Companies in Germany are facing a new wave of cyberattacks. The State Criminal Police Office of North Rhine-Westphalia has issued a warning. Cybercriminals are targeting Microsoft 365, particularly email and document management, as a way to launch their attacks. “Unknown perpetrators take over email accounts and then send messages on …
Read More »Hacktivists group target Philippines government ransomware attack
SentinelOne researchers found that the Ikaruz Red Team is targeting the Philippines government using different ransomware builders like LockBit, Vice Society, Clop, and AlphV to carry out “small-scale” attacks. They are also sharing data leaks from various organizations in the Philippines. Ikaruz Red Team (IRT) has been targeting entities in …
Read More »
CISA ALERT
CISA Warns Exploiting NextGen Healthcare Mirth Connect Flaw
The US cybersecurity agency, CISA, added a flaw in NextGen Healthcare’s Mirth Connect product to its catalog of Known Exploited Vulnerabilities (KEV). A vulnerability in the open source product, known as CVE-2023-43208, allows remote code execution without authentication due to a data deserialization problem. A patch was rolled out with …
Read More »BangabandhuGrandmaster.com Faces Massive Data Breach
Bangabandhugrandmaster.com, a website dedicated to Bangabandhu Sheikh Mujibur Rahman’s ideas and life, has suffered a major data breach. The breach happened on May 20, 2024, when a significant amount of user data was exposed. The Bangabandhugrandmaster.com data breach revealed an SQL file with detailed information about 94,000 users. The exposed …
Read More »
TENABLE REPORT
Critical bug “Fluent Bit” impact all major cloud platforms
Fluent Bit, a widely used logging utility, has a critical vulnerability. This vulnerability can lead to denial-of-service attacks, information disclosure, and potentially remote code execution (RCE). Tenable, a cybersecurity firm, discovered this vulnerability. Fluent Bit is an open source tool that collects and processes large amounts of log data from …
Read More »Hackers Target E-Commerce in Bangladesh, Sell order details on Dark Web
Hackers target Bangladeshi many WordPress based e-commerce sites for their illegal activities. Getting access they are now offer to sell the taken access on the dark web. But, the alarming issue is that on those post not any specific site name has been mentioned. So, this is really difficult to …
Read More »
BCSI BLOG POST
SonicWALL Vulnerability Traded; threating for Corporate network in Bangladesh
SonicWALL SSL-VPN provides secure remote access to an organization’s internal network and resources through an encrypted SSL connection. This kind of VPN is great for giving employees and partners secure access to internal applications and data from remote locations. A hacker is selling a $1000 exploit that targets SonicWALL SSL-VPN …
Read More »Banking trojan Grandoreiro targeting about 1,500 banks over 60 countries
The banking trojan “Grandoreiro” is spreading widely through a phishing campaign in over 60 countries, aiming at customer accounts of about 1,500 banks. In January 2024, a joint international law enforcement operation involving Brazil, Spain, Interpol, ESET, and Caixa Bank revealed the disruption of a malware operation. The malware had …
Read More »Australian gov.t warns of ‘large-scale ransomware data breach’
Australian police are investigating a big data breach in a healthcare company after a ransomware attack on Thursday. The website and hotline of MediSecure, a company based in Melbourne, were offline after a breach occurred. This was confirmed by a statement from the electronic prescription service provider. No group has …
Read More »Patch Now: CISA Warns of Actively Exploited D-Link Router Vulnerabilities
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced that two security flaws in D-Link routers have been added to its list of actively exploited vulnerabilities. The list of vulnerabilities is as follows: CVE-2014-100005 : A vulnerability that allows an attacker to manipulate D-Link DIR-600 router configurations by taking over …
Read More »