Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 8 / 76
1513 résultats taggé 2024  ✕
Malicious Ads in Search Results Are Driving New Generations of Scams | WIRED https://www.wired.com/story/malicious-ads-in-search-results-are-driving-new-generations-of-scams/
05/12/2024 09:02:29
QRCode
archive.org
thumbnail

The scourge of “malvertising” is nothing new, but the tactic is still so effective that it's contributing to the rise of investment scams and the spread of new strains of malware.

wired EN 2024 Malicious Ads malvertising malware
iVerify Mobile Threat Investigation Uncovers New Pegasus Samples https://iverify.io/blog/iverify-mobile-threat-investigation-uncovers-new-pegasus-samples
05/12/2024 09:01:20
QRCode
archive.org
thumbnail

iVerify’s Mobile Threat Hunting finds Pegasus spyware is more prevalent and capable of infecting a wide range of devices, not just devices of high-risk users.

iVerify EN 2024 Mobile Threat Investigation Uncovers Pegasus
Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud https://www.ic3.gov/PSA/2024/PSA241203
04/12/2024 09:10:07
QRCode
archive.org

The FBI is warning the public that criminals exploit generative artificial intelligence (AI) to commit fraud on a larger scale which increases the believability of their schemes. Generative AI reduces the time and effort criminals must expend to deceive their targets. Generative AI takes what it has learned from examples input by a user and synthesizes something entirely new based on that information. These tools assist with content creation and can correct for human errors that might otherwise serve as warning signs of fraud. The creation or distribution of synthetic content is not inherently illegal; however, synthetic content can be used to facilitate crimes, such as fraud and extortion.1 Since it can be difficult to identify when content is AI-generated, the FBI is providing the following examples of how criminals may use generative AI in their fraud schemes to increase public recognition and scrutiny.

ic3.gov EN 2024 warning Criminals Use Generative AI Financial Fraud recommandations
Police seize Matrix encrypted chat service after spying on criminals https://www.bleepingcomputer.com/news/security/police-seize-matrix-encrypted-chat-service-after-spying-on-criminals/
03/12/2024 16:43:04
QRCode
archive.org
thumbnail

An international law enforcement operation codenamed 'Operation Passionflower' has shut down MATRIX, an encrypted messaging platform used by cybercriminals to coordinate illegal activities while evading police.

bleepingcomputer EN 2024 Arrest Encrypted-Chat Encrypted-Messaging Europol Matrix
CVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMaster - Rhino Security Labs https://rhinosecuritylabs.com/research/cve-2024-1212unauthenticated-command-injection-in-progress-kemp-loadmaster/
03/12/2024 15:37:41
QRCode
archive.org
thumbnail

CVE-2024-1212 is an unauthenticated command injection found in Progress Kemp LoadMaster load balancer's administrator web interface by Rhino Security Labs.

rhinosecuritylabs EN 2024 vulnerability Progress Kemp LoadMaster unauthenticated command injection
Windows Server 2012 Mark of the Web Vulnerability (0day) - and Free Micropatches for it https://blog.0patch.com/2024/11/windows-server-2012-mark-of-web.html
03/12/2024 09:33:44
QRCode
archive.org
thumbnail

Our researchers discovered a previously unknown vulnerability on Windows Server 2012 and Server 2012 R2 that allows an attacker to bypass a ...

0patch EN 2024 WindowsServer2012 0day Mark-of-the-Web Vulnerability
Poland arrests former spy chief in Pegasus spyware probe https://techcrunch.com/2024/12/02/poland-arrests-former-spy-chief-in-pegasus-spyware-probe/
03/12/2024 09:01:50
QRCode
archive.org
thumbnail

The former head of Poland’s internal security agency Piotr Pogonowski was forced to appear in front of a parliamentary committee investigating the alleged abuse of Pegasus spyware in the country.

techcrunch EN 2024 Pegasus Poland arrest parliamentary committee
Energy industry contractor says ransomware attack has limited access to IT systems | The Record from Recorded Future News https://therecord.media/energy-industry-contractor-ransomware-disruption
03/12/2024 08:05:50
QRCode
archive.org
thumbnail

The company, ENGlobal Corporation, has restricted employee access to its IT system, limiting it to only essential business operations.

therecord.media EN 2024 ENGlobal Corporation ransomware attack
AWS launches an incident response service to combat cybersecurity threats | TechCrunch https://techcrunch.com/2024/12/01/aws-launches-an-incident-response-service-to-combat-cybersecurity-threats/
02/12/2024 23:15:22
QRCode
archive.org
thumbnail

Amazon has launched AWS Security Incident Response, a service to help triage and respond to cybersecurity threats.

techcrunch EN 2024 Amazon AWS Security Incident Response service launch
Data broker exposes 600,000 sensitive files including background checks https://www.malwarebytes.com/blog/news/2024/11/data-broker-exposes-600000-sensitive-files-including-background-checks
02/12/2024 23:14:23
QRCode
archive.org
thumbnail

A researcher has discovered a data broker had stored 644,869 PDF files in a publicly accessible cloud storage container.

malwarebytes EN 2024 researcher data-broker PDF data-leak background checks
UN, international orgs create advisory body for submarine cables after incidents | The Record from Recorded Future News https://therecord.media/un-international-orgs-create-advisory-body-submarine-cables
02/12/2024 13:12:09
QRCode
archive.org
thumbnail

On Friday, the United Nations Agency for Digital Technologies said it is partnering with the International Telecommunication Union (ITU) and International Cable Protection Committee (ICPC) to create the International Advisory Body for Submarine Cable Resilience.

therecord.media EN 2024 UN submarine cables advisory body ICPC Resilience
The Curious Case of an Egg-Cellent Resume https://thedfirreport.com/2024/12/02/the-curious-case-of-an-egg-cellent-resume/#services
02/12/2024 09:33:50
QRCode
archive.org
  • Initial access was via a resume lure as part of a TA4557/FIN6 campaign.
  • The threat actor abused LOLbins like ie4uinit.exe and msxsl.exe to run the more_eggs malware.
  • Cobalt Strike and python-based C2 Pyramid were employed by the threat actor for post-exploitation activity.
  • The threat actor abused CVE-2023-27532 to exploit a Veeam server and facilitate lateral movement and privilege escalation activities.
  • The threat actor installed Cloudflared to assist in tunneling RDP traffic.
  • This case was first published as a Private Threat Brief for customers in April of 2024.
  • Eight new rules were created from this report and added to our Private Detection Ruleset.
thedfirreport EN 2024 Egg-Cellent Resume lure CV Resume Cloudflared
Plusieurs tentatives: L'État luxembourgeois visé par des cyberattaques https://infos.rtl.lu/actu/luxembourg/a/2253791.html
01/12/2024 16:23:20
QRCode
archive.org
thumbnail

Après une première attaque au printemps, les sites de l'État luxembourgeois ont été à nouveau visés le 23 octobre dernier par une attaque "DDoS".

rtl.lu FR 2024 DDoS Luxembourg attaque
Gaming Engines: An Undetected Playground for Malware Loaders https://research.checkpoint.com/2024/gaming-engines-an-undetected-playground-for-malware-loaders/
01/12/2024 16:12:41
QRCode
archive.org
thumbnail
  • Check Point Research discovered a new technique taking advantage of Godot Engine, a popular open-source game engine, to execute crafted GDScript, code which triggers malicious commands and delivers malware. The technique remains undetected by almost all antivirus engines in VirusTotal.
  • Check Point identified GodLoader, a loader that employs this new technique. The threat actor behind this malware has been utilizing it since June 29, 2024, infecting over 17,000 machines
  • The malicious GodLoader is distributed by the Stargazers Ghost Network, a GitHub network that distributes malware as a service. Throughout September and October, approximately 200 repositories and over 225 Stargazers were used to legitimize the repositories distributing the malware.
  • This new technique allows threat actors to target and infect devices across multiple platforms, such as Windows, macOS, Linux, Android, and iOS.
  • Check Point Research demonstrates how this multi-platform technique can successfully drop payloads in Linux and MacOS.
  • A potential attack can target over 1.2 million users of Godot-developed games. These scenarios involve taking advantage of legitimate Godot executables to load malicious scripts in the form of mods or other downloadable content.
checkpoint EN 2024 GodLoader Godot Engine game payloads analysis
Starbucks, grocery stores impacted by Blue Yonder ransomware attack - Help Net Security https://www.helpnetsecurity.com/2024/11/26/starbucks-blue-yonder-ransomware-attack/
01/12/2024 12:14:05
QRCode
archive.org
thumbnail

Supply chain management SaaS vendor Blue Yonder experienced a ransomware attack that impacted big companies like Starbucks.

helpnetsecurity EN 2024 Starbucks BlueYonder ransomware
RobotDropper Automates the Delivery of Multiple Infostealers https://blogs.blackberry.com/en/2024/11/robotdropper-automates-delivery-of-multiple-infostealers
01/12/2024 11:22:07
QRCode
archive.org
thumbnail

BlackBerry is tracking a new campaign that delivers Trojanized MSI files that utilize DLL sideloading to execute LegionLoader, a malicious program typically used to distribute multiple infostealers on the victim’s system.

blackberry EN 2024 Trojanized MSI files LegionLoader RobotDropper analysis
PHP Reinfector and Backdoor Malware Target WordPress Sites https://blog.sucuri.net/2024/11/php-reinfector-and-backdoor-malware-target-wordpress-sites.html
01/12/2024 11:21:08
QRCode
archive.org
thumbnail

Understand the threat of PHP reinfector malware on WordPress sites, compromising plugins like Imagify and using malicious admin users.

blog.sucuri EN 2024 Backdoor Malware WordPress PHP-Reinfector
Python Crypto Library Updated to Steal Private Keys https://blog.phylum.io/python-crypto-library-updated-to-steal-private-keys/
29/11/2024 23:18:25
QRCode
archive.org
thumbnail

Yesterday, Phylum's automated risk detection platform discovered that the PyPI package aiocpa was updated to include malicious code that steals private keys by exfiltrating them through Telegram when users initialize the crypto library. While the attacker published this malicious update to PyPI, they deliberately kept the package's GitHub repository clean

phylum EN 2024 Python Crypto Library PyPI malicious code aiocpa Supply-chain-attack
11 arrested in Europol shutdown of illegal IPTV streaming networks https://therecord.media/11-arrested-europol-streaming-shutdown
29/11/2024 13:59:33
QRCode
archive.org
thumbnail

In the takedown announced on Wednesday, Europol said it investigated 102 suspects and arrested 11 of them on accusations they were distributing content from streaming services illegally.

therecord.media EN 2024 Europol IPTV crackdown Interpol Operation HAECHI
UK hospital network postpones procedures after cyberattack https://www.bleepingcomputer.com/news/security/uk-hospital-network-postpones-procedures-after-cyberattack/
28/11/2024 15:54:50
QRCode
archive.org
thumbnail

Major UK healthcare provider Wirral University Teaching Hospital (WUTH), part of the NHS Foundation Trust, has suffered a cyberattack that caused a systems outage leading to postponing appointments and scheduled procedures.

bleepingcomputer EN 2024 Cyberattack Healthcare NHS Outage UK
page 8 / 76
4514 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio