Plus récents

🐧 Symbiote

This malware hides itself and any other malware used by the threat actor, making infections very hard to detect. Performing live forensics on an infected machine may not turn anything up since all the file, processes, and network artifacts are hidden.

intezer.com/blog/research/new-

🇮🇹 In riferimento al grave attacco hacker dei giorni scorsi alle infrastrutture tecnologiche del Comune di Palermo (comune.palermo.it) sono state poste in essere una serie di attività volte a contenere l'attacco ransomware.

🇫🇷 SSTIC 2022

  • Smartphone et forensique : comment attraper Pégasus for fun and non-profit.
  • GnuPG memory forensics
  • DFIR-IRIS - Plateforme Collaborative de Réponse sur Incident
  • Fuzzing Microsoft's RDP Client using Virtual Channels
  • La signalisation chez les opérateurs mobiles
  • Practical Timing and SEMA on Embedded OpenSSL's ECDSA
  • Trumping the Elephant: Fast Side-Channel Key-Recovery Attack against Dumbo
  • Attaque et sécurisation d'un schéma d'attestation à distance vérifié formellement
  • OASIS : un framework pour la détection d'intrusion embarquée dans les contrôleurs Bluetooth Low Energy
  • Ghost in the Wireless, iwlwifi edition
  • DroidGuard: A Deep Dive into SafetyNet
  • An Apple a Day Keeps the Exploiter Away
  • Évolution de la sécurité défensive des réseaux locaux : historique, SD-LAN et micro-segmentation
  • AnoMark : Détection d'Anomalies dans des lignes de commande à l'aide de Chaînes de Markov
  • TPM is not the holy way
  • Mise en quarantaine du navigateur
  • SASUSB : protocole sanitaire pour l'USB

actes.sstic.org/SSTIC22/sstic-

📓 Disponible.

Control de Peter W. Singer (pwsinger.com) & August Cole (augustcole.com).
L'ère de l'IA et de l'hypersurveillance a déjà commencé.
Original title: BURN-IN (burninbook.com)
📟 ISBN: 978-2-283-03610-5

eyrolles.com/Litterature/Livre

CVE-2022-26134 - Critical severity unauthenticated Remote Code Execution vulnerability in Confluence Server and Data Center.

🇺🇸 An unauthorized person was able to access Allwell Behavioral Health Services (allwell.org) computer network. Patient information compromised: names, dates of birth, Social Security numbers, phone numbers, treatment activity, treatment provider, treatment date, treatment location, and payer information.

allwell.org/display/files/Allw

🇺🇸 Hamden's (hamden.com) IT systems were « compromised ».

patch.com/connecticut/hamden/h

First thing in the morning, the fire department works 24 hours a day. So they realized we had been hacked at about five in the morning and we started shutting down everything immediately. We are not able to process payments. A lot of departments like the tax office wasn't able to do much today.

nbcconnecticut.com/news/local/

🇺🇸 Illuminate Education's (ioeducation.com) data breach leaked the private information of well over 3 million students. And the vast reach of the data breach will likely never be fully known because most state laws do not require public disclosure of data breaches.

thejournal.com/articles/2022/0

Plus anciens