Author: Admin

USB Drive Attacks Create a significant risk of cybersecurity by using the daily use of USB -device for delivering malware and bypassing traditional network safety measures. These attacks lead to violations of data, financial losses and operational violations, and a long -term influence on the reputation of the organization. An example is the stuxnet worm, revealed in 2010, malicious software designed to focus on industrial management systems, in particular Iranian nuclear enrichment facilities. It exploits multiple vulnerabilities with zero day and spread primarily through USB discs, making it one of the first examples of cyberattacks with real physical effects. Stuxnet…

Read More

The rapid adoption of cloud services, SAAS applications and the transition to remote work fundamentally reworked how businesses work. These technological successes have created the world of opportunities, but also caused difficulties that create significant security threats. At the heart of these vulnerabilities lie Identity- Gateway to business security and number one attack vector for bad actors. Learn the importance of upgrading identity strategies And the benefits of centralizing identity in your safety ecosystem to protect your organization from expensive disorders in improving efficiency. The growth of fragmented technological stacks Days were held when enterprises relied on a single decision…

Read More

05 March 2025Red LakshmananCyber ​​-bue / network security Actor threats known as Lotus panda It is observed in the field of government, production, telecommunications and media sectors in the Philippines, Vietnam, Hong Kong and Taiwan with updated versions of the famous back day called SAGERUNEX. “Lotus Blossom uses Backdoor Sagerunex at least since 2016 and is increasingly using long -term shells and develops new SAGERUNEX malware,” Cisco Talos Joey Chen researcher – Note in an analysis published last week. Lotus Panda, also known as Billbug, bronze Elgin, lotus Blasom, Spring -Tsmok and Trip, is a suspect of a Chinese hacking…

Read More

05 March 2025Red LakshmananWith open source / malicious software Cybersecurity researchers warn of the current malicious company aimed at the Go Ekosystem with Typized Modules designed to deploy malware on Linux and Apple Macos Systems. “Acting threats posted at least seven packages that present themselves widely used GO libraries, including one (GitHub (.) Com/Dlultowmulti/Hypert), which appears – Note In a new report. “These packages share repeated malicious names and consistent methods of aggravation, which suggests that a coordinated actor threats that can be quickly turned.” While all of them continue to be available in the official package storage, their relevant…

Read More

04 March 2025Red LakshmananCybercrime / Intelligence threats Subjects with the threat that deploy black bosom and cactus ransom have been found on the same Backconnect (BC) module to maintain constant control over the contaminated hosts, a sign that the branches associated with black bacon can go to the cactus. “After penetration, it gives the attackers a wide range of remote controls, allowing them to perform commands on an infected machine,” – Trend Micro – Note Monday analysis. “This allows them to steal sensitive data such as login credentials, financial information and personal files.” It is worth noting that the details…

Read More

04 March 2025Red LakshmananVulnerability / cloud security Broadcom has liberated Safety updates to solve three active security deficiencies in VMware ESXI, workstation and merger that can lead to code and disclosure. The list of vulnerabilities is the following – Cve-2025-2224 (CVSS assessment: 9.3) -In time of vulnerability of use time (TOCTOU), which leads to record outside the malicious actor with local administrative privileges on the virtual machine can use to perform the code as the VMX-Virgin machine operating on the hoste Cve-2025-2225 (CVSS’s assessment: 8.2) – An arbitrary vulnerability of the recording that a malicious actor with privileges during the…

Read More

04 March 2025Red LakshmananNetwork safety / ransom Internet services providers (providers) in China and the West coast of the United States have been the goal of a massive company that deployed the theft of cryptocurrency information and miners on compromised hosts. The resulting data come from the SPLUNK research group, which states that the activity also led to the delivery of various binary files that facilitate the data of the data, as well as the ways to establish persistence in the systems. Unknown threaten subjects conducted “minimum intrusive operations to avoid detection, except for artifacts created in accounts that have…

Read More

Accounting attacks had a huge impact in 2024, fueled by a vicious circle of infections of infections and data disorders. But it can still deteriorate with agents using computers, a new AI agent species that allows you inexpensive, low automation of common web slushes, including those who are often performed by attackers. Stolen powers: Weapons Choosing Cyber ​​-Little in 2024 Stolen powers were the action of the attacker No. 1 in 2023/24and vector of violations for 80% of web applications. Not surprisingly, considering the fact that billions of tangled powers are in circulation on the Internet, and attackers can pick…

Read More

04 March 2025Red LakshmananCyber ​​-bue / malicious software Hunters pay attention to a new high -level phishing campaign that nominated “less than five” legal entities in the United Arab Emirates (UAE) to deliver the previously unregistered back Galan Sosan. According to Profpoint, which discovered it in late October 2024, was specially aimed at aviation and satellite communication organizations. Unk_craftcamel. The characteristic aspect of the attack chain is that the opponent took advantage of his access to a compromised email account owned by the Indian Electronics Company, indicates electronic electronic information to send phishing messages. It is said that the legal…

Read More

04 March 2025Hacker NewsCyber ​​-aataka / vulnerability Cybersecurity and US Infrastructure Agency (CISA) added Five Safety Disadvantages affecting Cisco, Hitachi Vantara, Microsoft Windows and Progress Whatsup Gold for their famous exploited vulnecs (Ship) A catalog based on evidence of active operation. The list of vulnerabilities is the following – Cve-2013-20118 (CVSS assessment: 6.5) -Touity of teams of introduction to the online router RV Cisco Small Business Router, which allows authentication, remote attackers, receive privileges at the root level and access unauthorized data (unlikely due to routers) Cve-2022-43939 (CVSS assessment: 8.6) – vulnerability of the income vulnerability in Hitachi Vantara Pentaho…

Read More