Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
9 résultats taggé PDF  ✕
Emerging Phishing Techniques: New Threats and Attack Vectors https://intezer.com/blog/emerging-phishing-techniques-new-threats-and-attack-vectors/
24/04/2025 12:09:17
QRCode
archive.org
thumbnail

Discover advanced phishing techniques bypassing email security—Intezer reveals threats hidden in SVGs, PDFs, OneDrive, and OpenXML files.

intezer.com EN 2025 SVG PDF phishing Techniques OneDrive OpenXML
Data broker exposes 600,000 sensitive files including background checks https://www.malwarebytes.com/blog/news/2024/11/data-broker-exposes-600000-sensitive-files-including-background-checks
02/12/2024 23:14:23
QRCode
archive.org
thumbnail

A researcher has discovered a data broker had stored 644,869 PDF files in a publicly accessible cloud storage container.

malwarebytes EN 2024 researcher data-broker PDF data-leak background checks
Gootloader’s Pivot from SEO Poisoning: PDF Converters Become the New Infection Vector https://gootloader.wordpress.com/2024/11/07/gootloaders-pivot-from-seo-poisoning-pdf-converters-become-the-new-infection-vector/
08/11/2024 08:21:08
QRCode
archive.org
thumbnail

Three weeks ago, Gootloader samples suddenly dried up. This has happened before, so I switched VPNs and tried new locations—coffee shops, friends’, and family’s Wi-Fi networks—but still couldn’t re…

gootloader.wordpress.com EN 2024 Pivot SEO Gootloader Poisoning PDF Converters
An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader https://cloud.google.com/blog/topics/threat-intelligence/unc2970-backdoor-trojanized-pdf-reader/?hl=en
17/09/2024 16:34:58
QRCode
archive.org
thumbnail

UNC2970 is a cyber espionage group suspected to have a North Korea nexus.

Mandiant 2024 UNC2970 Backdoor PDF PDF-Reader North North-Korea
TodoSwift Disguises Malware Download Behind Bitcoin PDF https://www.kandji.io/blog/todoswift-disguises-malware-download-behind-bitcoin-pdf
24/08/2024 12:18:51
QRCode
archive.org
thumbnail

A new piece of malware that we're calling TodoSwift downloads its malicious payload alongside a seemingly legitimate piece of content about cryptocurrency.

kandji EN 2024 TodoSwift Malware Bitcoin PDF
Foxit PDF “Flawed Design” Exploitation https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/
25/05/2024 21:57:16
QRCode
archive.org
thumbnail

PDF (Portable Document Format) files have become an integral part of modern digital communication. Renowned for their universality and fidelity, PDFs offer a robust platform for sharing documents across diverse computing environments. PDFs have evolved into a standard format for presenting text, images, and multimedia content with consistent layout and formatting, irrespective of the software, hardware, or operating system used to view them. This versatility has made PDFs indispensable in fields ranging from business and academia to government and personal use, serving as a reliable means of exchanging information in a structured and accessible manner.

checkpoint EN 2024 Foxit PDF Exploitation
Browser-in-the-Middle (BitM) attack https://link.springer.com/article/10.1007/s10207-021-00548-5
12/04/2022 08:52:43
QRCode
archive.org

Man-in-the-Middle (MitM), one of the best known attacks in the world of computer security, is among the greatest concerns for professionals in the field. Main goal of MitM is to compromise confidentiality, integrity and availability of data flowing between source and destination. However, most of its many variants involve difficulties that make it not always possible. The present paper aims at modelling and describing a new method of attack, named Browser-in-the-Middle (BitM) which, despite the similarities with MitM in the way it controls the data flow between a client and the service it accesses, bypasses some of MitM’s typical shortcomings. It could be started by phishing techniques and in some cases coupled to the well-known Man-in-the-Browser (MitB) attack. It will be seen how BitM expands the range of the possible attacker’s actions, at the same time making them easier to implement. Among its features, the absence of the need to install malware of any kind on the victim’s machine and the total control it allows the attacker are to be emphasized.
Document PDF

springer EN 2021 PDF paper BitM Browser-in-the-Middle
Top 10 des vulnérabilités de 2021 https://www.cert.ssi.gouv.fr/actualite/CERTFR-2022-ACT-008/
26/02/2022 11:20:39
QRCode
archive.org

Ce bulletin d’actualité exceptionnel propose une analyse des 10 vulnérabilités les plus critiques traitées par l’ANSSI au cours de l’année 2021.

Document PDF

CERTFR 2022 FR top10 vulnérabilités 2021 liste pdf
Boosting your Organisation's Cyber Resilience - Joint Publication https://www.enisa.europa.eu/publications/boosting-your-organisations-cyber-resilience
21/02/2022 10:46:00
QRCode
archive.org

ENISA and CERT-EU strongly encourage all public and private sector organisations in the EU to adopt a minimum set of cybersecurity best practices
PDF Document

enisa EU EN 2022 bestpractices CERTEU Publication pdf
4623 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio