Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 97 / 235
Cache Me If You Can: Local Privilege Escalation in Zscaler Client Connector (CVE-2023-41973) https://spaceraccoon.dev/zscaler-client-connector-local-privilege-escalation/
29/05/2024 15:43:59
QRCode
archive.org
thumbnail

A couple months ago, my colleague Winston Ho and I chained a series of unfortunate bugs into a zero-interaction local privilege escalation in Zscaler Client Connector. This was an interesting journey into Windows RPC caller validation and bypassing several checks, including Authenticode verification. Check out the original Medium blogpost for Winston’s own ZSATrayManager Arbitrary File Deletion (CVE-2023-41969)!

spaceraccoon EN 204 report vulnerability Zscaler Client Connector CVE-2023-41973
Cooler Master allegedly breached, members exposed https://cybernews.com/news/cooler-master-data-breach/
29/05/2024 13:33:03
QRCode
archive.org

Cooler Master, a popular computer hardware maker, has allegedly suffered from a data breach, exposing the company’s corporate data as well as the personal details of members from its fan-based members program.

The attackers claim to have stolen 103GB of data from the company’s servers on May 18th. According to the attacks’ perpetrators, the allegedly stolen information carries a trove of sensitive data, including Cooler Master’s Fanzone members’ payment card details.

cybernews EN 2024 Cooler-Master data-breach members
From Origins to Operations: Understanding Black Basta Ransomware https://flashpoint.io/blog/understanding-black-basta-ransomware/
29/05/2024 10:12:06
QRCode
archive.org
thumbnail

Explore the rise of Black Basta as a top ransomware threat, their sophisticated tactics, notable attacks, and future implications for cybersecurity.

flashpoint EN 2024 BlackBasta ransomware threat research
BreachForums Returns Just Weeks After FBI Seizure - Honeypot or Blunder? https://thehackernews.com/2024/05/breachforums-returns-just-weeks-after.html
29/05/2024 09:58:27
QRCode
archive.org

The online criminal bazaar BreachForums has been resurrected merely two weeks after a U.S.-led coordinated law enforcement action dismantled and seized control of its infrastructure.

Cybersecurity researchers and dark web trackers Brett Callow, Dark Web Informer, and FalconFeeds revealed the site's online return at breachforums[.]st – one of the dismantled sites – by a user named ShinyHunters, who has since offered for sale a 1.3 TB database containing details of allegedly 560 million Ticketmaster customers for $500,000.

thehackernews EN 2024 BreachForums Ticketmaster customers return darkweb
CVE-2024-23108: Fortinet FortiSIEM 2nd Order Command Injection Deep-Dive https://www.horizon3.ai/attack-research/cve-2024-23108-fortinet-fortisiem-2nd-order-command-injection-deep-dive/
29/05/2024 09:02:48
QRCode
archive.org
thumbnail

CVE-2024-23108 Fortinet FortiSIEM Command Injection Deep-Dive and Indicators of Compromise. This blog details a command injection vulnerability which allows an unauthenticated attacker to access the FortiSIEM server as root to execute arbitrary commands.

horizon3 EN 2024 CVE-2024-23108 FortiSIEM IoCs analysis
Pegasus in Rwanda: Sister of presidential candidate, high-ranking Rwandan politicians added to spyware list https://forbiddenstories.org/pegasus-in-rwanda-sister-of-presidential-candidate-high-ranking-rwandan-politicians-added-to-spyware-list/?ref=news.risky.biz
29/05/2024 08:58:28
QRCode
archive.org
thumbnail

A leaked list of phone numbers reveals how Rwandan President Paul Kagame’s regime used Pegasus spyware sought to track political opponents and members of his own party.

forbiddenstories EN 2024 Rwanda Pegasus spyware
PCTattletale leaks victims' screen recordings to entire Internet https://www.ericdaigle.ca/pctattletale-leaking-screen-captures/
28/05/2024 08:15:57
QRCode
archive.org

PCTattletale is a simple stalkerware app. Rather than the sophisticated monitoring of many similarly insecure competitors it simply asks for permission to record the targeted device (Android and Windows are supported) on infection. Afterward the observer can log in to an online portal and activate recording, at which point a screen capture is taken on the device and played on the target's browser.

ericdaigle EN 2024 PCTattletale analysis stalkerware screen recordings leak
Important Security Update – Enhance your VPN Security Posture! https://blog.checkpoint.com/security/enhance-your-vpn-security-posture?campaign=checkpoint&eid=guvrs&advisory=1
28/05/2024 08:12:11
QRCode
archive.org

Over the past few months, we have observed increased interest of malicious groups in leveraging remote-access VPN environments as an entry point and

checkpoint EN 2024 warning VPN remote-access local-accounts
Ransomware Group Claims Responsibility for Christie’s Hack https://www.nytimes.com/2024/05/27/arts/design/hackers-claim-christies-attack.html?unlocked_article_code=1.vE0._XLj.6wpoMCYnfgcv&smid=url-share
28/05/2024 07:54:03
QRCode
archive.org

The hacking group RansomHub is threatening to release “sensitive personal information” about the auction house’s clients.

nytimes EN 2024 Auction computer Christies RansomHub
Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling https://www.netskope.com/blog/phishing-with-cloudflare-workers-transparent-phishing-and-html-smuggling
27/05/2024 15:56:13
QRCode
archive.org
thumbnail

Netskope Threat Labs is tracking multiple phishing campaigns that abuse Cloudflare Workers. The campaigns are likely the work of different

netskope EN 2024 Cloudflare Workers HTML-Smuggling campaign
Cyber Signals: Inside the growing risk of gift card fraud https://www.microsoft.com/en-us/security/blog/2024/05/23/cyber-signals-inside-the-growing-risk-of-gift-card-fraud/
27/05/2024 13:35:11
QRCode
archive.org
thumbnail

In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a constant challenge. The latest edition of Cyber Signals dives deep into the world of Storm-0539, also known as Atlas Lion, shedding light on their sophisticated methods of gift and payment card theft.

microsoft EN 2024 gift-card fraud Storm-0539 payment card
Pwn2Own Toronto 2022 : A 9-year-old bug in MikroTik RouterOS https://devco.re/blog/2024/05/24/pwn2own-toronto-2022-a-9-year-old-bug-in-mikrotik-routeros-en/?ref=news.risky.biz
27/05/2024 13:21:43
QRCode
archive.org
thumbnail

DEVCORE research team found a 9-year-old WAN bug on RouterOS, the product of MikroTik. Combined with another bug of the Canon printer, DEVCORE becomes the first team ever to successfully complete an attack chain in the brand new SOHO Smashup category of Pwn2Own. And DEVCORE also won the title of Master of Pwn in Pwn2Own Toronto 2022.

devco.re EN 2024 CVE-2023-32154 Pwn2Own MikroTik-RouterOS
Russia Steps Up a Covert Sabotage Campaign Aimed at Europe https://www.nytimes.com/2024/05/26/us/politics/russia-sabotage-campaign-ukraine.html
26/05/2024 13:33:39
QRCode
archive.org

Russian military intelligence, the G.R.U., is behind arson attacks aimed at undermining support for Ukraine’s war effort, security officials say.

nytimes EN 2024 Russia Ukraine EU Arson Vandalism Sabotage 2022 Russian NATO England Politics G.R.U US Europe Estonia GRU Russia-Ukraine-war
Exploiting the Cloud: How SMS Scammers are using Amazon, Google and IBM Cloud Services to Steal Customer Data https://www.enea.com/insights/exploiting-the-cloud-how-sms-scammers-are-using-amazon-google-and-ibm-cloud-services-to-steal-customer-data/
25/05/2024 22:06:37
QRCode
archive.org
thumbnail

Discover how SMS scammers are exploiting cloud storage to host scam websites with the intention of stealing sensitive information

enea EN 2024 SMS scammers IBM Cloud Services Amazon Google
New ShrinkLocker ransomware uses BitLocker to encrypt your files https://www.bleepingcomputer.com/news/security/new-shrinklocker-ransomware-uses-bitlocker-to-encrypt-your-files/
25/05/2024 22:01:44
QRCode
archive.org
thumbnail

A new ransomware strain called ShrinkLocker creates a new boot partition to encrypt corporate systems using Windows BitLocker.

bleepingcomputer EN 2024 BitLocker Encryption Ransomware ShrinkLocker Windows Security InfoSec Computer-Security
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail https://thehackernews.com/2024/05/cyber-criminals-exploit-github-and.html
25/05/2024 21:59:33
QRCode
archive.org

A "multi-faceted campaign" has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking trojans such as Atomic (aka AMOS), Vidar, Lumma (aka LummaC2), and Octo by impersonating credible software like 1Password, Bartender 5, and Pixelmator Pro.

thehackernews EN 2024 GitHub FileZilla AMOS impersonating software 1Password fake
Foxit PDF “Flawed Design” Exploitation https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/
25/05/2024 21:57:16
QRCode
archive.org
thumbnail

PDF (Portable Document Format) files have become an integral part of modern digital communication. Renowned for their universality and fidelity, PDFs offer a robust platform for sharing documents across diverse computing environments. PDFs have evolved into a standard format for presenting text, images, and multimedia content with consistent layout and formatting, irrespective of the software, hardware, or operating system used to view them. This versatility has made PDFs indispensable in fields ranging from business and academia to government and personal use, serving as a reliable means of exchanging information in a structured and accessible manner.

checkpoint EN 2024 Foxit PDF Exploitation
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations — Elastic Security Labs https://www.elastic.co/security-labs/invisible-miners-unveiling-ghostengine
25/05/2024 21:56:36
QRCode
archive.org
thumbnail

Elastic Security Labs has identified REF4578, an intrusion set incorporating several malicious modules and leveraging vulnerable drivers to disable known security solutions (EDRs) for crypto mining.

elastic EN 2024 GHOSTENGINE REF4578
A Catalog of Hazardous AV Sites – A Tale of Malware Hosting https://www.trellix.com/blogs/research/a-catalog-of-hazardous-av-sites-a-tale-of-malware-hosting/
25/05/2024 21:52:52
QRCode
archive.org

In mid-April 2024, Trellix Advanced Research Center team members observed multiple fake AV sites hosting highly sophisticated malicious files such as APK, EXE and Inno setup installer that includes Spy and Stealer capabilities. Hosting malicious software through sites which look legitimate is predatory to general consumers, especially those who look to protect their devices from cyber-attacks. The hosted websites made to look legitimate are listed below.

trellix EN 2024 fake antivirus AV malicious research
Putin hijacked Austria’s spy service. Now he's going after its government https://www.politico.eu/article/vladimir-putin-austria-spy-service-bvt-government-intelligence-wirecard-jan-marsalek-freedom-party/
25/05/2024 21:44:05
QRCode
archive.org
thumbnail

Intelligence officials suspect Wirecard COO Jan Marsalek of colluding with the far-right Freedom Party on Moscow’s behalf. 

politico EN 2024 Austria EU-Russia-relations Far-right Foreign-policy Herbert-Kickl Intelligence spy
page 97 / 235
4699 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio