DHCP Hacked To Escalate Privileges In Windows Domains

ByBalaji: Security researchers have uncovered a sophisticated method of exploiting the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges within Windows domains. This technique, dubbed “DHCP Coerce,” leverages legitimate privileges to compromise entire networks potentially. The vulnerability centers around the DHCP (Dynamic Host Configuration Protocol) service, which is essential for network administration. It automates the assignment of IP addresses, simplifying the management of network connections. However, this convenience […]

read more

Hackers poison source code from largest Discord bot platform

By Bill Toulas: The Top.gg Discord bot community with over 170,000 members has been impacted by a supply-chain attack aiming to infect developers with malware that steals sensitive information. The threat actor has been using several tactics, techniques, and procedures (TTPs) over the years including hijacking GitHub accounts, distributing malicious Python packages, using a fake Python infrastructure, and social engineering. One of the more recent victims of the attacker is Top.gg, a popular […]

read more

GEPF concerned about pension fund data leak in ransomware attack

By Ernest Mabuza: Notorious cybercrime gang LockBit was behind the attempt-GEPF concerned The Government Employees Pension Fund (GEPF) said on Tuesday it was concerned that data purportedly from its administrator, the Government Pensions Administration Agency (GPAA), has been released by ransomware group LockBit. “The GEPF concerned with this alleged security breach, as it was informed by GPAA that no data breach had occurred when it was notified of an attempt […]

read more

Major CPU, Software Vendors Impacted by New GhostRace Attack

By Eduard Kovacs A team of researchers from IBM and the VU Amsterdam university in the Netherlands on Tuesday disclosed the details of a new type of data leakage attack impacting all major CPU makers, as well as some widely used software.  The new attack, dubbed GhostRace, is related to what the researchers describe as speculative race conditions (SRCs). Such an attack could allow threat actors to obtain potentially sensitive information […]

read more

PixPirate Android malware uses new tactic to hide on phones

By Bill Toulas: The latest version of the PixPirate banking trojan for Android employs a new method to hide on phones while remaining active, even if its dropper app has been removed. PixPirate is a new Android malware first documented by the Cleafy TIR team last month seen targeting Latin American banks. Though Cleafy noted that a separate downloader app launches the malware, the report didn’t delve into its innovative […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.