Friday , November 22 2024

infosecbulletin

India’s ICICI Bank exposed thousands of credit cards to ‘wrong’ users

ICICI Bank

“Our customers are our utmost priority and we are wholeheartedly dedicated to safe guarding their interests. It has come to our notice that about 17,000 new credit cards which were issued in the past few days were erroneously mapped in our digital channels to wrong users. They constitute about 0.1% …

Read More »

CISA Releases Eight Industrial Control Systems Advisories

Cyber

CISA issued eight advisories about Industrial Control Systems (ICS) on April 25, 2024. The advisories share important information about security issues, vulnerabilities, and exploits related to ICS. ICSA-24-116-01 Multiple Vulnerabilities in Hitachi Energy RTU500 Series ICSA-24-116-02 Hitachi Energy MACH SCM ICSA-24-116-03 Siemens RUGGEDCOM APE1808 Devices Configured with Palo Alto Networks …

Read More »

CISA Releases Two Industrial Control Systems Advisories

monitor

CISA published two advisories about Industrial Control Systems (ICS) on April 23, 2024. The advisories give important details about security issues, vulnerabilities, and exploits related to ICS. ICSA-24-051-03 Mitsubishi Electric Electrical Discharge Machines (Update A):  Successful exploitation of this vulnerability could allow an attacker to disclose, tamper with, destroy, or …

Read More »

Microsoft Blog post
APT28 hackers to exploit CVE-2022-38028, Windows flaw

Microsoft

Microsoft Threat Intelligence released findings from their investigation on the Russian threat group known as Forest Blizzard (STRONTIUM). The group used a specialized tool to gain higher privileges and steal login information in compromised networks. Since June 2020, and maybe even since April 2019, Forest Blizzard has been using a …

Read More »

SafeBreach security research
Experts Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

flow

According to a new research bad actors could exploit the DOS-to-NT path conversion process to hide and impersonate files, directories, and processes, gaining rootkit-like capabilities. “When a user executes a function that has a path argument in Windows, the DOS path at which the file or folder exists is converted …

Read More »

University of Oxford research
“Cybercrime Index” Russia, Ukraine, and China Top Ranked

Index

After three years of research, an international team has created the first ‘World Cybercrime Index’, which ranks the most significant sources of cybercrime at a national level. The PLOS ONE journal’s Index, reveals that a few countries pose the biggest cybercrime threat. Russia is the top, followed by Ukraine, China, …

Read More »