β οΈ North Korean-backed APT37 (aka InkySquid) has been observed delivering a never-before-seen backdoor, VeilShell, as part of stealthy state-sponsored cyberattacks targeting Southeast Asia.
Find details here: https://thehackernews.com/2024/10/north-korean-hackers-using-new.html
Find details here: https://thehackernews.com/2024/10/north-korean-hackers-using-new.html
π8π3π±3π2
π΄ New stealthy #malware "Perfctl" is hitting Linux servers, running crypto miners & proxyjacking undetected. It exploits Polkit vulnerability (CVE-2021-4043) for privilege escalation & uses a rootkit to evade defense.
Details here: https://thehackernews.com/2024/10/new-perfctl-malware-targets-linux.html
Details here: https://thehackernews.com/2024/10/new-perfctl-malware-targets-linux.html
π₯17π3
As non-human identities outnumber human ones, they pose an escalating security risk. Learn why machine identity management is vital for modern cybersecurity.
Read: https://thehackernews.com/2024/10/the-secret-weakness-execs-are.html
Read: https://thehackernews.com/2024/10/the-secret-weakness-execs-are.html
π9π₯5π2
Google is enhancing Android 14 security on Pixel devices to prevent 2G attacks and protect against baseband exploits. Baseband vulnerabilities expose devices to remote attacks, potentially compromising sensitive data.
Read: https://thehackernews.com/2024/10/android-14-adds-new-security-features.html
Read: https://thehackernews.com/2024/10/android-14-adds-new-security-features.html
π33π6β‘5π4π₯1
A major #vulnerability (CVE-2024-47374) in the LiteSpeed Cache WordPress plugin could allow attackers to execute arbitrary #JavaScript and hijack accounts.
Find details here: https://thehackernews.com/2024/10/wordpress-litespeed-cache-plugin.html
Patch now to protect your site.
Find details here: https://thehackernews.com/2024/10/wordpress-litespeed-cache-plugin.html
Patch now to protect your site.
π₯14π5π2
The largest-ever DDoS attack just occurredβ3.8 Tbps in just 65 seconds!
Is your CPU capacity prepared to filter massive attack traffic? Attackers leveraged compromised ASUS routers, a serious reminder to address CVE-2024-3080 now.
Read: https://thehackernews.com/2024/10/cloudflare-thwarts-largest-ever-38-tbps.html
Is your CPU capacity prepared to filter massive attack traffic? Attackers leveraged compromised ASUS routers, a serious reminder to address CVE-2024-3080 now.
Read: https://thehackernews.com/2024/10/cloudflare-thwarts-largest-ever-38-tbps.html
π₯28π€―21π5β‘3π3
The U.S. Department of Justice and #Microsoft have seized 107 domains used by Russia-linked COLDRIVER hackers to launch phishing attacks, frequently targeting experts in Russian affairs, #privacy advocates, and intelligence officials.
Read: https://thehackernews.com/2024/10/us-and-microsoft-seize-107-russian.html
Read: https://thehackernews.com/2024/10/us-and-microsoft-seize-107-russian.html
π₯15π±6π4β‘2π€―1
Continuous Threat Exposure Management (CTEM) enables continuous protection by helping you prioritize threats with real-time data.
πLearn how CTEM fits into your cybersecurity framework: https://thehackernews.com/2024/10/how-to-get-going-with-ctem-when-you.html
πLearn how CTEM fits into your cybersecurity framework: https://thehackernews.com/2024/10/how-to-get-going-with-ctem-when-you.html
π₯14π9β‘2
Apple has released critical iOS and iPadOS updates addressing a vulnerability (CVE-2024-44204) that could expose your passwords via VoiceOver technology.
Read: https://thehackernews.com/2024/10/apple-releases-critical-ios-and-ipados.html
iPhone XS and later, plus iPads from the Pro, Air, and Mini series, are impacted.
Read: https://thehackernews.com/2024/10/apple-releases-critical-ios-and-ipados.html
iPhone XS and later, plus iPads from the Pro, Air, and Mini series, are impacted.
π₯35π11π10π€―6β‘3π3π€3
Meta hit hard as Europeβs top court restricts #Facebookβs use of personal data for targeted ads, even with user consent.
Read > https://thehackernews.com/2024/10/eu-court-limits-metas-use-of-personal.html
This ruling pushes all companies to adopt more transparent, privacy-first data practices.
Read > https://thehackernews.com/2024/10/eu-court-limits-metas-use-of-personal.html
This ruling pushes all companies to adopt more transparent, privacy-first data practices.
π43π14π₯6β‘3
π¨ Just dropped the latest Cybersecurity Recap newsletter! Dive into:
βRecord-breaking DDoS attacks π
βEvil Corp & LockBit takedowns π΅οΈββοΈ
βNew North Korean malware π¦
β700K+ routers vulnerable to attack π¨
Read: https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats-and.html
Stay secure, stay informed!
βRecord-breaking DDoS attacks π
βEvil Corp & LockBit takedowns π΅οΈββοΈ
βNew North Korean malware π¦
β700K+ routers vulnerable to attack π¨
Read: https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats-and.html
Stay secure, stay informed!
π₯7β‘2π1π1π€―1
π Google will soon block unsafe #Android sideloading in India, targeting apps that abuse sensitive permissions.
Learn more: https://thehackernews.com/2024/10/google-blocks-unsafe-android-app.html
The pilot has already stopped nearly 900,000 high-risk installs in Southeast Asia, making it a vital fraud protection tool.
Learn more: https://thehackernews.com/2024/10/google-blocks-unsafe-android-app.html
The pilot has already stopped nearly 900,000 high-risk installs in Southeast Asia, making it a vital fraud protection tool.
π8π3π₯3
A critical security flaw in Apache Avro SDK (CVE-2024-47561) threatens large-scale data processing systems.
Ensure your systems are patched to avoid arbitrary code execution risks.
Details here: https://thehackernews.com/2024/10/critical-apache-avro-sdk-flaw-allows.html
Ensure your systems are patched to avoid arbitrary code execution risks.
Details here: https://thehackernews.com/2024/10/critical-apache-avro-sdk-flaw-allows.html
π6π₯1
Meet Gorilla, a new Mirai-based botnet issuing 300,000+ attack commands in just one month.
It exploits an Apache Hadoop vulnerability to control IoT devices and cloud hosts long-term.
Discover more about its capabilities.: https://thehackernews.com/2024/10/new-gorilla-botnet-launches-over-300000.html
It exploits an Apache Hadoop vulnerability to control IoT devices and cloud hosts long-term.
Discover more about its capabilities.: https://thehackernews.com/2024/10/new-gorilla-botnet-launches-over-300000.html
π₯7π5π2
β οΈπΈ API vulnerabilities and bot attacks are costing organizations up to $186 billion a year. Learn how to protect your digital infrastructure from these growing threats.
π Read more: https://thehackernews.com/2024/10/vulnerable-apis-and-bot-attacks-costing.html
π Read more: https://thehackernews.com/2024/10/vulnerable-apis-and-bot-attacks-costing.html
π12β‘5π2π₯2
π Qualcomm releases urgent security updates, including a critical patch for CVE-2024-43047βa flaw currently being exploited in the wild.
Learn more π https://thehackernews.com/2024/10/qualcomm-urges-oems-to-patch-critical.html
Qualcomm urges OEMs to deploy the update ASAP.
Learn more π https://thehackernews.com/2024/10/qualcomm-urges-oems-to-patch-critical.html
Qualcomm urges OEMs to deploy the update ASAP.
The Hacker News
Qualcomm Urges OEMs to Patch Critical DSP and WLAN Flaws Amid Active Exploits
Qualcomm fixes 20 vulnerabilities, including actively exploited CVE-2024-43047 in DSP, urging fast OEM updates.
π7π₯5
Ukraine claims a cyber attack on Russian state media VGTRK on Putinβs birthday. While VGTRK downplays damage, reports say hackers wiped servers, including backupsβa warning for those relying on basic recovery plans.
Read: https://thehackernews.com/2024/10/pro-ukrainian-hackers-strike-russian.html
Read: https://thehackernews.com/2024/10/pro-ukrainian-hackers-strike-russian.html
π26π₯15π6π±4π€―2π€1
GoldenJackal strikes againβtargeting high-profile, air-gapped networks in embassies and government entities with sophisticated #malware like JackalWorm.
Read: https://thehackernews.com/2024/10/goldenjackal-target-embassies-and-air.html
Use of USB drives to exfiltrate data underscores the importance of monitoring offline systems.
Read: https://thehackernews.com/2024/10/goldenjackal-target-embassies-and-air.html
Use of USB drives to exfiltrate data underscores the importance of monitoring offline systems.
π₯10π4β‘3π3
β‘ Cyber threat group "Awaken Likho" is targeting Russian government and industrial entities with spear-phishing attacks, disguising malicious files as Word or PDF documents to trick users.
Learn more: https://thehackernews.com/2024/10/cyberattack-group-awaken-likho-targets.html
Learn more: https://thehackernews.com/2024/10/cyberattack-group-awaken-likho-targets.html
π13π€7π3π±3π€―2π₯1
π Discover how AI-powered identity systems, like One Identityβs Vigilance AIβ’ Threat Engine, are transforming #cybersecurity by detecting behavioral anomalies and preventing credential-based attacks.
Find details here: https://thehackernews.com/2024/10/the-value-of-ai-powered-identity.html
Find details here: https://thehackernews.com/2024/10/the-value-of-ai-powered-identity.html
π6π5β‘3π±2
A recent case study shows how a malicious redirect led shoppers to a fake "evil twin" checkout page, stealing their financial info. Learn how quick action saved a retailer from costly damage.
Read: https://thehackernews.com/2024/10/new-case-study-evil-twin-checkout-page.html
Read: https://thehackernews.com/2024/10/new-case-study-evil-twin-checkout-page.html
π13π3π€―1