Author: Admin

The US Cybersecurity and Infrastructure Security Agency (CISA) said on Monday that there was no indication that the cyber attack targeting the Treasury Department had affected other federal agencies. The agency said it is working closely with the Treasury Department and BeyondTrust to better understand and mitigate the breach. “The security of federal systems and the data they protect is critical to our national security,” CISA said. “We are actively working to guard against any further impacts and will provide updates as needed.” The latest statement came a week after the Ministry of Finance said it was the victim of…

Read More

January 7, 2025Ravi LakshmananCyber ​​attack / hacking Internet service providers (ISPs) and government organizations in the Middle East have been targeted using an updated variant of the EAGERBEE malware system. A new version of EAGERBEE (aka Tumtais) comes with various components that allow the backdoor to deploy additional payloads, enumerate filesystems, and execute shell commands, showing significant evolution. “The main plug-ins can be divided according to their functionality into the following groups: plug-in orchestrator, file system manipulation, remote access manager, process study, list of network connections and service management,” Kaspersky researchers Saurabh Sharma and Vasil Berdnikov note. said in the…

Read More

January 7, 2025Ravi LakshmananVulnerability / Network Security Taiwan’s Moxa has warned of two security vulnerabilities affecting cellular routers, secure routers, and network security devices that could allow elevation of privilege and command execution. The list of vulnerabilities is as follows – CVE-2024-9138 (CVSS Score 4.0: 8.6) – A hard-coded credential vulnerability that could allow an authenticated user to elevate privileges and gain root access to the system, leading to system compromise, unauthorized modification, data disclosure, or service failure CVE-2024-9140 (CVSS Score 4.0: 9.3) – The vulnerability allows attackers to use special characters to bypass input restrictions, which could lead to…

Read More

January 6, 2025Ravi LakshmananRegulatory Compliance / Data Privacy The Indian government has published draft of the Digital Personal Data Protection Rules (DPDP) for public consultation. “Trustees must provide clear and accessible information about how personal data is processed, ensuring informed consent” – Press Information Bureau of India (PIB) said in a statement released on Sunday. “Citizens have the right to request data erasure, appoint digital nominees and access convenient mechanisms to manage their data.” The regulations, which aim to implement the Digital Personal Data Protection Act 2023, also give citizens more control over their data, giving them the ability to…

Read More

January 6, 2025Ravi LakshmananMalware / Mobile Security The name of an Android malware that steals information FireScam was found masquerading as a premium version of Telegram messaging app to steal data and maintain constant remote control over compromised devices. “Disguised as a fake ‘Telegram Premium’ app, it is distributed via a phishing site on GitHub.io that pretends to be RuStore, a popular app store in the Russian Federation,” Cyfirma reported. saiddescribing it as a “complex and multi-faceted threat”. “The malware uses a multi-stage infection process starting with an APK dropper and performs extensive surveillance activities after installation.” The phishing site…

Read More

In 2024, cyberthreats targeting SaaS grew, with 7,000 password attacks blocked per second (on Entra ID alone)—a 75% year-over-year increase—and phishing attempts up 58%, resulting in losses of 3 .5 billion dollars (source: Microsoft’s 2024 Digital Security Report). SaaS attacks are on the rise, and hackers often evade detection through legitimate usage patterns. The cyber threat arena has seen great players, unexpected underdogs and relentless scorers make their mark on the SaaS security playing field. As we enter 2025, security services must prioritize SaaS Security Risk Assessment to identify vulnerabilities, adopt SSPM tools for continuous monitoring, and proactively protect your…

Read More

January 6, 2025Ravi LakshmananBlockchain / Malware Cybersecurity researchers discovered several malicious packages in the npm registry that were found to mimic the Hardhat Nomic Foundation tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers infiltrated these platforms via malicious npm packages, stealing important data such as private keys, mnemonics, and configuration details,” Socket Research Group said in the analysis. today is an Ethereum software development environment that contains various components for editing, compiling, debugging, and deploying smart contracts and decentralized applications (dApps). The list of detected fake packages is as follows…

Read More

January 4, 2025Ravi LakshmananSoftware Vulnerability / Security A serious security flaw has been discovered in ProjectDiscovery Nucleia widely distributed open source vulnerability scanner that, if successfully exploited, can allow attackers to bypass signature verification and potentially execute malicious code. Tracked as CVE-2024-43405it has a CVSS score of 7.4 out of a maximum of 10.0. This affects all versions of Nuclei later than 3.0.0. “The vulnerability results from a mismatch between the way the signature validation process and the YAML parser handle newline characters, combined with the way multiple signatures are handled,” it said. description vulnerabilities. “This allows an attacker to…

Read More

January 4, 2025Ravi LakshmananMalware / VPN Security Cyber ​​security researchers have identified a new malware called A FUNNY GHOST which comes with a wide range of information gathering features such as keyboard, screen capture, audio capture, remote shell and file transfer/execution. Backdoor, according to Google’s managed protection team, shares features with a well-known remote administration tool called Gh0st RATwhose source code was published in 2008. PLAYFULGHOST’s initial access routes include using behavior-related phishing emails or search engine optimization (SEO) poisoning techniques to distribute trojanized versions of legitimate VPN programs such as LetsVPN. “In one phishing case, the infection begins by…

Read More

January 4, 2025Ravi LakshmananCyber ​​espionage / IoT botnet On Friday, the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) imposed sanctions on a Beijing-based cybersecurity company known as Integrity Technology Group, Incorporated for orchestrating several cyberattacks against U.S.-based victims. These attacks were publicly attributed to the Chinese state threat actor being tracked Linen typhoon (aka Ethereal Panda or Red Juliet), which was published last year under the name Internet of Things (IoT) botnets. Raptor train. The hacking team has been active since at least mid-2021, targeting various organizations in North America, Europe, Africa and Asia. Attacks carried out by…

Read More