• Landing Page
  • Shop
  • Contact
  • Privacy Policy
  • Login
  • Register
Upgrade
TrivDaily
">
  • WorldNew
    Pound

    Pound hits 37-year low against dollar

    Palm Trees - WIND

    Hurricane Tracker : Tropical Storm Hurricane Nine has the potential to reach Florida

    Prince of Wales - TrivDaily

    Princess Diana’s title has been passed on to the Duchess of Cambridge

    TrivDaily - King Charles Speech

    3 main points to be gleaned from King Charles first public speech

    Abdul Qadeer Khan: ‘Father of Pakistan’s nuclear bomb’ dies

    Abdul Qadeer Khan: ‘Father of Pakistan’s nuclear bomb’ dies

    The Afghanistan airport explosion came about beneathneath Biden however lines lower back to Trump

    The Afghanistan airport explosion came about beneathneath Biden however lines lower back to Trump

    Hibernian  beat Arsenal 2-1 in first preseason game on Easter Road

    Hibernian beat Arsenal 2-1 in first preseason game on Easter Road

    After a “racist” tweet against England black players, comedian Andrew Lawrence’s agent cancelled his appearance in show.

    After a “racist” tweet against England black players, comedian Andrew Lawrence’s agent cancelled his appearance in show.

    Lionel Messi, Argentina win Copa America over Brazil

    Lionel Messi, Argentina win Copa America over Brazil

    Trending Tags

    • Lifestyle
      Dramatic moment armed cops swarm thug in major manhunt after he blasted man with shotgun – as he is jailed for 32 years

      Dramatic moment armed cops swarm thug in major manhunt after he blasted man with shotgun – as he is jailed for 32 years

      Fifa charging astonishing fees for World Cup 2026 stadium PARKING with fans at Qatar 2022 paying less for tickets

      Fifa charging astonishing fees for World Cup 2026 stadium PARKING with fans at Qatar 2022 paying less for tickets

      Met Office pinpoints where snow could fall on Wednesday in new UK forecast

      Met Office pinpoints where snow could fall on Wednesday in new UK forecast

      UK authorities should be ‘ashamed’ over slow justice for Agnus Wanjiru

      UK authorities should be ‘ashamed’ over slow justice for Agnus Wanjiru

      James Watson dead: Co-discoverer of DNA’s double helix passes at 97

      James Watson dead: Co-discoverer of DNA’s double helix passes at 97

      27 free festive experiences across the UK for families including light trails and Santa’s grotto

      27 free festive experiences across the UK for families including light trails and Santa’s grotto

      Trending Tags

      • Pandemic
    • Business
      The Winds of Winter Delay: 10 Years On, The Book Is Still 25% Unfinished

      The Winds of Winter Delay: 10 Years On, The Book Is Still 25% Unfinished

      Maryland Senator Dalya Attar Targeted in Secret Sex-Video Blackmail Plot as FBI Launches Investigation

      Maryland Senator Dalya Attar Targeted in Secret Sex-Video Blackmail Plot as FBI Launches Investigation

      NASA Detects Water on Interstellar Comet 3I/ATLAS — ‘A Note From Another World’

      NASA Detects Water on Interstellar Comet 3I/ATLAS — ‘A Note From Another World’

      Who Is Hannah Grubbs? TikTok Influencer Slammed For Exploiting Hurricane Melissa Updates For Own Content

      Who Is Hannah Grubbs? TikTok Influencer Slammed For Exploiting Hurricane Melissa Updates For Own Content

      From Skies to Screens: How Tony Adams Carried His Trailblazing Mother’s Spirit Into a Lifetime of British Television

      From Skies to Screens: How Tony Adams Carried His Trailblazing Mother’s Spirit Into a Lifetime of British Television

      NASA’s Big 3I/ATLAS Lie Exposed? Theorists Shocked After ‘Hidden’ Object Appears Beside the Sun

      NASA’s Big 3I/ATLAS Lie Exposed? Theorists Shocked After ‘Hidden’ Object Appears Beside the Sun

      Trending Tags

      • Vaccine
      • Pandemic
    • Entertainment
      Nostalgic News: A Night at the Opera turns 50!

      Nostalgic News: A Night at the Opera turns 50!

      “Bring Whimsy Back Into Crime!”

      “Bring Whimsy Back Into Crime!”

      How to Find the Right Clothing Manufacturer in the USA for Your Brand

      How to Find the Right Clothing Manufacturer in the USA for Your Brand

      Italy orders new licensees to declare principal domains by 13 November

      Italy orders new licensees to declare principal domains by 13 November

      Cost of safer gambling award for Danish regulator unclear

      Cost of safer gambling award for Danish regulator unclear

      Jon M. Chu teases ‘extra meat’ in Wicked: For Good

      Jon M. Chu teases ‘extra meat’ in Wicked: For Good

      Charlie Hunnam was Ryan Murphy’s only choice for Ed Gein role

      Charlie Hunnam was Ryan Murphy’s only choice for Ed Gein role

      Michel Groothuizen: Gambling needs collective accountability to kill black market hydra

      Michel Groothuizen: Gambling needs collective accountability to kill black market hydra

      Evolution leadership commits to ‘defend our firm’ amid Playtech dispute

      Evolution leadership commits to ‘defend our firm’ amid Playtech dispute

      Trending Tags

      • Sports
        Tom Aspinall celebrates Halloween by throwing shade at Ciryl Gane

        Tom Aspinall celebrates Halloween by throwing shade at Ciryl Gane

        Staff predictions for Seahawks’ Sunday night game at Commanders

        Staff predictions for Seahawks’ Sunday night game at Commanders

        Pourquoi Aston Martin F1 est un sentiment de ‘déjà-vu’ pour Newey

        Pourquoi Aston Martin F1 est un sentiment de ‘déjà-vu’ pour Newey

        Zhou cherche à faire que ‘tout le paddock le connaisse’ en F1

        Zhou cherche à faire que ‘tout le paddock le connaisse’ en F1

        Uninsured Bryce Mitchell begs someone to set his broken nose for free

        Uninsured Bryce Mitchell begs someone to set his broken nose for free

        Tom Aspinall’s father provides eye injury update: ‘He still can’t see anything’

        Tom Aspinall’s father provides eye injury update: ‘He still can’t see anything’

        Effects of Casino Gaming on The Mind and Body

        Effects of Casino Gaming on The Mind and Body

        NFL Transactions for October 28, 2025 | Presented by The Free Agent Portal

        NFL Transactions for October 28, 2025 | Presented by The Free Agent Portal

        Monday Night Football live discussion: Commanders at Chiefs

        Monday Night Football live discussion: Commanders at Chiefs

        Trending Tags

        • Travel
          Police ask public to ‘avoid area’ after collision on Welsh road

          Police ask public to ‘avoid area’ after collision on Welsh road

          Italian giants confident about agreeing deal for Man United star

          Italian giants confident about agreeing deal for Man United star

          Bitesize Prediction: Portimonense vs Torreense – 30/10/25

          Bitesize Prediction: Portimonense vs Torreense – 30/10/25

          Eastern Airways: UK regional airline suspends operations

          Eastern Airways: UK regional airline suspends operations

          Prediction: Lecce vs Napoli – Betting Tips, Team News, Key Facts

          Prediction: Lecce vs Napoli – Betting Tips, Team News, Key Facts

          Watch Fred again.., Daft Punk’s Thomas Bangalter Go B2B In Paris

          Watch Fred again.., Daft Punk’s Thomas Bangalter Go B2B In Paris

          Trending Tags

          • Technology
            Robotic lawnmower uses AI to dodge cats, toys

            Robotic lawnmower uses AI to dodge cats, toys

            AI blew open software security, now OpenAI wants to fix it with an agent called Aardvark

            AI blew open software security, now OpenAI wants to fix it with an agent called Aardvark

            Interstellar Comet 3I/ATLAS Dazzles As It Swoops Behind the Sun

            Interstellar Comet 3I/ATLAS Dazzles As It Swoops Behind the Sun

            The Final ‘Frankenstein’ Trailer Is Here to Haunt Your Halloween

            The Final ‘Frankenstein’ Trailer Is Here to Haunt Your Halloween

            DNS downing clouds is boring: IBM Cloud is experiencing a quantum computer outage

            DNS downing clouds is boring: IBM Cloud is experiencing a quantum computer outage

            Samsung picks fights with Google and Qualcomm

            Samsung picks fights with Google and Qualcomm

            Trending Tags

            • Real Estate
              Malaysia Plans To Open Worldwide Tourism On December 1

              Malaysia Plans To Open Worldwide Tourism On December 1

              #1 UK housing: renting has turn out to be less expensive than shopping

              #1 UK housing: renting has turn out to be less expensive than shopping

              UK assets marketplace pastime maintains at record-breaking levels

              UK assets marketplace pastime maintains at record-breaking levels

              GUUD Launches New RYTE Financing Platform To Make Trade Finance Accessible for All Businesses

              GUUD Launches New RYTE Financing Platform To Make Trade Finance Accessible for All Businesses

              Climate Finance Partnership Raises US$250 Million at First Close to Invest in Emerging Market Climate Infrastructure

              Climate Finance Partnership Raises US$250 Million at First Close to Invest in Emerging Market Climate Infrastructure

              Interior Jennifer Lopez’s luxe Miami rental: 5 stress-free details in regards to the mansion

              Interior Jennifer Lopez’s luxe Miami rental: 5 stress-free details in regards to the mansion

              Trending Tags

              No Result
              View All Result
              • WorldNew
                Pound

                Pound hits 37-year low against dollar

                Palm Trees - WIND

                Hurricane Tracker : Tropical Storm Hurricane Nine has the potential to reach Florida

                Prince of Wales - TrivDaily

                Princess Diana’s title has been passed on to the Duchess of Cambridge

                TrivDaily - King Charles Speech

                3 main points to be gleaned from King Charles first public speech

                Abdul Qadeer Khan: ‘Father of Pakistan’s nuclear bomb’ dies

                Abdul Qadeer Khan: ‘Father of Pakistan’s nuclear bomb’ dies

                The Afghanistan airport explosion came about beneathneath Biden however lines lower back to Trump

                The Afghanistan airport explosion came about beneathneath Biden however lines lower back to Trump

                Hibernian  beat Arsenal 2-1 in first preseason game on Easter Road

                Hibernian beat Arsenal 2-1 in first preseason game on Easter Road

                After a “racist” tweet against England black players, comedian Andrew Lawrence’s agent cancelled his appearance in show.

                After a “racist” tweet against England black players, comedian Andrew Lawrence’s agent cancelled his appearance in show.

                Lionel Messi, Argentina win Copa America over Brazil

                Lionel Messi, Argentina win Copa America over Brazil

                Trending Tags

                • Lifestyle
                  Dramatic moment armed cops swarm thug in major manhunt after he blasted man with shotgun – as he is jailed for 32 years

                  Dramatic moment armed cops swarm thug in major manhunt after he blasted man with shotgun – as he is jailed for 32 years

                  Fifa charging astonishing fees for World Cup 2026 stadium PARKING with fans at Qatar 2022 paying less for tickets

                  Fifa charging astonishing fees for World Cup 2026 stadium PARKING with fans at Qatar 2022 paying less for tickets

                  Met Office pinpoints where snow could fall on Wednesday in new UK forecast

                  Met Office pinpoints where snow could fall on Wednesday in new UK forecast

                  UK authorities should be ‘ashamed’ over slow justice for Agnus Wanjiru

                  UK authorities should be ‘ashamed’ over slow justice for Agnus Wanjiru

                  James Watson dead: Co-discoverer of DNA’s double helix passes at 97

                  James Watson dead: Co-discoverer of DNA’s double helix passes at 97

                  27 free festive experiences across the UK for families including light trails and Santa’s grotto

                  27 free festive experiences across the UK for families including light trails and Santa’s grotto

                  Trending Tags

                  • Pandemic
                • Business
                  The Winds of Winter Delay: 10 Years On, The Book Is Still 25% Unfinished

                  The Winds of Winter Delay: 10 Years On, The Book Is Still 25% Unfinished

                  Maryland Senator Dalya Attar Targeted in Secret Sex-Video Blackmail Plot as FBI Launches Investigation

                  Maryland Senator Dalya Attar Targeted in Secret Sex-Video Blackmail Plot as FBI Launches Investigation

                  NASA Detects Water on Interstellar Comet 3I/ATLAS — ‘A Note From Another World’

                  NASA Detects Water on Interstellar Comet 3I/ATLAS — ‘A Note From Another World’

                  Who Is Hannah Grubbs? TikTok Influencer Slammed For Exploiting Hurricane Melissa Updates For Own Content

                  Who Is Hannah Grubbs? TikTok Influencer Slammed For Exploiting Hurricane Melissa Updates For Own Content

                  From Skies to Screens: How Tony Adams Carried His Trailblazing Mother’s Spirit Into a Lifetime of British Television

                  From Skies to Screens: How Tony Adams Carried His Trailblazing Mother’s Spirit Into a Lifetime of British Television

                  NASA’s Big 3I/ATLAS Lie Exposed? Theorists Shocked After ‘Hidden’ Object Appears Beside the Sun

                  NASA’s Big 3I/ATLAS Lie Exposed? Theorists Shocked After ‘Hidden’ Object Appears Beside the Sun

                  Trending Tags

                  • Vaccine
                  • Pandemic
                • Entertainment
                  Nostalgic News: A Night at the Opera turns 50!

                  Nostalgic News: A Night at the Opera turns 50!

                  “Bring Whimsy Back Into Crime!”

                  “Bring Whimsy Back Into Crime!”

                  How to Find the Right Clothing Manufacturer in the USA for Your Brand

                  How to Find the Right Clothing Manufacturer in the USA for Your Brand

                  Italy orders new licensees to declare principal domains by 13 November

                  Italy orders new licensees to declare principal domains by 13 November

                  Cost of safer gambling award for Danish regulator unclear

                  Cost of safer gambling award for Danish regulator unclear

                  Jon M. Chu teases ‘extra meat’ in Wicked: For Good

                  Jon M. Chu teases ‘extra meat’ in Wicked: For Good

                  Charlie Hunnam was Ryan Murphy’s only choice for Ed Gein role

                  Charlie Hunnam was Ryan Murphy’s only choice for Ed Gein role

                  Michel Groothuizen: Gambling needs collective accountability to kill black market hydra

                  Michel Groothuizen: Gambling needs collective accountability to kill black market hydra

                  Evolution leadership commits to ‘defend our firm’ amid Playtech dispute

                  Evolution leadership commits to ‘defend our firm’ amid Playtech dispute

                  Trending Tags

                  • Sports
                    Tom Aspinall celebrates Halloween by throwing shade at Ciryl Gane

                    Tom Aspinall celebrates Halloween by throwing shade at Ciryl Gane

                    Staff predictions for Seahawks’ Sunday night game at Commanders

                    Staff predictions for Seahawks’ Sunday night game at Commanders

                    Pourquoi Aston Martin F1 est un sentiment de ‘déjà-vu’ pour Newey

                    Pourquoi Aston Martin F1 est un sentiment de ‘déjà-vu’ pour Newey

                    Zhou cherche à faire que ‘tout le paddock le connaisse’ en F1

                    Zhou cherche à faire que ‘tout le paddock le connaisse’ en F1

                    Uninsured Bryce Mitchell begs someone to set his broken nose for free

                    Uninsured Bryce Mitchell begs someone to set his broken nose for free

                    Tom Aspinall’s father provides eye injury update: ‘He still can’t see anything’

                    Tom Aspinall’s father provides eye injury update: ‘He still can’t see anything’

                    Effects of Casino Gaming on The Mind and Body

                    Effects of Casino Gaming on The Mind and Body

                    NFL Transactions for October 28, 2025 | Presented by The Free Agent Portal

                    NFL Transactions for October 28, 2025 | Presented by The Free Agent Portal

                    Monday Night Football live discussion: Commanders at Chiefs

                    Monday Night Football live discussion: Commanders at Chiefs

                    Trending Tags

                    • Travel
                      Police ask public to ‘avoid area’ after collision on Welsh road

                      Police ask public to ‘avoid area’ after collision on Welsh road

                      Italian giants confident about agreeing deal for Man United star

                      Italian giants confident about agreeing deal for Man United star

                      Bitesize Prediction: Portimonense vs Torreense – 30/10/25

                      Bitesize Prediction: Portimonense vs Torreense – 30/10/25

                      Eastern Airways: UK regional airline suspends operations

                      Eastern Airways: UK regional airline suspends operations

                      Prediction: Lecce vs Napoli – Betting Tips, Team News, Key Facts

                      Prediction: Lecce vs Napoli – Betting Tips, Team News, Key Facts

                      Watch Fred again.., Daft Punk’s Thomas Bangalter Go B2B In Paris

                      Watch Fred again.., Daft Punk’s Thomas Bangalter Go B2B In Paris

                      Trending Tags

                      • Technology
                        Robotic lawnmower uses AI to dodge cats, toys

                        Robotic lawnmower uses AI to dodge cats, toys

                        AI blew open software security, now OpenAI wants to fix it with an agent called Aardvark

                        AI blew open software security, now OpenAI wants to fix it with an agent called Aardvark

                        Interstellar Comet 3I/ATLAS Dazzles As It Swoops Behind the Sun

                        Interstellar Comet 3I/ATLAS Dazzles As It Swoops Behind the Sun

                        The Final ‘Frankenstein’ Trailer Is Here to Haunt Your Halloween

                        The Final ‘Frankenstein’ Trailer Is Here to Haunt Your Halloween

                        DNS downing clouds is boring: IBM Cloud is experiencing a quantum computer outage

                        DNS downing clouds is boring: IBM Cloud is experiencing a quantum computer outage

                        Samsung picks fights with Google and Qualcomm

                        Samsung picks fights with Google and Qualcomm

                        Trending Tags

                        • Real Estate
                          Malaysia Plans To Open Worldwide Tourism On December 1

                          Malaysia Plans To Open Worldwide Tourism On December 1

                          #1 UK housing: renting has turn out to be less expensive than shopping

                          #1 UK housing: renting has turn out to be less expensive than shopping

                          UK assets marketplace pastime maintains at record-breaking levels

                          UK assets marketplace pastime maintains at record-breaking levels

                          GUUD Launches New RYTE Financing Platform To Make Trade Finance Accessible for All Businesses

                          GUUD Launches New RYTE Financing Platform To Make Trade Finance Accessible for All Businesses

                          Climate Finance Partnership Raises US$250 Million at First Close to Invest in Emerging Market Climate Infrastructure

                          Climate Finance Partnership Raises US$250 Million at First Close to Invest in Emerging Market Climate Infrastructure

                          Interior Jennifer Lopez’s luxe Miami rental: 5 stress-free details in regards to the mansion

                          Interior Jennifer Lopez’s luxe Miami rental: 5 stress-free details in regards to the mansion

                          Trending Tags

                          No Result
                          View All Result
                          TrivDaily
                          No Result
                          View All Result
                          Home Technology

                          Russian spies may have moved in next door to target your network

                          Ferhan Rana by Ferhan Rana
                          November 25, 2024
                          in Technology
                          Reading Time:5 mins read
                          30.5k 1.3k
                          A A
                          0
                          Russian spies may have moved in next door to target your network
                          29.7k
                          SHARES
                          33.8k
                          VIEWS
                          Share on FacebookShare on Twitter
                          ">

                          Infosec in brief Not to make you paranoid, but that business across the street could, under certain conditions, serve as a launching point for Russian cyber spies to compromise your network.

                          Using what it described as “a novel attack vector … not previously encountered,” threat intel and memory forensics firm Volexity reported it’s spotted what it believes to be the APT28 Kremlin-backed threat actor targeting one of its clients by first compromising multiple organizations whose offices are in close physical proximity to the target.

                          Dubbed the “nearest neighbor attack” for lack of “any terminology describing this style of attack,” Volexity explained the multi-step attack began with password-spraying the victim’s web portals to get valid credentials.

                          Those credentials were unusable on the org’s services because it had implemented multifactor authentication – except on its Wi-Fi network.

                          To get around the fact it was targeting a Wi-Fi network thousands of miles away, APT28 breached the target’s neighboring organizations, identified devices with both wired and wireless network adapters, and used them to connect to the target’s Wi-Fi network with the stolen credentials. Once connected, the attackers moved laterally within the network and routed exfiltrated data through compromised machines on neighboring networks.

                          “Volexity’s investigation reveals the lengths a creative, resourceful, and motivated threat actor is willing to go to in order to achieve their cyber espionage objectives,” the security shop observed. “To reiterate, the compromise of these credentials alone did not yield access to the customer’s environment. However, the Wi-Fi network was not protected by MFA, meaning proximity to the target network and valid credentials were the only requirements to connect.”

                          In other words, now you have yet another system to secure with some form of multifactor authentication. Volexity noted that the guest Wi-Fi network was also compromised, and a single system able to access both networks was identified to move into the more sensitive network – so be sure you isolate everything, too.

                          Critical vulnerabilities of the week: Cisco cert lapse warning

                          Cisco reported a critical issue in its Firepower Management Center software this week, affecting versions 6 and 7, that can lead to a loss of management capabilities.

                          According to the report, an internal self-signed root certificate authority valid for ten years might be expiring soon, leaving administrators without the ability to manage connected devices. If it does lapse “a more complex renewal process” will be necessary – so inspect yours and install necessary hotfixes ASAP.

                          Just one active, critical exploit to mention this week that we haven’t already covered:

                          • CVSS 10.0 – CVE-2024-1212: Progress Software’s LoadMaster load balancing software allows unauthenticated users to access it through the management interface, allowing for arbitrary system command execution.

                          There’s one less phisher in the sea

                          Microsoft last week reported that it seized 240 fraudulent websites linked to a Phishing-as-a-Service operation based in Egypt that used the Linux Foundation’s Open Neural Network Exchange (ONNX) to brand its malware.

                          “Abanoub Nady (known online as ‘MRxC0DER’) developed and sold ‘do it yourself’ phish kits and fraudulently used the brand name ‘ONNX,'” Microsoft claimed. Along with the ONNX brand, Nady allegedly marketed his phishing kits under the names Caffeine and FUHRER, Microsoft’s Digital Crimes Unit added.

                          Microsoft wrote that Nady’s outfit operated since 2017 and offered ready-to-phish software with multiple subscription tiers – including an “Enterprise” edition that cost $550 for six months of “unlimited VIP support.”

                          Microsoft and the Linux Foundation Projects have sued Nady, and a court document [PDF] unsealed last week indicates all the seized domains are now under Microsoft’s control.

                          “We are taking affirmative action to protect online users globally rather than standing idly by while malicious actors illegally use our names and logos to enhance the perceived legitimacy of their attacks,” Microsoft said.

                          DoD says its handling of controlled cryptographic devices is ▇▇▇▇

                          The US Department of Defense’s inspector general last week released a report on the military’s handling of controlled cryptographic items (CCI) used for secure communications – but you’ll have to take the IG’s word that everything is in good order, because it’s not releasing any details.

                          In a barebones summary [PDF] of the audit, the IG said its review of seven CCI Central Offices of Record (COR) in the DoD did not yield any recommendations.

                          For those who don’t read many US federal government IG reports, a recommendation is made whenever inspectors find noncompliance with some element of government policy – in this case the “handling, controlling, and accounting for CCI.”

                          Zero recommendations means zero problems, we assume, but there’s no way to be sure.

                          “This original evaluation contains a substantial amount of what was determined by the CORs to be controlled unclassified information,” the summary read, “and, therefore, we are unable to release the full report or a redacted version.”

                          If you want to learn more, you’ll have to file a Freedom of Information Request and hope it succeeds.

                          Helldown ransomware begins targeting Linux, VMware ESX

                          The threat actor behind the Helldown ransomware that appeared in August targeting Windows systems has expanded to begin attacking Linux and VMware systems, Sekoia threat researchers have reported.

                          Racking up 31 known victims within three months, Helldown first made its mark by compromising the European subsidiary of telecom equipment vendor Zyxel. Most victims were located in the US.

                          As of late October, Sekoia believes there’s now a Linux variant of the malware, which has been used to conduct double extortion – exfiltrating data before encrypting files.

                          Along with its Linux variant, “it appears that the group could be evolving its current operations to target virtualized infrastructures via VMware,” Sekoia noted.

                          Luckily for potential victims, this isn’t a very sophisticated attack.

                          “Analysis suggests the ransomware they deploy is relatively basic,” Sekoia explained. “The group’s success appears to rely more on its access to undocumented vulnerability code and its effective use of it, making it easier to gain access for its attacks.”

                          Jupyter Notebooks hijacked to stream football

                          Popular data science tools Jupyter Notebooks and JupyterLab are being hijacked by miscreants to stream UEFA matches illegally, cloud native infosec tools vendor Aqua Security has discovered.

                          As part of a honeypot operation to catch threat actors, Aqua said it spotted attackers targeting misconfigured Jupyter environments to drop live-stream capture tools to duplicate live sports broadcasts and “stream rip” them to their own illegal streaming servers.

                          The ingress route appears to rely on both vulnerabilities and weak passwords, Aqua revealed, with threat actors exploiting unauthenticated access to Jupyter Notebooks and Lab environments to establish access and achieve remote code execution.

                          Once in, the attackers dropped ffmpeg – an otherwise legitimate streaming tool – and misused it to stream broadcasts illegally.

                          “While the immediate impact on organizations might appear minimal … it’s crucial to remember that the attackers gained access to a server intended for data analysis, which could have serious consequences for any organization’s operations,” Aqua wrote.

                          Secure those environments, folks. ®

                          ">

                          Infosec in brief Not to make you paranoid, but that business across the street could, under certain conditions, serve as a launching point for Russian cyber spies to compromise your network.

                          Using what it described as “a novel attack vector … not previously encountered,” threat intel and memory forensics firm Volexity reported it’s spotted what it believes to be the APT28 Kremlin-backed threat actor targeting one of its clients by first compromising multiple organizations whose offices are in close physical proximity to the target.

                          Dubbed the “nearest neighbor attack” for lack of “any terminology describing this style of attack,” Volexity explained the multi-step attack began with password-spraying the victim’s web portals to get valid credentials.

                          Those credentials were unusable on the org’s services because it had implemented multifactor authentication – except on its Wi-Fi network.

                          To get around the fact it was targeting a Wi-Fi network thousands of miles away, APT28 breached the target’s neighboring organizations, identified devices with both wired and wireless network adapters, and used them to connect to the target’s Wi-Fi network with the stolen credentials. Once connected, the attackers moved laterally within the network and routed exfiltrated data through compromised machines on neighboring networks.

                          “Volexity’s investigation reveals the lengths a creative, resourceful, and motivated threat actor is willing to go to in order to achieve their cyber espionage objectives,” the security shop observed. “To reiterate, the compromise of these credentials alone did not yield access to the customer’s environment. However, the Wi-Fi network was not protected by MFA, meaning proximity to the target network and valid credentials were the only requirements to connect.”

                          In other words, now you have yet another system to secure with some form of multifactor authentication. Volexity noted that the guest Wi-Fi network was also compromised, and a single system able to access both networks was identified to move into the more sensitive network – so be sure you isolate everything, too.

                          Critical vulnerabilities of the week: Cisco cert lapse warning

                          Cisco reported a critical issue in its Firepower Management Center software this week, affecting versions 6 and 7, that can lead to a loss of management capabilities.

                          According to the report, an internal self-signed root certificate authority valid for ten years might be expiring soon, leaving administrators without the ability to manage connected devices. If it does lapse “a more complex renewal process” will be necessary – so inspect yours and install necessary hotfixes ASAP.

                          Just one active, critical exploit to mention this week that we haven’t already covered:

                          • CVSS 10.0 – CVE-2024-1212: Progress Software’s LoadMaster load balancing software allows unauthenticated users to access it through the management interface, allowing for arbitrary system command execution.

                          There’s one less phisher in the sea

                          Microsoft last week reported that it seized 240 fraudulent websites linked to a Phishing-as-a-Service operation based in Egypt that used the Linux Foundation’s Open Neural Network Exchange (ONNX) to brand its malware.

                          “Abanoub Nady (known online as ‘MRxC0DER’) developed and sold ‘do it yourself’ phish kits and fraudulently used the brand name ‘ONNX,'” Microsoft claimed. Along with the ONNX brand, Nady allegedly marketed his phishing kits under the names Caffeine and FUHRER, Microsoft’s Digital Crimes Unit added.

                          Microsoft wrote that Nady’s outfit operated since 2017 and offered ready-to-phish software with multiple subscription tiers – including an “Enterprise” edition that cost $550 for six months of “unlimited VIP support.”

                          Microsoft and the Linux Foundation Projects have sued Nady, and a court document [PDF] unsealed last week indicates all the seized domains are now under Microsoft’s control.

                          “We are taking affirmative action to protect online users globally rather than standing idly by while malicious actors illegally use our names and logos to enhance the perceived legitimacy of their attacks,” Microsoft said.

                          DoD says its handling of controlled cryptographic devices is ▇▇▇▇

                          The US Department of Defense’s inspector general last week released a report on the military’s handling of controlled cryptographic items (CCI) used for secure communications – but you’ll have to take the IG’s word that everything is in good order, because it’s not releasing any details.

                          In a barebones summary [PDF] of the audit, the IG said its review of seven CCI Central Offices of Record (COR) in the DoD did not yield any recommendations.

                          For those who don’t read many US federal government IG reports, a recommendation is made whenever inspectors find noncompliance with some element of government policy – in this case the “handling, controlling, and accounting for CCI.”

                          Zero recommendations means zero problems, we assume, but there’s no way to be sure.

                          “This original evaluation contains a substantial amount of what was determined by the CORs to be controlled unclassified information,” the summary read, “and, therefore, we are unable to release the full report or a redacted version.”

                          If you want to learn more, you’ll have to file a Freedom of Information Request and hope it succeeds.

                          Helldown ransomware begins targeting Linux, VMware ESX

                          The threat actor behind the Helldown ransomware that appeared in August targeting Windows systems has expanded to begin attacking Linux and VMware systems, Sekoia threat researchers have reported.

                          Racking up 31 known victims within three months, Helldown first made its mark by compromising the European subsidiary of telecom equipment vendor Zyxel. Most victims were located in the US.

                          As of late October, Sekoia believes there’s now a Linux variant of the malware, which has been used to conduct double extortion – exfiltrating data before encrypting files.

                          Along with its Linux variant, “it appears that the group could be evolving its current operations to target virtualized infrastructures via VMware,” Sekoia noted.

                          Luckily for potential victims, this isn’t a very sophisticated attack.

                          “Analysis suggests the ransomware they deploy is relatively basic,” Sekoia explained. “The group’s success appears to rely more on its access to undocumented vulnerability code and its effective use of it, making it easier to gain access for its attacks.”

                          Jupyter Notebooks hijacked to stream football

                          Popular data science tools Jupyter Notebooks and JupyterLab are being hijacked by miscreants to stream UEFA matches illegally, cloud native infosec tools vendor Aqua Security has discovered.

                          As part of a honeypot operation to catch threat actors, Aqua said it spotted attackers targeting misconfigured Jupyter environments to drop live-stream capture tools to duplicate live sports broadcasts and “stream rip” them to their own illegal streaming servers.

                          The ingress route appears to rely on both vulnerabilities and weak passwords, Aqua revealed, with threat actors exploiting unauthenticated access to Jupyter Notebooks and Lab environments to establish access and achieve remote code execution.

                          Once in, the attackers dropped ffmpeg – an otherwise legitimate streaming tool – and misused it to stream broadcasts illegally.

                          “While the immediate impact on organizations might appear minimal … it’s crucial to remember that the attackers gained access to a server intended for data analysis, which could have serious consequences for any organization’s operations,” Aqua wrote.

                          Secure those environments, folks. ®

                          ">

                          Infosec in brief Not to make you paranoid, but that business across the street could, under certain conditions, serve as a launching point for Russian cyber spies to compromise your network.

                          Using what it described as “a novel attack vector … not previously encountered,” threat intel and memory forensics firm Volexity reported it’s spotted what it believes to be the APT28 Kremlin-backed threat actor targeting one of its clients by first compromising multiple organizations whose offices are in close physical proximity to the target.

                          Dubbed the “nearest neighbor attack” for lack of “any terminology describing this style of attack,” Volexity explained the multi-step attack began with password-spraying the victim’s web portals to get valid credentials.

                          Those credentials were unusable on the org’s services because it had implemented multifactor authentication – except on its Wi-Fi network.

                          To get around the fact it was targeting a Wi-Fi network thousands of miles away, APT28 breached the target’s neighboring organizations, identified devices with both wired and wireless network adapters, and used them to connect to the target’s Wi-Fi network with the stolen credentials. Once connected, the attackers moved laterally within the network and routed exfiltrated data through compromised machines on neighboring networks.

                          “Volexity’s investigation reveals the lengths a creative, resourceful, and motivated threat actor is willing to go to in order to achieve their cyber espionage objectives,” the security shop observed. “To reiterate, the compromise of these credentials alone did not yield access to the customer’s environment. However, the Wi-Fi network was not protected by MFA, meaning proximity to the target network and valid credentials were the only requirements to connect.”

                          In other words, now you have yet another system to secure with some form of multifactor authentication. Volexity noted that the guest Wi-Fi network was also compromised, and a single system able to access both networks was identified to move into the more sensitive network – so be sure you isolate everything, too.

                          Critical vulnerabilities of the week: Cisco cert lapse warning

                          Cisco reported a critical issue in its Firepower Management Center software this week, affecting versions 6 and 7, that can lead to a loss of management capabilities.

                          According to the report, an internal self-signed root certificate authority valid for ten years might be expiring soon, leaving administrators without the ability to manage connected devices. If it does lapse “a more complex renewal process” will be necessary – so inspect yours and install necessary hotfixes ASAP.

                          Just one active, critical exploit to mention this week that we haven’t already covered:

                          • CVSS 10.0 – CVE-2024-1212: Progress Software’s LoadMaster load balancing software allows unauthenticated users to access it through the management interface, allowing for arbitrary system command execution.

                          There’s one less phisher in the sea

                          Microsoft last week reported that it seized 240 fraudulent websites linked to a Phishing-as-a-Service operation based in Egypt that used the Linux Foundation’s Open Neural Network Exchange (ONNX) to brand its malware.

                          “Abanoub Nady (known online as ‘MRxC0DER’) developed and sold ‘do it yourself’ phish kits and fraudulently used the brand name ‘ONNX,'” Microsoft claimed. Along with the ONNX brand, Nady allegedly marketed his phishing kits under the names Caffeine and FUHRER, Microsoft’s Digital Crimes Unit added.

                          Microsoft wrote that Nady’s outfit operated since 2017 and offered ready-to-phish software with multiple subscription tiers – including an “Enterprise” edition that cost $550 for six months of “unlimited VIP support.”

                          Microsoft and the Linux Foundation Projects have sued Nady, and a court document [PDF] unsealed last week indicates all the seized domains are now under Microsoft’s control.

                          “We are taking affirmative action to protect online users globally rather than standing idly by while malicious actors illegally use our names and logos to enhance the perceived legitimacy of their attacks,” Microsoft said.

                          DoD says its handling of controlled cryptographic devices is ▇▇▇▇

                          The US Department of Defense’s inspector general last week released a report on the military’s handling of controlled cryptographic items (CCI) used for secure communications – but you’ll have to take the IG’s word that everything is in good order, because it’s not releasing any details.

                          In a barebones summary [PDF] of the audit, the IG said its review of seven CCI Central Offices of Record (COR) in the DoD did not yield any recommendations.

                          For those who don’t read many US federal government IG reports, a recommendation is made whenever inspectors find noncompliance with some element of government policy – in this case the “handling, controlling, and accounting for CCI.”

                          Zero recommendations means zero problems, we assume, but there’s no way to be sure.

                          “This original evaluation contains a substantial amount of what was determined by the CORs to be controlled unclassified information,” the summary read, “and, therefore, we are unable to release the full report or a redacted version.”

                          If you want to learn more, you’ll have to file a Freedom of Information Request and hope it succeeds.

                          Helldown ransomware begins targeting Linux, VMware ESX

                          The threat actor behind the Helldown ransomware that appeared in August targeting Windows systems has expanded to begin attacking Linux and VMware systems, Sekoia threat researchers have reported.

                          Racking up 31 known victims within three months, Helldown first made its mark by compromising the European subsidiary of telecom equipment vendor Zyxel. Most victims were located in the US.

                          As of late October, Sekoia believes there’s now a Linux variant of the malware, which has been used to conduct double extortion – exfiltrating data before encrypting files.

                          Along with its Linux variant, “it appears that the group could be evolving its current operations to target virtualized infrastructures via VMware,” Sekoia noted.

                          Luckily for potential victims, this isn’t a very sophisticated attack.

                          “Analysis suggests the ransomware they deploy is relatively basic,” Sekoia explained. “The group’s success appears to rely more on its access to undocumented vulnerability code and its effective use of it, making it easier to gain access for its attacks.”

                          Jupyter Notebooks hijacked to stream football

                          Popular data science tools Jupyter Notebooks and JupyterLab are being hijacked by miscreants to stream UEFA matches illegally, cloud native infosec tools vendor Aqua Security has discovered.

                          As part of a honeypot operation to catch threat actors, Aqua said it spotted attackers targeting misconfigured Jupyter environments to drop live-stream capture tools to duplicate live sports broadcasts and “stream rip” them to their own illegal streaming servers.

                          The ingress route appears to rely on both vulnerabilities and weak passwords, Aqua revealed, with threat actors exploiting unauthenticated access to Jupyter Notebooks and Lab environments to establish access and achieve remote code execution.

                          Once in, the attackers dropped ffmpeg – an otherwise legitimate streaming tool – and misused it to stream broadcasts illegally.

                          “While the immediate impact on organizations might appear minimal … it’s crucial to remember that the attackers gained access to a server intended for data analysis, which could have serious consequences for any organization’s operations,” Aqua wrote.

                          Secure those environments, folks. ®

                          ">

                          Infosec in brief Not to make you paranoid, but that business across the street could, under certain conditions, serve as a launching point for Russian cyber spies to compromise your network.

                          Using what it described as “a novel attack vector … not previously encountered,” threat intel and memory forensics firm Volexity reported it’s spotted what it believes to be the APT28 Kremlin-backed threat actor targeting one of its clients by first compromising multiple organizations whose offices are in close physical proximity to the target.

                          Dubbed the “nearest neighbor attack” for lack of “any terminology describing this style of attack,” Volexity explained the multi-step attack began with password-spraying the victim’s web portals to get valid credentials.

                          Those credentials were unusable on the org’s services because it had implemented multifactor authentication – except on its Wi-Fi network.

                          To get around the fact it was targeting a Wi-Fi network thousands of miles away, APT28 breached the target’s neighboring organizations, identified devices with both wired and wireless network adapters, and used them to connect to the target’s Wi-Fi network with the stolen credentials. Once connected, the attackers moved laterally within the network and routed exfiltrated data through compromised machines on neighboring networks.

                          “Volexity’s investigation reveals the lengths a creative, resourceful, and motivated threat actor is willing to go to in order to achieve their cyber espionage objectives,” the security shop observed. “To reiterate, the compromise of these credentials alone did not yield access to the customer’s environment. However, the Wi-Fi network was not protected by MFA, meaning proximity to the target network and valid credentials were the only requirements to connect.”

                          In other words, now you have yet another system to secure with some form of multifactor authentication. Volexity noted that the guest Wi-Fi network was also compromised, and a single system able to access both networks was identified to move into the more sensitive network – so be sure you isolate everything, too.

                          Critical vulnerabilities of the week: Cisco cert lapse warning

                          Cisco reported a critical issue in its Firepower Management Center software this week, affecting versions 6 and 7, that can lead to a loss of management capabilities.

                          According to the report, an internal self-signed root certificate authority valid for ten years might be expiring soon, leaving administrators without the ability to manage connected devices. If it does lapse “a more complex renewal process” will be necessary – so inspect yours and install necessary hotfixes ASAP.

                          Just one active, critical exploit to mention this week that we haven’t already covered:

                          • CVSS 10.0 – CVE-2024-1212: Progress Software’s LoadMaster load balancing software allows unauthenticated users to access it through the management interface, allowing for arbitrary system command execution.

                          There’s one less phisher in the sea

                          Microsoft last week reported that it seized 240 fraudulent websites linked to a Phishing-as-a-Service operation based in Egypt that used the Linux Foundation’s Open Neural Network Exchange (ONNX) to brand its malware.

                          “Abanoub Nady (known online as ‘MRxC0DER’) developed and sold ‘do it yourself’ phish kits and fraudulently used the brand name ‘ONNX,'” Microsoft claimed. Along with the ONNX brand, Nady allegedly marketed his phishing kits under the names Caffeine and FUHRER, Microsoft’s Digital Crimes Unit added.

                          Microsoft wrote that Nady’s outfit operated since 2017 and offered ready-to-phish software with multiple subscription tiers – including an “Enterprise” edition that cost $550 for six months of “unlimited VIP support.”

                          Microsoft and the Linux Foundation Projects have sued Nady, and a court document [PDF] unsealed last week indicates all the seized domains are now under Microsoft’s control.

                          “We are taking affirmative action to protect online users globally rather than standing idly by while malicious actors illegally use our names and logos to enhance the perceived legitimacy of their attacks,” Microsoft said.

                          DoD says its handling of controlled cryptographic devices is ▇▇▇▇

                          The US Department of Defense’s inspector general last week released a report on the military’s handling of controlled cryptographic items (CCI) used for secure communications – but you’ll have to take the IG’s word that everything is in good order, because it’s not releasing any details.

                          In a barebones summary [PDF] of the audit, the IG said its review of seven CCI Central Offices of Record (COR) in the DoD did not yield any recommendations.

                          For those who don’t read many US federal government IG reports, a recommendation is made whenever inspectors find noncompliance with some element of government policy – in this case the “handling, controlling, and accounting for CCI.”

                          Zero recommendations means zero problems, we assume, but there’s no way to be sure.

                          “This original evaluation contains a substantial amount of what was determined by the CORs to be controlled unclassified information,” the summary read, “and, therefore, we are unable to release the full report or a redacted version.”

                          If you want to learn more, you’ll have to file a Freedom of Information Request and hope it succeeds.

                          Helldown ransomware begins targeting Linux, VMware ESX

                          The threat actor behind the Helldown ransomware that appeared in August targeting Windows systems has expanded to begin attacking Linux and VMware systems, Sekoia threat researchers have reported.

                          Racking up 31 known victims within three months, Helldown first made its mark by compromising the European subsidiary of telecom equipment vendor Zyxel. Most victims were located in the US.

                          As of late October, Sekoia believes there’s now a Linux variant of the malware, which has been used to conduct double extortion – exfiltrating data before encrypting files.

                          Along with its Linux variant, “it appears that the group could be evolving its current operations to target virtualized infrastructures via VMware,” Sekoia noted.

                          Luckily for potential victims, this isn’t a very sophisticated attack.

                          “Analysis suggests the ransomware they deploy is relatively basic,” Sekoia explained. “The group’s success appears to rely more on its access to undocumented vulnerability code and its effective use of it, making it easier to gain access for its attacks.”

                          Jupyter Notebooks hijacked to stream football

                          Popular data science tools Jupyter Notebooks and JupyterLab are being hijacked by miscreants to stream UEFA matches illegally, cloud native infosec tools vendor Aqua Security has discovered.

                          As part of a honeypot operation to catch threat actors, Aqua said it spotted attackers targeting misconfigured Jupyter environments to drop live-stream capture tools to duplicate live sports broadcasts and “stream rip” them to their own illegal streaming servers.

                          The ingress route appears to rely on both vulnerabilities and weak passwords, Aqua revealed, with threat actors exploiting unauthenticated access to Jupyter Notebooks and Lab environments to establish access and achieve remote code execution.

                          Once in, the attackers dropped ffmpeg – an otherwise legitimate streaming tool – and misused it to stream broadcasts illegally.

                          “While the immediate impact on organizations might appear minimal … it’s crucial to remember that the attackers gained access to a server intended for data analysis, which could have serious consequences for any organization’s operations,” Aqua wrote.

                          Secure those environments, folks. ®

                          Tags: Russianspies
                          ">
                          Ferhan Rana

                          Ferhan Rana

                          Related Posts

                          Robotic lawnmower uses AI to dodge cats, toys
                          Technology

                          Robotic lawnmower uses AI to dodge cats, toys

                          by Ferhan Rana
                          November 1, 2025
                          AI blew open software security, now OpenAI wants to fix it with an agent called Aardvark
                          Technology

                          AI blew open software security, now OpenAI wants to fix it with an agent called Aardvark

                          by Ferhan Rana
                          November 1, 2025
                          Interstellar Comet 3I/ATLAS Dazzles As It Swoops Behind the Sun
                          Technology

                          Interstellar Comet 3I/ATLAS Dazzles As It Swoops Behind the Sun

                          by Ferhan Rana
                          October 31, 2025
                          The Final ‘Frankenstein’ Trailer Is Here to Haunt Your Halloween
                          Technology

                          The Final ‘Frankenstein’ Trailer Is Here to Haunt Your Halloween

                          by Ferhan Rana
                          October 31, 2025
                          DNS downing clouds is boring: IBM Cloud is experiencing a quantum computer outage
                          Technology

                          DNS downing clouds is boring: IBM Cloud is experiencing a quantum computer outage

                          by Ferhan Rana
                          October 30, 2025

                          Premium Content

                          Trump threatens to add formal Apple Tax on top of the ‘Apple tax’

                          Trump threatens to add formal Apple Tax on top of the ‘Apple tax’

                          May 27, 2025
                          An appearance back at MLB Expansion Draft history

                          An appearance back at MLB Expansion Draft history

                          December 14, 2021
                          Prince Charles states he’ll assist authorities examine cash-for-honours scandal including his closest assistant

                          Prince Charles states he’ll assist authorities examine cash-for-honours scandal including his closest assistant

                          December 8, 2021

                          Browse by Category

                          • Business
                          • Crypto
                          • Entertainment
                          • Fashion
                          • Health
                          • Lifestyle
                          • Real Estate
                          • Sports
                          • Technology
                          • Travel
                          • Uncategorized
                          • World

                          Browse by Tags

                          Andrew announces Apple Barcelona Charles Elizabeth Europe Exclusive First George Google Harry health Inside Intel James Jennifer Kelly Lewis makes Manchester Markle Meghan Michael Microsoft Middleton people Prince Princess Queen REPORT reveals Review Royal Samsung Shares Taylor Trump Twitter wants WATCH William Woman World Years
                          TrivDaily

                          Get the latest World news and analysis, breaking news, features and special reports from World. Also watch videos from across the Europian continent.

                          Learn more

                          Categories

                          • Business
                          • Crypto
                          • Entertainment
                          • Fashion
                          • Health
                          • Lifestyle
                          • Real Estate
                          • Sports
                          • Technology
                          • Travel
                          • Uncategorized
                          • World

                          Browse by Tag

                          Business (1450) Crypto (1503) Entertainment (1856) Fashion (3) Health (1612) Lifestyle (1763) Real Estate (40) Sports (2819) Technology (2803) Travel (1367) Uncategorized (11) World (23)

                          Recent Posts

                          • Trump’s Oval Office Photo With Kids Triggers Fierce Online Outrage: ‘Child Endangerment’
                          • Cam Skattebo Launches New Career After Giants Announce Decision on Injured RB
                          • Virginia Injury Report: Tony Elliott Receives Concerning Chandler Morris Health Update

                          © 2021 TrivDaily - Developed by ADSA Solutions.

                          Welcome Back!

                          Login to your account below

                          Forgotten Password? Sign Up

                          Create New Account!

                          Fill the forms bellow to register

                          All fields are required. Log In

                          Retrieve your password

                          Please enter your username or email address to reset your password.

                          Log In

                          Add New Playlist

                          • Login
                          • Sign Up
                          • Cart
                          No Result
                          View All Result
                          • Home
                          • Business News
                          • Entertainment News
                          • Lifestyle News
                          • Health News
                          • Tech News
                          • Real Estate News
                          • World News

                          © 2021 TrivDaily - Developed by ADSA Solutions.

                          Are you sure want to unlock this post?
                          Unlock left : 0
                          Are you sure want to cancel subscription?