Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 203 / 216
4310 résultats taggé E*N  ✕
Zoom Zero Day: 4+ Million Webcams & maybe an RCE? Just get them to visit your website! https://infosecwriteups.com/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5
03/06/2022 08:54:50
QRCode
archive.org

A vulnerability in the Mac Zoom Client allows any malicious website to enable your camera without your permission. The flaw potentially exposes up to 750,000 companies around the world that use Zoom to conduct day-to-day business.

infosecwriteups EN 2019 Zoom macos Apple malicious CVE-2019–13449 CVE-2019–13450
Apple has pushed a silent Mac update to remove hidden Zoom web server https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/
03/06/2022 08:52:49
QRCode
archive.org
thumbnail

Apple has released a silent update for Mac users removing a vulnerable component in Zoom, the popular video conferencing app, which allowed websites to automatically add a user to a video call without their permission. The Cupertino, Calif.-based tech giant told TechCrunch that the update — now released — removes the hidden web server, which […]

techcrunch 2019 macos Zoom privacy apple EN patch silent update hidden CVE-2019–13449
Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks https://www.shadowserver.org/news/over-18-8-million-ips-vulnerable-to-middlebox-tcp-reflection-ddos-attacks/
02/06/2022 11:08:35
QRCode
archive.org

We recently began scanning for middlebox devices that are vulnerable to Middlebox TCP reflection, which can be abused for DDoS amplification attacks.  Our results are now shared daily, filtered for your network or constituency in the new Vulnerable DDoS Middlebox report. We uncover over 18,800,000 IPv4 addresses responding to our Middlebox probes. In some cases the amplification rates can exceed 10,000!

shadowserver 2022 EN DDoS Vulnerable Middlebox attacks internet monitoring
Over 3.6 million exposed MySQL servers on IPv4 and IPv6 https://www.shadowserver.org/news/over-3-6m-exposed-mysql-servers-on-ipv4-and-ipv6/
02/06/2022 11:06:52
QRCode
archive.org

We have recently began scanning for  accessible MySQL server instances on port 3306/TCP.  These are instances that respond to our MySQL connection request with a Server Greeting. Surprisingly to us, we found around 2.3M IPv4 addresses responding with such a greeting to our queries. Even more surprisingly, we found over 1.3M IPv6 devices responding as well (though mostly associated with a single AS). IPv4 and IPv6 scans together uncover 3.6M accessible MySQL servers worldwide.

shadowserver EN 2022 exposed MySQL accessible internet monitoring
US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command https://news.sky.com/story/us-military-hackers-conducting-offensive-operations-in-support-of-ukraine-says-head-of-cyber-command-12625139
02/06/2022 11:02:44
QRCode
archive.org
thumbnail

In an exclusive interview with Sky News, General Paul Nakasone confirmed for the first time that the US had "conducted a series of operations" in response to Russia's invasion of Ukraine.

skycom 2022 EN offensive operations cyberoperations cyberwar offensive-operations US russia-ukraine-war
Android FluBot enters Switzerland – SWITCH Security-Blog https://securityblog.switch.ch/2021/06/19/android-flubot-enters-switzerland/
02/06/2022 10:43:14
QRCode
archive.org
thumbnail

FluBot is a new Android malware first discovered in December 2020. During the first few months, FluBot has been active in Spain, Hungary and Poland. Since then, the development of the malware advan…

FluBot switchCH EN 2022 malware Android
Takedown of SMS-based FluBot spyware infecting Android phones https://www.europol.europa.eu/media-press/newsroom/news/takedown-of-sms-based-flubot-spyware-infecting-android-phones
02/06/2022 10:09:07
QRCode
archive.org
thumbnail

This technical achievement follows a complex investigation involving law enforcement authorities of Australia, Belgium, Finland, Hungary, Ireland, Spain, Sweden, Switzerland, the Netherlands and the United States, with the coordination of international activity carried out by Europol’s European Cybercrime Centre (EC3).  The investigation is ongoing to identify the individuals behind this global malware campaign.  Here is how FluBot worked  First spotted...

FluBot europol Takedown SMS-based Android EN 2022 spyware
XLoader Botnet: Find Me If You Can https://research.checkpoint.com/2022/xloader-botnet-find-me-if-you-can/
01/06/2022 22:06:59
QRCode
archive.org
thumbnail

In July 2021, CPR released a series of three publications covering different aspects of how the Formbook and XLoader malware families function. We described how XLoader emerged in the Darknet community to fill the empty niche after Formbook sales were abruptly stopped by its author. We did a deep technical analysis followed by a description of XLoader for macOS along with common points and differences in how both malware families conceal the heart of the whole operation, the Command-and-Control (C&C) infrastructure. However, the world does not stand still, and this applies to the malware cyber-world as well.

checkpoint EN 2022 XLoader malware Research
ICO fines facial recognition database company Clearview AI Inc more than £7.5m and orders UK data to be deleted https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2022/05/ico-fines-facial-recognition-database-company-clearview-ai-inc/
30/05/2022 11:39:35
QRCode
archive.org
thumbnail

The Information Commissioner’s Office (ICO) has fined Clearview AI Inc £7,552,800 for using images of people in the UK, and elsewhere, that were collected from the web and social media to create a global online database that could be used for facial recognition.

