Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 201 / 215
4283 résultats taggé EN  ✕
People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices https://www.cisa.gov/uscert/ncas/alerts/aa22-158a
09/06/2022 09:04:44
QRCode
archive.org

Best Practices • Apply patches as soon as possible • Disable unnecessary ports and protocols • Replace end-of-life infrastructure • Implement a centralized patch management system

CISA EN 2022 Advisory uscert csirt cert China Alert state-sponsored exploited PRC
EXCLUSIVE: U.S. Government Ordered Travel Companies To Spy On Russian Hacker For Years And Report His Whereabouts Every Week https://www.forbes.com/sites/thomasbrewster/2022/06/08/exclusive-us-government-ordered-travel-companies-to-spy-on-russian-hacker-for-years-and-report-his-whereabouts-every-week/
09/06/2022 08:32:31
QRCode
archive.org
thumbnail

Critics say the government isn’t doing enough to inform the public about such secretive surveillance.

forbes EN 2022 Sabre Travelport U.S. Forbes Russian Aleksei-Burkov hacker Amadeus ACLU privacy
Microsoft Diagnostic Tool "DogWalk" Package Path Traversal Gets Free Micropatches (0day/WontFix) https://blog.0patch.com/2022/06/microsoft-diagnostic-tools-dogwalk.html
09/06/2022 08:29:27
QRCode
archive.org
thumbnail

With the "Follina" / CVE-2022-30190 0day still hot, i.e., still waiting for an official fix while apparently already getting exploited by nation-backed attackers, another related unfixed vulnerability in Microsoft's Diagnostic Tool (MSDT) bubbled to the surface.

In January 2020, security researcher Imre Rad published an article titled "The trouble with Microsoft’s Troubleshooters," describing a method for having a malicious executable file being saved to user's Startup folder, where it would subsequently get executed upon user's next login. What the user has to do for this to happen is open a "diagcab" file...

0patch EN 2022 Follina diagcab CVE-2022-30190 0-day 0day Diagnostic research
DOJ, FBI shut down marketplace for stolen Social Security numbers - The Record by Recorded Future https://therecord.media/doj-fbi-shut-down-marketplace-for-stolen-social-security-numbers/
08/06/2022 15:16:23
QRCode
archive.org
thumbnail

The Justice Department, IRS and FBI seized and shut down a popular marketplace used by cybercriminals to buy stolen Social Security numbers and other sensitive personal information.

The SSNDOB Marketplace – which the DOJ said generated more than $19 million in sales revenue – was shut down in coordination with law enforcement agencies in Cyprus and Latvia.

Seizure orders were executed against several domains associated with SSNDOB including ssndob.ws, ssndob.vip, ssndob.club, and blackjob.biz.

therecord EN 2022 marketplace SSNDOB FBI IRS shutdown Seizure
Russian Cyberattack Hits Wales-Ukraine Football Broadcast https://www.databreachtoday.eu/russian-cyberattack-hits-wales-ukraine-football-broadcast-a-19228
08/06/2022 10:09:10
QRCode
archive.org
thumbnail

The broadcast of the Football World Cup 2022 qualifier game between Wales and Ukraine on Sunday was interrupted in Ukraine by a cyberattack that targeted OLL.TV...

databreachtoday EN 2022 Russia-Ukraine-war Cyberattack Ukraine Russia OLL.TV Wales Football-Broadcast Telecommunication Misinformation Propaganda
SVCReady: A New Loader Gets Ready https://threatresearch.ext.hp.com/svcready-a-new-loader-reveals-itself/
07/06/2022 14:48:46
QRCode
archive.org
thumbnail

Don’t let cyber threats get the best of you. Read our post, SVCReady: A New Loader Gets Ready, to learn more about cyber threats and cyber security.

threatresearch EN 2022 SVCReady Loader Windows malware VBA Macro research
Liveness tests used by banks to verify ID are ‘extremely vulnerable’ to deepfake attacks https://www.theverge.com/2022/5/18/23092964/deepfake-attack-facial-recognition-liveness-test-banks-sensity-report
07/06/2022 10:56:09
QRCode
archive.org
thumbnail

Deepfakes will make financial fraud easier.

theverge 2022 EN deepfake attacks
Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
07/06/2022 10:49:00
QRCode
archive.org

On Monday May 30, 2022, Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (MSDT) in Windows vulnerability.

Guidance CVE-2022-30190 mitigation Workarounds Vulnerability Microsoft EN 2022 Follina
Smartphones Blur the Line Between Civilian and Combatant https://www.wired.com/story/smartphones-ukraine-civilian-combatant/
06/06/2022 16:47:07
QRCode
archive.org
thumbnail

In Ukraine, civilians are valiantly assisting the army via apps—and challenging a tenet of international law in the process.

wired EN wireless 2022 ukraine russia law war Russia-Ukraine-war Smartphones Civilian Combatant war-app app
TrustPid is another worrying, imperfect attempt to replace tracking cookies https://blog.malwarebytes.com/privacy-2/2022/06/trustpid-is-another-worrying-imperfect-attempt-to-replace-tracking-cookies/
06/06/2022 10:42:50
QRCode
archive.org
thumbnail

German ISPs are working on the introduction of TrustPid. A supercookie that is intended to replace tracking cookies.

malwarebytes EN 2022 TrustPid supercookie privacy ans Germany Vodafone
Horde Webmail - Remote Code Execution via Email https://blog.sonarsource.com/horde-webmail-rce-via-email/
05/06/2022 11:49:22
QRCode
archive.org
thumbnail

