π₯ Industry-first report covering real-world attacks on GenAI, analyzing 2,000+ LLM apps. Including jailbreak methods, adversaries' objectives, and technical insights. 
 
Download the Pillar Security's full report here: https://thn.news/genai-attacks
  
  Download the Pillar Security's full report here: https://thn.news/genai-attacks
www.pillar.security
  
  The State of Attacks on GenAI  |  Analysis of Real-World Attacks
  Discover the industry-first report on real GenAI attacks seen in the wild. Gain exclusive insights into AI risks, adversary objectives, jailbreak techniques, and 2025 forecasts.
π10π8
  North Korean hackers are now using a Linux variant of the notorious FASTCash malware to target ATMs by compromising payment switches in ATM cashout schemes. 
 
Learn more: https://thehackernews.com/2024/10/new-linux-variant-of-fastcash-malware.html
Learn more: https://thehackernews.com/2024/10/new-linux-variant-of-fastcash-malware.html
π12π8π₯6β‘3π3
  DarkVision RAT returns in a new campaign via PureCrypter, enabling attackers to steal passwords, record screens, and gain full remote access for just $60βmaking sophisticated breaches accessible even to non-technical cybercriminals. 
 
Read: https://thehackernews.com/2024/10/new-malware-campaign-uses-purecrypter.html
Read: https://thehackernews.com/2024/10/new-malware-campaign-uses-purecrypter.html
π14β‘1
  TrickMo Android trojan has upgradedβnow stealing unlock patterns and PINs by mimicking the lock screen! 
 
With thousands of stolen credentials already exposed, itβs targeting banking data, corporate VPNs, social media, and healthcare apps.
 
https://thehackernews.com/2024/10/trickmo-banking-trojan-can-now-capture.html
With thousands of stolen credentials already exposed, itβs targeting banking data, corporate VPNs, social media, and healthcare apps.
https://thehackernews.com/2024/10/trickmo-banking-trojan-can-now-capture.html
π€―21
  π₯ A critical flaw in SolarWinds Web Help Desk (CVE-2024-28987) has been actively exploited, and it involves hard-coded credentials that allow attackers to access sensitive help desk tickets. 
 
Learn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html
Learn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html
π13π7
  π‘οΈ GitHub has released urgent security updates to fix a critical flaw (CVE-2024-9487) with a CVSS score of 9.5! 
 
This bug allows unauthorized access by bypassing SAML SSO authenticationβan immediate threat to your enterprise.
 
Details: https://thehackernews.com/2024/10/github-patches-critical-flaw-in.html
This bug allows unauthorized access by bypassing SAML SSO authenticationβan immediate threat to your enterprise.
Details: https://thehackernews.com/2024/10/github-patches-critical-flaw-in.html
π₯21π6π6
  π A new spear-phishing campaign in Brazil is using a clever trick to bypass security guardrails and deliver the dangerous Astaroth #malware. 
 
Learn how to protect your organization from this growing threat: https://thehackernews.com/2024/10/astaroth-banking-malware-resurfaces-in.html
Learn how to protect your organization from this growing threat: https://thehackernews.com/2024/10/astaroth-banking-malware-resurfaces-in.html
β‘7π€7π5π₯3π2
  Zero-day vulnerabilities are on the rise, leaving businesses exposed. 
 
NDR solutions with machine learning can detect network anomalies before attacks happen. Learn how AI-driven NDR is key to defending against these evolving threats.
 
https://thehackernews.com/2024/10/rise-of-zero-day-vulnerabilities.html
NDR solutions with machine learning can detect network anomalies before attacks happen. Learn how AI-driven NDR is key to defending against these evolving threats.
https://thehackernews.com/2024/10/rise-of-zero-day-vulnerabilities.html
π9π4π3
  π₯ One click, and chaos begins! 
 
North Korean APT group ScarCruft has been linked to the exploitation of a zero-day Windows flaw (CVE-2024-38178), targeting unpatched Internet Explorer Mode in Edge, infecting devices with RokRAT malware.
 
Read: https://thehackernews.com/2024/10/north-korean-scarcruft-exploits-windows.html
North Korean APT group ScarCruft has been linked to the exploitation of a zero-day Windows flaw (CVE-2024-38178), targeting unpatched Internet Explorer Mode in Edge, infecting devices with RokRAT malware.
Read: https://thehackernews.com/2024/10/north-korean-scarcruft-exploits-windows.html
π9π7π₯6
  π‘οΈ Malware like AgentTesla is making headlines for its stealthy data theft tactics. 
 
With tools like ANYRUN's Threat Intelligence Lookup, offering searches across 40+ indicators and live sandbox analysis, threat detection has never been more powerful.
 
Read: https://thehackernews.com/2024/10/5-techniques-for-collecting-cyber.html
With tools like ANYRUN's Threat Intelligence Lookup, offering searches across 40+ indicators and live sandbox analysis, threat detection has never been more powerful.
Read: https://thehackernews.com/2024/10/5-techniques-for-collecting-cyber.html
π₯9π5
  π FIDO Alliance has proposed a new protocol to securely transfer passkeys π across different platforms. 
 
Backed by Apple, Google, Microsoft, and Amazon, this signals a major shift in the future of authentication.
 
Read: https://thehackernews.com/2024/10/fido-alliance-drafts-new-protocol-to.html
Backed by Apple, Google, Microsoft, and Amazon, this signals a major shift in the future of authentication.
Read: https://thehackernews.com/2024/10/fido-alliance-drafts-new-protocol-to.html
π18β‘4π€2
  Manage cybersecurity risk with a masterβs from Georgetown. Learn more in our Oct. 23 webinar. 
 
