Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 96 / 235
CVE-2024-34331: Parallels Repack Privilege Escalation https://khronokernel.com/macos/2024/05/30/CVE-2024-34331.html
30/05/2024 19:50:15
QRCode
archive.org

Another day, another accidental exploit 🥳. This time abusing Parallels Desktop’s trust in macOS installers, gaining local privilege escalation!

khronokernel EN 2024 Parallels Repack Privilege Escalation CVE-2024-34331
The Pumpkin Eclipse https://blog.lumen.com/the-pumpkin-eclipse/
30/05/2024 18:31:25
QRCode
archive.org
thumbnail

Executive Summary Lumen Technologies’ Black Lotus Labs identified a destructive event, as over 600,000 small office/home office (SOHO) routers were taken offline belonging to a single internet service provider (ISP). The incident took place over a 72-hour period between October 25-27, rendered the infected devices permanently inoperable, and required a hardware-based replacement. Public scan data Lumen Technologies’ Black Lotus Labs identified a destructive event, as over 600,000 small office/home office (SOHO) routers were taken offline belonging to a single internet service provider (ISP).

lumen EN 2024 IoT routers destructive SOHO ISP 72-hour Chalubo
Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities https://thehackernews.com/2024/05/researchers-uncover-active-exploitation.html?m=1
30/05/2024 16:30:28
QRCode
archive.org

Researchers have discovered several vulnerabilities in popular WordPress plugins that allow attackers to create rogue admin accounts.
#attacks #breach #computer #cyber #data #hack #hacker #hacking #how #information #malware #network #news #ransomware #security #software #the #to #today #updates #vulnerability

thehackernews EN 2024 WordPress Plugin Vulnerabilities
LilacSquid: The stealthy trilogy of PurpleInk, InkBox and InkLoader https://blog.talosintelligence.com/lilacsquid/
30/05/2024 14:52:52
QRCode
archive.org
thumbnail

Multiple TTPs utilized in this campaign bear some overlap with North Korean APT groups.

talosintelligence EN 2024 TTP LilacSquid research
Data breach exposes details of 25,000 current and former BBC employees https://www.theguardian.com/media/article/2024/may/29/data-breach-exposes-details-of-25000-current-and-former-bbc-employees
30/05/2024 14:34:05
QRCode
archive.org
thumbnail

Data breach at pension scheme being taken ‘extremely seriously’, but broadcaster says there is no evidence of a ransomware attack

theguardian EN 2024 BBC data-breach employees
Check Point - Wrong Check Point (CVE-2024-24919) https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/
30/05/2024 14:30:24
QRCode
archive.org
thumbnail

Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This time, it is Check Point who is the focus of our penetrative gaze.

Check Point, for those unaware, is the vendor responsible for the 'CloudGuard Network Security' appliance, yet another device claiming to be secure and hardened. Their slogan - "you deserve the best security" - implies they are a company you can trust with the security of your network. A bold claim.

watchtowr EN 2024 CVE-2024-24919 checkpoint analysis patch-diff
An Anonymous Source Shared Thousands of Leaked Google Search API Documents with Me; Everyone in SEO Should See Them https://sparktoro.com/blog/an-anonymous-source-shared-thousands-of-leaked-google-search-api-documents-with-me-everyone-in-seo-should-see-them/
30/05/2024 13:50:20
QRCode
archive.org
thumbnail

On Sunday, May 5th, I received an email from a person claiming to have access to a massive leak of API documentation from inside Google’s Search division.

sparktoro EN 2024 Google Leak Search API
macOS version of elusive 'LightSpy' spyware tool discovered https://www.bleepingcomputer.com/news/security/macos-version-of-elusive-lightspy-spyware-tool-discovered/
30/05/2024 12:05:37
QRCode
archive.org
thumbnail

A macOS version of the LightSpy surveillance framework has been discovered, confirming the extensive reach of a tool only previously known for targeting Android and iOS devices.

bleepingcomputer EN 2024 Apple LightSpy Malware Spyware
Operators of 911 S5 residential proxy service subjected to US sanctions https://www.scmagazine.com/brief/operators-of-911-s5-residential-proxy-service-subjected-to-us-sanctions
30/05/2024 10:15:48
QRCode
archive.org
thumbnail

Chinese nationals Yunhe Wang, Jingping Liu, and Yanni Zheng have been sanctioned by the U.S. Treasury Department for operating the residential proxy service 911 S5, which was a botnet comprised of over 19 million residential IP addresses that had been used to support various cybercrime groups' COVID-19 relief scams and bomb threats, Ars Technica reports.

scmagazine EN 2024 911 S5 residential-proxy botnet US China Operators arrested
Office of Public Affairs | 911 S5 Botnet Dismantled and Its Administrator Arrested in Coordinated International Operation | United States Department of Justice https://www.justice.gov/opa/pr/911-s5-botnet-dismantled-and-its-administrator-arrested-coordinated-international-operation
30/05/2024 10:12:16
QRCode
archive.org

A court-authorized international law enforcement operation led by the U.S. Justice Department disrupted a botnet used to commit cyber attacks, large-scale fraud, child exploitation, harassment, bomb threats, and export violations.

justice.gov EN 2024 911 S5 Botnet Dismantled press-release US
PoC Exploit Released For macOS Privilege Escalation Vulnerability https://gbhackers.com/poc-exploit-macos-privilege-escalation/#google_vignette
30/05/2024 09:37:03
QRCode
archive.org
thumbnail

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege escalation. This vulnerability has been assigned

gbhackers EN 2024 CVE-2024-27842 PoC Exploit Released macOS
Troy Hunt: Operation Endgame https://www.troyhunt.com/operation-endgame/
30/05/2024 09:20:22
QRCode
archive.org
thumbnail

Today we loaded 16.5M email addresses and 13.5M unique passwords provided by law enforcement agencies into Have I Been Pwned (HIBP) following botnet takedowns in a campaign they've coined Operation Endgame. That link provides an excellent overview so start there then come back to this blog post which

troyhunt EN 2024 HIBP Operation-Endgame passwords addresses
Largest ever operation against botnets hits dropper malware ecosystem | Europol https://www.europol.europa.eu/media-press/newsroom/news/largest-ever-operation-against-botnets-hits-dropper-malware-ecosystem
30/05/2024 09:11:50
QRCode
archive.org
thumbnail

Between 27 and 29 May 2024 Operation Endgame, coordinated from Europol’s headquarters, targeted droppers including, IcedID, SystemBC, Pikabot, Smokeloader, Bumblebee and Trickbot. The actions focused on disrupting criminal services through arresting High Value Targets, taking down the criminal infrastructures and freezing illegal proceeds. This approach had a global impact on the dropper ecosystem. The malware, whose infrastructure was taken down...

Europol EN 2024 Operation-Endgame IcedID SystemBC Pikabot Smokeloader Bumblebee Trickbot dropper botnets
Botnets disrupted after international action https://www.spamhaus.org/resource-hub/malware/operation-endgame-botnets-disrupted-after-international-action/#the-takedown-tale
30/05/2024 09:10:07
QRCode
archive.org

Continuing a string of successful botnet takedowns, on Thursday, May 30th 2024, a coalition of international law enforcement agencies announced "Operation Endgame". This effort targeted multiple botnets such as IcedID, Smokeloader, SystemBC, Pikabot and Bumblebee, as well as some of the operators of these botnets. These botnets played a key part in enabling ransomware, thereby causing damages to society estimated to be over a hundred million euros. This coordinated effort is the largest operation ever against botnets involved with ransomware.

spamhaus EN 2024 Operation-Endgame Smokeloader IcedID SystemBC Bumblebee notnet takedown
Cybercriminals pose as "helpful" Stack Overflow users to push malware https://www.bleepingcomputer.com/news/security/cybercriminals-pose-as-helpful-stack-overflow-users-to-push-malware/
30/05/2024 08:20:16
QRCode
archive.org
thumbnail

Cybercriminals are abusing Stack Overflow in an interesting approach to spreading malware—answering users' questions by promoting a malicious PyPi package that installs Windows information-stealing malware.

bleepingcomputer EN 2024 Information-stealing-malware Packages PyPI Python Stack-OverFlow pytoileur
How Researchers Cracked an 11-Year-Old Password to a $3 Million Crypto Wallet | WIRED https://www.wired.com/story/roboform-password-3-million-dollar-crypto-wallet/
29/05/2024 18:16:15
QRCode
archive.org
thumbnail

Thanks to a flaw in a decade-old version of the RoboForm password manager and a bit of luck, researchers were able to unearth the password to a crypto wallet containing a fortune.

wired EN 2024 RoboForm cryptocurrency bitcoin cracked password wallet
TeamCity Major Bug-Fix Release for All Versions: Update Your Server Now | The TeamCity Blog https://blog.jetbrains.com/teamcity/2024/05/teamcity-major-bug-fix-release-for-all-versions/
29/05/2024 16:29:21
QRCode
archive.org
thumbnail

Our customers’ safety is our utmost priority. In order to protect our customers from any potential security threats, we’ve rolled out major bug-fix releases for several older versions of TeamCity (versions 2022.04 through 2023.11).

JetBrains EN 2024 vulnerability TeamCity Bug-Fix
Cache Me If You Can: Local Privilege Escalation in Zscaler Client Connector (CVE-2023-41973) https://spaceraccoon.dev/zscaler-client-connector-local-privilege-escalation/
29/05/2024 15:43:59
QRCode
archive.org
thumbnail

A couple months ago, my colleague Winston Ho and I chained a series of unfortunate bugs into a zero-interaction local privilege escalation in Zscaler Client Connector. This was an interesting journey into Windows RPC caller validation and bypassing several checks, including Authenticode verification. Check out the original Medium blogpost for Winston’s own ZSATrayManager Arbitrary File Deletion (CVE-2023-41969)!

spaceraccoon EN 204 report vulnerability Zscaler Client Connector CVE-2023-41973
Cooler Master allegedly breached, members exposed https://cybernews.com/news/cooler-master-data-breach/
29/05/2024 13:33:03
QRCode
archive.org

Cooler Master, a popular computer hardware maker, has allegedly suffered from a data breach, exposing the company’s corporate data as well as the personal details of members from its fan-based members program.

The attackers claim to have stolen 103GB of data from the company’s servers on May 18th. According to the attacks’ perpetrators, the allegedly stolen information carries a trove of sensitive data, including Cooler Master’s Fanzone members’ payment card details.

cybernews EN 2024 Cooler-Master data-breach members
From Origins to Operations: Understanding Black Basta Ransomware https://flashpoint.io/blog/understanding-black-basta-ransomware/
29/05/2024 10:12:06
QRCode
archive.org
thumbnail

Explore the rise of Black Basta as a top ransomware threat, their sophisticated tactics, notable attacks, and future implications for cybersecurity.

flashpoint EN 2024 BlackBasta ransomware threat research
page 96 / 235
4696 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio