サイバーセキュリティ

Indian Government Employees is the next target campaign of a new malware

The new malware campaign’s next target are the Indian Government Employees The Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with trojanized versions of a two-factor authentication solution called Kavach. Zscaler ThreatLabz researcher Sudeep Singh said in a Thursday analysis that the group abuses Google advertisements for the purpose of malvertising to distribute backdoored versions of Kavach multi-authentication (MFA) applications The cybersecurity company said that low-volume credential harvesting attacks have also been conducted by the threat group. Rogue websites masquerading as official Indian government websites were set up to lure unwitting users into entering their passwords. Transparent Tribe, also known by the monikers APT36, Operation […]

続きを読む
サイバーセキュリティ

RomCom RAT is being distributed by hackers Using Rogue Versions of KeePass and SolarWinds Software

With the use of rogue versions of software such as SolarWinds Network Performance Monitor, KeePass password manager, and PDF Reader Pro, the operators of RomCom RAT are continuing to evolve their campaigns. Targets of the operation consist of victims in Ukraine and select English-speaking countries like the U.K. “Given the geography of the targets and the current geopolitical situation, it’s unlikely that the hackers like RomCom RAT threat actor is cybercrime-motivated,” the BlackBerry Threat Research and Intelligence Team said in a new analysis. The Canadian cybersecurity company disclosed a spear-phishing campaign aimed at Ukrainian entities to deploy a remote access trojan called RomCom RAT and after a week of the […]

続きを読む
サイバーセキュリティ

Huawei Malaysia awarded for 5G cybersecurity development contribution

The award is presented to honor Huawei’s endless contribution towards the country’s digital transformation and 5G cybersecurity development. Huawei Technologies (Malaysia) Sdn Bhd (Huawei Malaysia) received the Special Award in recognition of the company’s endless contribution to 5G Cybersecurity Development in Malaysia at the 13th Cyber Security Malaysia Awards, Conference & Exhibition (CSM-ACE) 2022 organised by CyberSecurity Malaysia. Since the past 21 years,Huawei has been exploring new opportunities for information and communications technology by collaborating with numerous telecommunications operators. The award is a testament to Huawei’s contribution towards the country’s digital transformation and 5G cybersecurity development. In March 2021, My5G, Southeast Asia’s first-of-its-kind 5G Cyber Security Test Lab, was set […]

続きを読む
サイバーセキュリティ

U.S. FCC commissioner visits Taiwan to discuss cybersecurity, telecoms

Carr is the latest senior official from the United States to visit Taiwan and the first FCC commissioner to visit. U.S. Federal Communications Commissioner Brendan Carr is in Taipei this week for meetings on 5G, cybersecurity and telecoms to show U.S. support for Taiwan. Carr is the latest senior official from the United States to visit the island and the first FCC commissioner to visit. “Everything that we can do as Americans to show support and that we are allied with Taiwan – whether it’s big things or in the case of me a very small thing – everything matters to China’s calculus,” Carr told Reuters in a telephone interview.He […]

続きを読む
サイバーセキュリティ

Top 7 technology innovations and trends in cybersecurity

With the increase in cyberattacks, several top cybersecurity innovations have been gifted by technology October has got both Halloween day and Cybersecurity Awareness month. It’s not a coincidence that both the spooky events fall on the same month. Well, if the ghosts of Halloween are not scary enough, stats showcasing the surge in sophisticated and lethal cyber threats will definitely do the trick. Today is the day of digital world. Data is more valuable than cash, atm cards etc. From conducting day-to-day operations to planning future strategies, data has become the currency of an intelligent enterprise. As the value and business-criticality of data increase, the challenges of protecting it gets […]

続きを読む
サイバーセキュリティ

Chinese Hackers Using New Stealthy Infection Chain to Deploy LODEINFO Malware

Chinese state-sponsored threat actor targets media, diplomatic, governmental and public sector organizations and think-tanks in Japan Stone Panda which is the Chinese state-sponsored threat actor, has been observed employing a new stealthy infection chain in its attacks aimed at Japanese entities. Targets include media, diplomatic, governmental and public sector organizations and think-tanks in Japan, according to twin reports published by Kaspersky. Stone Panda, also called APT10, Bronze Riverside, Cicada, and Potassium, is a cyber espionage group known for its intrusions against organizations identified as strategically significant to China. The threat actor is believed to have been active since at least 2009. The latest set of attacks was observed between March […]

続きを読む
サイバーセキュリティ

Decoding Quad’s agenda and focus on cybersecurity

In late-September, Quad foreign ministers released a joint statement on cyberattacks . Can Quad prevent increasing cyberattacks in the Indo-Pacific? In June, Quad unveiled an expanded agenda where Australia, India, Japan and the United States (US) could cooperate on issues such as the climate crisis, health, and critical technologies. In late-September, Quad foreign ministers released a joint statement on cyberattacks that represents a significant development to tackle the rising spate of online threats. A question rose among everyone that if Quad could prevent increasing cyberattacks in the Indo-Pacific. It’s important to first understand Quad’s focus. The joint statement on ransomware targets malicious cyber activities from China, Russia, and Iran that […]

続きを読む
サイバーセキュリティ

Microsoft expands CyberShikshaa; to provide cybersecurity training to 45,000; 10,000 jobs.

Microsoft has announced the expansion of its CyberShikshaa program. CyberShikshaa program launched by Microsoft and DSCI in 2018 claims to have trained 1,100 women and employed more than 800 women through multiple training batches. More than 5,000 underserved youth have also been trained in Cybersecurity Beginners modules. CyberShikshaa for Educators with ICT Academy, the latest addition to the CyberShikshaa portfolio launched in June 2022 for providing cybersecurity training to 400 faculty members, will help build cybersecurity careers for 6,000 underserved students across 100 rural technical institutions and facilitate job opportunities for over 1,500 students. Recently Microsoft announced the expansion of its CyberShikshaa program in association with the Data Security Council […]

続きを読む
サイバーセキュリティ

Unofficial Patch Released for New Actively Exploited Windows MotW Vulnerability

An unofficial patch has been made available for an actively exploited security flaw in Microsoft Windows The newly released patch makes it possible for files signed with malformed signatures to sneak past Mark-of-the-Web (MotW) protections. A week ago,d HP Wolf Security disclosed a Magniber ransomware campaign that targets users with fake security updates which employ a JavaScript file to proliferate the file-encrypting malware. After the disclosure of Magniber was done,the fix was released by 0patch. While files downloaded from the internet in Windows are tagged with a MotW flag to prevent unauthorized actions, it has since been found that corrupt Authenticode signatures can be used to allow the execution of […]

続きを読む
サイバーセキュリティ

Fodcha DDoS Botnet Resurfaces with New Capabilities

The threat actor behind the Fodcha distributed denial-of-service botnet has reemerged with new capabilities. This includes changes to its communication protocol and the ability to extort cryptocurrency payments in exchange for stopping the DDoS attack against a target, Qihoo 360’s Network Security Research Lab said in a report published last week. Earlier this April, Fodcha first came to light, with the malware propagating through known vulnerabilities in Android and IoT devices as well as weak Telnet or SSH passwords.The cybersecurity company said that Fodcha has evolved into a large-scale botnet with over 60,000 active nodes and 40 command-and-control (C2) domains that can “easily generate more than 1 Tbps traffic.” Peak […]

続きを読む