Author: Admin
September 27, 2024Hacker newsCyber security certificates In today’s rapidly evolving digital landscape, cybersecurity has become a cornerstone of organizational resilience. As cyber threats become more sophisticated, the demand for skilled cyber security professionals has never been higher. Whether you are a seasoned cyber professional or just starting outby subscribing to the GIAC newsletter ensures that you are always informed and prepared for the changing landscape of cyber security. One of the most effective ways to demonstrate your knowledge in this critical area is through cybersecurity certifications. These credentials serve as a benchmark for skills and knowledge, setting candidates apart in…
The US government on Thursday imposed sanctions on two cryptocurrency exchanges and indicted a Russian national for his alleged involvement in a series of money laundering services offered to cybercriminals. Cryptocurrency exchanges Cryptex and PM2BTC are believed to facilitate the laundering of cryptocurrencies that may have been obtained through cybercrimes. The coordinated action was carried out in cooperation with the Dutch police and the Fiscal Intelligence and Investigation Service of the Netherlands (FIOD) as part of repression by law enforcement agencies continues is called Operation Endgame.. According to the results of the exercises, sites connected however, both exchanges were confiscated…
September 27, 2024Ravi LakshmananContainer Security / Cloud Computing A critical security flaw has been discovered in the NVIDIA Container Toolkit that, if successfully exploited, could allow threat actors to break out of the container and gain full access to the underlying host. Vulnerability, tracked as CVE-2024-0132has a CVSS score of 9.0 out of a maximum of 10.0. It was addressed in NVIDIA Container Toolkit v1.16.2 and NVIDIA GPU Operator v24.6.2. “NVIDIA Container Toolkit 1.16.1 or earlier contains a time-of-use check (TACT) vulnerability when used with default configuration where a specially crafted container image could access the host’s file system,” NVIDIA…
September 26, 2024Ravi LakshmananAutomotive industry / technology Cybersecurity researchers discovered a series of vulnerabilities in Kia vehicles, now patched, that, if successfully exploited, could have allowed key functions to be remotely controlled simply by using just a number plate. “These attacks could be performed remotely on any vehicle equipped with the hardware in about 30 seconds, regardless of whether it had an active Kia Connect subscription,” security researchers Naika Rivera, Sam Currie, Justin Rinehart and Ian Carroll said. The problems affect nearly all cars manufactured after 2013, even allowing attackers to secretly access sensitive information, including a victim’s name, phone…
September 26, 2024Ravi LakshmananCyber Espionage / Mobile Security About 25 websites linked to the Kurdish minority were hacked in a watering hole attack designed to gather sensitive information over a year and a half. French cybersecurity firm Sekoia, which revealed details of the company called SilentSelfie, described the set of intrusions as long-running, with the first signs of infection as early as December 2022. The strategic web compromises are designed to provide four different variants of the information theft system, the report added. “They ranged from the simplest, which simply stole the user’s location, to the more sophisticated, which recorded…
September 26, 2024Hacker newsThreat Detection / IT Security Imagine trying to find a needle in a haystack, but the haystack is on fire and there are a million other needles that you too must be found. Here’s what working with security system alerts can look like. A SIEM was supposed to make this easier, but somewhere along the way it became part of the problem. Too many alerts, too much noise, and not enough time to stop the threats. It’s time for a change. It’s time to take back control. Join Zuri Cortez and Seth Geftik for an insightful webinar…
September 26, 2024Ravi LakshmananCyber attack / malware Attackers linked to North Korea have been seen using two new varieties of malware, dubbed KLogEXE and FPSpy. The activity was attributed to an adversary tracked as Kimsukiwhich is also known as APT43, ARCHIPELAGO, Black Banshee, Emerald Sleet (formerly Thallium), Sparkling Pisces, Springtail and Velvet Chollima. “These samples expand Sparkling Pisces’ already extensive arsenal and demonstrate the group’s continued evolution and increasing capabilities,” Palo Alto Networks Division 42 researchers Daniel Frank and Lior Rochberger said. Active since at least 2012, the threat has been dubbed the “king of phishing” for its ability to…
Many enterprises rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vulnerabilities for prioritization. While these estimates provide some insight into the potential impact of a vulnerability, they do not take into account actual threat data, such as likelihood of exploitation. With new vulnerabilities being discovered daily, teams have no time or budget to spend fixing vulnerabilities that don’t actually reduce risk. Read on to learn more about how CVSS and EPSS compare and why using EPSS is a game-changer in your vulnerability prioritization process. What is vulnerability priority? Vulnerability prioritization is the process of evaluating…
September 26, 2024Ravi LakshmananCloud Security / Cyber Espionage An advanced threat actor with an Indian connection was observed using multiple cloud service providers to facilitate credential collection, malware delivery, and management (C2). Web infrastructure and security company Cloudflare tracks activity under this name SloppyLemmingwhich is also called Weekend tiger and fishing elephant. “From late 2022 to the present, SloppyLemming regularly used Cloudflare Workers, likely as part of a broad espionage campaign targeting countries in South and East Asia,” Cloudflare said in the analysis. SloppyLemming is believed to have been active since at least July 2021, with previous campaigns using malware…
September 26, 2024Ravi LakshmananCyber espionage / hacking Beijing-backed nation-state threat actors broke into a “handful” of US Internet Service Providers (ISPs) in a cyber espionage campaign designed to gather sensitive information, The Wall Street Journal reported Wednesday. The activity is attributed to a threat that Microsoft is tracking as Salt Typhoon, which is also known as The famous sparrow and GhostEmperor. “Investigators are looking into whether attackers gained access to Cisco Systems routers, core network components that route much of the Internet’s traffic,” the paper quoted people familiar with the matter as saying. The ultimate goal of attacks is to…