Author: Admin

February 20, 2025Red LakshmananSoftware / vulnerability Microsoft has released security updates to solve two deficiencies affecting Bing and Power, including the one that has been actively operating in the wild. Vulnerabilities shown below – Cve-2025-21355 (CVSS assessment: 8.6) – Vulnerability of the remote Microsoft Bing code with deleted code Cve-2025-24989 (CVSS assessment: 8.2) – Microsoft Power Pages Elevation of PASING PRIVILEGE VU “The lack of authentication for a critical function in Microsoft Bing allows an unauthorized attacker to execute the code on the network,” the technological giant said in an advisory order for the CVE-2025-21355. Customer action is not required.…

Read More

February 20, 2025Red LakshmananVulnerability / IT -safety Citrix has released security updates for high -speed security lack, affecting the NetsCaler Console (previously NetsCaler ADM) and the NetsCaler agent, which could escalate privileges under certain conditions. Vulnerability tracked as Cve-2014-12284received a CVS V4 8.8 score of 10.0 This has been described as a case of incorrect privilege management, which could lead to authentified escalation privileges if the NetScale console agent will be deployed and allows the attacker to perform actions after a compromise. “The problem arises from the -insufficient privilege management and can be used by authentified malicious actors to execute…

Read More

February 19, 2025Red LakshmananMobile Safety / Cyber ​​-bue Several actors coordinated by Russia were noted, oriented to people who are of interest, through an application -focused application to gain unauthorized access to their accounts. “The Most Novel and Widely used Technique Underpinning Russian-Aligned Accounts is the abuse of the app’s legitimate ‘linked devices’ feather that enables sigal Concurrently, “The Google Threat Intelligence Group (Gtig) – Note In the report. As a result of the attacks revealed by the technological giant exploration groups, the threat subjects, including tracking as the UNC5792, resorted to malicious QR codes, which when scanning would bind…

Read More

February 19, 2025Hacker NewsCriminal software / intelligence threats The new option A snake key Malicious software is used for active targeting on Windows users located in China, Turkey, Indonesia, Taiwan and Spain. Fortinet Fortiguard Labs said the new version of the malicious software lag behind 280 million blocked attempts worldwide since the beginning of the year. “Usually provided through phishing -leaves containing malicious attachments or links, a snake Keylogger is designed for theft of secret information from popular web browsers such as Chrome, Edge and Firefox, writing the keys, recording credentials and monitoring the Kevin’s safety. Suu Suu Suu Su…

Read More

The growing demand for cybersecurity services and compliance is an excellent opportunity for managed service providers (MSP) and managed security providers (MSSPS) to offer virtual information security services (Vciso) high-level Cybersecurity Guide without the cost of AA full. However, the transition to VCISO services is not deprived of problems. Many service providers are fighting the structure, pricing and efficiency of the sale of these services. That’s why we created Final Guide for the structure and sale of Vciso services. This guide, created in collaboration with Jesse Miller, experienced Vciso and the founder of PowerPSA Consulting, offers effective strategies to move…

Read More

February 19, 2025Hacker NewsWindows / malicious software safety Users who are on the search for popular games have been enlisted in the loading of the trapped installers, which led to the deployment of the miner cryptocurrency on the compromised hosts of Windows. A large -scale activity has been registered Oldydobry A Russian cybersecurity company Kaspersky, who first discovered it on December 31, 2024. It lasted a month. The goals of the company include people and enterprises around the world, and the Casperson telemetry reveals higher concentrations of infection in Russia, Brazil, Germany, Belarus and Kazakhstan. “This approach has helped the…

Read More

February 19, 2025Red LakshmananIntelligence threats / vulnerability Cybersecurity and US Infrastructure Agency (CISA) added Two disadvantages of security affectShip) A catalog based on evidence of active operation. Disadvantages are below – Cve-2025-0108 (CVSS Assessment: 7.8) -Vulnerability of Authentification Passage Palo Alto Web Interface Pan -OS, which allows unauthorized attackers with network access to the management interface to get around authentication, usually required and causes certain scenarios Cve-2024-53704 (CVSS Assessment: 8.2) – Incorrect Authentication Vulnerability in SSLVPN authentication mechanism, which allows a remote attacker to bypass authentication Palo Alto Networks has since confirmed Hacker News that she noticed active attempts to…

Read More

February 18, 2025Red LakshmananVulnerability / safety network Two safety vulnerabilities were found in the Safe OpenSSH Secure network, which can be successfully used by an active machine (MITM) and a refusal attack (DOS), respectively, under certain conditions. Vulnerability minute According to the study threaten Qualys (TRU), there is listed below – Cve-2025-26465 – The Openssh Client Contains A Logic Error Between Versions 6.8p1 to 9.9p1 (inclusive) A LEGITIMATE Server When A Client Attempts To Connect To This (introduced in December 2014) Cve-2025-26466 – Customer and server Openssh vulnerable to the DOS attack before the sensor between versions 9.5p1 to 9.9p1…

Read More

February 18, 2025Red LakshmananCyber ​​-bue / malicious software Chinese state actor threats known as Mustang Panda It has been noted that a new technique is used to eliminate and maintain control of infected systems. This involves the use of legitimate Microsoft Windows Utilities called Microsoft Application Virtualization Injector (Mavinject.exe) to introduce a harmful useful load of the actor into external process, waitfor.exe, every time the use of the ESET anti -virus is discovered – Note In a new analysis. “The attack includes a refusal of several files, including legitimate executable files and malicious components, as well as deploying PDF baits…

Read More

February 18, 2025Red LakshmananMalicious software / network safety Chinese actor threats known as Winnti was attributed to a new company named Revivalsstone This is aimed at Japanese companies in the production, materials and energy sectors in March 2024. Activity minute The Japanese Cybersecurity Company crosses with the threat cluster, tracked by Trend Micro as The land of Freibugwhich was evaluated by the subsidiary within the cyber -Spying APT41 Cuckoo operationand Symantec like Blackfly. APT41 It was described as a highly qualified and methodical actor with the ability to strengthen the espionage attacks, as well as poison the supply chain. His…

Read More