WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks – OfficialSarkar

WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks – OfficialSarkar

Oct 04, 2024Ravie LakshmananWebsite Security / Vulnerability A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable malicious actors to execute arbitrary JavaScript code under certain conditions. The flaw, tracked as CVE-2024-47374 (CVSS score: 7.2), has been described as a stored cross-site scripting (XSS) vulnerability impacting all…

Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors – OfficialSarkar

Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors – OfficialSarkar

Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted 65 seconds. The web infrastructure and security company said it fended off “over one hundred hyper-volumetric L3/4 DDoS attacks throughout the month, with many exceeding 2 billion packets per second (Bpps) and 3…

How to Get Going with CTEM When You Don’t Know Where to Start – OfficialSarkar

How to Get Going with CTEM When You Don’t Know Where to Start – OfficialSarkar

Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task of managing security threats into five distinct stages: Scoping, Discovery, Prioritization, Validation, and Mobilization. Each of these stages plays a crucial role in identifying, addressing, and mitigating vulnerabilities – before they…

Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks – OfficialSarkar

Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks – OfficialSarkar

Oct 03, 2024Ravie LakshmananMobile Security / Technology Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to counter the rising threat posed by baseband security attacks. The cellular baseband (i.e., modem) refers to a processor on the device that’s responsible for handling all connectivity, such as LTE, 4G,…

The Secret Weakness Execs Are Overlooking: Non-Human Identities – OfficialSarkar

The Secret Weakness Execs Are Overlooking: Non-Human Identities – OfficialSarkar

For years, securing a company’s systems was synonymous with securing its “perimeter.” There was what was safe “inside” and the unsafe outside world. We built sturdy firewalls and deployed sophisticated detection systems, confident that keeping the barbarians outside the walls kept our data and systems safe. The problem is that we no longer operate within…

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking – OfficialSarkar

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking – OfficialSarkar

Oct 03, 2024Ravie LakshmananLinux / Malware Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed perfctl with the primary aim of running a cryptocurrency miner and proxyjacking software. “Perfctl is particularly elusive and persistent, employing several sophisticated techniques,” Aqua security researchers Assaf Morag and Idan Revivo said in a…

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks – OfficialSarkar

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks – OfficialSarkar

Oct 03, 2024Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have been observed delivering a previously undocumented backdoor and remote access trojan (RAT) called VeilShell as part of a campaign targeting Cambodia and likely other Southeast Asian countries. The activity, dubbed SHROUDED#SLEEP by Securonix, is believed to be the handiwork…

INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa – OfficialSarkar

INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa – OfficialSarkar

Oct 03, 2024Ravie LakshmananCybercrime / Financial Fraud INTERPOL has announced the arrest of eight individuals in Côte d’Ivoire and Nigeria as part of a crackdown on phishing scams and romance cyber fraud. Dubbed Operation Contender 2.0, the initiative is designed to tackle cyber-enabled crimes in West Africa, the agency said. One such threat involved a…

LockBit Ransomware and Evil Corp Leaders Arrested and Sanctioned in Joint Global Effort – OfficialSarkar

LockBit Ransomware and Evil Corp Leaders Arrested and Sanctioned in Joint Global Effort – OfficialSarkar

Oct 03, 2024Ravie LakshmananCybercrime / Ransomware A new wave of international law enforcement actions has led to four arrests and the takedown of nine servers linked to the LockBit (aka Bitwise Spider) ransomware operation, marking the latest salvo against what was once a prolific financially motivated group. This includes the arrest of a suspected LockBit…

Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch – OfficialSarkar

Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch – OfficialSarkar

Oct 03, 2024Ravie LakshmananVulnerability / Endpoint Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting Endpoint Manager (EPM) that the company patched in May to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2024-29824, carries a CVSS score of 9.6…