Quotidien Hebdomadaire Mensuel

Hebdomadaire Shaarli

Tous les liens d'un semaine sur une page.

Semaine 24 (June 10, 2024)

Arm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers

Arm discloses a critical vulnerability (CVE-2024-4610) in Mali GPU Kernel Drivers. This flaw, actively exploited, affects versions from r34p0 to r40p0

Black Basta ransomware gang linked to Windows zero-day attacks

The Cardinal cybercrime group (Storm-1811, UNC4394), who are the main operators of the Black Basta ransomware, is suspected of exploiting a Windows privilege escalation vulnerability, CVE-2024-26169, before a fix was made available.

The mystery of an alleged data broker’s data breach

The breached data appears partly legitimate — if imperfect — but also widely available for sale by data brokers.

New York Times warns freelancers of GitHub repo data breach

The New York Times notified an undisclosed number of contributors that some of their sensitive personal information was stolen and leaked after its GitHub repositories were breached in January 2024.

entagon ran secret anti-vax campaign to undermine China during pandemic

The U.S. military launched a clandestine program amid the COVID crisis to discredit China’s Sinovac inoculation – payback for Beijing’s efforts to blame Washington for the pandemic. One target: the Filipino public. Health experts say the gambit was indefensible and put innocent lives at risk.

Former head of NSA joins OpenAI board

OpenAI has appointed Paul M. Nakasone, a retired general of the US Army and a former head of the National Security Agency, to its board of directors.

Microsoft fixes hack-me-via-Wi-Fi Windows security hole • The Register

Redmond splats dozens of bugs as does Adobe while Arm drivers and PHP under active attack

Breaking: Meta halts AI rollout in Europe after ‘request’ from Irish data protection authorities

Facebook and Instagram's parent company Meta is pausing its plans to roll our artificial intelligence tools in Europe, following a request from Ireland's Data Protection Commission (DPC), the firm said in a Friday (14 June) blogpost.

Major takedown of critical online infrastructure to disrupt terrorist communications and propaganda | Europol

The servers supported multiple media outlets linked to Islamic State. They were used to disseminate worldwide propaganda and messages capable of inciting terrorism in at least thirty languages. Eurojust and Europol coordinated and supported the joint operations.This week’s joint operations are part of ongoing efforts and constant vigilance to tackle online terrorist propaganda and communications, including through social media. They...

Here’s what to know about Adobe’s Terms of Use updates

We recently rolled out a re-acceptance of our Terms of Use which has led to concerns about what these terms are and what they mean to our customers. This has caused us to reflect on the language we use in our Terms, and the opportunity we have to be clearer and address the concerns raised by the community.

Over the next few days, we will speak to our customers with a plan to roll out updated changes by June 18, 2024.

Ukrainian cyber specialists attack Russian airports, several flights delayed - source

Specialists with the Ukrainian Defense Ministry's Main Intelligence Directorate (HUR) carried out a cyberattack on the websites of Russian government agencies and Russian airports on "Russia Day," with a number of flights being delayed. — Ukrinform.

Evolution of KILLNET from Hacktivism to Private Hackers Company and the Role of Sub-groups

Recently KILLNET creator; ‘KillMilk’, announced that they were building a global team of operators from the darknet and special services members, with financially motivated destructive capabilities. Their operation went full circle from offering services to hackers and competing businessmen, to taking orders from private and state persons, along with defending the interests of the Russian Federation. This report focuses on analyzing KILLNET, Subgroups, capabilities, and recent development in the group’s motive.

Multiple flaws in Fortinet FortiOS fixed

Fortinet released security updates to address multiple vulnerabilities in FortiOS, including a high-severity code execution security issue.

Apple Patches Vision Pro Vulnerability Used in Possibly ‘First Ever Spatial Computing Hack’

Apple on Monday updated visionOS, the operating system powering its Vision Pro virtual reality headset, to version 1.2, which addresses several vulnerabilities, including what may be the first security flaw that is specific to this product.

visionOS 1.2 patches nearly two dozen vulnerabilities. However, a vast majority of them are in components that visionOS shares with other Apple products, such as iOS, macOS and tvOS.

Cyber Army of Russia — DDoS Tool. The «Cyber Army of Russia» (or… | by PJ)

The «Cyber Army of Russia» (or “people’s Cyber Army”), published their own DDoS-Tool on Wednesday (2023–11–29). According to their post, it is based on the code of the Aura-DDoS tool (used by the…

Hacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Cops

A hacker broke into systems used by Tile, the tracking company, then stole a wealth of customer data and had access to internal company tools.

You’ve Got Mail: Critical Microsoft Outlook Vulnerability Executes as Email is Opened

Morphisec researchers have identified a critical Microsoft Outlook vulnerability, CVE-2024-30103, and detail its technical impact and recommended actions.

CVE-2024-29824 Deep Dive: Ivanti EPM SQL Injection Remote Code Execution Vulnerability – Horizon3.ai

CVE-2024-29824 Ivanti EPM SQL Injection Remote Code Execution Vulnerability. This blog details the internals of a SQLi RCE vulnerability.

IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment – The DFIR Report

Key Takeaways In October 2023, we observed an intrusion that began with a spam campaign, distributing a forked IcedID loader. The threat actor used Impacket’s wmiexec and RDP to install Scree…

The New York Times source code leaked by a 4chan user

A user on the online forum 4chan has leaked a massive 270GB of data belonging to The New York Times. This leak includes the source code for the

Microsoft June 2024 Patch Tuesday fixes 51 flaws, 18 RCEs

Today is Microsoft's June 2024 Patch Tuesday, which includes security updates for 51 flaws, eighteen remote code execution flaws, and one publicly disclosed zero-day vulnerability.
#Microsoft #Patch #Security #Tuesday #Update #Vulnerability #Windows

CVE-2024-4577 RCE in PHP CGI: Everything you need to know | Wiz Blog

Detect and mitigate CVE-2024-4577, a critical remote code execution vulnerability in PHP CGI. Organizations are advised to patch urgently.

Bypassing Veeam Authentication CVE-2024-29849

Veeam Backup Enterprise Manager Authentication Bypass

Switzerland notes increase in cyberattacks ahead of Ukraine peace summit

Russia, which hasn’t been invited to the summit, has repeatedly called it “meaningless and harmful.” Swiss officials did not provide more details about the reported cyberattacks.

UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion

A campaign targeting Snowflake customer database instances with the intent of data theft and extortion.

Urgent call for O-type blood donations following London hospitals ransomware attack

As a result of the cyberattack “hospitals cannot currently match patients’ blood at the same frequency as usual,” announced NHS Blood and Transplant.

Mandiant says hackers stole a 'significant volume of data' from Snowflake customers

The security firm said the attacks targeting Snowflake customers is "ongoing," suggesting the number of affected companies may rise.

Apple’s AI promise: “Your data is never stored or made accessible to Apple”

And publicly reviewable server code means experts can "verify this privacy promise."

Private Cloud Compute: A new frontier for AI privacy in the cloud

Secure and private AI processing in the cloud poses a formidable new challenge. To support advanced features of Apple Intelligence with larger foundation models, we created Private Cloud Compute (PCC), a groundbreaking cloud intelligence system designed specifically for private AI processing. Built with custom Apple silicon and a hardened operating system, Private Cloud Compute extends the industry-leading security and privacy of Apple devices into the cloud, making sure that personal user data sent to PCC isn’t accessible to anyone other than the user — not even to Apple. We believe Private Cloud Compute is the most advanced security architecture ever deployed for cloud AI compute at scale.

Festung Bürgenstock: Diese Gefahren drohen rund um die Friedenskonferenz

Bauernkinder dürfen nicht mehr alleine zur Schule, kritische Infrastruktur wird vor russischen Cyberangriffen geschützt, und im Hotel wird jede Crèmeschnitte einzeln durchleuchtet. Heikel wird es bei einem Angriff mit Minidrohnen. Oder wenn eines von Putins Schlafviren erwacht.

La SSR sur ses gardes face à l'éventualité de cyberattaques pendant le sommet du Bürgenstock

Si la Russie ne participera pas à la conférence sur la paix en Ukraine du Bürgenstock, l'Office fédéral de la cybersécurité met en garde contre d'éventuelles actions perturbatrices de sa part. Première responsable de la transmission d'informations, la SSR est sur le qui-vive.

Malicious VSCode extensions with millions of installs discovered

A group of Israeli researchers explored the security of the Visual Studio Code marketplace and managed to