RÉSUMÉ De multiples vulnérabilités ont été corrigées dans le noyau Linux d’Ubuntu. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données. RISQUE(S) Atteinte à la confidentialité des données SYSTÈMES AFFECTÉS Ubuntu 16.04 LTS Ubuntu 17.10 GESTION DU DOCUMENT Référence CERTFR-2018-AVI-134 Titre Multiples vulnérabilités dans le noyau […]
Hacking
Sofacy Targets Government Agency with New Spear-Phishing Campaign
The Sofacy group, also known as APT28 and Fancy Bear, has carried out an attack on an unnamed European government agency using an updated variant of DealersChoice. Details of the attack, which have been published by Unit42 – part of Palo Alto Networks – describe the espionage group using doc.x […]
Are DDoS Attacks Increasing or Decreasing? Depends on Whom You Ask
Details on DDoS trends can vary, depending on the reporting source. Distributed denial-of-service (DDoS) attacks remain unpredictable and dangerous for enterprises, but actual details on how the threat is evolving can differ substantially by the reporting source. Two reports released this week, one by Verisign and the other from Nexusguard, are good examples. […]
Plugins for Popular Text Editors Could Help Hackers Gain Elevated Privileges
Whether you’re a developer, designer or a writer, a good text editor always help you save time and make you work more efficiently. For example, I use Sublime a lot while programming because it includes some useful tools like ‘syntax highlighting’ and ‘autocomplete’ that every advanced text editor should have. […]
FBI, DHS accuse Russia of critical infrastructure cyber attacks
Spear-phishing emails, watering-hole-domains, and credential gathering are just some of the TTPs said to be used during a long running cyber campaign. A report from the FBI and Department of Homeland Security has accused Russia of undertaking a critical infrastructure cyber attack. Already under the spotlight due to connections with […]
Tricks that cybercriminals use to hide in your phone
While analysts figure out new methodologies for analyzing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices. The convoluted tricks used to increase the effectiveness of their attacks can be grouped into two distinct categories: First, Social […]
LENOVO WARNS CRITICAL WIFI VULNERABILITY IMPACTS DOZENS OF THINKPAD MODELS
Lenovo warned customers on Friday that two critical Broadcom vulnerabilities impacts 25 models of its popular ThinkPad brand. The vulnerabilities were first revealed in September and originally they were only reported to impact specific Broadcom chipsets used in Apple iPhones, Apple TV and Android devices. Lenovo has expanded that list to include […]
CVE-2017-13253: Buffer overflow in multiple Android DRM services
As part of our platform research in Zimperium zLabs, we recently disclosed a buffer overflow vulnerability affecting multiple Android DRM services to Google. Google classified it as high-severity, designated it as CVE-2017-13253 and have patched it in the March security update. In this blog post, we’ll cover the details of the […]
NEW POS MALWARE PINKKITE TAKES FLIGHT
A new family of point-of-sale malware, dubbed PinkKite, has been identified by researchers who say the malware is tiny in size, but can delivered a hefty blow to POS endpoints. Researchers at Kroll Cyber Security first identified PinkKite in 2017 during a nine-month investigation into a large POS malware campaign […]
Free Mobile : une nouvelle tentative de phishing veut s’emparer de vos coordonnées bancaires
Une nouvelle tentative de phishing vise les abonnés Free Mobile ! Un utilisant un mail de rappel factice, les pirates cherchent à s’emparer de vos coordonnées bancaires. Pour endormir la méfiance de leurs cibles, les hackers n’hésitent pas à copier les courriers officiels envoyés par Free Mobile. Par chance, certains […]