Plus récents

CVE-2022-23088 - FreeBSD patched a 13-year-old heap overflow in the Wi-Fi stack that could allow network-adjacent attackers to execute arbitrary code on affected installations of FreeBSD Kernel.

zerodayinitiative.com/blog/202

💀 Hertzbleed Side-Channel Attack allows to remotely steal encryption keys from (CVE-2022-23823) & (CVE-2022-24436) chips.

hertzbleed.com

👮 Operation First Light 2022

  • 1,770 locations raided worldwide
  • ± 3,000 suspects identified
  • ± 2,000 operators, fraudsters and money launderers arrested
  • ± 4,000 bank accounts frozen
  • ± USD 50 million worth of illicit funds intercepted

interpol.int/News-and-Events/N

🇨🇦 Dans la nuit du 5 au 6 juin 2022, des individus sont entrés par effraction dans des espaces du Centre de recherche du CHU de Québec pour voler du matériel informatique. Des données

ici.radio-canada.ca/nouvelle/1

🇨🇭 Un dysfonctionnement encore « indéterminé » a empêché le système de secours des aiguilleurs du ciel Skyguide (skyguide.ch) de fonctionner correctement.

Nous sommes sûrs à 99% qu'il ne s’agissait pas d'une cyberattaque.

Cette panne a nécessité la fermeture totale de l'espace aérien suisse entre 4h et 8h30.

20min.ch/fr/story/skyguide-eca

🇷🇺 Russia is exploiting the physicality of and forcing 🇺🇦 Ukrainian ISPs to send traffic through Russian ISPs.

providers

wired.com/story/ukraine-russia

Les opérateurs BlackCat revendiquent des attaques informatiques à l'encontre de :

  • 🇺🇸 Grand Valley State University (gvsu.edu)

  • 🇦🇹 Carinthia (ktn.gt.av)

  • 🇺🇸 Green Mountain Electric Supply (gmes.com)

  • 🇺🇸 Horwitz, Horwitz & Associates (horwitzlaw.com)

  • 🇮🇹 Tecno Pack (tecnopackspa.it)

  • 🇺🇸 The Allison Inn VictimName Spa (theallison.com)

  • 🇺🇸 Purvis Industries, LLC (purvisindustries.com)

  • 🇺🇸 Plainedge Public Schools (plainedgeschools.org)

Les opérateurs LV revendiquent des attaques informatiques à l'encontre de :

  • 🇺🇸 Schiffmans (schiffmans.com)

  • 🇮🇹 Motoluce (motoluce.com)

jeweler

Tens of thousands of user tokens are exposed via the Travis CI API, which allows anyone to access historical clear-text logs.

More than 770 million logs of free tier users are available, from which you can easily extract tokens, secrets, and other credentials associated with popular cloud service providers such as GitHub, AWS, and Docker Hub. Attackers can use this sensitive data to launch massive cyberattacks and to move laterally in the cloud.

blog.aquasec.com/travis-ci-sec

« A cunning tactic »

Cybercrime groups that specialize in stealing corporate data & demanding a ransom not to publish it have tried countless approaches to shaming their victims into paying.

The latest innovation in ratcheting up the heat comes from the BlackCat ransomware group, which has traditionally published any stolen victim data on the Dark Web. Today, however, the group began publishing individual victim websites on the public Internet, with the leaked data made available in an easily searchable form.

krebsonsecurity.com/2022/06/ra

Plus anciens