Eureka Learners & Blog & Joy Livingstone https://blog.elfglobal.org/rss/author/joy-livingstone Eureka Learners & Blog & Joy Livingstone en Copyright © 2023 Eureka Learners Foundation | All Rights Reserved Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023 https://blog.elfglobal.org/google-prevented-228-million-malicious-apps-from-reaching-play-store-in-2023 https://blog.elfglobal.org/google-prevented-228-million-malicious-apps-from-reaching-play-store-in-2023 Tue, 30 Apr 2024 03:20:51 +0100 Joy Livingstone China&Linked 'Muddling Meerkat' Hijacks DNS to Map Internet on Global Scale https://blog.elfglobal.org/china-linked-muddling-meerkat-hijacks-dns-to-map-internet-on-global-scale https://blog.elfglobal.org/china-linked-muddling-meerkat-hijacks-dns-to-map-internet-on-global-scale Tue, 30 Apr 2024 03:20:51 +0100 Joy Livingstone Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM https://blog.elfglobal.org/navigating-the-threat-landscape-understanding-exposure-management-pentesting-red-teaming-and-rbvm https://blog.elfglobal.org/navigating-the-threat-landscape-understanding-exposure-management-pentesting-red-teaming-and-rbvm Tue, 30 Apr 2024 03:20:51 +0100 Joy Livingstone New R Programming Vulnerability Exposes Projects to Supply Chain Attacks https://blog.elfglobal.org/new-r-programming-vulnerability-exposes-projects-to-supply-chain-attacks https://blog.elfglobal.org/new-r-programming-vulnerability-exposes-projects-to-supply-chain-attacks Tue, 30 Apr 2024 03:20:51 +0100 Joy Livingstone Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover https://blog.elfglobal.org/sandbox-escape-vulnerabilities-in-judge0-expose-systems-to-complete-takeover https://blog.elfglobal.org/sandbox-escape-vulnerabilities-in-judge0-expose-systems-to-complete-takeover Tue, 30 Apr 2024 03:20:51 +0100 Joy Livingstone Okta Warns of Unprecedented Surge in Proxy&Driven Credential Stuffing Attacks https://blog.elfglobal.org/okta-warns-of-unprecedented-surge-in-proxy-driven-credential-stuffing-attacks https://blog.elfglobal.org/okta-warns-of-unprecedented-surge-in-proxy-driven-credential-stuffing-attacks Tue, 30 Apr 2024 03:20:51 +0100 Joy Livingstone Ukraine Targeted in Cyberattack Exploiting 7&Year&Old Microsoft Office Flaw https://blog.elfglobal.org/ukraine-targeted-in-cyberattack-exploiting-7-year-old-microsoft-office-flaw https://blog.elfglobal.org/ukraine-targeted-in-cyberattack-exploiting-7-year-old-microsoft-office-flaw Tue, 30 Apr 2024 03:20:51 +0100 Joy Livingstone OfflRouter Malware Evades Detection in Ukraine for Almost a Decade https://blog.elfglobal.org/offlrouter-malware-evades-detection-in-ukraine-for-almost-a-decade https://blog.elfglobal.org/offlrouter-malware-evades-detection-in-ukraine-for-almost-a-decade Sat, 20 Apr 2024 22:13:22 +0100 Joy Livingstone Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers https://blog.elfglobal.org/akira-ransomware-gang-extorts-42-million-now-targets-linux-servers https://blog.elfglobal.org/akira-ransomware-gang-extorts-42-million-now-targets-linux-servers Sat, 20 Apr 2024 22:13:19 +0100 Joy Livingstone Hackers Target Middle East Governments with Evasive "CR4T" Backdoor https://blog.elfglobal.org/hackers-target-middle-east-governments-with-evasive-cr4t-backdoor https://blog.elfglobal.org/hackers-target-middle-east-governments-with-evasive-cr4t-backdoor Sat, 20 Apr 2024 22:13:16 +0100 Joy Livingstone How Attackers Can Own a Business Without Touching the Endpoint https://blog.elfglobal.org/how-attackers-can-own-a-business-without-touching-the-endpoint https://blog.elfglobal.org/how-attackers-can-own-a-business-without-touching-the-endpoint Sat, 20 Apr 2024 22:10:23 +0100 Joy Livingstone BlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Tool https://blog.elfglobal.org/blacktech-targets-tech-research-and-gov-sectors-new-deuterbear-tool https://blog.elfglobal.org/blacktech-targets-tech-research-and-gov-sectors-new-deuterbear-tool Sat, 20 Apr 2024 22:10:19 +0100 Joy Livingstone Critical Update: CrushFTP Zero&Day Flaw Exploited in Targeted Attacks https://blog.elfglobal.org/critical-update-crushftp-zero-day-flaw-exploited-in-targeted-attacks https://blog.elfglobal.org/critical-update-crushftp-zero-day-flaw-exploited-in-targeted-attacks Sat, 20 Apr 2024 22:10:16 +0100 Joy Livingstone Palo Alto Networks Discloses More Details on Critical PAN&OS Flaw Under Attack https://blog.elfglobal.org/palo-alto-networks-discloses-more-details-on-critical-pan-os-flaw-under-attack https://blog.elfglobal.org/palo-alto-networks-discloses-more-details-on-critical-pan-os-flaw-under-attack Sat, 20 Apr 2024 22:09:46 +0100 Joy Livingstone CISA orders agencies impacted by Microsoft hack to mitigate risks https://blog.elfglobal.org/cisa-orders-agencies-impacted-by-microsoft-hack-to-mitigate-risks https://blog.elfglobal.org/cisa-orders-agencies-impacted-by-microsoft-hack-to-mitigate-risks Sat, 13 Apr 2024 19:31:32 +0100 Joy Livingstone Iranian MuddyWater Hackers Adopt New C2 Tool 'DarkBeatC2' in Latest Campaign https://blog.elfglobal.org/iranian-muddywater-hackers-adopt-new-c2-tool-darkbeatc2-in-latest-campaign https://blog.elfglobal.org/iranian-muddywater-hackers-adopt-new-c2-tool-darkbeatc2-in-latest-campaign Sat, 13 Apr 2024 16:00:57 +0100 Joy Livingstone Code Keepers: Mastering Non&Human Identity Management https://blog.elfglobal.org/code-keepers-mastering-non-human-identity-management https://blog.elfglobal.org/code-keepers-mastering-non-human-identity-management Sat, 13 Apr 2024 16:00:38 +0100 Joy Livingstone Popular Rust Crate liblzma&sys Compromised with XZ Utils Backdoor Files https://blog.elfglobal.org/popular-rust-crate-liblzma-sys-compromised-with-xz-utils-backdoor-files https://blog.elfglobal.org/popular-rust-crate-liblzma-sys-compromised-with-xz-utils-backdoor-files Sat, 13 Apr 2024 16:00:21 +0100 Joy Livingstone Hackers Deploy Python Backdoor in Palo Alto Zero&Day Attack https://blog.elfglobal.org/hackers-deploy-python-backdoor-in-palo-alto-zero-day-attack https://blog.elfglobal.org/hackers-deploy-python-backdoor-in-palo-alto-zero-day-attack Sat, 13 Apr 2024 15:39:13 +0100 Joy Livingstone Iran&Linked UNC1549 Hackers Target Middle East Aerospace & Defense Sectors https://blog.elfglobal.org/iran-linked-unc1549-hackers-target-middle-east-aerospace-defense-sectors https://blog.elfglobal.org/iran-linked-unc1549-hackers-target-middle-east-aerospace-defense-sectors Thu, 29 Feb 2024 01:09:05 +0100 Joy Livingstone FBI Warns U.S. Healthcare Sector of Targeted BlackCat Ransomware Attacks https://blog.elfglobal.org/fbi-warns-us-healthcare-sector-of-targeted-blackcat-ransomware-attacks https://blog.elfglobal.org/fbi-warns-us-healthcare-sector-of-targeted-blackcat-ransomware-attacks Thu, 29 Feb 2024 01:09:05 +0100 Joy Livingstone Superusers Need Super Protection: How to Bridge Privileged Access Management and Identity Management https://blog.elfglobal.org/superusers-need-super-protection-how-to-bridge-privileged-access-management-and-identity-management https://blog.elfglobal.org/superusers-need-super-protection-how-to-bridge-privileged-access-management-and-identity-management Thu, 29 Feb 2024 01:09:05 +0100 Joy Livingstone