π¨ Researchers warn about Ethereum key-stealing npm packages!
The identified packages, including ethers-mew and ethers-web3, allow attackers to gain SSH access by modifying the authorized keys file, making them particularly dangerous.
Read: https://thehackernews.com/2024/10/malicious-npm-packages-target.html
The identified packages, including ethers-mew and ethers-web3, allow attackers to gain SSH access by modifying the authorized keys file, making them particularly dangerous.
Read: https://thehackernews.com/2024/10/malicious-npm-packages-target.html
π€―15π6π5π₯4
β οΈ Two malware families, Bumblebee and Latrodectus, have resurfaced, leveraging advanced phishing campaigns after setbacks from Operation Endgame.
Learn more: https://thehackernews.com/2024/10/bumblebee-and-latrodectus-malware.html
Learn more: https://thehackernews.com/2024/10/bumblebee-and-latrodectus-malware.html
π13β‘6π₯1π1
Learn how bad actors exploit Docker remote API servers to deploy crypto miners and discover essential security practices for your organization.
Learn more: https://thehackernews.com/2024/10/cybercriminals-exploiting-docker-api.html
Learn more: https://thehackernews.com/2024/10/cybercriminals-exploiting-docker-api.html
π₯11π3π2
A new #vulnerability in Styra's Open Policy Agent (CVE-2024-8260) could expose NTLM credentials to attackers.
Attackers can exploit it to relay authentication, reinforcing the need for stringent input validation across all applications.
Read: https://thehackernews.com/2024/10/security-flaw-in-styras-opa-exposes.html
Attackers can exploit it to relay authentication, reinforcing the need for stringent input validation across all applications.
Read: https://thehackernews.com/2024/10/security-flaw-in-styras-opa-exposes.html
π€―11π4π3
A new phishing campaign targets Russian-speaking users with advanced RATs using Gophish.
The attack uses both Maldoc and HTML-based infections, requiring user interactionβan important reminder for professionals to train teams on recognizing phishing attempts.
https://thehackernews.com/2024/10/gophish-framework-used-in-phishing.html
The attack uses both Maldoc and HTML-based infections, requiring user interactionβan important reminder for professionals to train teams on recognizing phishing attempts.
https://thehackernews.com/2024/10/gophish-framework-used-in-phishing.html
π₯10π€―6π5π€4π±4π2π1
π Discover the risks of unmanaged service accounts in Active Directory and how to effectively monitor them for enhanced security.
Learn more about monitoring service accounts and safeguarding your network π https://thehackernews.com/2024/10/a-comprehensive-guide-to-finding.html
Learn more about monitoring service accounts and safeguarding your network π https://thehackernews.com/2024/10/a-comprehensive-guide-to-finding.html
π7π6β‘3
Cybercriminals are using new #ransomware disguised as LockBit to pressure victims, while embedding AWS credentials for data exfiltrationβhighlighting the evolving tactics of threat actors.
Learn more: https://thehackernews.com/2024/10/ransomware-gangs-use-lockbits-fame-to.html
Learn more: https://thehackernews.com/2024/10/ransomware-gangs-use-lockbits-fame-to.html
π11π€5π4β‘2π₯2
β οΈ Researchers unveil "Deceptive Delight," a new jailbreak method for large language models (LLMs) that cleverly sneaks harmful instructions into conversations.
Find details here: https://thehackernews.com/2024/10/researchers-reveal-deceptive-delight.html
Find details here: https://thehackernews.com/2024/10/researchers-reveal-deceptive-delight.html
π€―11π7π₯7β‘2
β οΈ A high-severity flaw in #Microsoft SharePoint (CVE-2024-38094) has been added to CISA's Known Exploited Vulnerabilities catalog.
Proof-of-concept (PoC) scripts are already public, making exploitation more accessible.
Learn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-of.html
Proof-of-concept (PoC) scripts are already public, making exploitation more accessible.
Learn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-of.html
π₯16π7β‘4π4π3π€2π€―1
Identity security is evolving from mere access management to a strategic business necessity.
Explore the critical state of identity security post-breach, highlighting risks and strategic insights for cybersecurity professionals.
Read: https://thehackernews.com/2024/10/permiso-state-of-identity-security-2024.html
Explore the critical state of identity security post-breach, highlighting risks and strategic insights for cybersecurity professionals.
Read: https://thehackernews.com/2024/10/permiso-state-of-identity-security-2024.html
π5π3β‘2π€―1
β οΈ New variants of Grandoreiro banking malware are evolving, targeting 1,700 financial institutions in 45 countries, and employing tactics like mouse tracking and CAPTCHA barriers, despite law enforcement efforts.
Read: https://thehackernews.com/2024/10/new-grandoreiro-banking-malware.html
Read: https://thehackernews.com/2024/10/new-grandoreiro-banking-malware.html
π15π₯3π€3β‘2π1
π¨ Fortinet confirms a critical vulnerability (CVE-2024-47575 / CVSS 9.8) affecting FortiManager is being actively exploited!
It could allow unauthorized remote access, potentially compromising sensitive data & configurations.
https://thehackernews.com/2024/10/fortinet-warns-of-critical.html
Don't waitβpatch now.
It could allow unauthorized remote access, potentially compromising sensitive data & configurations.
https://thehackernews.com/2024/10/fortinet-warns-of-critical.html
Don't waitβpatch now.
π17π₯6π3π1
North Korea's Lazarus Group exploits a zero-day #vulnerability (CVE-2024-4947) in Google Chrome to target the #cryptocurrency sector.
Exploitation strategy involved social media manipulation and fake game promotions.
Learn more: https://thehackernews.com/2024/10/lazarus-group-exploits-google-chrome.html
Exploitation strategy involved social media manipulation and fake game promotions.
Learn more: https://thehackernews.com/2024/10/lazarus-group-exploits-google-chrome.html
π₯15π10π€―4
Cisco has patched CVE-2024-20481, a #vulnerability affecting its ASA and Firepower devices that could lead to a denial-of-service (DoS) for Remote Access VPNs.
Learn more: https://thehackernews.com/2024/10/cisco-issues-urgent-fix-for-asa-and-ftd.html
Learn more: https://thehackernews.com/2024/10/cisco-issues-urgent-fix-for-asa-and-ftd.html
π7π₯7π3π1
Researchers identified a #vulnerability in AWS CDK that may lead to account takeover, with over 1% of users at risk from predictable S3 bucket names.
The solution: update your CDK version and customize bucket names.
Read: https://thehackernews.com/2024/10/aws-cloud-development-kit-vulnerability.html
The solution: update your CDK version and customize bucket names.
Read: https://thehackernews.com/2024/10/aws-cloud-development-kit-vulnerability.html
π10π€5π₯4π3
Generative AI is revolutionizing phishing attacks, posing new challenges for #cybersecurity professionals.
Discover how to combat this evolving threat.
Read β https://thehackernews.com/2024/10/why-phishing-resistant-mfa-is-no-longer.html
Discover how to combat this evolving threat.
Read β https://thehackernews.com/2024/10/why-phishing-resistant-mfa-is-no-longer.html
π10π₯6π4π€4π€―3
A new advanced Qilin #ransomware variant, Qilin.B, features enhanced AES-256-CTR and RSA-4096 encryption, making recovery nearly impossible without the attackers' keys.
Read β https://thehackernews.com/2024/10/new-qilinb-ransomware-variant-emerges.html
Read β https://thehackernews.com/2024/10/new-qilinb-ransomware-variant-emerges.html
π8π₯8β‘3π3
βοΈ LinkedIn has been fined β¬310 million for breaching GDPR regulations concerning user #privacy.
DPC found #LinkedIn's processing lacked necessary user consent and transparency, which could set a precedent for other companies.
Read β https://thehackernews.com/2024/10/irish-watchdog-imposes-record-310.html
DPC found #LinkedIn's processing lacked necessary user consent and transparency, which could set a precedent for other companies.
Read β https://thehackernews.com/2024/10/irish-watchdog-imposes-record-310.html
π24π18π9π₯8
The SEC penalizes four companiesβAvaya, Check Point, Mimecast, and Unisysβfor misleading investors following the 2020 SolarWinds cyberattack.
Learn more: https://thehackernews.com/2024/10/sec-charges-4-companies-over-misleading.html
Learn more: https://thehackernews.com/2024/10/sec-charges-4-companies-over-misleading.html
π9π9
π Apple has launched its Private Cloud Compute Virtual Research Environment (VRE) for security researchers to validate its #privacy and security claims.
It offers rewards between $50,000 and $1,000,000 for identifying flaws.
Read: https://thehackernews.com/2024/10/apple-opens-pcc-source-code-for.html
It offers rewards between $50,000 and $1,000,000 for identifying flaws.
Read: https://thehackernews.com/2024/10/apple-opens-pcc-source-code-for.html
π₯19π€―10π7π4π±4π3
Attention: CVE-2024-41992 #vulnerability in Wi-Fi Test Suite could give attackers full control over Arcadyan routers. The flaw allows for command injection, enabling full administrative access.
Find details here β https://thehackernews.com/2024/10/researchers-discover-command-injection.html
Find details here β https://thehackernews.com/2024/10/researchers-discover-command-injection.html
π€―12π10β‘3π2