Renaud Lifchitz : « Blockchains dans la cybersécurité et cybersécurité des blockchains » #blockchain #cyber #informatique
https://www.arcsi.fr/doc/Lundi_Cyber_Renaud_Lifchitz-02-22.pdf
Les #blockchains sont connues pour leurs applications financières, ce qui éclipse malheureusement bien souvent leurs nombreux autres intérêts. Renaud Lifchitz s'est focalisé sur les principes, techniques et projets blockchain concrets qui apportent un réel intérêt d'un point de vue confidentialité, intégrité, disponibilité ou authentification. #blockchain #informatique
🇫🇷 Les systèmes informatiques de L'École Nationale de l'Aviation Civile (enac.fr
) paralysés suite à une attaque informatique. #france #aero #ransomware #education #cyber #databreach #campus #threats #informatique
🇫🇷 Une partie des systèmes informatiques de la Communauté de communes de Montesquieu (cc-montesquieu.fr
) impactée suite à une attaque informatique. #france #ransomware #city #cyber #databreach #threats #informatique
🌐 2022-03-16 14:36:33 UTC | M 7.5 - Namie, 🇯🇵 Japan | A tsunami adivsory has been issued for Miyagi and Fukushima prefectures. #japon
A detailed post on how Daniel Eshetu chained 3 vulnerabilities (A path traversal (CVE-2021-45968), an SSRF in an external piece of software (CVE-2021-45967) and a post-authentication RCE (CVE-2021-45966)) into a full pre-auth RCE in 🇩🇪 Pascom (pascom.net
) Cloud phone system. #vuln #devices #phone #cloud #telecom #informatique
🔥 CVE-2022-26320 - Fermat Attack on RSA. Multiple printers of the Fujifilm Apeos, DocuCentre and DocuPrint series generate self-signed TLS certificates with vulnerable RSA keys. Some Canon printers have the ability to generate a CSR with a vulnerable RSA key. Both the Fujifilm and the Canon printers use the Basic Crypto Module of the Safezone library by Rambus. Other products using this module to generate RSA keys may also be affected. #crypto #devices #firmware #vuln #informatique
As #Microsoft Windows doesn't verify that the SIDs exist on the domain when an ACL is created it's possible to insert a non-existent SID into any object's ACL we have privileges over. The main exploitation vector here is persistence. Threat actors with domain control can add permissions and privileges to future SIDs and regain a foothold by creating a user or computer account. #windows #malware #powershell #vuln #audit #informatique
With the deprecation of WMIC, malicious usage WMI functionality with PowerShell will likely increase. #windows #malware #powershell #audit #informatique
Security researchers went on to predict that ransomware totals would reach 714 million by the end of the year, constituting a 134% year-over-year increase. #ransomware #cyber #threats #informatique
https://www.cybereason.com/blog/leveraging-artificial-intelligence-to-prevent-ransomops-attacks
🇺🇸 U.S. Senator for Florida, Marco Rubio warns of rising risk of cyberattacks amid russian invasion of Ukraine. #usa #industries #cyber #banking #threats #business #informatique
According to Dragos data, between 2018 and 2021 the number of ransomware attacks on industrial control systems (ICS) increased over 500 percent, with five percent of attacks impacting oil & gas entities. #cyber #gas #scada #energies #isc #ransomware #iot #threats #oil #informatique
PHOREAL/RIZZO is a backdoor allowing initial victim characterization and follow-on post-exploitation operations to compromise the confidentiality of organizations' data. It has been reported in other research as being used exclusively by APT32 (AKA SeaLotus, OceanLotus, APT-C-00, Group G0050). APT32 largely targets victims with political or economic interests in Southeast Asia, specifically 🇻🇳 Vietnam. #windows #malware #financial #vietnam #political #asia #economic #informatique
DeTT&CT : Detect Tactics, Techniques & Combat Threats #python #security #tools #framework #yaml #informatique
This analysis will help organizations better understand the inner workings of #Conti's organizational infrastructure. #ransomware
https://www.breachquest.com/conti-leaks-insight-into-a-ransomware-unicorn/
🇺🇸 The 238 reported breaches since September 2021 impacted more than 2.4 million Texans, according to state data. (CBS Dallas) #cyber #city #databreach #threats #business #informatique
EmoCheck v2.1.1 - #Emotet detection tool for #Microsoft #Windows OS. #cyber #tools #threats #informatique
Branch History Injection. What makes BHI noteworthy is that it can bypass recent silicon-level BTI mitigations implemented by Intel (eIBRS, or enhanced Indirect Branch Restricted Speculation) and Arm, thus allowing information to leak across privilege boundaries. In other words, a rogue user-level application can use BHI to extract keys and other secrets from OS kernel memory, which should be out of bounds, and the built-in defenses on Intel and Arm-designed CPU cores won't work. #cyber #threats #informatique
https://www.theregister.com/2022/03/15/spectre_bti_intel_amd_arm/
VT4Browsers allows SOC analysts, incident responders and threat researchers to contextualize every IoC in any web platform with threat intelligence. #cyber #malware #threats #intel #browser #software #firefox #chrome #informatique
https://blog.virustotal.com/2022/03/vt4browsers-any-indicator-every-detail.html
sc(r)apy | full metal packets
> We Are the Borg
> You Will be Assimilated
> Resistance is Futile