admin

Feb 01, 2024NewsroomCryptojacking / Linux Security Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking campaign called Commando Cat. “The campaign deploys a benign container generated using the Commando project,” Cado security researchers Nate Bill and Matt Muir said in a new report published today. “The attacker escapes this container
0 Comments
AI-related companies lost $190 billion (roughly Rs. 15,77,620 crore) in stock market value late on Tuesday after Microsoft, Alphabet and Advanced Micro Devices delivered quarterly results that failed to impress investors who had sent their stocks soaring. The selloff following the tech giants’ reports after the bell underscored investors’ elevated expectations following an AI-fueled stock market rally
0 Comments
PlayStation hosted the year’s first State of Play games showcase early Thursday, bringing a host of new announcements, reveals and updates on upcoming releases. Sony presented a deep dive into two of its first-party titles, with extended gameplay trailers for Rise of the Ronin and Stellar Blade. The latter also finally received a release date
0 Comments
Feb 01, 2024NewsroomCyber Attack / Botnet The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an already compromised network. “The vulnerability is exploited in a brute-force manner that attempts to target as many vulnerable Java applications
0 Comments
Feb 01, 2024NewsroomNetwork Security / Malware Google-owned Mandiant said it identified new malware employed by a China-nexus espionage threat actor known as UNC5221 and other threat groups during post-exploitation activity targeting Ivanti Connect Secure VPN and Policy Secure devices. This includes custom web shells such as BUSHWALK, CHAINLINE, FRAMESTING, and a variant of LIGHTWIRE. “CHAINLINE
0 Comments
The Reserve Bank of India on Wednesday restricted Paytm Payments Bank Ltd from taking fresh deposits and credit transactions across its services, due to non-compliance of regulations and supervisory concerns. An audit report revealed “persistent non-compliances and continued material supervisory concerns in the bank, warranting further supervisory action,” the central bank said in a release.
0 Comments
Jan 31, 2024NewsroomSoftware Security / Linux Multiple security vulnerabilities have been disclosed in the runC command line tool that could be exploited by threat actors to escape the bounds of the container and stage follow-on attacks. The vulnerabilities, tracked as CVE-2024-21626, CVE-2024-23651, CVE-2024-23652, and CVE-2024-23653, have been collectively dubbed Leaky Vessels by cybersecurity vendor Snyk.
0 Comments