Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 94 / 214
4263 résultats taggé EN  ✕
Pegasus in Rwanda: Sister of presidential candidate, high-ranking Rwandan politicians added to spyware list https://forbiddenstories.org/pegasus-in-rwanda-sister-of-presidential-candidate-high-ranking-rwandan-politicians-added-to-spyware-list/?ref=news.risky.biz
29/05/2024 08:58:28
QRCode
archive.org
thumbnail

A leaked list of phone numbers reveals how Rwandan President Paul Kagame’s regime used Pegasus spyware sought to track political opponents and members of his own party.

forbiddenstories EN 2024 Rwanda Pegasus spyware
PCTattletale leaks victims' screen recordings to entire Internet https://www.ericdaigle.ca/pctattletale-leaking-screen-captures/
28/05/2024 08:15:57
QRCode
archive.org

PCTattletale is a simple stalkerware app. Rather than the sophisticated monitoring of many similarly insecure competitors it simply asks for permission to record the targeted device (Android and Windows are supported) on infection. Afterward the observer can log in to an online portal and activate recording, at which point a screen capture is taken on the device and played on the target's browser.

ericdaigle EN 2024 PCTattletale analysis stalkerware screen recordings leak
Important Security Update – Enhance your VPN Security Posture! https://blog.checkpoint.com/security/enhance-your-vpn-security-posture?campaign=checkpoint&eid=guvrs&advisory=1
28/05/2024 08:12:11
QRCode
archive.org

Over the past few months, we have observed increased interest of malicious groups in leveraging remote-access VPN environments as an entry point and

checkpoint EN 2024 warning VPN remote-access local-accounts
Ransomware Group Claims Responsibility for Christie’s Hack https://www.nytimes.com/2024/05/27/arts/design/hackers-claim-christies-attack.html?unlocked_article_code=1.vE0._XLj.6wpoMCYnfgcv&smid=url-share
28/05/2024 07:54:03
QRCode
archive.org

The hacking group RansomHub is threatening to release “sensitive personal information” about the auction house’s clients.

nytimes EN 2024 Auction computer Christies RansomHub
Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling https://www.netskope.com/blog/phishing-with-cloudflare-workers-transparent-phishing-and-html-smuggling
27/05/2024 15:56:13
QRCode
archive.org
thumbnail

Netskope Threat Labs is tracking multiple phishing campaigns that abuse Cloudflare Workers. The campaigns are likely the work of different

netskope EN 2024 Cloudflare Workers HTML-Smuggling campaign
Cyber Signals: Inside the growing risk of gift card fraud https://www.microsoft.com/en-us/security/blog/2024/05/23/cyber-signals-inside-the-growing-risk-of-gift-card-fraud/
27/05/2024 13:35:11
QRCode
archive.org
thumbnail

In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a constant challenge. The latest edition of Cyber Signals dives deep into the world of Storm-0539, also known as Atlas Lion, shedding light on their sophisticated methods of gift and payment card theft.

microsoft EN 2024 gift-card fraud Storm-0539 payment card
Pwn2Own Toronto 2022 : A 9-year-old bug in MikroTik RouterOS https://devco.re/blog/2024/05/24/pwn2own-toronto-2022-a-9-year-old-bug-in-mikrotik-routeros-en/?ref=news.risky.biz
27/05/2024 13:21:43
QRCode
archive.org
thumbnail

DEVCORE research team found a 9-year-old WAN bug on RouterOS, the product of MikroTik. Combined with another bug of the Canon printer, DEVCORE becomes the first team ever to successfully complete an attack chain in the brand new SOHO Smashup category of Pwn2Own. And DEVCORE also won the title of Master of Pwn in Pwn2Own Toronto 2022.

devco.re EN 2024 CVE-2023-32154 Pwn2Own MikroTik-RouterOS
Russia Steps Up a Covert Sabotage Campaign Aimed at Europe https://www.nytimes.com/2024/05/26/us/politics/russia-sabotage-campaign-ukraine.html
26/05/2024 13:33:39
QRCode
archive.org

Russian military intelligence, the G.R.U., is behind arson attacks aimed at undermining support for Ukraine’s war effort, security officials say.

nytimes EN 2024 Russia Ukraine EU Arson Vandalism Sabotage 2022 Russian NATO England Politics G.R.U US Europe Estonia GRU Russia-Ukraine-war
Exploiting the Cloud: How SMS Scammers are using Amazon, Google and IBM Cloud Services to Steal Customer Data https://www.enea.com/insights/exploiting-the-cloud-how-sms-scammers-are-using-amazon-google-and-ibm-cloud-services-to-steal-customer-data/
25/05/2024 22:06:37
QRCode
archive.org
thumbnail

Discover how SMS scammers are exploiting cloud storage to host scam websites with the intention of stealing sensitive information

enea EN 2024 SMS scammers IBM Cloud Services Amazon Google
New ShrinkLocker ransomware uses BitLocker to encrypt your files https://www.bleepingcomputer.com/news/security/new-shrinklocker-ransomware-uses-bitlocker-to-encrypt-your-files/
25/05/2024 22:01:44
QRCode
archive.org
thumbnail

A new ransomware strain called ShrinkLocker creates a new boot partition to encrypt corporate systems using Windows BitLocker.

bleepingcomputer EN 2024 BitLocker Encryption Ransomware ShrinkLocker Windows Security InfoSec Computer-Security
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail https://thehackernews.com/2024/05/cyber-criminals-exploit-github-and.html
25/05/2024 21:59:33
QRCode
archive.org

A "multi-faceted campaign" has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking trojans such as Atomic (aka AMOS), Vidar, Lumma (aka LummaC2), and Octo by impersonating credible software like 1Password, Bartender 5, and Pixelmator Pro.

thehackernews EN 2024 GitHub FileZilla AMOS impersonating software 1Password fake
Foxit PDF “Flawed Design” Exploitation https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/
25/05/2024 21:57:16
QRCode
archive.org
thumbnail

PDF (Portable Document Format) files have become an integral part of modern digital communication. Renowned for their universality and fidelity, PDFs offer a robust platform for sharing documents across diverse computing environments. PDFs have evolved into a standard format for presenting text, images, and multimedia content with consistent layout and formatting, irrespective of the software, hardware, or operating system used to view them. This versatility has made PDFs indispensable in fields ranging from business and academia to government and personal use, serving as a reliable means of exchanging information in a structured and accessible manner.

checkpoint EN 2024 Foxit PDF Exploitation
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations — Elastic Security Labs https://www.elastic.co/security-labs/invisible-miners-unveiling-ghostengine
25/05/2024 21:56:36
QRCode
archive.org
thumbnail

Elastic Security Labs has identified REF4578, an intrusion set incorporating several malicious modules and leveraging vulnerable drivers to disable known security solutions (EDRs) for crypto mining.

elastic EN 2024 GHOSTENGINE REF4578
A Catalog of Hazardous AV Sites – A Tale of Malware Hosting https://www.trellix.com/blogs/research/a-catalog-of-hazardous-av-sites-a-tale-of-malware-hosting/
25/05/2024 21:52:52
QRCode
archive.org

In mid-April 2024, Trellix Advanced Research Center team members observed multiple fake AV sites hosting highly sophisticated malicious files such as APK, EXE and Inno setup installer that includes Spy and Stealer capabilities. Hosting malicious software through sites which look legitimate is predatory to general consumers, especially those who look to protect their devices from cyber-attacks. The hosted websites made to look legitimate are listed below.

trellix EN 2024 fake antivirus AV malicious research
Putin hijacked Austria’s spy service. Now he's going after its government https://www.politico.eu/article/vladimir-putin-austria-spy-service-bvt-government-intelligence-wirecard-jan-marsalek-freedom-party/
25/05/2024 21:44:05
QRCode
archive.org
thumbnail

Intelligence officials suspect Wirecard COO Jan Marsalek of colluding with the far-right Freedom Party on Moscow’s behalf. 

politico EN 2024 Austria EU-Russia-relations Far-right Foreign-policy Herbert-Kickl Intelligence spy
Hacker defaces spyware app’s site, dumps database and source code https://www.bleepingcomputer.com/news/security/hacker-defaces-spyware-apps-site-dumps-database-and-source-code/
25/05/2024 10:09:20
QRCode
archive.org
thumbnail

​​A hacker has defaced the website of the pcTattletale spyware application, found on the booking systems of several Wyndham hotels in the United States, and leaked over a dozen archives containing database and source code data.

bleepingcomputer EN 2024 defaced pcTattletale spyware hacked
Stark Industries Solutions: An Iron Hammer in the Cloud https://krebsonsecurity.com/2024/05/stark-industries-solutions-an-iron-hammer-in-the-cloud/
24/05/2024 15:16:34
QRCode
archive.org

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and…

krebsonsecurity EN 2024 Stark-Industries-Solutions
Why Your Wi-Fi Router Doubles as an Apple AirTag https://krebsonsecurity.com/2024/05/why-your-wi-fi-router-doubles-as-an-apple-airtag/
24/05/2024 15:09:30
QRCode
archive.org

Apple and the satellite-based broadband service Starlink each recently took steps to address new research into the potential security and privacy implications of how their services geo-locate devices. Researchers from the University of Maryland say they relied on publicly available…

krebsonsecurity EN 2024 Wi-Fi Router Apple WPS privacy location
Malicious PyPI packages targeting highly specific MacOS machines https://securitylabs.datadoghq.com/articles/malicious-pypi-package-targeting-highly-specific-macos-machines/
24/05/2024 11:22:40
QRCode
archive.org
thumbnail

In this post, we analyze a cluster of malicious PyPI packages targeting specific MacOS machines.

datadoghq EN 2024 macos PyPI packages Supply-chain-attack
How Apple Wi-Fi Positioning System can be abused to track people around the globe https://www.theregister.com/AMP/2024/05/23/apple_wifi_positioning_system/
24/05/2024 06:50:26
QRCode
archive.org
thumbnail

Academics have suggested that Apple's Wi-Fi Positioning System (WPS) can be abused to create a global privacy nightmare.

In a paper titled, "Surveilling the Masses with Wi-Fi-Based Positioning Systems," Erik Rye, a PhD student at the University of Maryland (UMD) in the US, and Dave Levin, associate professor at UMD, describe how the design of Apple's WPS facilitates mass surveillance, even of those not using Apple devices.

theregister EN 2024 Apple Wi-Fi Positioning WPS privacy abused
page 94 / 214
4872 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn