Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 51 / 213
4259 résultats taggé EN  ✕
Google Calendar Notifications Bypassing Email Security Policies https://blog.checkpoint.com/securing-user-and-access/google-calendar-notifications-bypassing-email-security-policies/
20/12/2024 09:23:11
QRCode
archive.org
thumbnail

Google Calendar is a tool for organizing schedules and managing time, designed to assist individuals and businesses in planning their days efficiently.

checkpoint EN 2024 Google Calendar Notifications phishing bypass
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? • KELA Cyber Threat Intelligence https://www.kelacyber.com/blog/three-months-after-the-storm-did-cybercriminals-move-to-telegram-alternatives/
20/12/2024 09:19:49
QRCode
archive.org
thumbnail

Introduction Telegram, as previously reported by KELA, is a popular and legitimate messaging platform that has evolved in the past few years into a major platform for cybercriminal activities. Its lack of strict content moderation has made the platform cybercriminals’ playground. They use the platform for distribution of stolen data and hacking tools, publicizing their […]

kelacyber EN 2024 Telegram analysis KELA platform cybercriminals
Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces – Sophos News https://news.sophos.com/en-us/2024/12/19/phishing-platform-rockstar-2fa-trips-and-flowerstorm-picks-up-the-pieces/
20/12/2024 09:18:33
QRCode
archive.org
thumbnail

A sudden disruption of a major phishing-as-a-service provider leads to the rise of another…that looks very familiar 

sophos EN 2024 research analysis phishing-as-a-service Rockstar FlowerStorm
Hacker Leaks Cisco Data https://www.securityweek.com/hacker-leaks-cisco-data/
20/12/2024 09:16:06
QRCode
archive.org

IntelBroker has leaked 2.9 Gb of data stolen recently from a Cisco DevHub instance, but claims it’s only a fraction of the total.

securityweek EN 2024 Cisco DevHub data-leak
Supply Chain Attack on Rspack npm Packages Injects Cryptojac... https://socket.dev/blog/rspack-supply-chain-attack
20/12/2024 09:12:54
QRCode
archive.org
thumbnail

A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.

socket.dev EN 2024 Supply-Chain-Attack Rspack malware npm
DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7 https://www.404media.co/dhs-says-china-russia-iran-and-israel-are-spying-on-people-in-us-with-ss7/
20/12/2024 09:11:28
QRCode
archive.org
thumbnail

The Department of Homeland Security knows which countries SS7 attacks are primarily originating from. Others include countries in Europe, Africa, and the Middle East.

404media EN 2024 SS7 China Russia Iran Israel spy US attacks telco
China’s Propaganda Expansion: Inside the Rise of International Communication Centers (ICCs) https://www.recordedfuture.com/research/breaking-the-circle-chinese-communist-party-propaganda
20/12/2024 08:59:46
QRCode
archive.org
thumbnail

China's ICCs reshape global propaganda via targeted messaging, social media, and influence networks to amplify the Communist Party's voice globally.

recordedfuture EN analysis 2024 China Propaganda International Communication Centers ICCs
Weibo is losing influencers over legal display name rule - Rest of World https://restofworld.org/2023/weibo-legal-display-name-influencers/
20/12/2024 08:57:00
QRCode
archive.org
thumbnail

Chinese social media platforms like WeChat, Douyin, Zhihu, Xiaohongshu, and Weibo now required popular users’ legal names to be made visible to the public.

restofworld EN 2024 WeChat Douyin Zhihu China influencer Xiaohongshu Weibo legal name low
How to Lose a Fortune with Just One Bad Click https://krebsonsecurity.com/2024/12/how-to-lose-a-fortune-with-just-one-bad-click/
19/12/2024 16:26:57
QRCode
archive.org

Adam Griffin is still in disbelief over how quickly he was robbed of nearly $500,000 in cryptocurrencies. A scammer called using a real Google phone number to warn his Gmail account was being hacked, sent email security alerts directly from…

krebsonsecurity EN 2024 robbed clicked fake google gnail crypto alerts
Commission opens formal proceedings against TikTok under DSA https://ec.europa.eu/commission/presscorner/detail/en/ip_24_6487
19/12/2024 09:37:36
QRCode
archive.org
thumbnail

Today, the Commission has opened formal proceedings against TikTok for a suspected breach of the DSA in relation to TikTok's obligation to properly assess and mitigate systemic risks linked to election integrity, notably in the context of the recent Romanian presidential elections on 24 November.

ec.europa.eu EN 2024 EU TikTok formal proceedings DSA obligation Romania
The Wiretap: Kamala Harris’ Campaign Staff Suspected iPhones Had Been Hacked. Apple Declined To Give Them The Help They Wanted. https://www.forbes.com/sites/thomasbrewster/2024/12/17/the-wiretap-kamala-harris-campaign-suspected-its---iphones-had-been-hacked-apple-declined-to-help/
18/12/2024 16:22:28
QRCode
archive.org
thumbnail

Apple rejects requests for a copy of a Harris campaign staffer's iPhone.

forbes EN 2024 Apple Kamala-Harris iPhone hack iVerify spyware Declined
ConnectOnCall.com, LLC Provides Notice of Data Security Incident https://www.businesswire.com/news/home/20241211221827/en/ConnectOnCall.com-LLC-Provides-Notice-of-Data-Security-Incident
18/12/2024 16:21:38
QRCode
archive.org

ConnectOnCall.com, LLC provides a product (“ConnectOnCall”) that healthcare providers purchase to improve their after-hours call process and enhance communications between the providers and their patients. ConnectOnCall discovered an incident that involved personal information related to communications between patients and healthcare providers that use ConnectOnCall.

On May 12, 2024, ConnectOnCall learned of an issue impacting ConnectOnCall and immediately began an investigation and took steps to secure the product and ensure the overall security of its environment. ConnectOnCall’s investigation revealed that between February 16, 2024, and May 12, 2024, an unknown third party had access to ConnectOnCall and certain data within the application, including certain information in provider-patient communications.

businesswire EN 2024 ConnectOnCall healthcare data-leak
Stop Calling Online Scams ‘Pig Butchering,’ Interpol Warns https://www.wired.com/story/interpol-pig-butchering-scams-rename/
18/12/2024 06:48:42
QRCode
archive.org
thumbnail

Experts say the catchall term for online fraud furthers harm against victims and could dissuade people from reporting attempts to bilk them out of their money.

wired en 2024 china crime hacks security cryptocurrency PigButchering name Interpol victim shaming
Meta fined $263M over 2018 security breach that affected ~3M EU Facebook users https://techcrunch.com/2024/12/17/meta-fined-263m-over-2018-security-breach-that-affected-3m-eu-users/
18/12/2024 06:47:31
QRCode
archive.org
thumbnail

Meta has been fined €251 million (around $263 million) in the European Union for a Facebook security breach that affected millions of users, which the

techcrunch EN 2024 Meta fine Ireland data-breach EU legal
“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6
16/12/2024 21:14:16
QRCode
archive.org

Guardio Labs tracked and analyzed a large-scale fake captcha campaign distributing a disastrous Lumma info-stealer malware that circumvents general security measures like Safe Browsing. Entirely reliant on a single ad network for propagation, this campaign showcases the core mechanisms of malvertising — delivering over 1 million daily “ad impressions” and causing thousands of daily victims to lose their accounts and money through a network of 3,000+ content sites funneling traffic. Our research dissects this campaign and provides insights into the malvertising industry’s infrastructure, tactics, and key players.

Through a detailed analysis of redirect chains, obfuscated scripts, and Traffic Distribution Systems (TDS) — in collaboration with our friends at Infoblox — we traced the campaign’s origins to Monetag, a part of ProepllerAds’ network previously tracked by Infoblox under the name “Vane Viper.” Further investigation reveals how threat actors leveraged services like BeMob ad-tracking to cloak their malicious intent, showcasing the fragmented accountability in the ad ecosystem. This lack of oversight leaves internet users vulnerable and enables malvertising campaigns to flourish at scale.

labs.guard.io EN 2024 LummaStealer ClickFix DeceptionAds Advertising
State of SonicWall Exposure: Firmware Decryption Unlocks… https://bishopfox.com/blog/state-sonicwall-exposure-firmware-decryption-unlocks-insights
16/12/2024 19:09:48
QRCode
archive.org
thumbnail

Discover Bishop Fox's survey on the current state of SonicWall appliances on the public internet.

Bishop-Fox bishopfox EN 2024 SonicWall Exposure analysis
Serbian authorities using spyware to hack activists and journalists https://www.amnesty.org/en/latest/news/2024/12/serbia-authorities-using-spyware-and-cellebrite-forensic-extraction-tools-to-hack-journalists-and-activists/
16/12/2024 19:02:54
QRCode
archive.org
thumbnail

Serbian authorities are using spyware and Cellebrite forensic extraction tools to hack journalists and activists in a surveillance campaign.

Amnesty EN 2024 NoviSpy Serbia Israel Cellebrite spyware spy journalists politicians
CVE-2024-55956 https://attackerkb.com/topics/geR0H8dgrE/cve-2024-55956/rapid7-analysis?referrer=notificationEmail
16/12/2024 15:06:58
QRCode
archive.org
thumbnail

In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerS…

attackerkb EN 2024 Rapid7 CVE-2024-55956 analysis cleo Harmony LexiCom
The CVE-2024-11053 Sunday shenanigans https://curl.se/mail/lib-2024-12/0022.html
16/12/2024 11:41:35
QRCode
archive.org

I just wanted to make you all aware of what happened over the weekend.

On Sunday afternoon, Harry Sintonenen made us aware that several security
related websites posted articles about the "CRITICAL curl security flaw".

We announced that as severity LOW earlier this week. How and why did this
massive severiy level bump happen?

curl.se EN 2024 not-critical CVE-2024-11053 severity LOW
https://www.forescout.com/blog/draytek-routers-exploited-in-massive-ransomware-campaign-analysis-and-recommendations/ https://www.forescout.com/blog/draytek-routers-exploited-in-massive-ransomware-campaign-analysis-and-recommendations/
16/12/2024 09:24:00
QRCode
archive.org
  • Our 2024 Dray:Break report revealed 14 new vulnerabilities in DrayTek devices
    *See our upcoming presentation at Black Hat Europe for more details
  • PRODAFT shared threat intelligence from 2023 on a ransomware campaign exploiting DrayTek devices
  • This is the first time this campaign is discussed publicly
  • Our analysis shows sophisticated attack workflows to deploy ransomware including possible:
    • Zero-day vulnerabilities
    • Credential harvesting and password cracking
      VPN and tunneling abuse
forescout en 2024 draytek ALPHV ransomware
page 51 / 213
4868 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn