Sunday , January 5 2025

TimeLine Layout

August, 2024

  • 8 August

    0.0.0.0 Day: Exploiting Localhost APIs From the Browser

    0000 day

    A recent study found a vulnerability in major internet browsers that has existed for 18 years. This vulnerability makes private and corporate networks open to cyberattacks. Researchers from Oligo Security discovered that hackers can take advantage of how browsers handle requests to the IP address 0.0.0.0 by redirecting them to …

    Read More »
  • 8 August

    CISA, FBI released joint advisory for Blacksuit ransomware

    blacksuit

    The FBI and CISA updated their advisory to confirm that the Royal ransomware group now goes by the name “BlackSuit” and still demands very high ransom amounts, up to $60 million. The advisory has new technical information to help defenders detect the activity of the group, known as Royal ransomware …

    Read More »
  • 8 August

    DATA CENTER ALERT: AMD Patches Security Flaws in EPYC Processors

    ryzen

    AMD has released a security bulletin about three possible vulnerabilities in its Secure Encrypted Virtualization – Secure Nested Paging (SEV-SNP) technology. A researcher found vulnerabilities that could let a malicious hypervisor controlled by the host system access or modify the memory of a guest VM. This poses big risks to …

    Read More »
  • 8 August

    Researchers detect 30 new ransomware in July

    ransomware

    Cybersecurity experts found 30 new types of ransomware in July. These harmful programs are a big threat to people and businesses. Each new variant makes it harder to detect and stop them. Ransomware works by locking important data on infected computers and then asking for a lot of money in …

    Read More »
  • 7 August

    CrowdStrike publish Root Cause of Global System Outages

    crowdstrike

    CrowdStrike, a cybersecurity company, has released its analysis on the Falcon Sensor software update crash that affected millions of Windows devices worldwide. The “Channel File 291” incident was traced back to a content validation issue. This issue came up when a new Template Type was introduced. The purpose of this …

    Read More »
  • 7 August

    Microsoft 365 anti-phishing protection can be bypassed with CSS

    microsoft

    Researchers found a way to get around a security measure in Microsoft 365, making it more likely for users to open harmful emails. Outlook has a hidden anti-phishing measure called the ‘First Contact Safety Tip.’ It warns recipients when they receive an email from an unfamiliar address. Outlook displays an …

    Read More »
  • 7 August

    Interim government to decide on resignation of top officials: Bangladesh Bank

    bd bank

    In the changed reality, Bangladesh Bank employees demanded the resignation of the top officials of the bank, the interim government will decide. These persons were appointed on contractual basis by the recently resigned government. As a result, any new government will have to decide about them. Apart from this, Bangladesh …

    Read More »
  • 7 August

    Bangladesh Bank Deputy Governor resigned

    saidur

    Bangladesh Bank Deputy Governor Kazi Saidur Rahman resigned on the second day of opening office after the fall of the Sheikh Hasina government. On Wednesday (August 7) ​​he resigned handing over the responsibility to Executive Director-1. Kazi Saidur Rahman became the Deputy Governor of Bangladesh Bank on 22 November 2020. …

    Read More »
  • 7 August

    Google says new Android Zero-day vulnerability was exploited

    google

    Google has patched a “high-severity” vulnerability that may be “under limited, targeted exploitation” in Android devices. Google issued an advisory stating that the bug, known as CVE-2024-36971, affects the Linux kernel. This kernel is a crucial part of an operating system, connecting the software to the computer’s hardware. According to …

    Read More »
  • 6 August

    Critical Vulnerability in Apache OFBiz Requires Patching

    apache

    The Mirai botnet is exploiting a new directory traversal vulnerability in Apache OFBiz. This Java framework is supported by the Apache Foundation. It is used to create ERP (Enterprise Resource Planning) applications that manage sensitive business data. Despite being less common than commercial alternatives, ERP applications are crucial for businesses. Vulnerability …

    Read More »

This will close in 6 seconds