U.S. Treasury Sanctions Executives Linked to Intellexa Predator Spyware Operation – OfficialSarkar

U.S. Treasury Sanctions Executives Linked to Intellexa Predator Spyware Operation – OfficialSarkar

Sep 17, 2024Ravie LakshmananSpyware / Privacy The U.S. Department of Treasury has imposed fresh sanctions against five executives and one entity with ties to the Intellexa Consortium for their role in the development, operation, and distribution of a commercial spyware called Predator. “The United States will not tolerate the reckless propagation of disruptive technologies that…

Google Chrome Switches to ML-KEM for Post-Quantum Cryptography Defense – OfficialSarkar

Google Chrome Switches to ML-KEM for Post-Quantum Cryptography Defense – OfficialSarkar

Sep 17, 2024Ravie LakshmananBrowser Security / Quantum Computing Google has announced that it will be switching from KYBER to ML-KEM in its Chrome web browser as part of its ongoing efforts to defend against the risk posed by cryptographically relevant quantum computers (CRQCs). “Chrome will offer a key share prediction for hybrid ML-KEM (codepoint 0x11EC),”…

How to Investigate ChatGPT activity in Google Workspace – OfficialSarkar

How to Investigate ChatGPT activity in Google Workspace – OfficialSarkar

Sep 17, 2024The Hacker NewsGenAI Security / SaaS Security Since launching ChatGPT in 2022, OpenAI has defied expectations with a steady stream of product announcements and enhancements. One such announcement came on May 16, 2024, and for most consumers, it probably felt innocuous. Titled “Improvements to data analysis in ChatGPT,” the post outlines how users…

Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users – OfficialSarkar

Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users – OfficialSarkar

Sep 17, 2024Ravie LakshmananCryptocurrency / Malware Cryptocurrency exchange Binance is warning of an “ongoing” global threat that’s targeting cryptocurrency users with clipper malware with the goal of facilitating financial fraud. Clipper malware, also called ClipBankers, is a type of malware that Microsoft calls cryware, which comes with capabilities to monitor a victim’s clipboard activity and…

SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks – OfficialSarkar

SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks – OfficialSarkar

Sep 17, 2024Ravie LakshmananSoftware Security / Data Protection SolarWinds has released fixes to address two security flaws in its Access Rights Manager (ARM) software, including a critical vulnerability that could result in remote code execution. The vulnerability, tracked as CVE-2024-28991, is rated 9.0 out of a maximum of 10.0 on the CVSS scoring system. It…

North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware – OfficialSarkar

North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware – OfficialSarkar

Sep 16, 2024Ravie LakshmananFinancial Security / Malware Cybersecurity researchers are continuing to warn about North Korean threat actors’ attempts to target prospective victims on LinkedIn to deliver malware called RustDoor. The latest advisory comes from Jamf Threat Labs, which said it spotted an attack attempt in which a user was contacted on the professional social…

Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution – OfficialSarkar

Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution – OfficialSarkar

Sep 16, 2024Ravie LakshmananCloud Security / Vulnerability A now-patched critical security flaw impacting Google Cloud Platform (GCP) Composer could have been exploited to achieve remote code execution on cloud servers by means of a supply chain attack technique called dependency confusion. The vulnerability has been codenamed CloudImposer by Tenable Research. “The vulnerability could have allowed…

Master Your PCI DSS v4 Compliance with Innovative Smart Approvals – OfficialSarkar

Master Your PCI DSS v4 Compliance with Innovative Smart Approvals – OfficialSarkar

Sep 16, 2024The Hacker NewsPayment Security / Data Protection The PCI DSS landscape is evolving rapidly. With the Q1 2025 deadline looming ever larger, businesses are scrambling to meet the stringent new requirements of PCI DSS v4.0. Two sections in particular, 6.4.3 and 11.6.1, are troublesome as they demand that organizations rigorously monitor and manage…

Designing an Identity-Focused Incident Response Playbook – OfficialSarkar

Designing an Identity-Focused Incident Response Playbook – OfficialSarkar

Sep 16, 2024The Hacker NewsIdentity Protection / Incident Response Imagine this… You arrive at work to a chaotic scene. Systems are down, panic is in the air. The culprit? Not a rogue virus, but a compromised identity. The attacker is inside your walls, masquerading as a trusted user. This isn’t a horror movie, it’s the…

Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure – OfficialSarkar

Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure – OfficialSarkar

Sep 16, 2024Ravie LakshmananSpyware / Threat Intelligence Apple has filed a motion to “voluntarily” dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting risk landscape that could lead to exposure of critical “threat intelligence” information. The development was first reported by The Washington Post on Friday. The iPhone maker said its efforts,…