Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 78 / 253
POLITICO Europe https://www.politico.eu/article/private-investigators-hack-state-security-data-milan-italy/
27/10/2024 16:53:18
QRCode
archive.org
thumbnail

Italian probe reveals “gigantic and alarming market of confidential data,” prosecutors say.

politico EN 2024 Banks Courts Cyber-Espionage Cybercrime Cybersecurity-and-Data-Protection Data Data-/-privacy Data-breaches Data-protection Fraud Hackers Intelligence Italy Law-enforcement Markets Milan Privacy Security Tax
Fog ransomware targets SonicWall VPNs to breach corporate networks https://www.bleepingcomputer.com/news/security/fog-ransomware-targets-sonicwall-vpns-to-breach-corporate-networks/
27/10/2024 15:39:07
QRCode
archive.org
thumbnail

Fog and Akira ransomware operators have increased their exploitation efforts of CVE-2024-40766, a critical access control flaw that allows unauthorized access to resources on the SSL VPN feature of SonicWall SonicOS firewalls.

bleepingcomputer EN 2024 Akira CVE-2024-40766 Firewall Fog-Ransomware SonicWall SSL-VPN
Italy police arrest four over alleged illegal database access, source says https://www.reuters.com/world/europe/italy-police-arrest-four-over-alleged-illegal-database-access-source-says-2024-10-26/?user_email=9e19aa6ed986d20195d4113ba5a6a3e709c18e0549688aa9b20d5f2e8d0dec05&lctg=6596a37f125992f7eb0b5ac9
26/10/2024 21:52:33
QRCode
archive.org

Italian police have placed four people under house arrest including Leonardo Maria Del Vecchio, son of the late billionaire founder of Luxottica, as part of a probe into alleged illegal access to state databases, a source said on Saturday.
A lawyer for Leonardo Maria Del Vecchio said he was "eagerly awaiting the completion of preliminary investigations to be able to prove he has nothing to do with the events in question and that charges laid against him have no basis.

reuters EN 2024 arrest illegal access databases confidential data sold blackmail
Reuters exposé of hack-for-hire world is back online after Indian court ruling https://www.reuters.com/world/india/reuters-expos-hack-for-hire-world-is-back-online-after-indian-court-ruling-2024-10-26/?user_email=9e19aa6ed986d20195d4113ba5a6a3e709c18e0549688aa9b20d5f2e8d0dec05&lctg=6596a37f125992f7eb0b5ac9
26/10/2024 21:50:13
QRCode
archive.org

Reuters News has restored to its website an investigation into mercenary hacking after a New Delhi court lifted a takedown order it issued last year.
The article, originally published on Nov. 16, 2023, and titled “How an Indian startup hacked the world,” detailed the origins and operations of a New Delhi-based cybersecurity firm called Appin. Reuters found that Appin grew from an educational startup to a hack-for-hire powerhouse that stole secrets from executives, politicians and wealthy elites around the globe.

reuters EN 2024 mercenary hacking India Appin rule hack-for-hire
New Windows Driver Signature bypass allows kernel rootkit installs https://www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/
26/10/2024 19:05:48
QRCode
archive.org
thumbnail

Attackers can downgrade Windows kernel components to bypass security features such as Driver Signature Enforcement and deploy rootkits on fully patched systems.
#Attack #Bypass #Computer #Downgrade #Elevation #Escalation #InfoSec #Privilege #Privileges #Rootkit #Security #Windows #of

Privileges Computer Privilege Security Rootkit Elevation Escalation InfoSec Attack Bypass Downgrade Windows of
How Israel’s bulky pager fooled Hezbollah https://www.reuters.com/graphics/ISRAEL-PALESTINIANS/HEZBOLLAH-PAGERS/mopawkkwjpa/
26/10/2024 14:35:17
QRCode
archive.org
thumbnail

An invisible detonator and wafer-thin plastic explosives turned batteries into bombs

reuters EN 2024 invisible detonator Israel Hezbollah bomb pager
Akira ransomware continues to evolve https://blog.talosintelligence.com/akira-ransomware-continues-to-evolve/
26/10/2024 13:05:58
QRCode
archive.org
thumbnail

As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs.

talosintelligence EN 2024 Akira analysis ransomware group TTPs
Chinese Hackers Are Said to Have Targeted Phones Used by Trump and Vance https://www.nytimes.com/2024/10/25/us/politics/trump-vance-hack.html?unlocked_article_code=1.U04.dkDJ.2aP0tmFEROpJ&smid=url-share
26/10/2024 12:59:39
QRCode
archive.org

The targeting of the Republican presidential ticket’s phones is part of what appears to be a wide-ranging effort to gather information about American leaders.

nytimes EN 2024 US presidential China Verizon intelligence-collection
Rubavano informazioni da banche dati strategiche e nazionali: sei indagati. Spiati anche alcuni politici https://www.open.online/2024/10/25/banche-dati-polizia-misure-cautelari-inchiesta-spiati-politici/
26/10/2024 00:22:03
QRCode
archive.org
thumbnail

Quattro le persone ai domiciliari e due sotto misura interdettiva. Tra loro appartenenti o ex delle forze dell'ordine e hacker

open.online IT 2024 Italia hackers spie politici polizia dati ladri Milano
Fake IT Workers: How HYPR Stopped a Fraudulent Hire https://blog.hypr.com/hypr-unmasks-fake-it-worker
25/10/2024 16:31:33
QRCode
archive.org
thumbnail

HYPR recently experienced a fake IT worker attempting to gain employment. We are sharing the details to bring awareness to how widespread the problem is.

hypr EN 2024 fake IT worker
Embargo ransomware: Rock’n’Rust https://www.welivesecurity.com/en/eset-research/embargo-ransomware-rocknrust/
25/10/2024 09:12:20
QRCode
archive.org
thumbnail

ESET researchers uncover new Rust-based tools that we named MDeployer and MS4Killer and that are actively utilized by a new ransomware group called Embargo.

welivesecurity EN 2024 Embargo ransomware analysis
The Global Surveillance Free-for-All in Mobile Ad Data – Krebs on Security https://krebsonsecurity.com/2024/10/the-global-surveillance-free-for-all-in-mobile-ad-data/
25/10/2024 09:11:35
QRCode
archive.org

Not long ago, the ability to remotely track someone’s daily movements just by knowing their home address, employer, or place of worship was considered a powerful surveillance tool that should only be in the purview of nation states. But a…

krebsonsecurity EN 2024 Global Surveillance Free-for-All BabelStreet Venntel
Triad Nexus: Silent Push exposes FUNNULL CDN hosting DGA domains for suspect Chinese gambling sites, investment scams, a retail phishing campaign, and a polyfill.io supply chain attack impacting 110,000+ sites https://www.silentpush.com/blog/triad-nexus-funnull/
25/10/2024 08:59:33
QRCode
archive.org
thumbnail

Key findings Executive summary Background Join the Silent Push Community Sign up for a free Silent Push Community account FUNNULL and fake trading apps FUNNULL’s CDN, rising up from corrupted soil Additional hostname analysis FUNNULL CNAME chains An in-depth look at FUNNULL’s corporate brand Suncity Group connections Suncity Group-related infrastructure accounted for more than 6,500

silentpush EN 2024 FUNNULL CDN Polyfill.io Supply-chain-attack
Apple Shares Private Cloud Compute Virtual Research Environment, Provides Bounties for Vulnerabilities - MacRumors https://www.macrumors.com/2024/10/24/apple-private-cloud-compute-security-info/
25/10/2024 08:13:02
QRCode
archive.org
thumbnail

Private Cloud Compute is a cloud intelligence system that Apple designed for private artificial intelligence processing, and it's what Apple is...

macrumors EN 2024 Apple Cloud Compute private artificial intelligence Bounty processing
Encrypted Chat App ‘Session’ Leaves Australia After Visit From Police https://www.404media.co/email/348bad40-82a3-44df-9243-a47dfeafd19a/
24/10/2024 09:37:27
QRCode
archive.org
thumbnail

After federal police came to an employee’s house to ask questions, encrypted messaging company Session has decided to leave Australia and switch to a foundation model based in Switzerland.

404media EN 2024 Encrypted Chat App Session Switzerland
macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools https://www.sentinelone.com/blog/macos-notlockbit-evolving-ransomware-samples-suggest-a-threat-actor-sharpening-its-tools/
23/10/2024 21:05:49
QRCode
archive.org
thumbnail

An unknown threat actor is developing ransomware to lock files and steal data on macOS, and it's not LockBit.

sentinelone EN 2024 macOS NotLockBit ransomware
Fortinet FortiManager CVE-2024-47575 Exploited in Zero-Day Attacks https://www.rapid7.com/blog/post/2024/10/23/etr-fortinet-fortimanager-cve-2024-47575-exploited-in-zero-day-attacks/
23/10/2024 18:45:31
QRCode
archive.org
thumbnail

On Wednesday, October 23, 2024, security company Fortinet published an advisory on CVE-2024-47575, a critical zero-day vulnerability affecting their FortiManager network management solution. The vulnerability arises from a missing authentication for a critical function [CWE-306] in the FortiManager fgfmd daemon that allows a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests. The vulnerability carries a CVSS v3 score of 9.8.

rapid7 EN 2024 Fortinet FortiManager CVE-2024-47575 Zero-Day
Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks https://thehackernews.com/2024/10/ransomware-gangs-use-lockbits-fame-to.html
23/10/2024 11:56:42
QRCode
archive.org
thumbnail

Threat actors exploit Amazon S3 in ransomware attacks, using AWS credentials for data theft.

thehackernews EN 2024 Ransomware Gangs LockBit disguise Golang
ShadyShader: Crashing Apple Devices with a Single Click https://www.imperva.com/blog/shadyshader-crashing-apple-m-series-with-single-click/
23/10/2024 11:41:59
QRCode
archive.org
thumbnail

ShadyShader: Crashing Apple M-Series Devices with a Single Click

imperva EN 2024 ShadyShader Apple M-Series Click crash
Rogue RDP – Revisiting Initial Access Methods https://www.blackhillsinfosec.com/rogue-rdp-revisiting-initial-access-methods/
23/10/2024 11:37:28
QRCode
archive.org
thumbnail

MThe Hunt for Initial Access With the default disablement of VBA macros originating from the internet, Microsoft may be pitching a curveball to threat actors and red […]

blackhillsinfosec EN 2022 Rogue RDP Initial-Access
page 78 / 253
5048 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn