North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS – OfficialSarkar

North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS – OfficialSarkar

A threat actor with ties to the Democratic People’s Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne, which dubbed the campaign Hidden Risk, attributed it with high confidence to BlueNoroff, which has been previously linked to malware families such as…

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait – OfficialSarkar

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait – OfficialSarkar

Nov 07, 2024Ravie LakshmananThreat Intelligence / Cyber Espionage The China-aligned threat actor known as MirrorFace has been observed targeting a diplomatic organization in the European Union, marking the first time the hacking crew has targeted an entity in the region. “During this attack, the threat actor used as a lure the upcoming World Expo, which…

SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims – OfficialSarkar

SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims – OfficialSarkar

An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since July 2024. Cybersecurity firm Check Point is tracking the large-scale campaign under the name CopyRh(ight)adamantys. Targeted regions include the United States, Europe, East Asia, and South America. “The campaign impersonates dozens of…

5 Most Common Malware Techniques in 2024 – OfficialSarkar

5 Most Common Malware Techniques in 2024 – OfficialSarkar

Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN’s Q3 2024 report on malware trends, complete with real-world examples. Disabling of…

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems – OfficialSarkar

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems – OfficialSarkar

Nov 07, 2024Ravie LakshmananVulnerability / Wireless Technology Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of…

RRC NFR Sarkari Result Recruitment Notification 2024 Out for 5647 Post [Career]

RRC NFR Sarkari Result Recruitment Notification 2024 Out for 5647 Post [Career]

Railway Recruitment Cell (RRC), Northeast Frontier Railway (NFR), Guwahati has released the notification for the post of Apprentice. This recruitment has been issued for 5,647 posts. Candidates can also check all the details on the official Sarkari Result 2025 website SarkariExam.com

Canada Orders TikTok to Shut Down Canadian Operations Over Security Concerns – OfficialSarkar

Canada Orders TikTok to Shut Down Canadian Operations Over Security Concerns – OfficialSarkar

Nov 07, 2024Ravie LakshmananNational Security / Social Media The Canadian government on Wednesday ordered ByteDance-owned TikTok to dissolve its operations in the country, citing national security risks, but stopped short of instituting a ban on the popular video-sharing platform. “The decision was based on the information and evidence collected over the course of the review…

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware – OfficialSarkar

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware – OfficialSarkar

Nov 06, 2024Ravie LakshmananSaaS Security / Threat Detection An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi. “Leveraging Microsoft SaaS services — including Teams, SharePoint, Quick Assist, and OneDrive — the attacker exploited the trusted…

New Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps – OfficialSarkar

New Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps – OfficialSarkar

Nov 06, 2024Ravie LakshmananMalware / Online Security Cybersecurity researchers are warning that a command-and-control (C&C) framework called Winos is being distributed within gaming-related applications like installation tools, speed boosters, and optimization utilities. “Winos 4.0 is an advanced malicious framework that offers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute…

9 Steps to Get CTEM on Your 2025 Budgetary Radar – OfficialSarkar

9 Steps to Get CTEM on Your 2025 Budgetary Radar – OfficialSarkar

Budget season is upon us, and everyone in your organization is vying for their slice of the pie. Every year, every department has a pet project that they present as absolutely essential to profitability, business continuity, and quite possibly the future of humanity itself. And no doubt that some of these actually may be mission…