Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
15 résultats taggé access  ✕
Emera and Nova Scotia Power Responding to Cybersecurity Incident https://investors.emera.com/news/news-details/2025/Emera-and-Nova-Scotia-Power-Responding-to-Cybersecurity-Incident/default.aspx
04/05/2025 13:03:01
QRCode
archive.org

April 28, 2025
HALIFAX, Nova Scotia--(BUSINESS WIRE)-- Emera Inc. and Nova Scotia Power today announced, on April 25, 2025 they discovered and are actively responding to a cybersecurity incident involving unauthorized access into certain parts of its Canadian network and servers supporting portions of its business applications.

Immediately following detection of the external threat, the companies activated their incident response and business continuity protocols, engaged leading third-party cybersecurity experts, and took actions to contain and isolate the affected servers and prevent further intrusion. Law enforcement officials have been notified.

There remains no disruption to any of our Canadian physical operations including at Nova Scotia Power’s generation, transmission and distribution facilities, the Maritime Link or the Brunswick Pipeline, and the incident has not impacted the utility’s ability to safely and reliably serve customers in Nova Scotia. There has been no impact to Emera’s U.S. or Caribbean utilities.

Emera will release its Q1 Financial Statements and Management Disclosure and Analysis on May 8, 2025, as planned. At this time, the incident is not expected to have a material impact on the financial performance of the business.

Our IT team is working diligently with cyber security experts to bring the affected portions of our IT system back online.

emera EN 2025 Electric Utility Cyberattack Canada unauthorized access
Grafana security update: no customer impact from GitHub workflow vulnerability https://grafana.com/blog/2025/04/27/grafana-security-update-no-customer-impact-from-github-workflow-vulnerability/
02/05/2025 11:45:31
QRCode
archive.org
thumbnail

On April 26, an unauthorized user exploited a vulnerability with a GitHub workflow to gain unauthorized access to tokens, all of which have now been invalidated. At this time, our investigation has found no evidence of code modifications, unauthorized access to production systems, exposure of customer data, or access to personal information.

grafana en 2025 incident investigation vulnerability GitHub workflow unauthorized access tokens
Resurgence of In-The-Wild Activity Targeting Critical ServiceNow Vulnerabilities https://www.greynoise.io/blog/in-the-wild-activity-targeting-critical-servicenow-vulnerabilities
24/03/2025 09:22:41
QRCode
archive.org
thumbnail

GreyNoise has identified a notable resurgence of in-the-wild activity targeting three ServiceNow vulnerabilities CVE-2024-4879 (Critical), CVE-2024-5217 (Critical), and CVE-2024-5178 (Medium). These vulnerabilities reportedly may be chained together for full database access.

greynoise EN 2025 CVE-2024-5178 CVE-2024-4879 database access ServiceNow vulnerabilities
Next.js Middleware Exploit: Deep Dive into CVE-2025-29927 Authorization Bypass - ZeroPath Blog https://zeropath.com/blog/nextjs-middleware-cve-2025-29927-auth-bypass
23/03/2025 13:53:00
QRCode
archive.org
thumbnail

Explore the critical CVE-2025-29927 vulnerability in Next.js middleware, enabling attackers to bypass authorization checks and gain unauthorized access.

zeropath EN 2025 unauthorized access Web-Application-Security Vulnerability Next.js middleware CVE-2025-29927
Backdooring Your Backdoors - Another $20 Domain, More Governments https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/
12/01/2025 21:07:29
QRCode
archive.org
thumbnail

After the excitement of our .MOBI research, we were left twiddling our thumbs. As you may recall, in 2024, we demonstrated the impact of an unregistered domain when we subverted the TLS/SSL CA process for verifying domain ownership to give ourselves the ability to issue valid and trusted TLS/

watchtowr EN 2025 backdoor infrastructure abandoned access analysis hack research hackback
Italy police arrest four over alleged illegal database access, source says https://www.reuters.com/world/europe/italy-police-arrest-four-over-alleged-illegal-database-access-source-says-2024-10-26/?user_email=9e19aa6ed986d20195d4113ba5a6a3e709c18e0549688aa9b20d5f2e8d0dec05&lctg=6596a37f125992f7eb0b5ac9
26/10/2024 21:52:33
QRCode
archive.org

Italian police have placed four people under house arrest including Leonardo Maria Del Vecchio, son of the late billionaire founder of Luxottica, as part of a probe into alleged illegal access to state databases, a source said on Saturday.
A lawyer for Leonardo Maria Del Vecchio said he was "eagerly awaiting the completion of preliminary investigations to be able to prove he has nothing to do with the events in question and that charges laid against him have no basis.

reuters EN 2024 arrest illegal access databases confidential data sold blackmail
SolarWinds fixed critical RCE CVE-2024-28991 in Access Rights Manager https://securityaffairs.com/168456/security/solarwinds-fixed-rce-cve-2024-28991.html
16/09/2024 15:50:10
QRCode
archive.org
thumbnail

SolarWinds addressed a critical remote code execution vulnerability, tracked as CVE-2024-28991, in Access Rights Manager.

securityaffairs EN 2024 SolarWinds RCE CVE-2024-28991 ARM Access Rights Manager
Hubspot says it's investigating customer account hacks | TechCrunch https://techcrunch.com/2024/06/28/hubspot-says-its-investigating-customer-account-hacks/
28/06/2024 20:36:33
QRCode
archive.org
thumbnail

The company “identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain unauthorized access to their accounts” on June 22.

techcrunch EN 2024 Hubspot incident unauthorized access
CVE-2023-35082 - MobileIron Core Unauthenticated API Access Vulnerability | Rapid7 Blog https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
04/08/2023 09:42:28
QRCode
archive.org
thumbnail

Rapid7 discovered a new vulnerability that allows unauthenticated attackers to access the API in unsupported versions of MobileIron Core (11.2 and below).

rapid7 EN 2023 CVE-2023-35082 MobileIron Core Unauthenticated API Access Vulnerability
XSS Vulnerabilities in Azure Led to Unauthorized Access to User Sessions - SecurityWeek https://www.securityweek.com/xss-vulnerabilities-in-azure-led-to-unauthorized-access-to-user-sessions/
18/06/2023 21:53:18
QRCode
archive.org
thumbnail

Microsoft addressed two XSS vulnerabilities in Azure Bastion and Azure Container Registry (ACR) leading to unauthorized access to sessions.

securityweek EN 2023 XSS Azure Bastion ACR unauthorized access
Notice of Recent Security Incident https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/
29/08/2022 10:26:34
QRCode
archive.org

We have no evidence that this incident involved any access to customer data or encrypted password vaults. Our products and services are operating normally.

lastpass EN 2022 incident unauthorized access
Detecting Scatter Swine: Insights into a relentless phishing campaign https://sec.okta.com/scatterswine
29/08/2022 10:25:04
QRCode
archive.org

Twilio recently identified unauthorized access to information related to 163 Twilio customers, including Okta.

okta 2022 EN unauthorized access Twilio phishing
Vulnerability in Linux containers – investigation and mitigation https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
23/08/2022 16:35:39
QRCode
archive.org
thumbnail

Operating system access controls, that constrain which programs can open which files, have existed for almost as long as computers themselves. Access controls are still widely used and are more flexible and efficient when compared to cryptographically protecting files. Despite the long history, ther

benthamsgaze EN 2022 constrain Linux containers investigation Access controls
Analysis of dark web posts selling access to corporate networks https://securelist.com/initial-access-data-price-on-the-dark-web/106740/
17/06/2022 07:11:54
QRCode
archive.org
thumbnail

Money has been and remains the main motivator for cybercriminals. The most widespread techniques of monetizing cyberattacks include selling stolen databases, extortion (using ransomware) and carding. However, there is demand on the dark web not only for data obtained through an attack, but also for the data and services necessary to organize one (e.g., to perform specific steps of a multiphase attack)

securelist EN 2022 monetizing cyberattacks selling access darkweb
Securing Cloudflare Using Cloudflare https://blog.cloudflare.com/securing-cloudflare-using-cloudflare/
24/04/2022 10:24:54
QRCode
archive.org

When a new security threat arises — a publicly exploited vulnerability (like log4j) or the shift from corporate-controlled environments to remote work or a potential threat actor — it is the Security team’s job to respond to protect Cloudflare’s network, customers, and employees. And as security threats evolve, so should our defense system. Cloudflare is committed to bolstering our security posture with best-in-class solutions — which is why we often turn to our own products as any other Cloudflare customer would?

cloudflare 2022 EN FIDO2 access control management
4371 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio