Plus récents

Abusing Microsoft Office - The OceanLotus group of state-sponsored hackers are now using the web archive file format (.MHT and .MHTML) to deploy to compromised systems. Several techniques used by attackers to deliver through infected files.

netskope.com/blog/abusing-micr

KB5009543 & KB5009566 - After installing Updates, users find their L2TP VPN connections broken when attempting to connect using the Windows client. For the moment, it is not clear what caused the « bug ».

bleepingcomputer.com/news/micr

, & spreading campaign uses public cloud infrastructure - Threat actors are increasingly using to achieve their objectives without having to resort to hosting their own . These types of cloud like Microsoft Azure and Amazon AWS allow attackers to set up their infrastructure and connect to the with minimal time or monetary commitments. It also makes it more difficult for defenders to track down the attackers' operations. This actor is using the DuckDNS dynamic DNS service to change domain names of the C2 hosts.

blog.talosintelligence.com/202

🇨🇦 The Canadian Security Intelligence Service (CSIS), for the first time, is warning individual MPs and senators from all major parties about operations being carried out by China and other adversarial states. « This is different from « normal conduct » in that it's or and includes efforts such as exploitative relationships, gifts, free travel, blackmail, bribes, , attacks and . » « We're dealing with increased hostile state activity targeting our democratic system »

theglobeandmail.com/politics/a

🇺🇸 The U.S. State Department has announced a reward of up to $10 million for information about that leads to the identification or location of leaders of the /#DarkSide groups.

hipaajournal.com/doj-indicts-2

Who is the Network Access Broker Wazawaka ? According to their posts on Exploit, Wazawaka has worked with at least two different affiliate programs, including and .

L'attaque informatique qui a visé ministère de la Défense le 16 décembre 2022, semble plus grave qu'initialement diagnostiquée. Une partie des infrastructures militaires toujours déconnectées d'Internet. Pour la ministre en charge de la Défense, cette attaque illustre plus que jamais la nécessité de développer une cinquième composante au sein de l’armée belge. « Nous souhaitons toutefois insister sur le fait que l'attaque n'a eu aucun impact sur notre niveau opérationnel»

lalibre.be/belgique/societe/20

🇺🇸 For the second day in a row, schools within the Neenah Joint School District (neenah.k12.wi.us) will remain closed Wednesday due to a cyber security situation affecting the district.

youtube.com/watch?v=uxJaTyCd9-

La plus grande plateforme de NFT sportifs Lympo (lympo.io) victime d'une attaque informatique. 165,2 millions de tokens LMT ($18.7 million) ont été volés suite à l'exploitation d'une faille de sécurité.

medium.com/lympo-official/comm

⚔ U.S State Department spokesperson Ned Price holds a briefing after North Korea appeared to test-fire a ballistic that South Korea's says may be more advanced than a one it launched less than a week ago.

youtube.com/watch?v=gLpx0hA_Ft

La cantonale jurassienne lance une mise en garde après l'apparition de cas d'arnaques aux « faux techniciens ». Près d'une dizaine de personnes ont ainsi déposé plainte au cours des dernières semaines après avoir été victimes de cette au faux . L'escroc tente de s'emparer des données de la personne lésée pour ensuite accéder à ses comptes bancaires.

rjb.ch/rjb/Actualite/Region/20

🇨🇭 Une partie des systèmes informatiques du Groupe Emil Frey (emilfrey.ch), entreprise zurichoise spécialisée dans l'importation et le commerce d'automobiles, impactée par une attaque informatique.

blick.ch/wirtschaft/behoerden-

( CVE-2021-20038 | CVE-2021-20039 | CVE-2021-20040 | CVE-2021-20041 | CVE-2021-20042 ) - SonicWall SMA 100 Multiple Vulnerabilities. As these devices are designed to be exposed to the internet, the only effective remediation for these issues is to apply the vendor-supplied updates.

rapid7.com/blog/post/2022/01/1

Microsoft today released updates to plug nearly 120 security holes in Windows and supported . The most severe flaw addressed today is 🔥 CVE-2022-21907, a critical, Remote Code Execution flaw in the « HTTP Protocol Stack » (HTTP.sys) Microsoft says the flaw affects Windows 10 and Windows 11, as well as Server 2019 and Server 2022..

krebsonsecurity.com/2022/01/wo

🇮🇳 Huhtamaki's (huhtamaki.com) Flexible Packaging business in India has been subjected to a data breach during a ransomware attack, which resulted in archived data being stolen.

huhtamaki.com/en/highlights/re

APT35 (aka Charming Kitten, TA453, Phosphorus), which is suspected to be an Iranian nation-state actor, exploits Log4j vulnerability (CVE-2021-44228) to distribute new modular toolkit.

defenseone.com/technology/2022

Plus anciens