Discover Latest Ransomware Tactics and Zero Trust Strategies in This Expert Webinar – OfficialSarkar

Discover Latest Ransomware Tactics and Zero Trust Strategies in This Expert Webinar – OfficialSarkar

Sep 24, 2024The Hacker NewsWebinar / Cybersecurity Ransomware is no longer just a threat; it’s an entire industry. Cybercriminals are growing more sophisticated, and their tactics are evolving rapidly. This persistent danger is a major concern for business leaders. But there’s good news: you don’t have to be defenseless. What if you could gain a…

New Octo2 Android Banking Trojan Emerges with Device Takeover Capabilities – OfficialSarkar

New Octo2 Android Banking Trojan Emerges with Device Takeover Capabilities – OfficialSarkar

Sep 24, 2024Ravie LakshmananMobile Security / Cybercrime Cybersecurity researchers have discovered a new version of an Android banking trojan called Octo that comes with improved capabilities to conduct device takeover (DTO) and perform fraudulent transactions. The new version has been codenamed Octo2 by the malware author, Dutch security firm ThreatFabric said in a report shared…

Telegram Agrees to Share User Data With Authorities for Criminal Investigations – OfficialSarkar

Telegram Agrees to Share User Data With Authorities for Criminal Investigations – OfficialSarkar

Sep 24, 2024Ravie LakshmananData Privacy / Cybercrime In a major policy reversal, the popular messaging app Telegram has announced it will give users’ IP addresses and phone numbers to authorities in response to valid legal requests in an attempt to rein in criminal activity on the platform. “We’ve made it clear that the IP addresses…

Discord Introduces DAVE Protocol for End-to-End Encryption in Audio and Video Calls – OfficialSarkar

Discord Introduces DAVE Protocol for End-to-End Encryption in Audio and Video Calls – OfficialSarkar

Sep 23, 2024Ravie LakshmananEncryption / Data Protection Popular social messaging platform Discord has announced that it’s rolling out a new custom end-to-end encrypted (E2EE) protocol to secure audio and video calls. The protocol has been dubbed DAVE, short for Discord’s audio and video end-to-end encryption (“E2EE A/V”). As part of the change introduced last week,…

Why ‘Never Expire’ Passwords Can Be a Risky Decision – OfficialSarkar

Why ‘Never Expire’ Passwords Can Be a Risky Decision – OfficialSarkar

Sep 23, 2024The Hacker NewsPassword Management / Data Breach Password resets can be frustrating for end users. Nobody likes being interrupted by the ‘time to change your password’ notification – and they like it even less when the new passwords they create are rejected by their organization’s password policy. IT teams share the pain, with…

Last Week’s Top Threats and Trends (September 16-22) – OfficialSarkar

Last Week’s Top Threats and Trends (September 16-22) – OfficialSarkar

Sep 23, 2024Ravie LakshmananCybersecurity / Cyber Threat Hold on tight, folks, because last week’s cybersecurity landscape was a rollercoaster! We witnessed everything from North Korean hackers dangling “dream jobs” to expose a new malware, to a surprising twist in the Apple vs. NSO Group saga. Even the seemingly mundane world of domain names and cloud…

Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk – OfficialSarkar

Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk – OfficialSarkar

Sep 23, 2024Ravie LakshmananIoT Security / Vulnerability A critical security flaw has been disclosed in the Microchip Advanced Software Framework (ASF) that, if successfully exploited, could lead to remote code execution. The vulnerability, tracked as CVE-2024-7490, carries a CVSS score of 9.5 out of a maximum of 10.0. It has been described as a stack-based…

New PondRAT Malware Hidden in Python Packages Targets Software Developers – OfficialSarkar

New PondRAT Malware Hidden in Python Packages Targets Software Developers – OfficialSarkar

Sep 23, 2024Ravie LakshmananSoftware Security / Supply Chain Threat actors with ties to North Korea have been observed using poisoned Python packages as a way to deliver a new malware called PondRAT as part of an ongoing campaign. PondRAT, according to new findings from Palo Alto Networks Unit 42, is assessed to be a lighter…

Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware – OfficialSarkar

Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware – OfficialSarkar

Sep 23, 2024Ravie LakshmananCyber Espionage / Malware A suspected advanced persistent threat (APT) originating from China targeted a government organization in Taiwan, and possibly other countries in the Asia-Pacific (APAC) region, by exploiting a recently patched critical security flaw impacting OSGeo GeoServer GeoTools. The intrusion activity, which was detected by Trend Micro in July 2024,…

Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks – OfficialSarkar

Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks – OfficialSarkar

A hacktivist group known as Twelve has been observed using an arsenal of publicly available tools to conduct destructive cyber attacks against Russian targets. “Rather than demand a ransom for decrypting data, Twelve prefers to encrypt victims’ data and then destroy their infrastructure with a wiper to prevent recovery,” Kaspersky said in a Friday analysis….