Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk – OfficialSarkar

Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk – OfficialSarkar

Jul 26, 2024NewsroomSoftware Security / Vulnerability Progress Software is urging users to update their Telerik Report Server instances following the discovery of a critical security flaw that could result in remote code execution. The vulnerability, tracked as CVE-2024-6327 (CVSS score: 9.9), impacts Report Server version 2024 Q2 (10.1.24.514) and earlier. “In Progress Telerik Report Server…

North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks – OfficialSarkar

North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks – OfficialSarkar

Jul 25, 2024NewsroomMalware / Cyber Espionage A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that involve the deployment of ransomware, setting it apart from other nation-state hacking groups linked to the country. Google-owned Mandiant is tracking the activity cluster under a new moniker APT45, which overlaps…

Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform – OfficialSarkar

Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform – OfficialSarkar

Jul 25, 2024NewsroomCloud Security / Vulnerability Cybersecurity researchers have disclosed a privilege escalation vulnerability impacting Google Cloud Platform’s Cloud Functions service that an attacker could exploit to access other services and sensitive data in an unauthorized manner. Tenable has given the vulnerability the name ConfusedFunction. “An attacker could escalate their privileges to the Default Cloud…

Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams – OfficialSarkar

Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams – OfficialSarkar

Jul 25, 2024NewsroomCybercrime / Online Safety Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were found to target people with financial sextortion scams. “These included a smaller coordinated network of around 2,500 accounts that we were able to link to a group of around 20 individuals,”…

6 Types of Applications Security Testing You Must Know About – OfficialSarkar

6 Types of Applications Security Testing You Must Know About – OfficialSarkar

While the specifics for security testing vary for applications, web applications, and APIs, a holistic and proactive applications security strategy is essential for all three types. There are six core types of testing that every security professional should know about to secure their applications, regardless of what phase they are in in development or deployment….

What Enterprises MUST Know about Enterprise Browser Security – OfficialSarkar

What Enterprises MUST Know about Enterprise Browser Security – OfficialSarkar

Jul 25, 2024The Hacker NewsBrowser Security / Enterprise Security The browser is the nerve center of the modern workspace. Ironically, however, the browser is also one of the least protected threat surfaces of the modern enterprise. Traditional security tools provide little protection against browser-based threats, leaving organizations exposed. Modern cybersecurity requires a new approach based…

New Chrome Feature Scans Password-Protected Files for Malicious Content – OfficialSarkar

New Chrome Feature Scans Password-Protected Files for Malicious Content – OfficialSarkar

Jul 25, 2024NewsroomBrowser Security / Data Protection Google said it’s adding new security warnings when downloading potentially suspicious and malicious files via its Chrome web browser. “We have replaced our previous warning messages with more detailed ones that convey more nuance about the nature of the danger and can help users make more informed decisions,”…

CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software – OfficialSarkar

CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software – OfficialSarkar

Jul 25, 2024NewsroomDNS Security /Vulnerability The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that could be exploited to trigger a denial-of-service (DoS) condition. “A cyber threat actor could exploit one of these vulnerabilities to cause a…

Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins – OfficialSarkar

Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins – OfficialSarkar

Jul 25, 2024NewsroomContainer Security / Vulnerability Docker is warning of a critical flaw impacting certain versions of Docker Engine that could allow an attacker to sidestep authorization plugins (AuthZ) under specific circumstances. Tracked as CVE-2024-41110, the bypass and privilege escalation vulnerability carries a CVSS score of 10.0, indicating maximum severity. “An attacker could exploit a…

Patchwork Hackers Target Bhutan with Advanced Brute Ratel C4 Tool – OfficialSarkar

Patchwork Hackers Target Bhutan with Advanced Brute Ratel C4 Tool – OfficialSarkar

Jul 24, 2024NewsroomCyber Espionage / Threat Intelligence The threat actor known as Patchwork has been linked to a cyber attack targeting entities with ties to Bhutan to deliver the Brute Ratel C4 framework and an updated version of a backdoor called PGoShell. The development marks the first time the adversary has been observed using the…