The U.S. Department of Justice and #Microsoft have seized 107 domains used by Russia-linked COLDRIVER hackers to launch phishing attacks, frequently targeting experts in Russian affairs, #privacy advocates, and intelligence officials.
Read: https://thehackernews.com/2024/10/us-and-microsoft-seize-107-russian.html
Read: https://thehackernews.com/2024/10/us-and-microsoft-seize-107-russian.html
๐ฅ15๐ฑ6๐4โก2๐คฏ1
Continuous Threat Exposure Management (CTEM) enables continuous protection by helping you prioritize threats with real-time data.
๐Learn how CTEM fits into your cybersecurity framework: https://thehackernews.com/2024/10/how-to-get-going-with-ctem-when-you.html
๐Learn how CTEM fits into your cybersecurity framework: https://thehackernews.com/2024/10/how-to-get-going-with-ctem-when-you.html
๐ฅ14๐9โก2
Apple has released critical iOS and iPadOS updates addressing a vulnerability (CVE-2024-44204) that could expose your passwords via VoiceOver technology.
Read: https://thehackernews.com/2024/10/apple-releases-critical-ios-and-ipados.html
iPhone XS and later, plus iPads from the Pro, Air, and Mini series, are impacted.
Read: https://thehackernews.com/2024/10/apple-releases-critical-ios-and-ipados.html
iPhone XS and later, plus iPads from the Pro, Air, and Mini series, are impacted.
๐ฅ35๐11๐10๐คฏ6โก3๐3๐ค3
Meta hit hard as Europeโs top court restricts #Facebookโs use of personal data for targeted ads, even with user consent.
Read > https://thehackernews.com/2024/10/eu-court-limits-metas-use-of-personal.html
This ruling pushes all companies to adopt more transparent, privacy-first data practices.
Read > https://thehackernews.com/2024/10/eu-court-limits-metas-use-of-personal.html
This ruling pushes all companies to adopt more transparent, privacy-first data practices.
๐43๐14๐ฅ6โก3
๐จ Just dropped the latest Cybersecurity Recap newsletter! Dive into:
โRecord-breaking DDoS attacks ๐
โEvil Corp & LockBit takedowns ๐ต๏ธโโ๏ธ
โNew North Korean malware ๐ฆ
โ700K+ routers vulnerable to attack ๐จ
Read: https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats-and.html
Stay secure, stay informed!
โRecord-breaking DDoS attacks ๐
โEvil Corp & LockBit takedowns ๐ต๏ธโโ๏ธ
โNew North Korean malware ๐ฆ
โ700K+ routers vulnerable to attack ๐จ
Read: https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats-and.html
Stay secure, stay informed!
๐ฅ7โก2๐1๐1๐คฏ1
๐ Google will soon block unsafe #Android sideloading in India, targeting apps that abuse sensitive permissions.
Learn more: https://thehackernews.com/2024/10/google-blocks-unsafe-android-app.html
The pilot has already stopped nearly 900,000 high-risk installs in Southeast Asia, making it a vital fraud protection tool.
Learn more: https://thehackernews.com/2024/10/google-blocks-unsafe-android-app.html
The pilot has already stopped nearly 900,000 high-risk installs in Southeast Asia, making it a vital fraud protection tool.
๐8๐3๐ฅ3
A critical security flaw in Apache Avro SDK (CVE-2024-47561) threatens large-scale data processing systems.
Ensure your systems are patched to avoid arbitrary code execution risks.
Details here: https://thehackernews.com/2024/10/critical-apache-avro-sdk-flaw-allows.html
Ensure your systems are patched to avoid arbitrary code execution risks.
Details here: https://thehackernews.com/2024/10/critical-apache-avro-sdk-flaw-allows.html
๐6๐ฅ1
Meet Gorilla, a new Mirai-based botnet issuing 300,000+ attack commands in just one month.
It exploits an Apache Hadoop vulnerability to control IoT devices and cloud hosts long-term.
Discover more about its capabilities.: https://thehackernews.com/2024/10/new-gorilla-botnet-launches-over-300000.html
It exploits an Apache Hadoop vulnerability to control IoT devices and cloud hosts long-term.
Discover more about its capabilities.: https://thehackernews.com/2024/10/new-gorilla-botnet-launches-over-300000.html
๐ฅ7๐5๐2
โ ๏ธ๐ธ API vulnerabilities and bot attacks are costing organizations up to $186 billion a year. Learn how to protect your digital infrastructure from these growing threats.
๐ Read more: https://thehackernews.com/2024/10/vulnerable-apis-and-bot-attacks-costing.html
๐ Read more: https://thehackernews.com/2024/10/vulnerable-apis-and-bot-attacks-costing.html
๐12โก5๐2๐ฅ2
๐ Qualcomm releases urgent security updates, including a critical patch for CVE-2024-43047โa flaw currently being exploited in the wild.
Learn more ๐ https://thehackernews.com/2024/10/qualcomm-urges-oems-to-patch-critical.html
Qualcomm urges OEMs to deploy the update ASAP.
Learn more ๐ https://thehackernews.com/2024/10/qualcomm-urges-oems-to-patch-critical.html
Qualcomm urges OEMs to deploy the update ASAP.
The Hacker News
Qualcomm Urges OEMs to Patch Critical DSP and WLAN Flaws Amid Active Exploits
Qualcomm fixes 20 vulnerabilities, including actively exploited CVE-2024-43047 in DSP, urging fast OEM updates.
๐7๐ฅ5
Ukraine claims a cyber attack on Russian state media VGTRK on Putinโs birthday. While VGTRK downplays damage, reports say hackers wiped servers, including backupsโa warning for those relying on basic recovery plans.
Read: https://thehackernews.com/2024/10/pro-ukrainian-hackers-strike-russian.html
Read: https://thehackernews.com/2024/10/pro-ukrainian-hackers-strike-russian.html
๐26๐ฅ15๐6๐ฑ4๐คฏ2๐ค1
GoldenJackal strikes againโtargeting high-profile, air-gapped networks in embassies and government entities with sophisticated #malware like JackalWorm.
Read: https://thehackernews.com/2024/10/goldenjackal-target-embassies-and-air.html
Use of USB drives to exfiltrate data underscores the importance of monitoring offline systems.
Read: https://thehackernews.com/2024/10/goldenjackal-target-embassies-and-air.html
Use of USB drives to exfiltrate data underscores the importance of monitoring offline systems.
๐ฅ10๐4โก3๐3
โก Cyber threat group "Awaken Likho" is targeting Russian government and industrial entities with spear-phishing attacks, disguising malicious files as Word or PDF documents to trick users.
Learn more: https://thehackernews.com/2024/10/cyberattack-group-awaken-likho-targets.html
Learn more: https://thehackernews.com/2024/10/cyberattack-group-awaken-likho-targets.html
๐13๐ค7๐3๐ฑ3๐คฏ2๐ฅ1
๐ Discover how AI-powered identity systems, like One Identityโs Vigilance AIโข Threat Engine, are transforming #cybersecurity by detecting behavioral anomalies and preventing credential-based attacks.
Find details here: https://thehackernews.com/2024/10/the-value-of-ai-powered-identity.html
Find details here: https://thehackernews.com/2024/10/the-value-of-ai-powered-identity.html
๐6๐5โก3๐ฑ2
A recent case study shows how a malicious redirect led shoppers to a fake "evil twin" checkout page, stealing their financial info. Learn how quick action saved a retailer from costly damage.
Read: https://thehackernews.com/2024/10/new-case-study-evil-twin-checkout-page.html
Read: https://thehackernews.com/2024/10/new-case-study-evil-twin-checkout-page.html
๐13๐3๐คฏ1
๐ฎ Alert: Hackers are tricking GAMERS searching for cheats into downloading Lua-based malware, which stays hidden and delivers payloads like RedLine Stealer.
Learn how it works and how to stay safe: https://thehackernews.com/2024/10/gamers-tricked-into-downloading-lua.html
Learn how it works and how to stay safe: https://thehackernews.com/2024/10/gamers-tricked-into-downloading-lua.html
๐ฑ9๐8๐8๐4๐ค2โก1
โ ๏ธ WARNING: Ivantiโs CSA is under attack! Three new zero-day vulnerabilities are being actively exploited in the wild.
These flaws, CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381, allow attackers to bypass restrictions, execute arbitrary SQL, and gain remote code executionโall with admin privileges.
Find details here: https://thehackernews.com/2024/10/zero-day-alert-three-critical-ivanti.html
These flaws, CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381, allow attackers to bypass restrictions, execute arbitrary SQL, and gain remote code executionโall with admin privileges.
Find details here: https://thehackernews.com/2024/10/zero-day-alert-three-critical-ivanti.html
๐12๐6๐ค5
โ ๏ธ Microsoft warns of cyberattacks abusing OneDrive, SharePoint & Dropbox.
Hackers use โliving-off-trusted-sitesโ (LOTS) to bypass defenses. View-only files trick users into sharing 2FA tokens, leading to BEC & financial fraud.
Learn more: https://thehackernews.com/2024/10/microsoft-detects-growing-use-of-file.html
Hackers use โliving-off-trusted-sitesโ (LOTS) to bypass defenses. View-only files trick users into sharing 2FA tokens, leading to BEC & financial fraud.
Learn more: https://thehackernews.com/2024/10/microsoft-detects-growing-use-of-file.html
๐ฑ13๐10โก1๐1
๐ Microsoft has released patches for 118 vulnerabilities, two of which (CVE-2024-43572 and CVE-2024-43573) are being actively exploited in the wild.
Find details here: https://thehackernews.com/2024/10/microsoft-issues-security-update-fixing.html
Ensure your systems are protectedโapply these patches ASAP!
Find details here: https://thehackernews.com/2024/10/microsoft-issues-security-update-fixing.html
Ensure your systems are protectedโapply these patches ASAP!
The Hacker News
Microsoft Issues Security Update Fixing 118 Flaws, Two Actively Exploited in the Wild
Microsoft's October 2024 Patch Tuesday addresses 118 vulnerabilities, two under active exploitation. Apply fixes now.
๐ค8๐ฅ6๐5๐5๐4
New IoT regulations may force small manufacturers out of business, despite improving security. With 100+ new vulnerabilities daily, compliance costs are rising fast.
How will this impact cybersecurity? Read: https://thehackernews.com/expert-insights/2024/10/will-small-iot-device-oem-survive.html
How will this impact cybersecurity? Read: https://thehackernews.com/expert-insights/2024/10/will-small-iot-device-oem-survive.html
๐10๐4