Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 95 / 205
4100 résultats taggé EN  ✕
Google sues alleged China crypto app racketeers: Report https://cointelegraph.com/news/google-sues-china-crypto-app-racketeers-report
04/04/2024 18:59:53
QRCode
archive.org

Google’s parent company, Alphabet, has filed a lawsuit against two people based in China for using the company’s platform for scam cryptocurrency apps that amassed over 100,000 downloads.

Alphabet claims that scammers used its platforms, Google Play and YouTube, to upload and advertise fraudulent crypto apps.

cointelegraph EN 2024 China crypto-scammers Alphabet lawsuit pig-butchering
IntelBroker Leaks Alleged National Security Data Tied to US Contractor Acuity Inc. https://www.hackread.com/intelbroker-us-national-security-data-contractor-acuity/
04/04/2024 18:53:00
QRCode
archive.org
thumbnail

The IntelBroker hacker and their affiliates have leaked a trove of sensitive records, which they claim jeopardize the United States national security.

hackread EN 2024 IntelBroker Leaks US Contractor Acuity
North Korea’s Post-Infection Python Payloads – One Night in Norfolk https://norfolkinfosec.com/north-koreas-post-infection-python-payloads/
04/04/2024 13:29:13
QRCode
archive.org

Throughout the past few months, several publications have written about a North Korean threat actor group’s use of NPM packages to deploy malware to developers and other unsuspecting victims. This blog post provides additional details regarding the second and third-stage malware in these attacks, which these publications have only covered in limited detail.

norfolkinfosec EN 2024 NPM packages Phlyum malware North-Korea phyton payloads
A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask https://www.wired.com/story/p4x-north-korea-internet-hacker-identity-reveal/
04/04/2024 13:28:34
QRCode
archive.org
thumbnail

As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to show the US military how it can—and should—adopt his methods.

wired EN 2024 P4x North-Korea Vigilante military attack
Ukrainian cybersecurity official reveals structure of Russian hacker groups https://www.ukrinform.net/rubric-ato/3848343-ukrainian-cybersecurity-official-reveals-structure-of-russian-hacker-groups.html
04/04/2024 13:27:46
QRCode
archive.org
thumbnail

Russian hacker groups are military units with code names that are part of the Main Intelligence Directorate of the General Staff and the Federal Security Service of the Russian Federation. — Ukrinform.

ukrinform EN 2024 Russia-Ukraine-war Russia code-names structure hacker-groups
Exclusive: Hackers stole Russian prisoner database to avenge death of Navalny https://edition.cnn.com/2024/03/31/politics/navalny-russian-prisoner-database-hack/index.html?ref=news.risky.biz
04/04/2024 13:24:32
QRCode
archive.org
thumbnail

Within hours of opposition leader Alexey Navalny’s death in February in a Russian prison, a group of anti-Kremlin hackers went looking for revenge.

cnn 2024 EN anti-Kremlin hackers stole prisoner database Russia Data-Breach
DJI Mavic 3 Drone Research: Vulnerability Analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis
03/04/2024 23:00:22
QRCode
archive.org
thumbnail

Nozomi Networks Labs found 9 vulnerabilities in DJI drones - we outline the research process for identifying and mitigating these security issues.

nozominetworks EN 2024 DJI drones vulnerabilities Analysis
Threat Actors Deliver Malware via YouTube Video Game Cracks https://www.proofpoint.com/uk/blog/threat-insight/threat-actors-deliver-malware-youtube-video-game-cracks
03/04/2024 22:58:20
QRCode
archive.org
thumbnail

Key takeaways  Proofpoint identified multiple YouTube channels distributing malware by promoting cracked and pirated video games and related content.  The video descriptions include links leading t...

proofpoint EN 2024 Malware YouTube Video Game Cracks
Microsoft could have prevented Chinese cloud email hack, US cyber report says https://www.theverge.com/2024/4/3/24119787/microsoft-cloud-email-hack-china-us-cyber-report
03/04/2024 22:54:04
QRCode
archive.org
thumbnail

Microsoft needs a security culture overhaul, a US report concludes. The software giant could have prevented a cloud email hack in 2023.

theverge EN 2024 Microsoft cloud email cascade-of-security-failures Storm0558 DHS
‘The Manipulaters’ Improve Phishing, Still Fail at Opsec https://krebsonsecurity.com/2024/04/the-manipulaters-improve-phishing-still-fail-at-opsec/
03/04/2024 18:06:08
QRCode
archive.org

Roughly nine years ago, KrebsOnSecurity profiled a Pakistan-based cybercrime group called "The Manipulaters," a sprawling web hosting network of phishing and spam delivery platforms. In January 2024, The Manipulaters pleaded with this author to unpublish previous stories about their work,…

krebsonsecurity EN 2024 Pakistan-based cybercrime TheManipulaters
The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind https://www.wired.com/story/jia-tan-xz-backdoor/
03/04/2024 17:16:13
QRCode
archive.org
thumbnail

The thwarted XZ Utils supply chain attack was years in the making. Now, clues suggest nation-state hackers were behind the persona that inserted the malicious code.

wired EN 2024 XZ vulnerabilities linux open-source hackers JiaT75
XZ Utils Supply Chain Puzzle: Binarly Ships Free Scanner for CVE-2024-3094 Backdoor https://www.binarly.io/blog/xz-utils-supply-chain-puzzle-binarly-ships-free-scanner-for-cve-2024-3094-backdoor
03/04/2024 17:01:35
QRCode
archive.org

On March 29, right before Easter weekend, we received notifications about something unusual happening with the open-source project XZ Utils, which provides lossless data compression on virtually all Unix-like operating systems, including Linux.

The initial warning was sent to the Open Source Security mailing list sent by Andres Freund, who discovered that XZ Utils versions 5.6.0 and 5.6.1 are impacted by a backdoor. A few hours later, the US government’s CISA and OpenSSF warned about a critical problem: an installed XZ backdoored version could lead to unauthorized remote access.

binarly EN 2024 XZ Supply-chain-attack CVE-2024-3094 Scanner
China-linked Hackers Deploy New 'UNAPIMON' Malware for Stealthy Operations https://thehackernews.com/2024/04/china-linked-hackers-deploy-new.html
03/04/2024 16:55:15
QRCode
archive.org

A threat activity cluster tracked as Earth Freybug has been observed using a new malware called UNAPIMON to fly under the radar.

"Earth Freybug is a cyberthreat group that has been active since at least 2012 that focuses on espionage and financially motivated activities," Trend Micro security researcher Christopher So said in a report published today.

thehackernews EN 2024 China-linked UNAPIMON APT41Malware
Google fixes two Pixel zero-day flaws exploited by forensics firms https://www.bleepingcomputer.com/news/security/google-fixes-two-pixel-zero-day-flaws-exploited-by-forensics-firms/
03/04/2024 16:52:35
QRCode
archive.org
thumbnail

Google has fixed two Google Pixel zero-days exploited by forensic firms to unlock phones without a PIN and gain access to the data stored within them.

bleepingcomputer EN 2024 Android Forensics Google Google-Pixel Mobile Pixel Vulnerability Zero-Day GrapheneOS
Introducing Sunlight, a CT implementation built for scalability, ease of operation, and reduced cost - Let's Encrypt https://letsencrypt.org/2024/03/14/introducing-sunlight
03/04/2024 10:41:04
QRCode
archive.org
thumbnail

Let’s Encrypt is proud to introduce Sunlight, a new implementation of a Certificate Transparency log that we built from the ground up with modern Web PKI opportunities and constraints in mind. In partnership with Filippo Valsorda, who led the design and implementation, we incorporated feedback from the broader transparency logging community, including the Chrome and TrustFabric teams at Google, the Sigsum project, and other CT log and monitor operators. Their insights have been instrumental in shaping the project’s direction.

letsencrypt EN 2024 transparency Sunlight Certificate
The Open Source Community is Building Cybersecurity Processes for CRA Compliance https://eclipse-foundation.blog/2024/04/02/open-source-community-cra-compliance/
03/04/2024 10:02:42
QRCode
archive.org
thumbnail

tl;dr – Apache Software Foundation, Blender Foundation, OpenSSL Software Foundation, PHP Foundation, Python Software Foundation, Rust Foundation, and Eclipse Foundation are jointly announcing…

eclipse-foundation EN 2024 Open-Source collaborative standards EU CRA Compliance
research!rsc: The xz attack shell script https://research.swtch.com/xz-script
03/04/2024 10:00:07
QRCode
archive.org

Andres Freund published the existence of the xz attack on 2024-03-29 to the public oss-security@openwall mailing list. The day before, he alerted Debian security and the (private) distros@openwall list. In his mail, he says that he dug into this after “observing a few odd symptoms around liblzma (part of the xz package) on Debian sid installations over the last weeks (logins with ssh taking a lot of CPU, valgrind errors).”

At a high level, the attack is split in two pieces: a shell script and an object file. There is an injection of shell code during configure, which injects the shell code into make. The shell code during make adds the object file to the build. This post examines the shell script. (See also my timeline post.)

research.swtch.com EN 2024 script exploitation xz attack
OWASP Data Breach Notification https://owasp.org/blog/2024/03/29/OWASP-data-breach-notification
03/04/2024 09:55:37
QRCode
archive.org
thumbnail
  • Who is affected? If you were an OWASP member from 2006 to around 2014 and provided your resume as part of joining OWASP, we advise assuming your resume was part of this breach.
  • What data was exposed? The resumes contained names, email addresses, phone numbers, physical addresses, and other personally identifiable information.
OWASP EN 2024 Data-Breach
GitHub - amlweems/xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) https://github.com/amlweems/xzbot?tab=readme-ov-file#ed448-patch
01/04/2024 18:42:40
QRCode
archive.org
thumbnail

notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) - amlweems/xzbot

amlweems EN 2024 CVE-2024-3094 xz backdoor honeypot analysis
Facebook snooped on users’ Snapchat traffic in secret project, documents reveal | TechCrunch https://techcrunch.com/2024/03/26/facebook-secret-project-snooped-snapchat-user-traffic/?guccounter=1
01/04/2024 18:01:31
QRCode
archive.org
thumbnail

A secret program called "Project Ghostbusters" saw Facebook devise a way to intercept and decrypt the encrypted network traffic of Snapchat users to study their behavior.

techcrunch EN 2024 privacy meta Project-Ghostbusters Snapchat traffic VPN
page 95 / 205
4677 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio