Researchers Reveal ‘Deceptive Delight’ Method to Jailbreak AI Models – OfficialSarkar

Researchers Reveal ‘Deceptive Delight’ Method to Jailbreak AI Models – OfficialSarkar

Oct 23, 2024Ravie LakshmananArtificial Intelligence / Vulnerability Cybersecurity researchers have shed light on a new adversarial technique that could be used to jailbreak large language models (LLMs) during the course of an interactive conversation by sneaking in an undesirable instruction between benign ones. The approach has been codenamed Deceptive Delight by Palo Alto Networks Unit…

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans – OfficialSarkar

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans – OfficialSarkar

Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT. “The campaign involves modular infection chains that are either Maldoc or HTML-based infections and require the victim’s intervention to trigger the…

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks – OfficialSarkar

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks – OfficialSarkar

Oct 22, 2024Ravie LakshmananDocker Security / Cloud Security Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according to new findings from Trend Micro. “In this attack, the threat actor used the gRPC protocol over h2c to evade security solutions and execute their crypto mining…

Security Flaw in Styra’s OPA Exposes NTLM Hashes to Remote Attackers – OfficialSarkar

Security Flaw in Styra’s OPA Exposes NTLM Hashes to Remote Attackers – OfficialSarkar

Oct 22, 2024Ravie LakshmananVulnerability / Software Security Details have emerged about a now-patched security flaw in Styra’s Open Policy Agent (OPA) that, if successfully exploited, could have led to leakage of New Technology LAN Manager (NTLM) hashes. “The vulnerability could have allowed an attacker to leak the NTLM credentials of the OPA server’s local user…

Malicious npm Packages Target Developers’ Ethereum Wallets with SSH Backdoor – OfficialSarkar

Malicious npm Packages Target Developers’ Ethereum Wallets with SSH Backdoor – OfficialSarkar

Oct 22, 2024Ravie LakshmananVulnerability / Supply Chain Cybersecurity researchers have discovered a number of suspicious packages published to the npm registry that are designed to harvest Ethereum private keys and gain remote access to the machine via the secure shell (SSH) protocol. The packages attempt to “gain SSH access to the victim’s machine by writing…

A Comprehensive Guide to Finding Service Accounts in Active Directory – OfficialSarkar

A Comprehensive Guide to Finding Service Accounts in Active Directory – OfficialSarkar

Oct 22, 2024Ravie LakshmananIdentity Management / Security Automation Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However, without proper monitoring, they can pose a significant security risk due to their elevated privileges. This guide will walk you through how to locate and secure these accounts within Active Directory…

Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies – OfficialSarkar

Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies – OfficialSarkar

Oct 22, 2024Ravie LakshmananMalware / Threat Intelligence Two malware families that suffered setbacks in the aftermath of a coordinated law enforcement operation called Endgame have resurfaced as part of new phishing campaigns. Bumblebee and Latrodectus, which are both malware loaders, are designed to steal personal data, along with downloading and executing additional payloads onto compromised…

VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability – OfficialSarkar

VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability – OfficialSarkar

Oct 22, 2024Ravie LakshmananVulnerability / Enterprise Security VMware has released software updates to address an already patched security flaw in vCenter Server that could pave the way for remote code execution. The vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), concerns a case of heap-overflow vulnerability in the implementation of the DCE/RPC protocol. “A malicious actor…

CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack – OfficialSarkar

CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack – OfficialSarkar

Oct 22, 2024Ravie LakshmananVulnerability / Cyber Threat The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting ScienceLogic SL1 to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation as a zero-day. The vulnerability in question, tracked as CVE-2024-9537 (CVSS v4 score: 9.3), refers to a bug…

Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain – OfficialSarkar

Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain – OfficialSarkar

The prolific Chinese nation-state actor known as APT41 (aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti) has been attributed to a sophisticated cyber attack targeting the gambling and gaming industry. “Over a period of at least six months, the attackers stealthily gathered valuable information from the targeted company including, but not limited to, network…