Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability – OfficialSarkar

Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability – OfficialSarkar

Sep 14, 2024Ravie LakshmananEnterprise Security / Threat Intelligence Ivanti has revealed that a newly patched security flaw in its Cloud Service Appliance (CSA) has come under active exploitation in the wild. The high-severity vulnerability in question is CVE-2024-8190 (CVSS score: 7.2), which allows remote code execution under certain circumstances. “An OS command injection vulnerability in…

Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw – OfficialSarkar

Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw – OfficialSarkar

Sep 13, 2024Ravie LakshmananSoftware Security / Threat Intelligence Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to conduct opportunistic attacks. The activity is said to have commenced on August 30, 2024, a mere five hours after a PoC was released for CVE-2024-6670 (CVSS…

Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers – OfficialSarkar

Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers – OfficialSarkar

Sep 13, 2024Ravie LakshmananVirtual Reality / Vulnerability Details have emerged about a now-patched security flaw impacting Apple’s Vision Pro mixed reality headset that, if successfully exploited, could allow malicious attackers to infer data entered on the device’s virtual keyboard. The attack, dubbed GAZEploit, has been assigned the CVE identifier CVE-2024-40865. “A novel attack that can…

Must-Haves to Eliminate Credential Theft – OfficialSarkar

Must-Haves to Eliminate Credential Theft – OfficialSarkar

Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished credentials (Verizon DBIR, 2024). Solving this problem resolves over 80% of your corporate risk, and a solution is possible. However, most tools available on the market today cannot offer a complete defense against this attack vector because they…

17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London – OfficialSarkar

17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London – OfficialSarkar

Sep 13, 2024Ravie LakshmananCyber Attack / Crime British authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyber attack affecting Transport for London (TfL). “The 17-year-old male was detained on suspicion of Computer Misuse Act offenses in relation to the attack, which was launched on TfL on 1 September,” the…

TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud – OfficialSarkar

TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud – OfficialSarkar

Sep 13, 2024Ravie LakshmananFinancial Fraud / Mobile Security Cybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes packed with new capabilities to evade analysis and display fake login screens to capture victims’ banking credentials. “The mechanisms include using malformed ZIP files in combination with JSONPacker,” Cleafy security researchers…

New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency – OfficialSarkar

New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency – OfficialSarkar

Sep 13, 2024Ravie LakshmananEnterprise Security / Vulnerability Cybersecurity researchers have uncovered a new malware campaign targeting Linux environments to conduct illicit cryptocurrency mining. The activity, which specifically singles out the Oracle Weblogic server, is designed to deliver malware dubbed Hadooken, according to cloud security firm Aqua. “When Hadooken is executed, it drops a Tsunami malware…

GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Execution – OfficialSarkar

GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Execution – OfficialSarkar

Sep 12, 2024Ravie LakshmananDevSecOps / Vulnerability GitLab on Wednesday released security updates to address 17 security vulnerabilities, including a critical flaw that allows an attacker to run pipeline jobs as an arbitrary user. The issue, tracked as CVE-2024-6678, carries a CVSS score of 9.9 out of a maximum of 10.0 “An issue was discovered in…

New Android Malware ‘Ajina.Banker’ Steals Financial Data and Bypasses 2FA via Telegram – OfficialSarkar

New Android Malware ‘Ajina.Banker’ Steals Financial Data and Bypasses 2FA via Telegram – OfficialSarkar

Sep 12, 2024Ravie LakshmananMobile Security / Financial Fraud Bank customers in the Central Asia region have been targeted by a new strain of Android malware codenamed Ajina.Banker since at least November 2024 with the goal of harvesting financial information and intercepting two-factor authentication (2FA) messages. Singapore-headquartered Group-IB, which discovered the threat in May 2024, said…

Ireland’s Watchdog Launches Inquiry into Google’s AI Data Practices in Europe – OfficialSarkar

Ireland’s Watchdog Launches Inquiry into Google’s AI Data Practices in Europe – OfficialSarkar

Sep 12, 2024Ravie LakshmananRegulatory Compliance / Data Protection The Irish Data Protection Commission (DPC) has announced that it has commenced a “Cross-Border statutory inquiry” into Google’s foundational artificial intelligence (AI) model to determine whether the tech giant has adhered to data protection regulations in the region when processing the personal data of European users. “The…