 
Join now: https://thn.news/cyberrisk-webinar-li
Join now: https://thn.news/cyberrisk-webinar-li
π₯7π2π2
  Researchers uncovered threat actors attempting to weaponize the open-source tool EDRSilencer to tamper with Endpoint Detection and Response (EDR) solutions.  
 
Learn how it works: https://thehackernews.com/2024/10/hackers-abuse-edrsilencer-tool-to.html
Learn how it works: https://thehackernews.com/2024/10/hackers-abuse-edrsilencer-tool-to.html
π15π€―7β‘3π2
  π Kubernetes Image Builder #vulnerability (CVE-2024-9486) has a serious root access flaw. 
 
With a CVSS score of 9.8, this flaw lets attackers exploit default credentials to take over virtual machines using certain image builds.
 
Read: https://thehackernews.com/2024/10/critical-kubernetes-image-builder.html
With a CVSS score of 9.8, this flaw lets attackers exploit default credentials to take over virtual machines using certain image builds.
Read: https://thehackernews.com/2024/10/critical-kubernetes-image-builder.html
π10π±5β‘3π€―3π2
  Privileged Access Management (PAM) is more than complianceβit's your frontline defense against threats targeting critical assets. 
 
Learn how to strengthen your PAM strategy before itβs too late.
 
Read: https://thehackernews.com/expert-insights/2024/10/master-privileged-access-management.html
Learn how to strengthen your PAM strategy before itβs too late.
Read: https://thehackernews.com/expert-insights/2024/10/master-privileged-access-management.html
π7π4π€4
  β‘ 35,000 DDoS attacks in one yearβAnonymous Sudan orchestrated this by running a DDoS botnet-for-hire.  
 
Two Sudanese brothers face charges for targeting critical infrastructure and major companies, including #Microsoft, worldwide.
 
Read: https://thehackernews.com/2024/10/us-charges-two-sudanese-brothers-for.html
Two Sudanese brothers face charges for targeting critical infrastructure and major companies, including #Microsoft, worldwide.
Read: https://thehackernews.com/2024/10/us-charges-two-sudanese-brothers-for.html
π11π5β‘4
  π¨ High-profile entities in the Middle East and Africa are under attack by SideWinder (APT-C-17), with a new multi-stage infection chain delivering the dangerous StealerBot malware. 
 
Learn more: https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html
Learn more: https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html
π€6π3π2
  π¨ Zero Trust in Google Workspace: Donβt Wait Until 2025 to Start! π¨ 
 
Nearly 50% of companies planning to implement Zero Trust security within #googlecloud environments in 2025 struggle with getting started due to challenges like handling granular access controls, monitoring and auditing. Facing similar roadblocks?
 
πΌ Join ex-Google expert Mikael Klambro and the Zenphi_co team in this free webinar to learn practical solutions, including:
 
βΆ Automating user access controls π
βΆ Managing least privilege access for employees and third-party collaborators π₯
βΆ Ensuring secure collaboration in a cloud-first environment βοΈ
 
π Bonus: Register now to receive our Zero Trust Implementation Blueprintβa resource that will not only enhance your organizationβs #datasecurity but also set you apart as a top-tier Google Workspace and cybersecurity professional.
 
π‘ Stay ahead of the curve in #accessmanagement and prepare your organization for 2025 β donβt miss it!
 
https://thn.news/zero-trust-gworkspace-webinar
  
  Nearly 50% of companies planning to implement Zero Trust security within #googlecloud environments in 2025 struggle with getting started due to challenges like handling granular access controls, monitoring and auditing. Facing similar roadblocks?
πΌ Join ex-Google expert Mikael Klambro and the Zenphi_co team in this free webinar to learn practical solutions, including:
βΆ Automating user access controls π
βΆ Managing least privilege access for employees and third-party collaborators π₯
βΆ Ensuring secure collaboration in a cloud-first environment βοΈ
π Bonus: Register now to receive our Zero Trust Implementation Blueprintβa resource that will not only enhance your organizationβs #datasecurity but also set you apart as a top-tier Google Workspace and cybersecurity professional.
π‘ Stay ahead of the curve in #accessmanagement and prepare your organization for 2025 β donβt miss it!
https://thn.news/zero-trust-gworkspace-webinar
zenphi
  
  Webinar | Zero Trust Model in Google Workspace
  Learn how to overcome challenges associated with implementing Zero Trust model in Cloud environments like Google Workspace. Hands-on approach
π12π2π2
  π¨ Researchers just infiltrated the affiliate panel of the rising ransomware group, Cicada3301. This RaaS is targeting critical sectors with sophisticated, cross-platform attacks. 
 
Learn more: https://thehackernews.com/2024/10/cross-platform-cicada3301-ransomware.html
Learn more: https://thehackernews.com/2024/10/cross-platform-cicada3301-ransomware.html
π15
  With over 80% of breaches today leveraging compromised identities, managing your SaaS attack surface is critical. Discover how to gain full visibility over your SaaS environment and minimize identity-based risks. 
 
Read: https://thehackernews.com/2024/01/5-ways-to-reduce-saas-security-risks.html
Read: https://thehackernews.com/2024/01/5-ways-to-reduce-saas-security-risks.html
π₯7π3π2
  RomComβs latest cyber espionage wave uses malware written in C++, Rust, Go, and Lua to attack high-profile Ukrainian and Polish entities. 
 
Learn more: https://thehackernews.com/2024/10/russian-romcom-attacks-target-ukrainian.html
Learn more: https://thehackernews.com/2024/10/russian-romcom-attacks-target-ukrainian.html
π9π₯4π3π2