Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 75 / 76
1513 résultats taggé 2024  ✕
Anthropic researchers find that AI models can be trained to deceive https://techcrunch.com/2024/01/13/anthropic-researchers-find-that-ai-models-can-be-trained-to-deceive/
15/01/2024 06:44:13
QRCode
archive.org
thumbnail

A study co-authored by researchers at Anthropic finds that AI models can be trained to deceive -- and that this deceptive behavior is difficult to combat.

techcrunch EN 2024 AI models study deceive research Anthropic
CVE-2024-21591 - Juniper J-Web OOB Write vulnerability https://censys.com/cve-2024-21591-juniper-j-web-oob-write-vulnerability/
14/01/2024 12:26:19
QRCode
archive.org
thumbnail
  • Juniper Networks recently patched a critical pre-authentication Remote Code Execution (RCE) vulnerability in the J-Web configuration interface across all versions of Junos OS on SRX firewalls and EX switches.
  • Unauthenticated actors could exploit this vulnerability to gain root access or initiate Denial of Service (DoS) attacks on devices that have not been patched. Ensure your systems are updated promptly to mitigate this risk.
  • Check for exposed J-Web configuration interfaces using this Censys Search query: services.software.uniform_resource_identifier: cpe:2.3:a:juniper:jweb:*:*:*:*:*:*:*:*.
  • As emphasized last year in CISA’s BOD 23-02 guidance, exposed network management interfaces continue to pose a significant risk. Restrict access to these interfaces from the public internet wherever possible.
censys EN 2024 CVE-2024-21591 Juniper J-Web OOB vulnerability RCE exposed
Hackers can infect network-connected wrenches to install ransomware https://arstechnica.com/security/2024/01/network-connected-wrenches-used-in-factories-can-be-hacked-for-sabotage-or-ransomware/
13/01/2024 16:57:55
QRCode
archive.org
thumbnail

Researchers identify 23 vulnerabilities, some of which can exploited with no authentication.

arstechnica EN 2024 wrenches ransomware IoT
Cryptojacker arrested in Ukraine over EUR 1.8 million mining scheme https://www.europol.europa.eu/media-press/newsroom/news/cryptojacker-arrested-in-ukraine-over-eur-1.8-million-mining-scheme
13/01/2024 14:18:40
QRCode
archive.org
thumbnail

The 29-year-old individual was apprehended in Mykolaiv, Ukraine, on 9 January. Three properties were searched to gather evidence against the main suspect. The arrest comes after months of intensive collaboration between Ukrainian authorities, Europol and a cloud provider, who worked tirelessly to identify and locate the individual behind the widespread cryptojacking operation.The suspect is believed to have mined over USD...

europol EN 2024 apprehended Ukraine Cryptojacker arrested
Act Now: CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability https://www.redpacketsecurity.com/act-now-cisa-flags-active-exploitation-of-microsoft-sharepoint-vulnerability/
12/01/2024 10:22:53
QRCode
archive.org
thumbnail

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability impacting Microsoft SharePoint Server to its

redpacketsecurity EN 2024 CISA Microsoft SharePoint CVE-2023-29357
Follow-On Extortion Campaign Targeting Victims of Akira and Royal Ransomware https://arcticwolf.com/resources/blog/follow-on-extortion-campaign-targeting-victims-of-akira-and-royal-ransomware/
11/01/2024 20:46:01
QRCode
archive.org
thumbnail

Arctic Wolf Labs has investigated several cases where ransomware victims are being targeted for follow-on extortion attempts by threat actors who are aware of ransom attack details.

arcticwolf 2024 Extortion Campaign fake expert ransomware Akira Royal
Linux devices are under attack by a never-before-seen worm | Ars Technica https://arstechnica.com/security/2024/01/a-previously-unknown-worm-has-been-stealthily-targeting-linux-devices-for-a-year/
11/01/2024 12:48:32
QRCode
archive.org
thumbnail

Based on Mirai malware, self-replicating NoaBot installs cryptomining app on infected devices.

arstechnica 2024 EN Mirai variant self-replicating NoaBot cryptomining never-before-seen
AirDrop 'Cracked' By Chinese Authorities to Identify Senders https://www.macrumors.com/2024/01/09/airdrop-cracked-chinese-authorities/
11/01/2024 09:28:36
QRCode
archive.org
thumbnail

Apple's AirDrop feature has reportedly been cracked by a Chinese state-backed institution, allowing authorities to identify senders who share...

macrumors EN 2024 China AirDrop Identify
Le service de renseignement suisse surveille aussi le trafic de données national https://www.ictjournal.ch/news/2024-01-10/le-service-de-renseignement-suisse-surveille-aussi-le-trafic-de-donnees-national
10/01/2024 19:04:27
QRCode
archive.org
thumbnail

Avec l'entrée en vigueur de la nouvelle loi sur le renseignement en 2017, le Service de renseignement de la Confédération (SRC) s'est vu doté de nouvelles capacités de surveillance. Contrairement aux promesses faites lors de la campagne électorale, celles-ci sont également utilisées pour surveiller le trafic de données en Suisse.

ICTjournal FR CH 2024 SRC Confédération Suisse surveillance données
NSA official: hackers use AI bots like ChatGPT to perfect English https://www.nbcnews.com/tech/security/nsa-hacker-ai-bot-chat-chatgpt-bard-english-google-openai-rcna133086
10/01/2024 08:57:00
QRCode
archive.org
thumbnail

NSA Cybersecurity Director Rob Joyce said the spy agency has seen hackers use chatbots like ChatGPT to perfect their English for phishing schemes.

nbcnews EN 2024 NSA RobJoyce ChatGPT phishing AI
SEC Has Not Approved Bitcoin ETFs, but Its Hacked X Account Briefly Said Otherwise https://www.coindesk.com/policy/2024/01/09/sec-twitter-compromised-chair-gensler-says-after-account-said-bitcoin-etfs-approved/
10/01/2024 08:30:47
QRCode
archive.org
thumbnail

The X account of the U.S. Securities and Exchange Commission, which is deciding whether to approve bitcoin ETFs, "was compromised," the regulator told CoinDesk.

coindesk EN 2024 SEC x Twitter account compromised hacked bitcoin
Avast Updates Babuk Ransomware Decryptor in Cooperation with Cisco Talos and Dutch Police https://decoded.avast.io/threatresearch/avast-updates-babuk-ransomware-decryptor-in-cooperation-with-cisco-talos-and-dutch-police/
09/01/2024 13:36:22
QRCode
archive.org
thumbnail

Avast is releasing an updated version of the Avast Babuk decryption tool, capable of restoring files encrypted by the Babuk variant called Tortilla.

avast EN 2024 Babuk decryption tool Tortilla
Netgear, Hyundai latest X accounts hacked to push crypto drainers https://www.bleepingcomputer.com/news/security/netgear-hyundai-latest-x-accounts-hacked-to-push-crypto-drainers/
09/01/2024 13:34:14
QRCode
archive.org
thumbnail

The official Netgear and Hyundai MEA Twitter/X accounts (together with over 160,000 followers) are the latest hijacked to push scams designed to infect potential victims with cryptocurrency wallet drainer malware.

bleepingcomputer EN 2024 X CryptoCurrency Drainer Hyundai Netgear Scam Twitter Wallet-Drainer
Meet Ika & Sal: The Bulletproof Hosting Duo from Hell https://krebsonsecurity.com/2024/01/meet-ika-sal-the-bulletproof-hosting-duo-from-hell/
09/01/2024 09:32:30
QRCode
archive.org

In 2020, the United States brought charges against four men accused of building a bulletproof hosting empire that once dominated the Russian cybercrime industry and supported multiple organized cybercrime groups. All four pleaded guilty to conspiracy and racketeering charges. But…

krebsonsecurity EN 2024 Bulletproof Spamdot hosting Ika Sal crime
Dutch man sabotaged Iranian nuclear program without Dutch government's knowledge: report https://nltimes.nl/2024/01/08/dutch-man-sabotaged-iranian-nuclear-program-without-dutch-governments-knowledge-report
08/01/2024 12:04:25
QRCode
archive.org
thumbnail

In 2008, a Dutchman played a crucial role in the United States and Israeli-led operation to sabotage Iran’s nuclear program. The then 36-year-old Erik van Sabben infiltrated an Iranian nuclear complex and released the infamous Stuxnet virus, paralyzing the country’s nuclear program. The AIVD recruited the man, but Dutch politicians knew nothing about the operation, the Volkskrant reports after investigating the sabotage for two years.

nltimes EN 2024 Stuxnet Dutchman 2008 nuclear
Multiple vulnerabilities in Lantronix EDS-MD IoT gateway for medical devices https://www.pentagrid.ch/en/blog/multiple-vulnerabilties-in-lantronix-eds-md-iot-gateway/
08/01/2024 11:41:32
QRCode
archive.org
thumbnail

The Lantronix EDS-MS is an "IoT gateway for mission critical medical devices and equipment connectivity". It is affected by multiple vulnerabilities.

pentagrid EN 2024 Lantronix EDS-MS IoT ritical medical devices helath Vulnerabilities
Du nouveau dans la (l'in) sécurité de l'Internet ? https://www.bortzmeyer.org/orange-espagne-bgp.html
05/01/2024 18:47:03
QRCode
archive.org

Le 3 janvier 2024, une partie du trafic IP à destination de la filiale espagnole d'Orange n'a pas été transmis, en raison d'un problème BGP, le système dont dépend tout l'Internet. Une nouveauté, par rapport aux nombreux autres cas BGP du passé, est qu'il semble que le problème vienne du piratage d'un compte utilisé par Orange. Quelles leçons tirer de cette apparente nouveauté ?

bortzmeyer FR 2024 Orange Espagne BGP analyse incident
Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords https://blog.redteam-pentesting.de/2024/bitwarden-heist/
05/01/2024 14:06:49
QRCode
archive.org
thumbnail

Sometimes, making particular security design decisions can have unexpected consequences. For security-critical software, such as password managers, this can easily lead to catastrophic failure: In this blog post, we show how Bitwarden’s Windows Hello …

redteam-pentesting.de 2024 Bitwarden Password Vaults Windows Hello
Analyzing DPRK's SpectralBlur https://objective-see.org/blog/blog_0x78.html
05/01/2024 12:38:58
QRCode
archive.org
thumbnail

In both his twitter (err, X) thread and in a subsequent posting he provided a comprehensive background and triage of the malware dubbed SpectralBlur. In terms of its capabilities he noted:

SpectralBlur is a moderately capable backdoor, that can upload/download files, run a shell, update its configuration, delete files, hibernate or sleep, based on commands issued from the C2. -Greg
He also pointed out similarities to/overlaps with the DPRK malware known as KandyKorn (that we covered in our “Mac Malware of 2024” report), while also pointing out there was differences, leading him to conclude:

We can see some similarities ... to the KandyKorn. But these feel like families developed by different folks with the same sort of requirements. -Greg

objective-see EN 2024 Analysis macOS backdoor SpectralBlur malware
Ivanti warns critical EPM bug lets hackers hijack enrolled devices https://www.bleepingcomputer.com/news/security/ivanti-warns-critical-epm-bug-lets-hackers-hijack-enrolled-devices/
05/01/2024 08:53:04
QRCode
archive.org
thumbnail

Ivanti fixed a critical remote code execution (RCE) vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers hijack enrolled devices or the core server.

bleepingcomputer EN 2024 Ivanti Ivanti-Endpoint-Manager Ivanti-EPM RCE Remote-Code-Execution CVE-2023-39336
page 75 / 76
4695 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio