Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 81 / 213
4246 résultats taggé E*N  ✕
Office of Public Affairs | Two Foreign Nationals Plead Guilty to Participating in LockBit Ransomware Group https://www.justice.gov/opa/pr/two-foreign-nationals-plead-guilty-participating-lockbit-ransomware-group
19/07/2024 09:52:38
QRCode
archive.org

Two foreign nationals pleaded guilty today to participating in the LockBit ransomware group—at various times the most prolific ransomware variant in the world—and to deploying LockBit attacks against victims in the United States and worldwide.

justice.gov EN 2024 LockBit guilty justice US
New hacker group uses open-source tools to spy on entities in Asia-Pacific region https://therecord.media/tag-100-espionage-hacking-backdoors-asia-pacific
19/07/2024 09:32:38
QRCode
archive.org
thumbnail

An operation labeled TAG-100 by Insikt Group researchers deploys two types of backdoor malware — SparkRAT and Pantegana — that have only been spotted in limited ways previously.

therecord.media EN 2024 TAG-100 SparkRAT Pantegana spy open-source tools
Critical Cisco bug lets hackers add root users on SEG devices https://www.bleepingcomputer.com/news/security/critical-cisco-bug-lets-hackers-add-root-users-on-seg-devices/amp/
19/07/2024 09:06:31
QRCode
archive.org
thumbnail

Cisco has fixed a critical severity vulnerability that lets attackers add new users with root privileges and permanently crash Security Email Gateway (SEG) appliances using emails with malicious attachments.

Tracked as CVE-2024-20401, this arbitrary file write security flaw in the SEG content scanning and message filtering features is caused by an absolute path traversal weakness that allows replacing any file on the underlying operating system.

bleepingcomputer EN 2024 Code InfoSec Execution Path Gateway Denial DoS Remote Cisco RCE CVE-2024-20401 SEG
Trello Data Breach: Hacker Dumps Personal Info of Millions of Users https://hackread.com/trello-data-breach-hacker-dumps-users-personal-info/
18/07/2024 23:39:02
QRCode
archive.org
thumbnail

Trello Data Breach: Trello, a project management tool developed by Atlassian, has experienced a data breach, exposing sensitive user information

hackread EN 2024 Trello Data-Breach
INTERPOL operation strikes major blow against West African financial crime https://www.interpol.int/en/News-and-Events/News/2024/INTERPOL-operation-strikes-major-blow-against-West-African-financial-crime
18/07/2024 23:37:50
QRCode
archive.org
thumbnail

Police seize millions in illegal assets, including cryptocurrencies and luxury items

interpol EN 2024 West-African financial crime busted
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI https://www.sentinelone.com/labs/nullbulge-threat-actor-masquerades-as-hacktivist-group-rebelling-against-ai/
18/07/2024 23:35:48
QRCode
archive.org
thumbnail

Actors are masquerading as hacktivists targeting AI-centric communities with commodity malware and customized LockBit payloads.

sentinelone EN 2024 NullBulge threat-actor hacktivists fake malware LockBit
Fake AWS Packages Ship Command and Control Malware In JPEG Files https://blog.phylum.io/fake-aws-packages-ship-command-and-control-malware-in-jpeg-files
18/07/2024 23:25:43
QRCode
archive.org
thumbnail

On July 13, 2024, the Phylum platform alerted us to a series of odd packages published to the npm package registry. At first glance, these packages appear entirely legitimate; however, as our system automatically noted, they contained sophisticated command and control functionality hidden in image files that would be executed

phylum EN 2024 AWS fake Supply-chain-attack npm package registry JPEG
FIN7 Reboot | Cybercrime Gang Enhances Ops with New EDR Bypasses and Automated Attacks https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enhances-ops-with-new-edr-bypasses-and-automated-attacks/
18/07/2024 23:23:54
QRCode
archive.org
thumbnail

This research explores how FIN7 has adopted automated attack methods and developed defense evasion techniques previously unseen in the wild.

sentinelone EN 2024 FIN7 EDR-Bypasses Bypasses defense-evasion
MediSecure reveals about 12.9 million Australians had personal data stolen by hackers in April | Australia news | The Guardian https://www.theguardian.com/australia-news/article/2024/jul/18/medisecure-reveals-about-129-million-australians-had-personal-data-stolen-by-hackers-in-april
18/07/2024 23:17:55
QRCode
archive.org
thumbnail

Company says it is unable to identify specific individuals affected by one of the largest breaches in Australian history

theguardian EN 2024 MediSecure data-leak Australia Data-Breach
Germany to ban Chinese companies' components from core parts of its 5G networks | AP News https://apnews.com/article/germany-china-huawei-zte-ban-5g-networks-fc969a68958f4a4b928ce0f8a1c32087?ref=news.risky.biz
18/07/2024 10:03:42
QRCode
archive.org
thumbnail

Germany's top security official says the country will bar the use of critical components made by Chinese companies Huawei and ZTE in core parts of its 5G networks in two steps starting in 2026.

apnews EN 2024 Germany ban China critical-components 5G
Iraq-based cybercriminals deploy malicious Python packages to steal data https://therecord.media/iraq-cybercriminals-python-based-infostealer-pypi?_hsenc=p2ANqtz-8qzrAM5mnOGvItSx2pDNTwWqQxyFNDlKq54MT8n5ivT3COdXjT71xW2nneojY19e5azWbfFrE35XlsGKxrTv7ncaVRzg&_hsmi=316193425
18/07/2024 09:54:38
QRCode
archive.org
thumbnail

An information-stealing script embedded in a Python package on the popular repository PyPI appears to be connected to a cybercriminal operation based in Iraq, according to researchers at Checkmarx.

therecord.media EN 2024 PyPI Python Infostealer Supply-chain-attack
Brief technical analysis of the "Poseidon Stealer" malware https://www.ncsc.admin.ch/ncsc/en/home/aktuell/im-fokus/2024/poseidon_bericht.html
17/07/2024 20:57:47
QRCode
archive.org

11.07.2024 - At the end of June 2024, cybercriminals spread the malware "Poseidon Stealer" in German-speaking Switzerland by email, using AGOV as a lure with the aim of infecting computers with the macOS operating system. The NCSC has now produced and published a brief technical analysis of the malware.
#news

NCSC CH EN Switzerland AGOV PoseidonStealer analysis
ClickFix Deception: A Social Engineering Tactic to Deploy Malware https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/
17/07/2024 10:29:10
QRCode
archive.org
thumbnail

Authored by Yashvi Shah and Vignesh Dhatchanamoorthy McAfee Labs has discovered a highly unusual method of malware delivery, referred to by researchers as

mcafee EN 2024 analysis ClickFix Deploy Malware Tactic
FBI Gains Access to Suspected Trump Shooter’s Password Locked Phone https://www.404media.co/fbi-gains-access-to-suspected-trump-shooters-password-locked-phone/
17/07/2024 09:02:49
QRCode
archive.org
thumbnail

The FBI announced on Monday it had successfully gained access to the phone used by Thomas Matthew Crooks, the suspected shooter in the attempted assassination of former President Donald Trump.

404media EN 2024 cracked phone FBI US Password-Locked
Uncoordinated Vulnerability Disclosure: The Continuing Issues with CVD https://www.zerodayinitiative.com/blog/2024/7/15/uncoordinated-vulnerability-disclosure-the-continuing-issues-with-cvd
16/07/2024 21:51:28
QRCode
archive.org
thumbnail

On patch Tuesday last week, Microsoft released an update for CVE-2024-38112, which they said was being exploited in the wild. We at the Trend Micro Zero Day Initiative (ZDI) agree with them because that’s what we told them back in May when we detected this exploit in the wild and reported it to Microsoft. However, you may notice that no one from Trend or ZDI was acknowledged by Microsoft. This case has become a microcosm of the problems with coordinated vulnerability disclosure (CVD) as vendors push for coordinated disclosure from researchers but rarely practice any coordination regarding the fix. This lack of transparency from vendors often leaves researchers who practice CVD with more questions than answers.

zerodayinitiative EN 2024 CVE-2024-38112 Microsoft CVD transparency disclosure
Kaspersky Lab Closing U.S. Division; Laying Off Workers https://www.zetter-zeroday.com/kaspersky-lab-closing-u-s-division-laying-off-workers-2/?ref=zero-day-newsletter
16/07/2024 10:02:11
QRCode
archive.org
thumbnail

Russian cybersecurity firm, Kaspersky Lab, has told workers in its U.S.-based division that they are being laid off this week and that it is closing its U.S. business, according to several sources. The sudden move comes after the U.S. Commerce Department announced last month that it was banning the sale of Kaspersky software in the U.S. beginning July 20. The company has been selling its software here since 2005.

zetter-zeroday EN 2024 Kaspersky US closed
AT&T Paid a Hacker $370,000 to Delete Stolen Phone Record https://www.wired.com/story/atandt-paid-hacker-300000-to-delete-stolen-call-records/
15/07/2024 20:45:22
QRCode
archive.org
thumbnail

A security researcher who assisted with the deal says he believes the only copy of the complete dataset of call and text records of “nearly all” AT&T customers has been wiped—but some risks may remain.

wired 2024 AT&T paid extortion data-leak customers
Critical Exim bug bypasses security filters on 1.5 million mail servers https://www.bleepingcomputer.com/news/security/critical-exim-bug-bypasses-security-filters-on-15-million-mail-servers/
13/07/2024 00:38:28
QRCode
archive.org
thumbnail

Censys warns that over 1.5 million Exim mail transfer agent (MTA) instances are unpatched against a critical vulnerability that lets threat actors bypass security filters.

bleepingcomputer EN 2024 Bypass Email Exim Mail Security-Bypass Vulnerability
Patch or Peril: A Veeam vulnerability incident https://www.group-ib.com/blog/estate-ransomware/
12/07/2024 22:21:57
QRCode
archive.org

Delaying security updates and neglecting regular reviews created vulnerabilities that were exploited by attackers, resulting in severe ransomware consequences.

  • Initial access via FortiGate Firewall SSL VPN using a dormant account
  • Deployed persistent backdoor (“svchost.exe”) on the failover server, and conducted lateral movement via RDP.
  • Exploitation attempts of CVE-2023-27532 was followed by activation of xp_cmdshell and rogue user account creation.
  • Threat actors made use of NetScan, AdFind, and various tools provided by NirSoft to conduct network discovery, enumeration, and credential harvesting.
  • Windows Defender was permanently disabled using DC.exe, followed by ransomware deployment and execution with PsExec.exe.
group-ib EN 2024 Veeam vulnerability incident ransomware FortiGate NirSoft
Doppelganger operation https://www.disinfo.eu/doppelganger-operation/
12/07/2024 12:41:59
QRCode
archive.org
thumbnail

This page is designed to gather a timeline of the Doppelganger operation with a few elements gathered from different reports.

disinfo.eu EN 2024 Doppelganger operation Russia disinformation EUDisinfoLab
page 81 / 213
4827 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn