Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 87 / 234
Poland to probe Russia-linked cyberattack on state news agency https://therecord.media/poland-cyberattack-investigation-state-agency?_hsenc=p2ANqtz--F2mEpRDK35UivTHXp9aafGCFXmjkKa_bKb09DoYw0u5WeqRR5aSNmbFLJHaOMcu61vlCJrQElrGYZP9b-23BRFMNTBQ&_hsmi=314157258
03/07/2024 08:20:57
QRCode
archive.org
thumbnail

In May, hackers published fake news on the website of the Polish Press Agency claiming the country’s authorities had announced a partial mobilization of 200,000 men to be sent to fight in a war in Ukraine.

therecordmedia EN 2024 Poland Russia cyberattack Polish-Press-Agency Russia-Ukraine-war
Cisco NX-OS Command Injection Vulnerability CVE-2024-20399: Insights and Defense Strategies https://www.sygnia.co/threat-reports-and-advisories/china-nexus-threat-group-velvet-ant-exploits-cisco-0-day/
02/07/2024 18:59:25
QRCode
archive.org
thumbnail

Discover key insights into the recently disclosed Cisco NX-OS software CLI vulnerability (CVE-2024-20399) affecting numerous Cisco Nexus devices.

sygnia EN 2024 CVE-2024-20399 Cisco NX-OS Command Injection Cisco Nexus
Vulnerabilities in CocoaPods Open the Door to Supply Chain Attacks Against Thousands of iOS and MacOS Applications https://www.evasec.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods
02/07/2024 18:58:38
QRCode
archive.org
thumbnail
  • E.V.A Information Security researchers uncovered several vulnerabilities in the CocoaPods dependency manager that allows any malicious actor to claim ownership over thousands of unclaimed pods and insert malicious code into many of the most popular iOS and MacOS applications. These vulnerabilities have since been patched.
  • Such an attack on the mobile app ecosystem could infect almost every Apple device, leaving thousands of organizations vulnerable to catastrophic financial and reputational damage. One of the vulnerabilities could also enable zero day attacks against the most advanced and secure organizations’ infrastructure.
  • Developers and DevOps teams that have used CocoaPods in recent years should verify the integrity of open source dependencies used in their application code.
  • Dependency managers are an often-overlooked aspect of software supply chain security. Security leaders should explore ways to increase governance and oversight over the use these tools.
evasec EN 2024 CocoaPods Supply Chain Attacks macOS iOS CVE-2024-38368
TeamViewer: Hackers copied employee directory data and encrypted passwords https://therecord.media/teamviewer-cyberattack-employee-directory-encrypted-passwords
02/07/2024 16:44:27
QRCode
archive.org
thumbnail

TeamViewer says that a recently discovered breach appears to be limited to its internal corporate IT network. The software company has attributed it to a hacking operation associated with Russian intelligence.

therecord.media EN 2024 TeamViewer encrypted passwords incident APT29
Halcyon Identifies New Ransomware Operator Volcano Demon Serving Up LukaLocker https://www.halcyon.ai/blog/halcyon-identifies-new-ransomware-operator-volcano-demon-serving-up-lukalocker
02/07/2024 14:37:25
QRCode
archive.org
thumbnail

Halcyon Identifies New Ransomware Operator Volcano Demon Serving Up LukaLocker
#Demon #Halcyon #Identifies #LukaLocker #New #Operator #Ransomware #Volcano

Halcyon Demon Volcano Ransomware New LukaLocker Identifies Operator
Analysis of the Phishing Campaign: Behind the Incident https://any.run/cybersecurity-blog/analysis-of-the-phishing-campaign/
02/07/2024 10:56:19
QRCode
archive.org
thumbnail

See the results of our investigation into the phishing campaign encountered by our company and get information to defend against it. 

Here are some key findings:

  • We found around 72 phishing domains pretending to be real or fake companies. These domains created believable websites that tricked people into sharing their login details.
  • The attack was sophisticated, using advanced techniques like direct human interaction to deceive targets.
  • We analyzed several fake websites and reverse-engineered their web-facing application.
  • At the end of the post, you will find a list of IOCs that can be used for improving your organization’s security.
any.run EN 2024 incident phishing spear-phishing IoCs
Startups scramble to assess fallout from Evolve Bank data breach https://techcrunch.com/2024/06/27/startups-scramble-to-assess-fallout-from-evolve-bank-data-breach/
01/07/2024 20:06:04
QRCode
archive.org
thumbnail

Fintech-friendly Evolve Bank disclosed a data breach, saying it may have impacted customers and partners.

techcrunch EN 2024 Evolve-Bank data-breach LockBit3.0 impact startups
Cisco warns of NX-OS zero-day exploited to deploy custom malware https://www.bleepingcomputer.com/news/security/cisco-warns-of-nx-os-zero-day-exploited-to-deploy-custom-malware/
01/07/2024 19:59:25
QRCode
archive.org
thumbnail

Cisco has patched an NX-OS zero-day exploited in April attacks to install previously unknown malware as root on vulnerable switches.

bleepingcomputer EN 2024 China Cisco Command-Injection Malware NX-OS Root Switch Velvet-Ant Zero-Day
Polyfill, Cloudflare trade barbs after reports of supply chain attack threatening 100k websites https://therecord.media/polyfill-cloudflare-trade-barbs-supply-chain-attack
01/07/2024 12:01:56
QRCode
archive.org
thumbnail

Tech giant Cloudflare urged customers to remove a popular open source library used to support older browsers after reports emerged this week that the tool is being used to distribute malware.

therecord.media EN 2024 polyfill Polyfill.io Cloudflare malware
regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
01/07/2024 11:31:14
QRCode
archive.org
thumbnail

The Qualys Threat Research Unit (TRU) has discovered a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) in glibc-based Linux…

qualys EN 2024 OpenSSH regreSSHion CVE-2024-6387
Meet Brain Cipher — The new ransomware behind Indonesia's data center attack https://www.bleepingcomputer.com/news/security/meet-brain-cipher-the-new-ransomware-behind-indonesia-data-center-attack/
30/06/2024 15:13:03
QRCode
archive.org
thumbnail

The new Brain Cipher ransomware operation has begun targeting organizations worldwide, gaining media attention for a recent attack on Indonesia's temporary National Data Center.

bleepingcomputer EN 2024 Brain-Cipher Data-Theft Double-Extortion LockBit Ransomware Indonesia
Des cybercriminels diffusent des maliciels pour macOS au nom d’AGOV https://www.ncsc.admin.ch/ncsc/fr/home/aktuell/im-fokus/2024/poseidon.html
30/06/2024 15:08:36
QRCode
archive.org

28.06.2024 - Le soir du 27 juin 2024, des cybercriminels ont lancé une campagne de « malspam » à grande échelle contre des citoyennes et citoyens de Suisse alémanique. Par le biais d’un e-mail dont l’expéditeur présumé est AGOV, ils tentent d’infecter les appareils des utilisatrices et utilisateurs de macOS avec un maliciel (malware en anglais) du nom de « Poseidon Stealer ».

ncsc admin.ch FR CH suisse campagne malspam macOS AGOV PoseidonStealer
New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities https://thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
30/06/2024 11:41:28
QRCode
archive.org
thumbnail

Researchers unveil SnailLoad, a new side-channel attack exploiting network latency to infer web activity remotely, achieving up to 98% accuracy in vid

thehackernews EN 2024 SnailLoad Attack side-channel attack network latency
New Medusa malware variants target Android users in seven countries https://www.bleepingcomputer.com/news/security/new-medusa-malware-variants-target-android-users-in-seven-countries/
30/06/2024 11:40:32
QRCode
archive.org
thumbnail

The Medusa banking trojan for Android has re-emerged after almost a year of keeping a lower profile in campaigns targeting France, Italy, the United States, Canada, Spain, the United Kingdom, and Turkey.

bleepingcomputer EN 2024 Android Banking-Trojan Malware Medusa Mobile Smishing
Polyfill claims it has been 'defamed', returns after domain shut down https://www.bleepingcomputer.com/news/security/polyfill-claims-it-has-been-defamed-returns-after-domain-shut-down/
30/06/2024 11:39:02
QRCode
archive.org
thumbnail

The owners of Polyfill.io have relaunched the JavaScript CDN service on a new domain after polyfill.io was shut down as researchers exposed it was delivering malicious code on upwards of 100,000 websites.. The Polyfill service claims that it has been 

bleepingcomputer EN 2024 CDN Polyfill.io Supply-Chain-Attack
ID Verification Service for TikTok, Uber, X Exposed Driver Licenses https://www.404media.co/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix/
30/06/2024 11:36:16
QRCode
archive.org
thumbnail

As social networks and porn sites move towards a verified identity model, the actions of one cybersecurity researcher show that ID verification services themselves could get hacked too.

404media EN data-leak TikTok Uber X identity verification driver-licences
LockBit lied: Stolen data is from a bank, not US Federal Reserve https://www.bleepingcomputer.com/news/security/lockbit-lied-stolen-data-is-from-a-bank-not-us-federal-reserve/
30/06/2024 11:35:00
QRCode
archive.org
thumbnail

Recently-disrupted LockBit ransomware group, in a desperate attempt to make a comeback, claimed this week that it had hit the Federal Reserve, the central bank of the United States. Except, the rumor has been quashed.

bleepingcomputer EN 2024 Federal-Reserve-Bank LockBit LockBit-2.0 LockBit-3.0
CVE-2024-5261 | LibreOffice - Free and private office suite - Based on OpenOffice - Compatible with Microsoft https://www.libreoffice.org/about-us/security/advisories/cve-2024-5261/
29/06/2024 17:25:09
QRCode
archive.org

LibreOfficeKit can be used for accessing LibreOffice functionality through C/C++. Typically this is used by third party components to reuse LibreOffice as a library to convert, view or otherwise interact with documents.

LibreOffice internally makes use of "curl" to fetch remote resources such as images hosted on webservers.

libreoffice EN 2024 LibreOfficeKit advisroy CVE-2024-5261 LibreOffice
Cryptographers’ Feedback on the EU Identity Wallet https://blog.xot.nl/2024/06/23/cryptographers-feedback-on-the-eu-identity-wallet/index.html
29/06/2024 10:41:55
QRCode
archive.org

A handful cryptographers were asked for feedback on the architecture of the European Identity Wallet (the Architecture Reference Framwork (ARF), currently at version 1.4.0). We seized the opportunity to write a short report to urge Europe to reconsider the design, and to base it on the use of anonymous (aka attribute-based) credentials.

Anonymous credentials were designed specifically to achieve authentication and identification that are both secure and privacy-preserving. As a result, they fully meet the requirements put forth in the eiDAS 2.0 regulation. (The current design does not.) Moreover, they are by now a mature technology. In particular we recommend to use the BBS family of anonymous credentials, which are efficient and mathematically proven secure.

blog.xot.nl EB eid EU Identity Wallet Anonymous credentials architecture
Hubspot says it's investigating customer account hacks | TechCrunch https://techcrunch.com/2024/06/28/hubspot-says-its-investigating-customer-account-hacks/
28/06/2024 20:36:33
QRCode
archive.org
thumbnail

The company “identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain unauthorized access to their accounts” on June 22.

techcrunch EN 2024 Hubspot incident unauthorized access
page 87 / 234
4677 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio