Quotidien Hebdomadaire Mensuel

Hebdomadaire Shaarli

Tous les liens d'un semaine sur une page.

Semaine 27 (July 1, 2024)

New Intel CPU Vulnerability 'Indirector' Exposes Sensitive Data

Discover how the 'Indirector' attack threatens Intel CPUs and learn about the 'TIKTAG' vulnerability in Arm processors.

Russia forces Apple to remove VPN apps from the App Store

Apple has caved to pressure from Russian authorities and removed a number of the best iPhone VPN apps from the App Store in the country.

Supply Chain Compromise Leads to Trojanized Installers | Rapid7 Blog

Rapid7 investigated suspicious behavior emanating from the installation of Notezilla, RecentX, & Copywhiz. These installers are distributed by Conceptworld.

Indian Software Firm's Products Hacked to Spread Data-Stealing Malware

Conceptworld software installers trojanized with data-stealing malware. Users of Notezilla, RecentX, and Copywhiz urged to check for compromise.

Formula 1 governing body discloses data breach after email hacks

FIA (Fédération Internationale de l'Automobile), the auto racing governing body since the 1950s, says attackers gained access to personal data after compromising several FIA email accounts in a phishing attack.

'Welcome to Londonistan': the Great Replacement theory gone visual ahead of the U.K. election

The captions are vague, yet the implicit message is clear: Few people in the videos are white, which should concern you.

It's what Dr. Beatriz Buarque, a politics researcher at the London School of Economics (LSE) who specializes in conspiracy theories and the digital politics of truth, calls "a visual representation of The Great Replacement theory," the far-right premise that non-white immigrants are part of a systematic scheme to replace white westerners and their culture. A conspiracy theory Dr. Buarque describes as "very dangerous," as it channels hate toward Muslim, Black, and brown individuals and portrays a segment of the population as invaders and enemies.

Il silenzio di Synlab sul furto e la diffusione di migliaia di dati sanitari - Il Post

Diverse persone tra le decine di migliaia coinvolte nel grave attacco informatico di maggio scorso hanno contattato l'azienda, che però non ha ancora risposto nonostante lo prevedano le norme sulla privacy

How scam networks use fake celebrity ads to lure online investors

Investor beware: online promises of quick profits are not always as legitimate as they look. Swiss public broadcaster, SRF, looked into a Cyprus-based network of scam websites.

The Rise of Packet Rate Attacks: When Core Routers Turn Evil

A sharp increase of DDoS attacks have been observed since the beginning of 2023. A new trend is to send high packet rate attacks though. This article introduces the findings of our teams in order to bring new insights regarding this threat.

RoguePuppet – A Critical Puppet Forge Supply Chain Vulnerability

What if there was a supply chain attack that could provide an attacker with direct access to core infrastructure within thousands of companies worldwide. What if that attack required no social engi…

Europol coordinates global action against criminal abuse of Cobalt Strike

Abuse by cybercriminals Cobalt Strike is a popular commercial tool provided by the cybersecurity software company Fortra. It is designed to help legitimate IT security experts perform attack simulations that identify weaknesses in security operations and incident responses. In the wrong hands, however, unlicensed copies of Cobalt Strike can provide a malicious actor with a wide range of attack capabilities.Fortra...

blog.ethereum.org mailing list incident

On 2024-06-23, 00:19 AM UTC, a phishing email was sent out to 35,794 email addresses by updates@blog.ethereum.org with the following content

A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too

Early last year, a hacker gained access to the internal messaging systems of OpenAI, the maker of ChatGPT, and stole details about the design of the company’s A.I. technologies.

The hacker lifted details from discussions in an online forum where employees talked about OpenAI’s latest technologies, according to two people familiar with the incident, but did not get into the systems where the company houses and builds its artificial intelligence.

Sonar

We discovered 4 critical code vulnerabilities in Gogs, a source code hosting solution, which are still unpatched. Read about the details and how to protect yourself.

Caught in the Net: Using Infostealer Logs to Unmask CSAM Consumers

Discover how Recorded Future uses infostealer logs to identify CSAM consumers and trends. Learn key findings and mitigation strategies.

OpenAI’s ChatGPT Mac app was storing conversations in plain text

OpenAI updated its ChatGPT macOS app on Friday after users discovered it stored conversations insecurely in plain text.

Twilio says hackers identified cell phone numbers of two-factor app Authy users

Twilio says "threat actors were able to identify" phone numbers of people who use the two-factor app Authy.

Europol coordinates global action against criminal abuse of Cobalt Strike | Europol

Abuse by cybercriminals Cobalt Strike is a popular commercial tool provided by the cybersecurity software company Fortra. It is designed to help legitimate IT security experts perform attack simulations that identify weaknesses in security operations and incident responses. In the wrong hands, however, unlicensed copies of Cobalt Strike can provide a malicious actor with a wide range of attack capabilities.Fortra...

Arnaque aux codes QR sur les horodateurs de la Ville de Nyon

À la suite d’une arnaque aux codes QR récemment découverte, La Police Nyon Région (PNR) met en garde la population et les visiteurs de passage en Ville de Nyon.

CVE-2024-29510 - Exploiting Ghostscript using format strings

A format string vulnerability in Ghostscript ≤ 10.03.0 which enables attackers to gain Remote Code Execution (#RCE) while also bypassing sandbox protections. CVE-2024-29510 has significant impact on web-applications and other services offering document conversion and preview functionalities as these often use Ghostscript under the hood. We recommend verifying whether your solution (indirectly) makes use of Ghostscript and if so, update it to the latest version!

3 million iOS and macOS apps were exposed to potent supply-chain attacks

Apps that used code libraries hosted on CocoaPods were vulnerable for about 10 years.

Figma Disables AI App Design Tool After It Copied Apple’s Weather App

“Ultimately it is my fault for not insisting on a better QA process for this work and pushing our team hard to hit a deadline,” Figma’s CEO said.

Poland to probe Russia-linked cyberattack on state news agency

In May, hackers published fake news on the website of the Polish Press Agency claiming the country’s authorities had announced a partial mobilization of 200,000 men to be sent to fight in a war in Ukraine.

Cisco NX-OS Command Injection Vulnerability CVE-2024-20399: Insights and Defense Strategies

Discover key insights into the recently disclosed Cisco NX-OS software CLI vulnerability (CVE-2024-20399) affecting numerous Cisco Nexus devices.

Vulnerabilities in CocoaPods Open the Door to Supply Chain Attacks Against Thousands of iOS and MacOS Applications
  • E.V.A Information Security researchers uncovered several vulnerabilities in the CocoaPods dependency manager that allows any malicious actor to claim ownership over thousands of unclaimed pods and insert malicious code into many of the most popular iOS and MacOS applications. These vulnerabilities have since been patched.
  • Such an attack on the mobile app ecosystem could infect almost every Apple device, leaving thousands of organizations vulnerable to catastrophic financial and reputational damage. One of the vulnerabilities could also enable zero day attacks against the most advanced and secure organizations’ infrastructure.
  • Developers and DevOps teams that have used CocoaPods in recent years should verify the integrity of open source dependencies used in their application code.
  • Dependency managers are an often-overlooked aspect of software supply chain security. Security leaders should explore ways to increase governance and oversight over the use these tools.
TeamViewer: Hackers copied employee directory data and encrypted passwords

TeamViewer says that a recently discovered breach appears to be limited to its internal corporate IT network. The software company has attributed it to a hacking operation associated with Russian intelligence.

Halcyon Identifies New Ransomware Operator Volcano Demon Serving Up LukaLocker

Halcyon Identifies New Ransomware Operator Volcano Demon Serving Up LukaLocker
#Demon #Halcyon #Identifies #LukaLocker #New #Operator #Ransomware #Volcano

Analysis of the Phishing Campaign: Behind the Incident

See the results of our investigation into the phishing campaign encountered by our company and get information to defend against it. 

Here are some key findings:

  • We found around 72 phishing domains pretending to be real or fake companies. These domains created believable websites that tricked people into sharing their login details.
  • The attack was sophisticated, using advanced techniques like direct human interaction to deceive targets.
  • We analyzed several fake websites and reverse-engineered their web-facing application.
  • At the end of the post, you will find a list of IOCs that can be used for improving your organization’s security.
Startups scramble to assess fallout from Evolve Bank data breach

Fintech-friendly Evolve Bank disclosed a data breach, saying it may have impacted customers and partners.

Cisco warns of NX-OS zero-day exploited to deploy custom malware

Cisco has patched an NX-OS zero-day exploited in April attacks to install previously unknown malware as root on vulnerable switches.

Polyfill, Cloudflare trade barbs after reports of supply chain attack threatening 100k websites

Tech giant Cloudflare urged customers to remove a popular open source library used to support older browsers after reports emerged this week that the tool is being used to distribute malware.

regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server

The Qualys Threat Research Unit (TRU) has discovered a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) in glibc-based Linux…