New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide

September 18, 2024 – Cybersecurity researchers have uncovered a massive new botnet, dubbed “Raptor Train,” which has compromised over 200,000 Internet of Things (IoT) devices globally. This botnet, believed to be operated by a Chinese nation-state threat actor known as Flax Typhoon, has been active for several years, targeting critical infrastructure and various organizations worldwide12. Botnet Details…

Read More

Cybersecurity in IoT (Internet of Things)

Connect with Vishnu Linkedin Instagram X-twitter Github Abstract This paper delves into the cybersecurity challenges and solutions within the Internet of Things (IoT) ecosystem. As billions of devices connect to the internet, the need for robust security measures grows more urgent. This study identifies the cybersecurity risks associated with IoT networks, evaluates current strategies for…

Read More

Data Encryption Techniques: A Comprehensive Guide to Safeguarding Information

Connect with KALAISELVAN G Linkedin Instagram X-twitter In today’s digital landscape, protecting sensitive data is of utmost importance as cyber threats  evolve and become more sophisticated. Data encryption is one of the most critical tools used to  safeguard information, transforming readable data (plaintext) into an unreadable format (ciphertext)  to prevent unauthorized access. Whether it’s securing…

Read More
Qualcomm

Qualcomm Urges OEMs to Fix Critical DSP, WLANFlaws

October 08, 2024 – Qualcomm has recently issued a critical advisory urging original equipment manufacturers (OEMs) to address significant vulnerabilities in its chipsets, specifically targeting flaws in the Digital Signal Processor (DSP) and WLAN components. These vulnerabilities, designated as CVE-2024-43047 and CVE-2024-33028, have been linked to ongoing active exploits, raising alarms about the security of billions of…

Read More

How Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware

Kanpur, India – September 23, 2024 – A sophisticated cyber-espionage campaign orchestrated by a China-linked group, dubbed “Earth Baxia,” has been uncovered, targeting several Asia-Pacific (APAC) nations. The attackers exploited a vulnerability in the open-source GeoServer software, identified as CVE-2024-36401, to deploy the EAGLEDOOR malware, compromising critical infrastructure and government agencies across the region12. The Attack Vector…

Read More
thelegendavanish

Unleashing the Power of Ethical Hacking: Exploring the World of Responsible Security

Introduction: In an interconnected world where technology plays a pivotal role, securing our digital infrastructure has become an imperative. As cyber threats continue to evolve and become increasingly sophisticated, it is essential to adopt proactive measures to protect our data, privacy, and online systems. This is where ethical hacking steps in – a powerful approach…

Read More
thelegendavanish

TOP-30 MOST USED LINUX COMMANDS

Here’s the list of common Linux commands with examples that might be a great cheat sheet for any developer: 1. cd Linux command The cd command is one of the most used Linux commands. The purpose of this command is to change the directory. This cd command, popularly called chdir (change directory), is a code administrative command used in several…

Read More