Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2025-05-02 23:28:40 |
Minority (Forensic) Report aka défendre l'avant sans piratage Minority (forensic) report aka defending forward w/o hacking back (lien direct) |
Nous aimons mettre un fossé entre la détection et la réponse. Beaucoup d'entre nous conviennent en quelque sorte que l'analyse de la télémétrie est une chose et l'examen médico-légal des preuves en est une autre. Cependant… dans cet article, j'essaierai de… Continuer la lecture →
We love to put a wedge between the detection and response. Many of us kinda agree that telemetry analysis is one thing and the actual forensic examination of the evidence is another. However… In this post I will try to … Continue reading → |
|
APT 24
|
★★★
|
 |
2023-05-24 21:29:00 |
Harvard Pilgrim Health Care informe les individus d'incident de confidentialité Harvard Pilgrim Health Care Notifies Individuals of Privacy Incident (lien direct) |
Pas de details / No more details |
|
APT 24
|
★★
|
 |
2022-12-21 19:15:14 |
CVE-2022-36221 (lien direct) |
Nokia Fastmile 3tg00118abad52 is affected by an authenticated path traversal vulnerability which allows attackers to read any named pipe file on the system. |
Vulnerability
|
APT 24
|
|
 |
2022-12-21 19:15:14 |
CVE-2022-36222 (lien direct) |
Nokia Fastmile 3tg00118abad52 devices shipped by Optus are shipped with a default hardcoded admin account of admin:Nq+L5st7o This account can be used locally to access the web admin interface. |
|
APT 24
|
|
 |
2021-12-27 22:15:07 |
CVE-2021-45896 (lien direct) |
Nokia FastMile 3TG00118ABAD52 devices allow privilege escalation by an authenticated user via is_ctc_admin=1 to login_web_app.cgi and use of Import Config File. |
|
APT 24
|
|
 |
2019-07-22 08:04:00 |
New APT34 campaign uses LinkedIn to deliver fresh malware (lien direct) |
The APT24 group continues its cyber espionage activity, its members were posing as a researcher from Cambridge to infect victims with three new malware. Experts at FireEye have uncovered a new espionage campaign carried out by APT34 APT group (OilRig, and HelixKitten. Greenbug) through LinkedIn. Members of the cyberespionage group were posing as a researcher from Cambridge […]
|
Malware
|
APT 24
APT 34
|
|