Quotidien Hebdomadaire Mensuel

Quotidien Shaarli

Tous les liens d'un jour sur une page.

November 10, 2023

CVE-2023-38548

On November 6, 2023, Veeam published an advisory for several vulnerabilities affecting Veeam ONE, an IT monitoring and analytics platform for enterprises. One …

Le Conseil fédéral fixe l’entrée en vigueur de la loi sur la sécurité de l’information

Informations actuelles de l'administration. Tous les communiqués de l'administration fédérale, des départements et des offices.

Detecting “Effluence”, an Unauthenticated Confluence Web Shell

Discovering Effluence, a unique web shell accessible on every page of an infected Confluence

ICBC hit by ransomware impacting global trades

China's largest bank, ICBC, was hit by ransomware that resulted in disruption of financial services (FS) systems on Thursday Beijing time, according to a notice on its website

Dozens of npm Packages Caught Attempting to Deploy Reverse Shell

On October 27, Phylum’s automated risk detection platform began alerting us to a series of suspicious publications on npm. Over the course of the following few days, we discovered a campaign involving at least 48 different publications. These packages, deceptively named to appear legitimate, contained obfuscated JavaScript designed to

Nude “before and after” photos stolen from plastic surgeon, posted online, and sent to victims' family and friends

The FBI is investigating a data breach where cybercriminals were able to steal patients’ records from a Las Vegas plastic surgeon's office and then publish them online.

Ransomware attack on ICBC disrupts trades in US Treasury market

Chinese bank says it has contained a hack that affected some fixed income and equities transactions

Cloudflare website downed by DDoS attack claimed by Anonymous Sudan

Cloudflare is investigating an ongoing outage causing 'We're sorry

Microsoft Temporarily Blocked Internal Access to ChatGPT, Citing Data Concerns

The company later restored access to the chatbot, which is owned by OpenAI.

SysAid On-Prem Software CVE-2023-47246 Vulnerability Disclosure

On Nov 2nd, our security team received reports regarding a potential vulnerability in our on-premise software which was being actively exploited. We immediately initiated our incident response protocol and began proactively communicating with our on-premise customers to ensure they could implement a mitigation solution we had identified. We engaged Profero, a cyber security incident response company, to assist us in our investigation. The investigation determined that there was a zero-day vulnerability in the SysAid on-premises software. We urge all customers with SysAid on-prem server installations to ensure that your SysAid systems are updated to version 23.3.36, which remediates the identified vulnerability, and conduct a comprehensive compromise assessment of your network to look for any indicators further discussed below. Should you identify any indicators, take immediate action and follow your incident response protocols.