Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 99 / 235
Cybercriminals Exploit Docusign With Customizable Phishing Templates https://abnormalsecurity.com/blog/cybercriminals-exploit-docusign
17/05/2024 09:27:38
QRCode
archive.org
thumbnail

Cybercriminals are abusing Docusign by selling customizable phishing templates on cybercrime forums, allowing attackers to steal credentials for phishing…

abnormalsecurity EN 2024 phishing customizable templates credentials business docusign selling cybercrime forums Docusign
Russian hackers use new Lunar malware to breach a European govt's agencies https://www.bleepingcomputer.com/news/security/russian-hackers-use-new-lunar-malware-to-breach-a-european-govts-agencies/#google_vignette
17/05/2024 09:25:27
QRCode
archive.org
thumbnail

Security researchers discovered two previously unseen backdoors dubbed LunarWeb and LunarMail that were used to compromise a European government's diplomatic institutions abroad.

bleepingcomputer EN 2024 APT Lunar LunarMail LunarWeb Malware Turla
To the Moon and back(doors): Lunar landing in diplomatic missions https://www.welivesecurity.com/en/eset-research/moon-backdoors-lunar-landing-diplomatic-missions/
17/05/2024 09:22:41
QRCode
archive.org
thumbnail

ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs

welivesecurity EN 2024 Lunar toolset Turla APT EU European ministry analysis
Log4j Exploited by XMRig Cryptominer Malware: Analysis & Mitigation https://www.uptycs.com/blog/log4j-campaign-xmrig-malware
16/05/2024 16:56:08
QRCode
archive.org
thumbnail

Learn how the Log4j vulnerability (CVE-2021-44228) is exploited by XMRig cryptominer malware. Discover attack methods, indicators, and effective mitigation strategies.

uptycs EN 2024 Log4j XMRig Cryptominer Malware CVE-2021-44228
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/
16/05/2024 16:15:33
QRCode
archive.org
thumbnail

Microsoft Threat Intelligence has observed Storm-1811 misusing the client management tool Quick Assist to target users in social engineering attacks that lead to malware like Qakbot followed by Black Basta ransomware deployment.

microsoft EN 2024 QuickAssist Ransomware Qakbot BlackBasta
Employee Personal GitHub Repos Expose Internal Azure and Red Hat Secrets https://www.aquasec.com/blog/github-repos-expose-azure-and-red-hat-secrets/
16/05/2024 16:00:38
QRCode
archive.org
thumbnail

Our research reveals that personal repositories often expose sensitive corporate data, leading to severe security breaches

aquasec EN 2024 GitHub Repos Exposed Redhat Microsoft tokens
Cyber Official Speaks Out, Reveals Mobile Network Attacks in U.S. https://www.404media.co/email/79f7367c-bd3c-4bff-ac9f-85c738d08bec/?ref=daily-stories-newsletter
16/05/2024 15:21:49
QRCode
archive.org
thumbnail

A CISA official breaks with the government narrative and tells the FCC that SS7 and similar networks and protocols have been used to track people in the U.S. in recent years.

404media EN 2024 SS7 spy tracking position people US
Popular Cyber Crime Forum Breach Forums Seized by Police https://www.hackread.com/cyber-crime-forum-breach-forums-seized-by-police/
16/05/2024 09:32:54
QRCode
archive.org
thumbnail

The cybercrime and hacker forum Breach Forums has been seized by the Federal Bureau of Investigation (FBI) and the Department of Justice.

hackread EN 2024 BreachForums seized FBI
An Infostealer's Brewin': Cuckoo & AtomicStealer Get Creative https://alden.io/posts/infostealers-a-brewin/
15/05/2024 20:54:08
QRCode
archive.org
thumbnail

Recent infostealer malware campaign utilizing fake Homebrew websites to deliver Cuckoo and AtomicStealer.

alden EN 2024 macOS Malware RE CTI AMOS Infostealer Homebrew
Santander reports customer, employee data breach in Spain, Chile, Uruguay https://www.reuters.com/technology/cybersecurity/santander-reports-customer-employee-data-breach-spain-chile-uruguay-2024-05-14/?ref=news.risky.biz
15/05/2024 11:30:36
QRCode
archive.org

Spanish bank Santander said on Tuesday some customer and employee data in a database hosted by an outside provider was accessed by an unauthorized party, but that the bank's own operations and systems have not been affected.

reuters EN 2024 Santander Spain data-breach Chile Uruguay
Investigation into Helsinki Education Division data breach proceeds | City of Helsinki https://www.hel.fi/en/news/investigation-into-helsinki-education-division-data-breach-proceeds?ref=news.risky.biz
15/05/2024 11:30:16
QRCode
archive.org
thumbnail

On 2 May 2024, the City of Helsinki issued a notice of a data breach targeted at its Education Division. Investigation into the data breach proceeds through a cooperative effort by the City´s own and external experts. On Monday, 13 May 2024, the City of Helsinki held a press conference on the progress of this investigation.

hel.fi EN 2024 Finland Helsinki data-breach Education
N. Korean hacking group stole massive amount of personal info from S. Korean court computer network https://m-en.yna.co.kr/view/AEN20240511001900320?ref=news.risky.biz
15/05/2024 11:29:45
QRCode
archive.org
thumbnail

A North Korean hacking group had stolen a massive amount of personal information from a South Korean court computer network, probe results showed on Saturday.

