Author: Admin

December 4, 2024Ravi Lakshmanan A joint advisory issued by Australia, Canada, New Zealand and the United States warns of a widespread cyberespionage campaign by threat actors linked to the People’s Republic of China (PRC) targeting telecommunications providers. “Identified exploits or breaches associated with the activities of these threat actors coincide with existing vulnerabilities associated with the victims’ infrastructure; no new actions were observed”, – state institutions said. US officials told Tuesday that threat actors are still lurking in U.S. telecommunications networks nearly six months after an investigation into the intrusions began. The attacks were attributed to a group of nation-states…

Read More

December 4, 2024Ravi LakshmananVulnerability / Ransomware Veeam has released security updates to address a critical flaw affecting the Service Provider Console (VSPC) that could open the way for remote code execution on sensitive instances. The vulnerability, tracked as CVE-2024-42448, has a CVSS score of 9.9 out of a maximum of 10.0. The company noted that the bug was discovered during internal testing. “From the VSPC Management Agent machine, provided the Management Agent is authorized on the server, remote code execution (RCE) can be performed on the VSPC server machine”, Veeam said in the advisory. Another flaw fixed by Veeam is…

Read More

December 3, 2024Ravi LakshmananVulnerability / Network Security On Monday, Cisco updated its advisory to warn customers about the active exploitation of a decade-old security flaw affecting the Adaptive Security Appliance (ASA). Vulnerability, tracked as CVE-2014-2120 (CVSS Score: 4.3) concerns an instance of insufficient input validation on the WebVPN ASA login page that could have allowed an unauthenticated remote attacker to conduct a cross-site scripting (XSS) attack against the target user of the device. “An attacker could exploit this vulnerability by convincing a user to access a malicious link,” Cisco noted in a warning issued in March 2014. As of December…

Read More

December 3, 2024Ravi LakshmananEndpoint Security / Vulnerability Cybersecurity researchers have discovered a number of flaws affecting Palo Alto Networks and SonicWall virtual private network (VPN) clients that could potentially be used for remote code execution on Windows and macOS systems. “By targeting VPN clients’ implicit trust in servers, attackers can manipulate client behavior, execute arbitrary commands, and gain high levels of access with minimal effort.” — AmberWolf. said in the analysis. In a hypothetical attack scenario, this comes in the form of a fake VPN server that can trick customers into downloading malicious updates, which can cause unintended consequences. The…

Read More

December 3, 2024Ravi LakshmananThreat Intelligence / Email Security The North Korean threat actor known as Kimsuki has been linked to a series of phishing attacks that involve sending emails originating from Russian sender addresses to ultimately carry out credential theft. “Until early September, phishing emails were sent mainly through email services in Japan and Korea,” South Korean cybersecurity company Genians said. “Then, starting in mid-September, some phishing emails disguised as if they were sent from Russia were seen.” This entails the abuse of the VK Mail.ru e-mail service, which supports five different alias domains, including mail.ru, internet.ru, bk.ru, inbox.ru and…

Read More

December 2, 2024Ravi LakshmananMalware / cryptocurrency Taiwanese manufacturing, healthcare and information technology businesses have been targeted by a new SmokeLoader malware distribution campaign. “SmokeLoader is well known for its versatility and advanced evasion techniques, and its modular design allows for a wide range of attacks” – Fortinet FortiGuard Labs said in a report shared with The Hacker News. “While SmokeLoader mainly serves as a loader to deliver other malware, in this case it is carrying out the attack itself by loading plugins from its (command and control) server.” SmokeLoaderfirst touted on cybercrime forums in 2011, the malware downloader is primarily…

Read More

December 3, 2024Ravi LakshmananMalware / phishing attack A newly discovered malware campaign was found to be targeting private users, retailers and businesses serving primarily in Russia to deliver NetSupport RAT and BurnsRAT. Company, dubbing Horns and hooves from Kaspersky, from the beginning of March 2023. more than 1,000 people were injured. The ultimate goal of these attacks is to use the access provided by these Trojans to install malicious hijackers such as Rhadomantis and Medusa. “In recent months, there has been a surge in mailings with similar email attachments in the form of a ZIP archive containing JScript scripts,” security…

Read More

December 2, 2024Hacker newsAI Security / Data ProtectionArtificial Intelligence (AI) is no longer a distant dream – it is here, changing the way we live. From ordering coffee to diagnosing illnesses, it’s everywhere. But while you’re building the next big AI-powered app, hackers are already thinking of ways to break it. Every application of artificial intelligence is an opportunity and a potential risk. The stakes are huge: data leaks, downtime, and even security threats if security isn’t built in. With the rapid adoption of artificial intelligence, securing your projects is no longer a must – it’s a necessity. Join Litian…

Read More

December 2, 2024Ravi LakshmananMobile Security / Financial Fraud According to new findings from McAfee Labs, more than a dozen Android malware discovered in the Google Play Store, which have been downloaded more than 8 million times, contain malware known as SpyLoan. “These PUP (Potentially Unwanted Programs) apps use social engineering tactics to get users to provide sensitive information and grant additional permissions to mobile apps, which can lead to extortion, harassment, and financial loss,” security researcher Fernando Ruiz said in an analysis published last week. The newly discovered apps aim to offer quick loans with minimal requirements to attract unsuspecting…

Read More

December 2, 2024Ravi LakshmananFinancial Fraud / Cryptocurrency A global law enforcement operation resulted in the arrest of more than 5,500 financial crime suspects and the seizure of more than $400 million in virtual assets and government-backed currencies. Governments from 40 countries, territories and regions took part in the coordinated exercises as part of the latest wave Operation HAECHI-Vwhich took place between July and November 2024, Interpol reported. “The consequences of cybercrime can be devastating: people lose their savings, businesses are destroyed, and trust in digital and financial systems is undermined,” said INTERPOL Secretary-General Valdesi Urquiza. said in the statement. “The…

Read More