🔎 If you're looking for a malware sandbox with free unlimited access to Windows 10 x64 VM, try ANYRUN
It not only detects threat in <40s, but also lets you interact with your samples and the VM
Sign up and launch your analysis ➡️ https://thn.news/malware-analysis-sandbox
It not only detects threat in <40s, but also lets you interact with your samples and the VM
Sign up and launch your analysis ➡️ https://thn.news/malware-analysis-sandbox
app.any.run
Interactive Online Malware Analysis Sandbox - ANY.RUN
Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools.
🔥20👍12⚡1👏1🤔1
Critical Alert! Pro-Houthi hackers are targeting humanitarian organizations in Yemen with sophisticated Android spyware, posing severe risks to aid efforts and security.
Get the full report and stay protected: https://thehackernews.com/2024/07/pro-houthi-group-targets-yemen-aid.html
Get the full report and stay protected: https://thehackernews.com/2024/07/pro-houthi-group-targets-yemen-aid.html
👍9🔥6👏5🤔4
🚀 🔒 SaaS tools boost productivity but also expand the attack surface. Nudge Security offers a solution: discover app usage, compare security profiles, and manage costs effectively.
Details here: https://thehackernews.com/2024/07/how-to-reduce-saas-spend-and-risk.html
Empower your team with better insights and governance.
Details here: https://thehackernews.com/2024/07/how-to-reduce-saas-spend-and-risk.html
Empower your team with better insights and governance.
👍9🔥3😁3
🔐 New Threat! Play ransomware has evolved to target Linux-based VMware ESXi environments, potentially broadening its attack range and victim count.
Secure your systems against this new variant: https://thehackernews.com/2024/07/new-linux-variant-of-play-ransomware.html
Secure your systems against this new variant: https://thehackernews.com/2024/07/new-linux-variant-of-play-ransomware.html
🤯8🔥4👍3
Stay Alert! The LATAM-based FLUXROOT group is exploiting Google Cloud for phishing attacks targeting Mercado Pago users.
Protect your accounts now: https://thehackernews.com/2024/07/pineapple-and-fluxroot-hacker-groups.html
Always double-check links and use strong, unique passwords.
Protect your accounts now: https://thehackernews.com/2024/07/pineapple-and-fluxroot-hacker-groups.html
Always double-check links and use strong, unique passwords.
🤯11👍4👏2
🔔 Tired of Endless Security Questionnaires?
There's a Solution!
SafeBase's Trust Center transforms this process by automating responses and eliminating unnecessary back-and-forth, reducing your workload significantly.
Learn more: https://thehackernews.com/2024/07/how-trust-center-solves-your-security.html
There's a Solution!
SafeBase's Trust Center transforms this process by automating responses and eliminating unnecessary back-and-forth, reducing your workload significantly.
Learn more: https://thehackernews.com/2024/07/how-trust-center-solves-your-security.html
👍11👏3🤔3
🔔 Google Chrome introduces new security warnings for suspicious downloads.
Users can now send encrypted files with passwords for deep scans, ensuring comprehensive threat detection.
Update Chrome and activate Enhanced Protection: https://thehackernews.com/2024/07/new-chrome-feature-scans-password.html
Users can now send encrypted files with passwords for deep scans, ensuring comprehensive threat detection.
Update Chrome and activate Enhanced Protection: https://thehackernews.com/2024/07/new-chrome-feature-scans-password.html
👍26🤔2🔥1
Critical flaw found in Docker Engine allows attackers to bypass authorization plugins (AuthZ) - CVE-2024-41110, CVSS score 10.0.
This vulnerability can lead to severe privilege escalation, affecting numerous Docker versions.
Find details here: https://thehackernews.com/2024/07/critical-docker-engine-flaw-allows.html
This vulnerability can lead to severe privilege escalation, affecting numerous Docker versions.
Find details here: https://thehackernews.com/2024/07/critical-docker-engine-flaw-allows.html
🔥12🤯9😱5👍3😁1
ISC has released patches for multiple vulnerabilities in BIND 9 DNS software.
These flaws could be exploited to cause a DoS condition, impacting server performance and availability.
Read: https://thehackernews.com/2024/07/cisa-warns-of-exploitable.html
These flaws could be exploited to cause a DoS condition, impacting server performance and availability.
Read: https://thehackernews.com/2024/07/cisa-warns-of-exploitable.html
👍16🔥3🤯3⚡1
Researchers have disclosed a critical vulnerability, ConfusedFunction, impacting Google Cloud Functions.
This vulnerability could allow attackers to access and manipulate other services and sensitive data without authorization.
Learn more: https://thehackernews.com/2024/07/experts-expose-confusedfunction.html
This vulnerability could allow attackers to access and manipulate other services and sensitive data without authorization.
Learn more: https://thehackernews.com/2024/07/experts-expose-confusedfunction.html
⚡9👍6🔥4
Meta Platforms shuts down 63,000 Instagram accounts in Nigeria linked to financial sextortion scams.
These scams primarily targeted adult men in the U.S., posing significant financial risks.
Share this news to raise awareness and protect others: https://thehackernews.com/2024/07/meta-removes-63000-instagram-accounts.html
These scams primarily targeted adult men in the U.S., posing significant financial risks.
Share this news to raise awareness and protect others: https://thehackernews.com/2024/07/meta-removes-63000-instagram-accounts.html
🔥16👏11👍8😱2
Browser is a critical yet under-protected element in enterprise security. Traditional security tools don't sufficiently shield browser-based threats, exposing organizations to significant risks.
Discover how to secure your modern workspace: https://thehackernews.com/2024/07/webinar-securing-modern-workspace-what.html
Discover how to secure your modern workspace: https://thehackernews.com/2024/07/webinar-securing-modern-workspace-what.html
👍18🔥3
North Korean cyber espionage group APT45 is now deploying ransomware.
This marks a significant shift from traditional espionage to financially-motivated attacks, affecting critical infrastructure.
Read more: https://thehackernews.com/2024/07/north-korean-hackers-shift-from-cyber.html
This marks a significant shift from traditional espionage to financially-motivated attacks, affecting critical infrastructure.
Read more: https://thehackernews.com/2024/07/north-korean-hackers-shift-from-cyber.html
👍17🤯7👏5⚡3😁1
Progress Software urges users to update Telerik Report Server due to a critical security flaw (CVE-2024-6327) with a CVSS score of 9.9.
This vulnerability can lead to RCE, posing a significant risk to your data and systems.
Read details: https://thehackernews.com/2024/07/critical-flaw-in-telerik-report-server.html
This vulnerability can lead to RCE, posing a significant risk to your data and systems.
Read details: https://thehackernews.com/2024/07/critical-flaw-in-telerik-report-server.html
👍11⚡5
⚠️ Cyber Alert: CrowdStrike warns of a new phishing campaign exploiting the Falcon Sensor update mishap.
This sophisticated attack targets German customers with fake installers, aiming to steal sensitive data.
Read here: https://thehackernews.com/2024/07/crowdstrike-warns-of-new-phishing-scam.html
This sophisticated attack targets German customers with fake installers, aiming to steal sensitive data.
Read here: https://thehackernews.com/2024/07/crowdstrike-warns-of-new-phishing-scam.html
👍11😁7🤔7🤯4⚡2😱1
Researchers warn of a campaign exploiting Selenium Grid services for cryptocurency mining.
Over 30,000 instances are exposed to remote command execution, necessitating immediate security measures.
Learn more: https://thehackernews.com/2024/07/ongoing-cyberattack-targets-exposed.html
Over 30,000 instances are exposed to remote command execution, necessitating immediate security measures.
Learn more: https://thehackernews.com/2024/07/ongoing-cyberattack-targets-exposed.html
👍13😱5⚡3
🔐 U.S. DoJ charges North Korean hacker Rim Jong Hyok for ransomware attacks on U.S. hospitals.
The attacks disrupted essential services & posed serious risks to patient care.
💰 $10M reward announced for tips leading to the arrest of Hyok.
https://thehackernews.com/2024/07/us-doj-indicts-north-korean-hacker-for.html
The attacks disrupted essential services & posed serious risks to patient care.
💰 $10M reward announced for tips leading to the arrest of Hyok.
https://thehackernews.com/2024/07/us-doj-indicts-north-korean-hacker-for.html
😁10⚡6👍6😱5🔥3🤔1
New insights on application security testing highlight 6 essential methods.
These methods, including DAST & SAST, help identify vulnerabilities early and throughout the application lifecycle.
Learn more: https://thehackernews.com/2024/07/6-types-of-applications-security.html
These methods, including DAST & SAST, help identify vulnerabilities early and throughout the application lifecycle.
Learn more: https://thehackernews.com/2024/07/6-types-of-applications-security.html
👍20👏1
Cybersecurity expert Foster Nethercott highlights offensive AI’s potential as a major threat. Offensive AI can create novel malware capable of evading traditional security measures, posing significant risks.
His paper outlines key points: https://thehackernews.com/2024/07/offensive-ai-sine-qua-non-of.html
His paper outlines key points: https://thehackernews.com/2024/07/offensive-ai-sine-qua-non-of.html
👍10🔥5🤔5
A new phishing-as-a-service platform from the GXC Team targets Spanish banks and other institutions with malicious Android apps and AI-powered voice calling tools.
Learn more: https://thehackernews.com/2024/07/spanish-hackers-bundle-phishing-kits.html
Learn more: https://thehackernews.com/2024/07/spanish-hackers-bundle-phishing-kits.html
🔥14👍7🤯4