Author: Admin

February 11, 2025Red LakshmananCyberCrime / RansomwareSource: Nation The coordinated law enforcement operation reduced the leakage of dark web -shaped and talks related to the 8Base Ransomware gang. Visitors to the data site now meet with the banners of the seizure stating: “This hidden site and criminal content were confiscated by the Bavarian State Criminal Police on behalf of the Prosecutor General in Bamberg.” The Takeown participated in the National Agency of UK crimes (NCA), the US Federal Bureau of the United States (FBI), Europol, as well as agencies from Bavaria, Belgium, France, Germany, Japan, Romania, Spain, Switzerland and Thailand. Thai…

Read More

February 11, 2025Red LakshmananZero day / mobile security Apple on Monday released security updates outside the range to resolve security lack of iOS and iPados, which, he said, were used in the wild. Assigned ID CVE Cve-2025-24200The vulnerability was described as a permit issue that can make it possible for a malicious actor to disable the limited USB mode on a blocked device within the cyber -physical attack. This suggests that attackers require physical access to the device for use. Entered in iOS 11.4.1, USB with limited mode prevents The Apple iOS and iPados device from communicating with an connected…

Read More

February 10, 2025Red LakshmananMalicious software / payment security The actors threatened were observed using Google Tag Manager (GTM) to provide malware Skimmer Credit Card focused on Magento’s e -commerce sites. SUCURI SUCURIA SCHOOL COMPANY – Note The code, which is a typical GTM and Google Analytics scenario used for analytics and advertising purposes, contains a stubborn back, capable of providing attackers permanently. As writing, as much as three sites They have been found to be infected by the GTM IDM (GTM-MLHK2N68), which is compared to the six, which the succus reports. GTM ID refers to A container These include different…

Read More

February 10, 2025Red LakshmananMalicious software / web security The actors of the threat were observed on the orientation on the Internet information server (IIS) in Asia as part of a manipulation campaign to optimize search engines (SEO) intended for installing malware Badiis. “It is likely that the company is financially motivated since the redirection of users to illegal gambling sites that indicate that attackers deploy Badiis for profit,” – Trend Micro Researchers Ted Lee and Lenart Bermejj – Note In an analysis published last week, The goals of the company include IIS servers in India, Thailand, Vietnam, Philippines, Singapore, Taiwan,…

Read More

February 10, 2025Hacker NewsIdentity Safety / Data Protection Given the role of Oki as an important part of the identity infrastructure, the Okta safety is important. This article discusses six key OKTA security settings that provide a strong starting point, as well as recommendations for the OKTA Posture Permanent Security Monitoring. With more than 18,000 customers, Okta serves as a cornerstone of identity and security control for organizations worldwide. However, this fame has made it the main goal for cybercriminals seeking access to valuable corporate identities, applications and sensitive data. Recently Okta warned its customers about Increasing the Social Engineering…

Read More

February 10, 2025Red LakshmananVulnerability / data protection Zimbra has released software updates to solve critical security deficiencies in its software for cooperation, which can be successfully disclosed under certain conditions. Vulnerability tracked as Cve-2025-25064It carries the CVSS 9.8 with a maximum of 10.0. This has been described as a SQL injection error in the ZimbraSync soap box, which affects the version up to 10.0.12 and 10.1.4. Based on the lack of proper sanitary parameter, the deficiencies may be armed with authenticated attackers to introduce arbitrary SQL requests that could get e -mail metadata by “manipulating a certain parameter in the…

Read More

February 10, 2025Red LakshmananVulnerability / malicious software The threatening actors were observed in the use of several disadvantages in different software products, including the progress of Telerik UI for ASP.net Ajax and Advantive Veracore to give up back projectiles and web -columns and maintain permanently distant access to the broken systems. Zero exploitation of security deficiencies in Verakore was associated with the actor threats known as Cable groupA group of cybercrime is probably from Vietnamese origin, which is known to be active since 2010. “The XE group has passed from Skimmymyming Credit to target information about information, which notes a…

Read More

February 8, 2025Red LakshmananArtificial intelligence / safety supply chain Cybersecurity researchers found two malicious machine learning models (ML) on the hug that used unusual “broken” salted cucumber files to avoid detection. “Files of salted cucumbers extracted from the mentioned Pytorch archives showed malicious Python content at the beginning of the file,” Carl Zanka ReversingLabs Researcher – Note In a report that shared with Hacker News. “In both cases, the harmful load was a typical reverse platform reverse shell that connects to the tough code.” The approach was named Nullifai because it provides attempts to solve The passage of existing guarantees…

Read More

07 February 2025Red LakshmananMobile Security / Artificial Intelligence The new Deepseek mobile application audit for the Apple iOS operating system has found that bright security issues, the main thing that it sends sensitive data over the Internet that allows you to encrypt, exposing it with interception and manipulation. The assessment comes from nowsecure, which also showed that the app does not follow the best security practices and that it collects extensive user data and devices. “DEEPEEK iOS app sends some mobile app registration and devices online without encryption”, company – Note. “This exposes any data on the internet both passive…

Read More

07 February 2025Red LakshmananCloud security / web -security Microsoft warns of a dangerous practice in which software developers include publicly disclosed ASP.Net keys from publicly available resources, thus investing their applications into the path of attackers. The Technological Giant Intelligence Team stated that it was observing limited activity in December 2024, which included an unknown threat actor using the ASP.Net’s public static key for imposing malicious code and delivery Godl Frame after operation. He also noted that he identified more than 3,000 publicly discovered keys that could be used for these attacks View the Infrosting Codes. “While many previously known…

Read More