Author: Admin
05 February 2025Red LakshmananIntelligence threats / malicious software Previously, an unregistered actor of the threat, known as the silent trot, was associated with cyberattami aimed at various formations in Kyrgyzstan and Turkmenistan. “This group of threats previously targeted by organizations in Eastern Europe and Central Asia involved in making economic decisions and the banking sector,” – Researcher Seqrite Labs Subhajeet Singhaa – Note In a technical report published at the end of last month. The targets of the group attacks include embassies, lawyers, banks supported by government and analytical tanks. Activities were related to the actor of the threat of…
05 February 2025Red LakshmananCybersecurity / Security Cloud Cybercriminals are increasingly using legal client tools HTTP to facilitate the absorption attack attacks (ATO) on the Microsoft 365 environment. ENTERPRISE Security Company ProfofPoint said that there are companies used by HTTP Clients Axios and Node to send HTTP -interrogations and receive http -regions from the ATO attacks. “Initially, derived from public repositories such as GitHub, these tools are increasingly used in attacks such as the Medium (AITM) and the methods of gross forces, leading to numerous incidents (ATO),” Anna Akslevich’s security researcher – Note. Use of HTTP client tools for the attack…
05 February 2025Red LakshmananVulnerability / data protection Veeam has released patches to address a critical security lack that affects its backup, which can allow the attacker to perform an arbitrary code in sensitive systems. Vulnerability tracked as Cve-2025-2314Carries CVSS 9.0 out of 10.0. “The vulnerability in the VEEAM upgrade component that allows the attacker to use an attack on a person in the middle to perform arbitrary code on the server of the affected appliances with permission at the root level,”-Veeam – Note In advisory. The disadvantage affects the following products – Backup for Salesforce – 3.1 or older Backup…
05 February 2025Hacker NewsDetection of vulnerability / threat As the cybersecurity landscape continues to develop, the active management of vulnerability became an important priority for managed service providers (MSPS) and IT -chamond. Recent trends show that organizations are increasingly preferring to evaluate IT vulnerability to identify and resolve potential security deficiencies. Information about these trends can help MSP, and IT coats remain a step ahead of potential cyber rizik. A Kaseya 2024 Cybersecurity Surface Report Moves with this new cyber -problem. The data is obvious: the organizations are becoming more dependent on the evaluation of vulnerability and plan to prioritize…
05 February 2025Red LakshmananMalicious software / network safety A malicious program was noted that provides Trojan (rat) named Asyncrat using useful Python and TryCloudflare loads. “Asyncrat is Trojan (rat) that exploits asynchrus/waiting for effective, asynchronous communication,” Forcepoint X-Labs Jyotika Singh researcher – Note In the analysis. “This allows the attackers to control the systems that hold back, operate data and perform teams, remaining hidden – making it significant cyber -tap.” The starting point of the multi-stage attack chain is the phishing list containing the Dropbox URL, which, by clicking, downloads the ZIP archive. The file has an Internet -Yarlik file…
CISA adds four actively exploited vulnerabilities to the KEV directory, calls to go on February 25
05 February 2025Red LakshmananVulnerability / safety software Cybersecurity and US Infrastructure Agency (CISA) added Four Security Disads in Known Exploved Vulneration (Ship) Catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is the following – Cve-2024-45195 (CVSS assessment: 7.5/9.8) – Forced vulnerability in Apache ofbiz, which allows remote attackers to gain unauthorized access and execute an arbitrary code on the server (fixed in September 2024) Cve-2024-29059 (CVSS assessment: 7.5) – vulnerability of information about disclosure in Microsoft .Net. March 2024) Cve-2018-9276 (CVSS assessment: 7.2) – vulnerability of the operating system in the network monitor April 2018)…
04 February 2025Red LakshmananVulnerability / intelligence threats Cybersecurity researchers drew attention to the attack chain of software supplies aimed at the GO ecosystem, which includes a malicious package, capable of providing the enemy remote access to infected systems. The package called github.com/boltdb- Go/boltis the type of legal database boltdb (github.com/boltdb/bolt), for the socket. The malicious version (1.3.1) was published by GitHub in November 2021, after which it was cached endlessly long GO MODULE MIRROR Service. “After installing the rear package gives actors threatening remote access to the infected system, allowing them to perform arbitrary teams,” Cyril Boychenko researchers – Note…
04 February 2025Red LakshmananMalicious software / cryptocurrency It was noted that the North Korean threats behind the contagious interview company providing the Apple MacOS malware collection, called “Ferret” as part of the intended interview process. “Usually goals are asked to communicate with the interviewer at the link that throws an error message, and the request for installation or update the required software programs such as VCAM or Cameraaccess for virtual meetings,” – Researchers Sentinelone Phil Stokes and Tom Hegel – Note In a new report. Infant interview, first discovered at the end of 2023 Persistent effort A hacking crew is…
04 February 2025Red LakshmananVulnerability / cyber -hpion Recently fixed Safety vulnerability The 7-Zip Archiver tool was used in the wild to deliver Diplomat malicious software. The deficiency Cve-2025-0411 (CVSS assessment: 7.0), allows the distant attackers to bypass the Mark-Warriors (Strong) Protection and execute an arbitrary code in the context of the current user. It was addressed to 7-ZIP in November 2024 with Version 24.09. “The vulnerability is actively exploited – Note. It is suspected that the CVE-2025-0411 is probably armed with focused state and non-governmental organizations in Ukraine as part of a cyber-spy-based campaign established against the background of the…
04 February 2025Hacker NewsFinding a threat / cloud security As the cloud develops in 2025 and beyond the organization, both new and developing realities should be adapted, including increasing dependence on cloud infrastructure for AI workflows, as well as a huge amount of data transferred to the cloud. But there are other developments that can affect your organizations and provide the need for an even more reliable security strategy. Let’s see … No. 1: Increased Landshaft threats encourages market consolidation Cyberattacks aimed at cloudy conditions are becoming increasingly sophisticated, emphasizing the need for safety decisions beyond detection. Organizations will need…