Author: Admin

September 24, 2024Ravi LakshmananMobile Security / Cybercrime Cybersecurity researchers have discovered a new version of the Android banking trojan called Octo that comes with enhanced device hijacking capabilities (DTO) and perform fraudulent transactions. The new version received a code name October 2 Dutch security firm ThreatFabric said in a report shared by The Hacker News, adding that the malware distribution campaigns were spotted in European countries such as Italy, Poland, Moldova and Hungary. “Malware developers have taken steps to improve the stability of the remote capabilities required for Device Takeover attacks,” the company said in a statement. said. Some of…

Read More

September 24, 2024Ravi LakshmananData Privacy / Cybercrime Popular messaging app Telegram has announced a major policy reversal that will give authorities users’ IP addresses and phone numbers in response to legitimate requests in an attempt to curb criminal activity on the platform. “We have made it clear that the IP addresses and phone numbers of those who violate our rules may be handed over to relevant authorities in response to legitimate requests,” Telegram CEO Pavel Durau. said in the post. To this end, the company now directly states – “If Telegram receives a valid warrant from the relevant judicial authorities…

Read More

September 23, 2024Hacker newsPassword management / data breach Password resets can be frustrating for end users. No one likes being interrupted with a “time to change your password” notification – and even less likes it when the new passwords they create are rejected by their organization’s password policy. IT teams share the pain, as resetting passwords via help desk tickets and calls to support is a daily burden. Despite this, it is generally accepted that all passwords should expire after a specified period of time. Why is this so? Do you even need password expirations? Learn why passwords expire and…

Read More

September 23, 2024Ravi LakshmananCyber ​​Security / Cyber ​​Threat Hang in there folks, because the cybersecurity landscape has been terrifying this past week! We’ve seen everything from North Korean hackers landing their “dream jobs” to expose new malware to a surprising twist in the Apple vs. NSO Group saga. Even in the seemingly mundane world of domain names and cloud configurations, there was some drama. Let’s dig into the details and see what lessons we can learn from last week. ⚡ Threat of the week Raptor Train botnet dismantled: The US government announced taking down the Raptor Train botnet controlled by…

Read More

September 23, 2024Ravi LakshmananEncryption / Data Protection The popular social messaging platform Discord has announced that it is releasing a new user-defined end-to-end encrypted (E2EE) protocol for secure audio and video calls. The protocol is duplicated DAVEshort for Discord End-to-end Audio and Video Encryption (“E2EE A/V”). As part of the changes made last week, voice and video transmissions in DMs, group DMs, voice channels and Go Live broadcasts are expected to move to using DAVE. However, it should be noted that messages on Discord will remain unencrypted and subject to a content moderation approach. “When we consider adding new privacy…

Read More

September 23, 2024Ravi LakshmananIoT Security / Vulnerability A critical security flaw has been discovered in the Microchip Advanced Software Framework (ASF) that, if successfully exploited, could lead to remote code execution. Vulnerability, tracked as CVE-2024-7490has a CVSS score of 9.5 out of a maximum of 10.0. This has been described as a stack overflow vulnerability in the ASF implementation of the tinydhcp server that results from a lack of proper input validation. “A vulnerability exists in all publicly available examples of the ASF codebase that allows a specially crafted DHCP request to cause a stack overflow that could lead to…

Read More

September 23, 2024Ravi LakshmananSoftware security / supply chain Threat actors linked to North Korea have used poisoned Python packages as a way to deliver new malware called PondRAT as part of an ongoing campaign. According to new findings by Palo Alto Networks Unit 42, PondRAT is believed to be a lighter version of POOLRAT (aka SIMPLESEA), a well-known macOS backdoor previously attributed to the Lazarus Group and deployed in attacks related to Art 3CX Supply Chain Compromise last year. Some of these attacks are part of an ongoing campaign of cyberattacks called Operation Dream Job.where potential targets are lured with…

Read More

September 23, 2024Ravi LakshmananCyber ​​espionage / malware An alleged Advanced Persistent Threat (APT) originating in China targeted a government organization in Taiwan and possibly other countries in the Asia-Pacific region (APAC) using a recently patched critical security flaw affecting OSGeo GeoServer GeoTools. The intrusion activity discovered by Trend Micro in July 2024 was attributed to a threat actor named The land of Baxia. “Based on the collected phishing emails, fraudulent documents, and incident observations, it appears that the primary targets are government agencies, telecommunications companies, and the energy industry in the Philippines, South Korea, Vietnam, Taiwan, and Thailand,” researcher Ted…

Read More

A hacking group known as the Twelve has been seen using an arsenal of publicly available tools to launch destructive cyberattacks against Russian targets. “Instead of demanding a ransom for data decryption, Twelve prefers to encrypt victims’ data and then wipe out their infrastructure to prevent recovery,” Kaspersky said. said in Friday’s analysis. “This approach indicates a desire to cause maximum damage to target organizations without receiving direct financial benefit.” The hacking group, which is believed to have been formed in April 2023 after the start of the Russian-Ukrainian war, has a track record of intensifying cyber attacks aimed at…

Read More

September 21, 2024Ravi LakshmananNational Security / Cyber ​​Attack Ukraine has restricted the use of the Telegram messaging app by government officials, the military and other defense and critical infrastructure workers, citing national security concerns. The ban was announced by the National Cyber ​​Security Coordination Center (NCCC) in a Facebook post. “I have always advocated and am advocating freedom of speech, but the issue of Telegram is not an issue of freedom of speech, it is an issue of national security,” said the head of Ukraine’s GUR, Kirill Budanov. said. National Security and Defense Council of Ukraine (NSDA) said that Telegram…

Read More