Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access – OfficialSarkar

Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access – OfficialSarkar

Aug 05, 2024Ravie LakshmananNetwork Security / Vulnerability A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be exploited to execute common industrial protocol (CIP) programming and configuration commands. The flaw, which is assigned the CVE identifier CVE-2024-6242, carries a CVSS v3.1 score of 8.4. “A vulnerability exists in…

New Android Trojan “BlankBot” Targets Turkish Users’ Financial Data – OfficialSarkar

New Android Trojan “BlankBot” Targets Turkish Users’ Financial Data – OfficialSarkar

Aug 05, 2024Ravie LakshmananMobile Security / Financial Security Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting Turkish users with an aim to steal financial information. “BlankBot features a range of malicious capabilities, which include customer injections, keylogging, screen recording and it communicates with a control server over a WebSocket connection,” Intel…

DOJ and FTC Sue TikTok for Violating Children’s Privacy Laws – OfficialSarkar

DOJ and FTC Sue TikTok for Violating Children’s Privacy Laws – OfficialSarkar

Aug 03, 2024Ravie LakshmananPrivacy / Data Protection The U.S. Department of Justice (DoJ), along with the Federal Trade Commission (FTC), filed a lawsuit against popular video-sharing platform TikTok for “flagrantly violating” children’s privacy laws in the country. The agencies claimed the company knowingly permitted children to create TikTok accounts and to view and share short-form…

Hackers Exploit Misconfigured Jupyter Notebooks with Repurposed Minecraft DDoS Tool – OfficialSarkar

Hackers Exploit Misconfigured Jupyter Notebooks with Repurposed Minecraft DDoS Tool – OfficialSarkar

Aug 03, 2024Ravie LakshmananDDoS Attack / Server Security Cybersecurity researchers have disclosed details of a new distributed denial-of-service (DDoS) attack campaign targeting misconfigured Jupyter Notebooks. The activity, codenamed Panamorfi by cloud security firm Aqua, utilizes a Java-based tool called mineping to launch a TCP flood DDoS attack. Mineping is a DDoS package designed for Minecraft…

APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure – OfficialSarkar

APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure – OfficialSarkar

Aug 02, 2024Ravie LakshmananCyber Espionage / Malware A Russia-linked threat actor has been linked to a new campaign that employed a car for sale as a phishing lure to deliver a modular Windows backdoor called HeadLace. “The campaign likely targeted diplomats and began as early as March 2024,” Palo Alto Networks Unit 42 said in…

APT41 Hackers Use ShadowPad, Cobalt Strike in Taiwanese Institute Cyber Attack – OfficialSarkar

APT41 Hackers Use ShadowPad, Cobalt Strike in Taiwanese Institute Cyber Attack – OfficialSarkar

Aug 02, 2024Ravie LakshmananCyber Espionage / Malware A Taiwanese government-affiliated research institute that specializes in computing and associated technologies was breached by nation-state threat actors with ties to China, according to new findings from Cisco Talos. The unnamed organization was targeted as early as mid-July 2023 to deliver a variety of backdoors and post-compromise tools…

New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication – OfficialSarkar

New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication – OfficialSarkar

Aug 02, 2024Ravie LakshmananCyber Attack / Windows Security Cybersecurity researchers have discovered a previously undocumented Windows backdoor that leverages a built-in feature called Background Intelligent Transfer Service (BITS) as a command-and-control (C2) mechanism. The newly identified malware strain has been codenamed BITSLOTH by Elastic Security Labs, which made the discovery on June 25, 2024, in…

Discover the All-in-One Cybersecurity Solution for SMBs – OfficialSarkar

Discover the All-in-One Cybersecurity Solution for SMBs – OfficialSarkar

Aug 02, 2024The Hacker News In today’s digital battlefield, small and medium businesses (SMBs) face the same cyber threats as large corporations, but with fewer resources. Managed service providers (MSPs) are struggling to keep up with the demand for protection. If your current cybersecurity strategy feels like a house of cards – a complex, costly…

Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal – OfficialSarkar

Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal – OfficialSarkar

Aug 02, 2024The Hacker NewsVulnerability / Network Security Enterprise Resource Planning (ERP) Software is at the heart of many enterprising supporting human resources, accounting, shipping, and manufacturing. These systems can become very complex and difficult to maintain. They are often highly customized, which can make patching difficult. However, critical vulnerabilities keep affecting these systems and…

U.S. Releases High-Profile Russian Hackers in Diplomatic Prisoner Exchange – OfficialSarkar

U.S. Releases High-Profile Russian Hackers in Diplomatic Prisoner Exchange – OfficialSarkar

Aug 02, 2024Ravie LakshmananCyber Crime / Hacking News In a historic prisoner exchange between Belarus, Germany, Norway, Russia, Slovenia, and the U.S., two Russian nationals serving time for cybercrime activities have been freed and repatriated to their country. This includes Roman Valerevich Seleznev and Vladislav Klyushin, who are part of a group of eight people…