Author: Admin

November 7, 2024Ravi LakshmananVulnerability / wireless technology Cisco has released security updates to address a maximum severity security flaw affecting Ultra-Reliable Wireless Backhaul (URWB) access points that could allow unauthenticated remote attackers to execute elevated-privilege commands. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability was described as resulting from a lack of input validation in the Cisco Unified Industrial Wireless Software web management interface. “An attacker could exploit this vulnerability by sending crafted HTTP requests to the web management interface of an affected system,” Cisco said in an advisory issued Wednesday. “A successful exploit could allow an attacker to execute…

Read More

November 7, 2024Ravi LakshmananNational Security / Social Networks The Canadian government on Wednesday ordered TikTok, owned by ByteDance, to stop operating in the country, citing national security risks, but stopped short of banning the popular video-sharing platform. “The decision was based on information and evidence gathered during the review, as well as recommendations from the Canadian Security and Intelligence Service and other government partners,” said Francois-Philippe Champagne, Minister of Innovation, Science and Industry. said in the statement. The government said it has no intention of blocking Canadians’ access to the app itself or restricting their ability to create new content,…

Read More

November 6, 2024Ravi LakshmananSaaS Security / Threat Detection Duplicate threat campaign VEILDrive was seen using legitimate Microsoft services, including Teams, SharePoint, Quick Assist and OneDrive, as part of its modus operandi. “Using Microsoft SaaS services — including Teams, SharePoint, Quick Assist and OneDrive — the attacker used the trusted infrastructure of previously compromised organizations to spread phishing attacks and store malware,” Israeli cybersecurity firm Hunters said. said in a new report. “This cloud-centric strategy allowed the threat actor to avoid detection by conventional monitoring systems.” Hunters said they discovered the company in September 204 after it responded to a cyber…

Read More

November 6, 2024Ravi LakshmananMalware / Internet Security Cybersecurity researchers warn that a command and control (C&C) system called Vinos distributed in game-related applications such as installers, speed boosters, and optimization utilities. “Winos 4.0 is an advanced malware framework that offers comprehensive functionality, a stable architecture, and effective control over multiple online endpoints for further action.” – Fortinet FortiGuard Labs said in a report shared with The Hacker News. “Rebuilt from v Gh0st RATit includes several modular components, each of which performs a different function.’ Winos 4.0 distribution campaigns were documented in June by Trend Micro and the KnownSec 404 team.…

Read More

Budget season is upon us, and everyone in your organization is fighting for their piece of the pie. Each year, each department has a favorite project that they present as absolutely critical to profitability, business continuity, and quite possibly the future of humanity itself. And there is no doubt that some of them are maybe mission critical. But as cybersecurity professionals, we understand that deploying a viable CTEM (Managing continuous threat exposure) program actually there is. In any given year, investments in cybersecurity are a tough budget sell—they’re hard to quantify and don’t always translate to increased revenue or reduced…

Read More

IoT devices in a password spraying botnet Microsoft is a warning Users of the Azure cloud believe that a Chinese-controlled botnet is “very sneaky” about spraying passwords. Not sure about the “very elusive” part; methods seem to be basically what you get in a distributed password-picking attack: “Any threat actor using the CovertNetwork-1658 infrastructure can conduct password spraying campaigns on a larger scale and significantly increase the likelihood of successfully compromising credentials and gaining initial access to multiple organizations in a short period of time,” Microsoft officials wrote. “This scale, combined with the rapid operational turnover of compromised credentials between…

Read More

November 6, 2024Ravi LakshmananCyber ​​Threat / Cyber ​​Crime On Tuesday, INTERPOL said it had taken down more than 22,000 malicious servers linked to various cyber threats in a global operation. The coordinated effort, dubbed Operation Synergia II, ran from April 1 to August 31, 2024, and targeted phishing, ransomware and information-stealing infrastructure. “Of the approximately 30,000 suspicious IP addresses identified, 76 percent were eliminated and 59 servers were seized,” Interpol said. said. “In addition, 43 electronic devices were seized, including laptops, mobile phones and hard drives.” The actions also led to the arrest of 41 people, with another 65 people…

Read More

November 6, 2024Ravi LakshmananData Privacy / Technical Regulation Meta has been fined 21.62 billion won ($15.67 million) by South Korea’s privacy watchdog for illegally collecting Facebook users’ sensitive personal information, including information about their political views and sexual orientation, and sharing it with advertisers without their consent. The country’s Personal Information Protection Commission (PIPC) said Meta collected information such as religious affiliation, political views and same-sex marital status on about 980,000 local Facebook users and shared it with 4,000 advertisers. “Specifically, it was found that behavioral information, such as the pages users ‘like’ on Facebook and the ads they clicked…

Read More

November 6, 2024Ravi LakshmananCloud Security / Phishing Protection Google’s cloud division has announced that it will make multi-factor authentication (MFA) mandatory for all users by the end of 2025 as part of efforts to improve account security. “We will be phasing in mandatory MFA for Google Cloud, rolling out to all users worldwide throughout 2025,” Mayank Upadhyay, VP of Development and Principal Engineer, Google Cloud. said in the statement. “To ensure a smooth transition, Google Cloud will provide advance notice to businesses and users along the way to help plan for MFA deployment.” The deployment process is planned to take…

Read More

The US Federal Bureau of Investigation (FBI) is asking for the public’s help in its investigation into the hacking of edge devices and computer networks belonging to companies and government organizations. “The Advanced Persistent Threat group allegedly created and deployed malware (CVE-2020-12271) as part of a widespread series of indiscriminate computer intrusions designed to steal sensitive data from firewalls around the world,” the agency said. said. “The FBI is seeking information on the individuals responsible for these cyber intrusions.” Development occurs after a a series of reports published by cybersecurity vendor Sophos, which describes a number of campaigns from 2018…

Read More