Chinese Volt Typhoon hackers exploited Versa zero-day to breach ISPs, MSPs

By Lawrence Abrams The Chinese state-backed hacking group Volt Typhoon is behind attacks that exploited a zero-day flaw in Versa Director to upload a custom webshell to steal credentials and breach corporate networks. Versa Director is a management platform ISPs and MSPs use to manage virtual WAN connections created using SD-WAN services. The vulnerability is tracked as CVE-2024-39717 and resides in a feature allowing admins to upload custom icons to […]

read more

Cybersecurity at a crossroads: Time to shift to an architectural approach

The need for greater scale, intelligence, and automation is driving massive change in security operations and the SIEM market. by Jon Oltsik Contributing Writer According to ESG research, 45% of cybersecurity professionals believe that security operations are more difficult today than they were two years ago, while another 11% claim that things are about the same. When asked why they felt this way, security pros pointed to a growing attack surface, […]

read more

FCC moves ahead on internet routing security rules

The Border Gateway Protocol regulations proved less controversial than a $200 million school and library cyber program. BYTIM STARKS JUNE 6, 2024 The Federal Communications Commission voted unanimously on Thursday to advance a proposal to improve the security of a foundational routing protocol for the internet. Under the notice of proposed rulemaking on Border Gateway Protocol security, which now will go to a public comment period before final adoption, broadband internet providers would […]

read more

Hackers Transform The Raspberry Pi Into An Online Anonymity Tool

ByBalaji: A new tool, GEOBOX, was advertised on the Dark Web that utilizes Raspberry Pi devices for fraud and anonymization, allowing users to spoof GPS locations, emulate network settings, mimic Wi-Fi access points, and bypass anti-fraud filters. Criminals were using multiple GEOBOX devices as proxies to enhance anonymity during an online banking theft investigation. Attackers are believed to utilize more custom-made or modified devices in the future, creating challenges for […]

read more

DHCP Hacked To Escalate Privileges In Windows Domains

ByBalaji: Security researchers have uncovered a sophisticated method of exploiting the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges within Windows domains. This technique, dubbed “DHCP Coerce,” leverages legitimate privileges to compromise entire networks potentially. The vulnerability centers around the DHCP (Dynamic Host Configuration Protocol) service, which is essential for network administration. It automates the assignment of IP addresses, simplifying the management of network connections. However, this convenience […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.

Verified by MonsterInsights