π¦ π» Researchers unveil CRON#TRAP, a new #malware campaign using a Linux virtual instance to compromise Windows systems.
Read the full article to stay informed π https://thehackernews.com/2024/11/new-crontrap-malware-infects-windows-by.html
Read the full article to stay informed π https://thehackernews.com/2024/11/new-crontrap-malware-infects-windows-by.html
π₯9π8π5
π₯ Discover how storytelling in cybersecurity training with Huntress SAT can drastically enhance your team's knowledge retention.
Join experts in our upcoming WEBINAR to see how it can reshape your infosec culture.
π Donβt miss outβwatch it here: https://thehackernews.com/2024/11/webinar-learn-how-storytelling-can-make.html
Join experts in our upcoming WEBINAR to see how it can reshape your infosec culture.
π Donβt miss outβwatch it here: https://thehackernews.com/2024/11/webinar-learn-how-storytelling-can-make.html
π8π€8β‘3π₯1
π¨ A new campaign is targeting the npm repository with malicious JavaScript libraries aimed at infecting Roblox users with open-source stealer malware.
Read the full report: https://thehackernews.com/2024/11/malicious-npm-packages-target-roblox.html
Read the full report: https://thehackernews.com/2024/11/malicious-npm-packages-target-roblox.html
π6β‘5π€5
Two cyber threat groups, Transparent Tribe and IcePeony, are intensifying attacks on India's government sectors.
Understanding these threats is crucial for protecting your organization.
Read more to stay informed: https://thehackernews.com/2024/11/icepeony-and-transparent-tribe-target.html
Understanding these threats is crucial for protecting your organization.
Read more to stay informed: https://thehackernews.com/2024/11/icepeony-and-transparent-tribe-target.html
π13β‘7π1
π‘οΈπ» AndroxGh0st malware is evolving!
Now exploiting multiple critical vulnerabilities while collaborating with the Mozi botnet, it's a serious threat to IoT and cloud security.
π Read now: https://thehackernews.com/2024/11/androxgh0st-malware-integrates-mozi.html
Now exploiting multiple critical vulnerabilities while collaborating with the Mozi botnet, it's a serious threat to IoT and cloud security.
π Read now: https://thehackernews.com/2024/11/androxgh0st-malware-integrates-mozi.html
π₯19π6π3
π΅οΈββοΈπ° The founder of Bitcoin Fog, a major #cryptocurrency mixer, sentenced to 12+ years for laundering over $400M tied to darknet crime.
Read the full story π https://thehackernews.com/2024/11/bitcoin-fog-founder-sentenced-to-12.html
Read the full story π https://thehackernews.com/2024/11/bitcoin-fog-founder-sentenced-to-12.html
β‘9π7π€―7π₯2π1
π‘ Cyberattacks on SMBs are rising, but many can't afford full-time CISOs. The vCISO model offers a cost-effective solution.
π The vCISO Academy by Cynomi equips MSPs & MSSPs with the skills to meet the growing demand.
Learn more: https://thehackernews.com/2024/11/the-vciso-academy-transforming-msps-and.html
π The vCISO Academy by Cynomi equips MSPs & MSSPs with the skills to meet the growing demand.
Learn more: https://thehackernews.com/2024/11/the-vciso-academy-transforming-msps-and.html
π13β‘9π4
β οΈ Critical "potential" RCE vulnerability in PAN-OS could expose your network to cybercriminals.
Palo Alto Networks advises securing management interfaces ASAP.
π Details here: https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html
Palo Alto Networks advises securing management interfaces ASAP.
π Details here: https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html
π16β‘12π8π€―3π±1
β οΈ New phishing campaign spreading Remcos RAT via Excel attachments! Itβs a fileless variant, making it even harder to detect.
Read: https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html
π Update your defenses NOW!
Read: https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html
π Update your defenses NOW!
π₯15π6π5β‘3
π¨ Critical Command Injection Flaws found in Aruba Networking Access Points!
Remote code execution is possibleβCVE-2024-42509 & CVE-2024-47460 threaten your networkβs security. Don't wait for an attack!
Read more: https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html
π Patch your devices NOW.
Remote code execution is possibleβCVE-2024-42509 & CVE-2024-47460 threaten your networkβs security. Don't wait for an attack!
Read more: https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html
π Patch your devices NOW.
π10β‘7π3
π Critical vulnerabilities discovered in popular open-source machine learning (ML) tools like Weave, ZenML, and Mage AI.
These flaws could lead to hijacked servers and compromised pipelines.
Read the full report here π https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html
These flaws could lead to hijacked servers and compromised pipelines.
Read the full report here π https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html
π±12π7π3π2
DTCC cuts breach risks by 11% with Automated Security Validation. Using Pentera, they boosted security, reduced costs, and freed up expert resourcesβwithout adding staff.
Is your team ahead, or falling behind? π€
Read how DTCC is leading the way: https://thehackernews.com/2024/11/the-roi-of-security-investments-how.html
Is your team ahead, or falling behind? π€
Read how DTCC is leading the way: https://thehackernews.com/2024/11/the-roi-of-security-investments-how.html
β‘5π4
π¨ SEO poisoning attack alert! GootLoader malware spreads by exploiting searches like "Are Bengal Cats legal in Australia?"
Read more: https://thehackernews.com/2024/11/new-gootloader-campaign-targets-users.html
Read more: https://thehackernews.com/2024/11/new-gootloader-campaign-targets-users.html
π₯7π5π3
π Imagine your banking app or car's software secretly turning on you...
This isn't a movie plotβit's the world of cyber in 2024. Dive into this weekβs wildest cyber threats and top defense tips in our latest weekly recap.
Read it here: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_11.html
This isn't a movie plotβit's the world of cyber in 2024. Dive into this weekβs wildest cyber threats and top defense tips in our latest weekly recap.
Read it here: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_11.html
π16π₯4π4
A new ransomware, Ymir, uses advanced memory management tactics to execute malicious code stealthily.
It targeted a Colombian organization after credentials were stolen by RustyStealer.
Read: https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
It targeted a Colombian organization after credentials were stolen by RustyStealer.
Read: https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
π12π€5π₯4π2
π‘οΈ North Korean hackers are using Flutter apps to target macOS with malware, bypassing traditional Apple security through signed developer IDs. Cryptocurrency companies are at risk.
Learn more: https://thehackernews.com/2024/11/north-korean-hackers-target-macos-using.html
Learn more: https://thehackernews.com/2024/11/north-korean-hackers-target-macos-using.html
π14π€―8π₯3π1
π Revolutionizing SOCs: Behavioral Analytics is BackβBetter than Ever!
Discover how behavioral analytics is transforming SOC incident response, improving speed and accuracy, and reducing resource costs.
Read: https://thehackernews.com/2024/11/5-ways-behavioral-analytics-is.html
Discover how behavioral analytics is transforming SOC incident response, improving speed and accuracy, and reducing resource costs.
Read: https://thehackernews.com/2024/11/5-ways-behavioral-analytics-is.html
π₯8π2π€2
π¨ Cybercriminals have a new weapon: GoIssue, a tool that targets #GitHub developers with bulk phishing emails.
This method can steal credentials and compromise repositories. With prices slashed, attacks are now more scalable.
Read: https://thehackernews.com/2024/11/new-phishing-tool-goissue-targets.html
This method can steal credentials and compromise repositories. With prices slashed, attacks are now more scalable.
Read: https://thehackernews.com/2024/11/new-phishing-tool-goissue-targets.html
π6π₯5π2π±1
Researchers have identified a #vulnerability in Citrix Virtual Apps that allows unauthenticated RCE through improper deserialization.
Read more: https://thehackernews.com/2024/11/new-flaws-in-citrix-virtual-apps-enable.html
Patches are available, but many organizations may still be exposed if not updated.
Read more: https://thehackernews.com/2024/11/new-flaws-in-citrix-virtual-apps-enable.html
Patches are available, but many organizations may still be exposed if not updated.
π₯14π1
Protect your organization with a Georgetown Master's in Cybersecurity Risk Management. Attend a sample class on November 19.
https://thn.news/cyber-risk-sample-class-ig
https://thn.news/cyber-risk-sample-class-ig
π12π₯5β‘3π€3π€―3π2π1π±1
π¨ Microsoft warns of actively exploited flaws in NTLM (CVE-2024-43451) & Task Scheduler (CVE-2024-49039), allowing NTLMv2 hash disclosure and privilege escalation to restricted RPC functions.
Find details on the November Patch Tuesday update: https://thehackernews.com/2024/11/microsoft-fixes-90-new-vulnerabilities.html
Find details on the November Patch Tuesday update: https://thehackernews.com/2024/11/microsoft-fixes-90-new-vulnerabilities.html
π₯14π5π5