Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
12 résultats taggé Compromise  ✕
RedMike (Salt Typhoon) Exploits Vulnerable Cisco Devices of Global Telecommunications Providers https://www.recordedfuture.com/research/redmike-salt-typhoon-exploits-vulnerable-devices?ref=metacurity.com
13/02/2025 15:33:45
QRCode
archive.org

Between December 2024 and January 2025, Recorded Future’s Insikt Group identified a campaign exploiting unpatched internet-facing Cisco network devices primarily associated with global telecommunications providers. Victim organizations included a United States-based affiliate of a United Kingdom-based telecommunications provider and a South African telecommunications provider. Insikt Group attributes this activity to the Chinese state-sponsored threat activity group tracked by Insikt Group as RedMike, which aligns with the Microsoft-named group Salt Typhoon. Using Recorded Future® Network Intelligence, Insikt Group observed RedMike target and exploit unpatched Cisco network devices vulnerable to CVE-2023-20198, a privilege escalation vulnerability found in the web user interface (UI) feature in Cisco IOS XE software, for initial access before exploiting an associated privilege escalation vulnerability, CVE-2023-20273, to gain root privileges. RedMike reconfigures the device, adding a generic routing encapsulation (GRE) tunnel for persistent access.

recordedfuture EN 2025 Salt-Typhoon RedMike Cisco compromise CVE-2023-20273 CVE-2023-20198
Hackers reportedly compromise Argentina’s airport security payroll system | The Record from Recorded Future News https://therecord.media/hackers-target-airport-security-payroll
07/01/2025 09:08:45
QRCode
archive.org
thumbnail

The hackers gained access to the airport security police's payroll records and deducted small amounts from employee salaries.

therecord.media EN 2025 Argentina payroll salaries compromise
A Single Cloud Compromise Can Feed an Army of AI Sex Bots https://krebsonsecurity.com/2024/10/a-single-cloud-compromise-can-feed-an-army-of-ai-sex-bots/
06/10/2024 23:26:24
QRCode
archive.org

Organizations that get relieved of credentials to their cloud environments can quickly find themselves part of a disturbing new trend: Cybercriminals using stolen cloud credentials to operate and resell sexualized AI-powered chat services. Researchers say these illicit chat bots, which…

krebsonsecurity EN 2024 Cloud Compromise credentials Cybercriminals AI-powered chat services
How the theft of 40M UK voter register records was entirely preventable https://techcrunch.com/2024/08/02/how-the-theft-of-40-million-uk-voter-register-records-was-entirely-preventable/
03/08/2024 13:39:59
QRCode
archive.org
thumbnail

A scathing rebuke by the U.K. data protection watchdog reveals what led to the compromise of tens of millions of U.K. voters' information.

techcrunch EN 2024 UK data-protection watchdog compromise UK voters
Community Alert: Ongoing Malicious Campaign Impacting Azure Cloud Environments https://www.proofpoint.com/us/blog/cloud-security/community-alert-ongoing-malicious-campaign-impacting-azure-cloud-environments
13/02/2024 09:20:32
QRCode
archive.org
thumbnail

Over the past weeks, Proofpoint researchers have been monitoring an ongoing cloud account takeover campaign impacting dozens of Microsoft Azure environments and compromising hundreds of user accoun...

proofpoint EN 2024 Microsoft Azure Campaign compromise cloud-security phishing MFA
Compromising Google Accounts: Malwares Exploiting Undocumented OAuth2 Functionality for session hijacking https://www.cloudsek.com/blog/compromising-google-accounts-malwares-exploiting-undocumented-oauth2-functionality-for-session-hijacking
08/01/2024 16:19:25
QRCode
archive.org
thumbnail

A detailed blog on Analysis of the Global Malware Trend: Exploiting Undocumented OAuth2 Functionality to Regenerate Google Service Cookies Regardless of IP or Password Reset.

cloudsek EN 2023 OAuth2 cookie Google Accounts compromise Undocumented Functionality
[Security Update] Incident Details https://jumpcloud.com/blog/security-update-incident-details
17/07/2023 06:44:29
QRCode
archive.org
thumbnail

As a result, today we are publishing details of activity by a sophisticated nation-state sponsored threat actor that gained unauthorized access to our systems to target a small and specific set of our customers. Prior to sharing this information, we notified and worked with the impacted customers. We have also been working with our incident response (IR) partners and law enforcement on both our investigation and steps designed to make our systems and our customers’ operations even more secure. The attack vector used by the threat actor has been mitigated.

jumpcloud EN 2023 compromise APT compromise Incident
3CX VoIP Software Compromise & Supply Chain Threats https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats
30/03/2023 15:18:36
QRCode
archive.org
thumbnail

The 3CX VoIP Desktop Application has been compromised to deliver malware via legitimate 3CX updates. Huntress has been investigating this incident and working to validate and assess the current supply chain threat to the security community.

huntress EN 2023 3CX VoIP Software Compromise supplychain analysis
Cracking encrypted Lastpass vaults https://markuta.com/cracking-lastpass-vaults/
27/12/2022 00:42:22
QRCode
archive.org

The recent (2022) compromise of Lastpass included email addresses, home addresses, names, and encrypted customer vaults. In this post I will demonstrate how attackers may leverage tools like Hashcat to crack an encrypted vault with a weak password.

Markuta EN 2022 password-cracking lastpass compromise Hashcat crack PoC
Melting the DNS Iceberg: Taking over your infrastructure Kaminsky style https://sec-consult.com/blog/detail/melting-the-dns-iceberg-taking-over-your-infrastructure-kaminsky-style/
20/10/2022 21:15:06
QRCode
archive.org
thumbnail

Hidden DNS resolvers and how to compromise your infrastructure

sec-consult 2022 Kaminsky attack DNS Hidden resolvers compromise infrastructure technical
On Agent Compromise in the Field https://thebrushpass.projectbrazen.com/covcom-iran-china-cia/
09/10/2022 21:05:07
QRCode
archive.org
thumbnail

In 2017, a team of New York Times journalists revealed that, beginning in 2010, Beijing’s counterintelligence apparatus had systematically rolled up the CIA’s sources in China.

thebrushpass projectbrazen EN 2022 China US spy Compromise 2017 counterintelligence
Cloudflare’s investigation of the January 2022 Okta compromise https://blog.cloudflare.com/cloudflare-investigation-of-the-january-2022-okta-compromise/
23/03/2022 15:18:52
QRCode
archive.org

Today, March 22, 2022 at 03:30 UTC we learnt of a compromise of Okta. We use Okta internally for employee identity as part of our authentication stack. We have investigated this compromise carefully and do not believe we have been compromised as a result. We do not use Okta for customer accounts; customers do not need to take any action unless they themselves use Okta.

cloudflare Okta EN 2022 compromise investigation
4258 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio