Author: Admin

January 14, 2025Ravi LakshmananData Vulnerability / Privacy A new study has uncovered a “flaw” in Google’s “Sign in with Google” authentication process that uses features in domain ownership to gain access to sensitive data. “At Google OAuth a login doesn’t protect against someone buying a failed startup’s domain and using it to re-create email accounts for former employees.” Truffle Security Co-Founder and CEO Dylan Airey said in Monday’s report. “And while you can’t access the old email data, you can use those accounts to log into all the different SaaS products that the organization used.” The San Francisco-based company said…

Read More

January 14, 2025Ravi LakshmananEndpoint Security / Vulnerability Microsoft has shed light on a patched security flaw in Apple’s macOS that, if successfully exploited, could allow an attacker running as root to bypass the operating system’s system integrity protections (SYPT) and install malicious kernel drivers by downloading third-party kernel extensions. The vulnerability in question CVE-2024-44243 (CVSS Score: 5.5), a moderate bug that was fixed by Apple in the framework macOS Sequoia 15.2 released last month. The iPhone maker described it as a “configuration issue” that could allow a malicious app to modify protected parts of the file system. “Bypassing SIP can…

Read More

Russian-linked threat actors have been attributed to an ongoing cyberespionage campaign targeting Kazakhstan as part of the Kremlin’s efforts to gather economic and political intelligence in Central Asia. The campaign was rated as the work of a duplicate set of intrusions UAC-0063which likely intersects with APT28, a nation-state group linked to the Main Intelligence Directorate (GRU) of the Russian General Staff. It is also known as Blue Athena, BlueDelta, Fancy Bear, Fighting Ursa, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy and TA422. UAC-0063 bldg documented for the first time by the Ukraine Emergency Response Team (CERT-UA) in…

Read More

January 14, 2025Ravi LakshmananVulnerability / Network Security Threat hunters are taking notice of a new campaign targeting Fortinet FortiGate firewalls with management interfaces exposed on the public Internet. “The campaign involved unauthorized administrative logins to firewall management interfaces, creating new accounts, SSL VPN authentication through those accounts, and various other configuration changes,” cyber security firm Arctic Wolf said. said in an analysis published last week. It is believed to be malicious activity started in mid-November 2024. unknown threat actors gained unauthorized access to management interfaces on compromised firewalls to change configurations and obtain credentials using DCSync. The exact initial access…

Read More

What do identity risks, data security risks, and third party risks have in common? All of these are greatly exacerbated by the proliferation of SaaS. Each new SaaS account adds a new entity to protect, a new place where sensitive data can end up, and a new source of third-party risk. Find out how you can protect this vast attack surface in 2025. What do identity risks, data security risks, and third party risks have in common? All of these are greatly exacerbated by the proliferation of SaaS. Each new SaaS account adds a new entity to protect, a new…

Read More

January 14, 2025Ravi LakshmananCryptocurrency / Internet Scam The online marketplace based on Telegram is known as HuiOne Guarantee, and its providers have collectively received at least $24 billion in cryptocurrency, surpassing the now-defunct Hydra to become the largest illegal online marketplace ever to operate. numbers, released Elliptic, a blockchain analytics company, shows that monthly inflows have increased by 51% since July 2024. Huione Guarantee, part of the Huione group of companies, found himself in the center of attention in the middle of last year, when it was exposed as a hub for online fraudsters touting money-laundering services, stolen data and…

Read More

January 14, 2025Ravi LakshmananVulnerability / Cyber ​​Security The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a second security flaw affecting BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) products to its list of known vulnerabilities (KEV) catalog with reference to evidence of active exploitation in the wild. The vulnerability in question CVE-2024-12686 (CVSS Score: 6.6), a moderate vulnerability that could allow an attacker with existing administrative privileges to enter commands and operate as a site user. “BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain an OS command injection vulnerability that could be used by…

Read More

January 13, 2025Ravi LakshmananVulnerability / Cloud Security A critical security flaw has recently been discovered that affects the Aviatrix controller the cloud network platform is being actively exploited in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm Wiz said it is currently responding to “several incidents” involving weapons CVE-2024-50603 (CVSS Score: 10.0), a maximum severity bug that could lead to unauthenticated remote code execution. In other words, successful exploitation of the flaw could allow an attacker to execute malicious operating system commands due to certain API endpoints not properly sanitizing user input. The vulnerability was fixed in…

Read More

January 13, 2025Hacker newsThreat detection / network security In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, and the average ransom demand skyrocketed to $5 million. With approximately 8,000 ESXi hosts exposed to direct Internet access (according to Shodan), the operational and business impact of these attacks is profound. Most of the ransomware currently attacking ESXi servers are variants of the infamous Babuk ransomware, designed to evade detection by security tools. Moreover, availability is becoming more widespread as attackers monetize their entry points by selling Initial Access to other threat actors, including ransomware groups. As organizations face complex…

Read More

January 13, 2025Ravi LakshmananMalware / Domain Security At least 4,000 unique web backdoors previously deployed by various threat actors were captured by taking control of abandoned and outdated infrastructure for as little as $20 per domain. Cybersecurity company watchTowr Labs said it completed the operation, registering more than 40 domain names that the backdoors were designed to use for command and control purposes (C2). In partnership with the Shadowserver Foundation, the domains involved in the study were processed. “We hijacked backdoors (that depended on now-abandoned infrastructure and/or expired domains) that existed inside backdoors themselves, and have watched the results flow…

Read More