Nation-state attackers are exploiting Ivanti CSA vulnerabilities, including zero-days, to breach and patch networks, locking out competitors.
Is your CSA secure? Stay proactiveβread the report and tighten your patching strategy.
Read: https://thehackernews.com/2024/10/nation-state-attackers-exploiting.html
Is your CSA secure? Stay proactiveβread the report and tighten your patching strategy.
Read: https://thehackernews.com/2024/10/nation-state-attackers-exploiting.html
π14π13β‘3
π Jetpack WordPress plugin flaw, active since 2016, allows unauthorized access to user-submitted forms. Over 27M sites are at riskβupdate now to protect your users' data.
Read: https://thehackernews.com/2024/10/wordpress-plugin-jetpack-patches-major.html
Read: https://thehackernews.com/2024/10/wordpress-plugin-jetpack-patches-major.html
π9π€―4π±4π2π1
Last weekβs top threats include zero-day exploits, North Korean hackers, AI tools going rogue, and more.
Learn about GoldenJackal's breach of air-gapped systems, and the FBI's crypto sting.
Read: https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats.html
Donβt miss outβstay secure and ready for the next wave!
Learn about GoldenJackal's breach of air-gapped systems, and the FBI's crypto sting.
Read: https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats.html
Donβt miss outβstay secure and ready for the next wave!
π10π6
Cybersecurity researchers have uncovered a new malware campaign using Hijack Loader, signed with legitimate code-signing certificates, to bypass defenses and deploy information-stealing malware like Lumma.
Find details here: https://thehackernews.com/2024/10/researchers-uncover-hijack-loader.html
Find details here: https://thehackernews.com/2024/10/researchers-uncover-hijack-loader.html
π€7π5
China accuses the U.S. of fabricating the Volt Typhoon threat actor and deploying false flags and backdoors to conceal its own cyberattacks.
Details here: https://thehackernews.com/2024/10/china-accuses-us-of-fabricating-volt.html
Details here: https://thehackernews.com/2024/10/china-accuses-us-of-fabricating-volt.html
π13π€11π8π₯5β‘1
Mismanaged vulnerabilities in cloud environments are delaying incident responses and putting businesses at greater risk.
Discover how unified detection can close cloud security gaps and stop stealthy attacks before they unfold.
Read: https://thehackernews.com/2024/10/5-steps-to-boost-detection-and-response.html
Discover how unified detection can close cloud security gaps and stop stealthy attacks before they unfold.
Read: https://thehackernews.com/2024/10/5-steps-to-boost-detection-and-response.html
π9π€4π1
π₯ Industry-first report covering real-world attacks on GenAI, analyzing 2,000+ LLM apps. Including jailbreak methods, adversaries' objectives, and technical insights.
Download the Pillar Security's full report here: https://thn.news/genai-attacks
Download the Pillar Security's full report here: https://thn.news/genai-attacks
www.pillar.security
The State of Attacks on GenAI | Analysis of Real-World Attacks
Discover the industry-first report on real GenAI attacks seen in the wild. Gain exclusive insights into AI risks, adversary objectives, jailbreak techniques, and 2025 forecasts.
π10π8
North Korean hackers are now using a Linux variant of the notorious FASTCash malware to target ATMs by compromising payment switches in ATM cashout schemes.
Learn more: https://thehackernews.com/2024/10/new-linux-variant-of-fastcash-malware.html
Learn more: https://thehackernews.com/2024/10/new-linux-variant-of-fastcash-malware.html
π12π8π₯6β‘3π3
DarkVision RAT returns in a new campaign via PureCrypter, enabling attackers to steal passwords, record screens, and gain full remote access for just $60βmaking sophisticated breaches accessible even to non-technical cybercriminals.
Read: https://thehackernews.com/2024/10/new-malware-campaign-uses-purecrypter.html
Read: https://thehackernews.com/2024/10/new-malware-campaign-uses-purecrypter.html
π14β‘1
TrickMo Android trojan has upgradedβnow stealing unlock patterns and PINs by mimicking the lock screen!
With thousands of stolen credentials already exposed, itβs targeting banking data, corporate VPNs, social media, and healthcare apps.
https://thehackernews.com/2024/10/trickmo-banking-trojan-can-now-capture.html
With thousands of stolen credentials already exposed, itβs targeting banking data, corporate VPNs, social media, and healthcare apps.
https://thehackernews.com/2024/10/trickmo-banking-trojan-can-now-capture.html
π€―21
π₯ A critical flaw in SolarWinds Web Help Desk (CVE-2024-28987) has been actively exploited, and it involves hard-coded credentials that allow attackers to access sensitive help desk tickets.
Learn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html
Learn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html
π13π7
π‘οΈ GitHub has released urgent security updates to fix a critical flaw (CVE-2024-9487) with a CVSS score of 9.5!
This bug allows unauthorized access by bypassing SAML SSO authenticationβan immediate threat to your enterprise.
Details: https://thehackernews.com/2024/10/github-patches-critical-flaw-in.html
This bug allows unauthorized access by bypassing SAML SSO authenticationβan immediate threat to your enterprise.
Details: https://thehackernews.com/2024/10/github-patches-critical-flaw-in.html
π₯21π6π6
π A new spear-phishing campaign in Brazil is using a clever trick to bypass security guardrails and deliver the dangerous Astaroth #malware.
Learn how to protect your organization from this growing threat: https://thehackernews.com/2024/10/astaroth-banking-malware-resurfaces-in.html
Learn how to protect your organization from this growing threat: https://thehackernews.com/2024/10/astaroth-banking-malware-resurfaces-in.html
β‘7π€7π5π₯3π2
Zero-day vulnerabilities are on the rise, leaving businesses exposed.
NDR solutions with machine learning can detect network anomalies before attacks happen. Learn how AI-driven NDR is key to defending against these evolving threats.
https://thehackernews.com/2024/10/rise-of-zero-day-vulnerabilities.html
NDR solutions with machine learning can detect network anomalies before attacks happen. Learn how AI-driven NDR is key to defending against these evolving threats.
https://thehackernews.com/2024/10/rise-of-zero-day-vulnerabilities.html
π9π4π3
π₯ One click, and chaos begins!
North Korean APT group ScarCruft has been linked to the exploitation of a zero-day Windows flaw (CVE-2024-38178), targeting unpatched Internet Explorer Mode in Edge, infecting devices with RokRAT malware.
Read: https://thehackernews.com/2024/10/north-korean-scarcruft-exploits-windows.html
North Korean APT group ScarCruft has been linked to the exploitation of a zero-day Windows flaw (CVE-2024-38178), targeting unpatched Internet Explorer Mode in Edge, infecting devices with RokRAT malware.
Read: https://thehackernews.com/2024/10/north-korean-scarcruft-exploits-windows.html
π9π7π₯6
π‘οΈ Malware like AgentTesla is making headlines for its stealthy data theft tactics.
With tools like ANYRUN's Threat Intelligence Lookup, offering searches across 40+ indicators and live sandbox analysis, threat detection has never been more powerful.
Read: https://thehackernews.com/2024/10/5-techniques-for-collecting-cyber.html
With tools like ANYRUN's Threat Intelligence Lookup, offering searches across 40+ indicators and live sandbox analysis, threat detection has never been more powerful.
Read: https://thehackernews.com/2024/10/5-techniques-for-collecting-cyber.html
π₯9π5
π FIDO Alliance has proposed a new protocol to securely transfer passkeys π across different platforms.
Backed by Apple, Google, Microsoft, and Amazon, this signals a major shift in the future of authentication.
Read: https://thehackernews.com/2024/10/fido-alliance-drafts-new-protocol-to.html
Backed by Apple, Google, Microsoft, and Amazon, this signals a major shift in the future of authentication.
Read: https://thehackernews.com/2024/10/fido-alliance-drafts-new-protocol-to.html
π18β‘4π€2
Manage cybersecurity risk with a masterβs from Georgetown. Learn more in our Oct. 23 webinar.
Join now: https://thn.news/cyberrisk-webinar-li
Join now: https://thn.news/cyberrisk-webinar-li
π₯7π2π2
Researchers uncovered threat actors attempting to weaponize the open-source tool EDRSilencer to tamper with Endpoint Detection and Response (EDR) solutions.
Learn how it works: https://thehackernews.com/2024/10/hackers-abuse-edrsilencer-tool-to.html
Learn how it works: https://thehackernews.com/2024/10/hackers-abuse-edrsilencer-tool-to.html
π15π€―7β‘3π2
π Kubernetes Image Builder #vulnerability (CVE-2024-9486) has a serious root access flaw.
With a CVSS score of 9.8, this flaw lets attackers exploit default credentials to take over virtual machines using certain image builds.
Read: https://thehackernews.com/2024/10/critical-kubernetes-image-builder.html
With a CVSS score of 9.8, this flaw lets attackers exploit default credentials to take over virtual machines using certain image builds.
Read: https://thehackernews.com/2024/10/critical-kubernetes-image-builder.html
π10π±5β‘3π€―3π2