Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 76 / 233
A Dive into Earth Baku’s Latest Campaign https://www.trendmicro.com/en_us/research/24/h/earth-baku-latest-campaign.html
12/08/2024 08:45:14
QRCode
archive.org
thumbnail

Since late 2022, Earth Baku has broadened its scope from the Indo-Pacific region to Europe, the Middle East, and Africa. Their latest operations demonstrate sophisticated techniques, such as exploiting public-facing applications like IIS servers for initial access and deploying the Godzilla webshell for command and control.

trendmicro EN 2024 APT41 malware apt-&-targeted-attacks research EarthBaku reports
Hackers leak 2.7 billion data records with Social Security numbers https://www.bleepingcomputer.com/news/security/hackers-leak-27-billion-data-records-with-social-security-numbers/
12/08/2024 08:39:36
QRCode
archive.org
thumbnail

Almost 2.7 billion records of personal information for people in the United States were leaked on a hacking forum, exposing names, social security numbers, all known physical addresses, and possible aliases.

bleepingcomputer EN 2024 Class-Action-Lawsuit Data-Breach National-Public-Data Personal-Information Social-Security-Number US
Iran Targeting 2024 US Election https://blogs.microsoft.com/on-the-issues/2024/08/08/iran-targeting-2024-us-election/?ref=news.risky.biz
12/08/2024 07:07:54
QRCode
archive.org
thumbnail

Discover how Iran is allegedly targeting the 2024 US election, the potential impacts, and the measures being taken to safeguard the democratic process.

microsoft EN 2024 Iran election US
Trump campaign confirms it was hacked after POLITICO received internal documents from "Robert" https://www.politico.com/news/2024/08/10/trump-campaign-hack-00173503?ref=news.risky.biz
12/08/2024 07:07:12
QRCode
archive.org

The campaign suggested Iran was to blame. POLITICO has not independently verified the identity of the hacker or their motivation.

politico EN 2024 Trump campaign leak data-leak "Robert" presidential-campaign US
Threat Actors’ Toolkit: Leveraging Sliver, PoshC2 & Batch Scripts https://thedfirreport.com/2024/08/12/threat-actors-toolkit-leveraging-sliver-poshc2-batch-scripts/
12/08/2024 06:43:03
QRCode
archive.org
thumbnail
  • In early December of 2023, we discovered an open directory filled with batch scripts, primarily designed for defense evasion and executing command and control payloads. These scripts execute various actions, including disabling antivirus processes and stopping services related to SQL, Hyper-V, security tools, and Exchange servers.
  • This report also highlights scripts responsible for erasing backups, wiping event logs, and managing the installation or removal of remote monitoring tools like Atera.
  • Our investigation uncovered the use of additional tools, including Ngrok for proxy services, SystemBC, and two well-known command and control frameworks: Sliver and PoshC2.
  • The observed servers show long term usage by the threat actors, appearing in The DFIR Report Threat Feeds as far back as September 2023. They have been active intermittently since then, with the most recent activity detected in August 2024.
  • Ten new sigma rules were created from this report and added to our private sigma ruleset
thedfirreport EN 2024 Toolkit investigation open-directory PoshC2 Batch-Scripts
How a cybersecurity researcher befriended, then doxed, the leader of LockBit https://techcrunch.com/2024/08/09/how-a-cybersecurity-researcher-befriended-then-doxed-the-leader-of-lockbit-ransomware-gang/
12/08/2024 06:42:03
QRCode
archive.org
thumbnail

Jon DiMaggio used sockpuppet accounts, then his own identity, to infiltrate LockBit and gain the trust of its alleged admin, Dmitry Khoroshev.

techcrunch en 2024 LockBit JonDiMaggio doxing ransomware gang infiltration
AMD won't patch all chips affected by severe data theft vulnerability — Ryzen 3000, 2000, and 1000 will not get patched for 'Sinkclose' | Tom's Hardware https://www.tomshardware.com/pc-components/cpus/amd-wont-patch-all-chips-affected-by-severe-data-theft-vulnerability-ryzen-1000-2000-and-3000-will-not-get-patched-among-others
12/08/2024 06:41:34
QRCode
archive.org
thumbnail

AMD released patches to address the Sinkclose vulnerability, but not all chips are covered. The company also said 'No performance impact expected', which means that its likely still conducting final validation and testing of the patch and how it impacts the overall performance of the system.

tomshardware EN 2024 AMD Sinkclose Sinkclose no-patch
Hackers Steal Trump’s JD Vance ‘Dirty Laundry’ Dossier As 2016 Strikes Again https://www.forbes.com/sites/daveywinder/2024/08/11/hackers-steal-trumps-jd-vance-dirty-laundry-dossier-as-2016-strikes-again/
11/08/2024 15:46:58
QRCode
archive.org
thumbnail

Hackers tried to interfere with the 2016 and 2024 presidential election campaigns, but now the Trump 2024 campaign has been hacked and confidential Vance dossier stolen.

Trump Trump-2024 Trump-2024-Campaign Trump-Hacked Trump-2024-Campaign-Hacked JD-Vance-dirty-laundry-dossier JD-Vance-dossier-hacked 2024-election-interference Has-Iran-Hacked-the-Trump-2024-campaign Russia-Russia-Russia-becomes-Iran-Iran-Iran
New AMD SinkClose flaw helps install nearly undetectable malware https://www.bleepingcomputer.com/news/security/new-amd-sinkclose-flaw-helps-install-nearly-undetectable-malware/
09/08/2024 19:00:22
QRCode
archive.org
thumbnail

AMD is warning about a high-severity CPU vulnerability named SinkClose that impacts multiple generations of its EPYC, Ryzen, and Threadripper processors. The vulnerability allows attackers with Kernel-level (Ring 0) privileges to gain Ring -2 privileges and install malware that becomes nearly undetectable.

bleepingcomputer AMD Ring Processor SinkClose vulnerability Threadripper EPYC Ryzen
‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections https://www.wired.com/story/amd-chip-sinkclose-flaw/
09/08/2024 14:36:10
QRCode
archive.org
thumbnail

Researchers warn that a bug in AMD’s chips would allow attackers to root into some of the most privileged portions of a computer—and that it has persisted in the company’s processors for decades.

wired EN 2024 Sinkclose AMD CPU Vulnerability TClose
From Limited file read to full access on Jenkins (CVE-2024-23897) https://xphantom.nl/posts/crypto-attack-jenkins/
09/08/2024 14:30:26
QRCode
archive.org
thumbnail

As a red teamer, you encountered a Jenkins instance that is vulnerable to CVE-2024-23897, which allowed for limited arbitrary file read. Without credentials and with the /script endpoint inaccessible, you sought to leverage this vulnerability by revealing Hudson to decypt the credentials.

xphantom EN 2024 Jenkins CVE-2024-23897
How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards https://www.wired.com/story/hid-keycard-authentication-key-vulnerability/
09/08/2024 13:13:45
QRCode
archive.org
thumbnail

A team of researchers have developed a method for extracting authentication keys out of HID encoders, which could allow hackers to clone the types of keycards used to secure offices and other areas worldwide.

wired EN 2024 Clone HID Keycards black-hat defcon2024 encoders
ICANN approves use of .internal domain for your network https://www.theregister.com/2024/08/08/dot_internal_ratified/
09/08/2024 11:06:24
QRCode
archive.org
thumbnail

Vint Cerf revealed Google already uses the string, as do plenty of others

theregister EN ICANN DNS domain ratified
USPS Text Scammers Duped His Wife, So He Hacked Their Operation | WIRED https://www.wired.com/story/usps-scam-text-smishing-triad/
08/08/2024 19:02:17
QRCode
archive.org
thumbnail

The Smishing Triad network sends up to 100,000 scam texts per day globally. One of those messages went to Grant Smith, who infiltrated their systems and exposed them to US authorities.
#black #cybersecurity #defcon #hacking #hacks #hat #phishing #security

hacks black cybersecurity hacking defcon phishing security hat
Treasury Sanctions Leader and Primary Member of the Cyber Army of Russia Reborn | U.S. Department of the Treasury https://home.treasury.gov/news/press-releases/jy2473
08/08/2024 13:31:12
QRCode
archive.org
thumbnail

The United States exposes the identity of and imposes sanctions on two members of the Russian government-aligned hacktivist group.WASHINGTON — Today, the United States designated Yuliya Vladimirovna Pankratova (Pankratova) and Denis Olegovich Degtyarenko (Degtyarenko), two members of the Russian hacktivist group Cyber Army of Russia Reborn (CARR) for their roles in cyber operations against U.S. critical infrastructure

treasury.gov EN 2024 US sanctions Pankratova Degtyarenko CARR Cyber-Army-of-Russia
Google Drawings and WhatsApp Zero-hour Open Redirection Phish exposed - Blog | Menlo Security https://www.menlosecurity.com/blog/google-drawings-and-whatsapp-zero-hour-open-redirection-phish-exposed
08/08/2024 12:54:39
QRCode
archive.org
thumbnail

Menlo Security’s threat research team recently discovered a phishing link hosted in “Google Drawings.” Upon further investigation, we also identified these phis

Akamai Blocked 419 TB of Malicious Traffic in a 24-Hour DDoS Attack https://www.akamai.com/blog/security/akamai-blocked-419-tb-of-malicious-traffic
08/08/2024 10:49:45
QRCode
archive.org

On July 15, 2024, Akamai prevented one of the largest distributed denial-of-service (DDoS) cyberattacks it has ever observed against a major financial services company in Israel.

The highly sophisticated, high-volume attack lasted almost 24 hours.

The attacker deployed larger-than-usual resources, indicating a serious risk for future attacks.

Other Israeli financial institutions reportedly suffered outages and downtimes on the same day, potentially due to the same type of attack and the same aggressor.

Akamai EN 2024 Blocked DDoS high-volume attack
WhatsUp Gold Pre-Auth RCE GetFileWithoutZip Primitive https://summoning.team/blog/progress-whatsup-gold-rce-cve-2024-4885/?ref=x
08/08/2024 10:36:39
QRCode
archive.org
thumbnail

I discovered an unauthenticated path traversal against the latest version of progress whatsup gold and turned it into a pre-auth RCE, following is how I did it, this is the story of CVE-2024-4885

summoning EN 2024 PoC CVE-2024-4885
Jenkins Security Advisory 2024-08-07 CVE-2024-43044 CVE-2024-43045 https://www.jenkins.io/security/advisory/2024-08-07/#jenkins-security-advisory-2024-08-07
08/08/2024 10:13:13
QRCode
archive.org

Jenkins – an open source automation server which enables developers around the world to reliably build, test, and deploy their software

jenkins EN 2024 advisory security-advisory
Windows Update Flaws Allow Undetectable Downgrade Attacks https://www.securityweek.com/safebreach-sounds-alarm-on-windows-update-flaws-allowing-undetectable-downgrade-attacks/
08/08/2024 10:07:49
QRCode
archive.org

Researcher showcases hack against Microsoft Windows Update architecture, turning fixed vulnerabilities into zero-days.

securityweek EN 2024 Microsoft Windows Update Downgrade
page 76 / 233
4653 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio