Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 88 / 234
Indonesia president orders audit of data centres after cyberattack https://www.reuters.com/technology/cybersecurity/bulk-indonesia-data-hit-by-cyberattack-not-backed-up-officials-say-2024-06-28/#:~:text=JAKARTA%2C%20June%2028%20(Reuters),country's%20vulnerability%20to%20such%20attacks
28/06/2024 13:53:44
QRCode
archive.org

Indonesian President Joko Widodo ordered on Friday an audit of government data centres after officials said the bulk of data affected by a recent ransomware cyberattack was not backed up, exposing the country's vulnerability to such attacks.
Last week's cyberattack, the worst in Indonesia in recent years, has disrupted multiple government services including immigration and operations at major airports.

reuters EN 2024 Indonesia ransomware audit government airports data-centers
Critical GitLab bug lets attackers run pipelines as any user https://www.bleepingcomputer.com/news/security/critical-gitlab-bug-lets-attackers-run-pipelines-as-any-user/
27/06/2024 17:23:35
QRCode
archive.org
thumbnail

A critical vulnerability is affecting certain versions of GitLab Community and Enterprise Edition products, which could be exploited to run pipelines as any user.

bleepingcomputer EN 2024 GitLab Pipeline Security-Advisory Vulnerability
South Korean telecom company attacks torrent users with malware — over 600,000 customers report missing files, strange folders, and disabled PCs https://www.tomshardware.com/tech-industry/cyber-security/south-korean-telecom-company-attacks-torrent-users-with-malware-over-600000-people-report-missing-files-strange-folders-and-disabled-pcs
27/06/2024 14:26:33
QRCode
archive.org
thumbnail

Korean telecom company KT Corporation sent malware to its subscribers who use Webhard's Grid Service peer-to-peer sharing program to hide their files and stop them from using the service.

tomshardware EN 2024 South-Korea KTCorporation torrent malware
Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application https://thehackernews.com/2024/06/critical-sqli-vulnerability-found-in.html
27/06/2024 09:58:20
QRCode
archive.org
thumbnail

Critical security flaw in Fortra FileCatalyst Workflow allows database tampering. Patch available.

thehackernews EN 2024 Critical SQLi Vulnerability Fortra FileCatalyst Workflow Application CVE-2024-5276
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer
27/06/2024 08:47:39
QRCode
archive.org
thumbnail

P2Pinfect is a rust-based malware covered extensively by Cado Security in the past. Cado Security researchers first discovered it during triage of honeypot telemetry in July of 2023.

cadosecurity EN 2024 P2Pinfect Ransomware analysis
New P2Pinfect version delivers miners and ransomware on Redis servers https://securityaffairs.com/164968/malware/p2pinfect-delivers-miners-ransomware-on-redis.html
27/06/2024 08:45:03
QRCode
archive.org
thumbnail

Researchers warn that the P2Pinfect worm is targeting Redis servers with ransomware and cryptocurrency mining payloads.

securityaffairs EN 2024 Redis P2Pinfect ransomware mining payloads CVE-2022-0543
Progress Software elevates severity of new MOVEit bug to ‘critical’ as exploit attempts jump https://therecord.media/progress-software-elevates-severity-bug
27/06/2024 08:42:58
QRCode
archive.org
thumbnail

The company updated an advisory about a bug affecting the MOVEit tool, warning a “newly identified vulnerability in a third-party component" had elevated the risks.

therecord.media EN 2024 MOVEit Transfer CVE-2024-5806 bug exploited
Auth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806) https://labs.watchtowr.com/auth-bypass-in-un-limited-scenarios-progress-moveit-transfer-cve-2024-5806/
27/06/2024 08:41:16
QRCode
archive.org
thumbnail

Progress un-embargoed an authentication bypass vulnerability in Progress MOVEit Transfer.

Many sysadmins may remember last year’s CVE-2023-34362, a cataclysmic vulnerability in Progress MOVEit Transfer that sent ripples through the industry, claiming such high-profile victims as the BBC and FBI. Sensitive data was leaked, and sensitive data was destroyed, as the cl0p ransomware gang leveraged 0days to steal data - and ultimately leaving a trail of mayhem.

watchtowr.com EN 2024 MOVEit CVE-2024-5806 Analysis PoC
US accuses Russian of helping Kremlin hack Ukraine’s state computer systems https://therecord.media/us-accuses-russian-helping-kremlin
27/06/2024 08:28:51
QRCode
archive.org
thumbnail

According to the Department of Justice, 22-year-old Amin Stigal helped Russian military intelligence carry out cyber operations, including probing computers belonging to a federal government agency in Maryland.

therecord.media EN 2024 Russia Russia-Ukraine-war WhisperGate wiper US
Chinese Cyberspies Employ Ransomware in Attacks for Diversion https://www.bleepingcomputer.com/news/security/chinese-cyberspies-employ-ransomware-in-attacks-for-diversion/
27/06/2024 08:26:45
QRCode
archive.org
thumbnail

Cyberespionage groups have been using ransomware as a tactic to make attack attribution more challenging, distract defenders, or for a financial reward as a secondary goal to data theft.

bleepingcomputer EN 2024 APT BitLocker CatB ChamelGang Cyber-espionage Ransomware
ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware https://www.sentinelone.com/labs/chamelgang-attacking-critical-infrastructure-with-ransomware/
27/06/2024 08:26:03
QRCode
archive.org
thumbnail

Threat actors in the cyberespionage ecosystem are using ransomware for financial gain, disruption, distraction, misattribution, and the removal of evidence.

sentinelone EN 2024 ChamelGang Cyberespionage Critical-infrastructure Ransomware
Microsoft employee accidentally publishes PlayReady code https://borncity.com/win/2024/06/26/microsoft-employee-accidentally-publishes-playready-code/
26/06/2024 15:06:57
QRCode
archive.org

[German]A Microsoft software developer has accidentally shared internal PlayReady source code with the public (a developer forum). The data leak of 4 GByte is sufficient to compile the required DLL from the source code. This could be a real boon for people who want to reverse engineering or crack PlayReady. What is PlayReady? PlayReady is...

borncity.com EN 2024 Microsoft employee PlayReady leak
UEFIcanhazbufferoverflow: Widespread Impact from Vulnerability in Popular PC and Server Firmware https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/
26/06/2024 13:51:38
QRCode
archive.org
thumbnail

Summary Eclypsium Automata, our automated binary analysis system, has identified a high impact vulnerability (CVE-2024-0762 with a reported CVSS of 7.5) in the Phoenix SecureCore UEFI firmware that runs on multiple families of Intel Core desktop and mobile processors. The issue involves an unsafe variable in the Trusted Platform Module (TPM) configuration that could lead […]

eclypsium.com EN 2024 UEFIcanhazbufferoverflow Vulnerability Phoenix CVE-2024-0762 SecureCore UEFI
The inside view of spyware’s 'dirty interference,' from two recent Pegasus victims https://therecord.media/pegasus-spyware-victims-sannikov-erlikh
26/06/2024 11:42:21
QRCode
archive.org
thumbnail

Andrei Sannikov and Evgeny Erlikh discuss the effects of discovering their devices had been infected with Pegasus — making them part of a rapidly expanding list of civil-society figures targeted with the commercial spyware.

therecord.media EN 2024 spyware Pegasus effects civil-society
CDK Begins Restoring Systems Amid Ransomware Payment Reports https://www.databreachtoday.eu/cdk-begins-restoring-systems-amid-ransomware-payment-reports-a-25605
26/06/2024 11:01:08
QRCode
archive.org
thumbnail

CDK Global, the auto dealership software solutions firm that supplies services to an estimated 15,000 dealerships in the U.S. and Canada, said it has begun the

databreachtoday EN 2024 CDK-Global CDK car-dealership cyberattack auto-dealerships ransomware
Neiman Marcus says 64,000 affected by breach of Snowflake customer account https://therecord.media/neiman-marcus-snowflake-breach-thousands
26/06/2024 08:40:35
QRCode
archive.org
thumbnail

Neiman Marcus is the latest large company affected by a run of attacks on customers of the data cloud storage provider Snowflake.

therecord.media EN 2024 Snowflake NeimanMarcus breach
South Africa’s national health lab hit with ransomware attack amid mpox outbreak https://therecord.media/south-africa-lab-ransomware-mpox-outbreak
26/06/2024 08:39:34
QRCode
archive.org
thumbnail

South Africa’s National Health Laboratory Service (NHLS) was hit by hackers on Saturday, with the dissemination of lab results severely impacted.

therecord.media EN 2024 South-Africa Healthcare NHLS ransomware impact
GrimResource - Microsoft Management Console for initial access and evasion https://www.elastic.co/security-labs/grimresource
25/06/2024 16:40:55
QRCode
archive.org
thumbnail

Elastic researchers uncovered a new technique, GrimResource, which allows full code execution via specially crafted MSC files. It underscores a trend of well-resourced attackers favoring innovative initial access methods to evade defenses.

elastic.co EN 2024 GrimResource MSC technique evasion initial-access
Stop Using cdn.polyfill.io Now https://blog.huli.tw/2024/06/25/en/stop-using-polyfill-io/
25/06/2024 16:38:13
QRCode
archive.org
thumbnail

Polyfill.io is a service that automatically provides front-end polyfills, making it very convenient to use. You just need to select the functionality you want to polyfill and then include a JavaScript

huli.tw EN 2024 polyfill Polyfill.io cdn
Activités d’influence et désinformation: le Conseil fédéral insiste sur la résilience et renforce l’analyse et la coordination https://www.admin.ch/gov/fr/accueil/documentation/communiques.msg-id-101494.html
25/06/2024 16:29:47
QRCode
archive.org

Lors de sa séance du 19 juin 2024, le Conseil fédéral a approuvé le rapport établi en réponse au postulat 22.3006 de la Commission de la politique de sécurité du Conseil national «État des lieux relatif à la menace que constituent pour la Suisse les campagnes de désinformation». Le rapport montre l’impact sur le pays des activités d’influence dans l’espace de l’information, les éléments caractéristiques pertinents dans ce contexte et les mesures supplémentaires que le Conseil fédéral entend prendre pour contrer ces menaces.

admin.ch FR CH 2024 Communiqué désinformation influence
page 88 / 234
4677 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio