Artikel Internet-Sicherheit Technologie

Hacker missbrauchten OAuth-Apps von Microsoft, um E-Mail-Konten von Unternehmen zu knacken

Am Dienstag gab Microsoft bekannt, dass es Maßnahmen ergriffen hat, um gefälschte Microsoft Partner Network (MPN)-Konten zu deaktivieren, die zum Erstellen schädlicher OAuth-Anwendungen im Rahmen einer Phishing-Kampagne verwendet wurden, die darauf abzielte, Cloud-Umgebungen von Unternehmen zu infiltrieren und E-Mails zu stehlen. Das IT-Unternehmen behauptete, dass die betrügerischen Akteure „Anwendungen erstellten, die anschließend […]

Weiterlesen
Artikel Internet-Sicherheit Technologie

Die britische Cyber-Agentur warnt vor russischen und iranischen Hackern, die auf Schlüsselindustrien abzielen

Am Donnerstag gab das britische National Cyber Security Centre (NCSC) eine Warnung vor Spear-Phishing-Angriffen heraus, die von staatlich geförderten Akteuren im Iran und in Russland durchgeführt wurden. SEABORGIUM (auch bekannt als Callisto, COLDRIVER und TA446) und APT42 wurden von der Agentur für die Einbrüche verantwortlich gemacht (alias ITG18, TA453 und Yellow Garuda). Trotz der Parallelen in der Art und Weise, wie die […]

Weiterlesen
Artikel Internet-Sicherheit Technologie

Über 4.500 Worldpress-Websites wurden gehackt, um Besucher auf lückenhafte Anzeigenseiten umzuleiten

Eine massive Kampagne hat im Rahmen einer laufenden Operation, von der angenommen wird, dass sie seit 2017 aktiv ist, mehr als 4.500 WordPress-Websites infiziert. Laut dem Eigentümer von Godadddy, Sucuri, beinhalten die Infektionen die Injektion eines JavaScripts, das auf der Domain namens „track[.] gehostet wird. violetlovelines[.]com, das entwickelt wurde, um Besucher auf einige unerwünschte Websites umzuleiten. Das Neueste […]

Weiterlesen
Artikel Internet-Sicherheit Technologie

Chinesische Hacker verwenden Golang-Malware bei Dragon-Spark-Angriffen

Organizations in East Asia are targeted by likely Chinese-speaking actor dubbed DragonSpark while employing uncommon tactics to go past security layers. Chinese hackers utilize malware and attacks are characterized by use of open source SparkRAT and malware which attempts to evade detection through a Golang source code interpretation. A striking aspect of the intrusions is […]

Weiterlesen
Artikel Internet-Sicherheit Technologie

Emotet Malware Makes a Comeback with New Evasion Technique

The Emotet malware operation has continued to refine its tactics in a effort to fly under the radar while acting as a conduit for other dangerous malware such as Bumblebee and IcedID. Emotet which is officially reemerged in late 2021 after which a coordinated takedown of its infrastructure by authorities earlier that year which has […]

Weiterlesen
Artikel Internet-Sicherheit Technologie

Apple issues Update for older Devices

Apple has fixes for a recently disclosed critical security flaw that is affecting older devices which is reciting evidence of active exploitation. The issue which is tracked as CVE-2022-42856 and is a type confusion vulnerability in the WebKit browser engine that could result in arbitrary code execution when processing maliciously crafted web content. While it […]

Weiterlesen
Artikel Internet-Sicherheit Technologie

Samsung Galaxy Store App Vulnerable to Sneaky App Install

Two security flaws has disclosed in Samsung’s Galaxy Store app for Android that are exploited by a local attacker to install arbitrary apps to fraudulent landing pages on the web. The issues that tracked as CVE-2023-21433 and CVE-2023-21434, were discovered by NCC Group which is notified to the South Korean chaebol in November and December […]

Weiterlesen
Internet-Sicherheit Technologie

Chinese Hackers Exploited Recent Fortinet Flaw

Suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day in attacks which are targeting a European government entity and a managed service provider (MSP)that is located in Africa. Telemetry evidence gathered by Google-owned Mandiant indicates that the exploitation is occurred as early as October 2022which is at least […]

Weiterlesen
Artikel Technologie

The Most Awaited ChatGPT API by OpenAI set to Release Soon – A Game Changer in AI-Powered Language Generation

OpenAI, the leading AI research organization, is soon set to release the much-awaited ChatGPT API. This powerful language model is trained on a massive dataset of internet text and can generate natural-sounding text in a variety of styles and formats. With the ability to understand context, ChatGPT can generate text that is relevant to a given topic or conversation. The release of the API will make it easy for developers and businesses to integrate the model into their own systems and applications, unlocking the potential for a range of applications such as chatbots, automated customer service, and content creation. Get ready to experience the advancements in AI-powered language generation with OpenAI’s ChatGPT API.

Weiterlesen
Artikel Technologie

Manufacturing Workflow in ERPNEXT

Manufacturing workflow in ERPNEXT involve series of things which are important for manufacturing a product. It involves creating new item,then add details of customer , supplier of rawmaterials,creating bills of material ,production plan,sales and order and purchase order for item and then add rate for delivery so that manufacturing product can be ready for delivering […]

Weiterlesen