π¨ Researchers found 2 CRITICAL vulnerabilities in F5 Next Central Manager that could let attackers create secret backdoor ADMIN accounts for full control, evading detection even after patching.
Read details here: https://thehackernews.com/2024/05/critical-f5-central-manager.html
Read details here: https://thehackernews.com/2024/05/critical-f5-central-manager.html
π₯15π8π±2π1
Cloud Security isn't just the provider's responsibility. Did you know that as an org, you're responsible for securing everything you create in the cloud?
π Discover the must-know cloud pentesting building blocks - read on: https://thehackernews.com/2024/05/the-fundamentals-of-cloud-security.html
π Discover the must-know cloud pentesting building blocks - read on: https://thehackernews.com/2024/05/the-fundamentals-of-cloud-security.html
π₯17π14
Researchers have uncovered a sophisticated attack chain targeting Ivanti Connect Secure devices.
Two vulnerabilities (CVE-2023-46805 and CVE-2024-21887) are being exploited to deliver the infamous Mirai botnet payload.
More details: https://thehackernews.com/2024/05/mirai-botnet-exploits-ivanti-connect.html
Two vulnerabilities (CVE-2023-46805 and CVE-2024-21887) are being exploited to deliver the infamous Mirai botnet payload.
More details: https://thehackernews.com/2024/05/mirai-botnet-exploits-ivanti-connect.html
π27π€1
π‘οΈ Did you know a centralized permissions inventory can significantly reduce your SaaS attack surface?
By identifying and removing unnecessary user permissions, it minimizes the avenues for malicious actors to exploit.
Learn more: https://thehackernews.com/2024/05/a-saas-security-challenge-getting.html
By identifying and removing unnecessary user permissions, it minimizes the avenues for malicious actors to exploit.
Learn more: https://thehackernews.com/2024/05/a-saas-security-challenge-getting.html
π24
π΅π± Polish government bodies were hit by a sophisticated malware attack orchestrated by the infamous APT28 hacking group.
The campaign employed cunning tactics like email lures and legitimate service abuse to evade detection.
Details: https://thehackernews.com/2024/05/kremlin-backed-apt28-targets-polish.html
The campaign employed cunning tactics like email lures and legitimate service abuse to evade detection.
Details: https://thehackernews.com/2024/05/kremlin-backed-apt28-targets-polish.html
π22π€6β‘4π3π₯1
Researchers have uncovered a vulnerability (CVE-2024-3661) that allows threat actors to snoop on your VPN traffic.
Named "TunnelVision," the attack works by abusing a DHCP option to alter your device's routing table.
Details here: https://thehackernews.com/2024/05/new-tunnelvision-attack-allows.html
Named "TunnelVision," the attack works by abusing a DHCP option to alter your device's routing table.
Details here: https://thehackernews.com/2024/05/new-tunnelvision-attack-allows.html
π€―22π₯10π6π±6β‘2π2
π¨ Researchers have uncovered a new attack called "LLMjacking" that targets large language models (LLMs) hosted on cloud services.
Attackers steal cloud credentials to gain unauthorized access and sell it to other threat actors.
Read: https://thehackernews.com/2024/05/researchers-uncover-llmjacking-scheme.html
Attackers steal cloud credentials to gain unauthorized access and sell it to other threat actors.
Read: https://thehackernews.com/2024/05/researchers-uncover-llmjacking-scheme.html
π₯17π7π€4β‘1π1
π Malicious Android apps are using the icons of well-known appsβlike Google, WhatsApp, and Instagramβto deceive users into installing them and steal their credentials.
Learn how these apps trick users into giving away control: https://thehackernews.com/2024/05/malicious-android-apps-pose-as-google.html
Learn how these apps trick users into giving away control: https://thehackernews.com/2024/05/malicious-android-apps-pose-as-google.html
π16π₯13
WARNING: Using Chrome or any Chromium-based browsers? Don't waitβupdate your browser ASAP!
Google has just released an update to patch a new zero-day flaw, CVE-2024-4671, which hackers are actively exploiting in the wild.
Details https://thehackernews.com/2024/05/chrome-zero-day-alert-update-your.html
Google has just released an update to patch a new zero-day flaw, CVE-2024-4671, which hackers are actively exploiting in the wild.
Details https://thehackernews.com/2024/05/chrome-zero-day-alert-update-your.html
π₯16π13π±10π€―8β‘1π1
Unlock AI potential in cybersecurity. Join us for an expert webinar with Censys on the role of Generative AI in threat hunting.
Discover how AI-driven tools, such as CensysGPT, are reshaping threat hunting and defense strategies.
Reserve your seat: https://thehackernews.com/2024/05/censysgpt-ai-powered-threat-hunting-for.html
Discover how AI-driven tools, such as CensysGPT, are reshaping threat hunting and defense strategies.
