Plus récents

🚆 A computer « glitch » in a railway signalling system caused train traffic disruptions in , and , French rail giant Alstom said Thursday. The problem has been detected and is in the process of being fixed, a spokesman for the company said, adding that it was not a cyberattack.

barrons.com/news/computer-glit

🇮🇹 Les opérateurs Lockbit revendiquent une attaque informatique sur la commune italienne de Villefranche (villafrancapiemonte.to.it)

Dragos has observed consistent network communication between Emotet C2 servers and numerous auto manufacturing companies. These servers are suspected to be controlled by the Conti ransomware group.

dragos.com/blog/industry-news/

Denso (denso.com), a multibillion supplier to key automotive companies like Toyota, Mercedes-Benz and Ford, confirmed that cybercriminals leaked stolen, classified information from the Japan-based car-components manufacturer after an attack on one of its offices in Germany.

threatpost.com/pandora-ransomw

On March 15, 2022, users of the popular Vue.js frontend started experiencing what can only be described as a chain attack impacting the npm ecosystem. This was the result of the nested dependencies node-ipc and peacenotwar being sabotaged as an act of protest by the maintainer of the node-ipc package.

hhttps://snyk.io/blog/peacenotwar-malicious-npm-node-ipc-package-vulnerability/

CVE-2022-25636 : Nick Gregory discovered a hole in 🐧 's netfilter program that's « exploitable to achieve kernel code execution », giving full local privilege escalation, container escape, ..

nickgregory.me/linux/security/

Les sont connues pour leurs applications financières, ce qui éclipse malheureusement bien souvent leurs nombreux autres intérêts. Renaud Lifchitz s'est focalisé sur les principes, techniques et projets blockchain concrets qui apportent un réel intérêt d'un point de vue confidentialité, intégrité, disponibilité ou authentification.

dailymotion.com/video/x892mry

🌐 2022-03-16 14:36:33 UTC | M 7.5 - Namie, 🇯🇵 Japan | A tsunami adivsory has been issued for Miyagi and Fukushima prefectures.

youtube.com/watch?v=8yUCdMy8w2

A detailed post on how Daniel Eshetu chained 3 vulnerabilities (A path traversal (CVE-2021-45968), an SSRF in an external piece of software (CVE-2021-45967) and a post-authentication RCE (CVE-2021-45966)) into a full pre-auth RCE in 🇩🇪 Pascom (pascom.net) Cloud phone system.

kerbit.io/research/read/blog/4

🔥 CVE-2022-26320 - Fermat Attack on RSA. Multiple printers of the Fujifilm Apeos, DocuCentre and DocuPrint series generate self-signed TLS certificates with vulnerable RSA keys. Some Canon printers have the ability to generate a CSR with a vulnerable RSA key. Both the Fujifilm and the Canon printers use the Basic Crypto Module of the Safezone library by Rambus. Other products using this module to generate RSA keys may also be affected.

fermatattack.secvuln.info/

As Windows doesn't verify that the SIDs exist on the domain when an ACL is created it's possible to insert a non-existent SID into any object's ACL we have privileges over. The main exploitation vector here is persistence. Threat actors with domain control can add permissions and privileges to future SIDs and regain a foothold by creating a user or computer account.

varonis.com/blog/synthetic-sid

Security researchers went on to predict that ransomware totals would reach 714 million by the end of the year, constituting a 134% year-over-year increase.

cybereason.com/blog/leveraging

🇺🇸 U.S. Senator for Florida, Marco Rubio warns of rising risk of cyberattacks amid russian invasion of Ukraine.

youtube.com/watch?v=sSlHy6Zhee

Plus anciens