A total of 1,014 gigabytes worth of data and documents were leaked from Seoul's court computer network between January 2021 and February 2023 by the hacking group, presumed to be Lazarus, according to the joint probe by the police, the prosecution and the National Intelligence Service.

m-en.yna.co.kr North-Korea stolen Seoul Lazarus Court South-Korea
PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers https://www.bleepingcomputer.com/news/security/poc-exploit-released-for-rce-zero-day-in-d-link-exo-ax4800-routers/
15/05/2024 00:24:02
QRCode
archive.org
thumbnail

The D-Link EXO AX4800 (DIR-X4860) router is vulnerable to remote unauthenticated command execution that could lead to complete device takeovers by attackers with access to the HNAP port.

bleepingcomputer EN 2024 Authentication-Bypass D-Link Exploit Proof-of-Concept Remote-Command-Execution Router Vulnerability Zero-Day Security InfoSec Computer-Security
VMware fixes three zero-day bugs exploited at Pwn2Own 2024 https://www.bleepingcomputer.com/news/security/vmware-fixes-three-zero-day-bugs-exploited-at-pwn2own-2024/
14/05/2024 19:58:47
QRCode
archive.org
thumbnail

VMware fixed four security vulnerabilities in the Workstation and Fusion desktop hypervisors, including three zero-days exploited during the Pwn2Own Vancouver 2024 hacking contest.
#Computer #Hypervisor #InfoSec #Pwn2Own #Security #VMware #Zero-Day

Zero-Day Pwn2Own Computer VMware InfoSec Hypervisor Security
Leveraging DNS Tunneling for Tracking and Scanning https://unit42.paloaltonetworks.com/three-dns-tunneling-campaigns/
14/05/2024 18:52:34
QRCode
archive.org
thumbnail

This article presents a case study on new applications of domain name system (DNS) tunneling we have found in the wild. These techniques expand beyond DNS tunneling only for command and control (C2) and virtual private network (VPN) purposes.

Malicious actors occasionally employ DNS tunneling as a covert communications channel, because it can bypass conventional network firewalls. This allows C2 traffic and data exfiltration that can remain hidden from some traditional detection methods.

unit42 EN 2024 DNS Tunneling Tracking Scanning research analysis
2023 Kaspersky Incident Response report https://securelist.com/kaspersky-incident-response-report-2023/112504/
14/05/2024 14:28:22
QRCode
archive.org
thumbnail

The report shares statistics and observations from incident response practice in 2023, analyzes trends and gives cybersecurity recommendations.
#Cybersecurity #Incident #Internal #LockBit #Ransomware #Security #Statistics #Threats #response #services

securelist 2024 2023 EN Threats Cybersecurity Security Incident LockBit response Internal services Statistics Ransomware
Malicious Go Binary Delivered via Steganography in PyPI https://blog.phylum.io/malicious-go-binary-delivered-via-steganography-in-pypi/
14/05/2024 10:34:12
QRCode
archive.org
thumbnail

On May 10, 2024, Phylum’s automated risk detection platform alerted us to a suspicious publication on PyPI. The package was called requests-darwin-lite and appeared to be a fork of the ever-popular requests package with a few key differences, most notably the inclusion of a malicious Go binary packed into

phylum EN 2024 Steganography macOS Go
Ongoing Malvertising Campaign leads to Ransomware https://www.rapid7.com/blog/post/2024/05/13/ongoing-malvertising-campaign-leads-to-ransomware/
14/05/2024 10:18:38
QRCode
archive.org
thumbnail

Rapid7 has observed an ongoing campaign to distribute trojanized installers for WinSCP and PuTTY via malicious ads on commonly used search engines, where clicking on the ad leads to typo squatted domains.

rapid7 EN 2024 Malvertising Campaign Ransomware WinSCP PuTTY
Distribution of DanaBot Malware via Word Files Detected by AhnLab EDR https://asec.ahnlab.com/en/65399/
14/05/2024 10:18:00
QRCode
archive.org
thumbnail

There are two types of malicious documents that are distributed via email recently: those exploiting equation editor and those including external link URLs. This post will describe the infection flow of the DanaBot malware that is distributed through documents containing external links, the latter method, as well as the evidence and detection process with the AhnLab EDR product’s diagram. Figure 1 shows the content of a spam email with a Word document attached that contains an external link. As you can see, it is a sophisticatedly disguised email pretending to be a job application form to deceive the recipient. The attached file (.docx) is a Word document that contains an external link.

ahnlab EN 2024 DanaBot email Word
My life as a Chinese spy: Secret police agent tells all - ABC News https://www.abc.net.au/news/2024-05-13/china-spy-secret-police-agent-tells-all-four-corners/103826708
13/05/2024 13:31:39
QRCode
archive.org
thumbnail

A Chinese spy who is now on Australian soil has revealed his incredible story to Four Corners.

abc EN 2024 spy secret-police china agent spying
page 99 / 235
4699 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio