Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
wget to Wipeout: Malicious Go Modules Fetch Destructive Payload
macOS Vulnerabilities: A Year of Security Research at Kandji
MCP Prompt Injection: Not Just For Evil
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations | Trend Micro (US)
The Ever-Evolving Threat of the Russian-Speaking Cybercriminal Underground | Trend Micro (US)
Searching for something unknow
VanHelsing, new RaaS in Town
Eradicating trivial vulnerabilities, at scale
IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
Will the Real Volt Typhoon Please Stand Up?
New Star Blizzard spear-phishing campaign targets WhatsApp accounts | Microsoft Security Blog
Backdooring Your Backdoors - Another $20 Domain, More Governments
Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit
Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces – Sophos News
300,000+ Prometheus Servers and Exporters Exposed to DoS Attacks
Oasis Security Research Team Discovers Microsoft Azure MFA Bypass
Unidentified Threat Actor Utilizes Android Malware to Target High-Value Assets in South Asia
FortiClient VPN Logging Blind Spot Revealed
Uncovering Apple Vulnerabilities: The diskarbitrationd and storagekitd Audit Story Part 1
New Campaign Uses Remcos RAT to Exploit Victims
File hosting services misused for identity phishing
perfctl: A Stealthy Malware Targeting Millions of Linux Servers
Rhadamanthys Stealer v0.7.0: A Rising Threat in the Cybercrime Ecosystem
Scam Sites at Scale: LLMs Fueling a GenAI Criminal Revolution
A Dive into Earth Baku’s Latest Campaign
Quartet of Trouble: XWorm, AsyncRAT, VenomRAT, and…
Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft
Stargazers Ghost Network
Solving the 7777 Botnet enigma: A cybersecurity quest
New Play Ransomware Linux Variant Targets ESXi Shows Ties With Prolific Puma | Trend Micro (US)
LilacSquid: The stealthy trilogy of PurpleInk, InkBox and InkLoader
From Origins to Operations: Understanding Black Basta Ransomware
CVE-2023-34992: Fortinet FortiSIEM Command Injection Deep-Dive
Leveraging DNS Tunneling for Tracking and Scanning
New “Goldoon” Botnet Targeting D-Link Devices
GuptiMiner: Hijacking Antivirus Updates for Distributing Backdoors and Casual Mining - Avast Threat Labs
Automating Pikabot’s String Deobfuscation
World-first “Cybercrime Index” ranks countries by cybercrime threat
Muddled Libra’s Evolution to the Cloud
Bringing process injection into view(s): exploiting all macOS apps using nib files · Sector 7
Unveiling the Fallout: Operation Cronos' Impact on LockBit Following Landmark Disruption
Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | Trend Micro (US)
CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED)
CVE-2024-21412: Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Day
Kasseika Ransomware Deploys BYOVD Attacks Abuses PsExec and Exploits Martini Driver
Qualys TRU Discovers Important Vulnerabilities in GNU C Library’s syslog()
Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
Anthropic researchers find that AI models can be trained to deceive
Using AI to Automatically Jailbreak GPT-4 and Other LLMs in Under a Minute
InfectedSlurs Botnet Spreads Mirai via Zero-Days
Telekopye: Chamber of Neanderthals’ secrets
InfectedSlurs Botnet Spreads Mirai via Zero-Days
Uncovering thousands of unique secrets in PyPI packages
A Closer Look at ChatGPT's Role in Automated Malware Creation
Raising Online Defenses Through Transparency and Collaboration | Meta
#FuckStalkerware pt. 3 - ownspy got, well, owned
The New Frontline of Geopolitics | Understanding the Rise of State-Sponsored Cyber Attacks
Researchers watched 100 hours of hackers hacking honeypot computers
Midnight Blizzard conducts targeted social engineering over Microsoft Teams
Chinese Threat Actors Targeting Europe in SmugX Campaign
Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389
New Magecart-Style Campaign Abusing Legitimate Websites to Attack Others | Akamai
New macOS vulnerability, Migraine, could bypass System Integrity Protection | Microsoft Security Blog
EDR bypassing via memory manipulation techniques | WithSecure™ Labs
BlackCat Ransomware Deploys New Signed Kernel Driver
Visualizing QakBot Infrastructure
The malware threat landscape: NodeStealer, DuckTail, and more
FIN7 tradecraft seen in attacks against Veeam backup servers
Rorschach – A New Sophisticated and Fast Ransomware
Information on Attacks Involving 3CX Desktop App
New OpcJacker Malware Distributed via Fake VPN Malvertising
Shining Light on Dark Power: Yet Another Ransomware Gang
Uncle Sow: Dark Caracal in Latin America
Enigma Stealer Targets Cryptocurrency Industry with Fake Jobs
Accidentally Crashing a Botnet
Wi-Spy
Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor
LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company
Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries
Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
SafeBreach Uncovers Fully Undetectable Powershell Backdoor
BianLian Ransomware Encrypts Files in the Blink of an Eye
Black Basta Ransomware Gang Infiltrates networks via QAKBOT, Brute Ratel, and Cobalt Strike
POLONIUM targets Israel with Creepy malware
A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion – NCC Group Research
Slack’s and Teams’ Lax App Security Raises Alarms
So RapperBot, What Ya Bruting For?
Flubot: the evolution of a notorious Android Banking Malware
Conti vs. LockBit: A Comparative Analysis of Ransomware Groups
Telerik UI exploitation leads to cryptominer, Cobalt Strike infections
Lyceum .NET DNS Backdoor
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
Microsoft Diagnostic Tool "DogWalk" Package Path Traversal Gets Free Micropatches (0day/WontFix)
SVCReady: A New Loader Gets Ready
Analysis and Attribution of the Eternity Ransomware: Timeline and Emergence of the Eternity Group
XLoader Botnet: Find Me If You Can
New Linux-Based Ransomware Cheerscrypt Targets ESXi Devices
Large-scale Analysis of DNS-based Tracking Evasion - broad data leaks included?
The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine
Exploiting an Unbounded memcpy in Parallels Desktop
Multi-factor Authentication to Generate $27 Billion Globally for Mobile Operators in 2022, Juniper Research Study Finds
Web ad firms scrape email addresses before you know it
npm Supply Chain Attack Targeting Germany-Based Companies
Industroyer2: Industroyer reloaded
MacOS SUHelper Root Privilege Escalation Vulnerability A Deep Dive Into CVE-2022-22639
DEV-0537 criminal actor targeting organizations for data exfiltration and destruction
Gas Is Too Expensive; Let’s Make It Cheap!
Raccoon Stealer: “Trash panda” abuses Telegram
Iranian linked conglomerate MuddyWater comprised of regionally focused subgroups
Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk
ModifiedElephant APT and a Decade of Fabricating Evidence