Proposed new cybersecurity rules for healthcare institutions will focus on how they protect user data under HIPAA, as stated by a White House official. Anne Neuberger, deputy national security adviser for cyber and emerging technology, told “The security rule [under HIPAA] was first published in 2003 and it was last …
Read More »New NGate Trojan Drains Bank Accounts via ATMs
Malware analysts at Doctor Web have identified new versions of the NGate banking trojan. This malware steals data from the device’s NFC chip, enabling attackers to withdraw money from victims’ accounts at ATMs without their knowledge. The NGate banker was first noticed by antivirus vendors in autumn 2023 due to …
Read More »CPE Seminar Held at ISACA Dhaka Chapter Office Premises
ISACA Dhaka chapter arranged a Continuing Professional Education (CPE) seminar for the community as its calendar work to develop the professionals. On 28 December, Saturday at ISACA Dhaka office with the participation over 50 participants the seminar draw the attention with the two leading topic on “Leadership & Communication is …
Read More »
Update Immediately
Palo Alto Releases Patch for PAN-OS DoS Flaw
Palo Alto Networks has revealed a high severity vulnerability in PAN-OS software that may lead to a denial-of-service (DoS) issue on affected devices. The vulnerability CVE-2024-3393 (CVSS score: 8.7) affects PAN-OS versions 10.X and 11.X, and Prisma Access with PAN-OS versions 10.2.8 or later and before 11.2.3. It has been …
Read More »Cyberattack Hit Japan Airlines Systems, delaying flights
Japan Airlines reported a cyberattack on Thursday that delayed over 20 domestic flights. The airline managed to stop the attack and restore its systems within hours, and confirmed that flight safety was not affected. JAL reported that a network issue began Thursday morning, affecting both internal and external systems. The …
Read More »Hacker reportedly leak Indonesia Gov.t 82 GB data
Hackers claimed to have accessed and stolen 82 GB of sensitive data from Indonesia’s Regional Financial Management Information System (SIPKD). GBHackers News reported the data breach announced on a hacking forum, exposing sensitive financial, administrative, and personal information, raising significant security and privacy concerns. The stolen data, which includes backups …
Read More »BCSI officially announce National Vulnerability Disclosure Program (NVDP)
Bangladesh Cyber Security Intelligence (BCSI) officially launch the National Vulnerability Disclosure Program (NVDP) to enhance the country’s cybersecurity. This initiative aims to create a secure platform for ethical hackers, researchers, and organizations to work together in identifying and addressing vulnerabilities that threaten government systems, critical infrastructure, and private sector entities. …
Read More »
CVE-2024-9474
Researcher unveil sophisticated backdoor in Palo Alto Networks firewalls
Northwave Cyber Security has found a sophisticated backdoor, LITTLELAMB.WOOLTEA, targeting Palo Alto Networks firewalls. Northwave researcher claimed the backdoor was found during a forensic investigation of a compromised Palo Alto Networks device. Attackers exploited a recently disclosed vulnerability (CVE-2024-9474) to enter the system and deploy a malicious script called bwmupdate, …
Read More »New G-Door Vul Allow Hackers Bypass Microsoft 365 Security With Google Docs
A newly discovered vulnerability called “G-Door” enables malicious actors to bypass Microsoft 365 security by exploiting unmanaged Google Docs accounts. This flaw poses a serious threat to organizations using Microsoft 365’s Conditional Access policies. The G-Door vulnerability stems from the ability to create personal or workspace Google accounts using a …
Read More »
CVE-2024-53961
Adobe alerts of critical ColdFusion bug with PoC exploit available
Adobe has issued urgent security updates for ColdFusion versions 2023 and 2021 to fix a critical vulnerability (CVE-2024-53961). This flaw allows attackers to read arbitrary files from the system, risking exposure of sensitive data and configuration files. It results from improper path limitations, enabling unauthorized access outside the intended directory. …
Read More »