๐ Discover how AI-powered identity systems, like One Identityโs Vigilance AIโข Threat Engine, are transforming #cybersecurity by detecting behavioral anomalies and preventing credential-based attacks.
Find details here: https://thehackernews.com/2024/10/the-value-of-ai-powered-identity.html
Find details here: https://thehackernews.com/2024/10/the-value-of-ai-powered-identity.html
๐6๐5โก3๐ฑ2
A recent case study shows how a malicious redirect led shoppers to a fake "evil twin" checkout page, stealing their financial info. Learn how quick action saved a retailer from costly damage.
Read: https://thehackernews.com/2024/10/new-case-study-evil-twin-checkout-page.html
Read: https://thehackernews.com/2024/10/new-case-study-evil-twin-checkout-page.html
๐13๐3๐คฏ1
๐ฎ Alert: Hackers are tricking GAMERS searching for cheats into downloading Lua-based malware, which stays hidden and delivers payloads like RedLine Stealer.
Learn how it works and how to stay safe: https://thehackernews.com/2024/10/gamers-tricked-into-downloading-lua.html
Learn how it works and how to stay safe: https://thehackernews.com/2024/10/gamers-tricked-into-downloading-lua.html
๐ฑ9๐8๐8๐4๐ค2โก1
โ ๏ธ WARNING: Ivantiโs CSA is under attack! Three new zero-day vulnerabilities are being actively exploited in the wild.
These flaws, CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381, allow attackers to bypass restrictions, execute arbitrary SQL, and gain remote code executionโall with admin privileges.
Find details here: https://thehackernews.com/2024/10/zero-day-alert-three-critical-ivanti.html
These flaws, CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381, allow attackers to bypass restrictions, execute arbitrary SQL, and gain remote code executionโall with admin privileges.
Find details here: https://thehackernews.com/2024/10/zero-day-alert-three-critical-ivanti.html
๐12๐6๐ค5
โ ๏ธ Microsoft warns of cyberattacks abusing OneDrive, SharePoint & Dropbox.
Hackers use โliving-off-trusted-sitesโ (LOTS) to bypass defenses. View-only files trick users into sharing 2FA tokens, leading to BEC & financial fraud.
Learn more: https://thehackernews.com/2024/10/microsoft-detects-growing-use-of-file.html
Hackers use โliving-off-trusted-sitesโ (LOTS) to bypass defenses. View-only files trick users into sharing 2FA tokens, leading to BEC & financial fraud.
Learn more: https://thehackernews.com/2024/10/microsoft-detects-growing-use-of-file.html
๐ฑ13๐10โก1๐1
๐ Microsoft has released patches for 118 vulnerabilities, two of which (CVE-2024-43572 and CVE-2024-43573) are being actively exploited in the wild.
Find details here: https://thehackernews.com/2024/10/microsoft-issues-security-update-fixing.html
Ensure your systems are protectedโapply these patches ASAP!
Find details here: https://thehackernews.com/2024/10/microsoft-issues-security-update-fixing.html
Ensure your systems are protectedโapply these patches ASAP!
The Hacker News
Microsoft Issues Security Update Fixing 118 Flaws, Two Actively Exploited in the Wild
Microsoft's October 2024 Patch Tuesday addresses 118 vulnerabilities, two under active exploitation. Apply fixes now.
๐ค8๐ฅ6๐5๐5๐4
New IoT regulations may force small manufacturers out of business, despite improving security. With 100+ new vulnerabilities daily, compliance costs are rising fast.
How will this impact cybersecurity? Read: https://thehackernews.com/expert-insights/2024/10/will-small-iot-device-oem-survive.html
How will this impact cybersecurity? Read: https://thehackernews.com/expert-insights/2024/10/will-small-iot-device-oem-survive.html
๐10๐4
Social media security is crucial for protecting your brand and finances. Poor governance can lead to unauthorized access and costly mistakes.
Learn how SSPM tools can help safeguard against unauthorized access and financial risks.
