Author: Admin
February 14, 2025Red LakshmananZero day / vulnerability The threatening subjects that stood in favor of operating vulnerability with zero day in products with privileged remote access (PRA) and remote support (RS) in December 2024. Probably also used an unknown SQL injection in Postgresql, according to the results Rapid7. Vulnerability tracked as Cve-2025-1094 (CVSS assessment: 8.1) affects the interactive PostgreSQL PSQL tool. “The attacker who can create SQL injection via CVE-2025-1094 can reach an arbitrary code (ACE) using the interactive tool’s ability to launch meta co-coat,” Stephen’s less security researcher – Note. Next, the cybersecurity campaign noted that it made a…
AI is now everywhere, transforming how businesses work and how users are engaged in applications, devices and services. Many applications now have artificial intelligence, whether it is a chat interface support, intelligently analyzing data or the appropriate benefits of users. AI questions benefits users, but also brings new security issues, especially related security. Let’s learn what’s the problems and what you can do to face them with Okta. Which II? Everyone is talking about II, but this term is very common, and several technologies fall under this umbrella. For example, symbolic AI uses technologies such as logical programming, expert systems…
February 13, 2025Red LakshmananSecurity on the Internet / Security Cloud Was marked with extensive phishing Web The content shipping network (CDN) with the aim of stealing credit card information and financial fraud. “The attacker aims at the victims seeking documents on the search engines, leading to access to the malicious PDF, which contains the image of CAPTCHA, is built with a phishing link that makes them provide tangible information,” – a researcher at the threat of Netskope Jan Michael Alcantara – Note. Activities, which continued since the second half of 2024, entails users looking for book titles, documents and graphics…
February 13, 2025Red LakshmananThe United States The North Korea -related actor was associated with a permanent campaign aimed at the South Korean business, government and cryptocurrencies. The Atacine Company is named Deep#drive Securonix was attributed to a hacking group known as Kimaswhich is also tracked under the names of APT43, Black Banshee, cheeky sleet, shiny fish, springtail, ta427 and velvet Chollima. “Use, taking into account the phishing possessive possessive and disguised legal documents, the attackers successfully penetrated the target environment,” – Safety Researchers Den Iuzvyk and Tim Peck – Note In a report that is shared with Hacker News, describing…
February 13, 2025Hacker NewsApplication security / devops Did you feel that your team was stuck in a permanent battle? Developers are in a hurry to add new functions, and security people are worried about vulnerabilities. What if you could collect both sides without harming the second? We invite you to our upcoming webinar, “Opening a quick strip for safe deployment” This is not another technological conversation full of fashion words is a ground-down session that shows you the practical ways to strengthen your security in your projects from the beginning. Many teams face the usual problem: the security security at…
In November 2024, in November 2024, focused on the unnamed Asian software program and services, it provided for the use of a malicious tool used exclusively cyber spying used in China. “During the attack at the end of 2024, the attacker opened a clear set of tools previously used by a Chinese actor in classical espionage attacks,” the hunting team on Symantec, part Broadcom, – Note In a report that shared with Hacker News. “In all previous invasions related to the instruments, the attacker seemed to be engaged in classical espionage seemingly interested solely in maintaining permanent presence in the…
February 13, 2025Red LakshmananNetwork security / vulnerability Palo Alto Networks turned to high-speed security lack in its Pan-OS software, which could lead to bypass authentication. Vulnerability tracked as Cve-2025-0108Carries CVSS 7.8 out of 10.0. However estimate is reduced to 5.1 if access to management interface is limited jump. “Authentication software on Palo Alto Setworks Pan-OS networks allows unauthorized attackers with network access to the management web interface to get around authentication, otherwise requires Pan-OS web interface and causes certain scenarios”, “Palo Alto Networks” – Note In advisory. “When referring to these PHP scenarios, the removed code does not allow, it…
February 13, 2025Red LakshmananMalicious software / cyber -beno Senior hunting shed light on a new company aimed at the Ministry of Foreign Affairs of the unnamed South American nation with ordered malicious software capable of providing remote access to infected hosts. The activity revealed in November 2024 was referred to as an elastic security laboratory with the cluster threats he monitored as Ref7707. Some other goals include telecommunications connections and university located in Southeast Asia. “While Ref7707 is characterized by a well-engine, highly capable, new penetration set, companies have shown poor management companies and inconsistent evading practices,” Andrew PiS and…
Subgroup in a shameful Russian state group known as Pepperner was associated with a long -standing initial access operation called Badpilot, which stretched around the world. “This subgroup conducted a globally diverse compromise of the infrastructure that stands on the Internet to allow SEASHELL snowstorms to be stored on high values and maintain individual network operations,” Microsoft intelligence team is threatened. – Note In a new report that shared with Hacker News on the eve of the publication. The geographical distribution of the initial access goals includes all North America, several European countries, as well as others, including Angola, Argentina,…
Researchers believe that the new exploit is bypassing the Nvidia container corrected vulnerability
February 12, 2025Red LakshmananThe safety of the container / vulnerability Cybersecurity researchers have found a bypass for the NVIDIA container’s safety vulnerability, which can be used to escape the container and gain full access to the main host. New vulnerability is tracked as Cve-2025-2359 (CVSS assessment: 8.3). This affects the following versions – Nvidia Container Toolkit (all versions up to 1.17.3) – recorded in version 1.17.4 GPU Nvidia operator (all versions up to 24.9.1) – recorded in version 24.9.2 ‘NVIDIA container’s tools for Linux contains time of use (Bakery) Vulnerability when used with the default configuration where a container image…