Author: Admin

July 26, 2024Hacker newsDigital Warfare / Cyber ​​Security Training “Peace is the virtue of civilization. War is its crime. But often in the mines of war the sharpest tools of peace are forged.” – Victor Hugo. In 1971, an alarming message began to appear on several computers that made up the ARPANET, the precursor to what we now know as the Internet. A post that says “I’m the Creeper: Catch Me If You Can.” was the result of a program called Creeper that was developed by the famous programmer Bob Thomas while he was working at BBN Technologies. Although Thomas’s…

Read More

The US Department of Justice (DoJ) on Thursday unsealed an indictment against a North Korean military intelligence operator for allegedly carrying out ransomware attacks on the country’s medical facilities and sending payments to orchestrate additional intrusions into defense, technology and government organizations across the country. the world “Rim Jeong Hyuk and his associates developed extortion programs to extort money from American hospitals and health care companies, and then laundered the proceeds to help finance North Korea’s illicit activities.” said Paul Ebbett, Deputy Director of the Federal Bureau of Investigation (FBI). “These unacceptable and illegal actions put innocent lives at risk.”…

Read More

July 26, 2024Mohit KumarEnterprise Security / Network Security CrowdStrike warns about an unknown threat actor trying to take advantage Falcon Sensor update fiasco distribute dubious installers targeting German customers in a highly targeted campaign. The cybersecurity firm said it identified an unattributed phishing attempt on July 24, 2024 that distributed a bogus CrowdStrike Crash Reporter installer via a website posing as an unnamed German organization. The impostor site is said to have been created on July 20, a day after update failed disabled nearly 9 million Windows devices, causing major IT disruptions around the world. “After the user clicks the…

Read More

July 26, 2024Information hall Cybersecurity researchers sound the alarm over a campaign that uses information about the Internet Selenium Grid Services for illegal cryptocurrency mining. Cloud Security Wiz tracks activity under name SeleniumGrad. A campaign targeting older versions of Selenium (3.141.59 and earlier) is believed to be ongoing at least from April 2023. “What most users don’t know is that the Selenium WebDriver API provides full interaction with the machine itself, including reading and downloading files and executing remote commands,” Wiz researchers Avigail Mechtinger, Gilly Tikaczynski, and Dor Laska said. “By default, authentication is not enabled for this service. This…

Read More

July 26, 2024Information hallSoftware Security / Vulnerability Progress Software urges users to update their instances of Telerik Report Server after discovering a critical security flaw that could lead to remote code execution. Vulnerability, tracked as CVE-2024-6327 (CVSS score: 9.9), affects Report Server version 2024 Q2 (10.1.24.514) and earlier. “Remote code execution attacks are possible in versions of the Progress Telerik Report Server prior to Q2 2024 (10.1.24.709) via a dangerous deserialization vulnerability,” the company said in a statement. said in the consulting room. Deserialization errors occur during use reconstructs unreliable data over which an attacker has control without proper validation,…

Read More

July 25, 2024Information hallMalware / cyber espionage The North Korea-linked threat, known for its cyber espionage operations, has gradually evolved into financially motivated attacks that include the deployment of ransomware, setting it apart from other nation-state hacking groups linked to the country. Google-owned Mandiant is tracking the activity cluster under a new alias APT45which overlaps with names like Andariel, Nickel Hyatt, Onyx Sleet, Stonefly and Silent Chollima. “APT45 is a long-standing moderate North Korean cyber operator that has conducted espionage campaigns as far back as 2009,” researchers Taylor Long, Jeff Johnson, Alice Revelli, Fred Plan and Michael Barnhart said. “APT45…

Read More

July 25, 2024Information hallCloud Security / Vulnerability Cybersecurity researchers have disclosed a privilege escalation vulnerability affecting the Google Cloud Platform cloud service that an attacker could use to gain unauthorized access to other services and sensitive data. It is stable given a vulnerability called ConfusedFunction. “An attacker can elevate their privileges to the default Cloud Build service account and gain access to many services, such as Cloud Build, the repository (including the source code of other features), the artifact registry, and the container registry,” the company said in a statement exposure management. “This access allows for lateral movement and elevation…

Read More

July 25, 2024Information hallCyber ​​Crime / Internet Security On Wednesday, Meta Platforms said it had taken steps to remove about 63,000 Instagram accounts in Nigeria that were found to be targeting people with financial scams. “These included a smaller coordinated network of approximately 2,500 accounts that we were able to link to a group of approximately 20 people,” the company said in a statement. said. “They targeted mostly adult males in the US and used fake accounts to disguise their identities.” In cases where some of these accounts attempted to target minors, Meta said it reported them to the National…

Read More

July 25, 2024Hacker newsBrowser Security / Enterprise Security The browser is the nerve center of the modern workspace. Ironically, the browser is also one of the least protected threats in today’s businesses. Traditional security tools provide little protection against in-browser threats, leaving organizations at risk. Modern cyber security requires a new defense-based approach the browser itself, which ensures security and seamless deployment. In an upcoming live webinar (Register here), Or Ashed, CEO of browser security company LayerX, and Christopher Smedberg, Director of Cyber ​​Security at Advance Publishing, will discuss the challenges facing today’s businesses in the new world of hybrid…

Read More

July 25, 2024Information hallDNS Security/Vulnerability The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (CONNECT) 9 A Domain Name System (DNS) software package that can be used to initiate a Denial of Service (DoS) condition. “A cyber threat actor could exploit one of these vulnerabilities to cause a denial of service condition,” the US Cybersecurity and Infrastructure Security Agency (CISA) said. said in the consulting room. The list of four vulnerabilities is listed below – CVE-2024-4076 (CVSS Score: 7.5) – Due to a logic error, lookups that initiated maintenance of…

Read More