Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 93 / 223
4445 résultats taggé E*N  ✕
Eldorado Ransomware: The New Golden Empire of Cybercrime? https://www.group-ib.com/blog/eldorado-ransomware/
08/07/2024 19:09:56
QRCode
archive.org

All about Eldorado Ransomware and how its affiliates make their own samples for distribution.

group-ib EN 2024 Eldorado Ransomware Cybercrime
South African pathology labs down after ransomware attack https://www.capeindependent.com/article/south-african-pathology-labs-down-after-ransomware-attack?ref=news.risky.biz
08/07/2024 06:49:45
QRCode
archive.org
thumbnail

The National Health Laboratory Service is the primary diagnostic service for 80% of the population, and no timeline for its restoration has been determined

capeindependent EN 2024 South-Africa ransomware attack pathology health
New Intel CPU Vulnerability 'Indirector' Exposes Sensitive Data https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html
07/07/2024 22:04:14
QRCode
archive.org
thumbnail

Discover how the 'Indirector' attack threatens Intel CPUs and learn about the 'TIKTAG' vulnerability in Arm processors.

thehackernews EN 2024 Indicator Intel CPU Vulnerability
Russia forces Apple to remove VPN apps from the App Store https://appleinsider.com/articles/24/07/05/russia-forces-apple-to-remove-vpn-apps-from-the-app-store
07/07/2024 22:03:18
QRCode
archive.org
thumbnail

Apple has caved to pressure from Russian authorities and removed a number of the best iPhone VPN apps from the App Store in the country.

appleinsider EN 2024 Russia VPN Apple pressure removed AppStore
Supply Chain Compromise Leads to Trojanized Installers | Rapid7 Blog https://www.rapid7.com/blog/post/2024/06/27/supply-chain-compromise-leads-to-trojanized-installers-for-notezilla-recentx-copywhiz/
07/07/2024 22:01:30
QRCode
archive.org
thumbnail

Rapid7 investigated suspicious behavior emanating from the installation of Notezilla, RecentX, & Copywhiz. These installers are distributed by Conceptworld.

rapid7 EN 2024 Conceptworld India Indian Software Hacked Data-Stealing Notezilla RecentX Copywhiz Supply-chain-attack
Indian Software Firm's Products Hacked to Spread Data-Stealing Malware https://thehackernews.com/2024/07/indian-software-firms-products-hacked.html
07/07/2024 22:00:07
QRCode
archive.org
thumbnail

Conceptworld software installers trojanized with data-stealing malware. Users of Notezilla, RecentX, and Copywhiz urged to check for compromise.

thehackernews 2024 EN Indian India Conceptworld Software Hacked Data-Stealing Notezilla RecentX Copywhiz
Formula 1 governing body discloses data breach after email hacks https://www.bleepingcomputer.com/news/security/formula-1-governing-body-discloses-data-breach-after-email-hacks/
07/07/2024 21:58:24
QRCode
archive.org
thumbnail

FIA (Fédération Internationale de l'Automobile), the auto racing governing body since the 1950s, says attackers gained access to personal data after compromising several FIA email accounts in a phishing attack.

bleepingcomputer EN 2024 Data-Breach FIA Formula-1 Phishing
How scam networks use fake celebrity ads to lure online investors https://www.swissinfo.ch/eng/life-aging/how-scam-networks-use-fake-celebrity-ads-to-lure-investors/82568794
05/07/2024 14:50:46
QRCode
archive.org
thumbnail

Investor beware: online promises of quick profits are not always as legitimate as they look. Swiss public broadcaster, SRF, looked into a Cyprus-based network of scam websites.

swissinfo EN 2024 Cyprus-based scam websites celebrity ads
The Rise of Packet Rate Attacks: When Core Routers Turn Evil https://blog.ovhcloud.com/the-rise-of-packet-rate-attacks-when-core-routers-turn-evil/
05/07/2024 10:44:27
QRCode
archive.org
thumbnail

A sharp increase of DDoS attacks have been observed since the beginning of 2023. A new trend is to send high packet rate attacks though. This article introduces the findings of our teams in order to bring new insights regarding this threat.

ovhcloud EN 2024 Mikrotik MikroTik-RouterOS DDoS attacks
RoguePuppet – A Critical Puppet Forge Supply Chain Vulnerability https://adnanthekhan.com/2024/07/02/roguepuppet-a-critical-puppet-forge-supply-chain-vulnerability/
05/07/2024 10:16:03
QRCode
archive.org
thumbnail

What if there was a supply chain attack that could provide an attacker with direct access to core infrastructure within thousands of companies worldwide. What if that attack required no social engi…

adnanthekhan EN 2024 Critical Puppet Forge Vulnerability Supply-Chain-Attack
Europol coordinates global action against criminal abuse of Cobalt Strike https://www.europol.europa.eu/media-press/newsroom/news/europol-coordinates-global-action-against-criminal-abuse-of-cobalt-strike?ref=news.risky.biz
05/07/2024 09:50:04
QRCode
archive.org
thumbnail

Abuse by cybercriminals Cobalt Strike is a popular commercial tool provided by the cybersecurity software company Fortra. It is designed to help legitimate IT security experts perform attack simulations that identify weaknesses in security operations and incident responses. In the wrong hands, however, unlicensed copies of Cobalt Strike can provide a malicious actor with a wide range of attack capabilities.Fortra...

europol EN 2024 crackdown CobaltStrike cybercriminals
blog.ethereum.org mailing list incident https://blog.ethereum.org/2024/07/02/blog-incident
05/07/2024 09:46:14
QRCode
archive.org
thumbnail

On 2024-06-23, 00:19 AM UTC, a phishing email was sent out to 35,794 email addresses by updates@blog.ethereum.org with the following content

blog.ethereum.org EN incident spam mailing
A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too https://www.nytimes.com/2024/07/04/technology/openai-hack.html?unlocked_article_code=1.400.uQ1I.v-uMLR6dv6TK&smid=url-share
05/07/2024 08:49:17
QRCode
archive.org

Early last year, a hacker gained access to the internal messaging systems of OpenAI, the maker of ChatGPT, and stole details about the design of the company’s A.I. technologies.

The hacker lifted details from discussions in an online forum where employees talked about OpenAI’s latest technologies, according to two people familiar with the incident, but did not get into the systems where the company houses and builds its artificial intelligence.

nytimes EN OpenAI data-leak hacked internal-messaging-systems
Sonar https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/
04/07/2024 13:18:05
QRCode
archive.org
thumbnail

We discovered 4 critical code vulnerabilities in Gogs, a source code hosting solution, which are still unpatched. Read about the details and how to protect yourself.

sonarsource EN 2024 Gogs vulnerabilities developers Supply-Chain
Caught in the Net: Using Infostealer Logs to Unmask CSAM Consumers https://www.recordedfuture.com/caught-in-the-net-using-infostealer-logs-to-unmask-csam-consumers
04/07/2024 07:24:58
QRCode
archive.org

Discover how Recorded Future uses infostealer logs to identify CSAM consumers and trends. Learn key findings and mitigation strategies.

recordedfuture EN 2024 Unmask CSAM Infostealer Logs
OpenAI’s ChatGPT Mac app was storing conversations in plain text https://www.theverge.com/2024/7/3/24191636/openai-chatgpt-mac-app-conversations-plain-text
04/07/2024 07:20:32
QRCode
archive.org
thumbnail

OpenAI updated its ChatGPT macOS app on Friday after users discovered it stored conversations insecurely in plain text.

theverge EN 2024 OpenAI chatgpt macOS app plain-text
Twilio says hackers identified cell phone numbers of two-factor app Authy users https://techcrunch.com/2024/07/03/twilio-says-hackers-identified-cell-phone-numbers-of-two-factor-app-authy-users/
04/07/2024 07:19:36
QRCode
archive.org
thumbnail

Twilio says "threat actors were able to identify" phone numbers of people who use the two-factor app Authy.

techcrunch EN 2024 Twilio phone numbers Authy data-leak
Europol coordinates global action against criminal abuse of Cobalt Strike | Europol https://www.europol.europa.eu/media-press/newsroom/news/europol-coordinates-global-action-against-criminal-abuse-of-cobalt-strike?mtm_campaign=newsletter
03/07/2024 22:04:56
QRCode
archive.org
thumbnail

Abuse by cybercriminals Cobalt Strike is a popular commercial tool provided by the cybersecurity software company Fortra. It is designed to help legitimate IT security experts perform attack simulations that identify weaknesses in security operations and incident responses. In the wrong hands, however, unlicensed copies of Cobalt Strike can provide a malicious actor with a wide range of attack capabilities.Fortra...

europol EN 2024 CobaltStrike action
CVE-2024-29510 - Exploiting Ghostscript using format strings https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/
03/07/2024 08:32:34
QRCode
archive.org
thumbnail

A format string vulnerability in Ghostscript ≤ 10.03.0 which enables attackers to gain Remote Code Execution (#RCE) while also bypassing sandbox protections. CVE-2024-29510 has significant impact on web-applications and other services offering document conversion and preview functionalities as these often use Ghostscript under the hood. We recommend verifying whether your solution (indirectly) makes use of Ghostscript and if so, update it to the latest version!

codeanlabs EN 2024 CVE-2024-29510 Ghostscript RCE
3 million iOS and macOS apps were exposed to potent supply-chain attacks https://arstechnica.com/security/2024/07/3-million-ios-and-macos-apps-were-exposed-to-potent-supply-chain-attacks/
03/07/2024 08:26:52
QRCode
archive.org
thumbnail

Apps that used code libraries hosted on CocoaPods were vulnerable for about 10 years.

arstechnica EN macOS iOS CVE-2024-38367 CocoaPods
page 93 / 223
5035 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn