Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 85 / 234
CVE-2024-4577 Exploits in the Wild One Day After Disclosure https://www.akamai.com/blog/security-research/2024-php-exploit-cve-one-day-after-disclosure
11/07/2024 09:04:42
QRCode
archive.org
  • The Akamai Security Intelligence Response Team (SIRT) has been monitoring activity surrounding CVE-2024-4577, a PHP vulnerability that affects installations running CGI mode that was disclosed in June 2024.

  • The vulnerability primarily affects Windows installations using Chinese and Japanese language locales, but it is possible that the vulnerability applies to a wider range of installations.

  • As early as one day after disclosure, the SIRT observed numerous exploit attempts to abuse this vulnerability, indicating high exploitability and quick adoption by threat actors.

  • The exploitations include command injection and multiple malware campaigns: Gh0st RAT, RedTail cryptominers, and XMRig.

  • Akamai App & API Protector has been automatically mitigating exploits that target our customers.

In this blog post, we’ve included a comprehensive list of indicators of compromise (IOCs) for the various exploits we discuss.

akamai EN 2024 php mass-exploitation CVE-2024-4577
How do cryptocurrency drainer phishing scams work? https://blog.talosintelligence.com/how-do-cryptocurrency-drainer-phishing-scams-work/
11/07/2024 07:20:05
QRCode
archive.org
thumbnail

In recent months, a surge in cryptodrainer phishing attacks has been observed, targeting cryptocurrency holders with sophisticated schemes aimed at tricking them into divulging their valuable credentials.

talosintelligence EN 2024 cryptodrainer phishing attacks analysis
Resurrecting Internet Explorer: Threat Actors Using Zero-day Tricks in Internet Shortcut File to Lure Victims (CVE-2024-38112) https://research.checkpoint.com/2024/resurrecting-internet-explorer-threat-actors-using-zero-day-tricks-in-internet-shortcut-file-to-lure-victims-cve-2024-38112/
10/07/2024 17:53:57
QRCode
archive.org
thumbnail

Check Point Research recently discovered that threat actors have been using novel (or previously unknown) tricks to lure Windows users for remote code execution. Specifically, the attackers used special Windows Internet Shortcut files (.url extension name), which, when clicked, would call the retired Internet Explorer (IE) to visit the attacker-controlled URL. An additional trick on IE is used to hide the malicious .hta extension name. By opening the URL with IE instead of the modern and much more secure Chrome/Edge browser on Windows, the attacker gained significant advantages in exploiting the victim’s computer, although the computer is running the modern Windows 10/11 operating system.

checkpoint EN 2024 Internet Shortcut Explorer CVE-2024-38112
Chinese APT40 hackers hijack SOHO routers to launch attacks https://www.bleepingcomputer.com/news/security/chinese-apt40-hackers-hijack-soho-routers-to-launch-attacks/
10/07/2024 17:40:13
QRCode
archive.org
thumbnail

An advisory by CISA and multiple international cybersecurity agencies highlights the tactics, techniques, and procedures (TTPs) of APT40 (aka

bleepingcomputer 2024 EN APT40 Australia China CISA Router Security-Advisory SOHO-Router
APT40 Advisory PRC MSS tradecraft in action https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/apt40-advisory-prc-mss-tradecraft-in-action
10/07/2024 17:39:38
QRCode
archive.org

This advisory, authored by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the United States Cybersecurity and Infrastructure Security Agency (CISA), the United States National Security Agency (NSA), the United States Federal Bureau of Investigation (FBI), the United Kingdom National Cyber Security Centre (NCSC-UK), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NCSC-NZ), the German Federal Intelligence Service (BND) and Federal Office for the Protection of the Constitution (BfV), the Republic of Korea's National Intelligence Service (NIIS) and NIS’ National Cyber Security Center, and Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) and National Police Agency (NPA) – hereafter referred to as the “authoring agencies” – outlines a People’s Republic of China (PRC) state-sponsored cyber group and their current threat to Australian networks. The advisory draws on the authoring agencies’ shared understanding of the threat as well as ASD’s ACSC incident response investigations.

cyber.gov.au EN 2024 advisory APT40 Kryptonite-Panda GINGHAM-TYPHOON, Leviathan Bronze-Mohawk
New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere https://arstechnica.com/security/2024/07/new-blast-radius-attack-breaks-30-year-old-protocol-used-in-networks-everywhere/
10/07/2024 17:36:32
QRCode
archive.org
thumbnail

Ubiquitous RADIUS scheme uses homegrown authentication based on MD5. Yup, you heard right.

arstechnica EN 2024 blastradius RADIUS vulnerability
BLAST RADIUS https://www.blastradius.fail/#page-top
10/07/2024 17:33:48
QRCode
archive.org

Blast-RADIUS is a vulnerability that affects the RADIUS protocol. RADIUS is a very common protocol used for authentication, authorization, and accounting (AAA) for networked devices on enterprise and telecommunication networks.

blastradius EN 2024 RADIUS vulnerability protocol
CVE-2024-38021: Moniker RCE Vulnerability Uncovered in Microsoft Outlook https://blog.morphisec.com/cve-2024-38021-microsoft-outlook-moniker-rce-vulnerability
10/07/2024 08:42:17
QRCode
archive.org
thumbnail

Morphisec researchers have discovered an important Microsoft Outlook vulnerability. Read on for CVE-2024- 38021 details and technical impact.

morphisec EN 2024 CVE-2024-38021Microsoft Outlook vulnerability July2024-PatchTuesday
New OpenSSH Vulnerability Discovered: Potential Remote Code Execution Risk https://thehackernews.com/2024/07/new-openssh-vulnerability-discovered.html
10/07/2024 08:19:51
QRCode
archive.org
thumbnail

OpenSSH vulnerability CVE-2024-6409 found in Red Hat Linux 9 may enable remote code execution. Discover more.

thehackernews EN 2024 OpenSSH CVE-2024-6409 RedHatLinux9
US Disrupts Russian Bots Spreading Propaganda on Twitter https://uk.pcmag.com/security/153183/us-disrupts-russian-bots-spreading-propaganda-on-twitter
10/07/2024 06:46:56
QRCode
archive.org
thumbnail

Russian media outlet RT ran the bot farm to pump out disinformation via 968 Twitter accounts, the US Justice Department says.

pcmag EN 2024 Russia bot RT disinformation Twitter FBI US Propaganda disrupted
Hackers target WordPress calendar plugin used by 150,000 sites https://www.bleepingcomputer.com/news/security/hackers-target-wordpress-calendar-plugin-used-by-150-000-sites/
09/07/2024 19:42:11
QRCode
archive.org
thumbnail

Hackers are trying to exploit a vulnerability in the Modern Events Calendar WordPress plugin that is present on more than 150,000 websites to upload arbitrary files to a vulnerable site and execute code remotely.
#Actively #Calendar #Computer #Events #Exploited #File #InfoSec #Modern #Plugin #Security #Upload #Vulnerability #WordPress

Plugin Calendar Events Vulnerability File InfoSec Actively WordPress Security Upload Exploited Modern Computer
EDR as an Offensive Tool https://www.safebreach.com/blog/dark-side-of-edr-offensive-tool/
09/07/2024 12:26:36
QRCode
archive.org
thumbnail

Learn how SafeBreach developed malware integrated within Palo Alto Networks Cortex XDR, exploiting its ransomware protection feature.

safebreach EDR 2024 malware integrated XDR Paloalto Cortex
‘Serious hacker attack’ forces Frankfurt university to shut down IT systems https://therecord.media/serious-hacker-attack-shutdown-frankfurt?_hsenc=p2ANqtz-9fh2j6EdYV-LyBrzCBDTk28kB0TcOMiySUDe3Zb_41NTA7Qryq5rfs2Unhesp51prpCOo4d17hfGQYbR_7s3F0nZ_X-w&_hsmi=314846278
09/07/2024 08:57:41
QRCode
archive.org
thumbnail

The Frankfurt University of Applied Sciences said Monday it was targeted by a cyberattack which compromised its IT "infrastructure."

Turla: A Master’s Art of Evasion https://www.gdatasoftware.com/blog/2024/07/37977-turla-evasion-lnk-files
08/07/2024 23:09:49
QRCode
archive.org

Turla, a well-known piece of malware, has taken to weaponising LNK-files to infect computers. We have observed a current example of this.

gdatasoftware EN 2024 Turla analysis malware LNK-files LNK
BlackSuit Ransomware: Insights and Defense Strategies https://areteir.com/article/understanding-blacksuit-ransomware/
08/07/2024 23:04:16
QRCode
archive.org

Learn about BlackSuit ransomware, its impact across sectors, and how to defend against its attacks.

areteir EN 2024 BlackSuit Ransomware Insights
Decrypted: DoNex Ransomware and its Predecessors https://decoded.avast.io/threatresearch/decrypted-donex-ransomware-and-its-predecessors/
08/07/2024 22:12:39
QRCode
archive.org
thumbnail

Researchers from Avast have discovered a flaw in the cryptographic schema of the DoNex ransomware and its predecessors. In cooperation with law enforcement organizations, we have been silently providing the decryptor to DoNex ransomware victims since March 2024. The  cryptographic weakness was made public at Recon 2024 and therefore we have no reason to keep […]

avast EN 2024 Decrypted DoNex Ransomware Muse Darkrace
Eldorado Ransomware: The New Golden Empire of Cybercrime? https://www.group-ib.com/blog/eldorado-ransomware/
08/07/2024 19:09:56
QRCode
archive.org

All about Eldorado Ransomware and how its affiliates make their own samples for distribution.

group-ib EN 2024 Eldorado Ransomware Cybercrime
South African pathology labs down after ransomware attack https://www.capeindependent.com/article/south-african-pathology-labs-down-after-ransomware-attack?ref=news.risky.biz
08/07/2024 06:49:45
QRCode
archive.org
thumbnail

The National Health Laboratory Service is the primary diagnostic service for 80% of the population, and no timeline for its restoration has been determined

capeindependent EN 2024 South-Africa ransomware attack pathology health
New Intel CPU Vulnerability 'Indirector' Exposes Sensitive Data https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html
07/07/2024 22:04:14
QRCode
archive.org
thumbnail

Discover how the 'Indirector' attack threatens Intel CPUs and learn about the 'TIKTAG' vulnerability in Arm processors.

thehackernews EN 2024 Indicator Intel CPU Vulnerability
Russia forces Apple to remove VPN apps from the App Store https://appleinsider.com/articles/24/07/05/russia-forces-apple-to-remove-vpn-apps-from-the-app-store
07/07/2024 22:03:18
QRCode
archive.org
thumbnail

Apple has caved to pressure from Russian authorities and removed a number of the best iPhone VPN apps from the App Store in the country.

appleinsider EN 2024 Russia VPN Apple pressure removed AppStore
page 85 / 234
4677 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio