Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 101 / 214
4270 résultats taggé EN  ✕
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta547-targets-german-organizations-rhadamanthys-stealer
17/04/2024 11:57:54
QRCode
archive.org
thumbnail

What happened  Proofpoint identified TA547 targeting German organizations with an email campaign delivering Rhadamanthys malware. This is the first time researchers observed TA547 use Rhadamanthys,...

proofpoint EN 2024 LLM chatgpt analysis TA547 Rhadamanthys Stealer
Palo Alto - Putting The Protecc In GlobalProtect (CVE-2024-3400) https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/
17/04/2024 11:04:20
QRCode
archive.org
thumbnail

Welcome to April 2024, again. We’re back, again.

Over the weekend, we were all greeted by now-familiar news—a nation-state was exploiting a “sophisticated” vulnerability for full compromise in yet another enterprise-grade SSLVPN device.

We’ve seen all the commentary around the certification process of these devices for certain .GOVs - we’re not here to comment on that, but sounds humorous.

watchtowr EN 2024 CVE-2024-3400 SSLVPN Paloalto GlobalProtect analysis
DDoS threat report for 2024 Q1 https://blog.cloudflare.com/ddos-threat-report-for-2024-q1
17/04/2024 06:44:03
QRCode
archive.org
thumbnail

2024 started with a bang. Cloudflare’s autonomous systems mitigated over 4.5 million DDoS attacks in the first quarter of the year — a 50% increase compared to the previous year.

cloudflare EN 2024 DDoS attacks report
The US Government Has a Microsoft Problem https://www.wired.com/story/the-us-government-has-a-microsoft-problem/
16/04/2024 20:09:46
QRCode
archive.org
thumbnail

Microsoft has stumbled through a series of major cybersecurity failures over the past few years. Experts say the US government’s reliance on its systems means the company continues to get a free pass.

wired EN 2024 microsoft cybersecurity us-government china russia US problem
Change Healthcare stolen patient data leaked by ransomware gang https://techcrunch.com/2024/04/15/change-healthcare-stolen-patient-data-ransomhub-leak/
16/04/2024 16:46:00
QRCode
archive.org
thumbnail

This is the second group to demand a ransom payment from Change Healthcare to prevent the release of stolen patient data in as many months.

techcrunch EN 2024 change-healthcare data-breach data-leack patient
Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects https://openjsf.org/blog/openssf-openjs-alert-social-engineering-takeovers
16/04/2024 16:44:29
QRCode
archive.org
thumbnail

XZ Utils cyberattack likely not an isolated incident

openjsf EN 2024 OpenSSF Social-engineering XZ open-source
Leaked LockBit builder in a real-life incident response case | Securelist https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware/112375/
16/04/2024 14:24:13
QRCode
archive.org
thumbnail

Kaspersky researchers revisit the leaked LockBit 3.0 builder and share insights into a real-life incident involving a custom targeted ransomware variant created with this builder.

securelist EN 2024 builder Data-Encryption Incident-response LockBit Malware Malware-Technologies Ransomware Targeted-attacks Trojan
From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering  | Proofpoint US https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering
16/04/2024 14:18:04
QRCode
archive.org
thumbnail

Key takeaways   TA427 regularly engages in benign conversation starter campaigns to establish contact with targets for long-term exchanges of information on topics of strategic importance to the No...

proofpoint EN 2024 DMARC Abuse TA427 analysis North-Korea
CISA: Email from federal agencies possibly accessed in Russian breach of Microsoft https://therecord.media/cisa-microsoft-breach-emergency-directive
15/04/2024 16:35:25
QRCode
archive.org
thumbnail

CISA publicly released an emergency directive issued to federal agencies earlier this month, detailing how a breach at Microsoft could have affected the government.

therecord EN 2024 CISA Microsoft Breach government email
Automating Pikabot’s String Deobfuscation https://www.zscaler.com/blogs/security-research/automating-pikabot-s-string-deobfuscation
15/04/2024 14:26:26
QRCode
archive.org
thumbnail

ThreatLabz created an IDA plugin to automate the deobfuscation of Pikabot’s strings.

zscaler EN 2024 research Pikabot deobfuscation
World-first “Cybercrime Index” ranks countries by cybercrime threat https://www.ox.ac.uk/news/2024-04-10-world-first-cybercrime-index-ranks-countries-cybercrime-threat-level?ref=news.risky.biz
15/04/2024 14:24:56
QRCode
archive.org
thumbnail

Following three years of intensive research, an international team of researchers have compiled the first ever ‘World Cybercrime Index’, which identifies the globe’s key cybercrime hotspots by ranking the most significant sources of cybercrime at a national level.

University-of-Oxford EN 2024 UK World-Cybercrime-Index research ranking
Thousands of Ivanti VPN Appliances Impacted by Recent Vulnerability https://www.securityweek.com/thousands-of-ivanti-vpn-appliances-impacted-by-recent-vulnerability/
14/04/2024 15:35:21
QRCode
archive.org

The Shadowserver Foundation identifies thousands of Ivanti VPN instances likely impacted by a recent remote code execution flaw.

securityweek EN 2024 Shadowserver Ivanti VPN CVE-2024-21894 vulnerable
Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files https://thehackernews.com/2024/04/raspberry-robin-returns-new-malware.html?m=1
14/04/2024 15:30:37
QRCode
archive.org

Researchers uncover a fresh wave of the Raspberry Robin campaign spreading malware through malicious Windows Script Files (WSFs) since March 2024.
#attacks #breach #computer #cyber #data #hack #hacker #hacking #how #information #malware #network #news #ransomware #security #software #the #to #today #updates #vulnerability

thehackernews 2024 EN Raspberry-Robin WSF return
Top Israeli spy chief exposes his true identity in online security lapse | Israel | The Guardian https://www.theguardian.com/world/2024/apr/05/top-israeli-spy-chief-exposes-his-true-identity-in-online-security-lapse
14/04/2024 15:19:30
QRCode
archive.org
thumbnail

Exclusive: Yossi Sariel unmasked as head of Unit 8200 and architect of AI strategy after book written under pen name reveals his Google account

theguardian EN 2024 secop Unit8200 Israel book oups spy
Ransomware gang’s new extortion trick? Calling the front desk https://techcrunch.com/2024/04/09/ransomware-gang-fail-calling-front-desk-extortion/
14/04/2024 15:18:34
QRCode
archive.org
thumbnail

When a hacker called the company that his gang claimed to breach, he felt the same way that most of us feel when calling the front desk: frustrated.

The phone call between the hacker, who claims to represent the ransomware gang DragonForce, and the victim company employee was posted by the ransomware gang on its dark web site in an apparent attempt to put pressure on the company to pay a ransom demand. In reality, the call recording just shows a somewhat hilarious and failed attempt to extort and intimidate a company’s rank-and-file employees.

techcrunch EN 2024 ransomware target frontdesk
Targus discloses cyberattack after hackers detected on file servers https://www.bleepingcomputer.com/news/security/targus-discloses-cyberattack-after-hackers-detected-on-file-servers/
14/04/2024 15:16:26
QRCode
archive.org
thumbnail

Laptop and tablet accessories maker Targus disclosed that it suffered a cyberattack disrupting operations after a threat actor gained access to the company's file servers.

bleepingcomputer EN 2024 Mobile InfoSec Security Targus cyberattack
Attempted Audio Deepfake Call Targets LastPass Employee https://blog.lastpass.com/posts/2024/04/attempted-audio-deepfake-call-targets-lastpass-employee
14/04/2024 15:15:22
QRCode
archive.org
thumbnail
lastpass EN 2024 Audio Deepfake Employee
Roku says 576,000 user accounts hacked after second security incident https://techcrunch.com/2024/04/12/roku-second-user-accounts-hacked/
13/04/2024 10:12:14
QRCode
archive.org
thumbnail

Streaming giant Roku has confirmed a second security incident in as many months, with hackers this time able to compromise more than half a million Roku user accounts.

In a statement Friday, the company said about 576,000 user accounts were accessed using a technique known as credential stuffing, where malicious hackers use usernames and passwords stolen from other data breaches and reuse the logins on other sites.

techcrunch EN 2024 roku data-breach
Researchers discover new ransomware gang ‘Muliaka’ attacking Russian businesses https://therecord.media/muliaka-ransomware-group-targeting-russian-businesses-conti?_hsenc=p2ANqtz-9_rrl-EsQRNWUkdDZu1p2oi9e3Mqew71pyTwU0pADQzCehJF9X5V-RjlZF5ymYmmVzPfkMwgQN-m7H6symSoAxW0gbow&_hsmi=302381143
13/04/2024 09:55:08
QRCode
archive.org
thumbnail

A previously unknown ransomware gang has been attacking Russian businesses with malware based on the leaked source code from the Conti hacking group.

The gang, which researchers at the Moscow-based cybersecurity company F.A.C.C.T. have dubbed “Muliaka," or Muddy Water in English, has left minimal traces from its attacks but has likely been active since at least December 2023.

therecord EN 2024 Muliaka ransomware gang Russia
Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400) https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/
13/04/2024 03:34:16
QRCode
archive.org
thumbnail

On April 10, 2024, Volexity identified zero-day exploitation of a vulnerability found within the GlobalProtect feature of Palo Alto Networks PAN-OS at one of its network security monitoring (NSM) customers. Volexity received alerts regarding suspect network traffic emanating from the customer’s firewall. A subsequent investigation determined the device had been compromised. The following day, April 11, 2024, Volexity observed further, identical exploitation at another one of its NSM customers by the same threat actor.

volexity EN 2024 Zero-Day Exploitation RCE GlobalProtect CVE-2024-3400
page 101 / 214
4879 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn