Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 76 / 235
How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions https://blog.talosintelligence.com/how-multiple-vulnerabilities-in-microsoft-apps-for-macos-pave-the-way-to-stealing-permissions/
20/08/2024 09:14:14
QRCode
archive.org
thumbnail

An adversary could exploit these vulnerabilities by injecting malicious libraries into Microsoft's applications to gain their entitlements and user-granted permissions.

talosintelligence EN 2024 vulnerabilities Microsoft apps macos Outlook
Windows driver zero-day exploited by Lazarus hackers to install rootkit https://www.bleepingcomputer.com/news/microsoft/windows-driver-zero-day-exploited-by-lazarus-hackers-to-install-rootkit/
20/08/2024 07:11:59
QRCode
archive.org
thumbnail

The notorious North Korean Lazarus hacking group exploited a zero-day flaw in the Windows AFD.sys driver to elevate privileges and install the FUDModule rootkit on targeted systems.
#BYOVD #Bring #CVE-2024-38193 #Driver #Group #Lazarus #Microsoft #Own #Vulnerability #Your #Zero-Day

bleepingcomputer EN 2024 Your Lazarus Own BYOVD Driver Zero-Day Vulnerability Bring CVE-2024-38193 Group Microsoft
stardom dreams, stalking devices and the secret conglomerate selling both https://maia.crimew.gay/posts/gps-track-deez-nuts/
19/08/2024 08:41:02
QRCode
archive.org
thumbnail

people frequently reach out to me with companies to look into. usually it takes me about 10 minutes before i move on for one reason or another—it's not interesting for a story or has good security, for example. i didnt expect anything different when an acquaintance told me about Tracki, a self-proclaimed "world leader in GPS tracking" that they suspected could be used nefariously.

at first glance, Tracki appeared to be a serious company, maybe even one that cared about security. we could never have guessed what was about to unfold before us.

half a year into our investigation, we'd found it all: a hidden conglomerate posing as five independent companies, masked from governments and customers alike through the use of dozens of false identities, US letterbox companies, and an undeclared owner. a 90s phone sex scheme that, through targeting by one of hollywood's most notorious fixers, spiraled into a collection of almost a hundred domains advertising everything from online dating to sore throat remedies. a slew of device-assisted murder cases, on top of potential data breaches affecting almost 12 million users, ranging from federal government officials to literal infants. and most importantly, a little-known Snoop Dogg song. how in the world did we get here?

starting our descent

maia.crimew.gay EN 2024 Tracki shady business investigation stalkerware security analysis sqli leak exploit nyancrimew maia-arson-crimew switzerland hacktivism developer
Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation - SecurityWeek https://www.securityweek.com/post-quantum-cryptography-standards-officially-announced-by-nist-a-history-and-explanation/?is=09685296f9ea1fb2ee0963f2febaeb3a55d8fb1eddbb11ed4bd2da49d711f2c7
17/08/2024 11:09:06
QRCode
archive.org

NIST has formally published three post-quantum cryptography standards from the competition it held to develop cryptography able to withstand the anticipated quantum computing decryption of current asymmetric encryption.

securityweek EN 2024 NIST post-quantum cryptography
Disrupting a covert Iranian influence operation https://openai.com/index/disrupting-a-covert-iranian-influence-operation/
17/08/2024 02:49:59
QRCode
archive.org

We banned accounts linked to an Iranian influence operation using ChatGPT to generate content focused on multiple topics, including the U.S. presidential campaign. We have seen no indication that this content reached a meaningful audience.

openai EN 2024 chatgpt Iran influence-operation US disrupted report
Beyond the wail: deconstructing the BANSHEE infostealer https://www.elastic.co/security-labs/beyond-the-wail
16/08/2024 17:35:09
QRCode
archive.org
thumbnail

The BANSHEE malware is a macOS-based infostealer that targets system information, browser data, and cryptocurrency wallets.

elastic.co EN 2024 macOS BANSHEE infostealer
DDoS attack volume rises, peak power reaches 1.7 Tbps https://www.helpnetsecurity.com/2024/08/15/ddos-attacks-h1-2024-increase/
16/08/2024 12:00:09
QRCode
archive.org
thumbnail

The total number of DDoS attacks during H1 2024 amounted to 830,000, an increase of 46% when compared to H1 2023, according to Gcore.

helpnetsecurity EN 2024 DDoS attack Statistics report
Geopolitical Tensions Drive Explosion in DDoS Attacks https://www.infosecurity-magazine.com/news/geopolitical-tensions-drive-ddos/
16/08/2024 11:59:20
QRCode
archive.org
thumbnail

Radware found that Web DDoS attacks rose by 265% in H1 2024, driven by hacktivist groups amid rising geopolitical tensions

infosecurity-magazine EN 2024 DDoS attacks statistcs report
SolarWinds fixes critical RCE bug affecting all Web Help Desk versions https://www.bleepingcomputer.com/news/security/solarwinds-fixes-critical-rce-bug-affecting-all-web-help-desk-versions/
16/08/2024 11:01:30
QRCode
archive.org
thumbnail

A critical vulnerability in SolarWinds' Web Help Desk solution for customer support could be exploited to achieve remote code execution, the American business software developer warns in a security advisory today.

bleepingcomputer EN 2024 Hotfix Remote-Command-Execution SolarWinds Vulnerability Web-Help-Desk
Zabbix Server Vulnerability Lets Attacker Execute Arbitrary Code https://cybersecuritynews.com/zabbix-server-vulnerability/
16/08/2024 11:00:10
QRCode
archive.org
thumbnail

A critical security vulnerability, identified as CVE-2024-22116, has been patched in Zabbix, a popular monitoring solution.

cybersecuritynews EN 2024 CVE-2024-22116 Zabbix critical
Ransomware attackers introduce new EDR killer to their arsenal https://news.sophos.com/en-us/2024/08/14/edr-kill-shifter/
16/08/2024 09:50:38
QRCode
archive.org
thumbnail

Sophos discovers the threat actors behind RansomHub ransomware using EDRKillShifter in attacks

sophos EN 2024 Ransomware attackers EDRKillShifter RansomHub
Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/
15/08/2024 16:40:03
QRCode
archive.org
thumbnail

We recount an extensive cloud extortion campaign leveraging exposed .env files of at least 110k domains to compromise organizations' AWS environments.

unit42 EN 2024 Leaked Environment Variables cloud aws extortion
Doppelgänger operation rushes to secure itself amid ongoing detections, German agency says https://therecord.media/doppelganger-influence-operation-struggle-bavarian-baylfv-report
15/08/2024 15:42:03
QRCode
archive.org
thumbnail

Recent scrutiny of the Russia-linked Doppelgänger influence operation has disrupted how it behaves, according to the BayLfV, an agency of the Bavarian state government.

therecord.media EN 2024 EN Doppelgänger influence operation
White House working on cyber insurance policy proposal for ‘catastrophic’ incidents https://therecord.media/white-house-cyber-insurance-catastrophic?ref=news.risky.biz
15/08/2024 09:53:45
QRCode
archive.org
thumbnail

At the Black Hat cybersecurity conference on Thursday, National Cyber Director Harry Coker, Jr. said his office is working with the Department of Treasury’s federal insurance office as well as officials at the Cybersecurity and Infrastructure Security Agency (CISA) on the effort.

therecord.media EN 2024 cyber-insurance policy proposal US CISA
Gafgyt Malware Variant Exploits GPU Power and Cloud Native Environments https://www.aquasec.com/blog/gafgyt-malware-variant-exploits-gpu-power-and-cloud-native-environments/
15/08/2024 08:37:48
QRCode
archive.org
thumbnail

Aqua Nautilus researchers discovered a new variant of Gafgyt targeting machines with weak SSH passwords.

aquasec EN 2024 Gafgyt Malware SSH passwords botnet GPU Power cloud
The Hidden Treasures of Crash Reports https://objective-see.org/blog/blog_0x7B.html?mc_cid=cc6f2fb89f&mc_eid=0d9a12074d
15/08/2024 07:06:53
QRCode
archive.org
thumbnail

Sadly, nobody really loves crash reports, but I’m here to change that!

This research, a crash course on crash reports, will highlight how these often overlooked files are an invaluable source of information, capable of revealing malware infections, exploitation attempts, or even buggy (exploitable?) system code. Such insights are critical for defense and offense, empowering us to either protect or exploit macOS systems.

objective-see EN 2024 crash-report course Hidden analysis macos
Troy Hunt: Inside the "3 Billion People" National Public Data Breach https://www.troyhunt.com/inside-the-3-billion-people-national-public-data-breach/
15/08/2024 06:24:37
QRCode
archive.org
thumbnail

I decided to write this post because there's no concise way to explain the nuances of what's being described as one of the largest data breaches ever. Usually, it's easy to articulate a data breach; a service people provide their information to had someone snag it through an act of unauthorised access and publish a discrete corpus of information that can be attributed back to that source. But in the case of National Public Data, we're talking about a data aggregator most people had never heard of where a "threat actor" has published various partial sets of data with no clear way to attribute it back to the source. And they're already the subject of a class action, to add yet another variable into the mix. I've been collating information related to this incident over the last couple of months, so let me talk about what's known about the incident, what data is circulating and what remains a bit of a mystery.

troyhunt EN 2024 3billion National Public Data Breach data-breach USDoD
A Single Iranian Hacker Group Targeted Both Presidential Campaigns https://www.wired.com/story/iran-apt42-trump-biden-harris-phishing-targeting/
15/08/2024 06:24:28
QRCode
archive.org
thumbnail

APT42, which is believed to work for Iran’s Revolutionary Guard Corps, targeted about a dozen people associated with both Trump’s and Biden’s campaigns this spring, according to Google’s Threat Analysis Group.

iran elections joe biden politics harris cybersecurity kamala donald trump hacking phishing
Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters | WIRED https://www.wired.com/story/shimano-wireless-bicycle-shifter-jamming-replay-attacks/
14/08/2024 19:55:52
QRCode
archive.org
thumbnail

Please don’t, actually. But do update your Shimano Di2 shifters’ software to prevent a new radio-based form of cycling sabotage.
#bicycles #cyberattacks #cybersecurity #cycling #fitness #hacks #security

wired EN 2024 fitness hacks Shimano cycling
Inside the FBI's Dashboard for Wiretapping the World https://www.404media.co/inside-the-fbis-dashboard-for-wiretapping-the-world/?ref=daily-stories-newsletter
14/08/2024 18:15:09
QRCode
archive.org
thumbnail

Never-before-published screenshots of an internal FBI tool show how the agency monitored millions of messages from the secretly backdoored messaging app Anom.

404media EN 2024 Anom images dahsboard FBI
page 76 / 235
4695 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio