A new phishing campaign targets e-commerce shoppers in Europe and the U.S. with fake discounts, using SEO poisoning and typosquatting to steal payment details via fake sites.
Learn more: https://thehackernews.com/2024/11/fake-discount-sites-exploit-black.html
Learn more: https://thehackernews.com/2024/11/fake-discount-sites-exploit-black.html
β‘8π₯3π1
Google is developing a Shielded Email feature, allowing users to create email aliases for signing up online, keeping their real addresses private.
Details: https://thehackernews.com/2024/11/shielded-email-googles-latest-tool-for.html
Details: https://thehackernews.com/2024/11/shielded-email-googles-latest-tool-for.html
π32π8π₯6π€5π4π€―3
Compliance-driven pen tests may not keep up with evolving threats. Automated testing slashes costs by 60%, making frequent tests feasible.
Want real-time testing? Learn more about automated solutions: https://thehackernews.com/2024/11/beyond-compliance-advantage-of-year.html
Want real-time testing? Learn more about automated solutions: https://thehackernews.com/2024/11/beyond-compliance-advantage-of-year.html
β‘7π₯6π1
Every day, new tactics and threats emerge, from exploiting hidden tech flaws to tricking people with clever scams. In this weekβs Cybersecurity Recap, we break down the trends shaping the threat landscape and share insights to help you strengthen your defenses.
Dive into this weekβs must-know updates: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_18.html
Dive into this weekβs must-know updates: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_18.html
β‘10π3π€3
π¨ SaaS Security is Facing New Threats β With a growing number of unauthorized apps and the surge of Generative AI tools, businesses are under increased risk.
One in four SaaS apps used by organizations is unauthorizedβthis βShadow SaaSβ creates a massive blind spot, expanding attack surfaces.
Failure to secure these apps exposes businesses to data breaches, compliance violations, and even total system compromise
Learn how to safeguard your organizationβs SaaS environment and stay ahead of emerging risks in the State of SaaS Security 2024 report.
Donβt miss these critical insights. Read Now: https://thehackernews.com/expert-insights/2024/11/state-of-saas-security-report-bold.html
One in four SaaS apps used by organizations is unauthorizedβthis βShadow SaaSβ creates a massive blind spot, expanding attack surfaces.
Failure to secure these apps exposes businesses to data breaches, compliance violations, and even total system compromise
Learn how to safeguard your organizationβs SaaS environment and stay ahead of emerging risks in the State of SaaS Security 2024 report.
Donβt miss these critical insights. Read Now: https://thehackernews.com/expert-insights/2024/11/state-of-saas-security-report-bold.html
π13β‘3π2
π¨ New stealth #malware "BabbleLoader" is bypassing AI detection with a slew of evasive tricks, making it one of the most sophisticated threats in the wild.
Learn how BabbleLoader works and how to defend against it: https://thehackernews.com/2024/11/new-stealthy-babbleloader-malware.html
Learn how BabbleLoader works and how to defend against it: https://thehackernews.com/2024/11/new-stealthy-babbleloader-malware.html
π13β‘5π3
Major security flaws in Progress Kemp LoadMaster (CVE-2024-1212) and VMware vCenter Server (CVE-2024-38812 and CVE-2024-38813) are actively being exploited.
Learn how to mitigate this flaw and secure your system before itβs too late β Read more: https://thehackernews.com/2024/11/cisa-alert-active-exploitation-of.html
Learn how to mitigate this flaw and secure your system before itβs too late β Read more: https://thehackernews.com/2024/11/cisa-alert-active-exploitation-of.html
π6β‘4π3π2π€1
T-Mobile confirmed being targeted in a Chinese cyber espionage campaign alongside other telecom giants like AT&T, Verizon, and Lumen Technologies.
The attack, attributed to Salt Typhoon, aims to harvest sensitive communications from high-value intelligence targets.
Explore the full analysis of this widespread cyber threat and its potential consequences: https://thehackernews.com/2024/11/chinese-hackers-exploit-t-mobile-and.html
The attack, attributed to Salt Typhoon, aims to harvest sensitive communications from high-value intelligence targets.
Explore the full analysis of this widespread cyber threat and its potential consequences: https://thehackernews.com/2024/11/chinese-hackers-exploit-t-mobile-and.html
π11π5π₯5β‘2
A new variant of the Helldown ransomware is now targeting #Linux and virtualized infrastructures via VMware, broadening its attack surface to industries like #healthcare, manufacturing, and IT services.
With evolving tactics, this marks a major shift in ransomware strategies, now focusing on virtual machines and cloud-based infrastructures.
Learn how Helldown is evolving β https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
With evolving tactics, this marks a major shift in ransomware strategies, now focusing on virtual machines and cloud-based infrastructures.
Learn how Helldown is evolving β https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
π€10π₯6π2π€―2
β‘οΈ Attention: Palo Alto Networks has released patches for actively exploited PAN-OS vulnerabilitiesβmake sure to apply them ASAP!
Find UPDATE here: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
Find UPDATE here: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
π12π₯8π1
π Can You See the Attack Before It Happens?
In this new eBook, "11 Attack Stories Prevented by XM Cyber", we reveal real-world examples of how attackers exploit security gaps to reach critical assetsβand how XM Cyber stops them in their tracks.
Donβt waitβget ahead of the next attack. Download the eBook today: https://thn.news/preemptive-attack-stories
In this new eBook, "11 Attack Stories Prevented by XM Cyber", we reveal real-world examples of how attackers exploit security gaps to reach critical assetsβand how XM Cyber stops them in their tracks.
Donβt waitβget ahead of the next attack. Download the eBook today: https://thn.news/preemptive-attack-stories
Xmcyber
With XM Cyber you can see the attack before it happens
π11π€4π1
Ngioweb malware is fueling a massive proxy service, NSOCKS, with 80% of its bots coming from vulnerable IoT devices like routers and cameras.
This botnet runs a daily average of 35,000 active bots, with some remaining in operation for over a month.
Learn how this botnet operates β https://thehackernews.com/2024/11/ngioweb-botnet-fuels-nsocks-residential.html
This botnet runs a daily average of 35,000 active bots, with some remaining in operation for over a month.
Learn how this botnet operates β https://thehackernews.com/2024/11/ngioweb-botnet-fuels-nsocks-residential.html
π€10π7β‘2
A new attack is hijacking misconfigured Jupyter Notebooks to fuel illegal live sports streaming. These systems, used for data science, are now prime targets for malicious actors.
Learn how this attack works & what it means for your security measures β https://thehackernews.com/2024/11/hackers-hijack-unsecured-jupyter.html
Learn how this attack works & what it means for your security measures β https://thehackernews.com/2024/11/hackers-hijack-unsecured-jupyter.html
π€―14π8π3π€2π±2
π Urgent Alert: A high-severity vulnerability in Oracle's Agile PLM Framework is actively being exploited.
No username or password required, CVE-2024-21287 could leak sensitive data without any authentication.
Read the full advisory β https://thehackernews.com/2024/11/oracle-warns-of-agile-plm-vulnerability.html
No username or password required, CVE-2024-21287 could leak sensitive data without any authentication.
Read the full advisory β https://thehackernews.com/2024/11/oracle-warns-of-agile-plm-vulnerability.html
π7π€―5β‘3π2π€2
β οΈ Apple has released urgent security updates for iOS, iPadOS, macOS, and Safari, addressing two critical zero-day vulnerabilities actively exploited in the wild.
Update now to protect your Apple devices.
Find details here: https://thehackernews.com/2024/11/apple-releases-urgent-updates-to-patch.html
Update now to protect your Apple devices.
Find details here: https://thehackernews.com/2024/11/apple-releases-urgent-updates-to-patch.html
π₯17π6π€3β‘2π2π€―2π1
UPDATE: Cybercriminals are leveraging security flaws in enterprise products to gain access and deploy deadly backdoors. One of the most concerning threats is NOOPDOOR, a new implant that uses dual-mode encryption and independent backdoor commands.
Read: https://thehackernews.com/2024/11/china-aligned-mirrorface-hackers-target.html
Read: https://thehackernews.com/2024/11/china-aligned-mirrorface-hackers-target.html
π8β‘4π4π€1
PAM alone can't stop advanced threats like APTs & zero-day attacks.
The solution? Enhance PAM with continuous monitoring & real-time enforcement to close security gaps. Learn how to secure privileged access beyond PAM.
Read more: https://thehackernews.com/2024/11/privileged-accounts-hidden-threats-why.html
The solution? Enhance PAM with continuous monitoring & real-time enforcement to close security gaps. Learn how to secure privileged access beyond PAM.
Read more: https://thehackernews.com/2024/11/privileged-accounts-hidden-threats-why.html
π11β‘4π4
New China-linked cyber espionage group, Liminal Panda, targets telecom giants in South Asia & Africa for intelligence gathering.
Their custom malware toolkit, including tools like SIGTRANslator and PingPong, is designed for deep access into telecom networks and mobile data interception.
Dive into the details of these high-stakes espionage tactics: https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html
Their custom malware toolkit, including tools like SIGTRANslator and PingPong, is designed for deep access into telecom networks and mobile data interception.
Dive into the details of these high-stakes espionage tactics: https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html
π8π5β‘4
π Decade-old vulnerabilities in Ubuntu Serverβs needrestart package allow local attackers to gain root privileges with no user interaction.
If youβre using Ubuntu Server, these vulnerabilities could give attackers complete control over your system.
Learn more about how these flaws work: https://thehackernews.com/2024/11/decades-old-security-vulnerabilities.html
If youβre using Ubuntu Server, these vulnerabilities could give attackers complete control over your system.
Learn more about how these flaws work: https://thehackernews.com/2024/11/decades-old-security-vulnerabilities.html
π₯13π7π5β‘3π1
The ANY.RUN sandbox now lets you automatically detonate the latest multi-stage malware and phishing attacks.
Stages may include email attachments, URLs in QRs, rewritten links, redirects, etc.
See how it works and try it yourself β¬οΈ https://thn.news/automated-interactivity-stage-tel
Stages may include email attachments, URLs in QRs, rewritten links, redirects, etc.
See how it works and try it yourself β¬οΈ https://thn.news/automated-interactivity-stage-tel
ANY.RUN's Cybersecurity Blog
Automated Interactivity: Stage 2 - ANY.RUN's Cybersecurity Blog
See how the ANYRUN sandbox automatically detonates common cyber attack chains without any user involvement, including via API.
π₯14π7β‘1
By 2025, Non-human identities (NHIs) will be the prime vector for cyberattacks.
As automation, AI, and IoT grow, so does the attack surface. Attackers exploit NHIs to breach systems before traditional defenses can react.
Discover how NHIDR can proactively detect and stop attacks in their tracks.
Read the full article: https://thehackernews.com/2024/11/nhis-are-future-of-cybersecurity-meet.html
As automation, AI, and IoT grow, so does the attack surface. Attackers exploit NHIs to breach systems before traditional defenses can react.
Discover how NHIDR can proactively detect and stop attacks in their tracks.
Read the full article: https://thehackernews.com/2024/11/nhis-are-future-of-cybersecurity-meet.html
π13β‘2