Author: Admin

October 7, 2024Ravi LakshmananOpen Source Software Security A critical security flaw has been discovered in the Apache Avro Java Software Development Kit (SDK) that, if successfully exploited, could allow arbitrary code execution on sensitive instances. Drawback tracked as CVE-2024-47561affects all software versions prior to 1.11.4. “Schema analysis in Apache Avro’s Java SDK 1.11.3 and earlier allows malicious actors to execute arbitrary code,” project staff said in an advisory issued last week. “Users are advised to switch to version 1.11.4 or 1.12.0 that fix this issue.” Apache Avro, similar to Google Protocol Buffers (protobuff), is an open source project that provides…

Read More

October 7, 2024Ravi LakshmananIoT Security / Botnet Cybersecurity researchers have discovered a new family of botnet malware called Gorilla (aka GorillaBot) that is a leak variant Mirai botnet source code. Cybersecurity firm NSFOCUS, which discovered the activity last month, said botnet “issued more than 300,000 attack commands with shocking attack density” between September 4 and 27, 2024. Each day, at least 20,000 commands designed to carry out distributed denial-of-service (DDoS) attacks come from the botnet. on average. The botnet is said to have targeted more than 100 countries, attacking universities, government websites, telecommunications, banking, gaming and gambling sectors. China, USA,…

Read More

Organizations lose between $94 billion and $186 billion annually due to vulnerable or unsafe APIs (application programming interfaces) and automated bot breaches. That’s it The economic impact of APIs and bot attacks report by Imperva, a Thales company. The report highlights that these security threats account for 11.8% of global cyber incidents and losses, highlighting the growing risk they pose to businesses worldwide. Based on comprehensive research by the Marsh McLennan Cyber ​​Risk Intelligence Center, the report analyzes more than 161,000 unique cyber security incidents. The findings show an alarming trend: threats related to vulnerable or unsafe APIs and automated…

Read More

October 7, 2024Hacker newsPassword Security / Data Security Interest in passwordless authentication has increased due to the rise of hybrid work environments and widespread digitization. This has led to a greater need for robust data protection and user-friendly interfaces. Without these measures, organizations are at risk of data breaches, leaks, and significant financial losses. While traditional password-based systems provide protection, they are susceptible to security threats such as phishing and identity theft, which makes it important to consider disabling passwords. Additionally, users often struggle to remember multiple passwords, further compromising security as they tend to use the same password to…

Read More

October 7, 2024Ravi LakshmananData Privacy / Advertising The European Supreme Court has ruled that Meta Platforms must limit the use of personal data obtained from Facebook to serve targeted ads, even if users consent to the use of their information for advertising purposes. The move could have serious implications for advertising companies. region “A social internet network such as Facebook cannot use all personal data obtained for the purpose of targeted advertising without time limits and without distinction by type of data,” the Court of Justice of the European Union (CJEU) said. said in a ruling on Friday. In other…

Read More

October 5, 2024Ravi LakshmananData Privacy / Mobile Security Apple released iOS and iPadOS updates to address two security issues, one of which could allow a user’s passwords to be read aloud. VoiceOver assistive technology. The vulnerability, tracked as CVE-2024-44204, was described as a logic issue in the new Passwords app that affects many iPhones and iPads. Security researcher Bistreet Dah is credited with discovering and reporting the flaw. “User’s saved passwords can be read aloud with VoiceOver,” Apple said in an advisory issued this week, adding that it was addressed with improved verification. The following devices are affected by the…

Read More

October 4, 2024Ravi LakshmananPhishing Attack / Cybercrime Microsoft and the US Department of Justice (DoJ) announced Thursday the seizure of 107 Internet domains used by state-sponsored threat actors with ties to Russia to facilitate fraud and abuse in the country. “The Russian government launched this scheme to steal sensitive information from Americans by using seemingly legitimate email accounts to trick victims into revealing credentials.” said Deputy Attorney General Lisa Monaco. The activity was attributed to the actor’s threat under the title COLDRIVERwhich is also known as Blue Callisto, BlueCharlie (or TAG-53), Calisto (alternately spelled Callisto), Dancing Salome, Gossamer Bear, Iron…

Read More

October 4, 2024Ravi LakshmananWebsite Security / Vulnerability A serious new security flaw has been discovered in the LiteSpeed ​​Cache plugin for WordPress that could allow attackers to execute arbitrary JavaScript code under certain conditions. Drawback tracked as CVE-2024-47374 (CVSS score: 7.2), was described as a conserved intersite script (XSS) vulnerability that affects all versions of the plugin up to and including 6.5.0.2. This was addressed in version 6.5.1 on September 25, 2024 after responsible disclosure by Patchstack Alliance researcher TaiYou. “This could allow any unauthenticated user to steal sensitive information before, in this case, escalating privileges on a WordPress site…

Read More

Cloudflare has revealed that it mitigated a record distributed denial of service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted 65 seconds. A web infrastructure and security company said he fended off “more than a hundred hyper-volume L3/4 DDoS attacks for a month, many exceeding 2 billion packets per second (Bpps) and 3 terabits per second (Tbps).” Hyper-volume L3/4 DDoS attacks have been ongoing since early September 2024, the report said, adding that they targeted numerous customers in the financial services, Internet and telecommunications industries. The activity has not been attributed to any specific threat. The…

Read More

Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risks. It breaks down the complex task of managing security threats into five distinct steps: scoping, detection, prioritization, validation, and mobilization. Each of these steps plays a critical role in identifying, remediating and mitigating vulnerabilities – before attackers can exploit them. on paper CTEM sounds great. But where the rubber meets the road – especially for CTEM newbies – implementing CTEM can seem overwhelming. The process of putting CTEM principles into practice may seem overwhelming at first. However, with the right tools and…

Read More