Author: Admin

March 14, 2025Red LakshmananCyberCrime / Ransomware The 51-year-old dual Russian and Israeli national, which is supposed to be the developer of the ransom group Lockbit Ransomware, was issued in the US, almost three months after he was officially charged with the electronic crimes scheme. Rostislav was previously arrested in Israel in August 2024. He is like saying Invested In law enforcement. “Rastislav Panev’s extradition to New Jersey district makes it clear: if you are a member of the Lockbit Conspiracy, the United States will find you and lead to justice,” ” -” ” – Note US Prosecutor John Jordan. Lockbit…

Read More

March 14, 2025Red LakshmananMobile Safety / encryption The GSM Association (GSMA) has officially announced the encryption support to the end (E2EE) to provide messages sent via the Protocol of Rich Communication Services (RCS), bringing the necessary security protection to cross messages that are divided between Android and iOS platforms. To this end, new GSMA specifications for RCS include E2Ee based on message security (MLS) through what is called RCS Universal Profile 3.0. “New technical characteristics determine how to apply MLS in the context of RCS”, Tom Van Pelt, GSMA technical director, – Note. “These procedures ensure that messages and other…

Read More

Most traders fail before they even leave the ground – too complex, too slow, too devastating. But Andelyn Biosciences proved that it should not be like that. Brand: Missing a piece in zero trust safety Today, security groups are under constant pressure to defend themselves against increasingly complex cyber spagrosis. The perimeter -based protection can no longer provide sufficient protection because the attackers transfer their attention to the lateral movement in the networks of the enterprises. With more than 70% of successful violations involving the attackers moving away, the organizations rethink how they provide domestic traffic. Bickenetation appeared as a…

Read More

March 14, 2025Hacker NewsData Protection / Redemption Cyber ​​-Prosis develop daily. In this live seminar, find out how accurately unfolds the extortion attacks – from the original violation to the moment the hackers require payment. Join Joseph Carson, Chief Delinea Security Scientist and CISO Advisory, which brings 25 years of enterprise security. Through a а Live demonstrationIt will destroy each technical step attack on the redemption, showing you how hackers use vulnerabilities and encrypt data – clear, simple language. What do you learn Attack of initiation: Understand how hackers use software errors and weak passwords to break your network. Hacker…

Read More

March 14, 2025Red LakshmananSoftware / cybercrime Users looking for pirate software Malicious software for Clipper called Massjacker, according to Cyberk. Malicious software for Clipper – this type cry . “The infection network begins on the site called Pesktop (.) Com”, AR Novik Research – Note In an analysis published earlier this week. “This site, which presents itself as a site for pirate software, also tries to make people download all sorts of malware.” The initial executed file acts as a pipe for running a PowerShell script that provides the specified malicious Botnet software Amadeyas well as two other .Net-binary files,…

Read More

March 14, 2025Red LakshmananIntelligence threats / malicious software A new malicious program has been noted that use social engineering tactics R77. Activities condemned Incomprehensible # bat According to Securonix, it allows the subject to threaten perseverance and elimination from detection on impaired systems. It is now unknown who is behind the company. Rootkit “has the ability to cry or mask any file, registry key or task starting with a specific prefix,” – Den Iuzvyk and Tim Peck Researchers – Note In a report that shared with Hacker News. “It is focused on users or masking as legitimate software downloads, or…

Read More

Say Kospy Orientation to Korean and English -speaking users. The look, which shared the details of the campaign on malware, stated that the earliest versions dated in March 2022. The last samples were indicated in March 2024. It is unclear how successful these efforts were. “Kospy can collect extensive data such as SMS -messages, call logs, placement, files, audio and screenshots using dynamically loaded plugins,” company company – Note In the analysis. Malicious masquerade artifacts as a utilized app in the Google Play official store, using name file manager, phone manager, Smart Manager, software upgrade and Kakao safety to fool…

Read More

Microsoft shed light on the current phishing campaign aimed at the hospitality sector by presenting itself to the Booking.com online tourist agency, using an increasingly popular social engineering technique called Clickfix for malware. According to the technological giant, it began in December 2024 and operates for the purpose of conducting financial frauds and thefts. This is the tracking company nicknamed Storm-1865. “This phishing attack is specifically aimed at the Hospitality Organization in North America, Oceania, Southern and Southeast Asia, as well as North, South, Eastern and Western Europe, which are most likely – Note In a report that shared with…

Read More

March 13, 2025Red LakshmananAuthentication / vulnerability The Ruby-Saml Library revealed two high-level security deficiencies, which could allow malicious actors to bypass the security check (SAML). SAML-is the XML-based marking language and the open standard used to share data on authentication and authorization between the parties, which allows as a one-time entry (SSO), allowing people to use a single set of credentials to access multiple sites, services and applications. Vulnerabilities tracked as Cve-2025-25291 and Cve-2025-25292Carnate CVSS 8.8 out of 10.0. They affect the following versions of the library – = 1.13.0,

Read More

As the IT environment becomes more complicated, IT professionals face unprecedented pressure to provide critical data for business. With the help of hybrid work, the new standard and cloud reception, the data are increasingly distributed in different conditions, providers and places, expanding the surface of the attack for new cyber -translations. Although the need for a strong data protection strategy has become more critical than when, organizations get into a tough balancing act. They are struggling to manage the growth and complexity of business continuity and resumption of the consequences of the disaster (BCDR), while providing that their important business…

Read More