Author: Admin
In 2024, the world’s ransomers hit 5,414, which increased by 11% compared to 2023. After slow launch, the attacks were made to the quarter and grew in Q4 quarter, from 1827 incidents (33% of the total year). Law enforcement agencies against major groups such as Lockbit caused fragmentation, leading to greater competition and growth of smaller gangs. The amount of active Ransom The groups jumped 40%, from 68 in 2023 to 95 in 2024. New Ransomware groups to view In 2023 there were only 27 new groups. In 2024, there was a sharp growth of 46 new groups. As the…
03 March 2025Red LakshmananMobile Security / Botnet Brazil, South Africa, Indonesia, Argentina and Thailand became target Water. The improved VO1D version has been found to cover 800,000 daily active IP, and Botnet is scalable 1590 on January 19, which covers 226 countries. As of February 25, 2025, India survived a significant increase in infection, increasing from less than 1% (3.901) to 18.17% (217 771). “VO1D has developed to increase its resistance, stability and anti-visites,” Qianxin Xlab – Note. “RSA encryption provides networking, preventing (teams and control) absorption, even if (domain generation algorithm) is registered by researchers. Each useful load uses…
01 March 2025Red LakshmananPrivacy / Data Protection Firefox Mozilla browser manufacturer on Friday updated its use terms for the second time during the week subsequent censure Shipment language, which seemed to give the company the right to all the information downloaded by users. A revised Use Conditions now state – You give Mozilla the right to operate Firefox. Here comes the processing of your data as we describe in Firefox Post of Privacy. It also includes a non -exclusive, free world license for the purpose of doing as you request with the content you enter in Firefox. It gives no…
February 28, 2025Red LakshmananMobile Security / Zero Day The 23-year-old Serbian youth activist had his Android phone, aimed at zero day, developed Cellebrite to unlock the device, according to Amnesty International report. “Phone Android One Student Seceter has been used and unlocked by a sophisticated zero day operation oriented – NoteThe addition of traces of operation was found in a separate case in mid -2014. Vulnerability in question Cve-2024-53104 (CVSS assessment: 7.8), the case of escalation of privileges in the kernel component known as the USB Video Class (UVC) driver. The lack of the lack was considered in the Linux…
Cybersecurity researchers have discovered a wide phishing campaign that uses fake CAPTCHA images that are divided through PDF -documents located on the Webflow content delivery (CDN) to deliver malicious Lumma software. Netskope laboratory threatened that it had revealed 260 unique domains that conduct 5000 PDF phishing files that redirect victims to malicious sites. “The attacker uses SEO to trick the victims to visit pages by clicking on the results of the malicious search engine,” security researcher Jan Michael Alcantar – Note In a report that shared with Hacker News. “While most phishing pages focus on the theft of credit card…
Remote desktop (RDP) is an amazing technology developed by Microsoft that allows you to access and manage another network computer. It’s like your office computer with you wherever you have gone. For businesses, this means that IT persons can manage the systems remotely, and employees can work at home or anywhere, making RDP a valid game change in today’s work settings. But here’s the catch: since RDP is available online, it is also the main goal for unethical hackers. If someone receives unauthorized access, they can potentially capture your system. That’s why it is so important to provide RDP correctly.…
The sticky werewolf uses an undocumented implant to deploy Lumma theft in Russia and Belarus
February 28, 2025Red LakshmananFinancial cheater / cyber -beno Actor threats known as Sticky werewolf He was associated with targeted attacks, first of all in Russia and Belarus to deliver malicious software for theft of Lumma with the help of a previously undocumented implant. Cyber security company Kaspersky monitors activity under the name of Angry Likho, which, she said, has a “strong similarity” to Arouse (AKA Core Werewolf, Gamacopy and Pseudogamaredon). “However, Angry Likho attacks are usually oriented with more compact infrastructure, limited implant spectrum and focus on employees of large organizations, including state institutions and their contractors,” Russian company -…
February 28, 2025Red LakshmananAPI / security security AI safety On Thursday, Microsoft revealed four people who, according to him, became the Azure Enterprise abuse scheme, which involves the use of unauthorized access to generative artificial intelligence (Genai) to create offensive and harmful content. The company called LLMJacking has sent various AI offers, including Microsoft Azure Openai services. The technical giant tracks the cybercrime network as a Storm-2139. People named – Arian Yadegarnia Aka “Fiz” Iran, Alan Crisius, Aka “Drag” of the United Kingdom, Ricky Jen, Aka “CG-DOT” from Hong Kong, China, and PHUNG PHUNG TAN AKA “Osacu” from Vietnam “Storm-2139…
A data set used to prepare large language models (LLMS) has been found, contains almost 12,000 live secrets that allow you to successfully authenticate. The obtained data once again emphasize how tough accounts create a serious risk for both users and organizations, not to mention the problem when LLM eventually implies their users dangerous coding practice. Security with Truffel said she had loaded the December 2024 archive with General crawlingSupporting free open data repository. The massive data set contains more than 250 billion pages covering 18 years. The archive specifically contains 400 TV compressed web, 90,000 WARC files (web -archive…
February 27, 2025Red LakshmananCyberCrime / Android Cybersecurity researchers have discovered an updated version of malicious Android software called Tgtoxic . “Modification observed in Tgtoxic Useful Load – Note In a report published this week. Tgtoxic was First documented According to the Micro trend in the early 2023, describing it as a banking trojan, capable of stealing powers and means from the crystals, as well as banking and financial applications. It has been discovered in the wild at least from July 2022, mainly focusing on mobile users in Taiwan, Thailand and Indonesia. Then, in November 2024, a firm on the prevention…