Plus récents

🇺🇸 Lincoln College (lincolncollege.edu) has survived many difficult and challenging times - the economic crisis of 1887, a major campus fire in 1912, the Spanish flu of 1918, the Great Depression, World War II, the 2008 global financial crisis, and more, but this is different.

lincolncollege.edu

🔧 Malcat 0.8.2 - the binary file dissector. Malcat is brought to you by a one-man business located near Lyon, France.

malcat.fr/blog/new-release-082

rubygems : CVE-2022-29176

A really nice find from the researcher and it demonstrates how easy is to shoot ourself in the leg by a small oversight.

greg.molnar.io/blog/rubygems-c

🇿🇦 Standard Banks (standardbank.co.za) has restored all services following a major outage impacting Banking App, Internet Banking, USSD or transact with Credit Cards, Point of Sale (POS) & ATMss, and more.

businessinsider.co.za/standard

🇮🇳 A ransomware was detected early on March 22 at the National Institute of Mental Health & Neuro Sciences (nimhans.ac.in) : « no sensitive information or patient data was compromised » (Director NIMHANS)

newindianexpress.com/cities/be

🇨🇦 IKEA Canada confirms data breach involving personal information of approximately 95,000 customers / violation de données concernant les informations personnelles d'environ 95 000 clients.

toronto.ctvnews.ca/ikea-canada

An entire national health service was forced to shut down all of its IT systems while the country was in the middle of a pandemic. Could it happen again ?

rte.ie/news/analysis-and-comme

Afficher le fil de discussion

ONYPHE have identified roughly 5,700 F5 Networks BIGIP exposing Management API. Entreprise customers can check their perimeter with the following request:

category:datascan device.product:BIGIP tag:open

Afficher le fil de discussion

☣️ NetDooka : This framework is distributed via a pay-per-install (PPI) service and contains multiple parts. PPI malware services allow malware creators to easily deploy their payloads. The use of a malicious driver creates a large attack surface for attackers to exploit, while also allowing them to take advantage of approaches such as protecting processes and files, bypassing antivirus programs, and hiding the malware or its network communications from the system, among others.

trendmicro.com/en_us/research/

Amid concerns over possible retaliatory cyberattacks from Russia, Indiana officials are working to make sure businesses and government agencies are taking the proper precautions.

youtube.com/watch?v=HOiVE0Ncnm

Security researchers who investigate ransomware gangs are being targeted by the criminals they're tracking.

EDRs can be obtained with little scrutiny, making them perfect vehicles for social engineering attacks.

techmonitor.ai/technology/cybe

Afficher le fil de discussion
Plus anciens