Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 77 / 204
4080 résultats taggé EN  ✕
regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
01/07/2024 11:31:14
QRCode
archive.org
thumbnail

The Qualys Threat Research Unit (TRU) has discovered a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) in glibc-based Linux…

qualys EN 2024 OpenSSH regreSSHion CVE-2024-6387
Meet Brain Cipher — The new ransomware behind Indonesia's data center attack https://www.bleepingcomputer.com/news/security/meet-brain-cipher-the-new-ransomware-behind-indonesia-data-center-attack/
30/06/2024 15:13:03
QRCode
archive.org
thumbnail

The new Brain Cipher ransomware operation has begun targeting organizations worldwide, gaining media attention for a recent attack on Indonesia's temporary National Data Center.

bleepingcomputer EN 2024 Brain-Cipher Data-Theft Double-Extortion LockBit Ransomware Indonesia
New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities https://thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
30/06/2024 11:41:28
QRCode
archive.org
thumbnail

Researchers unveil SnailLoad, a new side-channel attack exploiting network latency to infer web activity remotely, achieving up to 98% accuracy in vid

thehackernews EN 2024 SnailLoad Attack side-channel attack network latency
New Medusa malware variants target Android users in seven countries https://www.bleepingcomputer.com/news/security/new-medusa-malware-variants-target-android-users-in-seven-countries/
30/06/2024 11:40:32
QRCode
archive.org
thumbnail

The Medusa banking trojan for Android has re-emerged after almost a year of keeping a lower profile in campaigns targeting France, Italy, the United States, Canada, Spain, the United Kingdom, and Turkey.

bleepingcomputer EN 2024 Android Banking-Trojan Malware Medusa Mobile Smishing
Polyfill claims it has been 'defamed', returns after domain shut down https://www.bleepingcomputer.com/news/security/polyfill-claims-it-has-been-defamed-returns-after-domain-shut-down/
30/06/2024 11:39:02
QRCode
archive.org
thumbnail

The owners of Polyfill.io have relaunched the JavaScript CDN service on a new domain after polyfill.io was shut down as researchers exposed it was delivering malicious code on upwards of 100,000 websites.. The Polyfill service claims that it has been 

bleepingcomputer EN 2024 CDN Polyfill.io Supply-Chain-Attack
ID Verification Service for TikTok, Uber, X Exposed Driver Licenses https://www.404media.co/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix/
30/06/2024 11:36:16
QRCode
archive.org
thumbnail

As social networks and porn sites move towards a verified identity model, the actions of one cybersecurity researcher show that ID verification services themselves could get hacked too.

404media EN data-leak TikTok Uber X identity verification driver-licences
LockBit lied: Stolen data is from a bank, not US Federal Reserve https://www.bleepingcomputer.com/news/security/lockbit-lied-stolen-data-is-from-a-bank-not-us-federal-reserve/
30/06/2024 11:35:00
QRCode
archive.org
thumbnail

Recently-disrupted LockBit ransomware group, in a desperate attempt to make a comeback, claimed this week that it had hit the Federal Reserve, the central bank of the United States. Except, the rumor has been quashed.

bleepingcomputer EN 2024 Federal-Reserve-Bank LockBit LockBit-2.0 LockBit-3.0
CVE-2024-5261 | LibreOffice - Free and private office suite - Based on OpenOffice - Compatible with Microsoft https://www.libreoffice.org/about-us/security/advisories/cve-2024-5261/
29/06/2024 17:25:09
QRCode
archive.org

LibreOfficeKit can be used for accessing LibreOffice functionality through C/C++. Typically this is used by third party components to reuse LibreOffice as a library to convert, view or otherwise interact with documents.

LibreOffice internally makes use of "curl" to fetch remote resources such as images hosted on webservers.

libreoffice EN 2024 LibreOfficeKit advisroy CVE-2024-5261 LibreOffice
Hubspot says it's investigating customer account hacks | TechCrunch https://techcrunch.com/2024/06/28/hubspot-says-its-investigating-customer-account-hacks/
28/06/2024 20:36:33
QRCode
archive.org
thumbnail

The company “identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain unauthorized access to their accounts” on June 22.

techcrunch EN 2024 Hubspot incident unauthorized access
Indonesia president orders audit of data centres after cyberattack https://www.reuters.com/technology/cybersecurity/bulk-indonesia-data-hit-by-cyberattack-not-backed-up-officials-say-2024-06-28/#:~:text=JAKARTA%2C%20June%2028%20(Reuters),country's%20vulnerability%20to%20such%20attacks
28/06/2024 13:53:44
QRCode
archive.org

Indonesian President Joko Widodo ordered on Friday an audit of government data centres after officials said the bulk of data affected by a recent ransomware cyberattack was not backed up, exposing the country's vulnerability to such attacks.
Last week's cyberattack, the worst in Indonesia in recent years, has disrupted multiple government services including immigration and operations at major airports.

reuters EN 2024 Indonesia ransomware audit government airports data-centers
Critical GitLab bug lets attackers run pipelines as any user https://www.bleepingcomputer.com/news/security/critical-gitlab-bug-lets-attackers-run-pipelines-as-any-user/
27/06/2024 17:23:35
QRCode
archive.org
thumbnail

A critical vulnerability is affecting certain versions of GitLab Community and Enterprise Edition products, which could be exploited to run pipelines as any user.

bleepingcomputer EN 2024 GitLab Pipeline Security-Advisory Vulnerability
South Korean telecom company attacks torrent users with malware — over 600,000 customers report missing files, strange folders, and disabled PCs https://www.tomshardware.com/tech-industry/cyber-security/south-korean-telecom-company-attacks-torrent-users-with-malware-over-600000-people-report-missing-files-strange-folders-and-disabled-pcs
27/06/2024 14:26:33
QRCode
archive.org
thumbnail

Korean telecom company KT Corporation sent malware to its subscribers who use Webhard's Grid Service peer-to-peer sharing program to hide their files and stop them from using the service.

tomshardware EN 2024 South-Korea KTCorporation torrent malware
Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application https://thehackernews.com/2024/06/critical-sqli-vulnerability-found-in.html
27/06/2024 09:58:20
QRCode
archive.org
thumbnail

Critical security flaw in Fortra FileCatalyst Workflow allows database tampering. Patch available.

thehackernews EN 2024 Critical SQLi Vulnerability Fortra FileCatalyst Workflow Application CVE-2024-5276
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer
27/06/2024 08:47:39
QRCode
archive.org
thumbnail

P2Pinfect is a rust-based malware covered extensively by Cado Security in the past. Cado Security researchers first discovered it during triage of honeypot telemetry in July of 2023.

cadosecurity EN 2024 P2Pinfect Ransomware analysis
New P2Pinfect version delivers miners and ransomware on Redis servers https://securityaffairs.com/164968/malware/p2pinfect-delivers-miners-ransomware-on-redis.html
27/06/2024 08:45:03
QRCode
archive.org
thumbnail

Researchers warn that the P2Pinfect worm is targeting Redis servers with ransomware and cryptocurrency mining payloads.

securityaffairs EN 2024 Redis P2Pinfect ransomware mining payloads CVE-2022-0543
Progress Software elevates severity of new MOVEit bug to ‘critical’ as exploit attempts jump https://therecord.media/progress-software-elevates-severity-bug
27/06/2024 08:42:58
QRCode
archive.org
thumbnail

The company updated an advisory about a bug affecting the MOVEit tool, warning a “newly identified vulnerability in a third-party component" had elevated the risks.

therecord.media EN 2024 MOVEit Transfer CVE-2024-5806 bug exploited
Auth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806) https://labs.watchtowr.com/auth-bypass-in-un-limited-scenarios-progress-moveit-transfer-cve-2024-5806/
27/06/2024 08:41:16
QRCode
archive.org
thumbnail

Progress un-embargoed an authentication bypass vulnerability in Progress MOVEit Transfer.

Many sysadmins may remember last year’s CVE-2023-34362, a cataclysmic vulnerability in Progress MOVEit Transfer that sent ripples through the industry, claiming such high-profile victims as the BBC and FBI. Sensitive data was leaked, and sensitive data was destroyed, as the cl0p ransomware gang leveraged 0days to steal data - and ultimately leaving a trail of mayhem.

watchtowr.com EN 2024 MOVEit CVE-2024-5806 Analysis PoC
US accuses Russian of helping Kremlin hack Ukraine’s state computer systems https://therecord.media/us-accuses-russian-helping-kremlin
27/06/2024 08:28:51
QRCode
archive.org
thumbnail

According to the Department of Justice, 22-year-old Amin Stigal helped Russian military intelligence carry out cyber operations, including probing computers belonging to a federal government agency in Maryland.

therecord.media EN 2024 Russia Russia-Ukraine-war WhisperGate wiper US
Chinese Cyberspies Employ Ransomware in Attacks for Diversion https://www.bleepingcomputer.com/news/security/chinese-cyberspies-employ-ransomware-in-attacks-for-diversion/
27/06/2024 08:26:45
QRCode
archive.org
thumbnail

Cyberespionage groups have been using ransomware as a tactic to make attack attribution more challenging, distract defenders, or for a financial reward as a secondary goal to data theft.

bleepingcomputer EN 2024 APT BitLocker CatB ChamelGang Cyber-espionage Ransomware
ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware https://www.sentinelone.com/labs/chamelgang-attacking-critical-infrastructure-with-ransomware/
27/06/2024 08:26:03
QRCode
archive.org
thumbnail

Threat actors in the cyberespionage ecosystem are using ransomware for financial gain, disruption, distraction, misattribution, and the removal of evidence.

sentinelone EN 2024 ChamelGang Cyberespionage Critical-infrastructure Ransomware
page 77 / 204
4652 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio