Author: Admin

Safety Operations Centers (SOC) today face unprecedented alert volumes and more complex threats. Triating and investigations of these announcements are expensive, bulky and increase fatigue, burnout and decrease in analysts. While artificial intelligence has arisen as a decision, the term “AI” often blurs important differences. Not all AI built equal, especially in SoC. Many existing solutions are based on the assistant that requires a permanent person’s contribution, while the new wave of autonomous, agency II can potentially convert safety operations. This article is considered by Agentic AI (sometimes known as Agenens Security(We will also study practical considerations for security leaders…

Read More

April 8, 2025Red LakshmananCyber ​​-aataka / vulnerability A recently disclosed The critical lack of security affecting Crushftp was added US Agency for Cybersecurity and Infrastructure (CISA) to known exploited vulnerabilities (Ship) Catalog after reporting active exploitation in the wild. A vulnerability This is the incident of Byipas authentication that can allow an unauthorized attacker to take sensitive instances. It was fixed In versions 10.8.4 and 11.3.1. “Crushftp contains authentication vulnerability in the HTTP authorization header, which allows a remotely unauthorized attacker to undergo any known or mentioned user account (eg, Crushadmin), which potentially leads to a complete compromise,” Cisa said…

Read More

April 8, 2025Red LakshmananMobile security / vulnerability Google has Starting patches For 62 vulnerabilities, two of which said they were used in the wild. Two vulnerabilities with high speed are below – Cve-2024-53150 . Cve-2024-53197 (CVSS assessment: 7.8) – lack of escalation of privileges in USB core core component “The most difficult of these issues is the critical safety vulnerability in the systemic components, which can lead to a distant escalation of privileges without additional privileges,” Google said in his monthly security newsletter in April 2025. “User interaction is not needed for operation.” The technical giant also acknowledged that both…

Read More

07 April 2025Red LakshmananMalicious software / network safety Cybersecurity agencies from Australia, Canada, New Zealand and the United States have published joint consultations on the risks related to the technique called Fast flow This was accepted by the actors threatening to obscure the team and control channel (C2). “” Quick Stream “is a technique used to exacerbate malicious servers through rapidly changing domain names (DNS) associated with one domain name”, agencies – Note. “This threat uses a gap that is commonly found in network protection, making tracking and blocking malicious rapid flow.” Advisory provision is provided by the US Cybersecurity…

Read More

07 April 2025Red LakshmananCloud security / cryptocurrency A malicious company named Lone Used compromised accounts related to customer connections management tools (CRM) and voluminous e -mail providers to send spam messages containing seed phrases of cryptocurrencies in an attempt to drain digital purses. “Main spam recipients are focused on the attack of the poisoning of cryptocurrency,” “Silent impetus” – Note In the analysis. “As part of the attack, Poisonseed provides seed security phrases to force potential victims to copy and insert them into new cryptocurrencies for future compromises.” Pruousrance goals include entrepreneurial organizations and non -cryptocurrencies. Crypto -Company, such as…

Read More

Probably the lonely actor of the wolf for Encryption Microsoft was recognized by Persona for opening and reporting two Windows deficiencies last month, drawing a picture of a “contradictory” individual, which pursues a legitimate career in cybersecurity and persecution of cybercrime. In the new a wide analysis Published by Outpost24 Krakenlabs, the Swedish security company revealed the future cybercriminator, who escaped from his hometown in Kharkiv, Ukraine, to a new place near the Romanian coast about 10 years ago. Microsoft’s vulnerabilities were enlisted by a party called “Skorikari with Skorikari”, which was evaluated by another name used Encrypthub. The disadvantages…

Read More

05 April 2025Red LakshmananAttacking Malicious Programs / Chain Supplies North Korean subjects threatening behind the current Increased interview The company distributes its NPM ecosystem tentacles, publishing more malicious packages that deliver the Beavertail malicious software, as well as the new Trojan loader (rat). “These recent samples use hexadecimal lines that shy away from automated manual code detection systems, signaling variations in the threat -threatening actors – Note In the report. The packages in question, which were combined more than 5 600 times before their deletion, are given below – below – A blank-lydator Twitterappis Dev-DEBGGER-VITE Snore-Log Core -no Events-use iCloud-Cod…

Read More

05 April 2025Red LakshmananAttacking Malicious Programs / Chain Supplies Cybersecurity researchers have discovered malicious libraries in Python Package (PYPI) storage facilities designed for confidential information. Two packages, Bitcoinlibdbfix and Bitcoinlib-Dev, masquerade as fixes for Recent problems discovered in the legal Python module called Bitcoinlib, according to Reversinglabs. The third package detected According to Socket, Sursya, contained a fully automated card -oriented script scenario. The packages attracted hundreds of downloads before they were lifted, according to statistics from pepy.tech – “The malicious libraries are trying to attack a similar attack by re -recording the CLI CLI legal team, which tries to…

Read More

04 April 2025Red LakshmananVulnerability / with open source, A cascade supply chain attacks this Initially focused on Coinbase Before becoming broader to highlight users ‘TJ-Actions/Changer-Files’ that GitHub is leaked further to the theft of personal access token (Pat) related to Spotbugs. “The attackers have received initial access by using the workpiece of GitHub Spotbugs, a popular tool – Note In the update this week. “This allowed the attackers to move away between Spotbugs repositories before receiving the review.” There are data that suggest that the harmful activity began back in November 2024, although the attack on Coinbase took place until…

Read More

04 April 2025Red LakshmananIntelligence threats / malicious software Was marked with a beginner by cyberclassNf / h) A provider called Proton66 to facilitate their activities. The data received from Domaintools, which discovered the activity after discovered a fake site called CybersecureProtect (.) COM, located on Proton66, which was masked as an antivirus service. The threatening firm said that the domain revealed the refusal of the prompt safety (OPSEC), which left its malicious infrastructure, thus revealing the harmful useful loads put on the server. “This discovery led us to the rabbit – Note In a report that shared with Hacker News.…

Read More