Author: Admin
September 25, 2024Ravi LakshmananVulnerability / Cyber attack The US Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added critical security flaw affecting known vulnerabilities in Ivanti Virtual Traffic Manager (vTM) (KEV) catalog based on evidence of active operation. The vulnerability in question CVE-2024-7593 (CVSS score: 9.8), which could be used by a remote, unauthenticated attacker to bypass admin panel authentication and create fake admin users. “Ivanti Virtual Traffic Manager contains an authentication bypass vulnerability that could allow a remote, unauthenticated attacker to create a chosen administrator account,” CISA said. The issue was fixed by Ivanti in vTM 22.2R1, 22.3R3, 22.5R2,…
September 24, 2024Ravi LakshmananMobile Security / Malware Altered versions of legitimate Android apps related to Spotify, WhatsApp and Minecraft were used to deliver a new version of a popular malware downloader called Necro. Kaspersky said some of the malware was also found in the Google Play Store. They have been downloaded 11 million times. They include – Wuta Camera – Nice Shot Always (com.benqu.wuta) – Over 10 million downloads Max Browser-Private & Security (com.max.browser) – 1+ million downloads At the time of writing, Max Browser is no longer available for download from the Play Store. Wuta Camera, on the other…
SaaS applications contain a lot of sensitive data and are central to business operations. Despite this, too many organizations rely on half measures and hope that their SaaS suite will remain secure. Unfortunately, this approach is lacking, and security teams will be blind to threat prevention and detection, and open to regulatory breaches, data breaches, and significant breaches. If you understand the importance of SaaS security and need help explaining it internally to motivate your team, this article is for you—and covers: Why SaaS data should be protected Real examples of attacks on SaaS programs The attack surface of SaaS…
September 24, 2024Ravi LakshmananNational Security/Regulatory Compliance The US Department of Commerce (DoC) said it is proposing to ban the import or sale of connected vehicles that incorporate software and hardware made by foreign adversaries, particularly the People’s Republic of China (PRC) and Russia. “The proposed rule focuses on hardware and software integrated into the vehicle connectivity system (VCS) and software integrated into the automated control system (ADS),” according to the Bureau of Industry and Security (BIS). said in a press statement. “These are critical systems that enable external connectivity and autonomous driving capabilities in connected vehicles through dedicated hardware and…
Kaspersky is leaving the US, automatically replacing the software with UltraAV, which is a cause for concern
September 24, 2024Ravi LakshmananAntivirus / national security Antivirus vendor Kaspersky has officially begun withdrawing its offerings in the US, migration of existing users to UltraAV, which will go into effect on September 19, 2024, ahead of its official release at the end of the month. “Kaspersky antivirus customers have received a software update that facilitates the transition to UltraAV,” the company said in a statement on September 21. “This update has ensured that users will not experience a security gap after Kaspersky exits the market.” Russian company that was banned from selling their software in the US due to national…
September 24, 2024Hacker newsWebinar / Cyber security Ransomware is no longer just a threat; it’s an entire industry. Cybercriminals are becoming more sophisticated and their tactics are evolving rapidly. This constant danger is of great concern to business leaders. But there is good news: you don’t have to be vulnerable. What if you could gain a strategic advantage? Join our exclusive webinar, “Unpacking the 2024 Ransomware Landscape: Insights and Strategies from ThreatLabz,” featuring Emily Laufer, Director of Product Marketing at Zscaler. Emily will break down the latest ThreatLabz findings and give you practical strategies to stay ahead of cybercriminals. In…
September 24, 2024Ravi LakshmananMobile Security / Cybercrime Cybersecurity researchers have discovered a new version of the Android banking trojan called Octo that comes with enhanced device hijacking capabilities (DTO) and perform fraudulent transactions. The new version received a code name October 2 Dutch security firm ThreatFabric said in a report shared by The Hacker News, adding that the malware distribution campaigns were spotted in European countries such as Italy, Poland, Moldova and Hungary. “Malware developers have taken steps to improve the stability of the remote capabilities required for Device Takeover attacks,” the company said in a statement. said. Some of…
September 24, 2024Ravi LakshmananData Privacy / Cybercrime Popular messaging app Telegram has announced a major policy reversal that will give authorities users’ IP addresses and phone numbers in response to legitimate requests in an attempt to curb criminal activity on the platform. “We have made it clear that the IP addresses and phone numbers of those who violate our rules may be handed over to relevant authorities in response to legitimate requests,” Telegram CEO Pavel Durau. said in the post. To this end, the company now directly states – “If Telegram receives a valid warrant from the relevant judicial authorities…
September 23, 2024Hacker newsPassword management / data breach Password resets can be frustrating for end users. No one likes being interrupted with a “time to change your password” notification – and even less likes it when the new passwords they create are rejected by their organization’s password policy. IT teams share the pain, as resetting passwords via help desk tickets and calls to support is a daily burden. Despite this, it is generally accepted that all passwords should expire after a specified period of time. Why is this so? Do you even need password expirations? Learn why passwords expire and…
September 23, 2024Ravi LakshmananCyber Security / Cyber Threat Hang in there folks, because the cybersecurity landscape has been terrifying this past week! We’ve seen everything from North Korean hackers landing their “dream jobs” to expose new malware to a surprising twist in the Apple vs. NSO Group saga. Even in the seemingly mundane world of domain names and cloud configurations, there was some drama. Let’s dig into the details and see what lessons we can learn from last week. ⚡ Threat of the week Raptor Train botnet dismantled: The US government announced taking down the Raptor Train botnet controlled by…