Reserve your seat: https://thehackernews.com/2024/05/censysgpt-ai-powered-threat-hunting-for.html
π20π€8π₯3π±3
β‘ Don't just detect threats - respond to them.
EDR solutions offer powerful response and remediation capabilities to help you mitigate and contain threats quickly.
Find the right EDR solution for your business with this guide: https://thehackernews.com/2024/05/whats-right-edr-for-you.html
EDR solutions offer powerful response and remediation capabilities to help you mitigate and contain threats quickly.
Find the right EDR solution for your business with this guide: https://thehackernews.com/2024/05/whats-right-edr-for-you.html
π17π€11π₯4
π₯ Alert: FIN7 hackers are impersonating trusted names like AnyDesk, WinSCP, BlackRock, and more to lure victims into their malware trap through malicious Google ads.
Read: https://thehackernews.com/2024/05/fin7-hacker-group-leverages-malicious.html
Read: https://thehackernews.com/2024/05/fin7-hacker-group-leverages-malicious.html
π28π7π±7π₯4
π¨ Attention Python developers!
A malicious PyPI package, "requests-darwin-lite," posing as a fork of the popular "requests" library, has been spotted that's hiding Golang-based Sliver C2 framework in a PNG image.
Details here: https://thehackernews.com/2024/05/malicious-python-package-hides-sliver.html
A malicious PyPI package, "requests-darwin-lite," posing as a fork of the popular "requests" library, has been spotted that's hiding Golang-based Sliver C2 framework in a PNG image.
Details here: https://thehackernews.com/2024/05/malicious-python-package-hides-sliver.html
π₯18π12π€―8π±3β‘1π1π€1
π¨ Attention - Black Basta ransomware operation has targeted over 500 entities across various sectors since April 2022.
Learn more about their tactics and how to protect your organization: https://thehackernews.com/2024/05/black-basta-ransomware-strikes-500.html
Learn more about their tactics and how to protect your organization: https://thehackernews.com/2024/05/black-basta-ransomware-strikes-500.html
β‘8π6π₯6π€―1
Researchers have uncovered multiple severe security flaws in Cinterion cellular modems that could put your communication networks and IoT devices at risk.
Learn more about the risks and how to mitigate them: https://thehackernews.com/2024/05/severe-vulnerabilities-in-cinterion.html
Learn more about the risks and how to mitigate them: https://thehackernews.com/2024/05/severe-vulnerabilities-in-cinterion.html
β‘12π6π€4π₯3π3π€―2
MITREcorp has launched EMB3D, a new threat-modeling framework for embedded devices used in critical infrastructure.
Read: https://thehackernews.com/2024/05/mitre-unveils-emb3d-threat-modeling.html
Read: https://thehackernews.com/2024/05/mitre-unveils-emb3d-threat-modeling.html
π₯9π8
π Browser Security Alert: Did you know that 62% of the workforce uses unmanaged devices to access corporate data?
Learn more about the risks and how to protect your organization in the Annual Browser Security Report 2024.
Read: https://thehackernews.com/2024/05/the-2024-browser-security-report.html
Learn more about the risks and how to protect your organization in the Annual Browser Security Report 2024.
Read: https://thehackernews.com/2024/05/the-2024-browser-security-report.html
π18π€―3π2
π΅οΈββοΈ Worried about Bluetooth stalkers?
π‘οΈ Apple & Google just launched cross-platform feature "Detecting Unwanted Location Trackers" on iOS & Android to protect users from unauthorized tracking.
Read: https://thehackernews.com/2024/05/apple-and-google-launch-cross-platform.html
π‘οΈ Apple & Google just launched cross-platform feature "Detecting Unwanted Location Trackers" on iOS & Android to protect users from unauthorized tracking.
Read: https://thehackernews.com/2024/05/apple-and-google-launch-cross-platform.html
π₯17π14π4
π¨ Attention - A new social engineering campaign is targeting enterprises with spam emails to gain initial access. The threat actor overwhelms users' email and calls them, offering assistance to resolve the issue.
Learn more: https://thehackernews.com/2024/05/ongoing-campaign-bombarded-enterprises.html
Learn more: https://thehackernews.com/2024/05/ongoing-campaign-bombarded-enterprises.html
π₯13π8
π Researchers uncover critical vulnerabilities in Cacti, a popular open-source network monitoring tool. Don't wait, update your instances to version 1.2.27 today.
More info in the article.: https://thehackernews.com/2024/05/critical-flaws-in-cacti-framework-could.html
More info in the article.: https://thehackernews.com/2024/05/critical-flaws-in-cacti-framework-could.html
π13π±3β‘2π€―1
π Is your organization's cybersecurity at risk due to human users? Discover the importance of advanced authentication measures and how to avoid common implementation mistakes.
Learn more: https://thehackernews.com/2024/05/6-mistakes-organizations-make-when.html
Learn more: https://thehackernews.com/2024/05/6-mistakes-organizations-make-when.html
π13π€5π₯1