We discovered vulnerabilities in Horde Webmail that allow an attacker to execute arbitrary code on Horde instances by having a victim open an email

sonarsource EN 2022 Horde Webmail RCE CVE-2022-30287
Analysis and Attribution of the Eternity Ransomware: Timeline and Emergence of the Eternity Group https://cloudsek.com/analysis-and-attribution-of-the-eternity-ransomware-timeline-and-emergence-of-the-eternity-group/
05/06/2022 11:43:12
QRCode
archive.org
thumbnail

XVigil discovered a financially motivated threat actor group, dubbed Eternity group, actively operating on the internet, selling worms, stealers, DDoS tools, and ransomware builders.

cloudsek 2022 en ransomware Eternity group research selling worms stealers Timeline
Anonymous Hacktivists Leak 1TB of Top Russian Law Firm Data https://www.hackread.com/anonymous-hacktivists-leak-1tb-russia-law-firm-data/
05/06/2022 10:11:42
QRCode
archive.org
thumbnail

Anonymous has struck Russia again by leaking 1TB of data from a leading Russian law firm identified as Rustam Kurmaev and Partners (RKP Law).

hackread Anonymous en 2022 Russia-Ukraine-war Kumaev leak RKP Russia Data
Put an io_uring on it: Exploiting the Linux Kernel - Blog | https://www.graplsecurity.com/post/iou-ring-exploiting-the-linux-kernel
04/06/2022 17:36:28
QRCode
archive.org

At Grapl we believe that in order to build the best defensive system we need to deeply understand attacker behaviors. As part of that goal we're investing in offensive security research. Keep up with our blog for new research on high risk vulnerabilities, exploitation, and advanced threat tactics.

Graplsecurity en 2022 0-day Linux kernel exploit redteam research
Deadly secret: Electronic warfare shapes Russia-Ukraine war https://apnews.com/article/russia-ukraine-kyiv-technology-90d760f01105b9aaf1886427dbfba917
04/06/2022 17:27:44
QRCode
archive.org
thumbnail

KYIV, Ukraine (AP) — On Ukraine’s battlefields , the simple act of powering up a cellphone can beckon a rain of deathly skyfall. Artillery radar and remote controls for unmanned aerial vehicles may also invite fiery shrapnel showers.

Apnews Russia-Ukraine-war Electronic-warfare electronic warfare en 2022
Zero-Day Exploitation of Atlassian Confluence https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/
03/06/2022 09:53:27
QRCode
archive.org
thumbnail

Over the Memorial Day weekend in the United States, Volexity conducted an incident response investigation involving two Internet-facing web servers belonging to one of its customers that were running Atlassian Confluence Server software. The investigation began after suspicious activity was detected on the hosts, which included JSP webshells being written to disk

volexity EN 2022 Zero-Day Exploitation Atlassian Confluence CVE-2022-26134
Zoom Zero Day: 4+ Million Webcams & maybe an RCE? Just get them to visit your website! https://infosecwriteups.com/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5
03/06/2022 08:54:50
QRCode
archive.org

A vulnerability in the Mac Zoom Client allows any malicious website to enable your camera without your permission. The flaw potentially exposes up to 750,000 companies around the world that use Zoom to conduct day-to-day business.

infosecwriteups EN 2019 Zoom macos Apple malicious CVE-2019–13449 CVE-2019–13450
Apple has pushed a silent Mac update to remove hidden Zoom web server https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/
03/06/2022 08:52:49
QRCode
archive.org
thumbnail

Apple has released a silent update for Mac users removing a vulnerable component in Zoom, the popular video conferencing app, which allowed websites to automatically add a user to a video call without their permission. The Cupertino, Calif.-based tech giant told TechCrunch that the update — now released — removes the hidden web server, which […]

techcrunch 2019 macos Zoom privacy apple EN patch silent update hidden CVE-2019–13449
Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks https://www.shadowserver.org/news/over-18-8-million-ips-vulnerable-to-middlebox-tcp-reflection-ddos-attacks/
02/06/2022 11:08:35
QRCode
archive.org

We recently began scanning for middlebox devices that are vulnerable to Middlebox TCP reflection, which can be abused for DDoS amplification attacks.  Our results are now shared daily, filtered for your network or constituency in the new Vulnerable DDoS Middlebox report. We uncover over 18,800,000 IPv4 addresses responding to our Middlebox probes. In some cases the amplification rates can exceed 10,000!

shadowserver 2022 EN DDoS Vulnerable Middlebox attacks internet monitoring
Over 3.6 million exposed MySQL servers on IPv4 and IPv6 https://www.shadowserver.org/news/over-3-6m-exposed-mysql-servers-on-ipv4-and-ipv6/
02/06/2022 11:06:52
QRCode
archive.org

We have recently began scanning for  accessible MySQL server instances on port 3306/TCP.  These are instances that respond to our MySQL connection request with a Server Greeting. Surprisingly to us, we found around 2.3M IPv4 addresses responding with such a greeting to our queries. Even more surprisingly, we found over 1.3M IPv6 devices responding as well (though mostly associated with a single AS). IPv4 and IPv6 scans together uncover 3.6M accessible MySQL servers worldwide.

shadowserver EN 2022 exposed MySQL accessible internet monitoring
page 201 / 215
4893 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn