Author: Admin

07 February 2025Red LakshmananFinancial security / compliance with regulatory requirements The Central Bank of India, the Indian Reserve Bank (RBI), said it is introducing an exclusive “bank” on the Internet for banks in the country to combat digital financial fraud. “This initiative is aimed at reducing cybersecurity threats and malware, such as phishing; and streamlining safe financial services, thereby increasing the trust in digital banking and payment services,” Irbi – Note in a statement issued today. To this end, the Institute for Development and Studies in Banking Technology (IDRBT) will act as an exclusive registrar. It is expected that registration…

Read More

07 February 2025Red LakshmananVulnerability / intelligence threats The actors threatened were observed in the exploitation of recently disclosed security deficiencies in Simplehelp (RMM) software as a predecessor for ransom attack. The invasion applied the vulnerabilities that have now been put to gain initial access and maintain permanently remote access to the uncertain target network, according to the Chapecurity Company Field Effect Effect Effect report, which is shared by Hacker News. “The attack included the rapid and intentional execution of multiple tactics, methods and procedures after compromise (TTPS), including the detection of network and system, creating administrator accounts and creating mechanisms…

Read More

06 February 2025Red LakshmananCybercrime / Ransomware In 2024, $ 813.5 million has been raised for a total of $ 813.5 million, which decreased compared to $ 1.25 billion in 2023. The total amount required during the first half of 2024 amounted to $ 459.8 million, Blockchain Intelligence Chenkalysis said, adding paying activities after July 2024 by 3.94%. “The number of ransomers increased in H2, but the chain payments have declined, suggesting that more victims were aimed but less paid,” company company company – Note. Adding to the problems is an increasingly fragmented ransom ecosystem, which, as a result of the…

Read More

06 February 2025Red LakshmananCyber ​​-Ataka / malicious software Bogus websites advertised by Google Chrome were used to distribute malicious trooper access settings called Valleyrat. Malicious software, first discovered in 2023, is explained by the actor of the threat, which is monitored as a silver fox, and previous attacks are primarily focused on Chinese regions such as Hong Kong, Taiwan and mainland China. “This actor is increasingly targeted in a key role in the finance organizations, accounting and sales-proclaiming strategic attention to high-value positions with access to sensitive data and systems,” Morphisek Schmuel Invo – Note In a report published earlier…

Read More

06 February 2025Red LakshmananIntelligence threats / malicious software According to Kimusuki, connected with North Korea nation -known as Kimusuki New conclusions from the AHNLAB security intelligence center (ASEC). The attacks start with phishing sheets containing the Windows Fast Access File (LNK), which is disguised as Microsoft or PDF -document. The opening of this attachment is caused by PowerShell or Mshta.exe, a legitimate Microsoft Binary designed to launch HTML applications (HTA) responsible for downloading and launching useful loads from an external source. South Korean cybersecurity company said the attacks were over Mandash and the custom version of the deleted desktop with…

Read More

Privileged access management (PAM) appeared as a cornerstone of modern cybersecurity strategies, having passed from the technical need for a critical column on the agenda. According to the PAM market forecasts, by 2037 to reach $ 42.96 billion (according to Nester studies), organizations invest large funds in Pam Solutions. Why does PEM rise into the ranks of the leadership? While Gartner emphasizes key reasons such as advanced security, readiness to comply with regulatory requirements and insurance requirements, PAM impacts extends to several strategic areas. PAM can help organizations increase their overall efficiency and solve the many problems they face today.…

Read More

The new malware company, called Sparkcat, used a fictitious app suit both in Apple and Google stores to steal the mnemonic phrases of victims related to cryptocurrency wallets. Attacks use the model recognition model (OCR) to select selected images containing phrases to restore the wallet from photos to the server team and control (C2), Kaspersky Kalinin and Sergey Puzan researchers and Sergei Puzan – Note In a technical report. Moniker is a link to a built -in software development set (SDK), which uses a Java component called Spark, which is masked as an analytical module. It is now unknown whether…

Read More

You come to the office, turn the system and panic sets. Each file is blocked and each system is frozen. Demand of the ransom on your screen is flashing: “Pay 2 million bitcoin for 48 hours or lose everything.” And the worst thing is that even after payment, there is no guarantee that you will return your data. Many of the victims transfer money without getting anything in return, or worse, hit again. This is not rare. The ransomware attacks are Summons Worldwide, from hospitals and banks to small companies. The only way to stop the damage is to actively…

Read More

06 February 2025Red LakshmananThe United States Cisco is liberated Updates to solve two critical security deficiencies (ISE) that can allow remote attackers to perform arbitrary commands and increase privileges on sensitive devices. Vulnerabilities shown below – Cve-2015-20124 (CVSS assessment: 9.9) – Unspuke Java desserization at API Cisco ISE, which can allow authentication, remote attackers to execute arbitrary commands as a root user on the affected device. Cve-2015-20125 (CVSS Assessment: 9.1) – Auction Vulnerability of API Cisco ISE can allow authentified, remote attackers with valid reading credential The attacker can arm any deficiencies by sending the created serialized Java object or…

Read More

05 February 2025Red LakshmananCryptocurrency / Data Violation North Korea is linked Group Lazarus was associated with an active company that uses the fake offers of LinkedIn Job in cryptocurrency and travel sectors to deliver malicious software capable of infecting windows, MacOS and Linux Operation Systems. According to the Bitdefender Cybersecurity Company, the scam begins with a message sent on a professional social media network, which attracts them with the promise of remote work, flexibility for part -time and good payment. “Once the goal expresses interest, the” hiring process “unfolds, and the fraudster asks a resume or even a personal GitHub…

Read More