Non-compliance with IT security rules can cause data loss, financial harm, and reputational damage.
Discover how Wazuh's open-source solution monitors files in real-time and detects unauthorized changes.
https://thehackernews.com/2024/05/streamlining-it-security-compliance.html
Discover how Wazuh's open-source solution monitors files in real-time and detects unauthorized changes.
https://thehackernews.com/2024/05/streamlining-it-security-compliance.html
β‘10π7π3π₯2
π¨ Alert - New CLOUD#REVERSER attack campaign uses Google Drive and Dropbox to stage malware, disguising executables as Excel files with the right-to-left override Unicode trick.
Learn more: https://thehackernews.com/2024/05/malware-delivery-via-cloud-services.html
Learn more: https://thehackernews.com/2024/05/malware-delivery-via-cloud-services.html
π₯20π9
π Secure modern applications without compromising DevOps velocity or developer experience.
Discover the five guiding principles essential for building a highly effective DevSecOps practice in this latest article.
Read on > https://thehackernews.com/2024/05/five-core-tenets-of-highly-effective.html
Discover the five guiding principles essential for building a highly effective DevSecOps practice in this latest article.
Read on > https://thehackernews.com/2024/05/five-core-tenets-of-highly-effective.html
π12π₯6
β‘ Alert for GitHub Enterprise Server users.
A critical flaw (CVE-2024-4985) has been found, allowing attackers to gain admin privileges by forging SAML responses.
More details in the article > https://thehackernews.com/2024/05/critical-github-enterprise-server-flaw.html
Check if your instance is affected & update immediately.
A critical flaw (CVE-2024-4985) has been found, allowing attackers to gain admin privileges by forging SAML responses.
More details in the article > https://thehackernews.com/2024/05/critical-github-enterprise-server-flaw.html
Check if your instance is affected & update immediately.
π₯12π8π±6
β οΈ Attention: Veeam has disclosed 4 new vulnerabilities in its Backup Enterprise Manager, including a critical security flaw (CVE-2024-29849) that could allow attackers to bypass authentication.
π Learn more here: https://thehackernews.com/2024/05/critical-veeam-backup-enterprise.html
Don't wait - update your software now.
π Learn more here: https://thehackernews.com/2024/05/critical-veeam-backup-enterprise.html
Don't wait - update your software now.
π15π₯9
Zoom has announced the rollout of NIST-approved post-quantum Kyber-768 End-to-End Encryption (E2EE) for Zoom Meetings to protect users against sophisticated attacks.
Learn more: https://thehackernews.com/2024/05/zoom-adopts-nist-approved-post-quantum.html
Learn more: https://thehackernews.com/2024/05/zoom-adopts-nist-approved-post-quantum.html
π20π€12
Attention QNAP users! Make sure to update your QTS and QuTS hero to the latest versions to address recently discovered vulnerabilities.
Read the article to learn more about the researchers' findings and QNAP's response: https://thehackernews.com/2024/05/qnap-patches-new-flaws-in-qts-and-quts.html
Read the article to learn more about the researchers' findings and QNAP's response: https://thehackernews.com/2024/05/qnap-patches-new-flaws-in-qts-and-quts.html
π₯13π9
β οΈ An unknown threat actor is exploiting Microsoft Exchange Server flaws to deploy stealthy keylogger malware in targeted attacks aimed at government agencies, banks, and educational institutions.
Details here - https://thehackernews.com/2024/05/ms-exchange-server-flaws-exploited-to.html
Details here - https://thehackernews.com/2024/05/ms-exchange-server-flaws-exploited-to.html
π₯15π10π±5π2
π¨ New cryptojacking malware campaign HIDDEN SHOVEL uses GHOSTENGINE payload to exploit vulnerable drivers, disable EDRs, and install XMRig miner in a BYOVD attack.
Find details here: https://thehackernews.com/2024/05/ghostengine-exploits-vulnerable-drivers.html
Find details here: https://thehackernews.com/2024/05/ghostengine-exploits-vulnerable-drivers.html
π10π₯6
π¨ CISA Urgent Advisory:
Rockwell Automation urges disconnecting all industrial control systems (ICS) not meant for the public internet to prevent cyber threats amid heightened geopolitical tensions.
Learn more: https://thehackernews.com/2024/05/rockwell-advises-disconnecting-internet.html
Rockwell Automation urges disconnecting all industrial control systems (ICS) not meant for the public internet to prevent cyber threats amid heightened geopolitical tensions.
Learn more: https://thehackernews.com/2024/05/rockwell-advises-disconnecting-internet.html
π15π8β‘1
π Researchers uncover a stealthy threat group, dubbed "Unfading Sea Haze," targeting high-level organizations in the South China Sea. Poor credential hygiene and outdated patches enable these attacks to succeed.
Read: https://thehackernews.com/2024/05/researchers-warn-of-chinese-aligned.html
Read: https://thehackernews.com/2024/05/researchers-warn-of-chinese-aligned.html
π₯13π3π3π€―3
The number of SaaS apps in enterprises is skyrocketing, creating complex security challenges.
Discover how SaaS Security Posture Management (SSPM) can help protect your organization against evolving threats.
Get 2025 Ultimate SaaS Security Checklist: https://thehackernews.com/2024/05/the-ultimate-saas-security-posture.html
Discover how SaaS Security Posture Management (SSPM) can help protect your organization against evolving threats.
Get 2025 Ultimate SaaS Security Checklist: https://thehackernews.com/2024/05/the-ultimate-saas-security-posture.html
π19β‘4π€―1
Microsoft to deprecate VBScript in favor of JavaScript and PowerShell. The tech giant plans to phase out the scripting language starting in the second half of 2024.
Learn more: https://thehackernews.com/2024/05/the-end-of-era-microsoft-phases-out.html
Learn more: https://thehackernews.com/2024/05/the-end-of-era-microsoft-phases-out.html
π₯41π8π€7π±5β‘2
π₯ Ivanti released patches for multiple critical security flaws (CVE-2024-29822 through CVE-2024-29827) in Endpoint Manager (EPM) β 6 of these are SQL injection vulnerabilities that allow RCE without authentication.
Learn more: https://thehackernews.com/2024/05/ivanti-patches-critical-remote-code.html
Learn more: https://thehackernews.com/2024/05/ivanti-patches-critical-remote-code.html
π11π₯6π3
What are the 5οΈβ£ core components of any robust SaaS Security Posture Management (SSPM) solution?
Learn how to choose the right SSPM vendor for your organization and get a list of 25 questions to ask in your security assessment.
Download the guide: https://thn.news/sspm-guide-ln
Learn how to choose the right SSPM vendor for your organization and get a list of 25 questions to ask in your security assessment.
Download the guide: https://thn.news/sspm-guide-ln
AppOmni
SaaS Security Made Simple: Build Your Case, Choose Your Vendor, and Protect Your Data
Download the guide on simplifying your SaaS security approach and secure your SaaS environment with the help of AppOmniβs platform.
π14π₯5π2
π¨ Chinese APT group targets government entities in the Middle East, Africa, and Asia in a large-scale cyber espionage campaign dubbed Operation "Diplomatic Specter."
Learn more about the tactics and techniques used by the attackers: https://thehackernews.com/2024/05/inside-operation-diplomatic-specter.html
Learn more about the tactics and techniques used by the attackers: https://thehackernews.com/2024/05/inside-operation-diplomatic-specter.html
π12π8π₯4β‘2π€1π±1
π Sharp Dragon, a China-linked threat actor, extends its cyber espionage reach to Africa and the Caribbean, targeting governmental organizations.
Learn more about their tactics: https://thehackernews.com/2024/05/new-frontiers-old-tactics-chinese-cyber.html
Learn more about their tactics: https://thehackernews.com/2024/05/new-frontiers-old-tactics-chinese-cyber.html
π₯10π5β‘1π1
Did you know the average company uses over 400 SaaS applications? Yet, 56% of IT pros arenβt aware of their data backup responsibilities.
Discover the hidden secrets in your backup data and how to keep them safe: https://thehackernews.com/2024/05/are-your-saas-backups-as-secure-as-your.html
Discover the hidden secrets in your backup data and how to keep them safe: https://thehackernews.com/2024/05/are-your-saas-backups-as-secure-as-your.html
π12π₯7π€―2β‘1
π Attention: CISA has added a critical security flaw (CVE-2020-17519) in Apache Flink to its Known Exploited Vulnerabilities catalog. Attackers are exploiting this flaw to gain unauthorized access to sensitive information.
Learn more: https://thehackernews.com/2024/05/cisa-warns-of-actively-exploited-apache.html
Learn more: https://thehackernews.com/2024/05/cisa-warns-of-actively-exploited-apache.html
π11β‘7
π¨ Ransomware attacks on VMware ESXi follow a similar pattern, exploiting misconfigurations and vulnerabilities.
Learn the key steps and how to protect your organization: https://thehackernews.com/2024/05/ransomware-attacks-exploit-vmware-esxi.html
Learn the key steps and how to protect your organization: https://thehackernews.com/2024/05/ransomware-attacks-exploit-vmware-esxi.html
β‘17π14π₯8π€―4
π¨ ALERT: BLOODALCHEMY malware, an updated version of Deed RAT and successor to ShadowPad, targets government organizations in Southern and Southeastern Asia.
Learn more: https://thehackernews.com/2024/05/japanese-experts-warn-of-bloodalchemy.html
Learn more: https://thehackernews.com/2024/05/japanese-experts-warn-of-bloodalchemy.html
π₯10β‘4π2