in

Veille #Cybersécurité du 06/08/2014

Tout ce qu’il ne fallait pas manquer aujourd’hui dans votre veille #Cybersécurité. Bonne lecture !


Watching the Watchers: Tracking the Activities of the Chinese Cyber Spies


http://www.matthewaid.com/post/93765066391

What if Google was an intelligence agency ?


Since 1998, Google has grown to become an essential part of the web infrastructure and took an important place in the daily lives of millions. Google offers great products, from search engine to video hosting, blogs and productivity services.

http://zonedinteret.blogspot.com/2014/08/what-if-google-was-intelligence-agency.html

Dude, How Secure Is My Connected Car?


The driverless car may be here before we know it. A county in Iowa, wanting to be in the forefront of autonomous vehicles, has already passed a resolution to allow them on its streets, reports USA Today.

http://www.esecurityplanet.com/network-security/dude-how-secure-is-my-connected-car.html

Code malveillant : Août, le mois des analyses pré-conférences


Est-ce dû à une relative période de calme liée aux trêves estivales ? Ou bien encore une volonté de redorer le blason du monde de la sécurité « commerciale », sérieusement terni en raison de ses longues années de myopie durant la période ante-Snowden ? Ou plus probablement une forme d

http://www.cnis-mag.com/code-malveillant-aout-le-mois-des-analyses-pre-conferences.html

Android malware SandroRAT disguised as mobile security app


Researchers are again warning users to steer clear of app downloads from unvetted sources, particularly since new Android malware is making the rounds through phishing emails.

http://www.scmagazine.com/android-malware-sandrorat-disguised-as-mobile-security-app/article/364455/

Change Doesn’t Have to be the Enemy of Security


Your network is constantly evolving through hundreds of changes per day. These changes can chip away at your security posture and any one of those changes could be the one that introduces a major security risk. Somewhere out there a hacker is coming up with new ways to access your critical data.

http://www.tripwire.com/state-of-security/risk-based-security-for-executives/risk-management/change-doesnt-have-to-be-the-enemy-of-security/

Ecrit le 04/08/14 à 10:29AfterWork de l’OSSIR Paris le mardi 23 septembre 2014


Le prochain AfterWork organisé par l’OSSIR Paris aura lieu le mardi 23 septembre 2014 à partir de 19h00 à l’adresse suivante : Bar « La Kolok »20 rue du croissant 75002 Paris Exceptionnellement lors de cette soirée, chaque adhérent (à jour de sa cotisation) pourra venir accompagné d’un invit

http://www.ossir.org/actualite/2014/08/04/afterwork-de-lossir-paris-le-mardi-23-septembre-2014.shtml

The Science Behind DDoS Extortion


So goes the adage that usually accompanies ransom-based cyber-attacks.

https://www.infosecisland.com/blogview/23900-The-Science-Behind-DDoS-Extortion.html

Inside the Backdoor Techniques Used in Advanced Attacks


Disrupting a network is one thing; maintaining access and controlling computers is another. That second part requires creating backdoors, which have become vital parts of cyber-attack campaigns.

http://www.securityweek.com/inside-backdoor-techniques-used-advanced-attacks

How Malware Writers Cheat AV Zero-Day Detection


A researcher reverse engineers AVG’s code emulation engine after easily bypassing other major antivirus software products. As an experiment, Kyle Adams wrote what he describes as « ridiculously obvious » malware that most major antivirus products ultimately failed to detect.

http://www.darkreading.com/vulnerabilities—threats/how-malware-writers-cheat-av-zero-day-detection/d/d-id/1297771

Planes Can Be Hacked Via Inflight Wi-fi, Says Researcher


63340645 story wired_parrot writes In a presentation to be shown Thursday at the Black Hat conference, cybersecurity consultant Ruben Santamarta is expected to outline how planes can be hacked via inflight wi-fi.

http://tech.slashdot.org/story/14/08/04/182209/planes-can-be-hacked-via-inflight-wi-fi-says-researcher

Israel Targets Hamas Cyber Warfare


Israel has sought to halt Hamas’ cyber warfare campaign. Military sources said Hamas and its allies have engaged in daily cyber attacks against critical facilities in Israel. They said targets have included Israel’s government, military and financial institutions.

http://israelbehindthenews.com/bin/content.cgi

Cryptographie et Djihadisme


Depuis longtemps, Al Qaeda (AQ) utilise des technologies de cryptographie pour sécuriser ses communications.

http://cyberland.centerblog.net/121-cryptographie-et-djihadisme#

toolsmith – Threats & Indicators: A Security Intelligence Lifecycle


*borrowed directly from my parent team, thanks Elliot and Scott Prerequisites Microsoft .NET Framework, Version 3.5 or higher for IOCe Python 2.

http://holisticinfosec.blogspot.fr/2014/08/toolsmith-threats-indicators-security.html

War Ram – Cyberespace et cybersecurite – Juillet Aout 2014


Document Transcript Do you want to play a game? Film culte, W ar Games met en scène un jeune hacker qui sans le vouloir se met à « jouer » avec un ordinateur surpuissant contrôlant les missiles nucléaires.

http://www.slideshare.net/WarRam/war-ram-cyberespace-et-cybersecurite-juillet-aout-2014

FireEye, Fox-IT launch free service to combat Cryptolocker ransomware


FireEye and Fox-IT have launched a free tool to assist victims of the CryptoLocker ransomware. Announced on Wednesday, the new service, dubbed DecryptCryptoLocker, is available for free to assist those impacted by the CryptoLocker ransomware.

http://www.zdnet.com/fireeye-fox-it-launch-free-service-to-combat-cryptolocker-ransomware-7000032372/#ftag=RSS4d2198e

Dragonfly/Havex Reference Material


The following material was compiled from a variety of relability sources, and contains information covering the various aspects of the Dragonfly/Energetic Bear campaign and the Havex trojan directly and indirectly targeting industrial control systems.

https://scadahacker.com/resources/havex.html

Des pirates informatiques russes auraient volé plus d’un milliard de mots de passe


Le quotidien tire ses informations de chercheurs de la société de sécurité informatique Hold Security. A l’en croire, les pirates ont réussi à avoir accès à quelque 500 millions de comptes e-mail.

http://mobile.lemonde.fr/pixels/article/2014/08/06/des-pirates-informatiques-russes-auraient-vole-plus-d-un-milliard-de-mots-de-passe_4467212_4408996.html#xtor=RSS-3208

With Operation Torpedo, FBI infects Tor websites with “drive-by” spyware to identify visitors (Kevin Poulsen/Wired)


Enter Techmeme snapshot date and time:

http://www.techmeme.com/140805/p34#a140805p34

Separating Cybersecurity Hype from Reality


LAS VEGAS — The big players in the global information-security industry are intermingling with computer hackers this week at the annual Black Hat conference in Las Vegas.

http://townhall.com/columnists/rachelmarsden/2014/08/06/separating-cybersecurity-hype-from-reality-n1875075

The Dilemma of PCI Scoping – Part 2


In Part 1 I discussed how isolation is an answer, but probably not a viable answer for almost all but the most security conscientious of organizations such as the military, defense contractors or those that can afford that sort of painstaking luxury.

https://www.infosecisland.com/blogview/23904-The-Dilemma-of-PCI-Scoping–Part-2-.html

In supersecret cyberwar game, civilian-sector techies pummel active-duty cyberwarriors


When the military’s top cyberwarriors gathered last year inside a secretive compound at Fort Meade, Maryland, for a classified war game exercise, a team of active-duty troops faced off against several teams of reservists. And the active-duty team apparently took a beating.

http://www.armytimes.com/article/20140804/NEWS04/308040019/In-supersecret-cyberwar-game-civilian-sector-techies-pummel-active-duty-cyberwarriors

Former NSA Director Defends His New For-Profit Cyber Consulting Form


WASHINGTON — The recently retired director of the National Security Agency is defending his bid to develop a new cybersecurity model for paying clients, saying his approach doesn’t derive from work he did for the government.

http://www.matthewaid.com/post/93906112266

Fiesta Exploit Kit Starts Delivering a Double Payload


The Fiesta exploit kit has apparently learned a new trick, and is dropping two pieces of malware on unsuspecting victims’ machines. “A few days ago, we began noticing a strange new pattern with the Fiesta exploit kit.

http://www.infosecurity-magazine.com/news/fiesta-exploit-kit-starts-delivering-a-double/

IcoScript RAT Hides Behind Yahoo! Email Addresses


A classic remote administration tool (RAT) dubbed IcoScript has been discovered, after going undetected since 2012.

http://www.infosecurity-magazine.com/news/icoscript-rat-hides-behind-yahoo/

Un rapport du Sénat favorable au bitcoin et aux monnaies virtuelles


Des jetons représentant des pièces de bitcoins.

http://mobile.lemonde.fr/pixels/article/2014/08/05/un-rapport-du-senat-favorable-au-bitcoin-et-aux-monnaies-virtuelles_4466894_4408996.html

NSA – temps de faire le (premier) point.


En 1988, le journaliste Duncan Campbel révèla l’existence d’un programme de renseignement, Echelon, dans un article pour The New Statesman qui s’intitulait « Somebody’s listening ».

http://www.libwalk.so/2014/07/14/NSA-temps-de-faire-le-premier-point.html

How to foil SynoLocker and minimize the damage


We wrote on Monday warning about Synology NAS users being targeted with SynoLocker, a customized version of the Cryptolocker ransomware, which encrypts the files contained on the devices and asks 0.6 BitCoin ($350) for the decryption key.

http://www.net-security.org/malware_news.php

Deep Panda has Changed its Preferred Targets – CrowdStrike


Softpedia.com reported during first week of July 2014 stating that security researchers of CrowdStrike have observed a change in preferred targets of cyber-espionage group of Deep Panda which the company puts among the invasion group sponsored by most advanced state.

http://spamnews.com/The-News/Latest/Deep-Panda-has-Changed-its-Preferred-Targets—CrowdStrike-2014080517289/



Vous pouvez également vous abonner à cette veille #Cybersécurité via un flux RSS dédié : https://www.cyber-securite.fr/category/veille-cyber/feed

Vous aimerez aussi cet article:

Newsletter

Envie de ne louper aucun de nos articles ? Abonnez vous pour recevoir chaque semaine les meilleurs actualités avant tout le monde.

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *