Author: Admin

March 29, 2025Red LakshmananCybercrime / vulnerability In what is hacking hackers, hunting for threats managed to penetrate into the Internet infrastructure associated with a ransom group called Blacklock, revealing important information about their mode of operation. Transfiguration stated that it determined the safety vulnerability on the data site (DLS), which is managed by an electronic crime group that made it possible to extract configuration files, credentials, as well as teams made on the server. The downside concerns “a certain erroneous configuration on the data leak (DLS) BlackLock Ransomware, which leads to the IP -Drass Clearnet, related to their network infrastructure,…

Read More

March 28, 2025Red LakshmananOperational technology / vulnerability Cybersecurity researchers have discovered 46 new safety deficiencies in three solar -sellers, Sungrow, Growatt and SMAs, which can be used by a bad actor to confiscate devices or remote code, creating serious risks for electrical networks. The vulnerabilities were collectively named Sun: Down by forescout vedere labs. “New vulnerabilities can be used to execute arbitrary commands on devices or cloud provider, consider, gain a foothold in the supplier’s infrastructure or take control of the inverter owners’ device”, company company, company – Note In a report that shared with Hacker News. Some of the…

Read More

March 28, 2025Red LakshmananIntelligence of security / threat final point Cybersecurity researchers pay attention to a new complex malicious software called Coffeeode This is designed to download and perform secondary useful loads. According to ZSCALER OPHERLABZ, shares the similarity of behavior with another known forklifts malicious programs known as Diplomat. “The purpose of the malicious software-loading and perform useful load in the second stage, evading the detection of safety products based – Note In a technical record published this week. “Malicious software uses numerous methods to bypass safety solutions, including a specialized package that uses GPU, reinforcement of the stack…

Read More

March 28, 2025Red LakshmananSpying software / malicious software Earlier, the Android Malter Malware Service Service Service was associated with a new company that is probably aimed at Taiwan’s users under the guise of chat applications. “PJOBrat can steal SMS messages, telephone contacts, devices and apps, documents and media files from infected Android devices,” Sophos Security Pankaj Kohli Researcher Kohli – Note In the Thursday analysis. Pjobrat, First documented In 2021, there were results of use against Indian military purposes. The following malware iterations were discovered as appraisal applications and instant messages to deceive future victims. It is known that it…

Read More

March 28, 2025Red LakshmananZero day / browser security Mozilla released updates to address a critical security lack that affects its Firefox browser for Windows, just a few days after Google recorded a similar lack of Chrome, which was actively operating as a zero day. Security vulnerability, CVE-2025-2857, was described as a case of the wrong handle that could lead to the escape of the sandbox. “After the recent Chrome Sandbox shoots (Cve-2025-2783), various Firefox developers have defined a similar picture in our IPC code”, Mozilla – Note In advisory. “The disrupted child process can force the parental process to return…

Read More

March 28, 2025Red LakshmananCryptocurrency safety / developer Cybersecurity researchers have discovered several cryptocurrency packages in the NPM register that was hijacked for sensitive information about siphon, such as Variable environment from compromised systems. “Some of these packages – Note. “However (…) the latest versions of each of these packages were loaded with persistent scenarios.” The affected packages and their abducted versions are below – Map-Curve (2.1.8) BNB-Javascript-SDK-Nobroadcast (2.16.16) @Bithighlander/Bitcoin-Cash-JS-LIB (5.2.2) ESLINT-CONFIG-TRAVIX (6.3.1) @Crossway-Finance1/SDK-V2 (0.1.21) @KeepKey/Protocol (7.13.3) @Veniceswap/Uikit (0.65.34) @Veniceswap/ESLINT-CONFIG-TANE (1.6.2) Babel-Preset-Travix (1.2.1) @TRAVIX/UI-TEMES (1.1.5) @CoinMasters/Type (4.8.16) Analysis of these safety chain safety software packages showed that they were poisoned by…

Read More

March 27, 2025Red LakshmananSecurity by email / malicious software Cybersecurity researchers spilled light on the new Phishing AS-A-Service platform (Phaas) that uses domain names (Union) Exchange (Mx) Records for submitting fake pages to enter that represent about 114 brands. DNS Intelligency Firm Infoblox tracks actor for Phaas, phishing kits and related to Morphing Meerkat. “The actor behind the companies often uses open redirecting to the Adtech infrastructure, threatens domains for spreading phishing and distributes stolen powers through several mechanisms, including Telegram,” the company said in A at A at A at A B. report Share with Hacker News. One campaign…

Read More

March 27, 2025Red LakshmananSecurity of the final points / redemption A new analysis revealed the connection between affiliates RansomHub and other groups of ransomers like Jellyfish. Biosand Play. The connection is related to the use of a custom tool designed to disconnect the software to detect and respond to the final points (EDR) on compromised hosts, ESET reports. The Edr Murder Tool called EdrkillhifterIt was first recorded as RansomHub actors in August 2024. Edrkillshifter performs its goals with the help of a well -known tactic called “Give your own vulnerable driver (BYOVD), which involves the use of a legitimate but…

Read More

March 27, 2025Red LakshmananMobile Safety / Malicious Software The advanced permanent threat (APT) associated with Pakistan has been associated with the creation of a false site, which is masked by both the Post Sector Sector of India as part of the company Windows and Android in the country. Cybersecurity Cybersecurity Company has attributed a company with average confidence to the actor’s threat called APT36which is also known as a transparent tribe. A fraudulent site that mimics India Post, called “Postindia (.) Site”. Users who land on the Windows Systems site are offered to download the PDF document, while those who…

Read More

March 27, 2025Hacker NewsBrowser safety / data protection Be it CRMS, project management tools, payment processors or lead control tools – your workforce uses Saas applications on pounds. Organizations often rely on CASB traditional solutions to protect against malicious access and data exports, but they are protected against Shadow Saas, data damage and more. New report, Understanding Saas Safety Safety: Why Casb Solutions don’t cover “Shadow” Saas and SaasEmphasizing the pressing security problems faced by enterprises using SAAS applications. The study emphasizes the growing ineffectiveness of the CASB traditional solutions and introduces a revolutionary approach to SAAS safety, which provides…

Read More