Read: https://thehackernews.com/2024/10/social-media-accounts-weak-link-in.html
Learn how SSPM tools can help safeguard against unauthorized access and financial risks.
Read: https://thehackernews.com/2024/10/social-media-accounts-weak-link-in.html
๐ค8๐5๐2
๐จ Developers Under Attack!
A North Korean campaign, "Contagious Interview," is tricking job seekers with fake offers, leading to malware disguised as coding tasks.
Hackers use fake video conferencing apps to target both Windows & macOS.
Read: https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html
A North Korean campaign, "Contagious Interview," is tricking job seekers with fake offers, leading to malware disguised as coding tasks.
Hackers use fake video conferencing apps to target both Windows & macOS.
Read: https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html
๐14๐ฅ4๐ค4
โ ๏ธ Multiple MMS protocol vulnerabilities pose a severe threat to industrial devices, potentially leading to crashes or remote code execution that could disrupt critical infrastructure.
Learn more: https://thehackernews.com/2024/10/researchers-uncover-major-security.html
#infosec
Learn more: https://thehackernews.com/2024/10/researchers-uncover-major-security.html
#infosec
The Hacker News
Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries
Multiple MMS protocol vulnerabilities expose industrial systems to remote code execution, crashes, and DoS attacks.
๐ฅ9๐4๐ค2
Google partners with GASA and DNS RF to launch the Global Signal Exchange (GSE), providing real-time insights into scam patterns to protect businesses from cybercrime.
Read: https://thehackernews.com/2024/10/google-joins-forces-with-gasa-and-dns.html
Read: https://thehackernews.com/2024/10/google-joins-forces-with-gasa-and-dns.html
The Hacker News
Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale
Google partners with GASA and DNS RF to launch Global Signal Exchange, enhancing real-time scam detection.
๐ค10๐5๐1
๐จ Warning: A critical #vulnerability (CVE-2024-9680) in Firefox is being actively exploited.
Donโt waitโensure your browsers are updated now to protect against potential remote code execution.
Learn more: https://thehackernews.com/2024/10/mozilla-warns-of-active-exploitation-in.html
Donโt waitโensure your browsers are updated now to protect against potential remote code execution.
Learn more: https://thehackernews.com/2024/10/mozilla-warns-of-active-exploitation-in.html
๐ฑ25๐13๐คฏ6๐ฅ3๐2๐1
โ ๏ธ Cyber Alerts:
โFortinet CVE-2024-23113 actively exploited, patch by Oct 30!
โPalo Alto Expedition vulnerable to SQL & OS injection.
โCisco patches critical bug in Nexus Dashboard Fabric Controller.
Read: https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html
Critical systems must be patched immediately.
โFortinet CVE-2024-23113 actively exploited, patch by Oct 30!
โPalo Alto Expedition vulnerable to SQL & OS injection.
โCisco patches critical bug in Nexus Dashboard Fabric Controller.
Read: https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html
Critical systems must be patched immediately.
The Hacker News
CISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches
CISA flags a critical Fortinet flaw under active exploitation. Palo Alto Networks and Cisco also release urgent security patches.
๐9โก3๐ฅ3๐ค2
๐จ New "Mongolian Skimmer" uses Unicode obfuscation to steal sensitive data from e-commerce sites!
It disables debugging tools & adapts to browsers, making it highly evasive.
Learn more: https://thehackernews.com/2024/10/cybercriminals-use-unicode-to-hide.html
It disables debugging tools & adapts to browsers, making it highly evasive.
Learn more: https://thehackernews.com/2024/10/cybercriminals-use-unicode-to-hide.html
๐10๐ฅ4โก3๐2๐คฏ1
๐ง SOC Analyst burnout is surging, with 80.8% expecting stress to worsen. AI-driven triage and response can ease the burden, allowing analysts to focus on higher-value tasks.
Discover how AI can lighten the load for your team: https://thehackernews.com/2024/10/6-simple-steps-to-eliminate-soc-analyst.html
Discover how AI can lighten the load for your team: https://thehackernews.com/2024/10/6-simple-steps-to-eliminate-soc-analyst.html
๐16๐ค8
A critical unpatched #vulnerability (CVE-2024-9441) in the Nice Linear eMerge E3 access controller has been uncovered, carrying a CVSS score of 9.8, with proof-of-concept exploits already circulating.
Learn more: https://thehackernews.com/2024/10/experts-warn-of-critical-unpatched.html
Learn more: https://thehackernews.com/2024/10/experts-warn-of-critical-unpatched.html
๐4๐4โก1
๐ฉโ๐ป OpenAI disrupts 20+ global deceptive operations exploiting AI models for advanced cyber activities like phishing, influence operations, and even election interference.
Learn more: https://thehackernews.com/2024/10/openai-blocks-20-global-malicious.html
Learn more: https://thehackernews.com/2024/10/openai-blocks-20-global-malicious.html
๐ฅ9๐6๐5โก2๐ค2
The digital landscape is shifting fastโare you ready to keep up with the latest threats? ๐โก
Join us on October 17 as we break down the key findings from the 2024 Kaseya Cybersecurity Survey! Get insights into:
๐ How AI is transforming cyberattacks
๐ฅ The challenges of user behavior
๐ก๏ธ How network penetration testing secure your network
๐ What companies are doing to prepare for 2025
๐ Date: October 17
โฐ Time: 1 PM EST / 10 AM PST
๐ Save Your Spot: https://thn.news/cyber-survey-2024
Donโt miss this session to stay one step ahead in cybersecurity!
Join us on October 17 as we break down the key findings from the 2024 Kaseya Cybersecurity Survey! Get insights into:
๐ How AI is transforming cyberattacks
๐ฅ The challenges of user behavior
๐ก๏ธ How network penetration testing secure your network
๐ What companies are doing to prepare for 2025
๐ Date: October 17
โฐ Time: 1 PM EST / 10 AM PST
๐ Save Your Spot: https://thn.news/cyber-survey-2024
Donโt miss this session to stay one step ahead in cybersecurity!
Kaseya
Exclusive Findings From Kaseyaโs 2024 Cybersecurity Survey
Join us for an exclusive webinar where weโll unveil key findings from Kaseyaโs 2024 Cybersecurity Survey based on insights from over 1,000 IT pros worldwide.
๐9๐ฅ9โก1
๐ Dutch police have dismantled Bohemia and Cannabia, the largest darkweb markets for illegal goods and cybercrime. Arrests in the Netherlands and Ireland, with โฌ8M in seized cryptocurrency, prove dark web anonymity is fading.
Read: https://thehackernews.com/2024/10/bohemia-and-cannabia-dark-web-markets.html
Read: https://thehackernews.com/2024/10/bohemia-and-cannabia-dark-web-markets.html
๐12๐10๐ฑ9๐ฅ3โก2๐คฏ1
๐ฉ A critical security flaw in GitLab (CVE-2024-9164) could allow attackers to run CI/CD pipelines on unauthorized branches.
Find details here: https://thehackernews.com/2024/10/new-critical-gitlab-vulnerability-could.html
Update your instance ASAP to avoid becoming the next victim.
Find details here: https://thehackernews.com/2024/10/new-critical-gitlab-vulnerability-could.html
Update your instance ASAP to avoid becoming the next victim.
๐17๐11๐ฑ8๐ฅ4โก1๐ค1
๐ป๐ Cybercriminals are leveling up! Phishing campaigns now exploit GitHub links, Telegram bots, and even QR codes to bypass security and deliver malware.
Read: https://thehackernews.com/2024/10/github-telegram-bots-and-qr-codes.html
Read: https://thehackernews.com/2024/10/github-telegram-bots-and-qr-codes.html
โก20๐ฅ9๐ค8๐5๐3