Russian Espionage Group Targets Ukrainian Military with Malware via Telegram – OfficialSarkar

Russian Espionage Group Targets Ukrainian Military with Malware via Telegram – OfficialSarkar

Oct 28, 2024Ravie LakshmananCyber Espionage / Android A suspected Russian hybrid espionage and influence operation has been observed delivering a mix of Windows and Android malware to target the Ukrainian military under the Telegram persona Civil Defense. Google’s Threat Analysis Group (TAG) and Mandiant are tracking the activity under the name UNC5812. The threat group,…

Sailing the Seven Seas Securely from Port to Port – OT Access Security for Ships and Cranes – OfficialSarkar

Sailing the Seven Seas Securely from Port to Port – OT Access Security for Ships and Cranes – OfficialSarkar

Oct 28, 2024The Hacker NewsOperational Technology / Cybersecurity Operational Technology (OT) security has affected marine vessel and port operators, since both ships and industrial cranes are being digitalized and automated at a rapid pace, ushering in new types of security challenges. Ships come to shore every six months on average. Container cranes are mostly automated….

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 – OfficialSarkar

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 – OfficialSarkar

Oct 28, 2024Ravie LakshmananCyber Security / Hacking News Cybersecurity news can sometimes feel like a never-ending horror movie, can’t it? Just when you think the villains are locked up, a new threat emerges from the shadows. This week is no exception, with tales of exploited flaws, international espionage, and AI shenanigans that could make your…

Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials – OfficialSarkar

Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials – OfficialSarkar

Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat actors continue to abuse legitimate services like Cloudflare and Microsoft Sway to their advantage. “The campaigns target sensitive information from different crypto wallets, including Coinbase, MetaMask, Phantom, Trezor, and Bitbuy, as well as login credentials…

Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel – OfficialSarkar

Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel – OfficialSarkar

Oct 28, 2024Ravie LakshmananVulnerability / Windows Security A new attack technique could be used to bypass Microsoft’s Driver Signature Enforcement (DSE) on fully patched Windows systems, leading to operating system (OS) downgrade attacks. “This bypass allows loading unsigned kernel drivers, enabling attackers to deploy custom rootkits that can neutralize security controls, hide processes and network…

Four REvil Ransomware Members Sentenced in Rare Russian Cybercrime Convictions – OfficialSarkar

Four REvil Ransomware Members Sentenced in Rare Russian Cybercrime Convictions – OfficialSarkar

Oct 26, 2024Ravie LakshmananCybercrime / Malware Four members of the now-defunct REvil ransomware operation have been sentenced to several years in prison in Russia, marking one of the rare instances where cybercriminals from the country have been convicted of hacking and money laundering charges. Russian news publication Kommersant reported that a court in St. Petersburg…

Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining – OfficialSarkar

Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining – OfficialSarkar

Oct 26, 2024Ravie LakshmananCloud Security / Cryptocurrency The infamous cryptojacking group known as TeamTNT appears to be readying for a new large-scale campaign targeting cloud-native environments for mining cryptocurrencies and renting out breached servers to third-parties. “The group is currently targeting exposed Docker daemons to deploy Sliver malware, a cyber worm, and cryptominers, using compromised…

CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities – OfficialSarkar

CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities – OfficialSarkar

Oct 26, 2024Ravie LakshmananCyber Attack / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has detailed a new malicious email campaign targeting government agencies, enterprises, and military entities. “The messages exploit the appeal of integrating popular services like Amazon or Microsoft and implementing a zero-trust architecture,” CERT-UA said. “These emails contain attachments in…

Researchers Discover Command Injection Flaw in Wi-Fi Alliance’s Test Suite – OfficialSarkar

Researchers Discover Command Injection Flaw in Wi-Fi Alliance’s Test Suite – OfficialSarkar

Oct 25, 2024Ravie LakshmananVulnerability / Wi-Fi Security A security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges. The CERT Coordination Center (CERT/CC) said the vulnerability, tracked as CVE-2024-41992, said the susceptible code from the Wi-Fi Alliance has been found deployed on Arcadyan FMIMG51AX000J routers. “This…

Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security – OfficialSarkar

Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security – OfficialSarkar

Oct 25, 2024Ravie LakshmananCloud Security / Artificial Intelligence Apple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing the research community to inspect and verify the privacy and security guarantees of its offering. PCC, which Apple unveiled earlier this June, has been marketed as the “most advanced security architecture ever…