Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 7 / 19
377 résultats taggé analysis  ✕
Ransomware ecosystem fragmenting under law enforcement pressure and distrust https://therecord.media/ransomware-ecosystem-changing-under-law-enforcement-pressure-distrust
25/07/2024 09:16:17
QRCode
archive.org
thumbnail

Veteran cybercriminals appear to be reducing their dependence on ransomware-as-a-service platforms — a sign that law enforcement raids are having an impact. Experts say the market for digital extortion tools has plenty of room to adapt, though.

therecord.media EN 2024 analysis ransomware-as-a-service law enforcement pressure
Arctic Wolf Labs has observed Fog ransomware being deployed against US organizations in the education and recreation sectors. https://arcticwolf.com/resources/blog/lost-in-the-fog-a-new-ransomware-threat/
22/07/2024 22:49:16
QRCode
archive.org
thumbnail

On May 2, 2024, Arctic Wolf Labs began monitoring deployment of a new ransomware variant referred to as Fog. The ransomware activity was observed in several Arctic Wolf Incident Response cases, each exhibiting similar elements. All victim organizations were located in the United States, 80% of which were in the education sector and 20% in the recreation sector.

We are sharing details of this emerging variant to help organizations defend against this threat. Please note that we may add further detail to this article as we uncover additional information in our ongoing investigation.

arcticwolf EN 2024 Fog ransomware USA ransomware analysis
Brief technical analysis of the "Poseidon Stealer" malware https://www.ncsc.admin.ch/ncsc/en/home/aktuell/im-fokus/2024/poseidon_bericht.html
17/07/2024 20:57:47
QRCode
archive.org

11.07.2024 - At the end of June 2024, cybercriminals spread the malware "Poseidon Stealer" in German-speaking Switzerland by email, using AGOV as a lure with the aim of infecting computers with the macOS operating system. The NCSC has now produced and published a brief technical analysis of the malware.
#news

NCSC CH EN Switzerland AGOV PoseidonStealer analysis
ClickFix Deception: A Social Engineering Tactic to Deploy Malware https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/
17/07/2024 10:29:10
QRCode
archive.org
thumbnail

Authored by Yashvi Shah and Vignesh Dhatchanamoorthy McAfee Labs has discovered a highly unusual method of malware delivery, referred to by researchers as

mcafee EN 2024 analysis ClickFix Deploy Malware Tactic
Kematian-Stealer : A Deep Dive into a New Information Stealer https://www.cyfirma.com/research/kematian-stealer-a-deep-dive-into-a-new-information-stealer/
11/07/2024 14:37:16
QRCode
archive.org
thumbnail

Kematian-Stealer is actively being developed and distributed as an open-source tool on GitHub. Our investigation revealed that the stealer’s source code, related scripts, and a builder for generating malicious binaries are hosted under the GitHub account “Somali-Devs.” Significant contributions from the user KDot227 suggest a close link between this account and the development of the stealer. These scripts and stealer are designed to covertly extract sensitive data from unsuspecting users and organizations.

cyfirma EN 2024 Kematian-Stealer open-source stealer analysis
Behind the Attack: Live Chat Phishing https://perception-point.io/blog/behind-the-attack-live-chat-phishing/
11/07/2024 09:51:48
QRCode
archive.org
thumbnail

In this blog, we investigate a phishing attack that leverages the inherent trust we put in live-human-chat support. 

perception-point EN 2024 Live-Chat Phishing analysis
How do cryptocurrency drainer phishing scams work? https://blog.talosintelligence.com/how-do-cryptocurrency-drainer-phishing-scams-work/
11/07/2024 07:20:05
QRCode
archive.org
thumbnail

In recent months, a surge in cryptodrainer phishing attacks has been observed, targeting cryptocurrency holders with sophisticated schemes aimed at tricking them into divulging their valuable credentials.

talosintelligence EN 2024 cryptodrainer phishing attacks analysis
Turla: A Master’s Art of Evasion https://www.gdatasoftware.com/blog/2024/07/37977-turla-evasion-lnk-files
08/07/2024 23:09:49
QRCode
archive.org

Turla, a well-known piece of malware, has taken to weaponising LNK-files to infect computers. We have observed a current example of this.

gdatasoftware EN 2024 Turla analysis malware LNK-files LNK
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer
27/06/2024 08:47:39
QRCode
archive.org
thumbnail

P2Pinfect is a rust-based malware covered extensively by Cado Security in the past. Cado Security researchers first discovered it during triage of honeypot telemetry in July of 2023.

cadosecurity EN 2024 P2Pinfect Ransomware analysis
Auth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806) https://labs.watchtowr.com/auth-bypass-in-un-limited-scenarios-progress-moveit-transfer-cve-2024-5806/
27/06/2024 08:41:16
QRCode
archive.org
thumbnail

Progress un-embargoed an authentication bypass vulnerability in Progress MOVEit Transfer.

Many sysadmins may remember last year’s CVE-2023-34362, a cataclysmic vulnerability in Progress MOVEit Transfer that sent ripples through the industry, claiming such high-profile victims as the BBC and FBI. Sensitive data was leaked, and sensitive data was destroyed, as the cl0p ransomware gang leveraged 0days to steal data - and ultimately leaving a trail of mayhem.

watchtowr.com EN 2024 MOVEit CVE-2024-5806 Analysis PoC
RansomHub Draws in Affiliates with Multi-OS Capability and High Commission Rates https://www.recordedfuture.com/ransomhub-draws-in-affiliates-with-multi-os-capability-and-high-commission-rates
24/06/2024 20:15:50
QRCode
archive.org
thumbnail

Discover how RansomHub's ransomware-as-a-service targets Windows, Linux, and ESXi systems.

recordedfuture EN 2024 analysis RansomHub ESXi Linux Multi-OS
Newly discovered: BadSpace backdoor delivered by high-ranking websites https://www.gdatasoftware.com/blog/2024/06/37947-badspace-backdoor
17/06/2024 13:31:28
QRCode
archive.org

Threat actors deliver fake software updates on websites for popular browsers: Sites with a high search engine ranking are at an increased risk.

gdatasoftware EN 2024 analysis BadSpace backdoor high-ranking websites
You’ve Got Mail: Critical Microsoft Outlook Vulnerability Executes as Email is Opened https://blog.morphisec.com/cve-2024-30103-microsoft-outlook-vulnerability
12/06/2024 16:56:33
QRCode
archive.org
thumbnail

Morphisec researchers have identified a critical Microsoft Outlook vulnerability, CVE-2024-30103, and detail its technical impact and recommended actions.

morphisec EN 2024 CVE-2024-30103 Microsoft Outlook analysis
CVE-2024-29824 Deep Dive: Ivanti EPM SQL Injection Remote Code Execution Vulnerability – Horizon3.ai https://www.horizon3.ai/attack-research/attack-blogs/cve-2024-29824-deep-dive-ivanti-epm-sql-injection-remote-code-execution-vulnerability/
12/06/2024 16:55:47
QRCode
archive.org
thumbnail

CVE-2024-29824 Ivanti EPM SQL Injection Remote Code Execution Vulnerability. This blog details the internals of a SQLi RCE vulnerability.

horizon3 EN analysis CVE-2024-29824 Ivanti EPM SQL Injection RCE
IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment – The DFIR Report https://thedfirreport.com/2024/06/10/icedid-brings-screenconnect-and-csharp-streamer-to-alphv-ransomware-deployment/
11/06/2024 21:34:35
QRCode
archive.org
thumbnail

Key Takeaways In October 2023, we observed an intrusion that began with a spam campaign, distributing a forked IcedID loader. The threat actor used Impacket’s wmiexec and RDP to install Scree…

thedfirreport EN 2024 analysis IceID ScreenConnect incident ALPHV Ransomware
PikaBot: a Guide to its Deep Secrets and Operations - Sekoia.io Blog https://blog.sekoia.io/pikabot-a-guide-to-its-deep-secrets-and-operations/
04/06/2024 11:15:28
QRCode
archive.org
thumbnail

Uncover an in-depth analysis of PikaBot, a malware loader used by Initial Access Brokers for network compromise and ransomware deployment.

sekoia EN 2024 PikaBot malware analysis TA577 BlackBasta
Snowflake at centre of world’s largest data breach https://doublepulsar.com/snowflake-at-central-of-worlds-largest-data-breach-939fc400912e
03/06/2024 09:48:52
QRCode
archive.org

Cloud AI Data platform Snowflake are having a bad month. Due to teenager threat actors and cybersecurity of its own customers… and its own cybersecurity, too, in terms of optics.

There are several large data breaches playing out in the media currently. For example, Ticketmaster owner Live Nation filed an 8-K with the SEC for potentially the largest data breach ever, claimed to be 560 million customers.

doublepulsar EN 204 Snowflake Data-Breach analysis KevinBeaumont
How AI Will Change Democracy https://www.schneier.com/blog/archives/2024/05/how-ai-will-change-democracy.html
01/06/2024 13:53:35
QRCode
archive.org

I don’t think it’s an exaggeration to predict that artificial intelligence will affect every aspect of our society. Not by doing new things. But mostly by doing things that are already being done by humans, perfectly competently.

Replacing humans with AIs isn’t necessarily interesting. But when an AI takes over a human task, the task changes.

schneier EN 2024 AI risk Democracy Change analysis
Check Point - Wrong Check Point (CVE-2024-24919) https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/
30/05/2024 14:30:24
QRCode
archive.org
thumbnail

Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This time, it is Check Point who is the focus of our penetrative gaze.

Check Point, for those unaware, is the vendor responsible for the 'CloudGuard Network Security' appliance, yet another device claiming to be secure and hardened. Their slogan - "you deserve the best security" - implies they are a company you can trust with the security of your network. A bold claim.

watchtowr EN 2024 CVE-2024-24919 checkpoint analysis patch-diff
CVE-2024-23108: Fortinet FortiSIEM 2nd Order Command Injection Deep-Dive https://www.horizon3.ai/attack-research/cve-2024-23108-fortinet-fortisiem-2nd-order-command-injection-deep-dive/
29/05/2024 09:02:48
QRCode
archive.org
thumbnail

CVE-2024-23108 Fortinet FortiSIEM Command Injection Deep-Dive and Indicators of Compromise. This blog details a command injection vulnerability which allows an unauthenticated attacker to access the FortiSIEM server as root to execute arbitrary commands.

horizon3 EN 2024 CVE-2024-23108 FortiSIEM IoCs analysis
page 7 / 19
4481 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio