Quotidien Hebdomadaire Mensuel

Quotidien Shaarli

Tous les liens d'un jour sur une page.

October 23, 2024

macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools

An unknown threat actor is developing ransomware to lock files and steal data on macOS, and it's not LockBit.

Fortinet FortiManager CVE-2024-47575 Exploited in Zero-Day Attacks

On Wednesday, October 23, 2024, security company Fortinet published an advisory on CVE-2024-47575, a critical zero-day vulnerability affecting their FortiManager network management solution. The vulnerability arises from a missing authentication for a critical function [CWE-306] in the FortiManager fgfmd daemon that allows a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests. The vulnerability carries a CVSS v3 score of 9.8.

Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks

Threat actors exploit Amazon S3 in ransomware attacks, using AWS credentials for data theft.

ShadyShader: Crashing Apple Devices with a Single Click

ShadyShader: Crashing Apple M-Series Devices with a Single Click

Rogue RDP – Revisiting Initial Access Methods

MThe Hunt for Initial Access With the default disablement of VBA macros originating from the internet, Microsoft may be pitching a curveball to threat actors and red […]

Authenticated Remote Code Execution in multiple Xerox printers

Multiple Xerox printers (EC80xx, AltaLink, VersaLink, WorkCentre) were affected by an authenticated remote code execution vulnerability which allowed an attacker with administrative web credentials to fully compromise the devices with root privileges on the operating system.

How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends

Mandiant analyzed 138 vulnerabilities that were disclosed in 2023 and that we tracked as exploited in the wild.

Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs

Did you know there’s widespread exploitation of FortiNet products going on using a zero day, and that there’s no CVE? Now you do.

ESET themed wiper Targets Israel

It all started with an ESET statement on their official account on "X", wherein they mentioned that their partner company in Israel has gone under a targeted malicious email campaign that they managed to block within 10 minutes.

ESET Distributor’s Systems Abused to Deliver Wiper Malware

ESET has launched an investigation after the systems of its official product distributor in Israel were abused to send out emails delivering wiper malware.

The targeted users received an email — signed by ESET’s Advanced Threat Defense (ATD) team — informing them about government-backed attackers trying to compromise their devices.