β οΈ WARNING: Ivantiβs CSA is under attack! Three new zero-day vulnerabilities are being actively exploited in the wild.
These flaws, CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381, allow attackers to bypass restrictions, execute arbitrary SQL, and gain remote code executionβall with admin privileges.
Find details here: https://thehackernews.com/2024/10/zero-day-alert-three-critical-ivanti.html
These flaws, CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381, allow attackers to bypass restrictions, execute arbitrary SQL, and gain remote code executionβall with admin privileges.
Find details here: https://thehackernews.com/2024/10/zero-day-alert-three-critical-ivanti.html
π12π6π€5
β οΈ Microsoft warns of cyberattacks abusing OneDrive, SharePoint & Dropbox.
Hackers use βliving-off-trusted-sitesβ (LOTS) to bypass defenses. View-only files trick users into sharing 2FA tokens, leading to BEC & financial fraud.
Learn more: https://thehackernews.com/2024/10/microsoft-detects-growing-use-of-file.html
Hackers use βliving-off-trusted-sitesβ (LOTS) to bypass defenses. View-only files trick users into sharing 2FA tokens, leading to BEC & financial fraud.
Learn more: https://thehackernews.com/2024/10/microsoft-detects-growing-use-of-file.html
π±13π10β‘1π1
π Microsoft has released patches for 118 vulnerabilities, two of which (CVE-2024-43572 and CVE-2024-43573) are being actively exploited in the wild.
Find details here: https://thehackernews.com/2024/10/microsoft-issues-security-update-fixing.html
Ensure your systems are protectedβapply these patches ASAP!
Find details here: https://thehackernews.com/2024/10/microsoft-issues-security-update-fixing.html
Ensure your systems are protectedβapply these patches ASAP!
The Hacker News
Microsoft Issues Security Update Fixing 118 Flaws, Two Actively Exploited in the Wild
Microsoft's October 2024 Patch Tuesday addresses 118 vulnerabilities, two under active exploitation. Apply fixes now.
π€8π₯6π5π5π4
New IoT regulations may force small manufacturers out of business, despite improving security. With 100+ new vulnerabilities daily, compliance costs are rising fast.
How will this impact cybersecurity? Read: https://thehackernews.com/expert-insights/2024/10/will-small-iot-device-oem-survive.html
How will this impact cybersecurity? Read: https://thehackernews.com/expert-insights/2024/10/will-small-iot-device-oem-survive.html
π10π4
Social media security is crucial for protecting your brand and finances. Poor governance can lead to unauthorized access and costly mistakes.
Learn how SSPM tools can help safeguard against unauthorized access and financial risks.
Read: https://thehackernews.com/2024/10/social-media-accounts-weak-link-in.html
Learn how SSPM tools can help safeguard against unauthorized access and financial risks.
Read: https://thehackernews.com/2024/10/social-media-accounts-weak-link-in.html
π€8π5π2
π¨ Developers Under Attack!
A North Korean campaign, "Contagious Interview," is tricking job seekers with fake offers, leading to malware disguised as coding tasks.
Hackers use fake video conferencing apps to target both Windows & macOS.
Read: https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html
A North Korean campaign, "Contagious Interview," is tricking job seekers with fake offers, leading to malware disguised as coding tasks.
Hackers use fake video conferencing apps to target both Windows & macOS.
Read: https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html
π14π₯4π€4
β οΈ Multiple MMS protocol vulnerabilities pose a severe threat to industrial devices, potentially leading to crashes or remote code execution that could disrupt critical infrastructure.
Learn more: https://thehackernews.com/2024/10/researchers-uncover-major-security.html
#infosec
Learn more: https://thehackernews.com/2024/10/researchers-uncover-major-security.html
#infosec
The Hacker News
Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries
Multiple MMS protocol vulnerabilities expose industrial systems to remote code execution, crashes, and DoS attacks.
π₯9π4π€2
Google partners with GASA and DNS RF to launch the Global Signal Exchange (GSE), providing real-time insights into scam patterns to protect businesses from cybercrime.
Read: https://thehackernews.com/2024/10/google-joins-forces-with-gasa-and-dns.html
Read: https://thehackernews.com/2024/10/google-joins-forces-with-gasa-and-dns.html
The Hacker News
Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale
Google partners with GASA and DNS RF to launch Global Signal Exchange, enhancing real-time scam detection.
π€10π5π1
π¨ Warning: A critical #vulnerability (CVE-2024-9680) in Firefox is being actively exploited.
Donβt waitβensure your browsers are updated now to protect against potential remote code execution.
Learn more: https://thehackernews.com/2024/10/mozilla-warns-of-active-exploitation-in.html
Donβt waitβensure your browsers are updated now to protect against potential remote code execution.
Learn more: https://thehackernews.com/2024/10/mozilla-warns-of-active-exploitation-in.html
π±25π13π€―6π₯3π2π1
β οΈ Cyber Alerts:
βFortinet CVE-2024-23113 actively exploited, patch by Oct 30!
βPalo Alto Expedition vulnerable to SQL & OS injection.
βCisco patches critical bug in Nexus Dashboard Fabric Controller.
Read: https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html
Critical systems must be patched immediately.
βFortinet CVE-2024-23113 actively exploited, patch by Oct 30!
βPalo Alto Expedition vulnerable to SQL & OS injection.
βCisco patches critical bug in Nexus Dashboard Fabric Controller.
Read: https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html
Critical systems must be patched immediately.
The Hacker News
CISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches
CISA flags a critical Fortinet flaw under active exploitation. Palo Alto Networks and Cisco also release urgent security patches.
π9β‘3π₯3π€2
π¨ New "Mongolian Skimmer" uses Unicode obfuscation to steal sensitive data from e-commerce sites!
It disables debugging tools & adapts to browsers, making it highly evasive.
Learn more: https://thehackernews.com/2024/10/cybercriminals-use-unicode-to-hide.html
It disables debugging tools & adapts to browsers, making it highly evasive.
Learn more: https://thehackernews.com/2024/10/cybercriminals-use-unicode-to-hide.html
π10π₯4β‘3π2π€―1
π§ SOC Analyst burnout is surging, with 80.8% expecting stress to worsen. AI-driven triage and response can ease the burden, allowing analysts to focus on higher-value tasks.
Discover how AI can lighten the load for your team: https://thehackernews.com/2024/10/6-simple-steps-to-eliminate-soc-analyst.html
Discover how AI can lighten the load for your team: https://thehackernews.com/2024/10/6-simple-steps-to-eliminate-soc-analyst.html
π16π€8
A critical unpatched #vulnerability (CVE-2024-9441) in the Nice Linear eMerge E3 access controller has been uncovered, carrying a CVSS score of 9.8, with proof-of-concept exploits already circulating.
Learn more: https://thehackernews.com/2024/10/experts-warn-of-critical-unpatched.html
Learn more: https://thehackernews.com/2024/10/experts-warn-of-critical-unpatched.html
π4π4β‘1
π©βπ» OpenAI disrupts 20+ global deceptive operations exploiting AI models for advanced cyber activities like phishing, influence operations, and even election interference.
Learn more: https://thehackernews.com/2024/10/openai-blocks-20-global-malicious.html
Learn more: https://thehackernews.com/2024/10/openai-blocks-20-global-malicious.html
π₯9π6π5β‘2π€2
The digital landscape is shifting fastβare you ready to keep up with the latest threats? πβ‘
Join us on October 17 as we break down the key findings from the 2024 Kaseya Cybersecurity Survey! Get insights into:
π How AI is transforming cyberattacks
π₯ The challenges of user behavior
π‘οΈ How network penetration testing secure your network
π What companies are doing to prepare for 2025
π Date: October 17
β° Time: 1 PM EST / 10 AM PST
π Save Your Spot: https://thn.news/cyber-survey-2024
Donβt miss this session to stay one step ahead in cybersecurity!
Join us on October 17 as we break down the key findings from the 2024 Kaseya Cybersecurity Survey! Get insights into:
π How AI is transforming cyberattacks
π₯ The challenges of user behavior
π‘οΈ How network penetration testing secure your network
π What companies are doing to prepare for 2025
π Date: October 17
β° Time: 1 PM EST / 10 AM PST
π Save Your Spot: https://thn.news/cyber-survey-2024
Donβt miss this session to stay one step ahead in cybersecurity!
Kaseya
Exclusive Findings From Kaseyaβs 2024 Cybersecurity Survey
Join us for an exclusive webinar where weβll unveil key findings from Kaseyaβs 2024 Cybersecurity Survey based on insights from over 1,000 IT pros worldwide.
π9π₯9β‘1
π Dutch police have dismantled Bohemia and Cannabia, the largest darkweb markets for illegal goods and cybercrime. Arrests in the Netherlands and Ireland, with β¬8M in seized cryptocurrency, prove dark web anonymity is fading.
Read: https://thehackernews.com/2024/10/bohemia-and-cannabia-dark-web-markets.html
Read: https://thehackernews.com/2024/10/bohemia-and-cannabia-dark-web-markets.html
π12π10π±9π₯3β‘2π€―1
π© A critical security flaw in GitLab (CVE-2024-9164) could allow attackers to run CI/CD pipelines on unauthorized branches.
Find details here: https://thehackernews.com/2024/10/new-critical-gitlab-vulnerability-could.html
Update your instance ASAP to avoid becoming the next victim.
Find details here: https://thehackernews.com/2024/10/new-critical-gitlab-vulnerability-could.html
Update your instance ASAP to avoid becoming the next victim.
π17π11π±8π₯4β‘1π€1
π»π Cybercriminals are leveling up! Phishing campaigns now exploit GitHub links, Telegram bots, and even QR codes to bypass security and deliver malware.
Read: https://thehackernews.com/2024/10/github-telegram-bots-and-qr-codes.html
Read: https://thehackernews.com/2024/10/github-telegram-bots-and-qr-codes.html
β‘20π₯9π€8π5π3
π₯ FBI created its own cryptocurrency token, NexFundAI, to bust widespread market manipulation. Several market makers are charged with wash trading and a pump-and-dump scheme.
Read: https://thehackernews.com/2024/10/fbi-creates-fake-cryptocurrency-to.html
Read: https://thehackernews.com/2024/10/fbi-creates-fake-cryptocurrency-to.html
π54π€―9β‘8π₯7π6π5π€5
Iranian threat actor OilRig is exploiting a Windows Kernel #vulnerability (CVE-2024-30088) to gain SYSTEM privileges, enabling backdoor deployment and data theft.
Learn how to protect your systems now https://thehackernews.com/2024/10/oilrig-exploits-windows-kernel-flaw-in.html
Learn how to protect your systems now https://thehackernews.com/2024/10/oilrig-exploits-windows-kernel-flaw-in.html
π28π₯10β‘8π€5π3π€―2π±1