5 Steps to Boost Detection and Response in a Multi-Layered Cloud – OfficialSarkar

5 Steps to Boost Detection and Response in a Multi-Layered Cloud – OfficialSarkar

Oct 14, 2024The Hacker NewsCloud Security / Vulnerability The link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt cloud environments, security strategies have largely focused on “shift-left” practices—securing code, ensuring proper cloud posture, and fixing misconfigurations. However, this approach has led to an over-reliance on…

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration – OfficialSarkar

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration – OfficialSarkar

Oct 14, 2024Ravie LakshmananNetwork Security / Vulnerability A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to perform a series of malicious actions. That’s according to findings from Fortinet FortiGuard Labs, which said the vulnerabilities were abused to gain unauthenticated access to the CSA, enumerate…

Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware – OfficialSarkar

Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware – OfficialSarkar

Oct 14, 2024Ravie LakshmananRansomware / Vulnerability Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and Fog ransomware. Cybersecurity vendor Sophos said it has been tracking a series of attacks in the past month leveraging compromised VPN credentials and CVE-2024-40711 to create a local account…

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf – OfficialSarkar

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf – OfficialSarkar

Oct 13, 2024Ravie Lakshmanan The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region. “The group utilizes sophisticated tactics that include deploying a backdoor that leverages Microsoft Exchange servers for…

FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation – OfficialSarkar

FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation – OfficialSarkar

Oct 12, 2024Ravie LakshmananCryptocurrency / Cybercrime The U.S. Department of Justice (DoJ) has announced arrests and charges against several individuals and entities in connection with allegedly manipulating digital asset markets as part of a widespread fraud operation. The law enforcement action – codenamed Operation Token Mirrors – is the result of the U.S. Federal Bureau…

GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks – OfficialSarkar

GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks – OfficialSarkar

A new tax-themed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages as a way to bypass security measures and deliver Remcos RAT, indicating that the method is gaining traction among threat actors. “In this campaign, legitimate repositories such as the open-source tax filing software, UsTaxes, HMRC,…

How Hybrid Password Attacks Work and How to Defend Against Them – OfficialSarkar

How Hybrid Password Attacks Work and How to Defend Against Them – OfficialSarkar

Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge multiple cracking techniques to amplify their effectiveness. These combined approaches exploit the strengths of various methods, accelerating the password-cracking process. In this post, we’ll explore hybrid attacks — what they are and the most common…

CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance – OfficialSarkar

CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance – OfficialSarkar

Oct 11, 2024Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that it has observed threat actors leveraging unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to conduct reconnaissance of target networks. It said the module is being used to enumerate other non-internet-facing devices…

New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution – OfficialSarkar

New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution – OfficialSarkar

Oct 11, 2024Ravie LakshmananDevOps / Vulnerability GitLab has released security updates for Community Edition (CE) and Enterprise Edition (EE) to address eight security flaws, including a critical bug that could allow running Continuous Integration and Continuous Delivery (CI/CD) pipelines on arbitrary branches. Tracked as CVE-2024-9164, the vulnerability carries a CVSS score of 9.6 out of…

Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation – OfficialSarkar

Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation – OfficialSarkar

Oct 11, 2024Ravie LakshmananCybercrime / Dark Web The Dutch police have announced the takedown of Bohemia and Cannabia, which has been described as the world’s largest and longest-running dark web market for illegal goods, drugs, and cybercrime services. The takedown is the result of a collaborative investigation with Ireland, the United Kingdom, and the United…