🚀 Medial Secures Investment on Shark Tank India - Fueling the Future of Professional Social Networking. 🔥
✕
Login
Home
News
Messages
Startup Showcase
Trackers
Premium
Premium Content
Jobs
Notifications
Settings
Try our Valuation Calculator →
Log In
News on Medial
Lazarus hackers return and hijack a Windows security flaw
Techradar
·
1y ago
Medial
According to cybersecurity experts, the Lazarus Group, a North Korean state-sponsored hacking group, is exploiting a zero-day vulnerability to disable antivirus programs on Windows devices. The group leverages a flaw in the Windows AppLocker driver, gaining kernel-level access to the device and disabling any installed antivirus programs. The flaw was discovered by Avast, who notified Microsoft and a fix was released as part of the February 2024 Patch Tuesday update. The Lazarus Group is infamous for its cyber-espionage and money heist activities, and is believed to be under the control of the North Korean government.
View Source
Related News
CoinEx invites hackers to negotiate after suffering data breach
Economic Times
·
1y ago
Medial
Global cryptocurrency exchange CoinEx, which recently experienced a data breach, has reached out to the hackers and offered a generous bounty reward if they return the stolen assets. CoinEx identified the hackers as the North Korean-sponsored Lazarus Group. The company stated that the incident served as a lesson and has prompted it to increase its focus on asset security. CoinEx has invited the hackers to communicate and negotiate through official channels and has even offered them the opportunity to work on security upgrades. The total amount stolen is still being calculated, but it is estimated to be around $70 million.
View Source
Windows 0-day was exploited by North Korea to install advanced rootkit
Arstechnica
·
11m ago
Medial
A recent Windows zero-day vulnerability that was patched by Microsoft was exploited by hackers affiliated with the North Korean government. The vulnerability allowed attackers to install custom malware, providing them with access to sensitive system areas and system privileges. The hackers, known as Lazarus, targeted individuals in cryptocurrency engineering and aerospace to steal cryptocurrencies for funding their operations. They used the exploit to install FudModule, a sophisticated rootkit malware that disables internal and external security defenses. The details of when the attacks started and the number of targeted organizations remain unknown.
View Source
Microsoft finally patches serious Windows kernel security flaw - but not before it was attacked
Techradar
·
1y ago
Medial
Microsoft has released a patch to address a Windows Kernel privilege escalation vulnerability that was known to be exploited for at least six months. The flaw, known as CVE-2024-21338, was first discovered by Avast researchers and affected multiple versions of Windows 10 and Windows 11, as well as Windows Server 2019 and 2022. Threat actors, including the Lazarus Group with ties to North Korea, actively abused the vulnerability to gain kernel-level access and disable antivirus programs. Microsoft advised users to install the February Patch Update to protect against this exploit.
View Source
Blockchain analysts suspect North Korea-linked hackers behind $70-million crypto theft
Economic Times
·
1y ago
Medial
Blockchain researchers believe that North Korea-linked hackers, specifically the Lazarus Group, are responsible for a $70 million theft from the cryptocurrency exchange CoinEx. Several factors, including funds being sent to a wallet previously used by the Lazarus Group, point to their involvement. The Lazarus Group is suspected of ramping up its cryptocurrency theft operations, with multiple attacks since June. North Korea has increased its cryptocurrency theft activities in recent years, using the funds to support its nuclear and missile programs, according to a United Nations report.
View Source
Cisco tells Secure Client users to patch immediately or risk VPN security flaw
Techradar
·
1y ago
Medial
Cisco has addressed a high-severity vulnerability in its Secure Client software. The flaw, known as "carriage return line feed injection vulnerability," allows unauthenticated attackers to establish a VPN session with a target endpoint. Exploiting this vulnerability could enable remote execution of arbitrary script code and unauthorized access to sensitive information. The flaw was discovered by Amazon's Paulos Yibelo Mesfin, who explains that attackers could gain access to victims' internal networks simply by tricking them into visiting a website under their control. Updating to the patched versions of the software is recommended to ensure security.
View Source
Millions at risk as popular WordPress database plugin is targeted by hackers
Techradar
·
1y ago
Medial
A critical vulnerability has been discovered in the Better Search Replace WordPress plugin, which is installed on over a million websites. The flaw allows hackers to execute malicious code, access sensitive data, manipulate or delete files, and initiate a denial of service attack. WordPress security experts Wordfence detected and reported the vulnerability, which has since been fixed. It is recommended that users update to the latest version of the plugin to protect their sites.
View Source
Zoom patches critical security flaws across its Windows apps — update now to stay safe
Techradar
·
1y ago
Medial
Zoom has patched a critical vulnerability in its Windows apps that allowed attackers to escalate privileges remotely. The flaw, tracked as CVE-2024-24691, was found in various Zoom Windows clients and carried a severity rating of 9.6. While details of the flaw remain undisclosed, it is suspected to require some form of victim interaction, such as clicking a malicious link or opening a malware-laden attachment. Zoom urges users to update their applications to the latest version to protect against potential exploits. The company has also addressed six other vulnerabilities in the update.
View Source
Critical CitrixBleed 2 vulnerability has been under active exploit for weeks
Arstechnica
·
8d ago
Medial
A critical CitrixBleed 2 vulnerability in Citrix's network management devices has been actively exploited for weeks, allowing hackers to bypass authentication and access sensitive data. Despite Citrix stating no evidence of such exploitation, researchers have found attacks dating back to June. The flaw, affecting NetScaler devices, leaks memory contents enabling credential reconstruction. Security experts criticize Citrix for inadequate advisories, urging organizations to use specific indicators to detect potential breaches beyond just applying patches.
View Source
New critical JetBrains security flaw could let hackers hijack entire servers
Techradar
·
1y ago
Medial
Two high severity vulnerabilities have been discovered in JetBrains TeamCity On-Premises software by cybersecurity researchers. The vulnerabilities could allow attackers to take over vulnerable systems, launch DDoS attacks, and perform other malicious activities. The first vulnerability allows authentication bypass, giving attackers full control over TeamCity projects, builds, agents, and artifacts. The second flaw enables DDoS attacks and unauthorized access to system settings and sensitive information. JetBrains has released a patch and advised all users to upgrade their software to the latest version. The company also warned of increased targeting of JetBrains TeamCity users by North Korean and Russian threat actors.
View Source
Want to Steal a Tesla? Try Using a Flipper Zero
Gizmodo
·
1y ago
Medial
Security researchers have found a design flaw in Tesla cars that allowed them to hijack a vehicle in minutes using a $169 hacking tool called Flipper Zero. The attack involves fooling a Tesla owner into entering their login details on a fake Tesla website, giving the hackers access to the owner's account. Once inside the Tesla app, the thief can set up a "phone key" and control the car remotely. Tesla does not notify users when new keys are created, so victims may not know their car has been compromised. The researchers have reported the vulnerability to Tesla but received no response.
View Source
Trackers
Active Indian VC’s
OG Capital
Email
With a hands-on approach, OG Capital aims to invest in over 20 promising...
Accel Partners
Email
Early and growth-stage investments in disruptive technology companies with...
Blume
Email
Early-stage venture capital firm investing in technology startups in India. Focus on...
Access All Trackers
Startup Showcase Winners
June 2025
Buddy
Helping your parents when you are miles away
BiteStop
The Pit Stop Your Cravings Deserve
Bloomer
The next generation E-commerce platform
Enter Ongoing Startup Showcase
Top Users
Trending News on Medial
Download the medial app to read full posts, comements and news.
Go to Medial App
Not Now
Know everything that’s happening in the startup ecosystem, first.
Enable Notifications?
No, thanks
Count me in