NTLM Credential Theft Risk in Python Apps Threaten Windows Security
26
Aug
2024

NTLM Credential Theft Risk in Python Apps Threaten Windows Security

New research reveals critical vulnerabilities in Python applications for Windows including Snowflake, Gradio, Jupyter, and Streamlit that could allow hackers…

MLOps Platforms
26
Aug
2024

Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms

Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain following the discovery of…

BlackSuit Ransomware Timeline
26
Aug
2024

BlackSuit Ransomware Deployed After 15 Days From Initial Access

Threat actors successfully deployed BlackSuit ransomware after maintaining access to a compromised network for 15 days. The intrusion, which began…

INE Security Launches Initiatives to Invest in the Education of Aspiring Cybersecurity Professionals
26
Aug
2024

Russian National Arrested for Laundering Crypto Payments

Argentine authorities have arrested a Russian national accused of laundering cryptocurrency payments linked to the notorious North Korean Lazarus Group….

Traccar GPS System Vulnerability Let Attackers Execute Remote Code
26
Aug
2024

Traccar GPS System Vulnerability-Attackers Execute Remote Code

Two critical vulnerabilities have been discovered in the Traccar GPS. These vulnerabilities, CVE-2024-31214 and CVE-2024-24809, allow unauthenticated attackers to execute…

Obfuscation Techniques to Evade Anti-Virus
26
Aug
2024

New Malware Employs Crazy Obfuscation Techniques to Evade Anti-Virus Detection

Security researchers have recently identified a new malware strain that employs advanced obfuscation techniques to evade detection by antivirus software….

A cyberattack impacted operations at the Port of Seattle and Sea-Tac Airport
26
Aug
2024

A cyberattack impacted operations at the Port of Seattle and Sea-Tac Airport

A cyberattack impacted operations at the Port of Seattle and Sea-Tac Airport Pierluigi Paganini August 26, 2024 A cyber attack…

D(HE)at Attack
26
Aug
2024

D(HE)at Attack – Attackers Exploit20-years-old Diffie-Hellman Protocol To Over-Heat Your CPU

Researchers uncovered a new type of denial-of-service (DoS) attack, known as the D(HE)at attack, exploits the computational demands of the…

Iranian Hackers Attacking Global Political Figures on WhatsApp
26
Aug
2024

Iranian Hackers Attacking Global Political Figures on WhatsApp

WhatsApp’s security teams have identified and blocked a cluster of malicious activities originating from Iran. The targeted campaign, linked to…

week in security
26
Aug
2024

A week in security (August 19 – August 25)

August 23, 2024 – Facebook scammers are posting links to fake funeral live streams to get victims to sign up…

Traccar GPS System
26
Aug
2024

Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

Aug 26, 2024Ravie LakshmananSoftware Security / Vulnerability Two security vulnerabilities have been disclosed in the open-source Traccar GPS tracking system…

Linux malware sedexp uses udev rules for persistence and evasion
26
Aug
2024

Linux malware sedexp uses udev rules for persistence and evasion

Linux malware sedexp uses udev rules for persistence and evasion Pierluigi Paganini August 26, 2024 Researchers spotted a new stealthy…