Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation – OfficialSarkar

Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation – OfficialSarkar

Nov 11, 2024Ravie LakshmananMachine Learning / Vulnerability Cybersecurity researchers have uncovered nearly two dozen security flaws spanning 15 different machine learning (ML) related open-source projects. These comprise vulnerabilities discovered both on the server- and client-side, software supply chain security firm JFrog said in an analysis published last week. The server-side weaknesses “allow attackers to hijack…

Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware – OfficialSarkar

Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware – OfficialSarkar

Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless variant of known commercial malware called Remcos RAT. Remcos RAT “provides purchases with a wide range of advanced features to remotely control computers belonging to the buyer,” Fortinet FortiGuard Labs researcher Xiaopeng Zhang said in an analysis published last week. “However, threat…

Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns – OfficialSarkar

Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns – OfficialSarkar

Nov 09, 2024Ravie LakshmananVulnerability / Network Security Palo Alto Networks on Friday issued an informational advisory urging customers to ensure that access to the PAN-OS management interface is secured because of a potential remote code execution vulnerability. “Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management…

Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering – OfficialSarkar

Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering – OfficialSarkar

Nov 09, 2024Ravie LakshmananCryptocurrency / Cybercrime The 36-year-old founder of the Bitcoin Fog cryptocurrency mixer has been sentenced to 12 years and six months in prison for facilitating money laundering activities between 2011 and 2021. Roman Sterlingov, a dual Russian-Swedish national, pleaded guilty to charges of money laundering and operating an unlicensed money-transmitting business earlier…

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services – OfficialSarkar

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services – OfficialSarkar

Nov 08, 2024Ravie LakshmananIoT Security / Vulnerability The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware. “This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures,” CloudSEK…

Malicious NPM Packages Target Roblox Users with Data-Stealing Malware – OfficialSarkar

Malicious NPM Packages Target Roblox Users with Data-Stealing Malware – OfficialSarkar

Nov 08, 2024Ravie LakshmananOpen Source / Malware A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber. “This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and…

IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools – OfficialSarkar

IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools – OfficialSarkar

Nov 08, 2024Ravie LakshmananCyber Espionage / Threat Intelligence High-profile entities in India have become the target of malicious campaigns orchestrated by the Pakistan-based Transparent Tribe threat actor and a previously unknown China-nexus cyber espionage group dubbed IcePeony. The intrusions linked to Transparent Tribe involve the use of a malware called ElizaRAT and a new stealer…

Transforming MSPs and MSSPs into Cybersecurity Powerhouses – OfficialSarkar

Transforming MSPs and MSSPs into Cybersecurity Powerhouses – OfficialSarkar

Nov 08, 2024The Hacker NewsCyber Resilience / Compliance We’ve all heard a million times: growing demand for robust cybersecurity in the face of rising cyber threats is undeniable. Globally small and medium-sized businesses (SMBs) are increasingly targeted by cyberattacks but often lack the resources for full-time Chief Information Security Officers (CISOs). This gap is driving…

Learn How Storytelling Can Make Cybersecurity Training Fun and Effective – OfficialSarkar

Learn How Storytelling Can Make Cybersecurity Training Fun and Effective – OfficialSarkar

Nov 08, 2024The Hacker NewsCybersecurity Awareness / Webinar Let’s face it—traditional security training can feel as thrilling as reading the fine print on a software update. It’s routine, predictable, and, let’s be honest, often forgotten the moment it’s over. Now, imagine cybersecurity training that’s as unforgettable as your favorite show. Remember how “Hamilton” made history…

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus – OfficialSarkar

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus – OfficialSarkar

Nov 08, 2024Ravie LakshmananMalware / Virtualization Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The “intriguing” campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut (LNK) file likely distributed in the form of a…