Author: Admin
January 8, 2025Ravi LakshmananVulnerability / Network Security The US Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three flaws affecting Mitel MiCollab and Oracle WebLogic Server for its known vulnerabilities (KEV) catalog with reference to evidence of active operation. The list of vulnerabilities is as follows – CVE-2024-41713 (CVSS Score: 9.1) – Path traversal vulnerability in Mitel MiCollab that could allow an attacker to gain unauthorized and unauthenticated access CVE-2024-55550 (CVSS Score: 4.4) – Path traversal vulnerability in Mitel MiCollab that could allow an authenticated attacker with administrative privileges to read local files on the system due to insufficient…
January 7, 2025Ravi LakshmananFirmware Security / Malware Cybersecurity researchers have discovered firmware security vulnerabilities in the Illumina iSeq 100 DNA sequencing instrument that, if successfully exploited, could allow attackers to block or install persistent malware on sensitive devices. “The Illumina iSeq 100 used a very outdated implementation BIOS firmware using CSM (Compatibility Support Mode) mode and without secure boot or standard firmware write protection,” Eclypsium said in a report shared with The Hacker News. “This would allow an attacker on the system to overwrite the system’s firmware to either ‘brick’ the device or install a firmware implant for the attacker’s…
It’s time to once again pay tribute to once-famous cybersecurity solutions whose usefulness died last year. The cybercriminal world is collectively mourning the loss of these solutions and the easy access they provide to victim organizations. These decisions, though celebrated at the best of times, succumbed to the twin forces of time and impending threats. As well as paying tribute to the celebrities who lost their lives in the past year, this article will look back at some of the brightest stars in cyber security who died last year. 1. Outdated Multi-Factor Authentication (MFA) Cause of death: Compromised by sophisticated…
The US Cybersecurity and Infrastructure Security Agency (CISA) said on Monday that there was no indication that the cyber attack targeting the Treasury Department had affected other federal agencies. The agency said it is working closely with the Treasury Department and BeyondTrust to better understand and mitigate the breach. “The security of federal systems and the data they protect is critical to our national security,” CISA said. “We are actively working to guard against any further impacts and will provide updates as needed.” The latest statement came a week after the Ministry of Finance said it was the victim of…
The new version of EAGERBEE is aimed at ISPs and governments with advanced backdoor capabilities
January 7, 2025Ravi LakshmananCyber attack / hacking Internet service providers (ISPs) and government organizations in the Middle East have been targeted using an updated variant of the EAGERBEE malware system. A new version of EAGERBEE (aka Tumtais) comes with various components that allow the backdoor to deploy additional payloads, enumerate filesystems, and execute shell commands, showing significant evolution. “The main plug-ins can be divided according to their functionality into the following groups: plug-in orchestrator, file system manipulation, remote access manager, process study, list of network connections and service management,” Kaspersky researchers Saurabh Sharma and Vasil Berdnikov note. said in the…
January 7, 2025Ravi LakshmananVulnerability / Network Security Taiwan’s Moxa has warned of two security vulnerabilities affecting cellular routers, secure routers, and network security devices that could allow elevation of privilege and command execution. The list of vulnerabilities is as follows – CVE-2024-9138 (CVSS Score 4.0: 8.6) – A hard-coded credential vulnerability that could allow an authenticated user to elevate privileges and gain root access to the system, leading to system compromise, unauthorized modification, data disclosure, or service failure CVE-2024-9140 (CVSS Score 4.0: 9.3) – The vulnerability allows attackers to use special characters to bypass input restrictions, which could lead to…
January 6, 2025Ravi LakshmananRegulatory Compliance / Data Privacy The Indian government has published draft of the Digital Personal Data Protection Rules (DPDP) for public consultation. “Trustees must provide clear and accessible information about how personal data is processed, ensuring informed consent” – Press Information Bureau of India (PIB) said in a statement released on Sunday. “Citizens have the right to request data erasure, appoint digital nominees and access convenient mechanisms to manage their data.” The regulations, which aim to implement the Digital Personal Data Protection Act 2023, also give citizens more control over their data, giving them the ability to…
January 6, 2025Ravi LakshmananMalware / Mobile Security The name of an Android malware that steals information FireScam was found masquerading as a premium version of Telegram messaging app to steal data and maintain constant remote control over compromised devices. “Disguised as a fake ‘Telegram Premium’ app, it is distributed via a phishing site on GitHub.io that pretends to be RuStore, a popular app store in the Russian Federation,” Cyfirma reported. saiddescribing it as a “complex and multi-faceted threat”. “The malware uses a multi-stage infection process starting with an APK dropper and performs extensive surveillance activities after installation.” The phishing site…
In 2024, cyberthreats targeting SaaS grew, with 7,000 password attacks blocked per second (on Entra ID alone)—a 75% year-over-year increase—and phishing attempts up 58%, resulting in losses of 3 .5 billion dollars (source: Microsoft’s 2024 Digital Security Report). SaaS attacks are on the rise, and hackers often evade detection through legitimate usage patterns. The cyber threat arena has seen great players, unexpected underdogs and relentless scorers make their mark on the SaaS security playing field. As we enter 2025, security services must prioritize SaaS Security Risk Assessment to identify vulnerabilities, adopt SSPM tools for continuous monitoring, and proactively protect your…
January 6, 2025Ravi LakshmananBlockchain / Malware Cybersecurity researchers discovered several malicious packages in the npm registry that were found to mimic the Hardhat Nomic Foundation tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers infiltrated these platforms via malicious npm packages, stealing important data such as private keys, mnemonics, and configuration details,” Socket Research Group said in the analysis. today is an Ethereum software development environment that contains various components for editing, compiling, debugging, and deploying smart contracts and decentralized applications (dApps). The list of detected fake packages is as follows…