Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
12 résultats taggé Compromised  ✕
XRP supply chain attack: Official NPM package infected with crypto stealing backdoor https://www.aikido.dev/blog/xrp-supplychain-attack-official-npm-package-infected-with-crypto-stealing-backdoor
23/04/2025 09:14:52
QRCode
archive.org
thumbnail

The official XPRL (Ripple) NPM package was compromised by sophisticated attackers who put in a backdoor to steal cryptocurrency private keys and gain access to cryptocurrency wallets.

aikido.dev EN 2025 XPRL NPM package compromised backdoor cryptocurrency supply-chain-attack
Lumma Stealer Chronicles: PDF-themed Campaign Using Compromised Educational Institutions' Infrastructure https://www.cloudsek.com/blog/lumma-stealer-chronicles-pdf-themed-campaign-using-compromised-educational-institutions-infrastructure
26/02/2025 11:01:43
QRCode
archive.org
thumbnail

The Lumma Stealer malware campaign is exploiting compromised educational institutions to distribute malicious LNK files disguised as PDFs, targeting industries like finance, healthcare, technology, and media. Once executed, these files initiate a stealthy multi-stage infection process, allowing cybercriminals to steal passwords, browser data, and cryptocurrency wallets. With sophisticated evasion techniques, including using Steam profiles for command-and-control operations, this malware-as-a-service (MaaS) threat highlights the urgent need for robust cybersecurity defenses. Stay vigilant against deceptive phishing tactics to protect sensitive information from cyber exploitation.

cloudsek EN 2025 edu LummaStealer compromised educational LNK analysis
Cyberhaven Incident https://www.extensiontotal.com/cyberhaven-incident-live
15/01/2025 08:25:52
QRCode
archive.org

Stay updated on the latest developments of the Chrome Web Store incident involving Cyberhaven's compromised extension. Follow live updates, detailed analysis, impacted extensions, and expert recommendations for safeguarding your organization against similar attacks

extensiontotal EN 2025 Extensions Chrome-extension compromised hijacked list Cyberhaven
China 'compromised' Canadian government networks and stole valuable info: spy agency | CBC News https://www.cbc.ca/news/politics/cse-cyber-threats-china-1.7367719
20/12/2024 14:55:59
QRCode
archive.org
thumbnail

Threat actors sponsored by China “compromised” government networks over the past five years and collected valuable information, says a new report from Canada’s cyber spy agency.

cbc.ca EN 2024 Canadian government compromised spy
China-linked APT group Salt Typhoon compromised some US ISPs https://securityaffairs.com/168941/apt/salt-typhoon-china-linked-threat-actors-breached-us-isp.html?amp
27/09/2024 10:20:53
QRCode
archive.org
thumbnail

China-linked threat actors compromised some U.S. internet service providers as part of a cyber espionage campaign code-named Salt Typhoon.

The state-sponsored hackers aimed at gathering intelligence from the targets or carrying out disruptive cyberattacks.

The Wall Street Journal reported that experts are investigating into the security breached to determine if the attackers gained access to Cisco Systems routers, which are core network components of the ISP infrastructures.

securityaffairs EN 2024 China-linked APT Salt-Typhoon US ISP compromised Cisco
Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-046a
16/02/2024 09:29:11
QRCode
archive.org

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) conducted an incident response assessment of a state government organization’s network environment after documents containing host and user information, including metadata, were posted on a dark web brokerage site. Analysis confirmed that an unidentified threat actor compromised network administrator credentials through the account of a former employee—a technique commonly leveraged by threat actors—to successfully authenticate to an internal virtual private network (VPN) access point, further navigate the victim’s on-premises environment, and execute various lightweight directory access protocol (LDAP) queries against a domain controller.[1] Analysis also focused on the victim’s Azure environment, which hosts sensitive systems and data, as well as the compromised on-premises environment. Analysis determined there were no indications the threat actor further compromised the organization by moving laterally from the on-premises environment to the Azure environment.

CISA EN 2024 Compromised Account Former-Employee advisory
Hundreds of network operators’ credentials found circulating in Dark Web https://securityaffairs.com/158329/cyber-crime/network-operators-credentials-found-in-dark-web.html
30/01/2024 18:22:04
QRCode
archive.org
thumbnail

Hundreds of compromised credentials of customers of RIPE, APNIC, AFRINIC, and LACNIC available on the dark web, Resecurity warns.

securityaffairs EN 2024 darkweb RIPE APNIC AFRINIC LACNIC credential compromised
Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days https://securityscorecard.com/blog/threat-intelligence-research-volt-typhoon/
15/01/2024 11:22:34
QRCode
archive.org
thumbnail

SecurityScorecard has discovered the threat actor group Volt Typhoon has compromised 30% of Cisco RV320/325 Devices in 37 Days. Learn more.

securityscorecard EN 2024 VoltTyphoon Cisco RV320/325 research compromised
SEC Has Not Approved Bitcoin ETFs, but Its Hacked X Account Briefly Said Otherwise https://www.coindesk.com/policy/2024/01/09/sec-twitter-compromised-chair-gensler-says-after-account-said-bitcoin-etfs-approved/
10/01/2024 08:30:47
QRCode
archive.org
thumbnail

The X account of the U.S. Securities and Exchange Commission, which is deciding whether to approve bitcoin ETFs, "was compromised," the regulator told CoinDesk.

coindesk EN 2024 SEC x Twitter account compromised hacked bitcoin
Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022. https://pytorch.org/blog/compromised-nightly-dependency/
02/01/2023 11:38:36
QRCode
archive.org
thumbnail

If you installed PyTorch-nightly on Linux via pip between December 25, 2022 and December 30, 2022, please uninstall it and torchtriton immediately, and use the latest nightly binaries (newer than Dec 30th 2022).

$ pip3 uninstall -y torch torchvision torchaudio torchtriton
$ pip3 cache purge
PyTorch-nightly Linux packages installed via pip during that time installed a dependency, torchtriton, which was compromised on the Python Package Index (PyPI) code repository and ran a malicious binary. This is what is known as a supply chain attack and directly affects dependencies for packages that are hosted on public package indices.

PyTorch EN 2022 Linux pip Compromised dependency Supply-chain-security
Liz Truss's personal phone was hacked by Putin's spies for top messages | Daily Mail Online https://www.dailymail.co.uk/news/article-11368619/Liz-Trusss-personal-phone-hacked-Putins-spies-secret-details-negotiations.html
31/10/2022 21:43:58
QRCode
archive.org

One source said that the phone was so heavily compromised that it has now been placed in a locked safe inside a secure Government location.

dailymail EN 2022 Truss phone compromised spy Russia England Government
Incident Report: Employee and Customer Account Compromise https://www.twilio.com/blog/august-2022-social-engineering-attack
28/10/2022 09:02:19
QRCode
archive.org
thumbnail

On August 4, 2022, Twilio identified accounts of employees who were compromised by a social engineering attack. The attacker then gained access to data for a limited number of customers.

Twilio EN 2022 compromised postmortem
4252 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio