AI-Powered Fake News Campaign Targets Western Support for Ukraine and U.S. Elections https://firewall.firm.in/wp-content/uploads/2024/11/fakenews.png Nov 29, 2024Ravie LakshmananDisinformation / Artificial Intelligence A Moscow-based company sanctioned by the U.S. earlier this year has been linked to yet another influence operation designed to turn public opinion against Ukraine and erode Western support since at least December 2023. The covert campaign undertaken by Social ...
Read More »Vulnerabilities & Exploits
U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider
U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider https://firewall.firm.in/wp-content/uploads/2024/11/t-mobile.png Nov 28, 2024Ravie LakshmananNetwork Security / Cyber Espionage U.S. telecom service provider T-Mobile said it recently detected attempts made by bad actors to infiltrate its systems in recent weeks but noted that no sensitive data was accessed. These intrusion attempts “originated from a wireline provider’s network that was ...
Read More »Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks
Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks https://firewall.firm.in/wp-content/uploads/2024/11/wordpress.png Nov 26, 2024Ravie LakshmananVulnerability / Website Security Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin WordPress could allow an unauthenticated attacker to install and enable malicious plugins on susceptible sites and potentially achieve remote code execution. The vulnerabilities, tracked as CVE-2024-10542 and CVE-2024-10781, carry ...
Read More »Google’s New Restore Credentials Tool Simplifies App Login After Android Migration
Google’s New Restore Credentials Tool Simplifies App Login After Android Migration https://firewall.firm.in/wp-content/uploads/2024/11/android.png Nov 25, 2024Ravie LakshmananMobile Security / Privacy Google has introduced a new feature called Restore Credentials to help users restore their account access to third-party apps securely after migrating to a new Android device. Part of Android’s Credential Manager API, the feature aims to reduce the hassle of ...
Read More »Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites
Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites https://firewall.firm.in/wp-content/uploads/2024/11/china.png Nov 23, 2024Ravie LakshmananCloud Security / Threat Intelligence Government agencies and non-governmental organizations in the United States have become the target of a nascent China state threat actor known as Storm-2077. The adversary, believed to be active since at least January 2024, has also conducted cyber attacks against ...
Read More »Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments https://firewall.firm.in/wp-content/uploads/2024/11/payment-fraud.png Nov 20, 2024Ravie LakshmananPayment Security / Cybercrime Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds at scale. The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment ...
Read More »Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts https://firewall.firm.in/wp-content/uploads/2024/11/streaming.png Nov 19, 2024Ravie LakshmananCloud Security / Piracy Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming capture tools. The attacks involve the hijack of unauthenticated Jupyter Notebooks to establish initial access, and perform a series of actions designed ...
Read More »Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices https://firewall.firm.in/wp-content/uploads/2024/11/botnet.png The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services such as VN5Socks and Shopsocks5, new findings from Lumen Technologies reveal. “At least 80% of NSOCKS bots in our telemetry originate from the Ngioweb botnet, mainly ...
Read More »Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority
Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority https://firewall.firm.in/wp-content/uploads/2024/11/silverfort.png Nov 19, 2024The Hacker NewsInsider Threat / Credential Security Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on managing privileged access—rather than securing the accounts and users entrusted with it. This emphasis is perhaps due to the persistent challenges of ...
Read More »New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems
New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems https://firewall.firm.in/wp-content/uploads/2024/11/locker.png Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. “Helldown deploys Windows ransomware derived from the LockBit 3.0 code,” Sekoia said in a report shared with The Hacker News. “Given ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











