π©οΈ Cyber Alert: VEILDrive Attack!
A new attack exploits Microsoft SaaS tools like Teams and OneDrive, enabling malware distribution through trusted channels.
Read the article: https://thehackernews.com/2024/11/veildrive-attack-exploits-microsoft.html
A new attack exploits Microsoft SaaS tools like Teams and OneDrive, enabling malware distribution through trusted channels.
Read the article: https://thehackernews.com/2024/11/veildrive-attack-exploits-microsoft.html
π14β‘10π6
π¨ Cisco has issued updates for CVE-2024-20418, a critical vulnerability in Ultra-Reliable Wireless Backhaul Access Points (CVSS: 10.0) that allows unauthorized root command execution.
Read: https://thehackernews.com/2024/11/cisco-releases-patch-for-critical-urwb.html
Update to version 17.15.1 ASAP to protect your network!
Read: https://thehackernews.com/2024/11/cisco-releases-patch-for-critical-urwb.html
Update to version 17.15.1 ASAP to protect your network!
π13β‘6π3π₯3π±1
π»π Developers, beware!
A malicious package named "fabrice" has been discovered on PyPI, stealthily stealing AWS credentials for over three years.
With more than 37,100 downloads, this typosquatting threat poses serious risks.
Read: https://thehackernews.com/2024/11/malicious-pypi-package-fabrice-found.html
A malicious package named "fabrice" has been discovered on PyPI, stealthily stealing AWS credentials for over three years.
With more than 37,100 downloads, this typosquatting threat poses serious risks.
Read: https://thehackernews.com/2024/11/malicious-pypi-package-fabrice-found.html
π±13π8β‘3π€―2
π¨ Cyber alert: The CopyRh(ight)adamantys phishing campaign is leveraging copyright themes to spread the Rhadamanthys stealer, while Kaspersky reveals SteelFox #malware, exploiting vulnerable drivers for data theft.
Learn more: https://thehackernews.com/2024/11/steelfox-and-rhadamanthys-malware-use.html
Learn more: https://thehackernews.com/2024/11/steelfox-and-rhadamanthys-malware-use.html
β‘6π₯5π2
π¨ MirrorFace, the China-aligned hacker group, has targeted a European diplomatic organization for the first time, using a phishing attack linked to the upcoming World Expo in 2025.
Read the full report: https://thehackernews.com/2024/11/china-aligned-mirrorface-hackers-target.html
Read the full report: https://thehackernews.com/2024/11/china-aligned-mirrorface-hackers-target.html
π5β‘3π3π2π€―1
North Korean hackers are ramping up attacks on crypto firms with a sophisticated #malware campaign.
Disguised as PDF files, this multi-stage malware is designed to evade detection and exploit macOS vulnerabilities.
Read more β https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html
Disguised as PDF files, this multi-stage malware is designed to evade detection and exploit macOS vulnerabilities.
Read more β https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html
π7π₯4π4β‘3
ππ» Cybercriminals are exploiting techniques like disabling Windows Event Logging to bypass security measures.
This tactic allows them to operate undetected, putting your organization at risk.
Learn how π https://thehackernews.com/2024/11/5-most-common-malware-techniques-in-2024.html
This tactic allows them to operate undetected, putting your organization at risk.
Learn how π https://thehackernews.com/2024/11/5-most-common-malware-techniques-in-2024.html
π13π₯9β‘3π€3π€―3
π Weak passwords continue to be a major vulnerability for organizations. With hackers able to crack simple passwords in seconds, itβs time to reassess your security measures!
π‘οΈ Learn how to reinforce your defensesβread more here: https://thehackernews.com/2024/11/a-hackers-guide-to-password-cracking.html
π‘οΈ Learn how to reinforce your defensesβread more here: https://thehackernews.com/2024/11/a-hackers-guide-to-password-cracking.html
π€8
π¨ Can your SOC keep pace with the growing number of security threats?
The 2024 State of Threat Detection Report reveals:
β Over 50% can't keep up with rising threats
β 71% say vendors must own breach failures
β 89% are turning to AI-powered tools
Is it a threat detection problem or an attack signal problem?
π Find out now. Download the free report: https://thn.news/state-of-threat-detection-2024
The 2024 State of Threat Detection Report reveals:
β Over 50% can't keep up with rising threats
β 71% say vendors must own breach failures
β 89% are turning to AI-powered tools
Is it a threat detection problem or an attack signal problem?
π Find out now. Download the free report: https://thn.news/state-of-threat-detection-2024
www.vectra.ai
2024 State of Threat Detection
Discover the 2024 State of Threat Detection report insights, highlighting security team challenges, AI adoption, and vendor responsibility in enhancing cyber defense.
π11π4π€4π1π±1
π¨ CISA has added a critical #vulnerability (CVE-2024-5910) in Palo Alto Networks Expedition to its Known Exploited Vulnerabilities catalog.
This flaw allows attackers to take over admin accounts, risking sensitive data.
π Read details: https://thehackernews.com/2024/11/cisa-alerts-to-active-exploitation-of.html
This flaw allows attackers to take over admin accounts, risking sensitive data.
π Read details: https://thehackernews.com/2024/11/cisa-alerts-to-active-exploitation-of.html
β‘10π€―7
π¦ π» Researchers unveil CRON#TRAP, a new #malware campaign using a Linux virtual instance to compromise Windows systems.
Read the full article to stay informed π https://thehackernews.com/2024/11/new-crontrap-malware-infects-windows-by.html
Read the full article to stay informed π https://thehackernews.com/2024/11/new-crontrap-malware-infects-windows-by.html
π₯9π8π5
π₯ Discover how storytelling in cybersecurity training with Huntress SAT can drastically enhance your team's knowledge retention.
Join experts in our upcoming WEBINAR to see how it can reshape your infosec culture.
π Donβt miss outβwatch it here: https://thehackernews.com/2024/11/webinar-learn-how-storytelling-can-make.html
Join experts in our upcoming WEBINAR to see how it can reshape your infosec culture.
π Donβt miss outβwatch it here: https://thehackernews.com/2024/11/webinar-learn-how-storytelling-can-make.html
π8π€8β‘3π₯1
π¨ A new campaign is targeting the npm repository with malicious JavaScript libraries aimed at infecting Roblox users with open-source stealer malware.
Read the full report: https://thehackernews.com/2024/11/malicious-npm-packages-target-roblox.html
Read the full report: https://thehackernews.com/2024/11/malicious-npm-packages-target-roblox.html
π6β‘5π€5
Two cyber threat groups, Transparent Tribe and IcePeony, are intensifying attacks on India's government sectors.
Understanding these threats is crucial for protecting your organization.
Read more to stay informed: https://thehackernews.com/2024/11/icepeony-and-transparent-tribe-target.html
Understanding these threats is crucial for protecting your organization.
Read more to stay informed: https://thehackernews.com/2024/11/icepeony-and-transparent-tribe-target.html
π13β‘7π1
π‘οΈπ» AndroxGh0st malware is evolving!
Now exploiting multiple critical vulnerabilities while collaborating with the Mozi botnet, it's a serious threat to IoT and cloud security.
π Read now: https://thehackernews.com/2024/11/androxgh0st-malware-integrates-mozi.html
Now exploiting multiple critical vulnerabilities while collaborating with the Mozi botnet, it's a serious threat to IoT and cloud security.
π Read now: https://thehackernews.com/2024/11/androxgh0st-malware-integrates-mozi.html
π₯19π6π3
π΅οΈββοΈπ° The founder of Bitcoin Fog, a major #cryptocurrency mixer, sentenced to 12+ years for laundering over $400M tied to darknet crime.
Read the full story π https://thehackernews.com/2024/11/bitcoin-fog-founder-sentenced-to-12.html
Read the full story π https://thehackernews.com/2024/11/bitcoin-fog-founder-sentenced-to-12.html
β‘9π7π€―7π₯2π1
π‘ Cyberattacks on SMBs are rising, but many can't afford full-time CISOs. The vCISO model offers a cost-effective solution.
π The vCISO Academy by Cynomi equips MSPs & MSSPs with the skills to meet the growing demand.
Learn more: https://thehackernews.com/2024/11/the-vciso-academy-transforming-msps-and.html
π The vCISO Academy by Cynomi equips MSPs & MSSPs with the skills to meet the growing demand.
Learn more: https://thehackernews.com/2024/11/the-vciso-academy-transforming-msps-and.html
π13β‘9π4
β οΈ Critical "potential" RCE vulnerability in PAN-OS could expose your network to cybercriminals.
Palo Alto Networks advises securing management interfaces ASAP.
π Details here: https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html
Palo Alto Networks advises securing management interfaces ASAP.
π Details here: https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html
π16β‘12π8π€―3π±1
β οΈ New phishing campaign spreading Remcos RAT via Excel attachments! Itβs a fileless variant, making it even harder to detect.
Read: https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html
π Update your defenses NOW!
Read: https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html
π Update your defenses NOW!
π₯15π6π5β‘3
π¨ Critical Command Injection Flaws found in Aruba Networking Access Points!
Remote code execution is possibleβCVE-2024-42509 & CVE-2024-47460 threaten your networkβs security. Don't wait for an attack!
Read more: https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html
π Patch your devices NOW.
Remote code execution is possibleβCVE-2024-42509 & CVE-2024-47460 threaten your networkβs security. Don't wait for an attack!
Read more: https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html
π Patch your devices NOW.
π10β‘7π3
π Critical vulnerabilities discovered in popular open-source machine learning (ML) tools like Weave, ZenML, and Mage AI.
These flaws could lead to hijacked servers and compromised pipelines.
Read the full report here π https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html
These flaws could lead to hijacked servers and compromised pipelines.
Read the full report here π https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html
π±12π7π3π2