TechPosts filtered by tags: Ravie Lakshmanan[x]
A $50,000 Bug Could've Allowed Hackers Access Any Microsoft Account13h ago ( March 3, 2021 at 5:17 AM ) Microsoft has awarded an independent security researcher $50,000 as part of its bug bounty program for reporting a flaw that could have allowed a malicious actor to hijack users' accounts without their knowledge.
Reported by Laxman Muthiyah, the vulnerability aims to brute-force the seven-digit security code that's sent to a user's email address or mobile number to corroborate his (or her) [Author: [email protected] (Ravie Lakshmanan)]Tags: Microsoft, Tech, Ravie Lakshmanan, Laxman Muthiyah 18 people like this. Like URGENT — 4 Actively Exploited 0-Day Flaws Found in Microsoft Exchange15h ago ( March 3, 2021 at 2:56 AM ) Microsoft has released emergency patches to address four previously undisclosed security flaws in Exchange Server that it says are being actively exploited by a new Chinese state-sponsored threat actor with the goal of perpetrating data theft.
Describing the attacks as "limited and targeted," Microsoft Threat Intelligence Center (MSTIC) said the adversary used these vulnerabilities to access [Author: [email protected] (Ravie Lakshmanan)]Tags: Microsoft, Tech, Microsoft Exchange, Microsoft Threat Intelligence Center MSTIC, Ravie Lakshmanan 3 people like this. Like New Chrome 0-day Bug Under Active Attacks – Update Your Browser ASAP!17h ago ( March 3, 2021 at 1:03 AM ) Exactly a month after patching an actively exploited zero-day flaw in Chrome, Google today rolled out fixes for yet another zero-day vulnerability in the world's most popular web browser that it says is being abused in the wild.
Chrome 89.0.4389.72, released by the search giant for Windows, Mac, and Linux on Tuesday, comes with a total of 47 security fixes, the most severe of which concerns an " [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Chrome Google, New Chrome, Ravie Lakshmanan 39 people like this. Like Researchers Unearth Links Between SunCrypt and QNAPCrypt RansomwareMarch 2, 2021 at 10:04 AM SunCrypt, a ransomware strain that went on to infect several targets last year, may be an updated version of the QNAPCrypt ransomware, which targeted Linux-based file storage systems, according to new research.
"While the two ransomware [families] are operated by distinct different threat actors on the dark web, there are strong technical connections in code reuse and techniques, linking the [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Ravie Lakshmanan 11 people like this. Like New 'unc0ver' Tool Can Jailbreak All iPhone Models Running iOS 11.0 - 14.3March 2, 2021 at 4:37 AM A popular jailbreaking tool called "unc0ver" has been updated to support iOS 14.3 and earlier releases, thereby making it possible to unlock almost every single iPhone model using a vulnerability that Apple in January disclosed was actively exploited in the wild.
The latest release, dubbed unc0ver v6.0.0, was released on Sunday, according to its lead developer Pwn20wnd, expanding its [Author: [email protected] (Ravie Lakshmanan)]Tags: Apple, Tech, Ravie Lakshmanan 2 people like this. Like SolarWinds Blames Intern for 'solarwinds123' Password LapseMarch 1, 2021 at 8:54 PM As cybersecurity researchers continue to piece together the sprawling SolarWinds supply chain attack, top executives of the Texas-based software services firm blamed an intern for a critical password lapse that went unnoticed for several years.
The said password "solarwinds123" was originally believed to have been publicly accessible via a GitHub repository since June 17, 2018, before the [Author: [email protected] (Ravie Lakshmanan)]Tags: Texas, Tech, Ravie Lakshmanan 46 people like this. Like Gootkit RAT Using SEO to Distribute Malware Through Compromised SitesMarch 1, 2021 at 9:18 AM A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware payloads.
"The Gootkit malware family has been around more than half a decade – a mature Trojan with functionality centered around banking credential theft," Sophos researchers Gabor Szappanos and Andrew Brandt said in a write-up published today.
"In recent years [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Trojan, Sophos, Andrew Brandt, Ravie Lakshmanan, Gabor Szappanos 21 people like this. Like SolarWinds Blames Intern for Weak Password That Led to Biggest Attack in 2020March 1, 2021 at 6:04 AM As cybersecurity researchers continue to piece together the sprawling SolarWinds supply chain attack, top executives of the Texas-based software services firm blamed an intern for a critical password lapse that went unnoticed for several years.
The said password "solarwinds123" was originally believed to have been publicly accessible via a GitHub repository since June 17, 2018, before the [Author: [email protected] (Ravie Lakshmanan)]Tags: Texas, Tech, Ravie Lakshmanan 36 people like this. Like Chinese Hackers Targeted India's Power Grid Amid Geopolitical TensionsMarch 1, 2021 at 5:11 AM Amid heightened border tensions between India and China, cybersecurity researchers have revealed a concerted campaign against India's critical infrastructure, including the nation's power grid, from Chinese state-sponsored groups.
The attacks, which coincided with the standoff between the two nations in May 2020, targeted a total of 12 organizations, 10 of which are in the power generation and [Author: [email protected] (Ravie Lakshmanan)]Tags: China, India, Tech, Ravie Lakshmanan 38 people like this. Like North Korean Hackers Targeting Defense Firms with ThreatNeedle MalwareFebruary 26, 2021 at 6:02 AM A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry.
Attributing the attacks with high confidence to the Lazarus Group, the new findings from Kaspersky signal an expansion of the APT actor's tactics by going beyond the usual gamut of financially-motivated [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Kaspersky, Lazarus Group, Ravie Lakshmanan ALERT: Malicious Amazon Alexa Skills Can Easily Bypass Vetting ProcessFebruary 26, 2021 at 5:40 AM Researchers have uncovered gaps in Amazon's skill vetting process for the Alexa voice assistant ecosystem that could allow a malicious actor to publish a deceptive skill under any arbitrary developer name and even make backend code changes after approval to trick users into giving up sensitive information.
The findings were presented on Wednesday at the Network and Distributed System Security [Author: [email protected] (Ravie Lakshmanan)]Tags: Amazon, Tech, Alexa, Ravie Lakshmanan, Malicious Amazon Alexa Skills 9 people like this. Like Cisco Releases Security Patches for Critical Flaws Affecting its ProductsFebruary 26, 2021 at 3:11 AM Cisco has addressed a maximum severity vulnerability in its Application Centric Infrastructure (ACI) Multi-Site Orchestrator (MSO) that could allow an unauthenticated, remote attacker to bypass authentication on vulnerable devices.
"An attacker could exploit this vulnerability by sending a crafted request to the affected API," the company said in an advisory published yesterday. "A successful [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Cisco, Ravie Lakshmanan, Cisco Releases Security Patches 34 people like this. Like Chinese Hackers Using Firefox Extension to Spy On Tibetan OrganizationsFebruary 25, 2021 at 11:35 AM Cybersecurity researchers today unwrapped a new campaign aimed at spying on vulnerable Tibetan communities globally by deploying a malicious Firefox extension on target systems.
"Threat actors aligned with the Chinese Communist Party's state interests delivered a customized malicious Mozilla Firefox browser extension that facilitated access and control of users' Gmail accounts," Proofpoint said [Author: [email protected] (Ravie Lakshmanan)]Tags: Firefox, Tech, Chinese communist party, Mozilla Firefox, Proofpoint, Ravie Lakshmanan 5 people like this. Like Russian Hackers Targeted Ukraine Authorities With Supply-Chain Malware AttackFebruary 25, 2021 at 4:13 AM Ukraine is formally pointing fingers at Russian hackers for hacking into one of its government systems and attempting to plant and distribute malicious documents that would install malware on target systems of public authorities.
"The purpose of the attack was the mass contamination of information resources of public authorities, as this system is used for the circulation of documents in most [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Ukraine, Ravie Lakshmanan 46 people like this. Like Online Trackers Increasingly Switching to Invasive CNAME Cloaking TechniqueFebruary 24, 2021 at 12:22 PM With browser makers steadily clamping down on third-party tracking, advertising technology companies are increasingly embracing a DNS technique to evade such defenses, thereby posing a threat to web security and privacy.
Called CNAME Cloaking, the practice of blurring the distinction between first-party and third-party cookies not only results in leaking sensitive private information without [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Ravie Lakshmanan 18 people like this. Like Experts Warns of Notable Increase in QuickBooks Data Files Theft AttacksFebruary 24, 2021 at 10:29 AM New research has uncovered a significant increase in QuickBooks file data theft using social engineering tricks to deliver malware and exploit the accounting software.
"A majority of the time, the attack involves basic malware that is often signed, making it hard to detect using antivirus or other threat detection software," researchers from ThreatLocker said in an analysis shared today with The [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, QuickBooks, Ravie Lakshmanan, ThreatLocker 46 people like this. Like Critical RCE Flaws Affect VMware ESXi and vSphere Client — Patch NowFebruary 24, 2021 at 2:58 AM VMware has addressed multiple critical remote code execution (RCE) vulnerabilities in VMware ESXi and vSphere Client virtual infrastructure management platform that may allow attackers to execute arbitrary commands and take control of affected systems.
"A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Vmware, Ravie Lakshmanan 20 people like this. Like Experts Find a Way to Learn What You're Typing During Video CallsFebruary 23, 2021 at 8:37 AM A new attack framework aims to infer keystrokes typed by a target user at the opposite end of a video conference call by simply leveraging the video feed to correlate observable body movements to the text being typed.
The research was undertaken by Mohd Sabra, and Murtuza Jadliwala from the University of Texas at San Antonio and Anindya Maiti from the University of Oklahoma, who say the attack [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, San Antonio, University of Texas, University of Oklahoma, Murtuza Jadliwala, Ravie Lakshmanan, Mohd Sabra, Anindya Maiti 38 people like this. Like Shadow Attacks Let Attackers Replace Content in Digitally Signed PDFsFebruary 23, 2021 at 5:46 AM Researchers have demonstrated a novel class of attacks that could allow a bad actor to potentially circumvent existing countermeasures and break the integrity protection of digitally signed PDF documents.
Called "Shadow attacks" by academics from Ruhr-University Bochum, the technique uses the "enormous flexibility provided by the PDF specification so that shadow documents remain [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Ruhr University Bochum, Ravie Lakshmanan 47 people like this. Like Hackers Exploit Accellion Zero-Days in Recent Data Theft and Extortion AttacksFebruary 23, 2021 at 3:26 AM Cybersecurity researchers on Monday tied a string of attacks targeting Accellion File Transfer Appliance (FTA) servers over the past two months to data theft and extortion campaign orchestrated by a cybercrime group called UNC2546.
The attacks, which began in mid-December 2020, involved exploiting multiple zero-day vulnerabilities in the legacy FTA software to install a new web shell named [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, FTA, Ravie Lakshmanan Chinese Hackers Had Access to a U.S. Hacking Tool Years Before It Was Leaked OnlineFebruary 22, 2021 at 6:15 AM On August 13, 2016, a hacking unit calling itself "The Shadow Brokers" announced that it had stolen malware tools and exploits used by the Equation Group, a sophisticated threat actor believed to be affiliated to the Tailored Access Operations (TAO) unit of the U.S. National Security Agency (NSA).
Although the group has since signed off following the unprecedented disclosures, new "conclusive" [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Tailored Access Operations TAO, U S National Security Agency NSA, Equation Group, The Shadow Brokers, Ravie Lakshmanan 19 people like this. Like New 'Silver Sparrow' Malware Infected Nearly 30,000 Apple MacsFebruary 22, 2021 at 5:38 AM Days after the first malware targeting Apple M1 chips was discovered in the wild, researchers have disclosed yet another previously undetected piece of malicious software that was found in about 30,000 Macs running Intel x86_64 and the iPhone maker's M1 processors.
However, the ultimate goal of the operation remains something of a conundrum, what with the lack of a next-stage or final payload [Author: [email protected] (Ravie Lakshmanan)]Tags: Apple, Tech, Intel, Ravie Lakshmanan 12 people like this. Like Privacy Bug in Brave Browser Exposes Dark-Web Browsing History of Its UsersFebruary 20, 2021 at 11:16 AM Brave has fixed a privacy issue in its browser that sent queries for .onion domains to public internet DNS resolvers rather than routing them through Tor nodes, thus exposing users' visits to dark web websites.
The bug was addressed in a hotfix release (V1.20.108) made available yesterday.
Brave ships with a built-in feature called "Private Window with Tor" that integrates the Tor anonymity [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Ravie Lakshmanan 26 people like this. Like New Hack Lets Attackers Bypass MasterCard PIN by Using Them As Visa CardFebruary 19, 2021 at 10:28 AM Cybersecurity researchers have disclosed a novel attack that could allow criminals to trick a point of sale terminal into transacting with a victim's Mastercard contactless card while believing it to be a Visa card.
The research, published by a group of academics from the ETH Zurich, builds on a study detailed last September that delved into a PIN bypass attack, permitting bad actors to leverage [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Mastercard, Eth Zurich, Ravie Lakshmanan 22 people like this. Like Masslogger Trojan Upgraded to Steal All Your Outlook, Chrome CredentialsFebruary 19, 2021 at 4:18 AM A credential stealer infamous for targeting Windows systems has resurfaced in a new phishing campaign that aims to steal credentials from Microsoft Outlook, Google Chrome, and instant messenger apps.
Primarily directed against users in Turkey, Latvia, and Italy starting mid-January, the attacks involve the use of MassLogger — a .NET-based malware with capabilities to hinder static analysis — [Author: [email protected] (Ravie Lakshmanan)]Tags: Microsoft, Tech, Italy, Ravie Lakshmanan, Turkey Latvia 17 people like this. Like SolarWinds Hackers Stole Some Source Code for Microsoft Azure, Exchange, IntuneFebruary 19, 2021 at 2:27 AM Microsoft on Thursday said it concluded its probe into the SolarWinds hack, finding that the attackers stole some source code but confirmed there's no evidence that they abused its internal systems to target other companies or gained access to production services or customer data.
The disclosure builds upon an earlier update on December 31, 2020, that uncovered a compromise of its own network to [Author: [email protected] (Ravie Lakshmanan)]Tags: Microsoft, Tech, Ravie Lakshmanan, Microsoft Azure Exchange Intune 34 people like this. Like First Malware Designed for Apple M1 Chip Discovered in the WildFebruary 18, 2021 at 5:20 AM One of the first malware samples tailored to run natively on Apple's M1 chips has been discovered, suggesting a new development that indicates that bad actors have begun adapting malicious software to target the company's latest generation of Macs powered by its own processors.
While the transition to Apple silicon has necessitated developers to build new versions of their apps to ensure better [Author: [email protected] (Ravie Lakshmanan)]Tags: Apple, Tech, Ravie Lakshmanan 37 people like this. Like U.S. Charges 3 North Korean Hackers Over $1.3 Billion Cryptocurrency HeistFebruary 18, 2021 at 3:24 AM The U.S. Department of Justice (DoJ) on Wednesday indicted three suspected North Korean hackers for allegedly conspiring to steal and extort over $1.3 billion in cash and cryptocurrencies from financial institutions and businesses.
The three defendants — Jon Chang Hyok, 31; Kim Il, 27; and Park Jin Hyok, 36 — are said to be members of the Reconnaissance General Bureau, a military intelligence [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Kim Il, U S Department of Justice DOJ, Reconnaissance General Bureau, Park Jin Hyok, Ravie Lakshmanan, Jon Chang Hyok 7 people like this. Like Agora SDK Bug Left Several Video Calling Apps Vulnerable to SnoopingFebruary 17, 2021 at 8:29 AM A severe security vulnerability in a popular video calling software development kit (SDK) could have allowed an attacker to spy on ongoing private video and audio calls.
That's according to new research published by the McAfee Advanced Threat Research (ATR) team today, which found the aforementioned flaw in Agora.io's SDK used by several social apps such as eHarmony, Plenty of Fish, MeetMe, and [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Sdk, Ravie Lakshmanan, McAfee Advanced Threat Research ATR 21 people like this. Like Researchers Unmask Hackers Behind APOMacroSploit Malware BuilderFebruary 17, 2021 at 7:02 AM Cybersecurity researchers have disclosed a new kind of Office malware distributed as part of a malicious email campaign that targeted more than 80 customers worldwide in an attempt to control victim machines and steal information remotely.
The tool — dubbed "APOMacroSploit" — is a macro exploit generator that allows the user to create an Excel document capable of bypassing antivirus software, [Author: [email protected] (Ravie Lakshmanan)]Tags: Tech, Ravie Lakshmanan 2 people like this. Like |
Filters Microsoft show more filters Italy Facetime Texas Russia Sophos Florida China Europol India ESET Cisco SonicWall Ukraine Sap U S National Security Agency NSA SOLMAN Intel Microsoft Exchange Lazarus Group Proofpoint Mohd Sabra Eth Zurich Sdk Kashmir Mojave Isis Facebook Vimeo Video Downloader Instagram Microsoft Threat Intelligence Center MSTIC Amazon |
|
|
|