Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 80 / 234
Cyberattack hits blood-donation nonprofit OneBlood https://edition.cnn.com/2024/07/31/politics/cyberattack-oneblood-blood-donation/
01/08/2024 06:57:34
QRCode
archive.org
thumbnail

A cyberattack has hit a blood-donation nonprofit that serves hundreds of hospitals in the southeastern US.

The hack, which was first reported by CNN, has raised concerns about potential impacts on OneBlood’s service to some hospitals, multiple sources familiar with the matter said, and the incident is being investigated as a potential ransomware attack.

cnn EN 2024 cyberattack US OneBlood Healthcare ransomware incident
Microsoft says massive Azure outage was caused by DDoS attack https://www.bleepingcomputer.com/news/microsoft/microsoft-says-massive-azure-outage-was-caused-by-ddos-attack/
01/08/2024 06:50:42
QRCode
archive.org
thumbnail

Microsoft confirmed today that a nine-hour outage on Tuesday, which took down and disrupted multiple Microsoft 365 and Azure services worldwide, was triggered by a distributed denial-of-service (DDoS) attack.

bleepingcomputer EN 2024 Denial-of-Service 365 DDoS Distributed Outage Microsoft Azure
Google ads push fake Google Authenticator site installing malware https://www.bleepingcomputer.com/news/security/google-ads-push-fake-google-authenticator-site-installing-malware/
31/07/2024 19:49:22
QRCode
archive.org
thumbnail

Google has fallen victim to its own ad platform, allowing threat actors to create fake Google Authenticator ads that push the DeerStealer information-stealing malware.

bleepingcomputer EN 2024 Malvertising Security Authenticator Info Stealer Malware Google
La Bourse suisse interrompt ses transactions pendant plusieurs heures https://www.ictjournal.ch/news/2024-07-31/la-bourse-suisse-interrompt-ses-transactions-pendant-plusieurs-heures
31/07/2024 17:51:23
QRCode
archive.org
thumbnail

Les transactions à la Bourse suisse ont été suspendues ce mercredi après une panne technique empêchant la diffusion

ictjournal FR CH 2024 Suisse bourse transactions suspendues panne
New Mandrake Android spyware version discovered on Google Play | Securelist https://securelist.com/mandrake-apps-return-to-google-play/113147/
30/07/2024 21:53:47
QRCode
archive.org
thumbnail

Mandrake spyware threat actors resume attacks with new functionality targeting Android devices while being publicly available on Google Play.

securelist EN 2024 Google-Android Google-Play Malware-Descriptions Mobile-Malware Spyware Mandrake Android
French fiber optic cables hit by ‘major sabotage’ in second Olympics attack https://www.politico.eu/article/french-fiber-optic-cable-hit-with-alleged-acts-of-sabotage/
30/07/2024 21:14:51
QRCode
archive.org
thumbnail

The attack comes a few days after a coordinated arson assault on the French rail network.

politico EN 2024 France Gerald-Darmanin Infrastructure sabotage
Hackers Exploited a PC Driving Sim to Pull Off Massive Disney Data Breach https://www.thedrive.com/news/culture/hackers-exploited-a-pc-driving-sim-to-pull-off-massive-disney-data-breach
30/07/2024 17:11:53
QRCode
archive.org
thumbnail

A Disney employee downloaded what they thought was a safe add-on for video game BeamNG.drive, but it was anything but.

thedrive EN 2024 Hackers mod data-breach add-on game BeamNG
Ferrari exec foils deepfake plot by asking a question only the CEO could answer https://fortune.com/2024/07/27/ferrari-deepfake-attempt-scammer-security-question-ceo-benedetto-vigna-cybersecurity-ai/
30/07/2024 17:07:56
QRCode
archive.org
thumbnail

“Sorry, Benedetto, but I need to identify you,” the executive said.

fortune EN 2024 Ferrari deepfake CEO-fraud foils scam security-question
Websites are Blocking the Wrong AI Scrapers (Because AI Companies Keep Making New Ones) https://www.404media.co/websites-are-blocking-the-wrong-ai-scrapers-because-ai-companies-keep-making-new-ones/
30/07/2024 10:28:49
QRCode
archive.org
thumbnail

Hundreds of sites have put old Anthropic scrapers on their blocklist, while leaving a new one unblocked.

404media EN 2024 robots.txt bots AI scrapers blocklist
CrowdStrike's Impact on Aviation https://heavymeta.org/2024/07/28/crowdstrikes-impact-on-aviation.html
29/07/2024 22:21:14
QRCode
archive.org
thumbnail

Just after midnight Eastern Time on July 19, 2024, the enterprise cybersecurity company CrowdStrike YOLOed a software update to millions of Windows machines. Or as they put it:

On July 19, 2024 at 04:09 UTC, as part of ongoing operations, CrowdStrike released a sensor configuration update to Windows systems.

That sensor configuration update caused the largest IT outage in history.

heavymeta EN 2024 CrowdStrike incident impact aviation data stats
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/
29/07/2024 18:47:07
QRCode
archive.org
thumbnail

Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions on domain-joined ESXi hypervisors. ESXi is a bare-metal hypervisor that is installed directly onto a physical server and provides direct access and control of underlying resources. ESXi hypervisors host virtual machines that may include critical servers in a network. In a ransomware attack, having full administrative permission on an ESXi hypervisor can mean that the threat actor can encrypt the file system, which may affect the ability of the hosted servers to run and function. It also allows the threat actor to access hosted VMs and possibly to exfiltrate data or move laterally within the network.

microsoft EN 2024 ESXi hypervisors Ransomware encrypt CVE-2024-37085 Storm-0506 Storm-1175 OctoTempest
TikTok Has a Nazi Problem https://www.wired.com/story/tiktok-nazi-content-moderation/
29/07/2024 18:46:37
QRCode
archive.org
thumbnail

Not only is TikTok’s algorithm promoting Neo-Nazi content, extremist organizations are also using the platform to recruit new members and encourage real-world action.
#content #extremism #media #moderation #nazis #social #tiktok

wired EN 2024 social extremism tiktok moderation media nazis
LummaC2 Malware Abusing the Game Platform 'Steam' - ASEC BLOG https://asec.ahnlab.com/en/68309/
29/07/2024 09:29:05
QRCode
archive.org
thumbnail

LummaC2 is an Infostealer that is being actively distributed, disguised as illegal programs (e.g. cracks, keygens, and game hacking programs) available from distribution websites, YouTube, and LinkedIn using the SEO poisoning technique. Recently, it has also been distributed via search engine ads, posing as web pages of Notion, Slack, Capcut, etc.

Reference: Distribution of MSIX Malware Disguised as Notion Installer

ahnlab EN 2024 LummaC2 Infostealer steam craks keygens SEO-poisoning MSIX Notion Installer
Meta nukes massive Instagram sextortion network of 63,000 accounts https://www.bleepingcomputer.com/news/security/meta-nukes-massive-instagram-sextortion-network-of-63-000-accounts/
29/07/2024 09:28:46
QRCode
archive.org
thumbnail

Meta has removed 63,000 Instagram accounts from Nigeria that were involved in sextortion scams, including a coordinated network of 2,500 accounts linked to 20 individuals targeting primarily adult men in the United States.
#Computer #Facebook #InfoSec #Instagram #Media #Meta #Scam #Security #Sextortion #Social

bleepingcomputer EN 2024 Facebook Sextortion Media Meta Scam Instagram Social
SwRI evaluates cybersecurity risks associated with EV fast-charging equipment | Southwest Research Institute https://www.swri.org/press-release/swri-evaluates-cybersecurity-risks-associated-ev-fast-charging-equipment?ref=news.risky.biz
29/07/2024 09:28:02
QRCode
archive.org
thumbnail

Engineers at Southwest Research Institute have identified cybersecurity vulnerabilities with electric vehicles (EVs) using direct current fast-charging systems, the quickest, commonly used way to charge electric vehicles. The high-voltage technology relies on power line communication (PLC) technology to transmit smart-grid data between vehicles and charging equipment.

In a laboratory, the SwRI team exploited vulnerabilities in the PLC layer, gaining access to network keys and digital addresses on both the charger and the vehicle.

swri EN 2024 electric vehicles vulnerabilities PLC vehicles charging equipment
Mid-year Doppelgänger information operations in Europe and the US https://harfanglab.io/en/insidethelab/doppelganger-operations-europe-us/?ref=news.risky.biz
29/07/2024 09:27:34
QRCode
archive.org
thumbnail

This report delves into Doppelgänger information operations conducted by Russian actors, focusing on their activities from early June to late-July 2024. Our investigation was motivated by the unexpected snap general election in France, prompting a closer look at Doppelgänger activities during this period.

While recent activities have been described since1,2, our first dive into the information operations topic offers a complementary threat-intelligence analysts’ perspective on the matter, brings additional knowledge on associated infrastructure, tactics and motivation in Europe and the United States.

HarfangLab EN 2024 Russia Doppelgänger disinformation report
Malicious Python Package Targets macOS Developers https://checkmarx.com/blog/malicious-python-package-targets-macos-developers-to-access-their-gcp-accounts/?ref=news.risky.biz
29/07/2024 09:26:47
QRCode
archive.org
thumbnail
  • A package called “lr-utils-lib” was uploaded to PyPi in early June 2024, containing malicious code that executes automatically upon installation.
  • The malware uses a list of predefined hashes to target specific macOS machines and attempts to harvest Google Cloud authentication data.
  • The harvested credentials are sent to a remote server.
checkmarx EN 2024 macOS stealer Supply-chain-attack PyPI pypi-malware lr-utils-lib developpers
SeleniumGreed Cryptomining Campaign Exploiting Grid Services | Wiz Blog https://www.wiz.io/blog/seleniumgreed-cryptomining-exploit-attack-flow-remediation-steps?ref=news.risky.biz
29/07/2024 09:26:28
QRCode
archive.org
thumbnail

SeleniumGreed is an active crypto-mining campaign targeting older versions of Grid services. Explore the risks, attack methods, and essential security measures.

  • Wiz Research has detected an ongoing threat campaign that exploits exposed Selenium Grid services for cryptomining, dubbed “SeleniumGreed”.

  • Selenium is among the most commonly used testing frameworks. Our data shows that the technology can be found in 30% of cloud environments, and the official selenium/hub docker image has over 100 million pulls in Docker Hub.

  • Unbeknownst to most users, Selenium WebDriver API enables full interaction with the machine itself, including reading and downloading files, and running remote commands.

  • By default, authentication is not enabled for this service. This means that many publicly accessible instances are misconfigured and can be accessed by anyone and abused for malicious purposes.

  • We have identified a threat actor targeting publicly exposed instances of Selenium Grid and leveraging features of Selenium WebDriver API to run Python with a reverse shell to deploy scripts that download a XMRig miner.

  • The threat actor is still active as of this blog post’s date of publication.

  • We believe this is the first documentation of this misconfiguration being exploited in the wild.

wiz EN 2024 SeleniumGreed Selenium XMRig crypto-mining campaign
Crooks Bypassed Google’s Email Verification to Create Workspace Accounts, Access 3rd-Party Services https://krebsonsecurity.com/2024/07/crooks-bypassed-googles-email-verification-to-create-workspace-accounts-access-3rd-party-services/
29/07/2024 09:21:01
QRCode
archive.org

Google says it recently fixed an authentication weakness that allowed crooks to circumvent the email verification required to create a Google Workspace account, and leverage that to impersonate a domain holder at third-party services that allow logins through Google’s “Sign in with Google” feature.

krebsonsecurity EN 2024 Google authentication weakness Bypassed Workspace
Windows Security best practices for integrating and managing security tools https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/
29/07/2024 09:20:15
QRCode
archive.org
thumbnail

In this blog post, we examine the recent CrowdStrike outage and provide a technical overview of the root cause. We also explain why security products use kernel-mode drivers today and the safety measures Windows provides for third-party solutions. In addition, we share how customers and security vendors can better leverage the integrated security capabilities of Windows for increased security and reliability. Lastly, we provide a look into how Windows will enhance extensibility for future security products.

microsoft EN 2024 CrowdStrike outage incident technical-overview
page 80 / 234
4670 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio