β‘ Telegram has agreed to provide users' IP addresses and phone numbers to authorities in response to valid legal requests. This decision comes after increased pressure, following the arrest of CEO Pavel Durov.
Read: https://thehackernews.com/2024/09/telegram-agrees-to-share-user-data-with.html
Read: https://thehackernews.com/2024/09/telegram-agrees-to-share-user-data-with.html
π€―96π±39π€22π20π15π₯11π4β‘3
π¨ New version of the Android banking trojan Octo2 spotted!
With enhanced Device Takeover (DTO) capabilities, it can remotely control devices to steal financial data & commit fraud undetected.
Read: https://thehackernews.com/2024/09/new-octo2-android-banking-trojan.html
With enhanced Device Takeover (DTO) capabilities, it can remotely control devices to steal financial data & commit fraud undetected.
Read: https://thehackernews.com/2024/09/new-octo2-android-banking-trojan.html
π10β‘5π±4π2
Is it time to ditch the 90-day password reset?
Frequent changes can lead to weak passwords like Password1 β‘οΈ Password2, increasing security risks. Even strong passwords arenβt foolproof as attackers exploit reuse & breaches.
Learn why 'never expire' might expose your business: https://thehackernews.com/2024/09/why-never-expire-passwords-can-be-risky.html
Frequent changes can lead to weak passwords like Password1 β‘οΈ Password2, increasing security risks. Even strong passwords arenβt foolproof as attackers exploit reuse & breaches.
Learn why 'never expire' might expose your business: https://thehackernews.com/2024/09/why-never-expire-passwords-can-be-risky.html
π18π€―4π€1
π¨ Kaspersky has officially pulled out of the U.S. market, unexpectedly replacing its antivirus software with UltraAV for some users. Many users have raised concerns about this unannounced transition.
Learn more: https://thehackernews.com/2024/09/kaspersky-exits-us-automatically.html
Learn more: https://thehackernews.com/2024/09/kaspersky-exits-us-automatically.html
π€15π6π₯6π6π±4β‘3
π¨ WEBINAR ALERT: Software Supply Chain Security 101 π¨
Join ReversingLabs on September 25th @ 12pm ET for a crash course on the technical tactics of software supply chain compromises and learn how to assess the risks posed by commercial software.
https://thn.news/supply-chain-security-101
Join ReversingLabs on September 25th @ 12pm ET for a crash course on the technical tactics of software supply chain compromises and learn how to assess the risks posed by commercial software.
https://thn.news/supply-chain-security-101
ReversingLabs
Software Supply Chain Security 101
This discussion details the tactics used to compromise software supply chains & embed threats in software.
π11π€―4π2π€2
π₯ Anyrun just released Safebrowsing β a new service that lets you quickly explore URLs in an isolated virtual browser.
π‘οΈ It notifies you about threats and has a friendly interface, perfect for users with any expertise level.
Give it a try, it's freeπ https://thn.news/malware-analysis-sandbox-1
π‘οΈ It notifies you about threats and has a friendly interface, perfect for users with any expertise level.
Give it a try, it's freeπ https://thn.news/malware-analysis-sandbox-1
app.any.run
Interactive Online Malware Analysis Sandbox - ANY.RUN
Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools.
π27π€8π₯5π€―4
The U.S. Department of Commerce is proposing a ban on connected vehicles with software and hardware from foreign adversaries like China and Russia.
The ban impacts VCS and ADS tech in vehicles and could take full effect by 2027-2030.
Read: https://thehackernews.com/2024/09/us-proposes-ban-on-connected-vehicles.html
The ban impacts VCS and ADS tech in vehicles and could take full effect by 2027-2030.
Read: https://thehackernews.com/2024/09/us-proposes-ban-on-connected-vehicles.html
π20π€―8π7
β οΈ SaaS Data Leaks Are Rising! Attacks on platforms like Azure and Snowflake expose sensitive records.
Misconfigurations and weak passwords make you vulnerable. An SSPM can detect gaps, monitor permissions, and mitigate threats in real-time.
Explore: https://thehackernews.com/2024/09/the-sspm-justification-kit.html
Misconfigurations and weak passwords make you vulnerable. An SSPM can detect gaps, monitor permissions, and mitigate threats in real-time.
Explore: https://thehackernews.com/2024/09/the-sspm-justification-kit.html
π₯13π4
Altered Android apps on Google Play, like Wuta Camera (10M+ downloads), spread new Necro malware.
It can run malicious code, subscribe to paid services, and create device tunnels. Necro uses steganography to hide, evading detection.
https://thehackernews.com/2024/09/necro-android-malware-found-in-popular.html
It can run malicious code, subscribe to paid services, and create device tunnels. Necro uses steganography to hide, evading detection.
https://thehackernews.com/2024/09/necro-android-malware-found-in-popular.html
π₯23π€6π5β‘3π€―1
CISA just added a critical Ivanti vTM vulnerability (CVE-2024-7593) to its Known Exploited Vulnerabilities (KEV) list due to active exploitation.
With a CVSS score of 9.8, this vulnerability allows unauthenticated attackers to bypass admin controlsβcreating rogue admin users in your system.
Ivanti has released patches, but many affected systems remain exposed. U.S. federal agencies have until October 15 to fix the issue, but anyone using Ivanti needs to act now.
Read: https://thehackernews.com/2024/09/cisa-flags-critical-ivanti-vtm.html
With a CVSS score of 9.8, this vulnerability allows unauthenticated attackers to bypass admin controlsβcreating rogue admin users in your system.
Ivanti has released patches, but many affected systems remain exposed. U.S. federal agencies have until October 15 to fix the issue, but anyone using Ivanti needs to act now.
Read: https://thehackernews.com/2024/09/cisa-flags-critical-ivanti-vtm.html
β‘11π3π€3π2
π§π Hackers are exploiting legit email accounts in transport companies to deliver RATs like NetSupport & DanaBot, causing disruptions, data theft, and major financial damage if not addressed quickly.
Learn more: https://thehackernews.com/2024/09/transportation-companies-hit-by.html
Learn more: https://thehackernews.com/2024/09/transportation-companies-hit-by.html
π7π5π€―3π₯1
A vulnerability in the memory feature of OpenAI's ChatGPT app for macOS, dubbed "SpAIware," could hvae allowed attackers to embed #spyware, exposing user data across multiple conversations.
Learn more: https://thehackernews.com/2024/09/chatgpt-macos-flaw-couldve-enabled-long.html
Learn more: https://thehackernews.com/2024/09/chatgpt-macos-flaw-couldve-enabled-long.html
π15π₯9π3
Despite a decade of SOAR advancements, SOCs remain manual-heavy. Agentic AI is breaking new ground by automating the hardest SOC tasksβtriage and investigation.
Learn how it could reshape your cybersecurity strategy: https://thehackernews.com/2024/09/agentic-ai-in-socs-solution-to-soars.html
Learn how it could reshape your cybersecurity strategy: https://thehackernews.com/2024/09/agentic-ai-in-socs-solution-to-soars.html
π€6π4π₯3
π¨ New red team tool Splinter discovered by Palo Alto's Unit 42. Not as advanced as Cobalt Strike, but still a threat if misused. Built with Rust, it enables process injection & C2 communication.
Learn more: https://thehackernews.com/2024/09/cybersecurity-researchers-warn-of-new.html
Cyber pros, stay alert!
Learn more: https://thehackernews.com/2024/09/cybersecurity-researchers-warn-of-new.html
Cyber pros, stay alert!
π13β‘1
β‘ Phishing attacks are becoming harder to spot. Learn about key phishing indicators and discover effective ways to identify and mitigate these threats using advanced tools like ANYRUN.
Read: https://thehackernews.com/2024/09/expert-tips-on-how-to-spot-phishing-link.html
Read: https://thehackernews.com/2024/09/expert-tips-on-how-to-spot-phishing-link.html
π₯15π4π3β‘1π€1
π₯ Mozilla's new Firefox browser feature, Privacy Preserving Attribution (PPA), is under fire for enabling tracking π without user consent.
While it claims to protect privacy, watchdogs argue it violates EU's GDPR.
Learn more: https://thehackernews.com/2024/09/mozilla-faces-privacy-complaint-for.html
While it claims to protect privacy, watchdogs argue it violates EU's GDPR.
Learn more: https://thehackernews.com/2024/09/mozilla-faces-privacy-complaint-for.html
π€28π€―16β‘5π5π3π₯2π1
π Googleβs transition to Rust programming language has led to a staggering drop in memory safety vulnerabilities in Androidβfrom 76% to just 24% over six years!
Learn more: https://thehackernews.com/2024/09/googles-shift-to-rust-programming-cuts.html
Learn more: https://thehackernews.com/2024/09/googles-shift-to-rust-programming-cuts.html
π₯40π€13π6β‘3π1
β οΈ Beijing-sponsored Salt Typhoon, also known as GhostEmperor, has been caught infiltrating U.S. Internet Service Providers, potentially compromising Cisco routers.
Read: https://thehackernews.com/2024/09/chinese-hackers-infiltrate-us-internet.html
The campaign's goal: to establish long-term access for data exfiltration or worse.
Read: https://thehackernews.com/2024/09/chinese-hackers-infiltrate-us-internet.html
The campaign's goal: to establish long-term access for data exfiltration or worse.
π9π€9π€―8β‘2
π SloppyLemming hacker group is using cloud services to run espionage campaigns in South & East Asia, targeting gov, law enforcement, & energy sectors.
Spear-phishing & credential harvesting are key attack methods.
Learn more: https://thehackernews.com/2024/09/cloudflare-warns-of-india-linked.html
Spear-phishing & credential harvesting are key attack methods.
Learn more: https://thehackernews.com/2024/09/cloudflare-warns-of-india-linked.html
β‘7π4π€4π₯2π€―2
π¨ SilentSelfie: Kurdish websites hit by prolonged watering hole attack, stealing sensitive data from journalists & activists.
Malicious APKs capture locations & files without persistence, making detection tougher.
Learn more: https://thehackernews.com/2024/09/watering-hole-attack-on-kurdish-sites.html
Malicious APKs capture locations & files without persistence, making detection tougher.
Learn more: https://thehackernews.com/2024/09/watering-hole-attack-on-kurdish-sites.html
π±10π5π4π€―4β‘3