Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw – OfficialSarkar

Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw – OfficialSarkar

Oct 02, 2024The Hacker NewsEmail Security / Vulnerability Cybersecurity researchers are warning about active exploitation attempts targeting a newly disclosed security flaw in Synacor’s Zimbra Collaboration. Enterprise security firm Proofpoint said it began observing the activity starting September 28, 2024. The attacks seek to exploit CVE-2024-45519, a severe security flaw in Zimbra’s postjournal service that…

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition – OfficialSarkar

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition – OfficialSarkar

The threat actors behind the Rhadamanthys information stealer have added new advanced features to the malware, including using artificial intelligence (AI) for optical character recognition (OCR) as part of what’s called “Seed Phrase Image Recognition.” “This allows Rhadamanthys to extract cryptocurrency wallet seed phrases from images, making it a highly potent threat for anyone dealing…

5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage – OfficialSarkar

5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage – OfficialSarkar

Oct 01, 2024The Hacker NewsGenerative AI / Data Protection Since its emergence, Generative AI has revolutionized enterprise productivity. GenAI tools enable faster and more effective software development, financial analysis, business planning, and customer engagement. However, this business agility comes with significant risks, particularly the potential for sensitive data leakage. As organizations attempt to balance productivity…

Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attacks Targeting User Credentials – OfficialSarkar

Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attacks Targeting User Credentials – OfficialSarkar

More than 140,000 phishing websites have been found linked to a phishing-as-a-service (PhaaS) platform named Sniper Dz over the past year, indicating that it’s being used by a large number of cybercriminals to conduct credential theft. “For prospective phishers, Sniper Dz offers an online admin panel with a catalog of phishing pages,” Palo Alto Networks…

New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet – OfficialSarkar

New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet – OfficialSarkar

Cybersecurity researchers have uncovered a new cryptojacking campaign targeting the Docker Engine API with the goal of co-opting the instances to join a malicious Docker Swarm controlled by the threat actor. This enabled the attackers to “use Docker Swarm’s orchestration features for command-and-control (C2) purposes,” Datadog researchers Matt Muir and Andy Giron said in an…

U.K. Hacker Charged in $3.75 Million Insider Trading Scheme Using Hacked Executive Emails – OfficialSarkar

U.K. Hacker Charged in $3.75 Million Insider Trading Scheme Using Hacked Executive Emails – OfficialSarkar

Oct 01, 2024Ravie LakshmananCorporate Security / Financial Fraud The U.S. Department of Justice (DoJ) has charged a 39-year-old U.K. national for perpetrating a hack-to-trade fraud scheme that netted him nearly $3.75 million in illegal profits. Robert Westbrook of London was arrested last week and is expected to be extradited to the U.S. to face charges…

Last Week’s Top Threats and Trends (September 23-29) – OfficialSarkar

Last Week’s Top Threats and Trends (September 23-29) – OfficialSarkar

Sep 30, 2024Ravie LakshmananCybersecurity / Weekly Recap Hold onto your hats, folks, because the cybersecurity world is anything but quiet! Last week, we dodged a bullet when we discovered vulnerabilities in CUPS that could’ve opened the door to remote attacks. Google’s switch to Rust is paying off big time, slashing memory-related vulnerabilities in Android. But…

Session Hijacking 2.0 — The Latest Way That Attackers are Bypassing MFA – OfficialSarkar

Session Hijacking 2.0 — The Latest Way That Attackers are Bypassing MFA – OfficialSarkar

Attackers are increasingly turning to session hijacking to get around widespread MFA adoption. The data supports this, as: 147,000 token replay attacks were detected by Microsoft in 2023, a 111% increase year-over-year (Microsoft). Attacks on session cookies now happen in the same order of magnitude as password-based attacks (Google). But session hijacking isn’t a new…

Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks – OfficialSarkar

Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks – OfficialSarkar

Critical security vulnerabilities have been disclosed in six different Automatic Tank Gauge (ATG) systems from five manufacturers that could expose them to remote attacks. “These vulnerabilities pose significant real-world risks, as they could be exploited by malicious actors to cause widespread damage, including physical damage, environmental hazards, and economic losses,” Bitsight researcher Pedro Umbelino said…

Why Microsoft 365 Protection Reigns Supreme – OfficialSarkar

Why Microsoft 365 Protection Reigns Supreme – OfficialSarkar

Imagine a sophisticated cyberattack cripples your organization’s most critical productivity and collaboration tool — the platform you rely on for daily operations. In the blink of an eye, hackers encrypt your emails, files, and crucial business data stored in Microsoft 365, holding it hostage using ransomware. Productivity grinds to a halt and your IT team…