Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 73 / 204
4080 résultats taggé EN  ✕
dirDevil: Hiding Code and Content Within Folder… https://trustedsec.com/blog/dirdevil-hiding-code-and-content-within-folder-structures?ref=news.risky.biz
22/07/2024 15:06:54
QRCode
archive.org
thumbnail

You can hide data in directory structures, and it will be more or less invisible without knowing how to decode it. It won't even show up as taking up space on disk. However, its real-world applications may be limited because it is the code execution itself which is often the difficulty with AV/EDR evasion.

trustedsec EN 2024 Fileless Data Storage dirDevil Hiding evasion technique
Spanish Police Arrests NoName Hackers https://thecyberexpress.com/spanish-police-arrests-noname-attacks/amp/
22/07/2024 10:36:25
QRCode
archive.org
thumbnail

Spanish Police arrested three individuals on July 20, 2024, who are suspected of participating in a series of cyberattacks targeting critical infrastructure and government institutions in Spain and other NATO countries.

The detainees are believed to be affiliated with the hacktivist group NoName057(16), known for its pro-Russian ideology and launching DDoS attacks against entities supporting Ukraine in the ongoing conflict.

thecyberexpress EN 2024 NoName057(16) busted arrested Spain
Technical Details: Falcon Update for Windows Hosts https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/?ref=news.risky.biz
22/07/2024 10:33:55
QRCode
archive.org
thumbnail

On July 19, 2024 at 04:09 UTC, as part of ongoing operations, CrowdStrike released a sensor configuration update to Windows systems. Sensor configuration updates are an ongoing part of the protection mechanisms of the Falcon platform. This configuration update triggered a logic error resulting in a system crash and blue screen (BSOD) on impacted systems.

The sensor configuration update that caused the system crash was remediated on Friday, July 19, 2024 05:27 UTC.

This issue is not the result of or related to a cyberattack.

CrowdStrike EN 2024 incident issue
Helping our customers through the CrowdStrike outage https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/
22/07/2024 10:25:20
QRCode
archive.org

On July 18, CrowdStrike, an independent cybersecurity company, released a software update that began impacting IT systems globally. Although this was not a Microsoft incident, given it impacts our ecosystem, we want to provide an update on the steps we’ve taken with CrowdStrike and others to remediate and support our customers.

blogs.microsoft microsoft EN 2024 CrowdStrike incident statement
Trump shooter used Android phone from Samsung; cracked by Cellebrite in 40 minutes - 9to5Mac https://9to5mac.com/2024/07/18/trump-shooter-android-phone-cellebrite/
20/07/2024 08:51:43
QRCode
archive.org
thumbnail

Earlier this week, the FBI announced that it had accessed the locked phone of Thomas Matthew Crooks, the man who opened fire at a Trump rally last Saturday. A new report from Bloomberg today reveals more details about this process and the phone used by Crooks.

After Saturday’s Trump rally shooting, the FBI said on Sunday that it had been unsuccessful in unlocking Crooks’ phone. The phone was then sent to the FBI lab in Quanitco, Virginia, and on Tuesday the bureau confirmed that it had successfully unlocked the phone in question.

9to5mac EN 2024 Android Cellebrite Samsung cracked
Our Statement on Today's Outage https://www.crowdstrike.com/blog/our-statement-on-todays-outage/
19/07/2024 22:30:00
QRCode
archive.org
thumbnail

I want to sincerely apologize directly to all of you for today’s outage. All of CrowdStrike understands the gravity and impact of the situation. We quickly identified the issue and deployed a fix, allowing us to focus diligently on restoring customer systems as our highest priority.

The outage was caused by a defect found in a Falcon content update for Windows hosts. Mac and Linux hosts are not impacted. This was not a cyberattack.

crowdstrike EN 2024 incident outage statement
Teenage suspect in MGM Resorts hack arrested in Britain https://therecord.media/mgm-hack-teenager-arrest-britain
19/07/2024 22:12:33
QRCode
archive.org
thumbnail

The West Midlands Police said U.K. agencies — in coordination with the FBI — arrested a 17-year-old suspect in a breach that upended MGM's operations last year on the Las Vegas Strip.

therecord.media EN 2024 MGM UK teenager Scattered-Spider arrested
Leaked Docs Show What Phones Cellebrite Can (and Can’t) Unlock https://www.404media.co/email/075854f5-7a19-4eb2-8a0a-97479bf2d329/?ref=daily-stories-newsletter
19/07/2024 13:01:37
QRCode
archive.org
thumbnail

The leaked April 2024 documents, obtained and verified by 404 Media, show Cellebrite could not unlock a large chunk of modern iPhones.

404media EN 2024 Cellebrite leaked Unlock
Special Report: Massive Global IT Outages Triggered by Faulty CrowdStrike Update https://www.metacurity.com/special-report-massive-global-it-outages-triggered-by-faulty-crowdstrike-update/
19/07/2024 12:47:52
QRCode
archive.org
thumbnail

Cascading and catastrophic IT outages have hit thousands of organizations worldwide after CrowdStrike issued a faulty update in its Falcon Sensor product that caused Windows operating systems to crash.

metacurity EN 2024 CrowdStrike Outages catastrophic faulty-update
APT41 Has Arisen From the DUST https://cloud.google.com/blog/topics/threat-intelligence/apt41-arisen-from-dust?hl=en
19/07/2024 11:03:04
QRCode
archive.org
thumbnail
  • In collaboration with Google’s Threat Analysis Group (TAG), Mandiant has observed a sustained campaign by the advanced persistent threat group APT41 targeting and successfully compromising multiple organizations operating within the global shipping and logistics, media and entertainment, technology, and automotive sectors. The majority of organizations were operating in Italy, Spain, Taiwan, Thailand, Turkey, and the United Kingdom.
  • APT41 successfully infiltrated and maintained prolonged, unauthorized access to numerous victims' networks since 2023, enabling them to extract sensitive data over an extended period.
  • APT41 used a combination of ANTSWORD and BLUEBEAM web shells for the execution of DUSTPAN to execute BEACON backdoor for command-and-control communication. Later in the intrusion, APT41 leveraged DUSTTRAP, which would lead to hands-on keyboard activity. APT41 used publicly available tools SQLULDR2 for copying data from databases and PINEGROVE to exfiltrate data to Microsoft OneDrive
Mandiant EN 2024 APT41 Italy Spain Taiwan Thailand Turkey, UK dustpan BEACON DUSTTRAP
Banks, airlines, brokerage houses report widespread outages across the globe https://techcrunch.com/2024/07/19/banks-airlines-brokerage-houses-report-widespread-outages-across-the-globe/
19/07/2024 10:19:11
QRCode
archive.org
thumbnail

Businesses worldwide are experiencing outages, including Windows "blue screen of death" errors on their computers, in what has already become one of the

techcrunch EN 2024 CrowdStrike incident outage Windows
Office of Public Affairs | Two Foreign Nationals Plead Guilty to Participating in LockBit Ransomware Group https://www.justice.gov/opa/pr/two-foreign-nationals-plead-guilty-participating-lockbit-ransomware-group
19/07/2024 09:52:38
QRCode
archive.org

Two foreign nationals pleaded guilty today to participating in the LockBit ransomware group—at various times the most prolific ransomware variant in the world—and to deploying LockBit attacks against victims in the United States and worldwide.

justice.gov EN 2024 LockBit guilty justice US
New hacker group uses open-source tools to spy on entities in Asia-Pacific region https://therecord.media/tag-100-espionage-hacking-backdoors-asia-pacific
19/07/2024 09:32:38
QRCode
archive.org
thumbnail

An operation labeled TAG-100 by Insikt Group researchers deploys two types of backdoor malware — SparkRAT and Pantegana — that have only been spotted in limited ways previously.

therecord.media EN 2024 TAG-100 SparkRAT Pantegana spy open-source tools
Critical Cisco bug lets hackers add root users on SEG devices https://www.bleepingcomputer.com/news/security/critical-cisco-bug-lets-hackers-add-root-users-on-seg-devices/amp/
19/07/2024 09:06:31
QRCode
archive.org
thumbnail

Cisco has fixed a critical severity vulnerability that lets attackers add new users with root privileges and permanently crash Security Email Gateway (SEG) appliances using emails with malicious attachments.

Tracked as CVE-2024-20401, this arbitrary file write security flaw in the SEG content scanning and message filtering features is caused by an absolute path traversal weakness that allows replacing any file on the underlying operating system.

bleepingcomputer EN 2024 Code InfoSec Execution Path Gateway Denial DoS Remote Cisco RCE CVE-2024-20401 SEG
Trello Data Breach: Hacker Dumps Personal Info of Millions of Users https://hackread.com/trello-data-breach-hacker-dumps-users-personal-info/
18/07/2024 23:39:02
QRCode
archive.org
thumbnail

Trello Data Breach: Trello, a project management tool developed by Atlassian, has experienced a data breach, exposing sensitive user information

hackread EN 2024 Trello Data-Breach
INTERPOL operation strikes major blow against West African financial crime https://www.interpol.int/en/News-and-Events/News/2024/INTERPOL-operation-strikes-major-blow-against-West-African-financial-crime
18/07/2024 23:37:50
QRCode
archive.org
thumbnail

Police seize millions in illegal assets, including cryptocurrencies and luxury items

interpol EN 2024 West-African financial crime busted
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI https://www.sentinelone.com/labs/nullbulge-threat-actor-masquerades-as-hacktivist-group-rebelling-against-ai/
18/07/2024 23:35:48
QRCode
archive.org
thumbnail

Actors are masquerading as hacktivists targeting AI-centric communities with commodity malware and customized LockBit payloads.

sentinelone EN 2024 NullBulge threat-actor hacktivists fake malware LockBit
Fake AWS Packages Ship Command and Control Malware In JPEG Files https://blog.phylum.io/fake-aws-packages-ship-command-and-control-malware-in-jpeg-files
18/07/2024 23:25:43
QRCode
archive.org
thumbnail

On July 13, 2024, the Phylum platform alerted us to a series of odd packages published to the npm package registry. At first glance, these packages appear entirely legitimate; however, as our system automatically noted, they contained sophisticated command and control functionality hidden in image files that would be executed

phylum EN 2024 AWS fake Supply-chain-attack npm package registry JPEG
FIN7 Reboot | Cybercrime Gang Enhances Ops with New EDR Bypasses and Automated Attacks https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enhances-ops-with-new-edr-bypasses-and-automated-attacks/
18/07/2024 23:23:54
QRCode
archive.org
thumbnail

This research explores how FIN7 has adopted automated attack methods and developed defense evasion techniques previously unseen in the wild.

sentinelone EN 2024 FIN7 EDR-Bypasses Bypasses defense-evasion
MediSecure reveals about 12.9 million Australians had personal data stolen by hackers in April | Australia news | The Guardian https://www.theguardian.com/australia-news/article/2024/jul/18/medisecure-reveals-about-129-million-australians-had-personal-data-stolen-by-hackers-in-april
18/07/2024 23:17:55
QRCode
archive.org
thumbnail

Company says it is unable to identify specific individuals affected by one of the largest breaches in Australian history

theguardian EN 2024 MediSecure data-leak Australia Data-Breach
page 73 / 204
4651 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio