Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 208 / 215
4286 résultats taggé EN  ✕
Fake sites stealing Steam credentials https://www.zscaler.com/blogs/security-research/fake-sites-stealing-steam-credentials
28/03/2022 14:19:53
QRCode
archive.org
thumbnail

Recently, the Zscaler ThreatLabZ team came across multiple fake Counter-Strike: Global Offensive (CS:GO) skin websites aimed at stealing Steam credentilsa.

Zscaler 2020 EN stealing BitB Steam Fake credentials
Chrome Releases: Stable Channel Update for Desktop https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_25.html?m=1
28/03/2022 12:46:45
QRCode
archive.org
thumbnail

High CVE-2022-1096: Type Confusion in V8. Reported by anonymous on 2022-03-23
We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.
Google is aware that an exploit for CVE-2022-1096 exists in the wild.

CVE-2022-1096 chrome update EN 2022
Behold, a password phishing site that can trick even savvy users https://arstechnica.com/information-technology/2022/03/behold-a-password-phishing-site-that-can-trick-even-savvy-users/
27/03/2022 21:13:38
QRCode
archive.org
thumbnail

Just when you thought you'd seen every phishing trick out there, BitB comes along.

Behold password arstechnica EN 2022 phishing BitB
Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal https://www.bbc.com/news/technology-60864283
25/03/2022 09:22:19
QRCode
archive.org
thumbnail

Police say they've arrested seven teenagers as part of their investigation into a hacking group.

Lapsus$ EN 2022 bbc Oxford teenagers
Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS https://www.volexity.com/blog/2022/03/22/storm-cloud-on-the-horizon-gimmick-malware-strikes-at-macos/
24/03/2022 09:04:44
QRCode
archive.org
thumbnail
GIMMICK macos EN 2022 StormCloud volexity China malware
A Closer Look at the LAPSUS$ Data Extortion Group https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/
24/03/2022 07:08:28
QRCode
archive.org

Microsoft and identity management platform Okta both this week disclosed breaches involving LAPSUS$, a relatively new cybercrime group that specializes in stealing data from big companies and threatening to publish it unless a ransom demand is paid. Here’s a closer look at LAPSUS$, and some of the low-tech but high-impact methods the group uses to gain access to targeted organizations.

krebsonsecurity EN 2022 Lapsus$ group Okta
Lapsus$: when kiddies play in the big league https://www.sekoia.io/en/lapsus-when-kiddies-play-in-the-big-league/
23/03/2022 18:05:52
QRCode
archive.org
thumbnail

You may not have missed all the noises recently caused by Lapsus$, a group that seems to specialize in extortion without necessarily leveraging ransomware.

At first glance, Lapsus$ check marks all elements that would make researchers put them in the low priority threats, especially considering their readiness to make dramas and OpSec failures. Except that the group has successfully managed to significantly enrich its victim list with high profile corporations, thus drawing all our attention.

In the following, we will describe the threat actor profile that was drawn by our investigations based either on OSINT, dark web or infrastructure analysis.

sekoia EN 2022 analysis Lapsus$ group
Cloudflare’s investigation of the January 2022 Okta compromise https://blog.cloudflare.com/cloudflare-investigation-of-the-january-2022-okta-compromise/
23/03/2022 15:18:52
QRCode
archive.org

Today, March 22, 2022 at 03:30 UTC we learnt of a compromise of Okta. We use Okta internally for employee identity as part of our authentication stack. We have investigated this compromise carefully and do not believe we have been compromised as a result. We do not use Okta for customer accounts; customers do not need to take any action unless they themselves use Okta.

cloudflare Okta EN 2022 compromise investigation
Updated Okta Statement on LAPSUS$ https://www.okta.com/blog/2022/03/updated-okta-statement-on-lapsus/
23/03/2022 10:54:33
QRCode
archive.org
thumbnail

This update was posted at 6:31 PM, Pacific Time.
As we shared earlier today, we are conducting a thorough investigation into the recent LAPSUS$ claims and any impact on our valued customers. The Okta service is fully operational, and there are no corrective actions our customers need to take.

Okta Statement LAPSUS$ EN 2022 investigation
DEV-0537 criminal actor targeting organizations for data exfiltration and destruction https://www.microsoft.com/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/
23/03/2022 10:22:59
QRCode
archive.org
thumbnail

The activity we have observed has been attributed to a threat group that Microsoft tracks as DEV-0537, also known as LAPSUS$. DEV-0537 is known for using a pure extortion and destruction model without deploying ransomware payloads.

microsoft EN 2022 LAPSUS$ DEV-0537 extortion research activity threat group
Anonymous Takes Anti-Putin Battle To Russian People With Printer Attack To Disrupt Kremlin's Propaganda https://www.ibtimes.com/anonymous-takes-anti-putin-battle-russian-people-printer-attack-disrupt-kremlins-3444590
22/03/2022 12:00:21
QRCode
archive.org
thumbnail

The latest is a printer hack, which allows the collective to send a message across the transcontinental country.

anonymous russia-ukraine-war hacking oprussia ibtimes printer cyberwar EN 2022
Lapsus$ hackers leak 37GB of Microsoft's alleged source code https://www.bleepingcomputer.com/news/microsoft/lapsus-hackers-leak-37gb-of-microsofts-alleged-source-code/
22/03/2022 11:10:44
QRCode
archive.org
thumbnail

The Lapsus$ hacking group claims to have leaked the source code for Bing, Cortana, and other projects stolen from Microsoft's internal Azure DevOps server.

Bing Cortana Extortion Lapsus$ Microsoft Source-Code EN 2022 leak
Activists are targeting Russians with open-source "protestware" https://www.technologyreview.com/2022/03/21/1047489/activists-are-targeting-russians-with-open-source-protestware/
21/03/2022 21:29:30
QRCode
archive.org
thumbnail

The volunteers who run open-source software projects are changing the code so that they display anti-war messages—or even wipe entire files.

technologyreview EN 2022 volunteers protestware sabotage Ukraine cyberwar
Ukraine warns of InvisiMole attacks tied to state-sponsored Russian hackers https://www.zdnet.com/article/ukraine-warns-of-invisimole-attacks-tied-to-state-sponsored-russian-hackers/
21/03/2022 21:02:35
QRCode
archive.org
thumbnail

InvisiMole has been collaborating with the Gamaredon APT for years.

InvisiMole APT EN 2022 Russia state-sponsored ukraine zdnet phishing cyberwar
Gas Is Too Expensive; Let’s Make It Cheap! https://securelist.com/expensive-gas/83542/
20/03/2022 00:08:33
QRCode
archive.org
thumbnail

A search online lead me to a discovery I didn’t think was possible nowadays. I realized almost immediately that critical security issues were probably involved. I found that out of the many tens of thousands of gas stations the company claimed to have installed their product in, 1,000 are remotely hackable.

Internet-of-Things securelist gas-station EN 2022 shodan IoT research hacking
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus | Ars Technica https://arstechnica.com/information-technology/2022/03/sabotage-code-added-to-popular-npm-package-wiped-files-in-russia-and-belarus/
20/03/2022 00:02:22
QRCode
archive.org
thumbnail

When code with millions of downloads nukes user files, bad things can happen.

Sabotage arstechnica EN 2022 NPM Russia cyberwar node-ipc package CVE-2022-23812
Popular NPM Package Updated to Wipe Russia, Belarus Systems to Protest Ukraine Invasion https://thehackernews.com/2022/03/popular-npm-package-updated-to-wipe.html
19/03/2022 23:54:09
QRCode
archive.org

In what's an act of deliberate sabotage, the developer behind the popular "node-ipc" NPM package shipped a new tampered version to condemn Russia's invasion of Ukraine, raising concerns about security in the open-source and the software supply chain.

thehackernews EN 2022 node-ipc developer cyberwar NPM supplychain sabotage CVE-2022-23812
PROPHET SPIDER Exploits Citrix ShareFile https://www.crowdstrike.com/blog/prophet-spider-exploits-citrix-sharefile/
16/03/2022 08:46:41
QRCode
archive.org
thumbnail

At the start of 2022, CrowdStrike Intelligence and CrowdStrike Services investigated an incident in which PROPHET SPIDER exploited CVE-2021-22941 — a remote code execution (RCE) vulnerability impacting Citrix ShareFile Storage Zones Controller — to compromise a Microsoft Internet Information Services (IIS) web server. The adversary exploited the vulnerability to deploy a webshell that enabled the downloading of additional tools. This incident highlights how PROPHET SPIDER continues to evolve their tradecraft while continuing to exploit known web-server vulnerabilities.

CrowdStrike PROPHETSPIDER EN 2022 CVE-2021-22941RCE webshell ShareFile vulnerability Citrix
Raccoon Stealer: “Trash panda” abuses Telegram https://decoded.avast.io/vladimirmartyanov/raccoon-stealer-trash-panda-abuses-telegram/
14/03/2022 00:34:57
QRCode
archive.org
thumbnail

We recently came across a stealer, called Raccoon Stealer, a name given to it by its author. Raccoon Stealer uses the Telegram infrastructure to store and update actual C&C addresses.  Raccoon Stealer is a password stealer capable of stealing not just passwords, but various types of data, including: Cookies, saved logins and forms data from […]

avast stealer EN 2022 RaccoonStealer Telegram research malware passwordstealer
Cyber Security Incident Pushes Ubisoft to Issue Internal Password Reset https://www.hackread.com/ubisoft-employee-passwordresets-cyber-security-incident/
12/03/2022 20:13:48
QRCode
archive.org
thumbnail

It is unclear what type of “Cyber Security Incident” Ubisoft suffered but on Telegram LAPSUS$ hacking group responded to the news with smirking face emoji suggesting their alleged involvement.

ubisoft en 2022 hackread LAPSUS$
page 208 / 215
4896 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn