Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 184 / 216
4308 résultats taggé E*N  ✕
Insurance giant settles NotPetya lawsuit, signaling cyber insurance shakeup https://www.cyberscoop.com/insurance-giant-settles-notpetya-lawsuit/
07/11/2022 06:50:54
QRCode
archive.org
thumbnail

The settlement last week in a $100 million lawsuit over whether insurance giant Zurich should cover losses Mondelez International suffered from NotPetya may very well reshape the entire cyber insurance marketplace.

Zurich initially denied claims from Mondelez after the malware, which experts estimate caused some $10 billion in damages globally, wreaked havoc on its computer networks. The insurance provider claimed an act of war exemption since it’s widely believed Russian military hackers unleashed NotPetya on a Ukrainian company before it spread around the world.

cyberscoop EN 2022 financial NotPetya lawsuit insurance Zurich ransomware
Inside the global hack-for-hire industry https://www.thebureauinvestigates.com/stories/2022-11-05/inside-the-global-hack-for-hire-industry
07/11/2022 06:49:55
QRCode
archive.org
thumbnail

In a quiet alcove of the opulent Leela Palace hotel in Delhi, two British corporate investigators were listening intently to a young Indian entrepreneur as he made a series of extraordinary confessions.

The 28-year-old computer specialist Tej Singh Rathore described his role as a player in a burgeoning criminal industry stealing secrets from people around the world. He had hacked more than 500 email accounts, mostly on behalf of his corporate intelligence clients.

thebureauinvestigates EN 2022 intelligence hack-for-hire India
Crime group hijacks hundreds of US news websites to push malware https://techcrunch.com/2022/11/03/hundreds-news-websites-malware/
06/11/2022 20:09:27
QRCode
archive.org
thumbnail

A cybercriminal group has compromised a media content provider to deploy malware on the websites of hundreds of news outlets in the U.S. according to cybersecurity company Proofpoint.

techcrunch EN 2022 SocGholish malware proofpoint TA569 browser JavaScript
Last Week on My Mac: Home truths about macOS https://eclecticlight.co/2022/11/06/last-week-on-my-mac-home-truths-about-macos/
06/11/2022 11:40:49
QRCode
archive.org
thumbnail

True or false? Apple supports macOS for three years. Apple’s security updates are sufficient. New versions of macOS are full of bugs. It’s safer to delay upgrading.

eclecticlight EN 2022 macos apple security patching updates delay support
Department for Education warned after gambling companies benefit from learning records database https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/11/department-for-education-warned-after-gambling-companies-benefit-from-learning-records-database/
06/11/2022 11:38:51
QRCode
archive.org
thumbnail

The Information Commissioner’s Office (ICO) has issued a reprimand to the Department for Education (DfE) following the prolonged misuse of the personal information of up to 28 million children.

An ICO investigation found that the DfE’s poor due diligence meant a database of pupils’ learning records was ultimately used by Trust Systems Software UK Ltd (trading as Trustopia), an employment screening firm, to check whether people opening online gambling accounts were 18.

ICO UK EN 2022 education PII students misuse data privacy records database children
How Qatar hacked the World Cup https://www.thebureauinvestigates.com/stories/2022-11-05/how-qatar-hacked-the-world-cup
06/11/2022 10:30:46
QRCode
archive.org
thumbnail

Critics who threatened to expose wrongdoing by Qatar were targeting as part of huge hacking operation

thebureauinvestigates EN 2022 world-cup fifa phone-hacking computer-hacking qatar corporate-intelligence corruption football qatar-world-cup michel-platini
Apple's Poor Patching Policies Potentially Make Users' Security and Privacy Precarious https://www.intego.com/mac-security-blog/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious/
06/11/2022 10:00:29
QRCode
archive.org
thumbnail

Apple's practices regarding security updates are frustrating and perplexing, and may endanger users.

Intego 2021 EN Apple macOS patching policy endanger
Microsoft ties Vice Society hackers to additional ransomware strains https://therecord.media/microsoft-ties-vice-society-hackers-to-additional-ransomware-strains/
04/11/2022 07:03:55
QRCode
archive.org
thumbnail

Microsoft tied hackers with the Vice Society ransomware gang to several ransomware strains on Tuesday, noting that the group has been behind a wave of attacks on primary schools and colleges across the world.

therecord EN 2022 vice-society schools ransomware DEV-0832 Zeppelin De-RaaSing
Crimson Kingsnake: BEC Group Impersonates… https://abnormalsecurity.com/blog/crimson-kingsnake-bec-group-attacks
03/11/2022 21:16:59
QRCode
archive.org
thumbnail

Recently, we identified a new BEC group leveraging blind third-party impersonation tactics to swindle companies around the world. The group, which we call Crimson Kingsnake, impersonates real attorneys, law firms, and debt recovery services to deceive accounting professionals into quickly paying bogus invoices.

abnormalsecurity EN 2022 BEC invoices Crimson-Kingsnake impersonation scam
Exploiting Static Site Generators: When Static Is Not Actually Static https://blog.assetnote.io/2022/10/28/exploiting-static-site-generators/
03/11/2022 17:04:03
QRCode
archive.org
thumbnail

Over the last ten years, we have seen the industrialization of the content management space. A decade ago, it felt like every individual and business had a dynamic WordPress blog, loaded up with a hundred plugins to do everything from add widgets to improve performance. Over time, we realised this was a bad idea, as ensuring the security of third-party plugins seemed increasingly impossible.

assetnote EN 2022 Static hosting comromise Netlify
Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor https://www.sentinelone.com/labs/black-basta-ransomware-attacks-deploy-custom-edr-evasion-tools-tied-to-fin7-threat-actor/
03/11/2022 16:40:02
QRCode
archive.org
thumbnail

Black Basta operational TTPs are described here in full detail, revealing previously unknown tools and techniques and a link to FIN7.

SentinelOne EN 2022 BlackBasta FIN7 Research ransomware EDR TTPs
Malware on the Google Play store leads to harmful phishing sites https://www.malwarebytes.com/blog/news/2022/11/malware-on-the-google-play-store-leads-to-harmful-phishing-sites
03/11/2022 08:11:18
QRCode
archive.org
thumbnail

A family of malicious apps from developer Mobile apps Group are listed on Google Play and infected with Android/Trojan.HiddenAds.BTGTHB. In total, four apps are listed, and together they have amassed at least one million downloads.

Older versions of these apps have been detected in the past as different variants of Android/Trojan.HiddenAds. Yet, the developer is still on Google Play dispensing its latest HiddenAds malware.

malwarebytes Mobile-apps-Group EN 2022 HiddenAds malware Trojan app google-play
Malicious App Developer Remains on Google Play https://gizmodo.com/google-play-phishing-malicious-apps-1849731818
03/11/2022 07:11:03
QRCode
archive.org
thumbnail

A report shows four Bluetooth-centered apps by the same developer have been downloaded 1 million times combined while containing malicious code.

gizmodo EN google-play malicious code app Bluetooth-centered
U.S. banks processed about $1.2 billion in ransomware payments in 2021 https://www.cnbc.com/2022/11/01/us-banks-process-roughly-1point2-billion-in-ransomware-payments-in-2021.html
03/11/2022 07:10:37
QRCode
archive.org
thumbnail
  • U.S. banks and financial institutions processed more than $1 billion in potential ransomware-related payments in 2021.
  • It’s a new record and almost triple the amount that was reported the previous year.
  • Over half the ransomware attacks are attributed to suspected Russian cyber hackers, according to a new report.
cnbc EN 2022 ransomware financial banks record ransomware-related payments 2021
Nothing PUNY About OpenSSL (CVE-2022-3602) https://www.splunk.com/en_us/blog/security/nothing-puny-about-cve-2022-3602.html
02/11/2022 21:15:58
QRCode
archive.org
thumbnail

The Splunk SURGe team shares an outline of their interpretation of the CVE-2022-3602 vulnerability and what you can do to detect it in your environment.

splunk EN 2022 CVE-2022-3602 OpenSSL punycode
Phylum Discovers Dozens More PyPI Packages Attempting to Deliver W4SP Stealer in Ongoing Supply-Chain Attack https://blog.phylum.io/phylum-discovers-dozens-more-pypi-packages-attempting-to-deliver-w4sp-stealer-in-ongoing-supply-chain-attack
02/11/2022 21:03:04
QRCode
archive.org
thumbnail

Last week, our automated risk detection platform alerted us to suspicious activity in dozens of newly published PyPI packages. Here's what we uncovered.

Phylum EN 2022 supplychain PyPI W4SP Stealer Attack
New Azov data wiper tries to frame researchers and BleepingComputer https://www.bleepingcomputer.com/news/security/new-azov-data-wiper-tries-to-frame-researchers-and-bleepingcomputer/
02/11/2022 10:06:45
QRCode
archive.org
thumbnail

A new and destructive 'Azov Ransomware' data wiper is being heavily distributed through pirated software, key generators, and adware bundles, trying to frame well-known security researchers by claiming they are behind the attack.

EN bleepingcomputer 2022 Azov-Ransomware researchers BleepingComputer Data-Wiper Security-Researcher Ukraine
Unmasking WindTape - Speaker Deck https://speakerdeck.com/patrickwardle/unmasking-windtape
02/11/2022 09:12:22
QRCode
archive.org
thumbnail

The offensive macOS cyber capabilities of the WINDSHIFT APT group provide us with the opportunity to gain insight into the Apple-specific approaches employed by an advanced adversary.

In this talk we’ll comprehensively dissect OSX.WindTape, a second-stage tool utilized by the WINDSHIFT APT group when targeting Apple systems.

First we’ll discuss the malware’s anti-analysis mechanisms, and then once these have been thwarted, we’ll explore its capabilities. To conclude, we’ll present heuristic methods that can generically both detect and prevent WindTape, as well as other advanced macOS threats.

patrickwardle EN 2022 WINDSHIFT APT macOS
How we handled a recent phishing incident that targeted Dropbox https://dropbox.tech/security/a-recent-phishing-campaign-targeting-dropbox
02/11/2022 07:00:10
QRCode
archive.org
thumbnail

We were recently the target of a phishing campaign that successfully accessed some of the code we store in GitHub. No one’s content, passwords, or payment information was accessed, and the issue was quickly resolved. Our core apps and infrastructure were also unaffected, as access to this code is even more limited and strictly controlled. We believe the risk to customers is minimal. Because we take our commitment to security, privacy, and transparency seriously, we have notified those affected and are sharing more here.

dropbox EN 2022 incident phishing GitHub
Banking Trojan Techniques: Financially Motivated Malware https://unit42.paloaltonetworks.com/banking-trojan-techniques/
01/11/2022 20:47:57
QRCode
archive.org

Understanding banking Trojan techniques can help detect other activities of financially motivated threat groups.

unit42 EN 2022 paloaltonetworks research Banking Trojan Techniques
page 184 / 216
4896 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn