π₯ A critical flaw in SolarWinds Web Help Desk (CVE-2024-28987) has been actively exploited, and it involves hard-coded credentials that allow attackers to access sensitive help desk tickets.
Learn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html
Learn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html
π13π7
π‘οΈ GitHub has released urgent security updates to fix a critical flaw (CVE-2024-9487) with a CVSS score of 9.5!
This bug allows unauthorized access by bypassing SAML SSO authenticationβan immediate threat to your enterprise.
Details: https://thehackernews.com/2024/10/github-patches-critical-flaw-in.html
This bug allows unauthorized access by bypassing SAML SSO authenticationβan immediate threat to your enterprise.
Details: https://thehackernews.com/2024/10/github-patches-critical-flaw-in.html
π₯21π6π6
π A new spear-phishing campaign in Brazil is using a clever trick to bypass security guardrails and deliver the dangerous Astaroth #malware.
Learn how to protect your organization from this growing threat: https://thehackernews.com/2024/10/astaroth-banking-malware-resurfaces-in.html
Learn how to protect your organization from this growing threat: https://thehackernews.com/2024/10/astaroth-banking-malware-resurfaces-in.html
β‘7π€7π5π₯3π2
Zero-day vulnerabilities are on the rise, leaving businesses exposed.
NDR solutions with machine learning can detect network anomalies before attacks happen. Learn how AI-driven NDR is key to defending against these evolving threats.
https://thehackernews.com/2024/10/rise-of-zero-day-vulnerabilities.html
NDR solutions with machine learning can detect network anomalies before attacks happen. Learn how AI-driven NDR is key to defending against these evolving threats.
https://thehackernews.com/2024/10/rise-of-zero-day-vulnerabilities.html
π9π4π3
π₯ One click, and chaos begins!
North Korean APT group ScarCruft has been linked to the exploitation of a zero-day Windows flaw (CVE-2024-38178), targeting unpatched Internet Explorer Mode in Edge, infecting devices with RokRAT malware.
Read: https://thehackernews.com/2024/10/north-korean-scarcruft-exploits-windows.html
North Korean APT group ScarCruft has been linked to the exploitation of a zero-day Windows flaw (CVE-2024-38178), targeting unpatched Internet Explorer Mode in Edge, infecting devices with RokRAT malware.
Read: https://thehackernews.com/2024/10/north-korean-scarcruft-exploits-windows.html
π9π7π₯6
π‘οΈ Malware like AgentTesla is making headlines for its stealthy data theft tactics.
With tools like ANYRUN's Threat Intelligence Lookup, offering searches across 40+ indicators and live sandbox analysis, threat detection has never been more powerful.
Read: https://thehackernews.com/2024/10/5-techniques-for-collecting-cyber.html
With tools like ANYRUN's Threat Intelligence Lookup, offering searches across 40+ indicators and live sandbox analysis, threat detection has never been more powerful.
Read: https://thehackernews.com/2024/10/5-techniques-for-collecting-cyber.html
π₯9π5
π FIDO Alliance has proposed a new protocol to securely transfer passkeys π across different platforms.
Backed by Apple, Google, Microsoft, and Amazon, this signals a major shift in the future of authentication.
Read: https://thehackernews.com/2024/10/fido-alliance-drafts-new-protocol-to.html
Backed by Apple, Google, Microsoft, and Amazon, this signals a major shift in the future of authentication.
Read: https://thehackernews.com/2024/10/fido-alliance-drafts-new-protocol-to.html
π18β‘4π€2
Manage cybersecurity risk with a masterβs from Georgetown. Learn more in our Oct. 23 webinar.
Join now: https://thn.news/cyberrisk-webinar-li
Join now: https://thn.news/cyberrisk-webinar-li
π₯7π2π2
Researchers uncovered threat actors attempting to weaponize the open-source tool EDRSilencer to tamper with Endpoint Detection and Response (EDR) solutions.
Learn how it works: https://thehackernews.com/2024/10/hackers-abuse-edrsilencer-tool-to.html
Learn how it works: https://thehackernews.com/2024/10/hackers-abuse-edrsilencer-tool-to.html
π15π€―7β‘3π2
π Kubernetes Image Builder #vulnerability (CVE-2024-9486) has a serious root access flaw.
With a CVSS score of 9.8, this flaw lets attackers exploit default credentials to take over virtual machines using certain image builds.
Read: https://thehackernews.com/2024/10/critical-kubernetes-image-builder.html
With a CVSS score of 9.8, this flaw lets attackers exploit default credentials to take over virtual machines using certain image builds.
Read: https://thehackernews.com/2024/10/critical-kubernetes-image-builder.html
π10π±5β‘3π€―3π2
Privileged Access Management (PAM) is more than complianceβit's your frontline defense against threats targeting critical assets.
Learn how to strengthen your PAM strategy before itβs too late.
Read: https://thehackernews.com/expert-insights/2024/10/master-privileged-access-management.html
Learn how to strengthen your PAM strategy before itβs too late.
Read: https://thehackernews.com/expert-insights/2024/10/master-privileged-access-management.html
π7π4π€4
β‘ 35,000 DDoS attacks in one yearβAnonymous Sudan orchestrated this by running a DDoS botnet-for-hire.
Two Sudanese brothers face charges for targeting critical infrastructure and major companies, including #Microsoft, worldwide.
Read: https://thehackernews.com/2024/10/us-charges-two-sudanese-brothers-for.html
Two Sudanese brothers face charges for targeting critical infrastructure and major companies, including #Microsoft, worldwide.
Read: https://thehackernews.com/2024/10/us-charges-two-sudanese-brothers-for.html
π11π5β‘4
π¨ High-profile entities in the Middle East and Africa are under attack by SideWinder (APT-C-17), with a new multi-stage infection chain delivering the dangerous StealerBot malware.
Learn more: https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html
Learn more: https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html
π€6π3π2
π¨ Zero Trust in Google Workspace: Donβt Wait Until 2025 to Start! π¨
Nearly 50% of companies planning to implement Zero Trust security within #googlecloud environments in 2025 struggle with getting started due to challenges like handling granular access controls, monitoring and auditing. Facing similar roadblocks?
πΌ Join ex-Google expert Mikael Klambro and the Zenphi_co team in this free webinar to learn practical solutions, including:
βΆ Automating user access controls π
βΆ Managing least privilege access for employees and third-party collaborators π₯
βΆ Ensuring secure collaboration in a cloud-first environment βοΈ
π Bonus: Register now to receive our Zero Trust Implementation Blueprintβa resource that will not only enhance your organizationβs #datasecurity but also set you apart as a top-tier Google Workspace and cybersecurity professional.
π‘ Stay ahead of the curve in #accessmanagement and prepare your organization for 2025 β donβt miss it!
https://thn.news/zero-trust-gworkspace-webinar
Nearly 50% of companies planning to implement Zero Trust security within #googlecloud environments in 2025 struggle with getting started due to challenges like handling granular access controls, monitoring and auditing. Facing similar roadblocks?
πΌ Join ex-Google expert Mikael Klambro and the Zenphi_co team in this free webinar to learn practical solutions, including:
βΆ Automating user access controls π
βΆ Managing least privilege access for employees and third-party collaborators π₯
βΆ Ensuring secure collaboration in a cloud-first environment βοΈ
π Bonus: Register now to receive our Zero Trust Implementation Blueprintβa resource that will not only enhance your organizationβs #datasecurity but also set you apart as a top-tier Google Workspace and cybersecurity professional.
π‘ Stay ahead of the curve in #accessmanagement and prepare your organization for 2025 β donβt miss it!
https://thn.news/zero-trust-gworkspace-webinar
zenphi
Webinar | Zero Trust Model in Google Workspace
Learn how to overcome challenges associated with implementing Zero Trust model in Cloud environments like Google Workspace. Hands-on approach
π12π2π2
π¨ Researchers just infiltrated the affiliate panel of the rising ransomware group, Cicada3301. This RaaS is targeting critical sectors with sophisticated, cross-platform attacks.
Learn more: https://thehackernews.com/2024/10/cross-platform-cicada3301-ransomware.html
Learn more: https://thehackernews.com/2024/10/cross-platform-cicada3301-ransomware.html
π15
With over 80% of breaches today leveraging compromised identities, managing your SaaS attack surface is critical. Discover how to gain full visibility over your SaaS environment and minimize identity-based risks.
Read: https://thehackernews.com/2024/01/5-ways-to-reduce-saas-security-risks.html
Read: https://thehackernews.com/2024/01/5-ways-to-reduce-saas-security-risks.html
π₯7π3π2
RomComβs latest cyber espionage wave uses malware written in C++, Rust, Go, and Lua to attack high-profile Ukrainian and Polish entities.
Learn more: https://thehackernews.com/2024/10/russian-romcom-attacks-target-ukrainian.html
Learn more: https://thehackernews.com/2024/10/russian-romcom-attacks-target-ukrainian.html
π9π₯4π3π2
π Microsoft discovered a serious security flaw (CVE-2024-44133) in #Appleβs macOS TCC framework that could bypass user consent for sensitive data access like your location, camera, or microphone!
Learn more: https://thehackernews.com/2024/10/microsoft-reveals-macos-vulnerability.html
Learn more: https://thehackernews.com/2024/10/microsoft-reveals-macos-vulnerability.html
π₯19π16π5π4π€4π±3
π Itβs all about the detailsβ¦
Cybercriminals are getting more creative, now leveraging fake Google Meet pages to trick users into running malicious PowerShell code, infecting both Windows & macOS with info-stealers like StealC and Atomic.
https://thehackernews.com/2024/10/beware-fake-google-meet-pages-deliver.html
Cybercriminals are getting more creative, now leveraging fake Google Meet pages to trick users into running malicious PowerShell code, infecting both Windows & macOS with info-stealers like StealC and Atomic.
https://thehackernews.com/2024/10/beware-fake-google-meet-pages-deliver.html
π₯14π4π€―4π3
π¨ Cyber agencies sound the alarm as Iranian hackers relentlessly target critical sectors like #healthcare, IT, and energy through brute-force attacks, password spraying, and MFA push bombing.
Read β‘ https://thehackernews.com/2024/10/us-and-allies-warn-of-iranian.html
Read β‘ https://thehackernews.com/2024/10/us-and-allies-warn-of-iranian.html
π15π5π±5