Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
6 résultats taggé securityintelligence  ✕
Web injections are back on the rise: 40+ banks affected by new malware campaign https://securityintelligence.com/posts/web-injections-back-on-rise-banks-affected-danabot-malware/
20/12/2023 20:51:20
QRCode
archive.org
thumbnail

DanaBot is a sophisticated banking trojan targeting financial institutions and their customers. Now, a new global campaign has put more users at risk.

securityintelligence EN 2023 DanaBot banking trojan malware
Exploiting GOG Galaxy XPC service for privilege escalation in macOS https://securityintelligence.com/x-force/exploiting-gog-galaxy-xpc-service-privilege-escalation-macos/
16/12/2023 01:04:00
QRCode
archive.org
thumbnail

Unpack the analysis of a GOG Galaxy XPC service vulnerability. More from IBM X-Force Red.

securityintelligence 2023 EN macos GOG client XPC vulnerability
X-Force uncovers global NetScaler Gateway credential harvesting campaign https://securityintelligence.com/posts/x-force-uncovers-global-netscaler-gateway-credential-harvesting-campaign/
08/10/2023 13:16:54
QRCode
archive.org
thumbnail

In September of 2023, X-Force uncovered a campaign where attackers were exploiting the vulnerability identified in CVE-2023-3519 to attack unpatched NetScaler Gateways to insert a malicious script into the HTML content of the authentication web page to capture user credentials. The campaign is another example of increased interest from cyber criminals in credentials. The 2023 X-Force cloud threat report found that 67% of cloud-related incident response engagements were associated with the use of stolen credentials.

securityintelligence EN 2023 NetScaler Gateway CVE-2023-3519 credential harvesting campaign
Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours https://securityintelligence.com/posts/patch-tuesday-exploit-wednesday-pwning-windows-ancillary-function-driver-winsock/
22/03/2023 21:39:20
QRCode
archive.org
thumbnail

Dive into the analysis and exploitation of a vulnerability in the Windows Ancillary Function Driver for Winsock for Local Privilege Escalation on Windows 11. More from X-Force Red experts.

securityintelligence EN 2023 PatchTuesday LPE Windows afd.sys CVE-2023-21768 exploit analysis reverseengineering
Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1 https://securityintelligence.com/posts/analysis-rce-vulnerability-cobalt-strike/
22/10/2022 18:41:21
QRCode
archive.org
thumbnail

Command & Control (C2) frameworks are a very sensitive component of Red Team operations. Often, a Red Team will be in a highly privileged position on a target’s network, and a compromise of the C2 framework could lead to a compromise of both the red team operator’s system and control over beacons established on a target’s systems. As such, vulnerabilities in C2 frameworks are high priority targets for threat actors and Counterintelligence (CI) operations. On September 20, 2022, HelpSystems published an out-of-band patch for Cobalt Strike which stated that there was potential for Remote Code Execution (RCE).

securityintelligence EN 2022 RCE Cobalt-Strike HelpSystems Vulnerability Analysis
Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine https://securityintelligence.com/posts/trickbot-group-systematically-attacking-ukraine/
07/07/2022 18:45:17
QRCode
archive.org
thumbnail

Following ongoing research our team, IBM Security X-Force has uncovered evidence indicating that the Russia-based cybercriminal syndicate “Trickbot group” has been systematically attacking Ukraine since the Russian invasion — an unprecedented shift as the group had not previously targeted Ukraine

Securityintelligence EN 2022 cyberwar Russia-Ukraine-war trickbot Ukraine
4460 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio