Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 201 / 216
4310 résultats taggé E*N  ✕
The Cybersecurity 202: Internet domain names are ripe for scam during coronavirus crisis https://www.washingtonpost.com/politics/2020/09/08/cybersecurity-202-internet-domain-names-are-ripe-scam-during-coronavirus-crisis/
22/06/2022 08:52:33
QRCode
archive.org
thumbnail

Companies including GoDaddy are making it easy for criminals to scoop up websites for dangerous coronavirus scams, researchers say.

washingtonpost 2020 EN Internet domain scam coronavirus registrars registrar
FBI says fraud on LinkedIn a 'significant threat' to platform and consumers https://www.cnbc.com/2022/06/17/fbi-says-fraud-on-linkedin-a-significant-threat-to-platform-and-consumers.html
22/06/2022 08:48:54
QRCode
archive.org
thumbnail

Fraudsters who target LinkedIn users in sophisticated investment schemes pose a "significant threat" to the platform, the FBI tells CNBC.

cnbc EN 2022 LinkedIn fraud FBI Microsoft Cryptocurrency Politics
Russia's APT28 uses fear of nuclear war to spread Follina docs in Ukraine https://blog.malwarebytes.com/threat-intelligence/2022/06/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine/
21/06/2022 17:33:19
QRCode
archive.org
thumbnail

Threat actors associated with Russian intelligence are using the fear or nuclear war to spread data-stealing malware in Ukraine.

malwarebytes EN 2022 Follina Russia cyberwar Ukraine Russia-Ukraine-war
Project Zero: An Autopsy on a Zombie In-the-Wild 0-day https://googleprojectzero.blogspot.com/2022/06/an-autopsy-on-zombie-in-wild-0-day.html
21/06/2022 08:57:54
QRCode
archive.org

Whenever there’s a new in-the-wild 0-day disclosed, I’m very interested in understanding the root cause of the bug. This allows us to then understand if it was fully fixed, look for variants, and brainstorm new mitigations. This blog is the story of a “zombie” Safari 0-day and how it came back from the dead to be disclosed as exploited in-the-wild in 2022. CVE-2022-22620 was initially fixed in 2013, reintroduced in 2016, and then disclosed as exploited in-the-wild in 2022. If you’re interested in the full root cause analysis for CVE-2022-22620, we’ve published it here.

googleprojectzero EN 2022 0-day Safari CVE-2022-22620 Apple
Zero Day Initiative — CVE-2022-23088: Exploiting a Heap Overflow in the FreeBSD Wi-Fi Stack https://www.zerodayinitiative.com/blog/2022/6/15/cve-2022-23088-exploiting-a-heap-overflow-in-the-freebsd-wi-fi-stack
21/06/2022 08:50:54
QRCode
archive.org
thumbnail

In April of this year, FreeBSD patched a 13-year-old heap overflow in the Wi-Fi stack that could allow network-adjacent attackers to execute arbitrary code on affected installations of FreeBSD Kernel. This bug was originally reported to the ZDI program by a researcher known as m00nbsd and patched in

zerodayinitiative EN 2022 CVE-2022-23088 HeapOverflow FreeBSD Wi-Fi
BRATA is evolving into an Advanced Persistent Threat https://www.cleafy.com/cleafy-labs/brata-is-evolving-into-an-advanced-persistent-threat?s=09
20/06/2022 08:49:35
QRCode
archive.org
thumbnail

Here we go with another episode about our (not so) old friend, BRATA. In almost one year, threat actors (TAs) have further improved the capabilities of this malware. In our previous blog post [1] we defined three main BRATA variants, which appeared during two different waves detected by our telemetries at the very end of 2021. However, during the last months we have observed a change in the attack pattern commonly used.

cleafy 2022 EN malware BRATA APT phishing analysis IOCs banker
What It Means that the U.S. Is Conducting Offensive Cyber Operations Against Russia https://zetter.substack.com/p/what-it-means-that-the-us-is-conducting
18/06/2022 10:38:58
QRCode
archive.org
thumbnail

Gen. Paul Nakasone's remarks this month about offensive operations against Russia caused a stir. But have people misinterpreted his words?

Zetter newsletter EN 2022 cyberoperations definition Nakasone offensive TallinManual Russia US cyberwarfare cyberwar
Phishing tactics: how a threat actor stole 1M credentials in 4 months https://pixmsecurity.com/blog/blog/phishing-tactics-how-a-threat-actor-stole-1m-credentials-in-4-months/
17/06/2022 10:50:59
QRCode
archive.org

It is rare that the identities of participants and ringleaders in criminal phishing schemes are uncovered. But in many cases, when untangling the web of a cyber criminal group (particularly with financially motivated e-crime actors), there are enough OSINT breadcrumbs left behind by a threat actor, on forums, in code, or elsewhere, to point investigators in the right direction.

pixmsecurity 2022 EN Phishing tactics Anti-Phishing OSINT
Last Week on My Mac: Introducing XProtect Remediator, successor to MRT – The Eclectic Light Company https://eclecticlight.co/2022/06/12/last-week-on-my-mac-introducing-xprotect-remediator-successor-to-mrt/
17/06/2022 08:43:06
QRCode
archive.org
thumbnail

MRT’s days appear numbered. On 14 March this year, Apple released its successor – a new version of XProtect, which now does the lot.

eclecticlight 2022 EN mac XProtect Remediator macos security Apple
Analysis of dark web posts selling access to corporate networks https://securelist.com/initial-access-data-price-on-the-dark-web/106740/
17/06/2022 07:11:54
QRCode
archive.org
thumbnail

Money has been and remains the main motivator for cybercriminals. The most widespread techniques of monetizing cyberattacks include selling stolen databases, extortion (using ransomware) and carding. However, there is demand on the dark web not only for data obtained through an attack, but also for the data and services necessary to organize one (e.g., to perform specific steps of a multiphase attack)

securelist EN 2022 monetizing cyberattacks selling access darkweb
Telerik UI exploitation leads to cryptominer, Cobalt Strike infections https://news.sophos.com/en-us/2022/06/15/telerik-ui-exploitation-leads-to-cryptominer-cobalt-strike-infections/
17/06/2022 07:11:21
QRCode
archive.org
thumbnail

Attacker targets bugs in a popular web application graphical interface development tool.

sophos 2022 EN research POWERSHELL TELERIK XMRIG CVE-2017-11357 CVE-2019-18935 CVE-2017-11317 cobaltstrike cryptomaining
Password policies of most top websites fail to follow best practices https://passwordpolicies.cs.princeton.edu/
17/06/2022 07:07:02
QRCode
archive.org

We examined the password policies of 120 of the most popular English-language websites in the world.

princeton paper en 2022 password passwords policies websites bestpractices
Police Linked to Hacking Campaign to Frame Indian Activists https://www.wired.com/story/modified-elephant-planted-evidence-hacking-police/
16/06/2022 21:36:26
QRCode
archive.org
thumbnail

New details connect police in India to a plot to plant evidence on victims' computers that led to their arrest.

Wired en 2022 crime malware hacking India police spyware activists
Zimbra Email - Stealing Clear-Text Credentials via Memcache injection https://blog.sonarsource.com/zimbra-mail-stealing-clear-text-credentials-via-memcache-injection/
15/06/2022 18:18:08
QRCode
archive.org
thumbnail

We discovered flaws in Zimbra, an enterprise email solution, that allow attackers to steal credentials of users and gain access to their email accounts.

sonarsource EN 2022 Zimbra memcache Vulnerability email steal credentials
Ransomware Group Debuts Searchable Victim Data https://krebsonsecurity.com/2022/06/ransomware-group-debuts-searchable-victim-data/
15/06/2022 11:45:04
QRCode
archive.org

Cybercrime groups that specialize in stealing corporate data and demanding a ransom not to publish it have tried countless approaches to shaming their victims into paying. The latest innovation in ratcheting up the heat comes from the ALPHV/BlackCat ransomware group,…

krebsonsecurity Cybercrime EN 2022 ALPHV clearnet BlackCat ransomware publish
Cloudflare mitigates 26 million request per second DDoS attack https://blog.cloudflare.com/26m-rps-ddos/
15/06/2022 06:54:58
QRCode
archive.org

Last week, Cloudflare automatically detected and mitigated a 26 million request per second DDoS attack — the largest HTTPS DDoS attack on record.

cloudflare 2022 EN DDoS attack
A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys https://arstechnica.com/information-technology/2022/06/researchers-exploit-new-intel-and-amd-cpu-flaw-to-steal-encryption-keys/
15/06/2022 06:54:19
QRCode
archive.org
thumbnail

Hertzbleed attack targets power-conservation feature found on virtually all modern CPUs.

arstechnica 2022 EN Microprocessors Hertzbleed power-conservation AMD Intel DVFS x86 side-channel attack keys vulnerabilies
Linux Threat Hunting: 'Syslogk' a kernel rootkit found under development in the wild https://decoded.avast.io/davidalvarez/linux-threat-hunting-syslogk-a-kernel-rootkit-found-under-development-in-the-wild/
14/06/2022 09:44:10
QRCode
archive.org
thumbnail

Introduction Rootkits are dangerous pieces of malware. Once in place, they are usually really hard to detect. Their code is typically more challenging to write than other malware, so developers resort to code reuse from open source projects. As rootkits are very interesting to analyze, we are always looking out for these kinds of samples […]

avast EN 2022 Rootkit Linux Syslogk malware Adore-Ng
Vulnerability discovered in Apple M1 chip https://www.theregister.com/2022/06/10/apple_m1_pacman_flaw/
13/06/2022 19:17:10
QRCode
archive.org
thumbnail

MIT CSAIL boffins devise PACMAN attack to let existing exploits avoid pointer authentication

theregister EN 2022 M1 Apple PACMAN attache ARM chip Vulnerability
SeaFlower 藏海花 A backdoor targeting iOS web3 wallets https://objective-see.org/blog/blog_0x6F.html
13/06/2022 15:45:33
QRCode
archive.org
thumbnail

Confiant monitors 2.5+ billion ads per day via 110+ integrations in the advertising stack. This provides great visibility on malicious activity infiltrating the ad stack and the broader Internet. And that includes all the web3 malicious activity funneling thru it.

The variety and the range of our detection enable Confiant to detect unique malicious activity as soon as it surfaces.

SeaFlower is an example of this unique cluster of malicious activities targeting web3 wallet users that we will document in this blog post.

objective-see EN 2022 web3 iOS backdoor wallet SeaFlower
page 201 / 216
4898 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn