🚨 New vulnerabilities emerge daily, forcing developers to refactor code & update dependencies.
With GitGuardian SCA, you can easily scan for CVEs locally & automatically before making a pull request.
Learn how you can create secure code effortlessly: https://thehackernews.com/2024/05/defending-your-commits-from-known-cves.html
With GitGuardian SCA, you can easily scan for CVEs locally & automatically before making a pull request.
Learn how you can create secure code effortlessly: https://thehackernews.com/2024/05/defending-your-commits-from-known-cves.html
👍12🔥6⚡4
Foxit PDF Reader users, beware! A design flaw is being weaponized to deliver malware including Agent Tesla, AsyncRAT, DCRat, NanoCore RAT, NjRAT, Pony, Remcos RAT, and XWorm.
Learn more: https://thehackernews.com/2024/05/foxit-pdf-reader-flaw-exploited-by.html
Learn more: https://thehackernews.com/2024/05/foxit-pdf-reader-flaw-exploited-by.html
👍22🤔6🤯6⚡3🔥3
Void Manticore, an Iranian threat actor affiliated with the MOIS, has been identified as the culprit behind destructive wiping malware attacks targeting Albania and Israel.
Learn more about their tactics: https://thehackernews.com/2024/05/iranian-mois-linked-hackers-behind.html
Learn more about their tactics: https://thehackernews.com/2024/05/iranian-mois-linked-hackers-behind.html
🔥18👍8🤔5😁3⚡2
🚨 Critical security vulnerability discovered in Fluent Bit, a widely used logging and metrics utility.
Nicknamed "Linguistic Lumberjack," it could lead to DoS, information disclosure, or even RCE attacks.
Learn more about CVE-2024-4323: https://thehackernews.com/2024/05/linguistic-lumberjack-vulnerability.html
Nicknamed "Linguistic Lumberjack," it could lead to DoS, information disclosure, or even RCE attacks.
Learn more about CVE-2024-4323: https://thehackernews.com/2024/05/linguistic-lumberjack-vulnerability.html
👍12⚡6🔥4
🕵️♂️ Unpatched Vulnerability Exploited!
CISA has added a critical security flaw (CVE-2023-43208) affecting NextGen Healthcare Mirth Connect to its Known Exploited Vulnerabilities catalog.
Learn more: https://thehackernews.com/2024/05/nextgen-healthcare-mirth-connect-under.html
Update to version 4.4.1 or later ASAP!
CISA has added a critical security flaw (CVE-2023-43208) affecting NextGen Healthcare Mirth Connect to its Known Exploited Vulnerabilities catalog.
Learn more: https://thehackernews.com/2024/05/nextgen-healthcare-mirth-connect-under.html
Update to version 4.4.1 or later ASAP!
🔥12👍6🤯2
Microsoft has announced new security measures to strengthen Windows11, including deprecating NTLM in favor of Kerberos for authentication and AI-powered Smart App Control to block malware.
Details here > https://thehackernews.com/2024/05/windows-11-to-deprecate-ntlm-add-ai.html
Details here > https://thehackernews.com/2024/05/windows-11-to-deprecate-ntlm-add-ai.html
👍15🔥8😁6🤯5🤔2
Researchers found security flaws in popular software packages: llama_cpp_python for AI models and PDF.js for the Firefox browser, allowing attackers to execute arbitrary code if exploited.
Details here > https://thehackernews.com/2024/05/researchers-uncover-flaws-in-python.html
Details here > https://thehackernews.com/2024/05/researchers-uncover-flaws-in-python.html
🔥18👍6😁5🤯4😱3
🔒 SolarMarker malware evolves with a multi-tiered infrastructure, making it harder for law enforcement to take down and evade detection.
Learn about the latest tactics: https://thehackernews.com/2024/05/solarmarker-malware-evolves-to-resist.html
Learn about the latest tactics: https://thehackernews.com/2024/05/solarmarker-malware-evolves-to-resist.html
🔥17👍5🤯1
Non-compliance with IT security rules can cause data loss, financial harm, and reputational damage.
Discover how Wazuh's open-source solution monitors files in real-time and detects unauthorized changes.
https://thehackernews.com/2024/05/streamlining-it-security-compliance.html
Discover how Wazuh's open-source solution monitors files in real-time and detects unauthorized changes.
https://thehackernews.com/2024/05/streamlining-it-security-compliance.html
⚡10👍7👏3🔥2
🚨 Alert - New CLOUD#REVERSER attack campaign uses Google Drive and Dropbox to stage malware, disguising executables as Excel files with the right-to-left override Unicode trick.
Learn more: https://thehackernews.com/2024/05/malware-delivery-via-cloud-services.html
Learn more: https://thehackernews.com/2024/05/malware-delivery-via-cloud-services.html
🔥20👍9
🔒 Secure modern applications without compromising DevOps velocity or developer experience.
Discover the five guiding principles essential for building a highly effective DevSecOps practice in this latest article.
Read on > https://thehackernews.com/2024/05/five-core-tenets-of-highly-effective.html
Discover the five guiding principles essential for building a highly effective DevSecOps practice in this latest article.
Read on > https://thehackernews.com/2024/05/five-core-tenets-of-highly-effective.html
👍12🔥6
⚡ Alert for GitHub Enterprise Server users.
A critical flaw (CVE-2024-4985) has been found, allowing attackers to gain admin privileges by forging SAML responses.
More details in the article > https://thehackernews.com/2024/05/critical-github-enterprise-server-flaw.html
Check if your instance is affected & update immediately.
A critical flaw (CVE-2024-4985) has been found, allowing attackers to gain admin privileges by forging SAML responses.
More details in the article > https://thehackernews.com/2024/05/critical-github-enterprise-server-flaw.html
Check if your instance is affected & update immediately.
🔥12👍8😱6
⚠️ Attention: Veeam has disclosed 4 new vulnerabilities in its Backup Enterprise Manager, including a critical security flaw (CVE-2024-29849) that could allow attackers to bypass authentication.
🔗 Learn more here: https://thehackernews.com/2024/05/critical-veeam-backup-enterprise.html
Don't wait - update your software now.
🔗 Learn more here: https://thehackernews.com/2024/05/critical-veeam-backup-enterprise.html
Don't wait - update your software now.
👍15🔥9
Zoom has announced the rollout of NIST-approved post-quantum Kyber-768 End-to-End Encryption (E2EE) for Zoom Meetings to protect users against sophisticated attacks.
Learn more: https://thehackernews.com/2024/05/zoom-adopts-nist-approved-post-quantum.html
Learn more: https://thehackernews.com/2024/05/zoom-adopts-nist-approved-post-quantum.html
👍20🤔12
Attention QNAP users! Make sure to update your QTS and QuTS hero to the latest versions to address recently discovered vulnerabilities.
Read the article to learn more about the researchers' findings and QNAP's response: https://thehackernews.com/2024/05/qnap-patches-new-flaws-in-qts-and-quts.html
Read the article to learn more about the researchers' findings and QNAP's response: https://thehackernews.com/2024/05/qnap-patches-new-flaws-in-qts-and-quts.html
🔥13👍9
⚠️ An unknown threat actor is exploiting Microsoft Exchange Server flaws to deploy stealthy keylogger malware in targeted attacks aimed at government agencies, banks, and educational institutions.
Details here - https://thehackernews.com/2024/05/ms-exchange-server-flaws-exploited-to.html
Details here - https://thehackernews.com/2024/05/ms-exchange-server-flaws-exploited-to.html
🔥15👍10😱5😁2
🚨 New cryptojacking malware campaign HIDDEN SHOVEL uses GHOSTENGINE payload to exploit vulnerable drivers, disable EDRs, and install XMRig miner in a BYOVD attack.
Find details here: https://thehackernews.com/2024/05/ghostengine-exploits-vulnerable-drivers.html
Find details here: https://thehackernews.com/2024/05/ghostengine-exploits-vulnerable-drivers.html
👍10🔥6
🚨 CISA Urgent Advisory:
Rockwell Automation urges disconnecting all industrial control systems (ICS) not meant for the public internet to prevent cyber threats amid heightened geopolitical tensions.
Learn more: https://thehackernews.com/2024/05/rockwell-advises-disconnecting-internet.html
Rockwell Automation urges disconnecting all industrial control systems (ICS) not meant for the public internet to prevent cyber threats amid heightened geopolitical tensions.
Learn more: https://thehackernews.com/2024/05/rockwell-advises-disconnecting-internet.html
😁15👍8⚡1
🌐 Researchers uncover a stealthy threat group, dubbed "Unfading Sea Haze," targeting high-level organizations in the South China Sea. Poor credential hygiene and outdated patches enable these attacks to succeed.
Read: https://thehackernews.com/2024/05/researchers-warn-of-chinese-aligned.html
Read: https://thehackernews.com/2024/05/researchers-warn-of-chinese-aligned.html
🔥13👍3👏3🤯3
The number of SaaS apps in enterprises is skyrocketing, creating complex security challenges.
Discover how SaaS Security Posture Management (SSPM) can help protect your organization against evolving threats.
Get 2025 Ultimate SaaS Security Checklist: https://thehackernews.com/2024/05/the-ultimate-saas-security-posture.html
Discover how SaaS Security Posture Management (SSPM) can help protect your organization against evolving threats.
Get 2025 Ultimate SaaS Security Checklist: https://thehackernews.com/2024/05/the-ultimate-saas-security-posture.html
👍19⚡4🤯1
Microsoft to deprecate VBScript in favor of JavaScript and PowerShell. The tech giant plans to phase out the scripting language starting in the second half of 2024.
Learn more: https://thehackernews.com/2024/05/the-end-of-era-microsoft-phases-out.html
Learn more: https://thehackernews.com/2024/05/the-end-of-era-microsoft-phases-out.html
🔥41👍8🤔7😱5⚡2