Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 4
79 résultats taggé attack  ✕
Fake GIF Leveraged in Multi-Stage Reverse-Proxy Card Skimming Attack https://blog.sucuri.net/2025/04/fake-gif-leveraged-in-multi-stage-reverse-proxy-card-skimming-attack.html
26/04/2025 03:20:16
QRCode
archive.org
thumbnail

A detailed analysis of a multi-stage card skimming attack exploiting outdated Magento software and fake image files.

In today’s post we’re going to review a sophisticated, multi-stage carding attack on a Magento eCommerce website. This malware leveraged a fake gif image file, local browser sessionStorage data, and tampered with the website traffic using a malicious reverse-proxy server to facilitate the theft of credit card data, login details, cookies, and other sensitive data from the compromised website.

The client was experiencing some strange behaviour on their checkout page, including clients unable to input their card details normally, and orders not going through. They contacted us for assistance. Thinking this would be a straightforward case of credit card theft instead what we found was actually a fascinating and rather advanced malware which we will explore in detail in this post.

sucuri EN 2025 Magento Reverse-Proxy Card Skimming Attack Fake GIF
Incident update: Mitigating a DDoS attack on April 21, 2025 https://www.adyen.com/knowledge-hub/mitigating-a-ddos-april-2025
23/04/2025 09:36:12
QRCode
archive.org
thumbnail

This update outlines what happened, what we’ve done so far, and the actions we are taking to prevent it from happening in the future.

adyen EN 2025 incident DDoS attack payment Europe
Google Spoofed Via DKIM Replay Attack https://easydmarc.com/blog/google-spoofed-via-dkim-replay-attack-a-technical-breakdown/
21/04/2025 13:31:54
QRCode
archive.org
thumbnail

Learn how a convincing Google spoof used a DKIM replay attack to bypass email security and trick users with a fake subpoena. A real-world phishing example you need to see.

EasyDMARC EN 2025 attack analysis Google Spoofed DKIM phishing fake subpoena
Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vuln (Fixed) | Rapid7 Blog https://www.rapid7.com/blog/post/2025/02/14/xerox-versalink-c7025-multifunction-printer-pass-back-attack-vulnerabilities-fixed/
23/02/2025 21:26:54
QRCode
archive.org
thumbnail

During security testing, Rapid7 discovered that Xerox Versalink C7025 Multifunction printers (MFPs) were vulnerable to pass-back attacks. Learn more!

rapid7 EN 2025 Xerox Versalink C7025 Multifunction Pass-Back Attack CVE-2024-12510 CVE-2024-12511
Tata Technologies says ransomware attack hit IT assets, investigation ongoing https://techcrunch.com/2025/01/31/tata-technologies-says-ransomware-attack-hit-it-assets-investigation-ongoing/
02/02/2025 14:49:28
QRCode
archive.org
thumbnail

India's Tata Technologies has disclosed a ransomware attack affecting its IT assets.

techcrunch EN 2025 Tata ransomware attack investigation
Targeted supply chain attack against Chrome browser extensions https://blog.sekoia.io/targeted-supply-chain-attack-against-chrome-browser-extensions/
24/01/2025 09:22:51
QRCode
archive.org
thumbnail

In this blog post, learn about the supply chain attack targeting Chrome browser extensions and the associated targeted phishing campaign.

sekoia EN 2025 supply chain attack Chrome extensions
Government and university websites targeted in ScriptAPI[.]dev client-side attack - c/side https://cside.dev/blog/government-and-university-websites-targeted-in-scriptapi-dev-client-side-attack
24/01/2025 09:20:53
QRCode
archive.org
thumbnail

Yesterday we discovered another client-side JavaScript attack targeting +500 websites, including governments and universities. The injected scripts create hidden links in the Document Object Model (DOM), pointing to external websites, a programming interface for web documents.

cside.dev EN 2025 skimmer cyber DSS client-side PCI policies c/side website javascript card development web attack browser chain breaches content manager vulnerability data magecart supply client/side credit security tag v4 script formjacking
Over 5,000 WordPress sites caught in WP3.XYZ malware attack https://cside.dev/blog/over-5k-wordpress-sites-caught-in-wp3xyz-malware-attack
15/01/2025 21:31:20
QRCode
archive.org
thumbnail

Third-party scripts are a key part of the supply chain, giving 3rd party access to sensitive data or allowing malicious actions in the browser of your user. c/side helps you regain control over your website.

cside.dev EN 2025 Wordpress WP3.XYZ malware attack
Energy industry contractor says ransomware attack has limited access to IT systems | The Record from Recorded Future News https://therecord.media/energy-industry-contractor-ransomware-disruption
03/12/2024 08:05:50
QRCode
archive.org
thumbnail

The company, ENGlobal Corporation, has restricted employee access to its IT system, limiting it to only essential business operations.

therecord.media EN 2024 ENGlobal Corporation ransomware attack
Abnormal Security https://abnormalsecurity.com/blog/adversary-in-the-middle-dropbox-phishing-open-enrollment
20/11/2024 22:00:32
QRCode
archive.org
thumbnail

Discover how Dropbox was exploited in a sophisticated phishing attack that leveraged AiTM tactics to steal credentials during the open enrollment period.

abnormalsecurity EN 2024 exploited sophisticated phishing attack leveraged aitm tactics steal credentials open dropbox enrollment discover period
Censorship Attack against the Tor network https://osservatorionessuno.org/blog/2024/10/censorship-attack-against-the-tor-network/
04/11/2024 07:00:25
QRCode
archive.org

In the last few days, many Tor relay operators - mainly hosting relay nodes on providers like Hetzner - began receiving abuse notices.
All the abuses reported many failed SSH login attempts - part of a brute force attack - coming from their Tor relays.

Tor relays normally only transport traffic between a guard and an exit node of the Tor network, and per-se should not perform any SSH connections to internet-facing hosts, let alone performing SSH brute force attacks.

osservatorionessuno EN 2024 Tor network spoofing attack relays SSH
New Windows Driver Signature bypass allows kernel rootkit installs https://www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/
26/10/2024 19:05:48
QRCode
archive.org
thumbnail

Attackers can downgrade Windows kernel components to bypass security features such as Driver Signature Enforcement and deploy rootkits on fully patched systems.
#Attack #Bypass #Computer #Downgrade #Elevation #Escalation #InfoSec #Privilege #Privileges #Rootkit #Security #Windows #of

Privileges Computer Privilege Security Rootkit Elevation Escalation InfoSec Attack Bypass Downgrade Windows of
Cyble Honeypot Sensors Detect WordPress Plugin Attack, New Banking Trojan https://cyble.com/blog/cyble-honeypot-sensors-detect-wordpress-plugin-attack-new-banking-trojan/
04/10/2024 13:36:12
QRCode
archive.org
thumbnail

WordPress plugins are under active attack, a new banking trojan is spreading, and phishing and brute-force attacks continue unabated.

cyble EN 2024 WordPress Plugin Attack Banking Trojan CVE-2024-4577 CVE-2024-27956
Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps https://www.securityweek.com/record-breaking-ddos-attack-peaked-at-3-8-tbps-2-14-billion-pps/
03/10/2024 08:10:33
QRCode
archive.org

Web performance and security firm Cloudflare recently mitigated another record-breaking DDoS attack.
According to Matthew Prince, the company’s CEO, the attack peaked at 3.8 terabits per second (Tbps) and 2.14 billion packets per second (Pps). The attack was aimed at an unidentified customer of an unnamed hosting provider that uses Cloudflare services.

securityweek EN 2024 DDoS Record-Breaking Attack Cloudflare
Hacker plants false memories in ChatGPT to steal user data in perpetuity https://arstechnica.com/security/2024/09/false-memories-planted-in-chatgpt-give-hacker-persistent-exfiltration-channel/
26/09/2024 08:04:40
QRCode
archive.org
thumbnail

Emails, documents, and other untrusted content can plant malicious memories.

arstechnica EN 2024 ChatGPT exploit malicious memories attack
Unprecedented 3.15 Billion Packet Rate DDoS Attack Mitigated by Global Secure Layer https://globalsecurelayer.com/blog/unprecedented-3-15-billion-packet-rate-ddos-attack
28/08/2024 09:10:37
QRCode
archive.org
thumbnail

On August 25th 2024, Global Secure Layer mitigated the largest packet rate DDoS attack recorded against our platform

globalsecurelayer EN 2024 DDoS Attack Minecraft
DDoS attack volume rises, peak power reaches 1.7 Tbps https://www.helpnetsecurity.com/2024/08/15/ddos-attacks-h1-2024-increase/
16/08/2024 12:00:09
QRCode
archive.org
thumbnail

The total number of DDoS attacks during H1 2024 amounted to 830,000, an increase of 46% when compared to H1 2023, according to Gcore.

helpnetsecurity EN 2024 DDoS attack Statistics report
Akamai Blocked 419 TB of Malicious Traffic in a 24-Hour DDoS Attack https://www.akamai.com/blog/security/akamai-blocked-419-tb-of-malicious-traffic
08/08/2024 10:49:45
QRCode
archive.org

On July 15, 2024, Akamai prevented one of the largest distributed denial-of-service (DDoS) cyberattacks it has ever observed against a major financial services company in Israel.

The highly sophisticated, high-volume attack lasted almost 24 hours.

The attacker deployed larger-than-usual resources, indicating a serious risk for future attacks.

Other Israeli financial institutions reportedly suffered outages and downtimes on the same day, potentially due to the same type of attack and the same aggressor.

Akamai EN 2024 Blocked DDoS high-volume attack
TuDoor https://tudoor.net/
26/07/2024 08:14:23
QRCode
archive.org
thumbnail

TuDoor is a new DNS attack, which could be exploited to carry out DNS cache poisoning, denial-of-service, and resource consuming.

DNS can be compared to a game of chess in that its rules are simple, yet the possibilities it presents are endless. While the fundamental rules of DNS are straightforward, DNS implementations can be extremely complex. In this study, we intend to explore the complexities and vulnerabilities in DNS response pre-processing by systematically analyzing DNS RFCs and DNS software implementations.

TuDoor 2024 EN DNS attack implementation cache-poisoning
Lviv neighbourhood left without heating, hot water by hacker attack https://en.lb.ua/news/2024/01/23/26110_lviv_neighbourhood_left_without.html?ref=news.risky.biz
25/07/2024 15:17:43
QRCode
archive.org
thumbnail

The Sykhiv residential area in Lviv was left without hot water and heating as a result of a hacker attack on Lvivteploenergo. This is reported on the company's website.

"The hacker attack disrupted the heat supply management system. Work is underway to restore heating and hot water supply in the Sykhiv residential area. The estimated time of restoration is 21:00," the statement said.

lb.ua EN 2024 hacking Lviv Russia-Ukraine-war attack disrupted heating Lvivteploenergo
page 1 / 4
4258 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio