In April 2023, CISA kicked off our Secure by Design initiative, the agency’s effort to shift the responsibility of security from end users to technology manufacturers, in line with the National Cybersecurity Strategy. As with any major milestone, it’s useful to pause for some self-reflection over a year’s worth of …
Read More »ColoCity introduced hybrid cloud with Microsoft and Dell in Bangladesh
ColoCity has introduced hybrid cloud services for the first time in the country which is the integrated platform of Microsoft Azure Stack Hub and Dell Technologies to accelerate the technological expansion of the country’s business and industry to meet the goal of Smart Bangladesh. Azure Stack Hub is an extension …
Read More »CISA Releases Two Industrial Control Systems Advisories
CISA published two advisories about Industrial Control Systems (ICS) on April 23, 2024. The advisories give important details about security issues, vulnerabilities, and exploits related to ICS. ICSA-24-051-03 Mitsubishi Electric Electrical Discharge Machines (Update A): Successful exploitation of this vulnerability could allow an attacker to disclose, tamper with, destroy, or …
Read More »
Microsoft Blog post
APT28 hackers to exploit CVE-2022-38028, Windows flaw
Microsoft Threat Intelligence released findings from their investigation on the Russian threat group known as Forest Blizzard (STRONTIUM). The group used a specialized tool to gain higher privileges and steal login information in compromised networks. Since June 2020, and maybe even since April 2019, Forest Blizzard has been using a …
Read More »
SafeBreach security research
Experts Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
According to a new research bad actors could exploit the DOS-to-NT path conversion process to hide and impersonate files, directories, and processes, gaining rootkit-like capabilities. “When a user executes a function that has a path argument in Windows, the DOS path at which the file or folder exists is converted …
Read More »
University of Oxford research
“Cybercrime Index” Russia, Ukraine, and China Top Ranked
After three years of research, an international team has created the first ‘World Cybercrime Index’, which ranks the most significant sources of cybercrime at a national level. The PLOS ONE journal’s Index, reveals that a few countries pose the biggest cybercrime threat. Russia is the top, followed by Ukraine, China, …
Read More »Hacker Threatens to Expose Sensitive World-Check Database
A criminal hacking group claims to have stolen the World-Check database with millions of records. The database is used by companies to check if potential customers have connections to financial crime or sanctions. The group called GhostR stole 5.3 million records from the World-Check database in March and are threatening …
Read More »CISCO Releases Security Advisories for CISCO IMC
Cisco has issued security advisories for vulnerabilities in the Cisco integrated management controller. These vulnerabilities could allow a remote cyber threat actor to gain control of a compromised system. Cisco Integrated Management Controller CLI Command Injection Vulnerability: A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could …
Read More »Telecom giant “Frontier” Hit by Cyberattack, Some system shut
Frontier Communications, a Texas-based telecom company, reported a cyberattack to the Securities and Exchange Commission. The company offers internet services in over 25 states and had $5.75 billion in revenues in 2023. The company said it detected unauthorized access to its IT systems on April 14 and began instituting “containment …
Read More »CISA and Partners Release Advisory on Akira Ransomware
CISA, FBI, Europol’s EC3, and NCSC-NL released a joint Cybersecurity Advisory called #StopRansomware: Akira Ransomware. It shares known tactics, techniques, and procedures of Akira ransomware, as well as indicators of compromise from FBI investigations up until February 2024. Akira threat actors started with Windows systems but shifted to Linux for …
Read More »