Author: Admin

December 25, 2024Ravi LakshmananSecurity / Server Vulnerability The Apache Software Foundation (ASF) has provided security updates to address a critical security flaw in the Traffic Management System that, if successfully exploited, could allow an attacker to execute arbitrary Structured Query Language (SQL) commands in a database. SQL injection vulnerability, tracked as CVE-2024-45387rated 9.9 out of 10.0 on the CVSS rating system. “Traffic Ops SQL Injection Vulnerability in Apache Traffic Control = 8.0.0 allows a privileged user with the “admin”, “federation”, “operations”, “portal” or “management” roles to execute arbitrary SQL against the database by sending a specially crafted PUT request,” project…

Read More

December 25, 2024Ravi LakshmananCloud Security / Vulnerability Cybersecurity researchers have discovered several security flaws in a cloud management platform developed by Ruijie Networks that could allow an attacker to take control of network devices. “These vulnerabilities affect both the Reyee platform and Reyee OS networking devices,” Claroty researchers Noam Moshe and Tomer Goldschmidt said in a recent analysis. “These vulnerabilities, if exploited, could allow an attacker to execute code on any cloud device, giving them the ability to control tens of thousands of devices.” An operational technology (OT) security company that conducted in-depth research into an Internet of Things (IoT)…

Read More

December 25, 2024Ravi LakshmananCyber ​​attack / malware An Iranian nation-state hacking group known as Charming Kitten has been spotted deploying a C++ variant of a well-known malware called BellaCiao. The Russian cyber security company Kaspersky announced the new version BellaCPPsaid it discovered the artifact as part of a “recent” investigation into a hacked machine in Asia that was also infected with the BellaCiao malware. BellaCiao was first documented by Romanian cybersecurity firm Bitdefender in April 2023, describing it as a custom dropper capable of delivering additional payloads. The malware was deployed by a hacker group for cyber attacks targeting the…

Read More

December 24, 2024Ravi LakshmananMalware/data theft Cybersecurity researchers have identified two malicious packages that were uploaded to the Python Package Index (PyPI) repository and were equipped with capabilities to steal sensitive information from compromised nodes, reports new findings from Fortinet FortiGuard Labs. Packages, no beautiful and recorder of cometsattracted 118 and 164 downloads each before being taken down. According to ClickPy statistics, a the majority of them loading came from the USA, China, Russia and India. Zebo is “a typical example of malware with features designed for surveillance, data theft, and unauthorized monitoring,” security researcher Jenna Wang said, adding that cometlogger…

Read More

December 24, 2024Ravi LakshmananSoftware Vulnerability / Security The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added A high-severity security flaw affecting Acclaim Systems USAHERDS to known vulnerabilities is now fixed (KEV) catalog based on evidence of active exploitation in the wild. The vulnerability in question CVE-2021-44207 (CVSS Score: 8.1), a case of hard-coded static credentials in Acclaim USAHERDS that could allow an attacker to execute arbitrary code on sensitive servers. In particular, this applies to the use of static ValidationKey and DecryptionKey values ​​in versions 7.4.0.1 and earlier, which can be used for remote code execution on the…

Read More

December 24, 2024Ravi LakshmananCybercrime / Malware Japanese and U.S. authorities have previously attributed the theft of $308 million worth of cryptocurrency to cryptocurrency company DMM Bitcoin in May 2024 to North Korean cyber actors. “The theft is linked to the TraderTraitor threat, which is also tracked as Jade Sleet, UNC4899 and Slow Pisces,” the agencies said. said. “TraderTraitor’s activities are often characterized by targeted social engineering targeting multiple employees of the same company at the same time.” The warning comes courtesy of the US Federal Bureau of Investigation, the Defense Cybercrime Center and the Japanese National Police Service. It should…

Read More

December 24, 2024Ravi LakshmananVulnerability / Zero Day The Apache Software Foundation (ASF) has released a security update to address a critical vulnerability in its Tomcat server software that could lead to remote code execution (RCE) under certain conditions. Vulnerability, tracked as CVE-2024-56337was described as incomplete mitigation for CVE-2024-50379 (CVSS Score: 9.8), another critical security flaw in the same product that was previously addressed on December 17, 2024. “Users running Tomcat on a case-insensitive file system with servlet writing enabled by default (read-only initialization parameter set to a non-default value of false) may require additional configuration to fully mitigate CVE-2024-50379, depending…

Read More

December 23, 2024Ravi LakshmananMachine learning / threat analysis Cybersecurity researchers have discovered that large-scale language models (LLMs) can be used to create new variants of malicious JavaScript code at scale in a way that better evades detection. “Although it is difficult for undergrads to create malware from scratch, criminals can easily use it to rewrite or obfuscate existing malware, making it more difficult to detect,” Palo Alto Networks Unit 42 researchers said in a new analysis. “Criminals can trick LLM into performing transformations that look much more natural, making detection of this malware more difficult.” With enough transformations over time,…

Read More

December 23, 2024Ravi LakshmananPhishing / Cybercrime A break in the Phishing as a Service (PhaaS) toolkit was caused. Rockstar 2FA led to a rapid uptick in activity due to another nascent offering called FlowerStorm. “It appears that the group (Rockstar2FA) running the service has experienced at least a partial collapse of their infrastructure, and pages related to the service are no longer accessible,” Sophos said. said in a new report published last week. “It appears that this was not due to a takedown, but due to some technical failure in the server side of the service.” Rockstar2FA was documented for…

Read More

December 23, 2024Ravi LakshmananSpy software / Mobile security Meta Platforms-owned WhatsApp has scored a major legal victory in its battle with Israeli commercial spyware vendor NSO Group after a federal judge in the US state of California ruled in favor of the messaging giant for exploiting a security vulnerability to deliver Pegasus. “The limited evidence presented at trial indicates that Defendants’ Pegasus code was sent through Plaintiffs’ California servers 43 times during the relevant time period in May 2019,” U.S. District Judge Phyllis J. Hamilton said. The order again criticized NSO Group, saying it had “repeatedly failed to make appropriate…

Read More