNotShell.

bleepingcomputer EN 2022 CVE-2022-41082 CVE-2022-41040 Exploit Microsoft-Exchange Privilege-Escalation Proof-of-Concept ProxyNotShell RCE Remote-Code-Execution
Making Cobalt Strike harder for threat actors to abuse https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse
20/11/2022 20:31:00
QRCode
archive.org
thumbnail

Cobalt Strike, the popular tool used by red teams to test the resilience of their cyber defenses, has seen many iterations and improvements over the last decade. First released in 2012, it was originally the commercial spinoff of the open-source Armitage project that added a graphical user interface (GUI) to the Metasploit framework to help security practitioners detect software vulnerabilities more quickly.

google EN 2022 Cobalt-Strike YARA rules detect
Wi-Spy https://www.hackster.io/news/wi-spy-98d985364820
20/11/2022 10:45:30
QRCode
archive.org
thumbnail

The Wi-Peep exploit allows an attacker to covertly locate all of the Wi-Fi-enabled devices in a building quickly using inexpensive hardware.

Hackster.io EN 2022 research Wi-Fi Wi-Peep drone attacker locate devices
Technical Analysis of the RedLine Stealer https://cloudsek.com/technical-analysis-of-the-redline-stealer/
19/11/2022 23:14:10
QRCode
archive.org
thumbnail

RedLine is an information stealer which operates on a MaaS (malware-as-a-service) model. This stealer is available on underground forums, and priced according to users' needs.

cloudsek EN 2022 stealer RedLine MaaS technical analysis IoCs
AXLocker, Octocrypt, and Alice: Leading a new wave of Ransomware Campaigns https://blog.cyble.com/2022/11/18/axlocker-octocrypt-and-alice-leading-a-new-wave-of-ransomware-campaigns/
19/11/2022 23:12:11
QRCode
archive.org
thumbnail

Cyble analyzes a new wave of ransomware attacks being led by AXLocker, Octocrypt, and Alice ransomware and how they target Discord tokens.

cyble 2022 EN AXLocker Octocrypt Alice analysis ransomware Discord IoCs
page 7 / 41
4481 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio