Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 9 / 76
1513 résultats taggé 2024  ✕
Attacco ransomware al Bologna FC, rubati migliaia di documenti (anche sui calciatori) | Wired Italia https://www.wired.it/article/attacco-ransomware-bologna-fc/
28/11/2024 10:51:40
QRCode
archive.org
thumbnail

I pirati del gruppo RansomHub pubblicano su Dark Web alcuni dei documenti sottratti e chiedono al club di Serie A di pagare un riscatto

wired it 2024 ransomware calcio BolognaFC RansomHub
Bootkitty: Analyzing the first UEFI bootkit for Linux https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/
28/11/2024 10:25:22
QRCode
archive.org
thumbnail

ESET's discovery of the first UEFI bootkit designed for Linux sendss an important message: UEFI bootkits are no longer confined to Windows systems alone.

welivesecurity EN 2024 Bootkitty UEFI bootkit Linux
Zello asks users to reset passwords after security incident https://www.bleepingcomputer.com/news/security/zello-asks-users-to-reset-passwords-after-security-incident/
28/11/2024 10:23:31
QRCode
archive.org
thumbnail

Zello is warning customers to reset their passwords if their account was created before November 2nd in what appears to be another security breach.

bleepingcomputer EN 2024 Password-Reset Security-Incident Zello
Gergely's hack blog – badmalloc (CVE-2023-32428) - a macOS LPE https://gergelykalman.com/badmalloc-CVE-2023-32428-a-macos-lpe.html
28/11/2024 10:22:57
QRCode
archive.org

I recently realised that I still owe you guys some writeups, so since OBTSv7 is around the corner here's the one for badmalloc. I found this back in March 2023, and it got fixed in October. About the bug There's a bug in MallocStackLogging, Apple's "magical" framework that allows developers …

gergelykalman EN 2024 macOS 0day CVE-2023-32428 MallocStackLogging macos
The hidden network report https://research.cert.orangecyberdefense.com/hidden-network/report.html
28/11/2024 08:27:03
QRCode
archive.org

Since February 2024, the World Watch Cyber Threat Intelligence team has been working on an extensive study of the private and public relationships within the Chinese cyber offensive ecosystem. This includes:

  • An online map showcasing the links between 300+ entities;
  • Historical context on the Chinese state entities dedicated to cyber offensive operations;
  • An analysis of the role of universities and private companies in terms of capacity building;
  • A focus on the ecosystem facilitating the acquisition of vulnerabilities for government use in cyber espionage campaigns.
Orange Cyberdefense CERT EN 2024 Threat Research China
Source Code of $3,000-a-Month macOS Malware ‘Banshee Stealer’ Leaked https://www.securityweek.com/source-code-of-3000-a-month-macos-malware-banshee-stealer-leaked/
27/11/2024 16:48:46
QRCode
archive.org

The Banshee Stealer macOS malware operation, which emerged earlier this year, was reportedly shut down following a source code leak.

securityweek EN 2024 macOS Malware BANSHEE Stealer leaked
When Guardians Become Predators: How Malware Corrupts the Protectors https://www.trellix.com/blogs/research/when-guardians-become-predators-how-malware-corrupts-the-protectors/
27/11/2024 09:15:01
QRCode
archive.org

We often trust our security software to stand as an unbreakable wall against malware and attacks, but what happens when that very wall is weaponized against us? Our Trellix Advanced Research Center team recently uncovered a malicious campaign that does just that. Instead of bypassing defenses, this malware takes a more sinister route: it drops a legitimate Avast Anti-Rootkit driver (aswArPot.sys) and manipulates it to carry out its destructive agenda. The malware exploits the deep access provided by the driver to terminate security processes, disable protective software, and seize control of the infected system.

trellix EN 2024 research Avast Anti-Rootkit driver malware aswArPot.sys malware analysis
UK drinking water supplies disrupted by record number of undisclosed cyber incidents https://therecord.media/uk-drinking-water-infrastructure-cyber-incident-reports?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
27/11/2024 09:11:25
QRCode
archive.org

A record number of cyber incidents impacted Britain’s critical drinking water supplies this year without being publicly disclosed, according to information obtained by Recorded Future News.

The exact nature of these incidents is unclear, and they may include operational failures as well as attacks. Under British cybersecurity laws — known as the NIS Regulations — critical infrastructure companies are required to report “significant incidents” to the government within three days or face a fine of up to £17 million ($21 million).

therecord.media EN 2024 record number cyber-incidents UK critical-infrastructure drinking water supplies
Here’s how simple it is for script kiddies to stand up DDoS services https://cyberscoop.com/russian-hacker-script-matrix-ddos-aqua/
26/11/2024 17:05:19
QRCode
archive.org
thumbnail

How plug-and-play hacking tools and lax configs helped a Russian script kiddie start a scheme.

cyberscoop EN 2024 DDoS Matrix
Matrix Unleashes A New Widespread DDoS Campaign https://www.aquasec.com/blog/matrix-unleashes-a-new-widespread-ddos-campaign/
26/11/2024 17:02:27
QRCode
archive.org
thumbnail

Aqua Nautilus researchers uncovered a new and widespread DDoS campaign orchestrated by a threat actor named Matrix.

aquasec EN 2024 analysis DDoS Matrix campaign
Raspberry Robin Analysis https://www.zscaler.com/blogs/security-research/unraveling-raspberry-robin-s-layers-analyzing-obfuscation-techniques-and
25/11/2024 20:44:25
QRCode
archive.org
thumbnail

A comprehensive analysis of the inner workings of Raspberry Robin | Multiple layers that use numerous techniques to evade detection & analysis
#2024 #Analysis #EN #Raspberry #Robin #zscaler

zscaler Robin Analysis 2024 Raspberry EN
Yakuza Victim Data Leaked in Japanese Agency Attack https://www.darkreading.com/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack
25/11/2024 16:24:53
QRCode
archive.org
thumbnail

A local government resource for helping Japanese citizens cut ties with organized crime was successfully phished in a tech support scam, and could have dangerous consequences.

darkreading EN 2024 Yakuza Victim Data-Leak Japan tech-support-scam
Microsoft Power Pages: Data Exposure Reviewed https://appomni.com/ao-labs/microsoft-power-pages-data-exposure-reviewed/
25/11/2024 16:17:56
QRCode
archive.org
thumbnail

This blog post discusses a data exposure risk in Microsoft Power Pages due to misconfigured access controls, highlighting the need for better security and monitoring.

appomni EN 2024 Microsoft Power-Pages misconfigured Data-Exposure
Emerging Details of Chinese Hack Leave U.S. Officials Increasingly Concerned https://www.nytimes.com/2024/11/22/us/politics/chinese-hack-telecom-white-house.html
25/11/2024 16:13:27
QRCode
archive.org

Leaders of the big telecommunications companies were summoned to the White House to discuss strategies for overhauling the security of the nation’s telecommunications networks amid growing alarm at the scope of a Chinese hack.

nytimes EN 2024 China US telecom Officials Salt-Typhoon
CyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attacks https://www.sentinelone.com/labs/cybervolk-a-deep-dive-into-the-hacktivists-tools-and-ransomware-fueling-pro-russian-cyber-attacks/
25/11/2024 15:16:57
QRCode
archive.org
thumbnail

A loose collective of mostly low-skilled actors, CyberVolk absorbs and adapts a wide array of destructive malware for use against political targets.

sentinelone EN 2024 CyberVolk collective pro-Russian
7-Zip flaw enables code smuggling with manipulated archives https://www.heise.de/en/news/7-Zip-flaw-enables-code-smuggling-with-manipulated-archives-10083922.html
25/11/2024 10:43:37
QRCode
archive.org
thumbnail

Attackers can use manipulated archives to try to inject malicious code into 7-Zip users. An update is available.

heise.de EN 2024 7-Zip vulnerability CVE-2024-11477
China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike https://www.recordedfuture.com/research/china-nexus-tag-112-compromises-tibetan-websites
24/11/2024 10:04:10
QRCode
archive.org
thumbnail

In a recent cyber campaign, the Chinese state-sponsored threat group TAG-112 compromised two Tibetan websites, Tibet Post and Gyudmed Tantric University, to deliver the Cobalt Strike malware. Recorded Future’s Insikt Group discovered that the attackers embedded malicious JavaScript in these sites, which spoofed a TLS certificate error to trick visitors into downloading a disguised security certificate. This malware, often used by threat actors for remote access and post-exploitation, highlights a continued cyber-espionage focus on Tibetan entities. TAG-112’s infrastructure, concealed using Cloudflare, links this campaign to other China-sponsored operations, particularly TAG-102 (Evasive Panda).

recordedfuture EN 2024 EvasivePanda TAG-112 Tibet China CobaltStrike malware
Fintech Giant Finastra Investigating Data Breach https://krebsonsecurity.com/2024/11/fintech-giant-finastra-investigating-data-breach/
24/11/2024 09:59:10
QRCode
archive.org

The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world’s top 50 banks, notified customers of the security incident after a cybercriminal began selling more than 400 gigabytes of data purportedly stolen from the company.

krebsonsecurity 2024 EN Fintech Finastra Data-Breach
Apple fixes two zero-days used in attacks on Intel-based Macs https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-days-used-in-attacks-on-intel-based-macs/
23/11/2024 10:10:00
QRCode
archive.org
thumbnail

Apple released emergency security updates to fix two zero-day vulnerabilities that were exploited in attacks on Intel-based Mac systems.

"Apple is aware of a report that this issue may have been exploited," the company said in an advisory issued on Tuesday.

The two bugs were found in the macOS Sequoia JavaScriptCore (CVE-2024-44308) and WebKit (CVE-2024-44309) components of macOS.

bleepingcomputer EN 2024 CVE-2024-44309 CVE-2024-44308 macos JavaScriptCore WebKit exploited
Qualys TRU Uncovers Five Local Privilege Escalation Vulnerabilities in needrestart | Qualys Security Blog https://blog.qualys.com/vulnerabilities-threat-research/2024/11/19/qualys-tru-uncovers-five-local-privilege-escalation-vulnerabilities-in-needrestart
23/11/2024 10:09:11
QRCode
archive.org
thumbnail

The Qualys Threat Research Unit (TRU) has identified five Local Privilege Escalation (LPE) vulnerabilities within the needrestart component, which is installed by default on Ubuntu Server. These vulnerabilities can be exploited by any unprivileged user to gain full root access without requiring user interaction. The identified flaws have been assigned the CVE identifiers CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003, highlighting the need for immediate remediation to protect system integrity.

Our TRU team has successfully developed functional exploits for these vulnerabilities. While we will not disclose our exploits, please be aware that these vulnerabilities are easily exploitable, and other researchers may release working exploits shortly following this coordinated disclosure.

These vulnerabilities have been present since the introduction of interpreter support in needrestart version 0.8, released in April 2014.

qualys EN 2024 TRU LPE vulnerabilities UbuntuServer CVE-2024-48990 CVE-2024-48991 CVE-2024-48992 CVE-2024-10224
page 9 / 76
4514 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio