๐ Google will soon block unsafe #Android sideloading in India, targeting apps that abuse sensitive permissions.
Learn more: https://thehackernews.com/2024/10/google-blocks-unsafe-android-app.html
The pilot has already stopped nearly 900,000 high-risk installs in Southeast Asia, making it a vital fraud protection tool.
Learn more: https://thehackernews.com/2024/10/google-blocks-unsafe-android-app.html
The pilot has already stopped nearly 900,000 high-risk installs in Southeast Asia, making it a vital fraud protection tool.
๐8๐3๐ฅ3
A critical security flaw in Apache Avro SDK (CVE-2024-47561) threatens large-scale data processing systems.
Ensure your systems are patched to avoid arbitrary code execution risks.
Details here: https://thehackernews.com/2024/10/critical-apache-avro-sdk-flaw-allows.html
Ensure your systems are patched to avoid arbitrary code execution risks.
Details here: https://thehackernews.com/2024/10/critical-apache-avro-sdk-flaw-allows.html
๐6๐ฅ1
Meet Gorilla, a new Mirai-based botnet issuing 300,000+ attack commands in just one month.
It exploits an Apache Hadoop vulnerability to control IoT devices and cloud hosts long-term.
Discover more about its capabilities.: https://thehackernews.com/2024/10/new-gorilla-botnet-launches-over-300000.html
It exploits an Apache Hadoop vulnerability to control IoT devices and cloud hosts long-term.
Discover more about its capabilities.: https://thehackernews.com/2024/10/new-gorilla-botnet-launches-over-300000.html
๐ฅ7๐5๐2
โ ๏ธ๐ธ API vulnerabilities and bot attacks are costing organizations up to $186 billion a year. Learn how to protect your digital infrastructure from these growing threats.
๐ Read more: https://thehackernews.com/2024/10/vulnerable-apis-and-bot-attacks-costing.html
๐ Read more: https://thehackernews.com/2024/10/vulnerable-apis-and-bot-attacks-costing.html
๐12โก5๐2๐ฅ2
๐ Qualcomm releases urgent security updates, including a critical patch for CVE-2024-43047โa flaw currently being exploited in the wild.
Learn more ๐ https://thehackernews.com/2024/10/qualcomm-urges-oems-to-patch-critical.html
Qualcomm urges OEMs to deploy the update ASAP.
Learn more ๐ https://thehackernews.com/2024/10/qualcomm-urges-oems-to-patch-critical.html
Qualcomm urges OEMs to deploy the update ASAP.
The Hacker News
Qualcomm Urges OEMs to Patch Critical DSP and WLAN Flaws Amid Active Exploits
Qualcomm fixes 20 vulnerabilities, including actively exploited CVE-2024-43047 in DSP, urging fast OEM updates.
๐7๐ฅ5
Ukraine claims a cyber attack on Russian state media VGTRK on Putinโs birthday. While VGTRK downplays damage, reports say hackers wiped servers, including backupsโa warning for those relying on basic recovery plans.
Read: https://thehackernews.com/2024/10/pro-ukrainian-hackers-strike-russian.html
Read: https://thehackernews.com/2024/10/pro-ukrainian-hackers-strike-russian.html
๐26๐ฅ15๐6๐ฑ4๐คฏ2๐ค1
GoldenJackal strikes againโtargeting high-profile, air-gapped networks in embassies and government entities with sophisticated #malware like JackalWorm.
Read: https://thehackernews.com/2024/10/goldenjackal-target-embassies-and-air.html
Use of USB drives to exfiltrate data underscores the importance of monitoring offline systems.
Read: https://thehackernews.com/2024/10/goldenjackal-target-embassies-and-air.html
Use of USB drives to exfiltrate data underscores the importance of monitoring offline systems.
๐ฅ10๐4โก3๐3
โก Cyber threat group "Awaken Likho" is targeting Russian government and industrial entities with spear-phishing attacks, disguising malicious files as Word or PDF documents to trick users.
Learn more: https://thehackernews.com/2024/10/cyberattack-group-awaken-likho-targets.html
Learn more: https://thehackernews.com/2024/10/cyberattack-group-awaken-likho-targets.html
๐13๐ค7๐3๐ฑ3๐คฏ2๐ฅ1
๐ Discover how AI-powered identity systems, like One Identityโs Vigilance AIโข Threat Engine, are transforming #cybersecurity by detecting behavioral anomalies and preventing credential-based attacks.
Find details here: https://thehackernews.com/2024/10/the-value-of-ai-powered-identity.html
Find details here: https://thehackernews.com/2024/10/the-value-of-ai-powered-identity.html
๐6๐5โก3๐ฑ2
A recent case study shows how a malicious redirect led shoppers to a fake "evil twin" checkout page, stealing their financial info. Learn how quick action saved a retailer from costly damage.
Read: https://thehackernews.com/2024/10/new-case-study-evil-twin-checkout-page.html
Read: https://thehackernews.com/2024/10/new-case-study-evil-twin-checkout-page.html
๐13๐3๐คฏ1
๐ฎ Alert: Hackers are tricking GAMERS searching for cheats into downloading Lua-based malware, which stays hidden and delivers payloads like RedLine Stealer.
Learn how it works and how to stay safe: https://thehackernews.com/2024/10/gamers-tricked-into-downloading-lua.html
Learn how it works and how to stay safe: https://thehackernews.com/2024/10/gamers-tricked-into-downloading-lua.html
๐ฑ9๐8๐8๐4๐ค2โก1
โ ๏ธ WARNING: Ivantiโs CSA is under attack! Three new zero-day vulnerabilities are being actively exploited in the wild.
These flaws, CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381, allow attackers to bypass restrictions, execute arbitrary SQL, and gain remote code executionโall with admin privileges.
Find details here: https://thehackernews.com/2024/10/zero-day-alert-three-critical-ivanti.html
These flaws, CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381, allow attackers to bypass restrictions, execute arbitrary SQL, and gain remote code executionโall with admin privileges.
Find details here: https://thehackernews.com/2024/10/zero-day-alert-three-critical-ivanti.html
๐12๐6๐ค5
โ ๏ธ Microsoft warns of cyberattacks abusing OneDrive, SharePoint & Dropbox.
Hackers use โliving-off-trusted-sitesโ (LOTS) to bypass defenses. View-only files trick users into sharing 2FA tokens, leading to BEC & financial fraud.
Learn more: https://thehackernews.com/2024/10/microsoft-detects-growing-use-of-file.html
Hackers use โliving-off-trusted-sitesโ (LOTS) to bypass defenses. View-only files trick users into sharing 2FA tokens, leading to BEC & financial fraud.
Learn more: https://thehackernews.com/2024/10/microsoft-detects-growing-use-of-file.html
๐ฑ13๐10โก1๐1
๐ Microsoft has released patches for 118 vulnerabilities, two of which (CVE-2024-43572 and CVE-2024-43573) are being actively exploited in the wild.
Find details here: https://thehackernews.com/2024/10/microsoft-issues-security-update-fixing.html
Ensure your systems are protectedโapply these patches ASAP!
Find details here: https://thehackernews.com/2024/10/microsoft-issues-security-update-fixing.html
Ensure your systems are protectedโapply these patches ASAP!
The Hacker News
Microsoft Issues Security Update Fixing 118 Flaws, Two Actively Exploited in the Wild
Microsoft's October 2024 Patch Tuesday addresses 118 vulnerabilities, two under active exploitation. Apply fixes now.
๐ค8๐ฅ6๐5๐5๐4
New IoT regulations may force small manufacturers out of business, despite improving security. With 100+ new vulnerabilities daily, compliance costs are rising fast.
How will this impact cybersecurity? Read: https://thehackernews.com/expert-insights/2024/10/will-small-iot-device-oem-survive.html
How will this impact cybersecurity? Read: https://thehackernews.com/expert-insights/2024/10/will-small-iot-device-oem-survive.html
๐10๐4
Social media security is crucial for protecting your brand and finances. Poor governance can lead to unauthorized access and costly mistakes.
Learn how SSPM tools can help safeguard against unauthorized access and financial risks.
Read: https://thehackernews.com/2024/10/social-media-accounts-weak-link-in.html
Learn how SSPM tools can help safeguard against unauthorized access and financial risks.
Read: https://thehackernews.com/2024/10/social-media-accounts-weak-link-in.html
๐ค8๐5๐2
๐จ Developers Under Attack!
A North Korean campaign, "Contagious Interview," is tricking job seekers with fake offers, leading to malware disguised as coding tasks.
Hackers use fake video conferencing apps to target both Windows & macOS.
Read: https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html
A North Korean campaign, "Contagious Interview," is tricking job seekers with fake offers, leading to malware disguised as coding tasks.
Hackers use fake video conferencing apps to target both Windows & macOS.
Read: https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html
๐14๐ฅ4๐ค4
โ ๏ธ Multiple MMS protocol vulnerabilities pose a severe threat to industrial devices, potentially leading to crashes or remote code execution that could disrupt critical infrastructure.
Learn more: https://thehackernews.com/2024/10/researchers-uncover-major-security.html
#infosec
Learn more: https://thehackernews.com/2024/10/researchers-uncover-major-security.html
#infosec
The Hacker News
Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries
Multiple MMS protocol vulnerabilities expose industrial systems to remote code execution, crashes, and DoS attacks.
๐ฅ9๐4๐ค2
Google partners with GASA and DNS RF to launch the Global Signal Exchange (GSE), providing real-time insights into scam patterns to protect businesses from cybercrime.
Read: https://thehackernews.com/2024/10/google-joins-forces-with-gasa-and-dns.html
Read: https://thehackernews.com/2024/10/google-joins-forces-with-gasa-and-dns.html
The Hacker News
Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale
Google partners with GASA and DNS RF to launch Global Signal Exchange, enhancing real-time scam detection.
๐ค10๐5๐1
๐จ Warning: A critical #vulnerability (CVE-2024-9680) in Firefox is being actively exploited.
Donโt waitโensure your browsers are updated now to protect against potential remote code execution.
Learn more: https://thehackernews.com/2024/10/mozilla-warns-of-active-exploitation-in.html
Donโt waitโensure your browsers are updated now to protect against potential remote code execution.
Learn more: https://thehackernews.com/2024/10/mozilla-warns-of-active-exploitation-in.html
๐ฑ25๐13๐คฏ6๐ฅ3๐2๐1