Wednesday , January 8 2025

TimeLine Layout

July, 2024

  • 2 July

    Brain Cipher Ransomware to Release Decryption Keys free for Indonesia

    statement

    The Brain Cipher ransomware group to release the decryption keys for Indonesia Terkoneksi on Wednesday. They said their attack aims to highlight the need for funding the industry and hiring skilled experts. They clarified that the attack is not politically motivated, but rather a penetration test that requires payment afterwards. …

    Read More »
  • 2 July

    0-click Account Takeover via Google Authentication

    laptop

    “A critical vulnerability has been identified in the Google Authentication mechanism of the application. By manipulating the ID and email parameters in the authentication request, an attacker can obtain an access token for any user. This allows the attacker to take over any account without any user interaction, leading to …

    Read More »
  • 2 July

    multiple vulnerabilities found in apache HTTP server

    apache

    The Apache Software Foundation has found multiple security issues in the widely used Apache HTTP Server. These vulnerabilities could lead to denial-of-service attacks, remote code execution, and unauthorized access, putting many websites at risk of cyberattacks. CVE-2024-36387 to CVE-2024-39573 are vulnerabilities in Apache HTTP Server’s components like mod_proxy, mod_rewrite, and …

    Read More »
  • 2 July

    Australian four major banks raised alarm on cyber ‘warfare’

    banks logo

    An executive from National Australia Bank reveals that the four major banks in the country face continuous attacks, as threat actors launch numerous attacks every minute, around the clock. According to Chris Sheehan, National Australia Bank’s executive for group investigations, all banks are constantly being targeted by attacks. The purpose …

    Read More »
  • 1 July

    CVE-2024-20399: Cisco NX-OS Vulnerability Under active Attack

    CISCO

    There is a security flaw (CVE-2024-20399) in Cisco NX-OS Software that lets an attacker with local access execute commands as root on the affected device. The vulnerability is caused by not properly checking the arguments used in certain configuration CLI commands. An attacker can take advantage of this vulnerability by …

    Read More »
  • 1 July

    NCSA to do maximum work with limited manpower: DG Kamruzzaman

    Photo of seminar

    Despite the limited manpower and various limitations, efforts are being made to keep the country’s cyber space safe, said the Director General of the National Cyber ​​Security Agency (NCSA), Abu Sayed Md. Kamruzzaman. He gave this information at a seminar titled “Use of Safe Internet and Prevention of Rumors and …

    Read More »

June, 2024

  • 30 June

    Microsoft Issues CVE Numbers for Cloud Service Vulnerabilities

    Microsoft

    Microsoft will assign Common Vulnerabilities and Exposures (CVE) numbers to important vulnerabilities found and fixed in their cloud services. This improves transparency and security by publicly disclosing vulnerabilities that can be fixed without user intervention. Microsoft’s decision to assign CVE numbers to cloud service vulnerabilities, regardless of whether customer action …

    Read More »
  • 30 June

    Ransomware detail behind Indonesia’s data center breach

    computer lab

    Indonesia’s temporary National Data Center (PDN) was attacked by ransomware last Thursday, leading to delays in airport immigration services and new student registration. The hackers are asking for an $8 million ransom, about Rp 131 billion, to give back the stolen data. The ransomware used in this incident is “Brain …

    Read More »
  • 29 June

    MerkSpy Exploits Microsoft Office Vulnerability: FortiGuard report

    diagram

    FortiGuard Labs found an attack that uses the CVE-2021-40444 vulnerability in Microsoft Office. This flaw lets attackers run harmful code through specific documents. The attack deployed a spyware called “MerkSpy” which secretly watches user activities, collects sensitive information, and stays on compromised systems. The attack starts with a harmless-looking Microsoft …

    Read More »
  • 29 June

    Google Blocking Entrust Certificates in Chrome in November 2024

    entrust

    Starting November 1, 2024, Google will block websites that use certificates from Entrust. Google made this decision because Entrust has not been able to handle security issues promptly and has not complied with their requirements. “Over the past several years, publicly disclosed incident reports highlighted a pattern of concerning behaviors …

    Read More »

This will close in 6 seconds