Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers – OfficialSarkar

Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers – OfficialSarkar

Sep 27, 2024Ravie LakshmananContainer Security / Cloud Computing A critical security flaw has been disclosed in the NVIDIA Container Toolkit that, if successfully exploited, could allow threat actors to break out of the confines of a container and gain full access to the underlying host. The vulnerability, tracked as CVE-2024-0132, carries a CVSS score of…

Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates – OfficialSarkar

Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates – OfficialSarkar

Sep 26, 2024Ravie LakshmananAutomotive Industry / Technology Cybersecurity researchers have disclosed a set of now patched vulnerabilities in Kia vehicles that, if successfully exploited, could have allowed remote control over key functions simply by using only a license plate. “These attacks could be executed remotely on any hardware-equipped vehicle in about 30 seconds, regardless of…

Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware – OfficialSarkar

Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware – OfficialSarkar

Sep 26, 2024Ravie LakshmananCyber Espionage / Mobile Security As many as 25 websites linked to the Kurdish minority have been compromised as part of a watering hole attack designed to harvest sensitive information for over a year and a half. French cybersecurity firm Sekoia, which disclosed details of the campaign dubbed SilentSelfie, described the intrusion…

Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar – OfficialSarkar

Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar – OfficialSarkar

Sep 26, 2024The Hacker NewsThreat Detection / IT Security Imagine trying to find a needle in a haystack, but the haystack is on fire, and there are a million other needles you also need to find. That’s what dealing with security alerts can feel like. SIEM was supposed to make this easier, but somewhere along…

N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks – OfficialSarkar

N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks – OfficialSarkar

Sep 26, 2024Ravie LakshmananCyber Attack / Malware Threat actors with ties to North Korea have been observed leveraging two new malware strains dubbed KLogEXE and FPSpy. The activity has been attributed to an adversary tracked as Kimsuky, which is also known as APT43, ARCHIPELAGO, Black Banshee, Emerald Sleet (formerly Thallium), Sparkling Pisces, Springtail, and Velvet…

What’s the Best Approach to Vulnerability Prioritization? – OfficialSarkar

What’s the Best Approach to Vulnerability Prioritization? – OfficialSarkar

Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vulnerabilities for prioritization. While these scores provide some insight into the potential impact of a vulnerability, they don’t factor in real-world threat data, such as the likelihood of exploitation. With new vulnerabilities discovered daily, teams don’t have the time –…

Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities – OfficialSarkar

Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities – OfficialSarkar

Sep 26, 2024Ravie LakshmananCloud Security / Cyber Espionage An advanced threat actor with an India nexus has been observed using multiple cloud service providers to facilitate credential harvesting, malware delivery, and command-and-control (C2). Web infrastructure and security company Cloudflare is tracking the activity under the name SloppyLemming, which is also called Outrider Tiger and Fishing…

Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign – OfficialSarkar

Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign – OfficialSarkar

Sep 26, 2024Ravie LakshmananCyber Espionage / Hacking Nation-state threat actors backed by Beijing broke into a “handful” of U.S. internet service providers (ISPs) as part of a cyber espionage campaign orchestrated to glean sensitive information, The Wall Street Journal reported Wednesday. The activity has been attributed to a threat actor that Microsoft tracks as Salt…

Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52% – OfficialSarkar

Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52% – OfficialSarkar

Sep 25, 2024Ravie LakshmananSecure Coding / Mobile Security Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design approach has led to the percentage of memory-safe vulnerabilities discovered in Android dropping from 76% to 24% over a period of six years. The tech giant said focusing on Safe…

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool – OfficialSarkar

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool – OfficialSarkar

Sep 25, 2024Ravie LakshmananPenetration Testing / Cyber Threat Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild. Palo Alto Networks Unit 42 shared its findings after it discovered the program on several customers’ systems. “It has a standard set of features commonly found in penetration testing…