CISA, NSA, FBI, & global partners disclose the top exploited vulnerabilities of 2022. Beware of CVE-2018-13379, a 4-year-old Fortinet FortiOS SSL flaw still targeted by cybercriminals.
Read: https://thehackernews.com/2023/08/major-cybersecurity-agencies.html
Patch NOW to protect your organization.
Read: https://thehackernews.com/2023/08/major-cybersecurity-agencies.html
Patch NOW to protect your organization.
👍39🔥13😱2
A married couple from NYC pleads guilty to money laundering charges related to the 2016 Bitfinex hack. They were involved in the theft of around 120,000 Bitcoin, valued at $3.6 billion at the time.
Read: https://thehackernews.com/2023/08/nyc-couple-pleads-guilty-to-money.html
Read: https://thehackernews.com/2023/08/nyc-couple-pleads-guilty-to-money.html
🤯67👍14👏6🔥4🤔4
⚠️ ALERT: High-severity security flaw in PaperCut print management software for Windows!
CVE-2023-39143 enables remote code execution. Update to version 22.1.3 for protection!
Learn more about this: https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html
CVE-2023-39143 enables remote code execution. Update to version 22.1.3 for protection!
Learn more about this: https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html
👏18👍5🔥4😁3
Microsoft has finally addressed a critical vulnerability in the Power Platform after facing criticism for the delay. Unauthorized access to Custom Code functions may lead to data disclosure.
Read: https://thehackernews.com/2023/08/microsoft-addresses-critical-power.html
Take immediate action to secure your system. #infosec
Read: https://thehackernews.com/2023/08/microsoft-addresses-critical-power.html
Take immediate action to secure your system. #infosec
👍18🔥7
🔒 Threat actors are targeting Linux systems in South Korea using the open-source rootkit Reptile, providing them with a reverse shell to gain easy control.
Learn more: https://thehackernews.com/2023/08/reptile-rootkit-advanced-linux-malware.html
Learn more: https://thehackernews.com/2023/08/reptile-rootkit-advanced-linux-malware.html
🔥15👍8👏1😱1
🔒 Strengthen your organization's security with Managed Detection and Response (MDR).
Outsource security operations for real-time threat hunting and better protection.
Read here: https://thehackernews.com/2023/08/mdr-empowering-organizations-with.html
Protect email, cloud services, IoT, and more from relentless threats.
Outsource security operations for real-time threat hunting and better protection.
Read here: https://thehackernews.com/2023/08/mdr-empowering-organizations-with.html
Protect email, cloud services, IoT, and more from relentless threats.
👍28🔥9🤔5🤯4
🚨 Attention, everyone! The FBI has issued a warning regarding sneaky cyber crooks who are pretending to be NFT developers. Their intention is to steal your cryptocurrency and digital assets!
For more information, please visit: https://thehackernews.com/2023/08/fbi-alert-crypto-scammers-are.html
For more information, please visit: https://thehackernews.com/2023/08/fbi-alert-crypto-scammers-are.html
🤯21👍17🔥5😁2
📢 Attention Linux users!
A dangerous new variant of SkidMap malware is targeting vulnerable Redis services across various distributions. Learn more about this threat and how to protect your infrastructure.
Details: https://thehackernews.com/2023/08/new-skidmap-redis-malware-variant.html
A dangerous new variant of SkidMap malware is targeting vulnerable Redis services across various distributions. Learn more about this threat and how to protect your infrastructure.
Details: https://thehackernews.com/2023/08/new-skidmap-redis-malware-variant.html
🤯11👍9😱2👏1🤔1
Watch out! Academics have developed a powerful "deep learning-based acoustic side-channel attack" that can classify laptop keystrokes recorded using a nearby phone with 95% accuracy!
Read: https://thehackernews.com/2023/08/new-deep-learning-attack-deciphers.html
Read: https://thehackernews.com/2023/08/new-deep-learning-attack-deciphers.html
🤯24🔥13👍9😁1
🔒 Enhance your organization's security posture with Wazuh, the open-source XDR and SIEM platform! Monitor, detect, and respond to threats effectively.
Read: https://thehackernews.com/2023/08/enhancing-security-operations-using.html
Read: https://thehackernews.com/2023/08/enhancing-security-operations-using.html
👍16⚡13
Cybersecurity researchers uncover North Korean hackers' latest cyber intrusion into a major Russian missile engineering company.
Learn more about this: https://thehackernews.com/2023/08/north-korean-hackers-targets-russian.html
Learn more about this: https://thehackernews.com/2023/08/north-korean-hackers-targets-russian.html
👍19😱18🔥7🤔3
New malware campaign uses OpenBullet configs to target inexperienced cyber criminals, delivering a dangerous RAT that steals sensitive information.
Read more about it here: https://thehackernews.com/2023/08/new-malware-campaign-targets.html
Read more about it here: https://thehackernews.com/2023/08/new-malware-campaign-targets.html
👍20🔥14🤯5😁4👏2
Attention, security teams! Hackers are weaponizing trusted system utilities for malicious intents.
Find out how LOLBAS empowers them to launch covert cyber-attacks.
Read: https://thehackernews.com/2023/08/lolbas-in-wild-11-living-off-land.html
Find out how LOLBAS empowers them to launch covert cyber-attacks.
Read: https://thehackernews.com/2023/08/lolbas-in-wild-11-living-off-land.html
👍20🔥4🤯1😱1
🚨 Yashma ransomware is on the rampage, hitting English-speaking nations, Bulgaria, China, and Vietnam! Leaked builders are fueling this dangerous wave of attacks.
Read: https://thehackernews.com/2023/08/new-yashma-ransomware-variant-targets.html
Read: https://thehackernews.com/2023/08/new-yashma-ransomware-variant-targets.html
🔥10👍7😁4⚡1
Know Your Enemy: Unmasking Active Directory Attack Paths!
Learn how hackers exploit vulnerabilities to infiltrate networks and compromise assets. Strengthen your defense against Active Directory threats with this research report.
Get it here: https://thehackernews.com/2023/08/understanding-active-directory-attack.html
Learn how hackers exploit vulnerabilities to infiltrate networks and compromise assets. Strengthen your defense against Active Directory threats with this research report.
Get it here: https://thehackernews.com/2023/08/understanding-active-directory-attack.html
👍16🔥7
New findings: QakBot malware operators set up 15 new command-and-control servers, raising questions about their activities during the 'break' period.
Read more: https://thehackernews.com/2023/08/qakbot-malware-operators-expand-c2.html
Read more: https://thehackernews.com/2023/08/qakbot-malware-operators-expand-c2.html
👍16🔥3
New research reveals that threat actors are exploiting Cloudflare Tunnels for covert communication channels from compromised hosts, maintaining persistent access.
Read details here: https://thehackernews.com/2023/08/hackers-abusing-cloudflare-tunnels-for.html
Read details here: https://thehackernews.com/2023/08/hackers-abusing-cloudflare-tunnels-for.html
👍23😁11🔥4😱4🤔3👏1
🔔 Microsoft's August 2023 Patch Tuesday: 74 vulnerabilities fixed, 6 Critical and 67 Important security flaws addressed.
Stay up to date with the latest updates here ➡️ https://thehackernews.com/2023/08/microsoft-releases-patches-for-74-new.html
Stay up to date with the latest updates here ➡️ https://thehackernews.com/2023/08/microsoft-releases-patches-for-74-new.html
🔥13👍10😁3
Say goodbye to 2G vulnerabilities.
Android 14 introduces a new feature that allows IT admins to disable 2G network support, enhancing protection against interception and cyber threats.
Learn more about this: https://thehackernews.com/2023/08/new-android-14-security-feature-it.html
Android 14 introduces a new feature that allows IT admins to disable 2G network support, enhancing protection against interception and cyber threats.
Learn more about this: https://thehackernews.com/2023/08/new-android-14-security-feature-it.html
👍44😁9🔥3🤔3🤯2⚡1
⚠️ Warning! Cybercriminals are actively targeting vulnerable Kubernetes clusters, deploying crypto miners and backdoors.
Don't let your small or medium-sized organization fall victim.
Discover the risks now: https://thehackernews.com/2023/08/malicious-campaigns-exploit-weak.html
Don't let your small or medium-sized organization fall victim.
Discover the risks now: https://thehackernews.com/2023/08/malicious-campaigns-exploit-weak.html
👍24😁11😱4🔥3
New report uncovers connections between Rhysida and Vice Society ransomware groups. Provides details on targeting, tools, and victim profiles.
Read more: https://thehackernews.com/2023/08/new-report-exposes-vice-societys.html
Read more: https://thehackernews.com/2023/08/new-report-exposes-vice-societys.html
👍12🔥5😁3