Author: Admin

A hacking group known as the Twelve has been seen using an arsenal of publicly available tools to launch destructive cyberattacks against Russian targets. “Instead of demanding a ransom for data decryption, Twelve prefers to encrypt victims’ data and then wipe out their infrastructure to prevent recovery,” Kaspersky said. said in Friday’s analysis. “This approach indicates a desire to cause maximum damage to target organizations without receiving direct financial benefit.” The hacking group, which is believed to have been formed in April 2023 after the start of the Russian-Ukrainian war, has a track record of intensifying cyber attacks aimed at…

Read More

September 21, 2024Ravi LakshmananNational Security / Cyber ​​Attack Ukraine has restricted the use of the Telegram messaging app by government officials, the military and other defense and critical infrastructure workers, citing national security concerns. The ban was announced by the National Cyber ​​Security Coordination Center (NCCC) in a Facebook post. “I have always advocated and am advocating freedom of speech, but the issue of Telegram is not an issue of freedom of speech, it is an issue of national security,” said the head of Ukraine’s GUR, Kirill Budanov. said. National Security and Defense Council of Ukraine (NSDA) said that Telegram…

Read More

September 21, 2024Ravi LakshmananPrivacy / Artificial Intelligence The UK’s Information Commissioner’s Office (ICO) has confirmed that professional social networking platform LinkedIn has suspended the processing of user data in the country to train its artificial intelligence (AI) models. “We are pleased that LinkedIn has considered the concerns we raised about its approach to training generative AI models with information relating to UK users,” said Stephen Almond, executive director of regulatory risk. said. “We welcome LinkedIn’s confirmation that it has suspended such model training pending further engagement with the ICO.” Almond also said the ICO intends to closely monitor companies offering…

Read More

Law enforcement agencies have announced the dismantling of an international criminal network that used a phishing platform to unlock stolen or lost cellphones. A phishing-as-a-service (PhaaS) platform called iServer is estimated to have affected more than 483,000 victims worldwide, primarily from Chile (77,000), Colombia (70,000), Ecuador (42,000), Peru ( 41,500), Spain (30,000), Argentina (29,000). “The victims are mostly Spanish-speaking citizens from Europe, North and South America,” Europol said said in a statement to the press. Law enforcement and judicial authorities from Spain, Argentina, Chile, Colombia, Ecuador and Peru took part in the action, which was named Operation Kaerb. In accordance…

Read More

An Iranian Advanced Persistent Threat (APT) threat actor believed to be affiliated with the Ministry of Intelligence and Security (MOIS) is now acting as an initial access broker providing remote access to targeted networks. Google-owned Mandiant tracks a cluster of pseudonymous activity UNC1860which he says has similarities to intrusion kits tracked by Microsoft, Cisco Talos and Check Point as Storm-0861 (formerly DEV-0861), Shrouded Snooperand Scarred Manticorerespectively. “A key feature of the UNC1860 is its set of specialized tools and passive backdoors, which (…) support several purposes, including its role as a likely initial access provider and its ability to gain…

Read More

In the IT environment, some secrets are managed well and some fly under the radar. Here’s a quick checklist of what secrets companies typically manage, including one type they should manage: Passwords (x) TLS Certificates (x) Accounts (x) SSH keys ??? The secrets listed above are typically protected by Privileged Access Management (PAM) or similar solutions. However, most traditional PAM vendors barely talk about SSH key management. The reason is simple: they don’t have the technology to do it properly. We can prove it. All of our SSH key management customers deployed traditional PAM, but they realized they couldn’t manage…

Read More

September 20, 2024Ravi LakshmananEncryption / digital security Google on Thursday unveiled a PIN password manager that lets Chrome Web users sync their passwords across Windows, macOS, Linux, ChromeOS and Android devices. “This PIN adds an extra layer of security to ensure that your access keys are end-to-end encrypted and cannot be accessed by anyone, not even Google,” said Chrome Product Manager Chirag Desai. said. The default PIN is a six-digit code, although you can also create a longer alphanumeric PIN by selecting PIN Options. This marks a change from the previous status quo where users could only save passkeys to…

Read More

September 20, 2024Ravi LakshmananEnterprise Security / Network Security Ivanti has revealed that a critical security flaw affecting the Cloud Service Appliance (CSA) is being exploited in the wild. The new vulnerability, assigned CVE ID CVE-2024-8963, has a CVSS score of 9.4 out of a maximum of 10.0. This was “incidentally resolved” by the company as part of CSA 4.6 Patch 519 and CSA 5.0. “Passing the path in Ivanti CSA prior to 4.6 Patch 519 allows a remote, unauthenticated attacker to gain access to limited functionality,” the company said in a statement. said in Thursday’s newsletter. He also noted that…

Read More

Just a couple of years ago, only a few IAM professionals knew what service accounts were. In recent years, these silent accounts of non-human entities (NHIs) have become one of the most targeted and compromised attack surfaces. It is estimated that compromised service accounts play a key role in lateral movement in more than 70% of ransomware attacks. However, there is a troubling disparity between the exposure and potential impact of hacking work accounts, and the security measures available to mitigate this risk. In this article, we explore what makes service accounts such a lucrative target, why they fall outside…

Read More

September 19, 2024Ravi LakshmananCyber ​​attack / hacking It has been observed that threat actors are targeting the construction sector by infiltrating the FOUNDATION accounting softwareaccording to Huntress’ new findings. “It has been observed that attackers are mass exploiting the software and gaining access simply by using the product’s default credentials,” the cybersecurity company said. said. Plumbing, HVAC, concrete and other related industries are being targeted by the new threat. The FOUNDATION software comes with a Microsoft SQL (MS SQL) server to handle database operations and, in some cases, has TCP port 4243 open for direct database access via a mobile…

Read More