China-Backed Earth Baku Expands Cyber Attacks to Europe, Middle East, and Africa – OfficialSarkar

China-Backed Earth Baku Expands Cyber Attacks to Europe, Middle East, and Africa – OfficialSarkar

Aug 14, 2024Ravie LakshmananThreat Intelligence / Cyber Attack The China-backed threat actor known as Earth Baku has diversified its targeting footprint beyond the Indo-Pacific region to include Europe, the Middle East, and Africa starting in late 2022. Newly targeted countries as part of the activity include Italy, Germany, the U.A.E., and Qatar, with suspected attacks…

Critical Flaw in Ivanti Virtual Traffic Manager Could Allow Rogue Admin Access – OfficialSarkar

Critical Flaw in Ivanti Virtual Traffic Manager Could Allow Rogue Admin Access – OfficialSarkar

Aug 14, 2024Ravie LakshmananVulnerability / Network Security Ivanti has rolled out security updates for a critical flaw in Virtual Traffic Manager (vTM) that could be exploited to achieve an authentication bypass and create rogue administrative users. The vulnerability, tracked as CVE-2024-7593, has a CVSS score of 9.8 out of a maximum of 10.0. “Incorrect implementation…

DDoS Attacks Surge 46% in First Half of 2024, Gcore Report Reveals – OfficialSarkar

DDoS Attacks Surge 46% in First Half of 2024, Gcore Report Reveals – OfficialSarkar

Monitoring evolving DDoS trends is essential for anticipating threats and adapting defensive strategies. The comprehensive Gcore Radar Report for the first half of 2024 provides detailed insights into DDoS attack data, showcasing changes in attack patterns and the broader landscape of cyber threats. Here, we share a selection of findings from the full report. Key…

Microsoft Issues Patches for 90 Flaws, Including 10 Critical Zero-Day Exploits – OfficialSarkar

Microsoft Issues Patches for 90 Flaws, Including 10 Critical Zero-Day Exploits – OfficialSarkar

Aug 14, 2024Ravie LakshmananWindows Security / Vulnerability Microsoft on Tuesday shipped fixes to address a total of 90 security flaws, including 10 zero-days, of which six have come under active exploitation in the wild. Of the 90 bugs, seven are rated Critical, 79 are rated Important, and one is rated Moderate in severity. This is…

ICAR AIEEA PG Result 2024: Out, Download PG / Phd Score Card [Career]

ICAR AIEEA PG Result 2024: Out, Download PG / Phd Score Card [Career]

Post last updated by admin: Wednesday, August 14, 2024 @ 12:11 AM NTA ICAR AIEEA PG / Ph.D Entrance Exam Result 2024 : National Testing Agency (NTA) had conducted the Indian Council of Agricultural Research ICAR PG and PhD Entrance Exam 2024 on June 29, 2024. Check more details on Sarkari Result Now, candidates…

Researchers Uncover Vulnerabilities in AI-Powered Azure Health Bot Service – OfficialSarkar

Researchers Uncover Vulnerabilities in AI-Powered Azure Health Bot Service – OfficialSarkar

Aug 13, 2024Ravie LakshmananHealthcare / Vulnerability Cybersecurity researchers have discovered two security flaws in Microsoft’s Azure Health Bot Service that, if exploited, could permit a malicious actor to achieve lateral movement within customer environments and access sensitive patient data. The critical issues, now patched by Microsoft, could have allowed access to cross-tenant resources within the…

New T-Head CPU Bugs Expose Devices to Unrestricted Attacks – OfficialSarkar

New T-Head CPU Bugs Expose Devices to Unrestricted Attacks – OfficialSarkar

Aug 13, 2024Ravie LakshmananVulnerability / Hardware Security A team of researchers from the CISPA Helmholtz Center for Information Security in Germany has disclosed an architectural bug impacting Chinese chip company T-Head’s XuanTie C910 and C920 RISC-V CPUs that could allow attackers to gain unrestricted access to susceptible devices. The vulnerability has been codenamed GhostWrite. It…

From Protecting Critical Services to Enhancing Resilience – OfficialSarkar

From Protecting Critical Services to Enhancing Resilience – OfficialSarkar

Aug 13, 2024The Hacker NewsCyber Defense / Compliance Traditionally, the focus has been on defending against digital threats such as malware, ransomware, and phishing attacks by detecting them and responding. However, as cyber threats become more sophisticated. There is a growing recognition of the importance of measures that stop new attacks before they are recognized….

FBI Shuts Down Dispossessor Ransomware Group’s Servers Across U.S., U.K., and Germany – OfficialSarkar

FBI Shuts Down Dispossessor Ransomware Group’s Servers Across U.S., U.K., and Germany – OfficialSarkar

The U.S. Federal Bureau of Investigation (FBI) on Monday announced the disruption of online infrastructure associated with a nascent ransomware group called Dispossessor (aka Radar). The effort saw the dismantling of three U.S. servers, three United Kingdom servers, 18 German servers, eight U.S.-based criminal domains, and one German-based criminal domain. Dispossessor is said to be…