Wednesday , January 1 2025

International

NSA Releases Guidance on Zero Trust Maturity

NIST

The NSA released an information sheet called “Advancing Zero Trust Maturity Throughout the Application and Workload Pillar.” This sheet will help organizations protect their applications from unauthorized users and maintain constant visibility of their workload. This CSI gives recommendations for achieving different levels of application and workload capabilities under the …

Read More »

Ivanti Patches Critical RCE Flaws in Endpoint Manager

Ivanti

Ivanti on Tuesday declare to patch for several products, including fixes for critical vulnerabilities in Endpoint Manager (EPM). Ivanti resolved six out of the ten security defects resolved in EPM are critical-severity SQL Injection bugs. Tracked as CVE-2024-29822 through CVE-2024-29827, the bugs impact the Core server of Ivanti EPM 2022 …

Read More »

Banking trojan Grandoreiro targeting about 1,500 banks over 60 countries

map

The banking trojan “Grandoreiro” is spreading widely through a phishing campaign in over 60 countries, aiming at customer accounts of about 1,500 banks. In January 2024, a joint international law enforcement operation involving Brazil, Spain, Interpol, ESET, and Caixa Bank revealed the disruption of a malware operation. The malware had …

Read More »

New “Antidot” Banking Trojan disguised Fake Google Play Updates

trojan

The “Antidot” Android Banking Trojan pretends to be a Google Play update app and targets Android users in different regions. It uses VNC and overlay techniques to steal credentials. Cyble Research and Intelligence Labs (CRIL) found that the new Android Banking Trojan, called “Antidot,” pretends to be a Google Play …

Read More »

CISA Published Encrypted DNS Implementation Guidance

CISA

CISA published a guide on using Encrypted Domain Name System (DNS) for federal civilian agencies to improve cybersecurity and meet OMB Memorandum M-22-09 requirements. Traditionally, the DNS protocol didn’t have ways to make sure requests and responses were confidential, secure, or authentic. However, the M-22-09 guideline requires agencies to encrypt …

Read More »

Cyble Research
Transparent Tribe & SideCopy: A Cyber Alliance Targeting India

Flag

Cyble Research and Intelligence Labs found that two cyber threat groups, Transparent Tribe (APT36) and SideCopy, are using advanced strategies to target India, putting both public and private sectors at risk. Cyble Research and Intelligence Labs (CRIL) found that two APT groups, Transparent Tribe (APT36) and SideCopy, are using advanced …

Read More »

ALERT
CISA Releases Four Industrial Control Systems Advisories

ics

On Tuesday (May 14), CISA released four Industrial Control Systems (ICS) advisories which provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-135-01 Rockwell Automation FactoryTalk Remote Access ICSA-24-135-02 SUBNET PowerSYSTEM Center ICSA-24-135-03 Johnson Controls Software House C-CURE 9000 ICSA-24-135-04 Mitsubishi Electric Multiple FA Engineering Software Products …

Read More »

Cyber Attack On Data Center Cooling Systems results disruption

data center

According to cybersecurity analysts at Dragos, while cloud adoption offers many benefits for industrial companies , it also poses certain risks. The core operational risks relate to interruptions in data center cooling systems. Data centers use building automation and management systems (BAS/BMS) to control important aspects like temperature. Places like …

Read More »