North Korean hackers are ramping up attacks on crypto firms with a sophisticated #malware campaign.
Disguised as PDF files, this multi-stage malware is designed to evade detection and exploit macOS vulnerabilities.
Read more β https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html
Disguised as PDF files, this multi-stage malware is designed to evade detection and exploit macOS vulnerabilities.
Read more β https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html
π7π₯4π4β‘3
ππ» Cybercriminals are exploiting techniques like disabling Windows Event Logging to bypass security measures.
This tactic allows them to operate undetected, putting your organization at risk.
Learn how π https://thehackernews.com/2024/11/5-most-common-malware-techniques-in-2024.html
This tactic allows them to operate undetected, putting your organization at risk.
Learn how π https://thehackernews.com/2024/11/5-most-common-malware-techniques-in-2024.html
π13π₯9β‘3π€3π€―3
π Weak passwords continue to be a major vulnerability for organizations. With hackers able to crack simple passwords in seconds, itβs time to reassess your security measures!
π‘οΈ Learn how to reinforce your defensesβread more here: https://thehackernews.com/2024/11/a-hackers-guide-to-password-cracking.html
π‘οΈ Learn how to reinforce your defensesβread more here: https://thehackernews.com/2024/11/a-hackers-guide-to-password-cracking.html
π€8
π¨ Can your SOC keep pace with the growing number of security threats?
The 2024 State of Threat Detection Report reveals:
β Over 50% can't keep up with rising threats
β 71% say vendors must own breach failures
β 89% are turning to AI-powered tools
Is it a threat detection problem or an attack signal problem?
π Find out now. Download the free report: https://thn.news/state-of-threat-detection-2024
The 2024 State of Threat Detection Report reveals:
β Over 50% can't keep up with rising threats
β 71% say vendors must own breach failures
β 89% are turning to AI-powered tools
Is it a threat detection problem or an attack signal problem?
π Find out now. Download the free report: https://thn.news/state-of-threat-detection-2024
www.vectra.ai
2024 State of Threat Detection
Discover the 2024 State of Threat Detection report insights, highlighting security team challenges, AI adoption, and vendor responsibility in enhancing cyber defense.
π11π4π€4π1π±1
π¨ CISA has added a critical #vulnerability (CVE-2024-5910) in Palo Alto Networks Expedition to its Known Exploited Vulnerabilities catalog.
This flaw allows attackers to take over admin accounts, risking sensitive data.
π Read details: https://thehackernews.com/2024/11/cisa-alerts-to-active-exploitation-of.html
This flaw allows attackers to take over admin accounts, risking sensitive data.
π Read details: https://thehackernews.com/2024/11/cisa-alerts-to-active-exploitation-of.html
β‘10π€―7
π¦ π» Researchers unveil CRON#TRAP, a new #malware campaign using a Linux virtual instance to compromise Windows systems.
Read the full article to stay informed π https://thehackernews.com/2024/11/new-crontrap-malware-infects-windows-by.html
Read the full article to stay informed π https://thehackernews.com/2024/11/new-crontrap-malware-infects-windows-by.html
π₯9π8π5
π₯ Discover how storytelling in cybersecurity training with Huntress SAT can drastically enhance your team's knowledge retention.
Join experts in our upcoming WEBINAR to see how it can reshape your infosec culture.
π Donβt miss outβwatch it here: https://thehackernews.com/2024/11/webinar-learn-how-storytelling-can-make.html
Join experts in our upcoming WEBINAR to see how it can reshape your infosec culture.
π Donβt miss outβwatch it here: https://thehackernews.com/2024/11/webinar-learn-how-storytelling-can-make.html
π8π€8β‘3π₯1
π¨ A new campaign is targeting the npm repository with malicious JavaScript libraries aimed at infecting Roblox users with open-source stealer malware.
Read the full report: https://thehackernews.com/2024/11/malicious-npm-packages-target-roblox.html
Read the full report: https://thehackernews.com/2024/11/malicious-npm-packages-target-roblox.html
π6β‘5π€5
Two cyber threat groups, Transparent Tribe and IcePeony, are intensifying attacks on India's government sectors.
Understanding these threats is crucial for protecting your organization.
Read more to stay informed: https://thehackernews.com/2024/11/icepeony-and-transparent-tribe-target.html
Understanding these threats is crucial for protecting your organization.
Read more to stay informed: https://thehackernews.com/2024/11/icepeony-and-transparent-tribe-target.html
π13β‘7π1
π‘οΈπ» AndroxGh0st malware is evolving!
Now exploiting multiple critical vulnerabilities while collaborating with the Mozi botnet, it's a serious threat to IoT and cloud security.
π Read now: https://thehackernews.com/2024/11/androxgh0st-malware-integrates-mozi.html
Now exploiting multiple critical vulnerabilities while collaborating with the Mozi botnet, it's a serious threat to IoT and cloud security.
π Read now: https://thehackernews.com/2024/11/androxgh0st-malware-integrates-mozi.html
π₯19π6π3
π΅οΈββοΈπ° The founder of Bitcoin Fog, a major #cryptocurrency mixer, sentenced to 12+ years for laundering over $400M tied to darknet crime.
Read the full story π https://thehackernews.com/2024/11/bitcoin-fog-founder-sentenced-to-12.html
Read the full story π https://thehackernews.com/2024/11/bitcoin-fog-founder-sentenced-to-12.html
β‘9π7π€―7π₯2π1
π‘ Cyberattacks on SMBs are rising, but many can't afford full-time CISOs. The vCISO model offers a cost-effective solution.
π The vCISO Academy by Cynomi equips MSPs & MSSPs with the skills to meet the growing demand.
Learn more: https://thehackernews.com/2024/11/the-vciso-academy-transforming-msps-and.html
π The vCISO Academy by Cynomi equips MSPs & MSSPs with the skills to meet the growing demand.
Learn more: https://thehackernews.com/2024/11/the-vciso-academy-transforming-msps-and.html
π13β‘9π4
β οΈ Critical "potential" RCE vulnerability in PAN-OS could expose your network to cybercriminals.
Palo Alto Networks advises securing management interfaces ASAP.
π Details here: https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html
Palo Alto Networks advises securing management interfaces ASAP.
π Details here: https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html
π16β‘12π8π€―3π±1
β οΈ New phishing campaign spreading Remcos RAT via Excel attachments! Itβs a fileless variant, making it even harder to detect.
Read: https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html
π Update your defenses NOW!
Read: https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html
π Update your defenses NOW!
π₯15π6π5β‘3
π¨ Critical Command Injection Flaws found in Aruba Networking Access Points!
Remote code execution is possibleβCVE-2024-42509 & CVE-2024-47460 threaten your networkβs security. Don't wait for an attack!
Read more: https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html
π Patch your devices NOW.
Remote code execution is possibleβCVE-2024-42509 & CVE-2024-47460 threaten your networkβs security. Don't wait for an attack!
Read more: https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html
π Patch your devices NOW.
π10β‘7π3
π Critical vulnerabilities discovered in popular open-source machine learning (ML) tools like Weave, ZenML, and Mage AI.
These flaws could lead to hijacked servers and compromised pipelines.
Read the full report here π https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html
These flaws could lead to hijacked servers and compromised pipelines.
Read the full report here π https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html
π±12π7π3π2
DTCC cuts breach risks by 11% with Automated Security Validation. Using Pentera, they boosted security, reduced costs, and freed up expert resourcesβwithout adding staff.
Is your team ahead, or falling behind? π€
Read how DTCC is leading the way: https://thehackernews.com/2024/11/the-roi-of-security-investments-how.html
Is your team ahead, or falling behind? π€
Read how DTCC is leading the way: https://thehackernews.com/2024/11/the-roi-of-security-investments-how.html
β‘5π4
π¨ SEO poisoning attack alert! GootLoader malware spreads by exploiting searches like "Are Bengal Cats legal in Australia?"
Read more: https://thehackernews.com/2024/11/new-gootloader-campaign-targets-users.html
Read more: https://thehackernews.com/2024/11/new-gootloader-campaign-targets-users.html
π₯7π5π3
π Imagine your banking app or car's software secretly turning on you...
This isn't a movie plotβit's the world of cyber in 2024. Dive into this weekβs wildest cyber threats and top defense tips in our latest weekly recap.
Read it here: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_11.html
This isn't a movie plotβit's the world of cyber in 2024. Dive into this weekβs wildest cyber threats and top defense tips in our latest weekly recap.
Read it here: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_11.html
π16π₯4π4
A new ransomware, Ymir, uses advanced memory management tactics to execute malicious code stealthily.
It targeted a Colombian organization after credentials were stolen by RustyStealer.
Read: https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
It targeted a Colombian organization after credentials were stolen by RustyStealer.
Read: https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
π12π€5π₯4π2
π‘οΈ North Korean hackers are using Flutter apps to target macOS with malware, bypassing traditional Apple security through signed developer IDs. Cryptocurrency companies are at risk.
Learn more: https://thehackernews.com/2024/11/north-korean-hackers-target-macos-using.html
Learn more: https://thehackernews.com/2024/11/north-korean-hackers-target-macos-using.html
π14π€―8π₯3π1