Plus récents

🔔 uBlock Origin : Tous les liens Twitter (t.co) bloqués.

Aucun danger. Après vérifications, il s'agit d'une simple erreur située dans la liste de filtrage maintenue par Peter Lowe : (Peter's Lowe's Ad and tracking server list

🇺🇸 The U.S. Drug Enforcement Administration (DEA) is investigating reports that hackers gained unauthorized access to an agency portal that taps into 16 different federal law enforcement databases.

krebsonsecurity.com/2022/05/de

🇫🇷 Le quotidien régional La Voix du Nord (groupe Rossel) n'a pas eu d'édition papier ce matin à cause d'une panne informatique majeure sur le site de production de Marcq-en-Barœul.

lavoixdunord.fr/1177734/articl

CVE-2022–26923 This vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services server role installed.

research.ifcr.dk/9e098fe298f4

🇺🇸 ONCD announces senior leadership

  • Kemba Eneas Walden ( Principal Deputy National Cyber Director )
  • Neal Higgins ( Deputy National Cyber Director for National Cybersecurity )
  • Rob Knake ( Deputy National Cyber Directors )
Afficher le fil de discussion

Analysis of these samples indicates that the developer has access to REvil's source code, reinforcing the likelihood that the threat group has reemerged.

secureworks.com/blog/revil-dev

Earlier this week, a 🇺🇦 Ukrainian security researcher leaked almost two years' worth of internal chat logs from Conti, one of the more rapacious and ruthless ransomware gangs in operation today.

The Conti group's chats reveal a great deal about its internal structure and hierarchy.

krebsonsecurity.com/2022/03/co

🇬🇧 GCHQ - CyberUK 2022

At the global level, the UK has developed as a cyber power. Alongside the more traditional forms of diplomacy and statecraft, cyber now plays a vital role in our national security and prosperity.

gchq.gov.uk/speech/cyberuk2022

🇬🇧 Hackers working for the UK's National Cyber Force made hundreds of thousands of stolen credit cards worthless to criminals, according to the head of GCHQ, Sir Jeremy Fleming.

news.sky.com/story/uk-governme

🇺🇸 Opus Interactive (opusinteractive.com) a web hosting provider used by the campaign finance firm C&E Systems was the victim of a ransomware attack. C&E's database was compromised, which includes their client's log-in credentials for ORESTAR accounts. « Opus and customer virtual servers and backups were hit by a ransomware attack which encrypted the server disk files. » « No systems related to elections administrations have been compromised »

kobi5.com/news/ransomware-atta

🇳🇿 In a statement on its website AA Traveller said it « recently discovered a vulnerability in the application where the AA Traveller information was stored and that an unauthorised party accessed information within the database used »

rnz.co.nz/news/national/466834

medinside.ch/de/post/hacker-ve

Die Ransomware-Bande Lockbit hat eine Appenzeller Arztpraxis attackiert. Im Darknet sind Diagnosen, Labortests, Daten zu Operationen und mehr aufgetaucht.

inside-it.ch/hacker-veroeffent

Plus anciens