cyberveille.decio.ch

cyberveille.decio.ch

7048 bookmarks
Custom sorting
Hackers target WordPress calendar plugin used by 150,000 sites
Hackers target WordPress calendar plugin used by 150,000 sites
Hackers are trying to exploit a vulnerability in the Modern Events Calendar WordPress plugin that is present on more than 150,000 websites to upload arbitrary files to a vulnerable site and execute code remotely. #Actively #Calendar #Computer #Events #Exploited #File #InfoSec #Modern #Plugin #Security #Upload #Vulnerability #WordPress
·bleepingcomputer.com·
Hackers target WordPress calendar plugin used by 150,000 sites
Decrypted: DoNex Ransomware and its Predecessors
Decrypted: DoNex Ransomware and its Predecessors
Researchers from Avast have discovered a flaw in the cryptographic schema of the DoNex ransomware and its predecessors. In cooperation with law enforcement organizations, we have been silently providing the decryptor to DoNex ransomware victims since March 2024. The  cryptographic weakness was made public at Recon 2024 and therefore we have no reason to keep […]
·decoded.avast.io·
Decrypted: DoNex Ransomware and its Predecessors
'Welcome to Londonistan': the Great Replacement theory gone visual ahead of the U.K. election
'Welcome to Londonistan': the Great Replacement theory gone visual ahead of the U.K. election
The captions are vague, yet the implicit message is clear: Few people in the videos are white, which should concern you. It's what Dr. Beatriz Buarque, a politics researcher at the London School of Economics (LSE) who specializes in conspiracy theories and the digital politics of truth, calls "a visual representation of The Great Replacement theory," the far-right premise that non-white immigrants are part of a systematic scheme to replace white westerners and their culture. A conspiracy theory Dr. Buarque describes as "very dangerous," as it channels hate toward Muslim, Black, and brown individuals and portrays a segment of the population as invaders and enemies.
·logicallyfacts.com·
'Welcome to Londonistan': the Great Replacement theory gone visual ahead of the U.K. election
Europol coordinates global action against criminal abuse of Cobalt Strike
Europol coordinates global action against criminal abuse of Cobalt Strike
Abuse by cybercriminals Cobalt Strike is a popular commercial tool provided by the cybersecurity software company Fortra. It is designed to help legitimate IT security experts perform attack simulations that identify weaknesses in security operations and incident responses. In the wrong hands, however, unlicensed copies of Cobalt Strike can provide a malicious actor with a wide range of attack capabilities.Fortra...
·europol.europa.eu·
Europol coordinates global action against criminal abuse of Cobalt Strike
A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too
A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too
Early last year, a hacker gained access to the internal messaging systems of OpenAI, the maker of ChatGPT, and stole details about the design of the company’s A.I. technologies. The hacker lifted details from discussions in an online forum where employees talked about OpenAI’s latest technologies, according to two people familiar with the incident, but did not get into the systems where the company houses and builds its artificial intelligence.
·nytimes.com·
A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too
Europol coordinates global action against criminal abuse of Cobalt Strike | Europol
Europol coordinates global action against criminal abuse of Cobalt Strike | Europol
Abuse by cybercriminals Cobalt Strike is a popular commercial tool provided by the cybersecurity software company Fortra. It is designed to help legitimate IT security experts perform attack simulations that identify weaknesses in security operations and incident responses. In the wrong hands, however, unlicensed copies of Cobalt Strike can provide a malicious actor with a wide range of attack capabilities.Fortra...
·europol.europa.eu·
Europol coordinates global action against criminal abuse of Cobalt Strike | Europol
CVE-2024-29510 - Exploiting Ghostscript using format strings
CVE-2024-29510 - Exploiting Ghostscript using format strings
A format string vulnerability in Ghostscript ≤ 10.03.0 which enables attackers to gain Remote Code Execution (#RCE) while also bypassing sandbox protections. CVE-2024-29510 has significant impact on web-applications and other services offering document conversion and preview functionalities as these often use Ghostscript under the hood. We recommend verifying whether your solution (indirectly) makes use of Ghostscript and if so, update it to the latest version!
·codeanlabs.com·
CVE-2024-29510 - Exploiting Ghostscript using format strings