PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps https://firewall.firm.in/wp-content/uploads/2025/01/PLAYFULGHOST.gif Jan 04, 2025Ravie LakshmananMalware / VPN Security Cybersecurity researchers have flagged a new malware called PLAYFULGHOST that comes with a wide range of information-gathering features like keylogging, screen capture, audio capture, remote shell, and file transfer/execution. The backdoor, according to Google’s Managed Defense team, shares functional overlaps with ...
Read More »Vulnerabilities & Exploits
Chinese hackers targeted US treasury office that handles economic sanctions: report – ET CISO
Chinese hackers targeted US treasury office that handles economic sanctions: report – ET CISO https://etimg.etb2bimg.com/thumb/msid-116932200,imgsize-5842,width-1200,height=765,overlay-etciso/data-breaches/chinese-hackers-targeted-us-treasury-office-that-handles-economic-sanctions-report.jpg Chinese govt hackers breached the US treasury office that administers economic sanctions, the Washington Post reported on Wednesday, identifying targets of a cyberattack treasury disclosed earlier this week. Citing unnamed US officials, the Washington Post said hackers compromised the office of foreign assets control and ...
Read More »LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers
LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers https://firewall.firm.in/wp-content/uploads/2025/01/exploit-poc.png Jan 03, 2025Ravie LakshmananWindows Server / Threat Mitigation A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol (LDAP) that could trigger a denial-of-service (DoS) condition. The out-of-bounds reads vulnerability is tracked as CVE-2024-49113 (CVSS score: 7.5). It was addressed by ...
Read More »New AI Jailbreak Method ‘Bad Likert Judge’ Boosts Attack Success Rates by Over 60%
New AI Jailbreak Method ‘Bad Likert Judge’ Boosts Attack Success Rates by Over 60% https://firewall.firm.in/wp-content/uploads/2025/01/ai-jailbreak.png Jan 03, 2025Ravie LakshmananMachine Learning / Vulnerability Cybersecurity researchers have shed light on a new jailbreak technique that could be used to get past a large language model’s (LLM) safety guardrails and produce potentially harmful or malicious responses. The multi-turn (aka many-shot) attack strategy has ...
Read More »Critical Deadline: Update Old .NET Domains Before January 7, 2025 to Avoid Service Disruption
Critical Deadline: Update Old .NET Domains Before January 7, 2025 to Avoid Service Disruption https://firewall.firm.in/wp-content/uploads/2025/01/NET.png Jan 03, 2025Ravie LakshmananDevOps / Software Development Microsoft has announced that it’s making an “unexpected change” to the way .NET installers and archives are distributed, requiring developers to update their production and DevOps infrastructure. “We expect that most users will not be directly affected, however, ...
Read More »Chinese hack of US treasury breached sanctions office: Report – ET CISO
Chinese hack of US treasury breached sanctions office: Report – ET CISO https://etimg.etb2bimg.com/thumb/msid-116871307,imgsize-726250,width-1200,height=765,overlay-etciso/data-breaches/chinese-hack-of-us-treasury-breached-sanctions-office-report.jpg Chinese government hackers breached the U.S. Treasury office that administers economic sanctions, the Washington Post reported on Wednesday, identifying targets of a cyberattack Treasury disclosed earlier this week. Citing unnamed U.S. officials, the Washington Post said hackers compromised the Office of Foreign Assets Control and the Office ...
Read More »Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them
Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them https://firewall.firm.in/wp-content/uploads/2025/01/cs.png Jan 02, 2025The Hacker NewsCloud Security / Threat Intelligence In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple domains – including endpoints, identity systems and cloud environments – so the adversary can infiltrate ...
Read More »Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation
Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation https://firewall.firm.in/wp-content/uploads/2024/12/main.png Cybersecurity researchers have uncovered three security weaknesses in Microsoft’s Azure Data Factory Apache Airflow integration that, if successfully exploited, could have allowed an attacker to gain the ability to conduct various covert actions, including data exfiltration and malware deployment. “Exploiting these flaws could allow attackers to gain ...
Read More »7 things you should never-ever tell or ask from ChatGPT and other AI chatbots – ET CISO
7 things you should never-ever tell or ask from ChatGPT and other AI chatbots – ET CISO https://etimg.etb2bimg.com/thumb/msid-116784851,imgsize-754550,width-1200,height=765,overlay-etciso/data-breaches/7-things-you-should-never-ever-tell-or-ask-from-chatgpt-and-other-ai-chatbots.jpg While chatbots may appear to be helpful and reliable assistants, experts caution against becoming too reliant on them, particularly for sensitive information like health advice. Recent surveys highlight a growing trend of people turning to AI for such guidance. According to a ...
Read More »Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents
Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents https://firewall.firm.in/wp-content/uploads/2024/12/chinesehackers.png Dec 31, 2024Ravie LakshmananVulnerability / Incident Response The United States Treasury Department said it suffered a “major cybersecurity incident” that allowed suspected Chinese threat actors to remotely access some computers and unclassified documents. “On December 8, 2024, Treasury was notified by a third-party software service provider, ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











