Plus récents

Automatically tagging Belgian politician when they use their on the daily livestreams. The software is written in and is using machine learning to detect phones and facial recognition to identify the politician.

twitter.com/FlemishScroller

Partage d'une note très simplifiée explicative et curative et préventive suite à des opérations de « Maintien en Condition de Sécurité » (MCS) concernant la vulnérabilité CVE-2021-1675 (PrintNightmare)

blog.saxx.fr/2021/07/05/printn

Vous vous souve­nez d'IQVIA ? Envi­ron une phar­ma­cie sur deux en leur envoi toutes vos données. Oui, sans vous le dire.

n.survol.fr/n/refus-rgpd-iqvia

Édition 2021 du « Baromètre du » - Ce rapport d'enquête de 350 pages dresse un portrait de la diffusion des technologies de l'information et de la communication () en . 92% des personnes qui habitent sur le territoire Français sont des internautes. Parmi ces internautes, plus de 39% d'entre eux ne voient aucun frein à . Pour 26% des sondés ( échantillon de 4029 personnes âgées de +12 ans ), le manque de protection des données personnelles n'est pas un frein à l'adoption et à l'utilisation d'Internet soit une baisse de 14pts par rapport à 2018, le plus bas depuis 2010. L'ordinateur (43%) passe devant le smartphone (41%) comme équipement le plus utilisé pour se connecter à Internet

arcep.fr/uploads/tx_gspublicat

💥 D'après plusieurs sources, un simple point d'accès (AP) nommé « %secretclub%power » semble avoir la capacité de neutraliser de manière permanente le de n'importe quel appareil . Concrètement, un iPhone qui est à portée de ce réseau Wi-Fi se retrouvera privé de connexion -Fi. Il n'est donc pas nécessaire de s'y connecter pour que la connexion soit momentanément impossible. Là encore, il sera impossible de réactiver le Wi-Fi en se rendant dans les réglages de l'appareil. Étrange, non ? « It's not a , it's a feature »

phonandroid.com/iphone-nouveau

The police had warned last month that WhatsApp accounts could be hacked_ by crooks using a complex method that exploits default PINs for accessing voicemail. **StarHub still using default voicemail PINs likely abused by scammers to hack WhatsApp accounts. Scammers had found a way to take over people's WhatsApp accounts to pose as a friend and trick them into parting with money in a gold scam.

straitstimes.com/tech/tech-new

eu-LISA Consolidated Annual Activity Report 2020

The Management Board of the European Union Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice (eu-LISA) has analysed and assessed the Agency's Consolidated Annual Activity Report on the achievements and results for 2020.

eulisa.europa.eu/Publications/

CYBERCRIME : THIRD REPORT OF THE OBSERVATORY FUNCTION ON ENCRYPTION

People in the EU are becoming increasingly worried about security online, as well as about rising exposure to hate speech, other abusive and criminal behaviour, and use of encryption as a weapon in the form of . Law enforcement continue to argue that important parts of the world are « going dark », and there is a need for reliable and sufficiently rapid and scalable ways to access plaintext (decrypted data and messages).

This 3rd report of the Observatory Function on encryption builds on previous reports and looks at the relevant technical and legislative developments, re-visiting some topics, which deserved further consideration. In the interim between this and previous reports, there have only been a few developments in European Union (EU) Member States' national legal regimes to incorporate new provisions that tackle the challenge of encryption in criminal investigations. These new approaches can be categorised into two distinct parts: one deals with tools that directly tackle encryption and the others category provides for tools to gain access to content before it is encrypted, or after it is decrypted and bypass encryption altogether. This is further underpinned by jurisprudence that exemplifies the use of the provisions mentioned. Insights are shared on encryption in the context of cross-border cases.

europol.europa.eu/sites/defaul

RadioSploit is an application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets from a Samsung Galaxy S20 without requiring any additional hardware : it diverts the Bluetooth controller to add new offensive capabilities

github.com/RCayre/radiosploit

U.S Federal law enforcement agencies secretly seek the data of thousands of times a year, according to congressional testimony Wednesday by a senior executive at the technology company.

« Most shocking is just how routine secrecy orders have become when law enforcement targets an American's email, text messages or other sensitive data stored in the cloud » said Tom Burt ( Microsoft's corporate vice president for customer security and trust), describing the widespread clandestine as a major shift from historical norms. « Without reform, abuses will continue to occur and they will occur in the dark »

apnews.com/article/government-

Collections of tools and methods created to aid in OSINT collection

github.com/sinwindie/OSINT/

World-leading chemical distribution company Brenntag has shared additional info on what data was stolen from its network by operators during an attack from late April 2021 that targeted its North America division. The chemical distribution company is headquartered in Germany and has more than 17,000 employees worldwide at over 670 sites. The data exfiltrated by the DarkSide attackers includes « Social Security Number, Date of Birth, driver's license number and select medical information. The chemical distributor company paid a $4.4 million ransom to DarkSide for a decryptor and to prevent the ransomware gang from leaking the stolen data.

bleepingcomputer.com/news/secu

Dutch police have seized a server of the Russian-affiliated hacker group DarkSide. Data stored on DarkSide's server was not encrypted and the police were therefore able to investigate the information. Strangely, police found no data on the Colonial Pipeline cyberattack.

After talking to Kaseya we can now give the background story on who found the 0-day and how we collaborated with them to cope with the current Kaseya VSA attacks. It's time to be a bit more clear on our role in this incident. First things first, yes, Wietse Boonstra, a DIVD researcher, has previously identified a number of the 0-day vulnerabilities [CVE-2021-30116] which are currently being used in the ransomware attacks. And yes, we have reported these vulnerabilities to Kaseya under responsible disclosure guidelines.

csirt.divd.nl/2021/07/04/Kasey

Plus anciens