The ICO has also issued an enforcement notice, ordering the company to stop obtaining and using the personal data of UK residents that is publicly available on the internet, and to delete the data of UK residents from its systems.

ico EN 2022 UK Clearview fines facial-recognition privacy
Follina — a Microsoft Office code execution vulnerability https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e
30/05/2022 11:33:04
QRCode
archive.org

Two days ago, Nao_sec identified an odd looking Word document in the wild, uploaded from an IP address in Belarus...

doublepulsar EN 2022 Office vulnerability msdt.exe PowerShell Follina
Ex-NSA Chief: 'We Kill People Based on Metadata' http://abcnews.go.com/blogs/headlines/2014/05/ex-nsa-chief-we-kill-people-based-on-metadata
29/05/2022 10:47:05
QRCode
archive.org

The U.S. government "kill[s] people based on metadata," but it doesn't do that with the trove of information collected on American communications, according to former head of the National Security Agency Gen. Michael Hayden.

ABCnews EN 2014 Metadata NSA Military kill
Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior https://www.nisos.com/blog/fronton-botnet-report/
28/05/2022 22:41:57
QRCode
archive.org
thumbnail

May 2022 Investigative Report Release: Nisos analysts determined that Fronton is a system developed for coordinated inauthentic behavior on a massive scale. Read more.
document

Nisos EN 2022 botnet report fronton
Gimmick MacOS Malware Spreads Through Customized Files, Enables MacOS CodeSign Bypass - CloudSEK https://cloudsek.com/threatintelligence/gimmick-macos-malware-spreads-through-customized-files-enables-macos-codesign-bypass/
27/05/2022 11:02:15
QRCode
archive.org
thumbnail

We discovered that Gimmick MacOS malware communicates only through their C2 server hosted on Google Drive. The malware was discovered in the first week of May and it has been actively targeting macOS devices

Cloudsek EN 2022 malware macOS Gimmick C2
New Linux-Based Ransomware Cheerscrypt Targets ESXi Devices https://www.trendmicro.com/en_us/research/22/e/new-linux-based-ransomware-cheerscrypt-targets-exsi-devices.html
27/05/2022 10:59:32
QRCode
archive.org
thumbnail

Trend Micro Research detected “Cheerscrypt”, a new Linux-based ransomware variant that compromises ESXi servers. We discuss our initial findings in this report.

Trendmicro EN 2022 endpoints ransomware research ESXi Linux cheerscrypt
Large-scale Analysis of DNS-based Tracking Evasion - broad data leaks included? http://blog.lukaszolejnik.com/large-scale-analysis-of-dns-based-tracking-evasion-broad-data-leaks-included/
27/05/2022 10:55:08
QRCode
archive.org
thumbnail

User tracking technologies are ubiquitous on the web. In recent times web browsers try to fight abuses. This led to an arms race where new tracking and anti-tracking measures are being developed. The use of one of such evasion techniques, the CNAME cloaking technique is recently quickly gaining popularity. Our evidence indicates that the use of the CNAME scheme threatens web security and privacy systematically and in general

lukaszolejnik EN 2022 research privacy web-browser web w3c consent data-breach gdpr dns cname cloacking
Exclusive: Russian hackers are linked to new Brexit leak website, Google says https://www.reuters.com/technology/exclusive-russian-hackers-are-linked-new-brexit-leak-website-google-says-2022-05-25/
26/05/2022 18:22:05
QRCode
archive.org
thumbnail

A new website that published leaked emails from several leading proponents of Britain's exit from the European Union is tied to Russian hackers, according to a Google cybersecurity official and the former head of UK foreign intelligence.

Reuters EN 2022 Brexit exclusive russian Google UK Russia EU leaks intelligence
Anonymous Declares Cyber War Against Pro-Russia Hacker Group Killnet https://www.hackread.com/anonymous-cyber-warfare-pro-russia-hacker-group-killnet/
26/05/2022 16:49:51
QRCode
archive.org
thumbnail

The Pro-Russia Hacker Group Killnet recently targeted European institutions, while Anonymous hackers are already claiming to have leaked its data.

hackread EN 2022 Anonymous russia-ukraine-war Pro-Russia Killnet
New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message https://thehackernews.com/2022/05/new-zoom-flaws-could-let-attackers-hack.html
25/05/2022 08:13:54
QRCode
archive.org

Popular video conferencing service Zoom has resolved as many as four security vulnerabilities, which could be exploited to compromise another user over chat by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages and execute malicious code.

thehackernews EN 2022 XMPP Zoom CVE-2022-22784 CVE-2022-22785 CVE-2022-22786 CVE-2022-22787
PyPI package 'ctx' and PHP library 'phpass' compromised to steal environment variables https://blog.sonatype.com/pypi-package-ctx-compromised-are-you-at-risk
25/05/2022 06:59:04
QRCode
archive.org
thumbnail

This week, immensely popular PyPI package 'ctx' has been compromised and altered to steal environment variables from its users. Additionally, a forked PHP project 'phpass' also suffered a repo-hijacking attack with the project tained with identical malicious payload.

PyPI ctx PHP supplychain attack sonatype EN 2022 exfiltration steal Supply-chain-security
Remote Code Execution on Western Digital PR4100 NAS (CVE-2022-23121) https://research.nccgroup.com/2022/03/24/remote-code-execution-on-western-digital-pr4100-nas-cve-2022-23121/
24/05/2022 08:22:41
QRCode
archive.org
thumbnail

This blog post describes an unchecked return value vulnerability found and exploited in September 2021 by Alex Plaskett, Cedric Halbronn and Aaron Adams working at the Exploit Development Group (EDG) of NCC Group. We successfully exploited it at Pwn2Own 2021 competition in November 2021 when targeting the Western Digital PR4100.

CVE-2022-23121 nccgroup EN 2022 Netatalk WesternDigital vulnerability AppleDouble
page 203 / 216
4898 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn