Author: Admin

July 25, 2024Information hallMalware / cyber espionage The North Korea-linked threat, known for its cyber espionage operations, has gradually evolved into financially motivated attacks that include the deployment of ransomware, setting it apart from other nation-state hacking groups linked to the country. Google-owned Mandiant is tracking the activity cluster under a new alias APT45which overlaps with names like Andariel, Nickel Hyatt, Onyx Sleet, Stonefly and Silent Chollima. “APT45 is a long-standing moderate North Korean cyber operator that has conducted espionage campaigns as far back as 2009,” researchers Taylor Long, Jeff Johnson, Alice Revelli, Fred Plan and Michael Barnhart said. “APT45…

Read More

July 25, 2024Information hallCloud Security / Vulnerability Cybersecurity researchers have disclosed a privilege escalation vulnerability affecting the Google Cloud Platform cloud service that an attacker could use to gain unauthorized access to other services and sensitive data. It is stable given a vulnerability called ConfusedFunction. “An attacker can elevate their privileges to the default Cloud Build service account and gain access to many services, such as Cloud Build, the repository (including the source code of other features), the artifact registry, and the container registry,” the company said in a statement exposure management. “This access allows for lateral movement and elevation…

Read More

July 25, 2024Information hallCyber ​​Crime / Internet Security On Wednesday, Meta Platforms said it had taken steps to remove about 63,000 Instagram accounts in Nigeria that were found to be targeting people with financial scams. “These included a smaller coordinated network of approximately 2,500 accounts that we were able to link to a group of approximately 20 people,” the company said in a statement. said. “They targeted mostly adult males in the US and used fake accounts to disguise their identities.” In cases where some of these accounts attempted to target minors, Meta said it reported them to the National…

Read More

July 25, 2024Hacker newsBrowser Security / Enterprise Security The browser is the nerve center of the modern workspace. Ironically, the browser is also one of the least protected threats in today’s businesses. Traditional security tools provide little protection against in-browser threats, leaving organizations at risk. Modern cyber security requires a new defense-based approach the browser itself, which ensures security and seamless deployment. In an upcoming live webinar (Register here), Or Ashed, CEO of browser security company LayerX, and Christopher Smedberg, Director of Cyber ​​Security at Advance Publishing, will discuss the challenges facing today’s businesses in the new world of hybrid…

Read More

July 25, 2024Information hallDNS Security/Vulnerability The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (CONNECT) 9 A Domain Name System (DNS) software package that can be used to initiate a Denial of Service (DoS) condition. “A cyber threat actor could exploit one of these vulnerabilities to cause a denial of service condition,” the US Cybersecurity and Infrastructure Security Agency (CISA) said. said in the consulting room. The list of four vulnerabilities is listed below – CVE-2024-4076 (CVSS Score: 7.5) – Due to a logic error, lookups that initiated maintenance of…

Read More

July 25, 2024Information hallBrowser Security / Data Protection Google said it is adding new security warnings when downloading potentially suspicious and malicious files through the Chrome web browser. “We’ve replaced our previous warnings with more detailed ones that convey more nuance about the nature of the threat and can help users make more informed decisions,” Jessica Bava, Lily Chen, and Daniel Rubery of the Chrome Security team. said. To that end, the search giant is introducing a two-tiered taxonomy of download warnings based on Google Safe Browsing verdicts: suspicious files and dangerous files. Each category has its own iconography, color…

Read More

July 25, 2024Information hallContainer Security / Vulnerability Docker warns of a critical flaw affecting some versions of the Docker Engine that could allow an attacker to bypass authorization plugins (AuthZ) under certain circumstances. Tracked as CVE-2024-41110the bypass and elevation of privilege vulnerability has a CVSS score of 10.0, indicating maximum severity. “An attacker could exploit a workaround by using an API request with a content-length set to 0, causing the Docker daemon to redirect the request without a body to the AuthZ plugin, which could validate the request incorrectly,” the Moby project said in an advisory. Docker said the problem…

Read More

Introduction Almaida Askandar, one of the founders of IABF Law Group (2003), obtained her law degree from the University of Indonesia (business law). She is fluent in both Indonesian and English. Askandar’s professional experience extends across a number of major capital markets law firms in Jakarta. She has particular expertise in advising on capital markets and securities; corporate and commercial law; M&A; anti-trust; along with litigation court practices and bankruptcy. Askandar is a licensed capital markets lawyer, along with being a registered consultant for Commercial Paper Transaction at Money Market (Lembaga Pendukung Pasar Uang yang Melakukan Kegiatan terkait Surat Berharga…

Read More

A zero-day security issue in the Telegram mobile app for Android called EvilVideo has made it possible for attackers to access malicious files disguised as harmless-looking videos. The exploit appeared for sale at an unknown price on an underground forum on June 6, 2024, ESET said. After a responsible disclosure on June 26, the problem was resolved by Telegram in version 10.14.5, released on July 11. “Attackers can share malicious Android payloads through Telegram channels, groups, and chat and make them appear as multimedia files,” — Lukasz Stefanka, security researcher. said in the report. The payload is believed to be…

Read More

BEIJING, Jan. 31 (Xinhua) — In 2008, the year China hosted the Summer Olympic Games, the Beijing-Tianjin Intercity Railway was put into operation, unveiling a fast-expanding modern high-speed railway (HSR) network in the world’s second-largest economy.A “Fuxing” high-speed train runs on the Beijing-Tianjin Intercity Railway in Beijing, capital of China, Jan. 25, 2019. (Xinhua/Xing Guangli)The first train of the Beijing-Tianjin Intercity Railway departs from Beijing South Railway Station in Beijing, capital of China, Aug. 1, 2008. (Xinhua/Gong Lei) A driver works on a train running on the Beijing-Tianjin Intercity Railway on Aug. 1, 2008. (Xinhua) A passenger displays a ticket on a…

Read More