Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trojan Warning: Malware Identified in VAHAN PARIVAHAN.apk

The Foresiet Threat Intelligence Team has recently conducted an in-depth analysis of an Android malware Trojan masquerading as the "VAHAN PARIVAHAN.apk" application. This trojan poses a significant threat to users by leveraging a backdoor, utilizing the Telegram API bot, and exploiting the services of GoDaddy.com LLC and Mark Monitor Inc. In this blog, we delve into the specifics of this malware, including its technical details, behavior, and potential impact on users.

Significant Surge in Cyber Activity Targeting Upcoming Indian General Election

Foresiet, your trusted cybersecurity partner, brings to light a dramatic increase in cyber activity aimed at disrupting the upcoming Indian general election. This uptick, primarily driven by various hacktivist groups, has led to the exposure of personal identifiable information (PII) of Indian citizens on the dark web. The election, which will be held in seven phases from April 19 to June 1, 2024, will elect all 543 members of the Lok Sabha, with results announced on June 4, 2024.

ShrinkLocker: Turning BitLocker into Ransomware

Attackers are continually developing sophisticated techniques to bypass defensive measures and achieve their goals. One highly effective approach involves exploiting the operating system's native features to evade detection and ensure compatibility. In the realm of ransomware threats, this can be seen in the use of the cryptographic functions within ADVAPI32.dll, such as CryptAcquireContextA, CryptEncrypt, and CryptDecrypt.

Container Security: Protect your data with Calico Egress Access Controls

23andMe is a popular genetics testing company, which was valued at $6B in 2021. Unfortunately, there was a massive data breach in December 2023, which caused a steep decline in the company’s value and trust, plummeting the company to a penny stock. While this breach was not directly related to Kubernetes, the same risks apply to containers running in your Kubernetes environments.

The basics of securing GenAI and LLM development

With the rapid adoption of AI-enabled services into production applications, it’s important that organizations are able to secure the AI/ML components coming into their software supply chain. The good news is that even if you don’t have a tool specifically for scanning models themselves, you can still apply the same DevSecOps best practices to securing model development.

CrowdStrike Brings Industry-Leading ITDR to All Major Cloud-Based Identity Providers

Today, we’re announcing new capabilities of CrowdStrike Falcon Identity Protection to further strengthen our industry-leading identity threat detection and response (ITDR) technology and help customers secure their cloud-based identity environments from cyberattacks.

Navigating the NIS 2 Landscape - Part 1

The European Union (EU) is taking a significant step forward in the fight against cybercrime by introducing the Network and Information Systems Directive 2, or NIS 2. This directive represents a major overhaul of cybersecurity regulations across the continent, aiming to bolster defenses against the ever-evolving threats of the digital age. In this first of four blog posts, we will introduce the basics of NIS 2.

Understanding PCI DSS 4.0: What You Need to Know

If you're in a business that handles credit cards, you already know how crucial it is to keep that data secure. PCI DSS is a set of compliance requirements that ensure all companies handling cardholder data keep it secure. And that it's not just a good idea—it's a must. As cyber threats become more sophisticated, it's challenging to keep pace with complex security and compliance landscapes.

Break free from IAM limitations: How disconnected identities throttle your business and what you can do about it

Imagine this: a sales representative at your company needs to update customer information in your CRM system. She enters her login credentials, but the system rejects them. After a frustrating series of password resets and calls to IT, she finally gains access. But her ordeal isn't over yet. She still needs to log into several other applications: the marketing automation platform, the customer support portal and the internal communication tool – each with its own unique username and password.

Growing Attack Surfaces Highlight the Need for Managed Detection and Response Services

One reason organizations have difficulty defending against cyber threats is their attack surfaces are constantly growing, creating more entry points for bad actors to target. And target they will, creating an onslaught of alerts that drive the need for managed detection and response (MDR) services and other measures to help thwart them. Numerous trends are driving the increase in attack surface, including the proliferation of Internet of Things (IoT) devices.