Author: Admin

January 6, 2025Ravi LakshmananMalware / Mobile Security The name of an Android malware that steals information FireScam was found masquerading as a premium version of Telegram messaging app to steal data and maintain constant remote control over compromised devices. “Disguised as a fake ‘Telegram Premium’ app, it is distributed via a phishing site on GitHub.io that pretends to be RuStore, a popular app store in the Russian Federation,” Cyfirma reported. saiddescribing it as a “complex and multi-faceted threat”. “The malware uses a multi-stage infection process starting with an APK dropper and performs extensive surveillance activities after installation.” The phishing site…

Read More

In 2024, cyberthreats targeting SaaS grew, with 7,000 password attacks blocked per second (on Entra ID alone)—a 75% year-over-year increase—and phishing attempts up 58%, resulting in losses of 3 .5 billion dollars (source: Microsoft’s 2024 Digital Security Report). SaaS attacks are on the rise, and hackers often evade detection through legitimate usage patterns. The cyber threat arena has seen great players, unexpected underdogs and relentless scorers make their mark on the SaaS security playing field. As we enter 2025, security services must prioritize SaaS Security Risk Assessment to identify vulnerabilities, adopt SSPM tools for continuous monitoring, and proactively protect your…

Read More

January 6, 2025Ravi LakshmananBlockchain / Malware Cybersecurity researchers discovered several malicious packages in the npm registry that were found to mimic the Hardhat Nomic Foundation tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers infiltrated these platforms via malicious npm packages, stealing important data such as private keys, mnemonics, and configuration details,” Socket Research Group said in the analysis. today is an Ethereum software development environment that contains various components for editing, compiling, debugging, and deploying smart contracts and decentralized applications (dApps). The list of detected fake packages is as follows…

Read More

January 4, 2025Ravi LakshmananSoftware Vulnerability / Security A serious security flaw has been discovered in ProjectDiscovery Nucleia widely distributed open source vulnerability scanner that, if successfully exploited, can allow attackers to bypass signature verification and potentially execute malicious code. Tracked as CVE-2024-43405it has a CVSS score of 7.4 out of a maximum of 10.0. This affects all versions of Nuclei later than 3.0.0. “The vulnerability results from a mismatch between the way the signature validation process and the YAML parser handle newline characters, combined with the way multiple signatures are handled,” it said. description vulnerabilities. “This allows an attacker to…

Read More

January 4, 2025Ravi LakshmananMalware / VPN Security Cyber ​​security researchers have identified a new malware called A FUNNY GHOST which comes with a wide range of information gathering features such as keyboard, screen capture, audio capture, remote shell and file transfer/execution. Backdoor, according to Google’s managed protection team, shares features with a well-known remote administration tool called Gh0st RATwhose source code was published in 2008. PLAYFULGHOST’s initial access routes include using behavior-related phishing emails or search engine optimization (SEO) poisoning techniques to distribute trojanized versions of legitimate VPN programs such as LetsVPN. “In one phishing case, the infection begins by…

Read More

January 4, 2025Ravi LakshmananCyber ​​espionage / IoT botnet On Friday, the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) imposed sanctions on a Beijing-based cybersecurity company known as Integrity Technology Group, Incorporated for orchestrating several cyberattacks against U.S.-based victims. These attacks were publicly attributed to the Chinese state threat actor being tracked Linen typhoon (aka Ethereal Panda or Red Juliet), which was published last year under the name Internet of Things (IoT) botnets. Raptor train. The hacking team has been active since at least mid-2021, targeting various organizations in North America, Europe, Africa and Asia. Attacks carried out by…

Read More

About Bruce SchneierI a public interest technologistwho work at the intersection of security, technology and people. I wrote about security issues on mine blog since 2004 and in my periodical newsletter since 1998. I am a staff member and faculty member at Harvard Kennedy Schoolmember of the board of EFFand head of the security architecture department at Inrupt, Inc. This personal site does not represent the views of any of these organizations. Source link

Read More

January 3, 2025Ravi LakshmananMachine Learning / Vulnerability Cybersecurity researchers have shed light on a new jailbreak technique that can be used to bypass large language model (LLM) fences and generate potentially harmful or malicious responses. The strategy of a multi-path attack (aka multiple) has received a code name Bad Judge Likert Palo Alto Networks Unit 42 researchers Yunzhe Huang, Yang Ji, Wenjun Hu, Jay Chen, Akshata Rao, and Danny Tsechansky. “The method requires the target LLM to act as a judge, assessing the harmfulness of a given response using Likert scalerating scale that measures the respondent’s agreement or disagreement with…

Read More

January 3, 2025Ravi LakshmananWindows Server / Threat Mitigation The proof-of-concept (PoC) exploit was released for a fixed security flaw affecting Windows Lightweight Directory Access Protocol (LDAP) that could cause a denial of service (DoS) condition. An out-of-bounds read vulnerability is tracked as CVE-2024-49113 (CVSS score: 7.5). This was addressed by Microsoft as part of the December 2024 Patch Tuesday updates CVE-2024-49112 (CVSS score: 9.8), a critical integer overflow bug in the same component that could lead to remote code execution. The discovery and reporting of both vulnerabilities is attributed to independent security researcher Yuki Chen (@guhe120). CVE-2024-49113 PoC came up…

Read More

January 3, 2025Ravi LakshmananDevOps / Software Development Microsoft has announced that it is making “unexpected changes” to the way it distributes .NET installers and archives, requiring developers to update their production and DevOps infrastructure. “We expect that most users will not be directly affected, but it is important that you confirm whether you are affected and monitor for downtime or other types of outages,” said Richard Lander, program manager on the .NET team. said in a statement last week. This move is a result of some .NET binaries and installers being hosted on Azure Content Delivery Network (CDN) domains ending…

Read More