Author: Admin

February 24, 2025Red LakshmananSecurity / vulnerability of the final points Cybersecurity researchers warn of a new company that uses hacked software versions as bait for the spread of information thefts such as Lumma and ACR thefts. AHNLAB Safety Intelligence Center said he had observed the spike in the ACR’s theft of theft since January 2025. A noticeable aspect of malicious software for theft is the use of technology called Detolish Dead Drop To get the actual command and control server (C2). This includes reinforcing on legal services such as Steam, Telegram’s Telegraph, Forms Google and Google Slides. “The actors threaten…

Read More

Rushing does not immediately manage – it slowly floods your protection in the stages. As a ship that is lined with water, the attack begins quietly, under the surface, with thin warning signs that are easy to miss. As long as the encryption begins, too late to stop the flood. Each stage of ransom attack offers a small window to discover and stop the threat until it is too late. The problem is that most organizations do not observe the signs of the early warning – allowing the attackers to quietly disable backups, escalation of privileges and evading the detection…

Read More

February 24, 2025Red LakshmananCloud security / encryption Google Cloud has announced digital signatures Quantum Safe in Google Cloud Key Management (Cloudy km) For software keys as a method for Bulletproof encryption systems against the threat representing cryptographically related to quantum computers. The function that is now in the previous viewing coees with the standards of the National Institute of Standards and Technology (NIST) formalized In August 2024. “Our road card CMS KMS PQC includes support for Nist Post-Qantum crystography (FIPS 203, FIPS 205, both in the software (Cloud KMS), and in the Equipment (Cloud HSM) “,” Cloud Division “Company Company…

Read More

February 24, 2025Red LakshmananSoftware / Data Protection Australia has become the last country that prohibits the safety software in the Russian company, citing national security problems. “After considering the analysis of the threat and risk I determined that the use of products and web -Kaspersky Lab, Inc. sabotage,” Stephanie Foster PSM, secretary of the Department of Internal Affairs, – Note. “I also considered an important need for a strong political signal to critical infrastructure and other Australian governments regarding the unacceptable security risk associated with the use of products and web services Kaspersky Lab, Inc..” Foster noted that the organizations…

Read More

February 22, 2025Red LakshmananFinancial crime / cryptocurrency The exchange of cryptocurrencies on Friday showed that the “complex” attack led to the theft of over $ 1.46 billion with one of its Ethereum Hold’s wallets (offline, which made it the largest in the history of the crystal. “The incident happened when our Eth Multisig Cold Wallet execution Transfer to our warm wallet. Unfortunately, this deal was manipulated by a complex attack that masked the signing interface, showing the correct address, changing the basic logic of a reasonable contract, “bybit” – Note In a message on X. “As a result, the attacker…

Read More

February 22, 2025Red LakshmananMisinformation / artificial intelligence Openai on Friday disclosed What he banned the set of accounts that used his Chatgpt tool to develop a suspicious artificial intelligence tool (AI). It is said that the social media is likely to listen to social media Models LamaWith the accounting records that use AI models to create detailed descriptions and analysis of documents for the apparatus capable of collecting data in real time and report on anti-Chinese stocks in the West and share ideas with the Chinese authorities. The company was named an expert review of the ” -in -the -“…

Read More

February 21, 2025Red LakshmananObservation / Monitoring content Analysis of the Chinese TopSec cybersecurity company’s leak analysis that it probably offers censorship-like services for potential customers, including a state-owned enterprise in the country. Founded in 1995, Topsec allegedly offers services such as identifying and end -points (EDR) and vulnerability scan. But it also provides a “boutique” solution to coordinate with state initiatives and exploration requirements, Sentinelone researchers Alex Delomot and Alexandar Milenkoski – Note In a report that shared with Hacker News. Data leak contains details of infrastructure and work magazines from employees, as well as links to web monitoring services…

Read More

February 21, 2025Red LakshmananData Protection / Entertainment Apple removes its advanced data protection feature (ADP) for iCloud from the United Kingdom with immediate effect after government requirements for access to encrypted user data. Development was First reported by Bloomberg. Adp for iCloud – this Optional installation This ensures that the proxies of the user retain a single access client’s access keys used to unlock the data stored in its cloud. This includes a backup of iCloud, photos, notes, reminder, safari bookmarks, voice notes and related data. “We are seriously disappointed that the defenses provided by the DPP will not be…

Read More

February 21, 2025Red LakshmananDark Network / Cybercrime It seems to pull the phishing -fades on a scale. The latest phishing fierce fierce “is a significant shift in criminal possibilities, reducing the barrier for entering bad actors to focus on any brand with complex, customizable phishing companies,” Netcraft – Note In a new analysis. Cybersecurity company said it had discovered and blocked more than 95,000 new Darcula phishing domains, nearly 31,000 IPs and reduced more than 20,000 frauds because it was because it was For the first time exposed At the end of March 2024. The biggest change included in Darcula…

Read More

February 21, 2025Hacker NewsIdentity security / threat prevention In today’s rapidly developing digital landscape, poor identity safety is not just a disadvantage – it is the main risk that can expose your business disturbance and expensive downtime. Many organizations are overwhelmed by surplus user identity and aging, making them vulnerable to attacks. Without a strategic plan, these gaps in security can quickly turn into expensive commitments. Join us on “Building an Elastic Identity: Reduced Safety Debt in 2025” And discover reasonable, effective strategies for protecting your business from modern cyber -spagrosis. This webinar offers you the opportunity to cut the…

Read More