The NSA released an information sheet called “Advancing Zero Trust Maturity Throughout the Application and Workload Pillar.” This sheet will help organizations protect their applications from unauthorized users and maintain constant visibility of their workload. This CSI gives recommendations for achieving different levels of application and workload capabilities under the …
Read More »Ivanti Patches Critical RCE Flaws in Endpoint Manager
Ivanti on Tuesday declare to patch for several products, including fixes for critical vulnerabilities in Endpoint Manager (EPM). Ivanti resolved six out of the ten security defects resolved in EPM are critical-severity SQL Injection bugs. Tracked as CVE-2024-29822 through CVE-2024-29827, the bugs impact the Core server of Ivanti EPM 2022 …
Read More »Banking trojan Grandoreiro targeting about 1,500 banks over 60 countries
The banking trojan “Grandoreiro” is spreading widely through a phishing campaign in over 60 countries, aiming at customer accounts of about 1,500 banks. In January 2024, a joint international law enforcement operation involving Brazil, Spain, Interpol, ESET, and Caixa Bank revealed the disruption of a malware operation. The malware had …
Read More »New “Antidot” Banking Trojan disguised Fake Google Play Updates
The “Antidot” Android Banking Trojan pretends to be a Google Play update app and targets Android users in different regions. It uses VNC and overlay techniques to steal credentials. Cyble Research and Intelligence Labs (CRIL) found that the new Android Banking Trojan, called “Antidot,” pretends to be a Google Play …
Read More »CISA Published Encrypted DNS Implementation Guidance
CISA published a guide on using Encrypted Domain Name System (DNS) for federal civilian agencies to improve cybersecurity and meet OMB Memorandum M-22-09 requirements. Traditionally, the DNS protocol didn’t have ways to make sure requests and responses were confidential, secure, or authentic. However, the M-22-09 guideline requires agencies to encrypt …
Read More »
Cyble Research
Transparent Tribe & SideCopy: A Cyber Alliance Targeting India
Cyble Research and Intelligence Labs found that two cyber threat groups, Transparent Tribe (APT36) and SideCopy, are using advanced strategies to target India, putting both public and private sectors at risk. Cyble Research and Intelligence Labs (CRIL) found that two APT groups, Transparent Tribe (APT36) and SideCopy, are using advanced …
Read More »FBI seized BreachForums, including telegram channel
FBI has seized hacking forum “BreachForums” popularly known as a Breached hacking forum in the underground market on Wednesday morning for the second time in a year, soon after the site was used last week to leak data stolen from a Europol law enforcement portal. Now the site displays a …
Read More »
ALERT
CISA Releases Four Industrial Control Systems Advisories
On Tuesday (May 14), CISA released four Industrial Control Systems (ICS) advisories which provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-135-01 Rockwell Automation FactoryTalk Remote Access ICSA-24-135-02 SUBNET PowerSYSTEM Center ICSA-24-135-03 Johnson Controls Software House C-CURE 9000 ICSA-24-135-04 Mitsubishi Electric Multiple FA Engineering Software Products …
Read More »
Fortinet report
Attackers exploiting vulnerabilities 50% faster, just 4.76 days
Fortinet reported that in the second half of 2023, the average time form the disclosure of a vulnerability to its active exploitation in the wild decreased to just 4.76 days a 43% reduction compared to the 1st half of the year. Fortinet’s 2H Global landscape report indicate that hackers to …
Read More »Cyber Attack On Data Center Cooling Systems results disruption
According to cybersecurity analysts at Dragos, while cloud adoption offers many benefits for industrial companies , it also poses certain risks. The core operational risks relate to interruptions in data center cooling systems. Data centers use building automation and management systems (BAS/BMS) to control important aspects like temperature. Places like …
Read More »