Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 96 / 214
4265 résultats taggé EN  ✕
Cyber Official Speaks Out, Reveals Mobile Network Attacks in U.S. https://www.404media.co/email/79f7367c-bd3c-4bff-ac9f-85c738d08bec/?ref=daily-stories-newsletter
16/05/2024 15:21:49
QRCode
archive.org
thumbnail

A CISA official breaks with the government narrative and tells the FCC that SS7 and similar networks and protocols have been used to track people in the U.S. in recent years.

404media EN 2024 SS7 spy tracking position people US
Popular Cyber Crime Forum Breach Forums Seized by Police https://www.hackread.com/cyber-crime-forum-breach-forums-seized-by-police/
16/05/2024 09:32:54
QRCode
archive.org
thumbnail

The cybercrime and hacker forum Breach Forums has been seized by the Federal Bureau of Investigation (FBI) and the Department of Justice.

hackread EN 2024 BreachForums seized FBI
An Infostealer's Brewin': Cuckoo & AtomicStealer Get Creative https://alden.io/posts/infostealers-a-brewin/
15/05/2024 20:54:08
QRCode
archive.org
thumbnail

Recent infostealer malware campaign utilizing fake Homebrew websites to deliver Cuckoo and AtomicStealer.

alden EN 2024 macOS Malware RE CTI AMOS Infostealer Homebrew
Santander reports customer, employee data breach in Spain, Chile, Uruguay https://www.reuters.com/technology/cybersecurity/santander-reports-customer-employee-data-breach-spain-chile-uruguay-2024-05-14/?ref=news.risky.biz
15/05/2024 11:30:36
QRCode
archive.org

Spanish bank Santander said on Tuesday some customer and employee data in a database hosted by an outside provider was accessed by an unauthorized party, but that the bank's own operations and systems have not been affected.

reuters EN 2024 Santander Spain data-breach Chile Uruguay
Investigation into Helsinki Education Division data breach proceeds | City of Helsinki https://www.hel.fi/en/news/investigation-into-helsinki-education-division-data-breach-proceeds?ref=news.risky.biz
15/05/2024 11:30:16
QRCode
archive.org
thumbnail

On 2 May 2024, the City of Helsinki issued a notice of a data breach targeted at its Education Division. Investigation into the data breach proceeds through a cooperative effort by the City´s own and external experts. On Monday, 13 May 2024, the City of Helsinki held a press conference on the progress of this investigation.

hel.fi EN 2024 Finland Helsinki data-breach Education
PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers https://www.bleepingcomputer.com/news/security/poc-exploit-released-for-rce-zero-day-in-d-link-exo-ax4800-routers/
15/05/2024 00:24:02
QRCode
archive.org
thumbnail

The D-Link EXO AX4800 (DIR-X4860) router is vulnerable to remote unauthenticated command execution that could lead to complete device takeovers by attackers with access to the HNAP port.

bleepingcomputer EN 2024 Authentication-Bypass D-Link Exploit Proof-of-Concept Remote-Command-Execution Router Vulnerability Zero-Day Security InfoSec Computer-Security
Leveraging DNS Tunneling for Tracking and Scanning https://unit42.paloaltonetworks.com/three-dns-tunneling-campaigns/
14/05/2024 18:52:34
QRCode
archive.org
thumbnail

This article presents a case study on new applications of domain name system (DNS) tunneling we have found in the wild. These techniques expand beyond DNS tunneling only for command and control (C2) and virtual private network (VPN) purposes.

Malicious actors occasionally employ DNS tunneling as a covert communications channel, because it can bypass conventional network firewalls. This allows C2 traffic and data exfiltration that can remain hidden from some traditional detection methods.

unit42 EN 2024 DNS Tunneling Tracking Scanning research analysis
2023 Kaspersky Incident Response report https://securelist.com/kaspersky-incident-response-report-2023/112504/
14/05/2024 14:28:22
QRCode
archive.org
thumbnail

The report shares statistics and observations from incident response practice in 2023, analyzes trends and gives cybersecurity recommendations.
#Cybersecurity #Incident #Internal #LockBit #Ransomware #Security #Statistics #Threats #response #services

securelist 2024 2023 EN Threats Cybersecurity Security Incident LockBit response Internal services Statistics Ransomware
Malicious Go Binary Delivered via Steganography in PyPI https://blog.phylum.io/malicious-go-binary-delivered-via-steganography-in-pypi/
14/05/2024 10:34:12
QRCode
archive.org
thumbnail

On May 10, 2024, Phylum’s automated risk detection platform alerted us to a suspicious publication on PyPI. The package was called requests-darwin-lite and appeared to be a fork of the ever-popular requests package with a few key differences, most notably the inclusion of a malicious Go binary packed into

phylum EN 2024 Steganography macOS Go
Ongoing Malvertising Campaign leads to Ransomware https://www.rapid7.com/blog/post/2024/05/13/ongoing-malvertising-campaign-leads-to-ransomware/
14/05/2024 10:18:38
QRCode
archive.org
thumbnail

Rapid7 has observed an ongoing campaign to distribute trojanized installers for WinSCP and PuTTY via malicious ads on commonly used search engines, where clicking on the ad leads to typo squatted domains.

rapid7 EN 2024 Malvertising Campaign Ransomware WinSCP PuTTY
Distribution of DanaBot Malware via Word Files Detected by AhnLab EDR https://asec.ahnlab.com/en/65399/
14/05/2024 10:18:00
QRCode
archive.org
thumbnail

There are two types of malicious documents that are distributed via email recently: those exploiting equation editor and those including external link URLs. This post will describe the infection flow of the DanaBot malware that is distributed through documents containing external links, the latter method, as well as the evidence and detection process with the AhnLab EDR product’s diagram. Figure 1 shows the content of a spam email with a Word document attached that contains an external link. As you can see, it is a sophisticatedly disguised email pretending to be a job application form to deceive the recipient. The attached file (.docx) is a Word document that contains an external link.

ahnlab EN 2024 DanaBot email Word
My life as a Chinese spy: Secret police agent tells all - ABC News https://www.abc.net.au/news/2024-05-13/china-spy-secret-police-agent-tells-all-four-corners/103826708
13/05/2024 13:31:39
QRCode
archive.org
thumbnail

A Chinese spy who is now on Australian soil has revealed his incredible story to Four Corners.

abc EN 2024 spy secret-police china agent spying
Stolen children’s health records posted online in extortion bid https://therecord.media/scotland-nhs-children-records-posted-extortion-ransomware
13/05/2024 08:35:21
QRCode
archive.org
thumbnail

Cybercriminals have published another batch of data stolen from NHS Dumfries and Galloway in Scotland, this time including information about children.

therecord.media EN 2024 Scotland NHS health extortion ransomware childrens
Europol confirms web portal breach, says no operational data stolen https://www.bleepingcomputer.com/news/security/europol-confirms-web-portal-breach-says-no-operational-data-stolen/?ref=news.risky.biz
13/05/2024 06:44:20
QRCode
archive.org
thumbnail

Europol, the European Union's law enforcement agency, confirmed that its Europol Platform for Experts (EPE) portal was breached and is now investigating the incident after a threat actor claimed they stole For Official Use Only (FOUO) documents containing classified data.
#Breach #Computer #Data #EPE #Europol #InfoSec #Leak #Security #Theft

bleepingcomputer EN 2024 Europol Security EPE Theft Leak InfoSec Data Breach Computer
Over 50,000 Tinyproxy servers vulnerable to critical RCE flaw https://www.bleepingcomputer.com/news/security/over-50-000-tinyproxy-servers-vulnerable-to-critical-rce-flaw/
12/05/2024 13:10:58
QRCode
archive.org
thumbnail

Nearly 52,000 internet-exposed Tinyproxy instances are vulnerable to CVE-2023-49606, a recently disclosed critical remote code execution (RCE) flaw.

bleepingcomputer EN 2024 CVE-2023-49606 Tinyproxy
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery https://thehackernews.com/2024/05/mirai-botnet-exploits-ivanti-connect.html?m=1
12/05/2024 13:10:11
QRCode
archive.org

Ivanti Connect Secure (ICS) devices are under attack! Two critical vulnerabilities are being exploited to deploy the notorious Mirai botnet.

thehackernews EN 2024 Mirai Botnet Ivanti Connect Payload
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign https://thehackernews.com/2024/05/kremlin-backed-apt28-targets-polish.html?m=1
12/05/2024 13:08:34
QRCode
archive.org

Russia-Linked APT28 Strikes Poland with Malware Campaign Polish government bodies were hit by a sophisticated malware attack orchestrated by the infam

thehackernews EN 2024 APT28 Poland Malware
The UK Says a Huge Payroll Data Breach by a ‘Malign Actor’ Has Exposed Details of Military Personnel https://www.securityweek.com/the-uk-says-a-huge-payroll-data-breach-by-a-malign-actor-has-exposed-details-of-military-personnel/
12/05/2024 13:06:58
QRCode
archive.org

The UK Ministry of Defense said a breach at a third-party payroll system exposed as many as 272,000 armed forces personnel and veterans.

securityweek EN 2024 UK Defense Payroll military data-breach veterans
Safari Flaw Can Expose iPhone Users in the EU to Tracking https://www.mysk.blog/2024/04/28/safari-tracking/
09/05/2024 13:38:14
QRCode
archive.org

Apple's implementation of installing marketplace apps from Safari is heavily flawed and can allow a malicious marketplace to track users across websites

mysk EN 2024 ios macos safari Flaw iPhone EU Tracking
Big Vulnerabilities in Next-Gen BIG-IP https://eclypsium.com/blog/big-vulnerabilities-in-next-gen-big-ip/
09/05/2024 12:48:05
QRCode
archive.org
thumbnail

Our ongoing research has identified remotely exploitable vulnerabilities in F5’s Next Central Manager that can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any F5 assets managed by the Next Central Manager. These attacker-controlled accounts would not be visible from the Next Central Manager itself, enabling ongoing malicious persistence within the environment. At the time of writing, we have not seen any indication that these vulnerabilities have been exploited in the wild.

eclypsium EN 2024 BIG-IP vulnerabilities CVE-2024-21793 CVE-2024-26026
page 96 / 214
4874 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn