Author: Admin

The US Department of Justice (DOJ) announced on Thursday an allegation of a 36-year-old national Yemen for allegedly deploying Black Kingdom ransom against global goals, including enterprises, schools and hospitals in the US. Rami Khaled Ahmed from Sana, Yemen, was charged with one conspiracy, one of their intentional damage to the protective computer and one of the data on the threat of damage to the secure computer. Ahmed is currently being rated in Yemen. “From March 2021 to June 2023, Ahmed and other infected computer networks of several victims in the US, including a medical company for billing services to…

Read More

02 May 2025Red LakshmananData Privacy / Social Media The Ireland Data Protection Commission (DPC) fined the popular Tiktok 530 million video exchange platform on Friday for violation of data protection rules in the region, transmitting data from European users to China. “Tiktok violated GDPR regarding the transfer of CES users (European economic zone) to China and transparency requirements,” DPC – Note In a statement. “The decision includes administrative fines totaling 530 million euros and an order that requires a scoring to transfer its processing within 6 months.” In addition, the order requires the company to suspend data transfer to China…

Read More

02 May 2025Hacker NewsOperations Vulneration / Security Operations In the Tines Library, run by the team on Workflow Orchestration and AI Tines Tines Publication of the community. A recent highlight is a workflow that automates CISA security recommendations and other suppliers, enriches consultations with Crowdstrike Persondation Intelligence, and streamlines tickets and notifications. Designed by Josh McLaflin, LivePerson security engineers, the workflow dramatically reduces manual work, keeping analysts that control the final solutions, helping the teams to stay on top of new vulnerabilities. “Before automation, the creation of tickets for 45 vulnerabilities took about 150 minutes of work,” Josh explains. “After…

Read More

02 May 2025Red LakshmananCriminal software / intelligence threats Loader malicious programs known as A coin loader was used to deliver Trojan remote -based pawershel under the name Ghostwaver. “MINSLOAADER runs through a multi -metal infection network that includes in – Note In a report that shared with Hacker News. “The malicious programs use methods of evading sandbox and virtual machine, domain generation algorithm (DGA) and HTTP Command-Control (C2). Phishing and Drive-by Download Companies Distributed A coin loader were discovered in the wild since the beginning of 2023, per Cyberdefense Orange. The loader is observed to provide various subsequent useful loads…

Read More

02 May 2025Red LakshmananPassword safety / window A year after Microsoft announced Passkeys support for consumer accounts, the technological giant has announced a big shift that pushes people who are signed on new credentials to use the phishing authentication method by default. “Absolutely new Microsoft accounts will now” default “,” Microsoft Joy Chik and Vasu Jakkal – Note. “New users will have several options without a password for signing them in their account, and they will never need to enroll your password. Existing users may visit their account settings to delete their password.” The Windows manufacturer said he also simplified…

Read More

01 May 2025Red LakshmananMalicious software / network Cybersecurity researchers spilled light on a new company aimed at WordPress that mask malicious software as a safety plugin. The plugin, which goes under the name “wp-tsymalwary-bot.php” comes with different features to maintain access, hide from the administrator’s dashboard and the remote code. “Also included is the functionality of the jacket that can report the command and control (C&C) server, as well as the code that helps distribute malicious software into other catalogs and introduces malicious JavaScript, which is responsible for advertising service,” Marco Wotchka Wordfence, Marco Wotchka WordFence ” – Note In…

Read More

Russian companies were sent as part of a large -scale phishing Darkwatchman. The targets include organizations in the media, tourism, financing and insurance, production, retail, energy, telecommunications, transport and biotechnology sectors, Russian cybersecurity company F6 – Note. Activities are evaluated as a financially motivated group called Hive0117, which has been attributed to IBM X-Force for attacks Aimed at users of Lithuania, Estonia and Russia, which cover telecommunications, electronic and industrial sectors. Then in September 2023, Darkwatchman’s malicious software was again used In the field of phishing campaign aimed at energy, finance, transport and safety software based in Russia, Kazakhstan, Latvia…

Read More

01 May 2025Red LakshmananArtificial intelligence / misinformation Artificial Intelligence Company (AI) Anthropic has disclosed that unknown threatening subjects used their Claude Chatbot for “influence as a service” on interaction with valid accounts on Facebook and X. It is said that the complex activity, called financially motivated, used its AI tool for the orchestration of 100 different persons on two social media platforms, creating a network “politically aligned accounts”, which was engaged in “10 thousand” authentic accounts. Anthropic researchers who have now been destroyed, noted that prioritizing persistence and longevity over vital force and sought to strengthen the moderate political perspectives…

Read More

Safety Operations Teams (SOC) face a fundamentally new problem-trading tools of cybersecurity cannot detect advanced opponents who have become experts to evade the defense based on the final points and signature detection systems. The reality of these “invisible attackers” is a significant need for a multilayer approach to detecting threats, including decisions for network detection and response (NDR). The invisible problem of the attacker Imagine that your network was compromised – not today or yesterday, but months ago. Despite your significant investment in the safety tools running 24/7, the advanced opponent moves quietly on your systems, gently avoiding detection. They…

Read More

For over ten years, the security group has been faced with rigid irony: the more advanced the steel detection tools, the less useful their results have turned out. As the alerts from the static analysis tools, scanners and cve databases grew, the best security promise became more far away. In its place, the new reality became interested – one definitely by fatigue and overloaded teams. According to security eye 2025 Application Safety Reportstaggering 95-98% Appsec notice do not require action – And in fact it can harm organizations more than help. Our research, which covers more than 101 million security…

Read More