November 20, 2024
Articles CyberSecurity Technology

Hackers Abused Microsoft OAuth Apps to Breach Corporate Email Accounts

On Tuesday, Microsoft announced that it has taken action to disable phoney Microsoft Partner Network (MPN) accounts that had been used to build harmful OAuth applications as part of a phishing campaign intended to infiltrate cloud environments of enterprises and steal email. The IT company claimed that the fraudulent actors “built applications that were subsequently […]

Read More
Articles CyberSecurity

Microsoft advises users to maintain their Exchange servers up to date as well as take precautions

Microsoft advises users to maintain their Exchange servers up to date as well as take precautions such turning on Windows Extended Protection and setting up certificate-based signing of PowerShell serialisation payloads. The software giant’s Exchange Team stated in a post that attackers attempting to target unpatched Exchange servers would not stop. The value of unpatched […]

Read More
Articles CyberSecurity Technology

British Cyber Agency warns of Russian and Iranian Hackers Targeting Key Industries

On Thursday, the U.K. National Cyber Security Centre (NCSC) issued a warning about spear-phishing attacks carried out by state-sponsored actors in Iran and Russia. SEABORGIUM (also known as Callisto, COLDRIVER, and TA446) and APT42 were blamed by the agency for the intrusions (aka ITG18, TA453, and Yellow Garuda). Despite the parallels in the ways the […]

Read More
Articles CyberSecurity Technology

Over 4,500 Worldpress Sites Hacked to Redirect Visitors to Sketchy Ad Pages

A massive campaign has infected more than 4,500 WordPress websites as part of a running operation that has been believed to be active since 2017. According to owner of Godadddy,Sucuri the infections involve the injection of a JavaScript hosted on domain named “track[.]violetlovelines[.]com that is designed to redirect visitors to some unwanted sites. The latest […]

Read More
Articles CyberSecurity Technology

Chinese Hackers Utilize Golang Malware in Dragon Spark Attacks

Organizations in East Asia are targeted by likely Chinese-speaking actor dubbed DragonSpark while employing uncommon tactics to go past security layers. Chinese hackers utilize malware and attacks are characterized by use of open source SparkRAT and malware which attempts to evade detection through a Golang source code interpretation. A striking aspect of the intrusions is […]

Read More
Articles CyberSecurity Technology

Emotet Malware Makes a Comeback with New Evasion Technique

The Emotet malware operation has continued to refine its tactics in a effort to fly under the radar while acting as a conduit for other dangerous malware such as Bumblebee and IcedID. Emotet which is officially reemerged in late 2021 after which a coordinated takedown of its infrastructure by authorities earlier that year which has […]

Read More
Articles CyberSecurity Technology

Apple issues Update for older Devices

Apple has fixes for a recently disclosed critical security flaw that is affecting older devices which is reciting evidence of active exploitation. The issue which is tracked as CVE-2022-42856 and is a type confusion vulnerability in the WebKit browser engine that could result in arbitrary code execution when processing maliciously crafted web content. While it […]

Read More
Articles CyberSecurity Technology

Samsung Galaxy Store App Vulnerable to Sneaky App Install

Two security flaws has disclosed in Samsung’s Galaxy Store app for Android that are exploited by a local attacker to install arbitrary apps to fraudulent landing pages on the web. The issues that tracked as CVE-2023-21433 and CVE-2023-21434, were discovered by NCC Group which is notified to the South Korean chaebol in November and December […]

Read More
CyberSecurity Technology

Chinese Hackers Exploited Recent Fortinet Flaw

Suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day in attacks which are targeting a European government entity and a managed service provider (MSP)that is located in Africa. Telemetry evidence gathered by Google-owned Mandiant indicates that the exploitation is occurred as early as October 2022which is at least […]

Read More
Articles Technology

Manufacturing Workflow in ERPNEXT

Manufacturing workflow in ERPNEXT involve series of things which are important for manufacturing a product. It involves creating new item,then add details of customer , supplier of rawmaterials,creating bills of material ,production plan,sales and order and purchase order for item and then add rate for delivery so that manufacturing product can be ready for delivering […]

Read More