Pouet épinglé

đŸ‡ȘđŸ‡ș Europol Decryption Platform

A new decryption platform marks a milestone in the fight against organised crime and terrorism in Europe. In full respect of fundamental rights and without limiting or weakening encryption, this initiative will be available to national law enforcement authorities of all Member States to help keep societies and citizens safe & secure.

La plateforme, basĂ©e dans le nord de l'Italie, Ă  Ispra n'est autre qu'un super-calculateur capable de casser des terminaux chiffrĂ©s inaccessibles aux enquĂȘteurs.

đŸ’Ș Le projet CERBERUS a Ă©tĂ© intialisĂ© par le đŸ‡«đŸ‡· colonel Jean Dominique Nollet.

europol.europa.eu/newsroom/new

Pouet épinglé

đŸ‡«đŸ‡· Vous avez dĂ©couvert une vulnĂ©rabilitĂ© / une faille de sĂ©curitĂ© et vous souhaitez en faire part au gouvernement ?

Citoyens, signaler, c'est agir !

VĂ©rifiez d'abord que la faille / vulnĂ©rabilitĂ© ne soit pas dĂ©jĂ  connue et suffisamment sĂ©rieuse pour ĂȘtre notifiĂ©e par ce moyen. Ensuite, prenez le temps nĂ©cessaire afin de produire un rapport complet avec les dĂ©tails techniques de l'exploitation.

ssi.gouv.fr/actualite/vous-sou

Les opérateurs derriÚre le ransomware Conti revendiquent une attaque contre :

  • đŸ‡ș🇾 MEDTRON Software Intelligence Corporation (medtronsoftware.com)

MEDTRON is a team of dedicated and knowledgeable individuals specializing exclusively in the healthcare industry. We provides integrated Practice Management (PM) & Electronic Health Records (EHR) solutions to medical practices of all sizes and specialties. With over 30 years experience in the industry and daily use of our software solutions through our sister company MEDDATA Service Bureau

-PRESCRIBING

Project Zero has recently launched our own initiative aimed at researching new ways to detect 0-day exploits in the wild. Through partnering with the Google Threat Analysis Group (TAG), one of the first results of this initiative was the discovery of a watering hole attack in Q1 2020 performed by a highly sophisticated actor.

We discovered two exploit servers delivering different exploit chains via watering hole attacks. One server targeted users, the other targeted . Both the Windows and the Android servers used exploits for the initial remote code execution. The exploits for Chrome and Windows included 0-days.

This is part 1 of a 6-part series detailing a set of vulnerabilities being exploited in the wild.

googleprojectzero.blogspot.com

Les opérateurs derriÚre le ransomware Egregor revendiquent une attaque contre :

  • đŸ‡ș🇾 Transform SR Brands LLC (transformco.com)

Transformco is a leading integrated retailer focused on seamlessly connecting the digital and physical shopping experiences to serve its members - wherever, whenever and however they want to shop. Transformco is home to Shop Your WayÂź, a social shopping platform offering members rewards for shopping at Sears, Kmart and other retail partners.

đŸ‡ș🇾 WASHINGTON - President-elect Joe Biden and Vice President-elect Kamala Harris announced additional members of the National Security Council (NSC), including both restoring the role of Assistant to the President for Homeland Security and Deputy National Security Advisor and establishing a new position of Deputy National Security Advisor for Cyber and Emerging Technology.

Anne Neuberger is the National Security Agency's Director of Cybersecurity, where she leads NSA's cybersecurity mission, including emerging technology areas like quantum-resistant cryptography.

buildbackbetter.gov/press-rele

Ubiquiti (ui.com)

We recently became aware of unauthorized access to certain of our information technology systems hosted by a third party cloud provider.

We cannot be certain that user data has not been exposed. Data may include your name, email address, and the one-way encrypted password to your account and may also include your address and phone number if you have provided that to us.

mailchi.mp/ubnt/account-notifi

Les opĂ©rateurs derriĂšre le ransomware Clop revendiquent Ă©galement une attaque contre 🇬🇧 Amey plc (amey.co.uk)

En guise d'échantillon, des captures écrans de courriels, documents confidentiels (contrats,..), documents scannés (passports,carte de séjour,..)

Afficher le fil de discussion

Les opérateurs derriÚre le ransomware Avaddon revendiquent une attaque contre :

  • 🇼🇳 Allanasons Pvt Ltd (allana.com)

The Allana Group is India's largest exporter of processed food products and agro commodities, including Frozen / Chilled Meat, Processed / Frozen Fruit and Vegetable products, Coffee, Spices and Cereals. Allana export to the requirements of over 85 countries in the world while maintaining the highest standards of quality in procurement, manufacturing and distribution.

Mimecast annonce la compromission de l'un de ses certificats pour Microsoft 365 Exchange.

Microsoft recently informed us that a Mimecast-issued certificate provided to certain customers to authenticate Mimecast Sync, Recover, Continuity Monitor and IEP products to Microsoft 365 Exchange Web Services has been compromised by a sophisticated threat actor.

mimecast.com/blog/important-up

  • đŸ‡ș🇾 OmniTRAX, Inc. (omnitrax.com)

OmniTRAX, headquartered in Denver, operates 21 short line railroads in the U.S. and one in Canada. We provide access to the North American Freight Rail Network. This company is a subsidiary of The Broe Group, a privately held energy development and real estate company.

The attack occurred sometime before Dec. 24, based on the timing of the ransomware gang's post. The leak itself suggests that the Broe Group, which owns OmniTRAX as part of a multibillion dollar portfolio and is headquartered at the same location, refused to pay the hackers’ ransom demands. A sample of the 70 gigabytes leaked. It was not clear if it included data pertaining to OmniTRAX's rail operations or its customers.

(PRESSE) freightwaves.com/news/ransomwa

Les opérateurs derriÚre le ransomware NetWalker revendique une attaque contre :

  • đŸ‡©đŸ‡Ș [Bremskerl-Reibbelagwerke Emmerling GMBH & CO. KG] (bremskerl.de)

Family owned globally active SME whose head office is in Estorf-Leeseringen, near Nienburg an der Weser. With 350 employees globally, 300 of whom work in Germany alone, we develop and manufacture brake and clutch linings for rail vehicles, industrial applications and commercial vehicles.

[release] La 3.7 de MemProcFS est sortie.

🛠 The Memory Process File System (MemProcFS) is an easy & convenient way of viewing physical memory as files in a virtual file system. Access memory content & artifacts via files in a mounted virtual file system or via a feature rich application library to include in your own projects đŸ•”

github.com/ufrisk/MemProcFS

Les opérateurs derriÚre le ransomware Nefilim continuent de faire fuiter des données concernant :

  • 🇩đŸ‡ș Toll Group
  • đŸ‡©đŸ‡Ș The Dussmann Group

Les opérateurs derriÚre le ransomware Avaddon revendiquent des attaques contre :

  • đŸ‡ș🇾 Biorep Technologies, Inc. (biorep.com)

Biorep Technologies : Developing regulated medical devices. We manufacture complex medical devices & components. Biorep Diabetes : For more than 20 years, we defeat diabetes with emerging technologies.

  • đŸ‡©đŸ‡Ș MK-Technik GmbH (mk-technik.de)

Computer company in Augsburg, Germany. Bereits seit 1990 arbeitet der Inhaber von MK-Technik Informationstechnologie Michael Keller selbstĂ€ndig in der Systemintegration. Wir sind Experten fĂŒr IT, Systemintegration und Netzwerktechnik.

👁 socat a partagĂ©

Why I contribute to OpenBSD 

In my opinion, OpenBSD strengths are privacy, security and old hardware compatibility.

When I contribute to OpenBSD, I do it in hope it will provide a good platform for people who need to defend their freedom or fight for it.

The OpenBSD project does its best to stay neutral, it's only about writing good code and using good practice, and not about pleasing someone.

Thank you for using #openbsd , I hope it help to defend your #privacy and #freedom :flan_thumbs:

Suite du piratage de Capcom Co., Ltd. du 2 novembre 2020.

As there is an ongoing investigation in place, it is possible that new facts may come to light going forward. Below is a general summary of what new information has been confirmed at this point in time (as of January 12, 2021).

capcom.co.jp/ir/english/news/h

Afficher le fil de discussion

Le démantÚlement de cette place de marché clandestine est lié au coup de filet opéré en septembre 2019 en Allemagne contre un important hébergeur de services illégaux du darknet baptisé Cyberbunker, a précisé le parquet.

Ce datacenter illégal installé dans un ancien bunker de l'OTAN, dans la campagne du Rhénanie-Palatinat (ouest), est soupçonné d'avoir hébergé plusieurs plateformes de vente de drogues mais aussi des serveurs utilisés pour le trafic d'images pédopornographiques ou des cyberattaques.

(PRESSE: laliberte.ch/news-agence/detai)

Afficher le fil de discussion

👼 DĂ©mantĂšlement de la plateforme DarkMarket, un marchĂ© noir de l'internet clandestin, qui comptait 500 000 de comptes utilisateurs, 2 400 vendeurs et plus 320 000 transactions approchant un total de 140 millions d'euros.

DarkMarket facilitait le trafic de drogues, d'armes, d'ĂȘtres humains, de blanchiments, de fausses monnaies / cartes de crĂ©dits, faux documents, d'identitĂ©s, de passeports, de codes malveillants, de cartes SIM,.. et mĂȘme des services de chantages, harcĂšlements, d'enlĂšvements ou d'assassinats.

Plusieurs interpellations. Les donnĂ©es saisies permettront d'ouvrir de nouvelles pistes d'enquĂȘtes. Une excellente nouvelle. EspĂ©rons que ses successeurs ne soient pas pires car c'est un Ă©cosystĂšme rĂ©ellement trĂšs rĂ©silient.

europol.europa.eu/newsroom/new

🇹🇩 Depuis le samedi 9 janvier 2021, une importante panne informatique empĂȘche les accĂšs aux dossiers mĂ©dicaux personnels ou DSQ ( Dossier SantĂ© QuĂ©bec ).

Les informations patients ne peuvent plus ĂȘtre consultĂ©es.

(PRESSE) ici.radio-canada.ca/nouvelle/1

đŸ‡ș🇾 Compromission chez Accellion, Inc. (accellion.com)

Accellion is a Palo Alto, California-based private cloud solutions company focused on secure file sharing and collaboration. Customers are able to access, edit, and share enterprise content from any device while maintaining compliance and security.

🇳🇿 La RBNZ, la Banque centrale de la Nouvelle-ZĂ©lande ( Reserve Bank of New Zealand ) cliente et utilisatrice de la solution de transmission sĂ©curisĂ©e de piĂšces jointes FTA (File Transfer Application) indique ĂȘtre une victime collatĂ©rale. Des documents et informations sensibles ont peut-ĂȘtre fuitĂ©s.

La liste des victimes va s'allonger.

stuff.co.nz/business/123911764

Plus anciens
Miaou !

Miaou est une instance Mastodon faisant partie des CHATONS avec une forte orientation geek aimant l'open source, le libre et les chats