Tech news from MIST
Latest news from CyberManipal, that matters.
Page 1
BREACHES
When Pandas Leaked More Than Just Cute Videos
35 weeks ago
PandaBuy, a platform enabling international purchases from Chinese e-commerce giants such as Tmall, Taobao, and JD.com, has been compromised in a recent breach. Allegedly orchestrated by 'Sanggiero' and 'IntelBoker,' the attack exploited critical vulnerabilities in the platform's API and other bugs to gain access to its internal services. The stolen... Read more
PandaBuy, a platform enabling international purchases from Chinese e-commerce giants such as Tmall, Taobao, and... Read more
RESEARCH AND DEVELOPMENT
Cybercriminals Recycle Ransomware Faster
2 years ago
Researchers came across ransomware’s recycling campaign, which uses publicly available resources. Nokoyawa appeared and was first found by FortiGuard researchers. This was similar to Karma which can be tracked by Nemty.The April 2022 samples include three new features that increase the number of files that Nokoyawa can encrypt. The code... Read more
Researchers came across ransomware’s recycling campaign, which uses publicly available resources. Nokoyawa appeared and was... Read more
BREACHES
WIFI probing exposes user's personal data
2 years ago
University of Hamburg, Germany: Researchers conducted a field experiment capturing thousands of passersby's WiFi connection probe requests to determine the type of data transmitted without the device owners realizing it. Many firms track their customers' position and movement. This tracking only uses anonymized MAC addresses, often regarded as GDPR... Read more
University of Hamburg, Germany: Researchers conducted a field experiment capturing thousands of passersby's WiFi connection... Read more
VULNERABILITIES
XD - not so funny
2 years ago
Reports have been coming up related to the activity of the Hello XD ransomware, where an updated sample with more robust encryption has been deployed. From the first appearance of Hello XD in November 2021, it was based on the leaked source code of Babuk and used for double-extortion... Read more
Reports have been coming up related to the activity of the Hello XD ransomware, where... Read more
BREACHES
GitHub reveals that 100K npm user accounts compromised
2 years ago
Github discloses login details of roughly 100,000 npm accounts by mid-April, data was breached with stolen OAuth apps token issued to Heroku and Travis-CI. Threats were escalated with a compromised AWS access key, after downloading multiple private npm repositories using the stolen OAuth user tokens. GitHub, Travis CI, and Heroku... Read more
Github discloses login details of roughly 100,000 npm accounts by mid-April, data was breached with... Read more
VULNERABILITIES
MALVERTISER- advertising malware
2 years ago
After a relatively stable presence since the start of this year, the ChromeLoader malware is seeing a rise in detection, posing a widespread threat. The malware can alter a user's web browser history and promote unwanted content from which the attacker stands to receive financial gain by redirecting user traffic... Read more
After a relatively stable presence since the start of this year, the ChromeLoader malware is... Read more
POLICIES AND REGULATIONS
Anonymous announces cyber-war against Russian Killnet
2 years ago
Anonymous, an activist group has announced a cyber-war against the pro-Russian group Killnet which attacked European institutions. Anonymous declared a “cyberwar” against Putin’s government after its Ukrainian invasion. It includes leaking over 360,000 Russian federal agency files in the process. On Twitter, the @YourAnonOne account announced the cyber war against... Read more
Anonymous, an activist group has announced a cyber-war against the pro-Russian group Killnet which attacked... Read more
RESEARCH AND DEVELOPMENT
Google WAF bypassed by oversized POST requests
2 years ago
WAF is a web application firewall that provides web application security from malicious attacks such as SQL injection, DDOS, etc. But recently, Google’s WAF was bypassed using POST requests. This has been reported by the researchers at Kloudle (a security consultancy firm) woho were able to bypass Google Cloud Platform... Read more
WAF is a web application firewall that provides web application security from malicious attacks such... Read more
VULNERABILITIES
25 Malicious JavaScript Libraries Distributed via NPM Package Repository
2 years ago
DevOps security firm JFrog informed that it found and helped remove 25 malicious JavaScript libraries from the official npm package repository. This is the second time in three months that JFrog found malicious npm packages designed to steal Discord tokens and environment variables after reporting 17 similar packages in December... Read more
DevOps security firm JFrog informed that it found and helped remove 25 malicious JavaScript libraries... Read more
VULNERABILITIES
US Banks prepare for potential attack as Russian cybercriminals become emboldened
2 years ago
The Russia-Ukraine standoff in the physical world has also spilled into the cyber realm. Politicians and cybersecurity experts warn of potential attacks against the U.S. financial industry. Many conventional security rules are changing, according to Victor Wieczorek, a nation-state red teamer and director of threat and attack simulation at cybersecurity... Read more
The Russia-Ukraine standoff in the physical world has also spilled into the cyber realm. Politicians... Read more