National Attack Surface (NAS) report for the first half of 2024 reveals that 56.6% of cyberattacks in Bangladesh targeted educational institutions, indicating a serious lack of maintenance and updates for school websites, making them highly vulnerable. During this period, 32.4% of attacks targeted government websites, revealing significant security flaws. The …
Read More »First Half Of 2024 Report
Prince Ransomware Hits UK and US
A new ransomware campaign is targeting individuals and organizations in the UK and US. The “Prince Ransomware” attack uses a phishing scam that pretends to be from the British postal service, Royal Mail. The Attack Methodology: Researchers at Proofpoint noticed the Prince Ransomware campaign in mid-September. The attack method is …
Read More »Researchers detected 31 new Malware in September
In September, cybersecurity experts discovered 31 new ransomware variants that threaten individuals and businesses. These programs encrypt valuable data, making it inaccessible, and demand high ransoms for decryption keys. This not only risks personal and sensitive information but also creates significant financial burdens for victims. Ownerd SHA-256: 519a765a3341b03a035d158605eef4620e1094f0e3d1e7be1d1ac4750f2a0552 Extensions: .ownerd …
Read More »
CISA Warns
Network switch RCE flaw impacts critical infrastructure
CISA warns of two serious vulnerabilities in Optigo Networks ONS-S8 Aggregation Switches, which could allow authentication bypass and remote code execution in critical infrastructure. The flaws involve weak authentication, allowing users to bypass password requirements, and issues with validating user input, which could lead to remote code execution, arbitrary file …
Read More »
DataDog research
Hackers to exploit Docker, Kubernetes & SSH Servers large scale
DataDog security researchers found that hackers are widely exploiting Docker Swarm, Kubernetes, and SSH servers. The newly discovered malware campaign focuses on “Docker” and “Kubernetes” environments and uses “Docker API” endpoint vulnerabilities as the ‘initial access vector.’ Hackers Exploiting Servers in Large Scale: The hackers install “cryptocurrency mining software” on …
Read More »Microsoft warns Storm-0501 targets hybrid cloud environments
Microsoft cybersecurity researchers found that the “Storm-0501” ransomware group is targeting hybrid cloud environments. Storm-0501 Attacking Cloud Environments: Storm-0501 is a ‘financially motivated’ threat group that has launched a sophisticated ‘multi-stage attack’ targeting “hybrid cloud environments” across various ‘U.S. sectors’ and ‘critical infrastructure.’ The group exploited vulnerabilities in Zoho ManageEngine, …
Read More »
Cloudflare report
India linked hacker to target Bangladeshi Gov.t and law agency
A threat actor likely operating out of India is relying on various cloud services to conduct cyberattacks against energy, defense, government, telecommunications, and technology entities of Bangladesh, Cloudflare reports. Tracked as SloppyLemming, this group is linked to Outrider Tiger, a threat actor associated with India, previously Crowdstrike said, that uses …
Read More »White Snake to Steal Credit Cards CVC Codes from Chrome
The White Snake malware has been updated to take advantage of a new feature in the latest Google Chrome version. This update lets malware steal CVC codes from credit cards saved in browsers, posing a serious online security threat, according to reports on X. Chrome’s New Feature Draws Attention: Google …
Read More »
Check you one
Android malware ‘Necro’ infect 11 million users via Google Play
Kaspersky security researchers discovered a new version of the Necro malware that has infected over 11 million devices via Google Play and unofficial app sources. This complex multi-stage loader uses advanced methods such as steganography and obfuscation to avoid detection, demonstrating the increasing threats in mobile security. The Necro Trojan …
Read More »80% of organizations faced an email-based security breach
Most critical infrastructure sectors have experienced an email security breach in the past year. A study by Osterman Research, commissioned by OPSWAT, found that 80% of organizations suffered an email-based security breach. Even as criminal hackers target the sector, CI businesses appear to be failing to protect their systems. Osterman …
Read More »