Author: Admin

June 24, 2025Red LakshmananData Protection / Mobile Security The US House has officially banned Congress employees to use WhatsApp on the device issued by the government, citing security issues. Development was First reported According to the axiids. According to the Chief Administrative Director of the House (CAO), the decision was motivated by the care of the security security. “Cybersecurity management has considered WhatsApp high risk to users due to lack of transparency in how they protect users, lack of saved data encryption and potential safety risks associated with its use,” CAO said, Axios reports. To this end, the home staff…

Read More

June 24, 2025Red LakshmananCyber ​​-Shpian / Chinese Hackers The Canadian Cybersecurity and the Federal Bureau of the US (FBI) is removed Advisory Warning on Cyberats established in China related The salt typhoon Actors of violation of large global telecommunications providers as part of the Cyber ​​-Spanning campaign. Attackers used critical Cisco iOS XE (Cve-2013-20198. It is said that the threat subjects have changed at least one of the files to configure the overall encapsulation of the routing (Great) Tunnel by including traffic from the network. The name of the target company was not disclosed. Starting that targeting is likely to…

Read More

June 23, 2025Red LakshmananHactivism / cyber -wine The United States government has warned of cyber-napades established by pro-Irian groups after launching air strikes at the Iran-Israel War, which began on June 13, 2025. Having stated that the constant conflict created a “enhanced threat” in the country, the Internal Security Department (DHS) said in the ballot that cyber subjects would probably be focused on the US network. “Low-level cyber-taps against US pro-Irki-Khaktivists are likely, and cyber subjects related to the Iranian government may attack the US networks,” DHS – Note. “Both the Khactivists and Iranian subjects related to the government are…

Read More

June 23, 2025Red LakshmananLLM / security security AI safety Cybersecurity researchers pay attention to a new prison method called Echo Chamber, which can be used to deceive popular big linguistic models (LLMS) to create unwanted answers, regardless of the provided. “Unlike traditional prison products based on competition, or collecting character, echo armed link, semantic management and multi-stage conclusions,” Ahmad Alobae’s nervous path. – Note In a report that shared with Hacker News. “As a result, a thin, but powerful manipulation of the internal state of the model, which gradually leads it to the creation of the reactions that develop politics.”…

Read More

June 23, 2025Red LakshmananCyber ​​-Spying / vulnerability Cybersecurity researchers found malware based on Go called Xdigo, used in attacks aimed at the Eastern European State Structure in March 2025. It is said that the attack chains are using the Windows Quick Access Collection (Lnk) Files within a multi -stage procedure for deployment of malware, French Cybersecurity Harfanglab – Note. XDSPY – This is the name appointed Cyber ​​-spanning, which is known to focus on state bodies in Eastern Europe and the Balkans since 2011. It was first recorded by the Belarusian certificate in early 2020. In recent years, companies in…

Read More

I am sure it is difficult to be SOC analyst. Every day, they are expected to solve high data problems with half data and twice as much pressure. Analysts are overloaded – not only threats, but also in systems and processes that are designed to help them respond. The instrument is fragmented. Working processes are difficult. The context lives in five places, and alerts never slow down. What has started as a rapid role with high impact, for many analysts, has become a repetitive alert cycle and overload data that offer little opportunity for strategy and growth. Most SoC teams…

Read More

Google has revealed different security measures that are included in its generative artificial intelligence (AI) to mitigate vectors such as indirect clues, and improve overall security for Agentic AI Systems. “Unlike a direct prompt when the attacker directly introduces malicious commands into a hint, Indirect clues Include hidden malicious instructions within external data sources, “Google security team – Note. These external sources can take the form of email messages, documents or even calendar that cheat AI systems in the expressive data or perform other harmful action. The technical giant said it is realize What she called the “layered” defense strategy…

Read More

June 21, 2025Red LakshmananCyber ​​-Atak / Critical Infrastructure Earning for Cyber ​​-Napada in April 2025 UK retailers Marks & Spencer and Co -op were classified as a “single combined cyber”. This is evaluated by the Cyber ​​monitoring Center (CMC), an independent non-profit body based in the UK, created by the insurance industry for the classification of major cyber events. “Given that one of the actors threatened has claimed responsibility for both M&S and co-op, close terms and similar tactics, methods and procedures (TTPS), CMC evaluated incidents as the only combined cyber picard, CMC and CMC – Note. The organization classified…

Read More

The threatening subjects behind the Qiilin Ransomware Service Scheme (RAAS) now offers a legal lawyer for affiliates to put more pressure on the victims to pay because a group of cybercrime enhances its activity and tries to fill the void left by its rivals. The new feature has the form of a “lawyer’s lawyer” on the affiliate panel, for Israeli cybersecurity Cyber. Development represents new revival From the electronic crimes group, as once popular ransom groups such as Lockbit, Black Cat, RansomHub, Everest and Blacklock, harsh cessions, surgical failures and defects have suffered. A group, which is also monitored as…

Read More

June 20, 2025Red LakshmananCyber ​​-wine / hactivism Iran’s state television presenter, owned by television TV channels, was hacked on Wednesday evening to interrupt regular programming and air videos calling for street protests against the Iranian government, according to many reports. It is now unknown who is behind the attack, though Iran sent his fingers to Israel, Iran International. “If you feel disturbances or irrelevant messages while viewing different TV channels, this is due to the enemy’s intervention in satellite signals,” there was a television company quoted As they say. Violation of state television – last in A string of cyberattacks…

Read More