Over 140,000 phishing websites connected to the Sniper Dz Phishing-as-a-Service (PhaaS) platform have surfaced, facilitating widespread credential theft.
Learn more: https://thehackernews.com/2024/10/free-sniper-dz-phishing-tools-fuel.html
Learn more: https://thehackernews.com/2024/10/free-sniper-dz-phishing-tools-fuel.html
π₯15π5β‘4
β οΈ Rhadamanthys Stealer now leverages AI-powered Optical Character Recognition (OCR) to target #cryptocurrency wallets by extracting seed phrases from images.
Learn how this malware is evolving: https://thehackernews.com/2024/10/ai-powered-rhadamanthys-stealer-targets.html
Learn how this malware is evolving: https://thehackernews.com/2024/10/ai-powered-rhadamanthys-stealer-targets.html
π€―15π6π4
Balancing #GenerativeAI productivity with security is a major challenge.
50% of heavy R&D users risk exposing source code & proprietary info, with unrestricted use leading to data leaks and costly breaches.
Explore LayerXβs guide to secure GenAI tools: https://thehackernews.com/2024/10/5-actionable-steps-to-prevent-genai.html
50% of heavy R&D users risk exposing source code & proprietary info, with unrestricted use leading to data leaks and costly breaches.
Explore LayerXβs guide to secure GenAI tools: https://thehackernews.com/2024/10/5-actionable-steps-to-prevent-genai.html
π14β‘4π4π€―2π€1
Fake PyPI packages posed as #cryptocurrency wallet recovery tools, stealing sensitive info. Attackers used dynamic dead drop resolvers, showing evolving tactics to evade detection.
Learn more: https://thehackernews.com/2024/10/pypi-repository-found-hosting-fake.html
Learn more: https://thehackernews.com/2024/10/pypi-repository-found-hosting-fake.html
π€―11π7π1
β οΈ Zimbra Collaboration is under attack via a critical vulnerability (CVE-2024-45519) enabling remote command execution.
Even without Zimbraβs postjournal enabled, attackers can exploit this flaw with crafted SMTP messages.
Learn more: https://thehackernews.com/2024/10/researchers-sound-alarm-on-active.html
Even without Zimbraβs postjournal enabled, attackers can exploit this flaw with crafted SMTP messages.
Learn more: https://thehackernews.com/2024/10/researchers-sound-alarm-on-active.html
π14π9π₯4π€―2π±2
π£ Andariel, a sub-group of Lazarus, is now targeting U.S. orgs with financially motivated attacks using Dtrack & new Nukebot malware.
Learn more: https://thehackernews.com/2024/10/andariel-hacker-group-shifts-focus-to.html
They're exploiting known vulnerabilitiesβstay alert!
Learn more: https://thehackernews.com/2024/10/andariel-hacker-group-shifts-focus-to.html
They're exploiting known vulnerabilitiesβstay alert!
π₯9π7π€―6π3π2π€1
Non-Human Identities (NHIs) outnumber human ones by 92:1 in enterprises, making them a key target for cyber-attacks.
Ghost NHIsβleftover identities after employees leaveβoften go unprotected, creating serious vulnerabilities.
Donβt let your organization fall behind. Learn how to secure them: Read: https://thehackernews.com/expert-insights/2024/09/security-operations-for-non-human.html
Ghost NHIsβleftover identities after employees leaveβoften go unprotected, creating serious vulnerabilities.
Donβt let your organization fall behind. Learn how to secure them: Read: https://thehackernews.com/expert-insights/2024/09/security-operations-for-non-human.html
π₯10π6π€―4β‘1
π Discover how dynamic malware analysis & real-time interactivity reveal hidden behaviors!
Tools like #AnyRun let #cybersecurity pros monitor DNS/HTTP traffic & export data for deeper analysis with Wireshark.
Learn more: https://thehackernews.com/2024/10/5-must-have-tools-for-effective-dynamic.html
Tools like #AnyRun let #cybersecurity pros monitor DNS/HTTP traffic & export data for deeper analysis with Wireshark.
Learn more: https://thehackernews.com/2024/10/5-must-have-tools-for-effective-dynamic.html
π9π€―3π2
π¨ A critical vulnerability, CosmicSting (CVE-2024-34102), has hit 5% of Adobe Commerce & Magento stores.
7 hacker groups are injecting malicious scripts.
Details here: https://thehackernews.com/2024/10/alert-adobe-commerce-and-magento-stores.html
Patching isnβt enoughβrotate your encryption keys now!
7 hacker groups are injecting malicious scripts.
Details here: https://thehackernews.com/2024/10/alert-adobe-commerce-and-magento-stores.html
Patching isnβt enoughβrotate your encryption keys now!
π€―8π5π€4π3
π¨ 14 vulnerabilities found in DrayTek routers, including 2 critical (CVSS 10.0). These flaws allow attackers to take full control and infiltrate networks.
Read: https://thehackernews.com/2024/10/alert-over-700000-draytek-routers.html
With 704,000+ routers exposed online, the risk is massive. Patch now!
Read: https://thehackernews.com/2024/10/alert-over-700000-draytek-routers.html
With 704,000+ routers exposed online, the risk is massive. Patch now!
π9π4π₯3π€1
β οΈ π The Hidden Threat in Your Inbox!
A spear-phishing campaign is tricking recruiters into downloading a JavaScript backdoor called More_Eggs through fake resumes.
Learn how to protect your team and avoid costly breaches: https://thehackernews.com/2024/10/fake-job-applications-deliver-dangerous.html
A spear-phishing campaign is tricking recruiters into downloading a JavaScript backdoor called More_Eggs through fake resumes.
Learn how to protect your team and avoid costly breaches: https://thehackernews.com/2024/10/fake-job-applications-deliver-dangerous.html
π11π₯4β‘2π€―2π1
β οΈ New threat alert: CeranaKeeper is targeting Southeast Asia with massive data exfiltration!
Using tools like TONESHELL & PUBLOAD, it evades detection by abusing Dropbox & OneDrive.
Learn more: https://thehackernews.com/2024/10/china-linked-ceranakeeper-targeting.html
Using tools like TONESHELL & PUBLOAD, it evades detection by abusing Dropbox & OneDrive.
Learn more: https://thehackernews.com/2024/10/china-linked-ceranakeeper-targeting.html
π13π₯6β‘4π1
A global fraud campaign is using fake trading apps like SBI-INT and FINANS INSIGHTS on the Apple & Google Play stores to scam users. These apps passed reviews, deceiving victims.
Read: https://thehackernews.com/2024/10/fake-trading-apps-target-victims.html
Stay alert and protect your funds!
Read: https://thehackernews.com/2024/10/fake-trading-apps-target-victims.html
Stay alert and protect your funds!
π14π₯4β‘3π3
π₯ Critical SQL Injection vulnerability (CVE-2024-29824) in Ivanti EPM is actively exploited!
CVSS 9.6βunauthenticated attackers can execute code remotely. Federal agencies must patch by Oct 23.
Find details here: https://thehackernews.com/2024/10/ivanti-endpoint-manager-flaw-actively.html
CVSS 9.6βunauthenticated attackers can execute code remotely. Federal agencies must patch by Oct 23.
Find details here: https://thehackernews.com/2024/10/ivanti-endpoint-manager-flaw-actively.html
π€10β‘7π€―1
Authorities arrested 4 linked to LockBit ransomware, including a suspected developer in France. Aleksandr Ryzhenkov, a high-ranking Evil Corp member and LockBit affiliate, was outed.
Read: https://thehackernews.com/2024/10/lockbit-ransomware-and-evil-corp.html
Operation also exposed Kremlin ties to cybercrime groups.
Read: https://thehackernews.com/2024/10/lockbit-ransomware-and-evil-corp.html
Operation also exposed Kremlin ties to cybercrime groups.
π₯16π€―8π7π€4π±4β‘3
INTERPOL cracks down on phishing scams and romance fraud in West Africa under Operation Contender 2.0, emphasizing global cooperation in cybersecurity.
Learn more: https://thehackernews.com/2024/10/interpol-arrests-8-in-major-phishing.html
Learn more: https://thehackernews.com/2024/10/interpol-arrests-8-in-major-phishing.html
π13π10
β οΈ North Korean-backed APT37 (aka InkySquid) has been observed delivering a never-before-seen backdoor, VeilShell, as part of stealthy state-sponsored cyberattacks targeting Southeast Asia.
Find details here: https://thehackernews.com/2024/10/north-korean-hackers-using-new.html
Find details here: https://thehackernews.com/2024/10/north-korean-hackers-using-new.html
π8π3π±3π2
π΄ New stealthy #malware "Perfctl" is hitting Linux servers, running crypto miners & proxyjacking undetected. It exploits Polkit vulnerability (CVE-2021-4043) for privilege escalation & uses a rootkit to evade defense.
Details here: https://thehackernews.com/2024/10/new-perfctl-malware-targets-linux.html
Details here: https://thehackernews.com/2024/10/new-perfctl-malware-targets-linux.html
π₯17π3
As non-human identities outnumber human ones, they pose an escalating security risk. Learn why machine identity management is vital for modern cybersecurity.
Read: https://thehackernews.com/2024/10/the-secret-weakness-execs-are.html
Read: https://thehackernews.com/2024/10/the-secret-weakness-execs-are.html
π9π₯5π2
Google is enhancing Android 14 security on Pixel devices to prevent 2G attacks and protect against baseband exploits. Baseband vulnerabilities expose devices to remote attacks, potentially compromising sensitive data.
Read: https://thehackernews.com/2024/10/android-14-adds-new-security-features.html
Read: https://thehackernews.com/2024/10/android-14-adds-new-security-features.html
π33π6β‘5π4π₯1