Google takes down 1,320 YouTube channels and 1,177 Blogger blogs linked to Chinese influence operation.
Find out more about the coordinated campaign targeting U.S. foreign affairs: https://thehackernews.com/2024/06/google-takes-down-influence-campaigns.html
Find out more about the coordinated campaign targeting U.S. foreign affairs: https://thehackernews.com/2024/06/google-takes-down-influence-campaigns.html
π19π€12π±12π3π€―1
π Researchers have uncovered a vulnerability in Azure Service Tags that could allow attackers to bypass firewall rules. Microsoft has issued guidance on this issue.
Discover how to safeguard your cloud assets: https://thehackernews.com/2024/06/azure-service-tags-vulnerability.html
Discover how to safeguard your cloud assets: https://thehackernews.com/2024/06/azure-service-tags-vulnerability.html
π₯17β‘3π1π1
πͺ Cybersecurity education doesn't stop after certification.
Learn how earning CPE credits through workshops, courses, and conferences can open doors to promotions and higher-paying opportunities.
Read the full article now: https://thehackernews.com/2024/06/cybersecurity-cpes-unraveling-what-why.html
Learn how earning CPE credits through workshops, courses, and conferences can open doors to promotions and higher-paying opportunities.
Read the full article now: https://thehackernews.com/2024/06/cybersecurity-cpes-unraveling-what-why.html
π24β‘3π2
A new phishing attack distributing More_eggs malware is targeting recruiters by posing as job applicants on LinkedIn.
Learn how these sophisticated social engineering tactics work and protect your organization.
π Read more: https://thehackernews.com/2024/06/moreeggs-malware-disguised-as-resumes.html
Learn how these sophisticated social engineering tactics work and protect your organization.
π Read more: https://thehackernews.com/2024/06/moreeggs-malware-disguised-as-resumes.html
π₯17β‘8π8
Attention developers!
Arm reveals a serious security flaw in Mali GPU Kernel Drivers, impacting versions r34p0 to r40p0. This vulnerability is already being exploited.
Read: https://thehackernews.com/2024/06/arm-warns-of-actively-exploited-zero.html
Arm reveals a serious security flaw in Mali GPU Kernel Drivers, impacting versions r34p0 to r40p0. This vulnerability is already being exploited.
Read: https://thehackernews.com/2024/06/arm-warns-of-actively-exploited-zero.html
π₯13π6
π¨ New Alert: 165 Snowflake customers' data potentially exposed in a large-scale cyber campaign by UNC5537. This financially motivated threat actor is systematically compromising instances using stolen credentials.
Read: https://thehackernews.com/2024/06/snowflake-breach-exposes-165-customers.html
Read: https://thehackernews.com/2024/06/snowflake-breach-exposes-165-customers.html
π10π₯7
π‘οΈ Researchers have identified an updated version of ValleyRAT with new commands for capturing screenshots, process filtering, and more.
Learn how this multi-stage malware evades detection and threatens sensitive data.
Read: https://thehackernews.com/2024/06/china-linked-valleyrat-malware.html
Learn how this multi-stage malware evades detection and threatens sensitive data.
Read: https://thehackernews.com/2024/06/china-linked-valleyrat-malware.html
π14π₯10
π₯ Meet "Apple Intelligence" β the new generative AI features in iOS 18, iPadOS 18, and macOS Sequoia.
Apple is integrating OpenAI's ChatGPT into Siri and systemwide Writing Tools, with strong privacy protections.
Find details here: https://thehackernews.com/2024/06/apple-integrates-openais-chatgpt-into.html
Apple is integrating OpenAI's ChatGPT into Siri and systemwide Writing Tools, with strong privacy protections.
Find details here: https://thehackernews.com/2024/06/apple-integrates-openais-chatgpt-into.html
π±17π12π10π₯7π€5
Over 1,200 organizations were found vulnerable to these top 10 pentest findings.
Is your company one of them? Find out now and take action to secure your network.
π Read the full article: https://thehackernews.com/2024/06/top-10-critical-pentest-findings-2024.html
Is your company one of them? Find out now and take action to secure your network.
π Read the full article: https://thehackernews.com/2024/06/top-10-critical-pentest-findings-2024.html
π11π€5π₯3
π¨ Cyberattacks are the 1 threat to businesses. Recent study shows that phishing, identity security & ransomware are top concerns for CISOs.
Last quarter, the first individual #ransomware loss exceeded a billion dollars.
Learn more: https://thehackernews.com/expert-insights/2024/06/the-democratization-of-cyberattacks-how.html
Last quarter, the first individual #ransomware loss exceeded a billion dollars.
Learn more: https://thehackernews.com/expert-insights/2024/06/the-democratization-of-cyberattacks-how.html
π7π€5π3π₯2
π Researchers have uncovered SecShow, a Chinese actor conducting global DNS probes. Operating from CERNET, these probes exploit open DNS resolvers for potential malicious activities.
π Learn more: https://thehackernews.com/2024/06/chinese-actor-secshow-conducts-massive.html
π Learn more: https://thehackernews.com/2024/06/chinese-actor-secshow-conducts-massive.html
π±10π8π6π₯3
Your business, attack surface and the threat landscape are not static - they are constantly changing.
Knowing where and how to prioritize your security resources to achieve the greatest impact with the least time invested is critical.
π Join Intruderβs webinar (June 12, 2024) to learn why exposure management is the way forward: https://thn.news/exposure-management-class
Canβt make it? Register for the webinar and a copy will be sent.
Knowing where and how to prioritize your security resources to achieve the greatest impact with the least time invested is critical.
π Join Intruderβs webinar (June 12, 2024) to learn why exposure management is the way forward: https://thn.news/exposure-management-class
Canβt make it? Register for the webinar and a copy will be sent.
www.intruder.io
Focus on what matters most! Exposure management and your attack surface
Your business, attack surface and the threat landscape are not static - they are constantly changing. Knowing where and how to prioritize your security resources to achieve the greatest impact with the least time invested is critical. Learn about exposureβ¦
π10π3
π MSPs, are you ready to meet the soaring demand for cybersecurity services? Cynetβs All-in-One Cybersecurity Platform is your solution.
With a full suite of capabilities and 24/7 expert support, provide full breach protection with ease.
Learn more: https://thehackernews.com/2024/06/how-cynet-makes-msps-rich-their-clients.html
With a full suite of capabilities and 24/7 expert support, provide full breach protection with ease.
Learn more: https://thehackernews.com/2024/06/how-cynet-makes-msps-rich-their-clients.html
π€11π9
Microsoft has released updates addressing 51 security flaws for June 2024, including one Critical and 50 Important vulnerabilities.
Learn more: https://thehackernews.com/2024/06/microsoft-issues-patches-for-51-flaws.html
Learn more: https://thehackernews.com/2024/06/microsoft-issues-patches-for-51-flaws.html
π₯19π6π€―6π4β‘3π1π€1
π¨ Warning - Chinese state-sponsored hackers exploited a Fortinet FortiGate vulnerability to infect 20,000 systems globally, targeting governments, organizations, and the defense industry.
Read about it here: https://thehackernews.com/2024/06/china-backed-hackers-exploit-fortinet.html
#cybersecurity
Read about it here: https://thehackernews.com/2024/06/china-backed-hackers-exploit-fortinet.html
#cybersecurity
π₯16β‘10π8π€―4π2
π‘οΈ Phishing campaigns target job-seekers with WARMCOOKIE backdoor, while another sophisticated attack exploits Windows search functionality to deliver malware.
Find Out More: https://thehackernews.com/2024/06/new-phishing-campaign-deploys.html
Find Out More: https://thehackernews.com/2024/06/new-phishing-campaign-deploys.html
π€13β‘7π€―3π2π2
π¨ Alert: Black Basta ransomware group may have exploited a privilege escalation flaw (CVE-2024-26169) in the Microsoft Windows Error Reporting Service as a zero-day vulnerability.
Learn more: https://thehackernews.com/2024/06/black-basta-ransomware-may-have.html
Learn more: https://thehackernews.com/2024/06/black-basta-ransomware-may-have.html
π22π±8π7
π Researchers uncover an ongoing cryptojacking campaign targeting misconfigured Kubernetes clusters to mine Dero cryptocurrency using malicious Docker images and UPX-packed miners.
Read: https://thehackernews.com/2024/06/cryptojacking-campaign-targets.html
Read: https://thehackernews.com/2024/06/cryptojacking-campaign-targets.html
β‘10π4π2
"There is no cloud β it's just someone else's computer."
The recent Ticketmaster and Santander breaches prove this old saying still holds true.
Find out how to protect your organization's data in the cloud era. π https://thehackernews.com/2024/06/lessons-from-ticketmaster-snowflake.html
The recent Ticketmaster and Santander breaches prove this old saying still holds true.
Find out how to protect your organization's data in the cloud era. π https://thehackernews.com/2024/06/lessons-from-ticketmaster-snowflake.html
π22π10π€6β‘2π±2
Researchers have uncovered a cross-platform malware called Noodle RAT, used by Chinese-speaking threat actors for years.
Find out how this backdoor operates and why it's been flying under the radar. π
https://thehackernews.com/2024/06/new-cross-platform-malware-noodle-rat.html
Find out how this backdoor operates and why it's been flying under the radar. π
https://thehackernews.com/2024/06/new-cross-platform-malware-noodle-rat.html
π16β‘4π₯1