Found 1498 bookmarks
Custom sorting
Exploring Killnet's Social Circles
Exploring Killnet's Social Circles
It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally a group emerges that is more transparent than others. Examining a criminal organization’s social presence can give analysts valuable insights into the structure and operations of the organization, as well as the relationships and connections between its members and the community around them.
·blog.radware.com·
Exploring Killnet's Social Circles
An unfaithful employee leaked Yandex source code repositoriesSecurity Affairs
An unfaithful employee leaked Yandex source code repositoriesSecurity Affairs
A source code repository allegedly stolen by a former employee of the Russian tech giant Yandex has been leaked online. A Yandex source code repository allegedly stolen by a former employee of the Russian IT giant has been leaked on a popular cybercrime forum. The announcement published on BreachForums includes a magnet link to the alleged […]
·securityaffairs.com·
An unfaithful employee leaked Yandex source code repositoriesSecurity Affairs
Cybercriminals stung as HIVE infrastructure shut down
Cybercriminals stung as HIVE infrastructure shut down
In the last year, HIVE ransomware has been identified as a major threat as it has been used to compromise and encrypt the data and computer systems of large IT and oil multinationals in the EU and the USA. Since June 2021, over 1 500 companies from over 80 countries worldwide have fallen victim to HIVE associates and lost almost...
·europol.europa.eu·
Cybercriminals stung as HIVE infrastructure shut down
Following the LNK metadata trail
Following the LNK metadata trail
While tracking some prevalent commodity malware threat actors, Talos observed the popularization of malicious LNK files as their initial access method to download and execute payloads. A closer look at the LNK files illustrates how their metadata could be used to identify and track new campaigns.
·blog.talosintelligence.com·
Following the LNK metadata trail
Bitzlato: senior management arrested
Bitzlato: senior management arrested
Almost half of all Bitzlato transactions linked to criminal activities Targeting crucial crime facilitators such as crypto exchanges is becoming a key priority in the battle against cybercrime. Bitzlato allowed the rapid conversion of various crypto-assets such as bitcoin, ethereum, litecoin, bitcoin cash, dash, dogecoin and USDT into Russian roubles. It is estimated that the crypto exchange platform has received...
·europol.europa.eu·
Bitzlato: senior management arrested
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Summary Three key takeaways from our analysis of Vidar infrastructure: Russian VPN gateways are potentially providing anonymity for Vidar operators / customers, making it more challenging for analysts to have a complete overview of this threat. These gateways now appear to be migrating to Tor. Vidar operators appear to be expanding their infrastructure, so analysts need to keep them in their sights. We expect a new wave of customers and as a result, an increase of campaigns in the upcoming weeks
·team-cymru.com·
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Ransomware Diaries: Volume 1
Ransomware Diaries: Volume 1
The LockBit ransomware gang is one of the most notorious organized cybercrime syndicates that exists today. The gang is behind attacks targeting private-sector corporations and other high-profile industries worldwide. News and media outlets have documented many LockBit attacks, while security vendors offer technical assessments explaining how each occurred. Although these provide insight into the attacks, I wanted to know more about the human side of the operation to learn about the insights, motivations, and behaviors of the individuals on the other side of the keyboard. To prepare for this project, I spent months developing several online personas and established their credibility over time to gain access to the gang’s operation.
·analyst1.com·
Ransomware Diaries: Volume 1
Enregistrez un contact de sécurité sur votre site Internet
Enregistrez un contact de sécurité sur votre site Internet
19.01.2023 - En cas de problème de cybersécurité au sein d'une entreprise ou d'une organisation, il est crucial d'en informer aussitôt le responsable de la sécurité. Or, il est généralement difficile, voire impossible, de retrouver ce dernier sur les sites Internet. La norme «security.txt» sert à indiquer de manière uniforme le responsable de la sécurité d'une entreprise ou d'une organisation, ce qui permet de prendre contact avec lui plus rapidement.permet de prendre contact avec lui plus rapidement.
·ncsc.admin.ch·
Enregistrez un contact de sécurité sur votre site Internet
Technical Advisory – Multiple Vulnerabilities in the Galaxy App Store (CVE-2023-21433, CVE-2023-21434)
Technical Advisory – Multiple Vulnerabilities in the Galaxy App Store (CVE-2023-21433, CVE-2023-21434)
The Galaxy App Store is an alternative application store that comes pre-installed on Samsung Android devices. Several Android applications are available on both the Galaxy App Store and Google App Store, and users have the option to use either store to install specific applications. Two vulnerabilities were uncovered with the Galaxy App Store application: Technical…
·research.nccgroup.com·
Technical Advisory – Multiple Vulnerabilities in the Galaxy App Store (CVE-2023-21433, CVE-2023-21434)
Des hackers détournent des sites de l’UE pour voler des infos bancaires
Des hackers détournent des sites de l’UE pour voler des infos bancaires
Plusieurs noms de domaine de l'Union européenne ont été utilisés par des malfaiteurs pour promouvoir des sites de streaming gratuits. Ces liens sont en réalité des pièges pour dérober des informations bancaires. Le vrai défi d'un piratage réside dans la manière de présenter le piège à la victime. Plutôt que d'envoyer
·numerama.com·
Des hackers détournent des sites de l’UE pour voler des infos bancaires
ManageEngine CVE-2022-47966 Technical Deep Dive
ManageEngine CVE-2022-47966 Technical Deep Dive
Introduction On January 10, 2023, ManageEngine released a security advisory for CVE-2022-47966 (discovered by Khoadha of Viettel Cyber Security) affecting a wide range of products. The vulnerability allows an attacker to gain remote code execution by issuing a HTTP POST request containing a malicious SAML response. This vulnerability is a result of  using an outdated […]
·horizon3.ai·
ManageEngine CVE-2022-47966 Technical Deep Dive