Non-Human Identities (NHIs) outnumber human ones by 92:1 in enterprises, making them a key target for cyber-attacks. 
 
Ghost NHIsβleftover identities after employees leaveβoften go unprotected, creating serious vulnerabilities.
 
Donβt let your organization fall behind. Learn how to secure them: Read: https://thehackernews.com/expert-insights/2024/09/security-operations-for-non-human.html
Ghost NHIsβleftover identities after employees leaveβoften go unprotected, creating serious vulnerabilities.
Donβt let your organization fall behind. Learn how to secure them: Read: https://thehackernews.com/expert-insights/2024/09/security-operations-for-non-human.html
π₯10π6π€―4β‘1
  π Discover how dynamic malware analysis & real-time interactivity reveal hidden behaviors! 
 
Tools like #AnyRun let #cybersecurity pros monitor DNS/HTTP traffic & export data for deeper analysis with Wireshark.
 
Learn more: https://thehackernews.com/2024/10/5-must-have-tools-for-effective-dynamic.html
Tools like #AnyRun let #cybersecurity pros monitor DNS/HTTP traffic & export data for deeper analysis with Wireshark.
Learn more: https://thehackernews.com/2024/10/5-must-have-tools-for-effective-dynamic.html
π9π€―3π2
  π¨ A critical vulnerability, CosmicSting (CVE-2024-34102), has hit 5% of Adobe Commerce & Magento stores. 
 
7 hacker groups are injecting malicious scripts.
 
Details here: https://thehackernews.com/2024/10/alert-adobe-commerce-and-magento-stores.html
 
Patching isnβt enoughβrotate your encryption keys now!
7 hacker groups are injecting malicious scripts.
Details here: https://thehackernews.com/2024/10/alert-adobe-commerce-and-magento-stores.html
Patching isnβt enoughβrotate your encryption keys now!
π€―8π5π€4π3
  π¨ 14 vulnerabilities found in DrayTek routers, including 2 critical (CVSS 10.0). These flaws allow attackers to take full control and infiltrate networks. 
 
Read: https://thehackernews.com/2024/10/alert-over-700000-draytek-routers.html
 
With 704,000+ routers exposed online, the risk is massive. Patch now!
Read: https://thehackernews.com/2024/10/alert-over-700000-draytek-routers.html
With 704,000+ routers exposed online, the risk is massive. Patch now!
π9π4π₯3π€1
  β οΈ π The Hidden Threat in Your Inbox! 
 
A spear-phishing campaign is tricking recruiters into downloading a JavaScript backdoor called More_Eggs through fake resumes.
 
Learn how to protect your team and avoid costly breaches: https://thehackernews.com/2024/10/fake-job-applications-deliver-dangerous.html
A spear-phishing campaign is tricking recruiters into downloading a JavaScript backdoor called More_Eggs through fake resumes.
Learn how to protect your team and avoid costly breaches: https://thehackernews.com/2024/10/fake-job-applications-deliver-dangerous.html
π11π₯4β‘2π€―2π1
  β οΈ New threat alert: CeranaKeeper is targeting Southeast Asia with massive data exfiltration! 
 
Using tools like TONESHELL & PUBLOAD, it evades detection by abusing Dropbox & OneDrive.
 
Learn more: https://thehackernews.com/2024/10/china-linked-ceranakeeper-targeting.html
Using tools like TONESHELL & PUBLOAD, it evades detection by abusing Dropbox & OneDrive.
Learn more: https://thehackernews.com/2024/10/china-linked-ceranakeeper-targeting.html
π13π₯6β‘4π1
  A global fraud campaign is using fake trading apps like SBI-INT and FINANS INSIGHTS on the Apple & Google Play stores to scam users. These apps passed reviews, deceiving victims. 
 
Read: https://thehackernews.com/2024/10/fake-trading-apps-target-victims.html
 
Stay alert and protect your funds!
Read: https://thehackernews.com/2024/10/fake-trading-apps-target-victims.html
Stay alert and protect your funds!
π14π₯4β‘3π3
  π₯ Critical SQL Injection vulnerability (CVE-2024-29824) in Ivanti EPM is actively exploited! 
 
CVSS 9.6βunauthenticated attackers can execute code remotely. Federal agencies must patch by Oct 23.
 
Find details here: https://thehackernews.com/2024/10/ivanti-endpoint-manager-flaw-actively.html
CVSS 9.6βunauthenticated attackers can execute code remotely. Federal agencies must patch by Oct 23.
Find details here: https://thehackernews.com/2024/10/ivanti-endpoint-manager-flaw-actively.html
π€10β‘7π€―1
  Authorities arrested 4 linked to LockBit ransomware, including a suspected developer in France. Aleksandr Ryzhenkov, a high-ranking Evil Corp member and LockBit affiliate, was outed. 
 
Read: https://thehackernews.com/2024/10/lockbit-ransomware-and-evil-corp.html
 
Operation also exposed Kremlin ties to cybercrime groups.
Read: https://thehackernews.com/2024/10/lockbit-ransomware-and-evil-corp.html
Operation also exposed Kremlin ties to cybercrime groups.
π₯16π€―8π7π€4π±4β‘3
  INTERPOL cracks down on phishing scams and romance fraud in West Africa under Operation Contender 2.0, emphasizing global cooperation in cybersecurity. 
 
Learn more: https://thehackernews.com/2024/10/interpol-arrests-8-in-major-phishing.html
Learn more: https://thehackernews.com/2024/10/interpol-arrests-8-in-major-phishing.html
π13π10
  β οΈ North Korean-backed APT37 (aka InkySquid) has been observed delivering a never-before-seen backdoor, VeilShell, as part of stealthy state-sponsored cyberattacks targeting Southeast Asia. 
 
Find details here: https://thehackernews.com/2024/10/north-korean-hackers-using-new.html
Find details here: https://thehackernews.com/2024/10/north-korean-hackers-using-new.html
π8π3π±3π2
  π΄ New stealthy #malware "Perfctl" is hitting Linux servers, running crypto miners & proxyjacking undetected. It exploits Polkit vulnerability (CVE-2021-4043) for privilege escalation & uses a rootkit to evade defense. 
 
Details here: https://thehackernews.com/2024/10/new-perfctl-malware-targets-linux.html
Details here: https://thehackernews.com/2024/10/new-perfctl-malware-targets-linux.html
π₯17π3
  As non-human identities outnumber human ones, they pose an escalating security risk. Learn why machine identity management is vital for modern cybersecurity. 
 
Read: https://thehackernews.com/2024/10/the-secret-weakness-execs-are.html
Read: https://thehackernews.com/2024/10/the-secret-weakness-execs-are.html
π9π₯5π2
  Google is enhancing Android 14 security on Pixel devices to prevent 2G attacks and protect against baseband exploits. Baseband vulnerabilities expose devices to remote attacks, potentially compromising sensitive data. 
 
Read: https://thehackernews.com/2024/10/android-14-adds-new-security-features.html
Read: https://thehackernews.com/2024/10/android-14-adds-new-security-features.html
π33π6β‘5π4π₯1
  A major #vulnerability (CVE-2024-47374) in the LiteSpeed Cache WordPress plugin could allow attackers to execute arbitrary #JavaScript and hijack accounts. 
 
Find details here: https://thehackernews.com/2024/10/wordpress-litespeed-cache-plugin.html
 
Patch now to protect your site.
Find details here: https://thehackernews.com/2024/10/wordpress-litespeed-cache-plugin.html
Patch now to protect your site.
π₯14π5π2
  The largest-ever DDoS attack just occurredβ3.8 Tbps in just 65 seconds! 
 
Is your CPU capacity prepared to filter massive attack traffic? Attackers leveraged compromised ASUS routers, a serious reminder to address CVE-2024-3080 now.
 
Read: https://thehackernews.com/2024/10/cloudflare-thwarts-largest-ever-38-tbps.html
Is your CPU capacity prepared to filter massive attack traffic? Attackers leveraged compromised ASUS routers, a serious reminder to address CVE-2024-3080 now.
Read: https://thehackernews.com/2024/10/cloudflare-thwarts-largest-ever-38-tbps.html
π₯28π€―21π5β‘3π3
  The U.S. Department of Justice and #Microsoft have seized 107 domains used by Russia-linked COLDRIVER hackers to launch phishing attacks, frequently targeting experts in Russian affairs, #privacy advocates, and intelligence officials. 
 
Read: https://thehackernews.com/2024/10/us-and-microsoft-seize-107-russian.html
Read: https://thehackernews.com/2024/10/us-and-microsoft-seize-107-russian.html
π₯15π±6π4β‘2π€―1
  Continuous Threat Exposure Management (CTEM) enables continuous protection by helping you prioritize threats with real-time data. 
 
πLearn how CTEM fits into your cybersecurity framework: https://thehackernews.com/2024/10/how-to-get-going-with-ctem-when-you.html
πLearn how CTEM fits into your cybersecurity framework: https://thehackernews.com/2024/10/how-to-get-going-with-ctem-when-you.html
π₯14π9β‘2
  Apple has released critical iOS and iPadOS updates addressing a vulnerability (CVE-2024-44204) that could expose your passwords via VoiceOver technology. 
 
Read: https://thehackernews.com/2024/10/apple-releases-critical-ios-and-ipados.html
 
iPhone XS and later, plus iPads from the Pro, Air, and Mini series, are impacted.
Read: https://thehackernews.com/2024/10/apple-releases-critical-ios-and-ipados.html
iPhone XS and later, plus iPads from the Pro, Air, and Mini series, are impacted.
π₯35π11π10π€―6β‘3π3π€3
  Meta hit hard as Europeβs top court restricts #Facebookβs use of personal data for targeted ads, even with user consent. 
 
Read > https://thehackernews.com/2024/10/eu-court-limits-metas-use-of-personal.html
 
This ruling pushes all companies to adopt more transparent, privacy-first data practices.
Read > https://thehackernews.com/2024/10/eu-court-limits-metas-use-of-personal.html
This ruling pushes all companies to adopt more transparent, privacy-first data practices.
π43π14π₯6β‘3