Attackers are increasingly targeting vulnerable developer laptops to infiltrate production systems without directly attacking them, warned cloud security expert Lee Atchison.
Learn more: https://thn.news/HIq4tcGM
Learn more: https://thn.news/HIq4tcGM
🔥35👍19😁1🤔1
Watch out, BPOs! Discover how 'Muddled Libra' cybercrime group is leveraging the 0ktapus phishing kit and social engineering tactics to infiltrate organizations and steal sensitive data.
Learn more: https://thehackernews.com/2023/06/cybercrime-group-muddled-libra-targets.html
Learn more: https://thehackernews.com/2023/06/cybercrime-group-muddled-libra-targets.html
👍20⚡4🔥4
U.K. hacker Joseph James O'Connor sentenced to 5 years for massive Twitter breach, targeting 130 high-profile accounts, executing a crypto scam, and netting $120,000 in illegal profits.
Read details: https://thehackernews.com/2023/06/twitter-hacker-sentenced-to-5-years-in.html
Read details: https://thehackernews.com/2023/06/twitter-hacker-sentenced-to-5-years-in.html
🤯23👏9😁9👍6🤔5🔥4😱1
🔒 6 known exploited vulnerabilities have been added to CISA's catalog. Apple, VMware, and Zyxel devices are affected, exposing them to code execution, zero-click exploits, & cyberespionage attacks.
Get the details and patch your systems ASAP: https://thehackernews.com/2023/06/us-cybersecurity-agency-adds-6-flaws-to.html
Get the details and patch your systems ASAP: https://thehackernews.com/2023/06/us-cybersecurity-agency-adds-6-flaws-to.html
👍30🔥8👏5🤔2
Chinese group Volt Typhoon poses a new cyber espionage threat. Learn how they infiltrate and persistently access critical infrastructure targets using web shells, living-off-the-land binaries, and stealthy tactics.
Read: https://thehackernews.com/2023/06/chinese-hackers-using-never-before-seen.html
Read: https://thehackernews.com/2023/06/chinese-hackers-using-never-before-seen.html
👍18🔥9🤯5🤔3
Microsoft exposes a surge in 🔒 credential-stealing attacks by Russian hacker group Midnight Blizzard. These hackers employ residential proxy services to conceal their targeting of governments, defense, and critical sectors.
Details: https://thehackernews.com/2023/06/microsoft-warns-of-widescale-credential.html
Details: https://thehackernews.com/2023/06/microsoft-warns-of-widescale-credential.html
👍21👏5🔥4
A Japanese cryptocurrency exchange fell victim to a recent cyberattack, deploying the stealthy JokerSpy backdoor on Apple macOS.
Find out how this sophisticated toolkit targets macOS machines: https://thehackernews.com/2023/06/japanese-cryptocurrency-exchange-falls.html
Find out how this sophisticated toolkit targets macOS machines: https://thehackernews.com/2023/06/japanese-cryptocurrency-exchange-falls.html
👍23😁6⚡2🔥2👏2🤔2
Did you know that generative AI tools can lead to data leaks? Protect your organization from inadvertent data exposure and breaches.
Discover effective strategies for securing your SaaS environment from AI-related risks.
Read: https://thehackernews.com/2023/06/how-generative-ai-can-dupe-saas.html
Discover effective strategies for securing your SaaS environment from AI-related risks.
Read: https://thehackernews.com/2023/06/how-generative-ai-can-dupe-saas.html
👍8🤔4🔥2🤯2
🔒 Researchers have uncovered an ingenious side-channel attack that can recover secret keys from a device using video footage of its power LED.
Find out how threat actors exploit this: https://thehackernews.com/2023/06/researchers-find-way-to-recover.html
Find out how threat actors exploit this: https://thehackernews.com/2023/06/researchers-find-way-to-recover.html
👍16🤯7😱6🤔5🔥2
⚡️ Urgent security alert! Fortinet has released urgent updates to fix a critical vulnerability (CVE-2023-33299) in FortiNAC, exposing networks to arbitrary code execution.
Learn more: https://thehackernews.com/2023/06/new-fortinets-fortinac-vulnerability.html
Learn more: https://thehackernews.com/2023/06/new-fortinets-fortinac-vulnerability.html
👍19🔥6😁6😱2⚡1🤔1
🚨 Alert! Anatsa banking trojan apps, distributed via Google Play Store, have infected 30,000+ users in the U.S., U.K., Germany, and Switzerland.
Read: https://thehackernews.com/2023/06/anatsa-banking-trojan-targeting-users.html
Exploiting Android accessibility services API, it bypasses fraud controls to hijack transactions.
Read: https://thehackernews.com/2023/06/anatsa-banking-trojan-targeting-users.html
Exploiting Android accessibility services API, it bypasses fraud controls to hijack transactions.
🔥15👍8😱4👏1🤔1
⚡The takedown of EncroChat, the infamous encrypted phone network used by organized crime, results in 6,558 global arrests and the recovery of €900 million in illicit funds.
Read details: https://thehackernews.com/2023/06/encrochat-bust-leads-to-6558-criminals.html
Read details: https://thehackernews.com/2023/06/encrochat-bust-leads-to-6558-criminals.html
👍21🔥8👏8🤔5🤯2
🔒 Brace yourself for the new Mockingjay process injection technique! This advanced method enables hackers to execute malicious code undetected, bypassing traditional detection mechanisms.
Read details: https://thehackernews.com/2023/06/new-mockingjay-process-injection.html
Read details: https://thehackernews.com/2023/06/new-mockingjay-process-injection.html
🤯11👍7🔥3😁2🤔1
Asset discovery alone won't cut it in the battle against cyber threats! Uncover the weaknesses and vulnerabilities lurking in your attack surface. Attack Surface Management (ASM) integrates vulnerability prioritization and remediation.
https://thehackernews.com/2023/06/beyond-asset-discovery-how-attack.html
https://thehackernews.com/2023/06/beyond-asset-discovery-how-attack.html
👍9⚡7🔥3👏3🤔2
New npm attack discovered! Cybersecurity researchers find an ongoing campaign with a unique execution chain.
Discover details here: https://thehackernews.com/2023/06/new-ongoing-campaign-targets-npm.html
Discover details here: https://thehackernews.com/2023/06/new-ongoing-campaign-targets-npm.html
😱14👍8🔥5🤔5🤯5⚡3
Critical SQL injection vulnerabilities found in Gentoo Soko! Exploiting these flaws could lead to remote code execution (RCE) on affected systems.
Discover the details: https://thehackernews.com/2023/06/critical-sql-injection-flaws-expose.html
Discover the details: https://thehackernews.com/2023/06/critical-sql-injection-flaws-expose.html
🔥26🤔2👍1
A new ransomware threat called 8Base has emerged from the shadows with a "massive spike in activity."
Find out how this group utilizes encryption and 'name-and-shame' techniques to compel victims to pay ransoms.
Details: https://thehackernews.com/2023/06/8base-ransomware-spikes-in-activity.html
Find out how this group utilizes encryption and 'name-and-shame' techniques to compel victims to pay ransoms.
Details: https://thehackernews.com/2023/06/8base-ransomware-spikes-in-activity.html
🔥16👍10🤔2
CryptosLabs scam ring exposed, amassing €480 million in illegal profits! French-speaking individuals in France, Belgium, and Luxembourg targeted since 2018.
Learn about their tactics: https://thehackernews.com/2023/06/cryptoslabs-scam-ring-targets-french.html
Learn about their tactics: https://thehackernews.com/2023/06/cryptoslabs-scam-ring-targets-french.html
👍19🔥7🤯4🤔2
Your drone may be vulnerable! New research reveals electromagnetic fault injection attacks can gain control of drones during firmware updates.
Read: https://thehackernews.com/2023/06/alert-new-electromagnetic-attacks-on.html
Read: https://thehackernews.com/2023/06/alert-new-electromagnetic-attacks-on.html
🔥26🤯14👍13🤔5
🔒 Discover the newly unearthed Windows-based information stealer, ThirdEye! This malware operates stealthily, harvesting sensitive data from infected hosts.
Read more: https://thehackernews.com/2023/06/newly-uncovered-thirdeye-windows-based.html
Read more: https://thehackernews.com/2023/06/newly-uncovered-thirdeye-windows-based.html
👍18😱4🤔3👏2