Author: Admin
For over ten years, the security group has been faced with rigid irony: the more advanced the steel detection tools, the less useful their results have turned out. As the alerts from the static analysis tools, scanners and cve databases grew, the best security promise became more far away. In its place, the new reality became interested – one definitely by fatigue and overloaded teams. According to security eye 2025 Application Safety Reportstaggering 95-98% Appsec notice do not require action – And in fact it can harm organizations more than help. Our research, which covers more than 101 million security…
01 May 2025Red LakshmananZero day / threat of intelligence The Enterprise Data Commvault data platform showed that an unknown actor on the threat of a nation-state violated its Microsoft Azure Wednesday using CVE-2025-3928, but stressed that there is no evidence of unauthorized access to the data. “This activity has affected the small number of customers we have in common with Microsoft and we work with these customers to assist,” the company – Note In updates. “It is important to note that there has been no unauthorized access to customer backup data that Commvault retain and protect, and a significant impact…
01 May 2025Red LakshmananVulnerability / safety vpn Sonicwall showed that two security deficiencies were used in the wild that affect its safe mobile access (SMA). The vulnerabilities in question are below – Cve-2023-44221 (CVSS Assessment: 7.2) – Incorrect neutralization of special elements in the SMA100 SSL -VPN management interface allows for remote authenticated attackers with the administrative privilege for the introduction of arbitrary commands as a “no one” that potentially leads to vulnerability Cve-2024-38475 (CVSS assessment: 9.8) – Invalid escape from exit to MOD_REWRITE to Apache HTTP Server 2.4.59 and earlier allow the attacker to display the URL to submit…
April 30, 2025Red LakshmananArtificial Intelligence / Email Security As the artificial intelligence field (AI) continues to develop at a rapid pace, new studies have revealed as methods that make a model context (Mcp) sensitive to Surgical attacks of injections can be used to develop safety tools or detect malicious tools according to New Report from Tenable. MCP launched by anthropic in November 2024 is the basis designed to connect large language models (LLM) with external data sources and services, and use model tools to interact with these systems to enhance accuracy, relevance and usefulness of AI applications. Follows from the…
April 30, 2025Red LakshmananIntelligence threats / malicious software Cybersecurity researchers shed light on a Russian-speaking cyber-spanning group called Nebulate Mantis, which since mid-2012 has launched a remote access trojed called Romcom Rat Rat. Romcom “uses additional evading methods, including tactics (Lotl) and encrypted command and control (C2), while constantly developing its infrastructure-Using bullet-permeable hosting to maintain persistence and detecting the detection Prodaft Prodaft Prodaft Prodaft Prodaft Prodaft Company Prodaft Prodaft Company Prodaft Prodaft Company Prostaft Company Prostaft Company Prostaft Company Prostaft – Note In a report that shared with Hacker News. Nubulous Mantis, also tracked by the cybersecurity community under…
April 30, 2025Red LakshmananSecurity Malicious Programs / DNS Chinese aligned in China Group advanced permanent threat (APT) called Thewizards was associated with a side movement tool called Spellbinder, which can alleviate enemy attacks in the middle (AITM). “Spellbinder allows the opponents on average (AITM) attack via IPv6 Ardess Autoconfiguration (Vine) forgeryTo move in lateral mode in the broken network, intercepted packages and redirecting the traffic of the legitimate Chinese software to load malicious updates from the server controlled by the attackers, “Eset Facundo Muñoz – Note In a report that shared with Hacker News. The attack opens the way for…
April 30, 2025Hacker News How many spaces are hidden in your personality certificate? It is not just about the entrances. Today’s attackers should not “crack” the-they can deceive their way. Deep, scams that are part of themselves, and the social engineering that works on AI help them to bypass traditional defense and slip through unnoticed. Once inward, they can take into account, move toward and cause long-term damage-all without causing alarm. But here’s the catch: most organizations focus only on details About the life cycle of identity – usually authentication. This leaves critical gaps wide open during enrollment, recovery and…
Cybersecurity researchers showed it showed RansomHubThe Internet infrastructure “inexplicably” has been offline from April 1, 2025, which is concerned about the branches of the AS-A-Service (RAAS). Singaporean Cybersecurity Group-IB – Note What it can lead to migration to Qilin, given that “disclosure of information on DLS (data leak site) has doubled since February.” RansomHub estimates that first appeared in February 2024, stolen data from more than 200 victims. It replaced two loud groups of Raas, Lockbit and Blackcat to become a leader by grooming on their affiliates, including Scattered spider and An evil bodywith profitable payments. “After the possible acquisition…
Everyone has cybersecurity stories with the participation of family members. Here is relatively common. The conversation is usually approximately: “The most amazing thing that happened to my account. I was blocked from my account, so I had to change my password. When I logged back, all my shows left. Everything was in Spanish and all these Spanish shows I have never seen. Isn’t it surprising?” This is an example of an assembly attack on the customer account. Usually what is happening is that the streaming account is compromised, probably from the weak and re -used passwords, and the access is…
April 30, 2025Red LakshmananReliable coding / vulnerability Meta on Tuesday announced LlamafirewallOpen source frame designed to provide artificial intelligence (AI) systems emerging cyber -rickets For example, operational injection, jailbreak and a dangerous code, among others. A frameAccording to the company, it contains three fences, including DropeGuard 2, checking agent and code. Hint 2 Designed to identify direct attempts in real time, while checking agents is able to check the agents’ reasoning for possible goals and indirect injections. Codeshield refers to a static analysis internet, seeking to prevent the generation of dangerous or dangerous AI agents. “Llamafirewall built so – Note…