Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data – OfficialSarkar

Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data – OfficialSarkar

Aug 21, 2024Ravie LakshmananSoftware Security / Vulnerability Cybersecurity researchers have disclosed a critical security flaw impacting Microsoft’s Copilot Studio that could be exploited to access sensitive information. Tracked as CVE-2024-38206 (CVSS score: 8.5), the vulnerability has been described as an information disclosure bug stemming from a server-side request forgery (SSRF) attack. “An authenticated attacker can…

New macOS Malware TodoSwift Linked to North Korean Hacking Groups – OfficialSarkar

New macOS Malware TodoSwift Linked to North Korean Hacking Groups – OfficialSarkar

Aug 21, 2024Ravie LakshmananMalware / Cryptocurrency Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say exhibits commonalities with known malicious software used by North Korean hacking groups. “This application shares several behaviors with malware we’ve seen that originated in North Korea (DPRK) — specifically the threat actor known as BlueNoroff…

Styx Stealer Creator’s OPSEC Fail Leaks Client List and Profit Details – OfficialSarkar

Styx Stealer Creator’s OPSEC Fail Leaks Client List and Profit Details – OfficialSarkar

Aug 21, 2024Ravie LakshmananCyber Espionage / Threat Intelligence In what’s a case of an operational security (OPSEC) lapse, the operator behind a new information stealer called Styx Stealer leaked data from their own computer, including details related to the clients, profit information, nicknames, phone numbers, and email addresses. Styx Stealer, a derivative of the Phemedrone…

It’s Time To Untangle the SaaS Ball of Yarn – OfficialSarkar

It’s Time To Untangle the SaaS Ball of Yarn – OfficialSarkar

It’s no great revelation to say that SaaS applications have changed the way we operate, both in our personal and professional lives. We routinely rely on cloud-based and remote applications to conduct our basic functions, with the result that the only true perimeter of our networks has become the identities with which we log into…

CERT-UA Warns of New Vermin-Linked Phishing Attacks with PoW Bait – OfficialSarkar

CERT-UA Warns of New Vermin-Linked Phishing Attacks with PoW Bait – OfficialSarkar

Aug 21, 2024Ravie LakshmananCyber Warfare / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new phishing attacks that aim to infect devices with malware. The activity has been attributed to a threat cluster it tracks as UAC-0020, which is also known as Vermin. The exact scale and scope of the…

GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk – OfficialSarkar

GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk – OfficialSarkar

Aug 21, 2024Ravie LakshmananWordPress / Cybersecurity A maximum-severity security flaw has been disclosed in the WordPress GiveWP donation and fundraising plugin that exposes more than 100,000 websites to remote code execution attacks. The flaw, tracked as CVE-2024-5932 (CVSS score: 10.0), impacts all versions of the plugin prior to version 3.14.2, which was released on August…

Czech Mobile Users Targeted in New Banking Credential Theft Scheme – OfficialSarkar

Czech Mobile Users Targeted in New Banking Credential Theft Scheme – OfficialSarkar

Aug 20, 2024Ravie LakshmananMobile Security / Banking Fraud Mobile users in the Czech Republic are the target of a novel phishing campaign that leverages a Progressive Web Application (PWA) in an attempt to steal their banking account credentials. The attacks have targeted the Czech-based Československá obchodní banka (CSOB), as well as the Hungarian OTP Bank…

Key Indicators in CloudTrail Logs for Stolen API Keys – OfficialSarkar

Key Indicators in CloudTrail Logs for Stolen API Keys – OfficialSarkar

Aug 20, 2024The Hacker NewsCybersecurity / Cloud Security As cloud infrastructure becomes the backbone of modern enterprises, ensuring the security of these environments is paramount. With AWS (Amazon Web Services) still being the dominant cloud it is important for any security professional to know where to look for signs of compromise. AWS CloudTrail stands out…

Iranian Cyber Group TA453 Targets Jewish Leader with New AnvilEcho Malware – OfficialSarkar

Iranian Cyber Group TA453 Targets Jewish Leader with New AnvilEcho Malware – OfficialSarkar

Iranian state-sponsored threat actors have been observed orchestrating spear-phishing campaigns targeting a prominent Jewish figure starting in late July 2024 with the goal of delivering a new intelligence-gathering tool called AnvilEcho. Enterprise security company Proofpoint is tracking the activity under the name TA453, which overlaps with activity tracked by the broader cybersecurity community under the…

Researchers Uncover TLS Bootstrap Attack on Azure Kubernetes Clusters – OfficialSarkar

Researchers Uncover TLS Bootstrap Attack on Azure Kubernetes Clusters – OfficialSarkar

Aug 20, 2024Ravie LakshmananVulnerability / Container Security Cybersecurity researchers have disclosed a security flaw impacting Microsoft Azure Kubernetes Services that, if successfully exploited, could allow an attacker to escalate their privileges and access credentials for services used by the cluster. “An attacker with command execution in a Pod running within an affected Azure Kubernetes Services…