Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 93 / 205
4098 résultats taggé EN  ✕
Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files https://thehackernews.com/2024/04/raspberry-robin-returns-new-malware.html?m=1
14/04/2024 15:30:37
QRCode
archive.org

Researchers uncover a fresh wave of the Raspberry Robin campaign spreading malware through malicious Windows Script Files (WSFs) since March 2024.
#attacks #breach #computer #cyber #data #hack #hacker #hacking #how #information #malware #network #news #ransomware #security #software #the #to #today #updates #vulnerability

thehackernews 2024 EN Raspberry-Robin WSF return
Top Israeli spy chief exposes his true identity in online security lapse | Israel | The Guardian https://www.theguardian.com/world/2024/apr/05/top-israeli-spy-chief-exposes-his-true-identity-in-online-security-lapse
14/04/2024 15:19:30
QRCode
archive.org
thumbnail

Exclusive: Yossi Sariel unmasked as head of Unit 8200 and architect of AI strategy after book written under pen name reveals his Google account

theguardian EN 2024 secop Unit8200 Israel book oups spy
Ransomware gang’s new extortion trick? Calling the front desk https://techcrunch.com/2024/04/09/ransomware-gang-fail-calling-front-desk-extortion/
14/04/2024 15:18:34
QRCode
archive.org
thumbnail

When a hacker called the company that his gang claimed to breach, he felt the same way that most of us feel when calling the front desk: frustrated.

The phone call between the hacker, who claims to represent the ransomware gang DragonForce, and the victim company employee was posted by the ransomware gang on its dark web site in an apparent attempt to put pressure on the company to pay a ransom demand. In reality, the call recording just shows a somewhat hilarious and failed attempt to extort and intimidate a company’s rank-and-file employees.

techcrunch EN 2024 ransomware target frontdesk
Targus discloses cyberattack after hackers detected on file servers https://www.bleepingcomputer.com/news/security/targus-discloses-cyberattack-after-hackers-detected-on-file-servers/
14/04/2024 15:16:26
QRCode
archive.org
thumbnail

Laptop and tablet accessories maker Targus disclosed that it suffered a cyberattack disrupting operations after a threat actor gained access to the company's file servers.

bleepingcomputer EN 2024 Mobile InfoSec Security Targus cyberattack
Attempted Audio Deepfake Call Targets LastPass Employee https://blog.lastpass.com/posts/2024/04/attempted-audio-deepfake-call-targets-lastpass-employee
14/04/2024 15:15:22
QRCode
archive.org
thumbnail
lastpass EN 2024 Audio Deepfake Employee
Roku says 576,000 user accounts hacked after second security incident https://techcrunch.com/2024/04/12/roku-second-user-accounts-hacked/
13/04/2024 10:12:14
QRCode
archive.org
thumbnail

Streaming giant Roku has confirmed a second security incident in as many months, with hackers this time able to compromise more than half a million Roku user accounts.

In a statement Friday, the company said about 576,000 user accounts were accessed using a technique known as credential stuffing, where malicious hackers use usernames and passwords stolen from other data breaches and reuse the logins on other sites.

techcrunch EN 2024 roku data-breach
Researchers discover new ransomware gang ‘Muliaka’ attacking Russian businesses https://therecord.media/muliaka-ransomware-group-targeting-russian-businesses-conti?_hsenc=p2ANqtz-9_rrl-EsQRNWUkdDZu1p2oi9e3Mqew71pyTwU0pADQzCehJF9X5V-RjlZF5ymYmmVzPfkMwgQN-m7H6symSoAxW0gbow&_hsmi=302381143
13/04/2024 09:55:08
QRCode
archive.org
thumbnail

A previously unknown ransomware gang has been attacking Russian businesses with malware based on the leaked source code from the Conti hacking group.

The gang, which researchers at the Moscow-based cybersecurity company F.A.C.C.T. have dubbed “Muliaka," or Muddy Water in English, has left minimal traces from its attacks but has likely been active since at least December 2023.

therecord EN 2024 Muliaka ransomware gang Russia
Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400) https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/
13/04/2024 03:34:16
QRCode
archive.org
thumbnail

On April 10, 2024, Volexity identified zero-day exploitation of a vulnerability found within the GlobalProtect feature of Palo Alto Networks PAN-OS at one of its network security monitoring (NSM) customers. Volexity received alerts regarding suspect network traffic emanating from the customer’s firewall. A subsequent investigation determined the device had been compromised. The following day, April 11, 2024, Volexity observed further, identical exploitation at another one of its NSM customers by the same threat actor.

volexity EN 2024 Zero-Day Exploitation RCE GlobalProtect CVE-2024-3400
Kaspersky analysis of the backdoor in XZ https://securelist.com/xz-backdoor-story-part-1/112354/
13/04/2024 03:32:39
QRCode
archive.org
thumbnail

Kaspersky analysis of the backdoor recently found in XZ, which is used in many popular Linux distributions and in OpenSSH server process.

securelist EN 2024 Backdoor Cyber-espionage Linux Malware analysis Malware-Descriptions Malware-Technologies SSH XZ
Why CISA is Warning CISOs About a Breach at Sisense https://krebsonsecurity.com/2024/04/why-cisa-is-warning-cisos-about-a-breach-at-sisense/
12/04/2024 21:27:44
QRCode
archive.org

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today it is investigating a breach at business intelligence company Sisense, whose products are designed to allow companies to view the status of multiple third-party online services in a single dashboard.…

krebsonsecurity EN 2024 CISA Sisense data-breach
Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability https://thehackernews.com/2024/04/fortinet-has-released-patches-to.html?m=1
11/04/2024 09:41:13
QRCode
archive.org

If you use FortiClientLinux, update immediately. Critical vulnerability could let attackers run code on your system. Patch now, get the details here.

thehackernews EN 2024 FortiClientLinux Fortinet CVE-2023-45590
LockBit bungles attempt to rebrand as DarkVault https://cybernews.com/news/lockbit-dark-vault-rebrand/
11/04/2024 09:22:14
QRCode
archive.org

The LockBit cybercriminal outfit appears to be planning a ransomware rebrand as the DarkVault, discovered after LockBit seemingly bungled the new website’s design.

cybernews EN 2024 LockBit DarkVault rebranding
Apple Updates Spyware Alert System to Warn Victims of Mercenary Attacks https://thehackernews.com/2024/04/apple-expands-spyware-alert-system-to.html?m=1
11/04/2024 09:21:10
QRCode
archive.org

Apple's updated spyware alert system now warns individual users of potential targeting by mercenary spyware attacks.

thehackernews EN 2024 Apple alert-system Warn Victims mercenary-spyware
Romania-linked ‘Rubycarp’ hackers look for cryptomining, phishing DDoS opportunities https://therecord.media/romania-linked-rubycarp-cryptomining-phishing?_hsenc=p2ANqtz-9HLeh2NKX9YD8v6Rfw_YGWT9zf3p7rORXktQ5wNPQyt1AHa2bq5Pj7rmBv1zUT1d8_YLC4QKFG2VDEEKJoZQrzHzqjfA&_hsmi=302087305
11/04/2024 09:08:18
QRCode
archive.org
thumbnail

Rubycarp has been in operation for at least a decade, and its campaigns appear to overlap with other cybercrime groups, according to researchers at Sysdig.

therecord EN 2024 Rubycarp gang Romania DDoS cryptomining
France Bracing for Cyberattacks During Summer Olympics https://www.nytimes.com/2024/04/08/us/politics/france-cyberattacks-summer-olympics.html?mid=1#cid=1774108
10/04/2024 10:09:37
QRCode
archive.org

French officials are visiting Washington for cybersecurity consultations as President Emmanuel Macron predicts Moscow will try to target the Games.

nytimes EN 2024 Cyberwarfare France Russia Summer-Olympics
Hacker doxxes nearly every adult in El Salvador https://protos.com/hacker-doxxes-nearly-every-adult-in-el-salvador/
10/04/2024 10:07:42
QRCode
archive.org
thumbnail

A hacker in El Salvador has released detailed information, including full names, birthdays, phone numbers, and social security numbers.

protos EN El-Salvador data-leak PII
Vulnerabilities Identified in LG WebOS https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/?ref=news.risky.biz%2F
10/04/2024 09:05:53
QRCode
archive.org
thumbnail

As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities. This research paper is part of a broader program that aims to shed light on the security of the world’s best-sellers in the IoT space. This report covers vulnerabilities discovered while researching the LG WebOS TV operating system.

bitdefender EN 2024 LG WebOS TV iot vulnerability CVE-2023-6317 CVE-2023-6318 CVE-2023-6319 CVE-2023-6320
Security Advisory YSA-2024-01 https://www.yubico.com/support/security-advisories/ysa-2024-01/
10/04/2024 09:05:30
QRCode
archive.org
thumbnail

A security issue has been identified in YubiKey Manager GUI which could lead to unexpected privilege escalation on Windows. If a user runs the YubiKey Manager GUI as Administrator, browser windows opened by YubiKey Manager GUI may be opened as Administrator which could be exploited by a local attacker to perform actions as Administrator. Under this circumstance, some browsers like Edge for example, have additional mitigations to prevent opening as Administrator.

yubico EN 2024 Advisory YubiKey-Manager privilege-escalation YSA-2024-01
SP 800-61 Rev. 3, Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile https://csrc.nist.gov/pubs/sp/800/61/r3/ipd
10/04/2024 09:03:01
QRCode
archive.org

Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. The six Functions of the NIST Cybersecurity Framework (CSF) 2.0 all play vital roles in incident response.

NIST is releasing the initial public draft of Special Publication (SP) 800-61r3 (Revision 3), Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile, for public comment. This publication seeks to assist organizations with incorporating cybersecurity incident response recommendations and considerations throughout their cybersecurity risk management activities, as described by CSF 2.0. Doing so can help organizations prepare for incident responses, reduce the number and impact of incidents that occur, and improve the efficiency and effectiveness of their incident detection, response, and recovery activities.

NIST 2024 EN Recommendations Incident-response risk-management SP-800-61
Microsoft employees exposed internal passwords in security lapse https://techcrunch.com/2024/04/09/microsoft-employees-exposed-internal-passwords-security-lapse/?ref=news.risky.biz&guccounter=1
10/04/2024 09:00:07
QRCode
archive.org
thumbnail

Microsoft has resolved a security lapse that exposed internal company files and credentials to the open internet.

Security researchers Can Yoleri, Murat Özfidan and Egemen Koçhisarlı with SOCRadar, a cybersecurity company that helps organizations find security weaknesses, discovered an open and public storage server hosted on Microsoft’s Azure cloud service that was storing internal information relating to Microsoft’s Bing search engine.

The Azure storage server housed code, scripts and configuration files containing passwords, keys and credentials used by the Microsoft employees for accessing other internal databases and systems.

techcrunch EN socradar Azure data-leack bing storage scripts configuration passwords
page 93 / 205
4675 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio