Plus récents

A new ransomware family that emerged last month comes with its own bag of tricks to bypass ransomware protection by leveraging a novel technique called « intermittent encryption ». Called LockFile, the operators of the ransomware has been found exploiting recently disclosed flaws such as ProxyShell and PetitPotam to compromise servers and deploy file-encrypting that scrambles only every alternate 16 bytes of a file, thereby giving it the ability to evade defences.

thehackernews.com/2021/08/lock

FBI agents appear to have been misusing a evidence vault, causing privacy concerns and drawing attention to a secretive program created by the CIA-funded company Palantir. It's raising questions about FBI's shoddy track record of protecting ' .

thedailybeast.com/fbi-screwup-

A team of scientists from a Swiss university has discovered a way to bypass PIN codes on contactless cards from Mastercard & Maestro

therecord.media/academics-bypa

Z3 is a powerful framework developed by Microsoft Research. Given a list of restrictions and conditions, Z3 finds one solution that satisfies them all, if that solution exists. It can be used for multiple purposes but some known uses in security are exploiting or checking firewall rules. It is also a handy tool for solving many CTF challenges related to encryption and keygen generation.

infosecadalid.com/2021/08/27/m

A survey, based on a global sample of 1,430 senior cybersecurity executives, reveals data breach fears as 90% of businesses see rise in cyber attacks. Ireland's IT leaders are worried and it's easy to understand why. « Cyber attacks are becoming more frequent, more damaging, longer-lasting, and harder to anticipate. »

irishexaminer.com/news/arid-40

China's Microsoft hack may have had a bigger purpose than just spying - White House & Microsoft have said unequivocally that Chinese government-backed hackers are to blame. « There is a long-term project underway. We don't know what the Chinese are building, but what we do know is that diversity of data, quality of data aggregation, accumulation of data is going to be critical to its success. » ( Kiersten Todt )

npr.org/2021/08/26/1013501080/

Boston Public Library (bpl.org) experienced a systemwide technical outage due to a security attack, pausing public computer and public printing services, as well as some online resources.

bpl.org/news/statement-technic

Jen Easterly wants to spend less time putting out fires & more time preparing for incidents in an attempt to reduce their impact. « We are doing everything we can to defend federal networks and our critical infrastructure »

cyberscoop.com/jen-easterly-ci

American policymakers need to recognize that one of the Kremlin's goals include being a superpower. « In the ongoing revolution in information technologies, information & psychological will largely lay the groundwork for victory. »

defenseone.com/ideas/2021/08/c

VaxiCode Vérif : Le ministère de la Santé et des Services sociaux indique avoir déposé des « plaintes formelles » à la police pour qu'elle mène enquête concernant le vol et l'usurpation des codes QR de plusieurs élus de l'Assemblée Nationale

lapresse.ca/covid-19/2021-08-2

VaxiCode Vérif : Un individu télécharge illégalement les preuves vaccinales du Premier Ministre François Legault et d'une dixaine de politiciens

journaldequebec.com/2021/08/27

VaxiCode Vérif : Un individu créer de faux passeports vaccinaux pour des personnes fictives. La communauté du Hackfest a contribué à trouver une dizaine de problèmes avant même que les applications soient disponibles en téléchargement

ici.radio-canada.ca/nouvelle/1

« Worst cloud vulnerability you can imagine » discovered in . Microsoft only emailed 30% or so of its Cosmos DB customers about the vulnerability

arstechnica.com/information-te

The operators of the Phorpiex have shut down their and put its source code for sale on a dark web. This botnet isn't as secure as other malware and has often been hijacked by third parties

therecord.media/phorpiex-botne

warned thousands of its computing customers, including some of the world's largest companies, that intruders could have the ability to read, change or even delete their main databases. The vulnerability is in Microsoft Azure's flagship Cosmos DB database.

reuters.com/technology/exclusi

DirtyMoe is a complex malicious employing various self-protection and anti-forensics mechanisms. The driver provides key functionalities to hide malicious processes, services, and registry keys.

decoded.avast.io/martinchlumec

Plus anciens