Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 181 / 214
4278 résultats taggé EN  ✕
Exploit released for actively abused ProxyNotShell Exchange bug https://www.bleepingcomputer.com/news/security/exploit-released-for-actively-abused-proxynotshell-exchange-bug/
21/11/2022 09:11:59
QRCode
archive.org
thumbnail

Proof-of-concept exploit code has been released online for two actively exploited and high-severity vulnerabilities in Microsoft Exchange, collectively known as ProxyNotShell.

bleepingcomputer EN 2022 CVE-2022-41082 CVE-2022-41040 Exploit Microsoft-Exchange Privilege-Escalation Proof-of-Concept ProxyNotShell RCE Remote-Code-Execution
Making Cobalt Strike harder for threat actors to abuse https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse
20/11/2022 20:31:00
QRCode
archive.org
thumbnail

Cobalt Strike, the popular tool used by red teams to test the resilience of their cyber defenses, has seen many iterations and improvements over the last decade. First released in 2012, it was originally the commercial spinoff of the open-source Armitage project that added a graphical user interface (GUI) to the Metasploit framework to help security practitioners detect software vulnerabilities more quickly.

google EN 2022 Cobalt-Strike YARA rules detect
Wi-Spy https://www.hackster.io/news/wi-spy-98d985364820
20/11/2022 10:45:30
QRCode
archive.org
thumbnail

The Wi-Peep exploit allows an attacker to covertly locate all of the Wi-Fi-enabled devices in a building quickly using inexpensive hardware.

Hackster.io EN 2022 research Wi-Fi Wi-Peep drone attacker locate devices
Technical Analysis of the RedLine Stealer https://cloudsek.com/technical-analysis-of-the-redline-stealer/
19/11/2022 23:14:10
QRCode
archive.org
thumbnail

RedLine is an information stealer which operates on a MaaS (malware-as-a-service) model. This stealer is available on underground forums, and priced according to users' needs.

cloudsek EN 2022 stealer RedLine MaaS technical analysis IoCs
AXLocker, Octocrypt, and Alice: Leading a new wave of Ransomware Campaigns https://blog.cyble.com/2022/11/18/axlocker-octocrypt-and-alice-leading-a-new-wave-of-ransomware-campaigns/
19/11/2022 23:12:11
QRCode
archive.org
thumbnail

Cyble analyzes a new wave of ransomware attacks being led by AXLocker, Octocrypt, and Alice ransomware and how they target Discord tokens.

cyble 2022 EN AXLocker Octocrypt Alice analysis ransomware Discord IoCs
Researchers Quietly Cracked Zeppelin Ransomware Keys https://krebsonsecurity.com/2022/11/researchers-quietly-cracked-zeppelin-ransomware-keys/
18/11/2022 09:38:28
QRCode
archive.org

Peter is an IT manager for a technology manufacturer that got hit with a Russian ransomware strain called "Zeppelin" in May 2020. He'd been on the job less than six months, and because of the way his predecessor architected things,…

krebsonsecurity EN 2022 Cracked Zeppelin Ransomware Keys
Michigan school districts reopen after three-day closure due to ransomware attack https://therecord.media/michigan-school-districts-reopen-after-two-day-closure-due-to-ransomware-attack/
17/11/2022 18:49:53
QRCode
archive.org
thumbnail

Public schools in two Michigan counties are reopening on Thursday after a ransomware attack crippled their ability to function and closed doors to students for three days.

All of the public schools in Jackson and Hillsdale counties announced their reopening on Thursday in letters to parents, assuring them that cybersecurity experts, tech officials and law enforcement worked around the clock to restore the systems following outages that began on Monday.

therecord EN 2022 schools US ransomware Public closed students
A Comprehensive Look at Emotet’s Fall 2022 Return https://www.proofpoint.com/us/blog/threat-insight/comprehensive-look-emotets-fall-2022-return
17/11/2022 16:33:48
QRCode
archive.org
thumbnail
  • Emotet returned to the email threat landscape in early November for the first time since July 2022. It is once again one of the most high-volume actors observed by Proofpoint, distributing hundreds of thousands of emails per day.
  • Proofpoint observed multiple changes to Emotet and its payloads including the lures used, and changes to the Emotet modules, loader, and packer.
  • Emotet was observed dropping IcedID.
  • The new activity suggests Emotet is returning to its full functionality acting as a delivery network for major malware families.
  • New operators or management might be involved as the botnet has some key differences with previous deployments.
proofpoint EN 2022 Emotet Return IcedID
CVE-2022-41622 and CVE-2022-41800 (FIXED): F5 BIG-IP and iControl REST Vulnerabilities and Exposures https://www.rapid7.com/blog/post/2022/11/16/cve-2022-41622-and-cve-2022-41800-fixed-f5-big-ip-and-icontrol-rest-vulnerabilities-and-exposures/
17/11/2022 13:40:54
QRCode
archive.org
thumbnail

Rapid7 discovered several vulnerabilities and exposures in F5 BIG-IP and BIG-IQ devices running a customized distribution of CentOS detailed in F5's Base Operating Systems support article. The affected products are detailed in the vendor advisories below:

rapid7 EN 2022 CVE-2022-41622 CVE-2022-41800 F5 BIG-IP vulnerabilities
Firefox fixes fullscreen fakery flaw – get the update now! – Naked Security https://nakedsecurity.sophos.com/2022/11/16/firefox-fixes-fullscreen-fakery-flaw-get-the-update-now/
17/11/2022 09:01:42
QRCode
archive.org
thumbnail

What’s so bad about a web page going fullscreen without warning you first?

nakedsecurity EN 2022 CVE-2022-45407 CVE-2022-4540 firefox mozilla vulnerability firefox patch vulnerability
Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester https://www.cisa.gov/uscert/ncas/alerts/aa22-320a
17/11/2022 08:59:13
QRCode
archive.org

From mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) activity. In the course of incident response activities, CISA determined that cyber threat actors exploited the Log4Shell vulnerability in an unpatched VMware Horizon server, installed XMRig crypto mining software, moved laterally to the domain controller (DC), compromised credentials, and then implanted Ngrok reverse proxies on several hosts to maintain persistence.

cisa EN 2022 uscert csirt cert cybersecurity cyber-security Log4Shell VM APT Iran USware
New RapperBot Campaign – We Know What You Bruting for this Time https://www.fortinet.com/blog/threat-research/new-rapperbot-campaign-ddos-attacks
16/11/2022 20:24:13
QRCode
archive.org
thumbnail

FortiGuard Labs provides an analysis on RapperBot focusing on comparing samples for different campaigns, including one aiming to launch Distributed Denial of Service (DDoS) attacks. Read our blog to learn more about the differences observed in this campaign vs previous RapperBot and similar campaigns in the past.

fortinet EN 2022 RapperBot DDoS-attacks DDoS analysis IoCs
Google Reaches $391.5 Million Settlement With States Over Location Tracking Practices https://www.wsj.com/articles/google-reaches-391-5-million-settlement-with-states-over-location-tracking-practices-11668444749
16/11/2022 16:51:02
QRCode
archive.org
thumbnail

Attorneys general found that Google violated state consumer protection laws by misleading consumers about its location-data practices, tracking consumers even when their location history setting was turned off.

wsj EN 2022 settlement privacy tracking location fine US
Thales position on LockBit 3.0 https://www.thalesgroup.com/en/worldwide/group/press_release/thales-position-lockbit-30
16/11/2022 16:47:02
QRCode
archive.org

At this stage, on November 11, 2022, at 3pm (CET time) Thales is able to confirm the following information:

thalesgroup EN ransomware LockBit3.0 press-release
Top Zeus Botnet Suspect “Tank” Arrested in Geneva https://krebsonsecurity.com/2022/11/top-zeus-botnet-suspect-tank-arrested-in-geneva/
16/11/2022 08:13:17
QRCode
archive.org

Vyacheslav “Tank” Penchukov, the accused 40-year-old Ukrainian leader of a prolific cybercriminal group that stole tens of millions of dollars from small to mid-sized businesses in the United States and Europe, has been arrested in Switzerland, according to multiple sources.

krebsonsecurity EN 2022 Geneva Penchukov Zeus JabberZeus arrested Switzerland
CVE-2022-45047: Apache MINA SSHD unsafe deserialization vulnerability https://securityonline.info/cve-2022-45047-apache-mina-sshd-unsafe-deserialization-vulnerability/
16/11/2022 07:07:34
QRCode
archive.org
thumbnail

Recently, Apache MINA fixed an unsafe deserialization vulnerability. The bug exists in the class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider, an attacker could exploit this vulnerability to deserialize and thus achieve remote code execution. Track as CVE-2022-45047, the flaw severity is important.

securityonline EN 2022 CVE-2022-4504 Apache MINA SSHD unsafe deserialization
BumbleBee Zeros in on Meterpreter https://thedfirreport.com/2022/11/14/bumblebee-zeros-in-on-meterpreter/
14/11/2022 21:31:34
QRCode
archive.org
thumbnail

In this intrusion from May 2022, the threat actors used BumbleBee as the initial access vector from a Contact Forms campaign. We have previously reported on two BumbleBee intrusions (1, 2), and this report is a continuation of a series of reports uncovering multiple TTPs seen by BumbleBee post exploitation operators.

The intrusion began with the delivery of an ISO file that contained an LNK and a DLL. The threat actors leveraged BumbleBee to load a Meterpreter agent and Cobalt Strike Beacons. They then performed reconnaissance, used two different UAC bypass techniques, dumped credentials, escalated privileges using a ZeroLogon exploit, and moved laterally through the environment.

thedfirreport EN 2022 bumblebee case analysis
Apple Hit With Class Action Alleging It Tracks Users Despite Privacy Assurances https://www.macrumors.com/2022/11/14/apple-class-action-user-tracking-allegations/
14/11/2022 21:29:08
QRCode
archive.org
thumbnail

Apple is facing a proposed federal class action alleging that it records users' mobile activity without their consent and despite privacy...

macrumors 2022 EN privacy Apple-Lawsuits Apple-Privacy Apple
Computer Security Incident Response Teams: Sind sie gesetzlich geregelt? Das Schweizer Beispiel https://link.springer.com/article/10.1365/s43439-022-00070-x
14/11/2022 14:02:34
QRCode
archive.org

Computer security incident response teams: are they legally regulated? The Swiss example

springer EN 2022 security low GovCert CH
Delegating trust is really, really, really hard (infosec edition) https://pluralistic.net/2022/11/09/infosec-blackpill/#on-trusting-trust
14/11/2022 10:49:47
QRCode
archive.org
pluralistic CoryDoctorow EN 2022 trust Trustcor CA
page 181 / 214
4888 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn