Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 82 / 214
4263 résultats taggé EN  ✕
Arctic Wolf Labs has observed Fog ransomware being deployed against US organizations in the education and recreation sectors. https://arcticwolf.com/resources/blog/lost-in-the-fog-a-new-ransomware-threat/
22/07/2024 22:49:16
QRCode
archive.org
thumbnail

On May 2, 2024, Arctic Wolf Labs began monitoring deployment of a new ransomware variant referred to as Fog. The ransomware activity was observed in several Arctic Wolf Incident Response cases, each exhibiting similar elements. All victim organizations were located in the United States, 80% of which were in the education sector and 20% in the recreation sector.

We are sharing details of this emerging variant to help organizations defend against this threat. Please note that we may add further detail to this article as we uncover additional information in our ongoing investigation.

arcticwolf EN 2024 Fog ransomware USA ransomware analysis
CrowdStrike shares tumble 13% on IT outage impact https://www.reuters.com/technology/crowdstrike-shares-set-extend-losses-outage-effects-linger-2024-07-22/?user_email=9e19aa6ed986d20195d4113ba5a6a3e709c18e0549688aa9b20d5f2e8d0dec05&lctg=6596a37f125992f7eb0b5ac9
22/07/2024 20:05:22
QRCode
archive.org

Shares of CrowdStrike plunged 13% on Monday, extending their loss-making streak, after Wall Street analysts downgraded the stock on concerns over the financial fallout from a global cyber outage last week.

reuters EN 2024 CrowdStrike shares loss stock incident
New Play Ransomware Linux Variant Targets ESXi Shows Ties With Prolific Puma | Trend Micro (US) https://www.trendmicro.com/en_us/research/24/g/new-play-ransomware-linux-variant-targets-esxi-shows-ties-with-p.html?ref=news.risky.biz
22/07/2024 15:12:35
QRCode
archive.org
thumbnail

Trend Micro threat hunters discovered that the Play ransomware group has been deploying a new Linux variant that targets ESXi environments.

trendmicro research EN 2024 IoCs Play ransomware group ESXi
dirDevil: Hiding Code and Content Within Folder… https://trustedsec.com/blog/dirdevil-hiding-code-and-content-within-folder-structures?ref=news.risky.biz
22/07/2024 15:06:54
QRCode
archive.org
thumbnail

You can hide data in directory structures, and it will be more or less invisible without knowing how to decode it. It won't even show up as taking up space on disk. However, its real-world applications may be limited because it is the code execution itself which is often the difficulty with AV/EDR evasion.

trustedsec EN 2024 Fileless Data Storage dirDevil Hiding evasion technique
Spanish Police Arrests NoName Hackers https://thecyberexpress.com/spanish-police-arrests-noname-attacks/amp/
22/07/2024 10:36:25
QRCode
archive.org
thumbnail

Spanish Police arrested three individuals on July 20, 2024, who are suspected of participating in a series of cyberattacks targeting critical infrastructure and government institutions in Spain and other NATO countries.

The detainees are believed to be affiliated with the hacktivist group NoName057(16), known for its pro-Russian ideology and launching DDoS attacks against entities supporting Ukraine in the ongoing conflict.

thecyberexpress EN 2024 NoName057(16) busted arrested Spain
Technical Details: Falcon Update for Windows Hosts https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/?ref=news.risky.biz
22/07/2024 10:33:55
QRCode
archive.org
thumbnail

On July 19, 2024 at 04:09 UTC, as part of ongoing operations, CrowdStrike released a sensor configuration update to Windows systems. Sensor configuration updates are an ongoing part of the protection mechanisms of the Falcon platform. This configuration update triggered a logic error resulting in a system crash and blue screen (BSOD) on impacted systems.

The sensor configuration update that caused the system crash was remediated on Friday, July 19, 2024 05:27 UTC.

This issue is not the result of or related to a cyberattack.

CrowdStrike EN 2024 incident issue
Helping our customers through the CrowdStrike outage https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/
22/07/2024 10:25:20
QRCode
archive.org

On July 18, CrowdStrike, an independent cybersecurity company, released a software update that began impacting IT systems globally. Although this was not a Microsoft incident, given it impacts our ecosystem, we want to provide an update on the steps we’ve taken with CrowdStrike and others to remediate and support our customers.

blogs.microsoft microsoft EN 2024 CrowdStrike incident statement
Trump shooter used Android phone from Samsung; cracked by Cellebrite in 40 minutes - 9to5Mac https://9to5mac.com/2024/07/18/trump-shooter-android-phone-cellebrite/
20/07/2024 08:51:43
QRCode
archive.org
thumbnail

Earlier this week, the FBI announced that it had accessed the locked phone of Thomas Matthew Crooks, the man who opened fire at a Trump rally last Saturday. A new report from Bloomberg today reveals more details about this process and the phone used by Crooks.

After Saturday’s Trump rally shooting, the FBI said on Sunday that it had been unsuccessful in unlocking Crooks’ phone. The phone was then sent to the FBI lab in Quanitco, Virginia, and on Tuesday the bureau confirmed that it had successfully unlocked the phone in question.

9to5mac EN 2024 Android Cellebrite Samsung cracked
Our Statement on Today's Outage https://www.crowdstrike.com/blog/our-statement-on-todays-outage/
19/07/2024 22:30:00
QRCode
archive.org
thumbnail

I want to sincerely apologize directly to all of you for today’s outage. All of CrowdStrike understands the gravity and impact of the situation. We quickly identified the issue and deployed a fix, allowing us to focus diligently on restoring customer systems as our highest priority.

The outage was caused by a defect found in a Falcon content update for Windows hosts. Mac and Linux hosts are not impacted. This was not a cyberattack.

crowdstrike EN 2024 incident outage statement
Teenage suspect in MGM Resorts hack arrested in Britain https://therecord.media/mgm-hack-teenager-arrest-britain
19/07/2024 22:12:33
QRCode
archive.org
thumbnail

The West Midlands Police said U.K. agencies — in coordination with the FBI — arrested a 17-year-old suspect in a breach that upended MGM's operations last year on the Las Vegas Strip.

therecord.media EN 2024 MGM UK teenager Scattered-Spider arrested
Leaked Docs Show What Phones Cellebrite Can (and Can’t) Unlock https://www.404media.co/email/075854f5-7a19-4eb2-8a0a-97479bf2d329/?ref=daily-stories-newsletter
19/07/2024 13:01:37
QRCode
archive.org
thumbnail

The leaked April 2024 documents, obtained and verified by 404 Media, show Cellebrite could not unlock a large chunk of modern iPhones.

404media EN 2024 Cellebrite leaked Unlock
Special Report: Massive Global IT Outages Triggered by Faulty CrowdStrike Update https://www.metacurity.com/special-report-massive-global-it-outages-triggered-by-faulty-crowdstrike-update/
19/07/2024 12:47:52
QRCode
archive.org
thumbnail

Cascading and catastrophic IT outages have hit thousands of organizations worldwide after CrowdStrike issued a faulty update in its Falcon Sensor product that caused Windows operating systems to crash.

metacurity EN 2024 CrowdStrike Outages catastrophic faulty-update
APT41 Has Arisen From the DUST https://cloud.google.com/blog/topics/threat-intelligence/apt41-arisen-from-dust?hl=en
19/07/2024 11:03:04
QRCode
archive.org
thumbnail
  • In collaboration with Google’s Threat Analysis Group (TAG), Mandiant has observed a sustained campaign by the advanced persistent threat group APT41 targeting and successfully compromising multiple organizations operating within the global shipping and logistics, media and entertainment, technology, and automotive sectors. The majority of organizations were operating in Italy, Spain, Taiwan, Thailand, Turkey, and the United Kingdom.
  • APT41 successfully infiltrated and maintained prolonged, unauthorized access to numerous victims' networks since 2023, enabling them to extract sensitive data over an extended period.
  • APT41 used a combination of ANTSWORD and BLUEBEAM web shells for the execution of DUSTPAN to execute BEACON backdoor for command-and-control communication. Later in the intrusion, APT41 leveraged DUSTTRAP, which would lead to hands-on keyboard activity. APT41 used publicly available tools SQLULDR2 for copying data from databases and PINEGROVE to exfiltrate data to Microsoft OneDrive
Mandiant EN 2024 APT41 Italy Spain Taiwan Thailand Turkey, UK dustpan BEACON DUSTTRAP
Banks, airlines, brokerage houses report widespread outages across the globe https://techcrunch.com/2024/07/19/banks-airlines-brokerage-houses-report-widespread-outages-across-the-globe/
19/07/2024 10:19:11
QRCode
archive.org
thumbnail

Businesses worldwide are experiencing outages, including Windows "blue screen of death" errors on their computers, in what has already become one of the

techcrunch EN 2024 CrowdStrike incident outage Windows
Office of Public Affairs | Two Foreign Nationals Plead Guilty to Participating in LockBit Ransomware Group https://www.justice.gov/opa/pr/two-foreign-nationals-plead-guilty-participating-lockbit-ransomware-group
19/07/2024 09:52:38
QRCode
archive.org

Two foreign nationals pleaded guilty today to participating in the LockBit ransomware group—at various times the most prolific ransomware variant in the world—and to deploying LockBit attacks against victims in the United States and worldwide.

justice.gov EN 2024 LockBit guilty justice US
New hacker group uses open-source tools to spy on entities in Asia-Pacific region https://therecord.media/tag-100-espionage-hacking-backdoors-asia-pacific
19/07/2024 09:32:38
QRCode
archive.org
thumbnail

An operation labeled TAG-100 by Insikt Group researchers deploys two types of backdoor malware — SparkRAT and Pantegana — that have only been spotted in limited ways previously.

therecord.media EN 2024 TAG-100 SparkRAT Pantegana spy open-source tools
Critical Cisco bug lets hackers add root users on SEG devices https://www.bleepingcomputer.com/news/security/critical-cisco-bug-lets-hackers-add-root-users-on-seg-devices/amp/
19/07/2024 09:06:31
QRCode
archive.org
thumbnail

Cisco has fixed a critical severity vulnerability that lets attackers add new users with root privileges and permanently crash Security Email Gateway (SEG) appliances using emails with malicious attachments.

Tracked as CVE-2024-20401, this arbitrary file write security flaw in the SEG content scanning and message filtering features is caused by an absolute path traversal weakness that allows replacing any file on the underlying operating system.

bleepingcomputer EN 2024 Code InfoSec Execution Path Gateway Denial DoS Remote Cisco RCE CVE-2024-20401 SEG
Trello Data Breach: Hacker Dumps Personal Info of Millions of Users https://hackread.com/trello-data-breach-hacker-dumps-users-personal-info/
18/07/2024 23:39:02
QRCode
archive.org
thumbnail

Trello Data Breach: Trello, a project management tool developed by Atlassian, has experienced a data breach, exposing sensitive user information

hackread EN 2024 Trello Data-Breach
INTERPOL operation strikes major blow against West African financial crime https://www.interpol.int/en/News-and-Events/News/2024/INTERPOL-operation-strikes-major-blow-against-West-African-financial-crime
18/07/2024 23:37:50
QRCode
archive.org
thumbnail

Police seize millions in illegal assets, including cryptocurrencies and luxury items

interpol EN 2024 West-African financial crime busted
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI https://www.sentinelone.com/labs/nullbulge-threat-actor-masquerades-as-hacktivist-group-rebelling-against-ai/
18/07/2024 23:35:48
QRCode
archive.org
thumbnail

Actors are masquerading as hacktivists targeting AI-centric communities with commodity malware and customized LockBit payloads.

sentinelone EN 2024 NullBulge threat-actor hacktivists fake malware LockBit
page 82 / 214
4872 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn