Plus récents

Online disinformation campaigns have become a booming . New technology enables nearly anyone to get involved. Private firms, straddling traditional marketing and the shadow world of geopolitical operations, are selling once conducted principally by intelligence agencies. The trend emerged after the Cambridge Analytica scandal in 2018.

alteredsecurity.com/post/fanta

In this blog post we will explore and learn about various Logon Types and understand how are these logon type events are generated. We will also see if we can extract credentials from individual logon types.

alteredsecurity.com/post/fanta

From RPC to RCE - Workstation Takeover via RBCD and MS-RPChoose-Your-Own-Adventure : In the default configuration of Active Directory, it is possible to remotely take over Workstations ( 7/10/11) and possibly servers (if Desktop Experience is installed) when their WebClient service is running.

gist.github.com/gladiatx0r/1ff

MicroBurst is a PowerShell toolkit for attacking . MicroBurst includes functions and scripts that support Azure Services discovery, weak configuration auditing, and post exploitation actions such as credential dumping

github.com/NetSPI/MicroBurst

Phew, this was a really bad week for (and a lot of reading for all of us). And just when we thought that the fiasco with the SAM hive was over, a new vulnerability popped up, which is much, much more dangerous unfortunately - it allows a user to completely take over a domain that has the ADCS service running.

isc.sans.edu/forums/diary/Acti

Just another « Won't Fix » Privilege Escalation from User to Domain Admin. RemotePotato0 is an exploit that allows you to escalate your privileges from a generic User to Domain Admin. Added Cross session activation to activate a COM object in an arbitrary session. No more session 0 constraints needed. Session can be specified with the -s flag.

github.com/antonioCoco/RemoteP

(CVE-2021-35522) ACCESS AND TIME TERMINALS - Customer Security Notice : 🇫🇷 French company IDEMIA, one of the largest vendors of biometrics authentication solutions, strongly recommends that users of the aforementioned biometric terminals update their . A new version of integrating a fix for security vulnerabilities identified for the following terminals:

  • MorphoWave Compact
  • VisionPass
  • SIGMA Lite and Lite+
  • SIGMA Wide
  • SIGMA Extreme
  • MA VP MD

biometricdevices.idemia.com/s/

CVE-2021-35520 ; CVE-2021-35521 ; CVE-2021-35522 - by exploiting these vulnerabilities, attackers can perform Remote Command Execution (RCE), cause a denial of service (DoS), and read and write arbitrary files on the device

ptsecurity.com/ww-en/about/new

One of the worst things that could happen to privacy-focused community : Hole blasted in Guntrader (guntrader.uk) : firearms sales website's database breached, 111,000 users' info spilled online. The database contains latitude and longitude data, first name and last name, force that issued an rfd's certificate, phone numbers, fax numbers, bcrypt-hashed passwords, postcode, postal addresses, user's ip addresses, logs of payments were also included. It is a severe breach of privacy not only for Guntrader (guntrader.uk) but for its users : members of the UK's licensed firearms community

theregister.com/2021/07/23/gun

iSCSI Console is a free, , User-Mode iSCSI Target Server written in C#. iSCSI Console is cross-platform ( ), portable and requires no installation. iSCSI Console can serve physical and virtual disks to multiple clients. The iSCSI library utilized by iSCSI Console was designed to give developers an easy way to serve block storage via iSCSI. Any storage object you wish to share needs to implement the abstract Disk class, and the library will take care of the rest. The library was written with extensibility in mind, and was designed to fit multitude of projects.

github.com/TalAloni/iSCSIConso

Les systèmes informatiques de la Ville de Thessalonique (thessaloniki.gr), deuxième ville la plus peuplée de Grèce, perturbés suite à une attaque informatique par perpétrée dans la nuit du vendredi 23 juillet 2021

thenationalherald.com/archive_

In Q2 2021, we saw the disappearance of a few different ransomware operations. It is difficult to identify whether the groups simply went into hiding, were arrested, rebranded, or are now operating with a different group. The previous three months saw a few groups call it quits including , Locker, , and Locker ransomware groups. In Q2 2021 alone, this included 740 different victims as being named to the various active data leak sites. This is a 47% increase when compared to the same activity identified in Q1 2021.

digitalshadows.com/blog-and-re

Un nom de domaine, surtout s'il est utilisé par un service public, doit être absolument et correctement décommissionné.

guillem.lefait.fr/martinique/2

Cette histoire à dormir debout est à peine croyable : il y a plus d'un an l'hébergeur Internet français Scaleway (anciennement Online SAS) a fait l'objet d'un vol de dique dur SSD lors d'un « transport sécurisé » entre deux datacenters. Rebondissement insoupçonné, un Youtubeur préparant un sujet sur l'effacement des données et de leur persistance après formatage, a acheté sur un site de petites annonces le fameux disque SSD volé. « La cybercriminalité est un réel fléau que nous nous devons tous de combattre, avec professionnalisme et discrétion » ( Yann Lechelle ). En réponse à cet incident, Scaleway annonce des contrôles renforcés de ses transports en indiquant que dorénavant des mallettes durcies équipées de traceurs GPS seront utilisées.

blog.scaleway.com/incident-sec

Exploitation automatisée du dossier médical, exploitation de données génétiques, exploitation de données d'objets connectés, exploitation de données de mobilité, exploitation de données personnelles,.. ce rapport d'information atterrant indique que la 🇫🇷 projette de se doter du « » comme outils de gestion de : risques, crises, catastrophes, accidents,.. Placés sous constante, ces collectes de données et leur traitement en temps réel par intelligence artificielle offriraient la possibilité d'appliquer un contrôle social discontinu permettant d'évaluer individuellement les comportements de chaque français-e. Ainsi, en cas de désobéissance ou en situation non conformité les « mauvais » citoyens pourraient être systématiquement alertés et/ou automatiquement sanctionnés

senat.fr/rap/r20-673/r20-6738.

More businesses lost larger sums of money to in past year. Fraudulent phone calls have been an issue for years, and they're becoming more common. According to a recent report from Truecaller (truecaller.blog), 59.49 million Americans lost to scam calls in the past year, costing $29.8 billion. These have risen in both number and cost, and businesses can't afford to ignore this trend. The -19 has also played a crucial role in creating a perfect storm of fraud.

cybersecurity.att.com/blogs/se

Plus anciens