π Microsoft discovered a serious security flaw (CVE-2024-44133) in #Appleβs macOS TCC framework that could bypass user consent for sensitive data access like your location, camera, or microphone!
Learn more: https://thehackernews.com/2024/10/microsoft-reveals-macos-vulnerability.html
Learn more: https://thehackernews.com/2024/10/microsoft-reveals-macos-vulnerability.html
π₯19π16π5π4π€4π±3
π Itβs all about the detailsβ¦
Cybercriminals are getting more creative, now leveraging fake Google Meet pages to trick users into running malicious PowerShell code, infecting both Windows & macOS with info-stealers like StealC and Atomic.
https://thehackernews.com/2024/10/beware-fake-google-meet-pages-deliver.html
Cybercriminals are getting more creative, now leveraging fake Google Meet pages to trick users into running malicious PowerShell code, infecting both Windows & macOS with info-stealers like StealC and Atomic.
https://thehackernews.com/2024/10/beware-fake-google-meet-pages-deliver.html
π₯14π4π€―4π3
π¨ Cyber agencies sound the alarm as Iranian hackers relentlessly target critical sectors like #healthcare, IT, and energy through brute-force attacks, password spraying, and MFA push bombing.
Read β‘ https://thehackernews.com/2024/10/us-and-allies-warn-of-iranian.html
Read β‘ https://thehackernews.com/2024/10/us-and-allies-warn-of-iranian.html
π15π5π±5
North Korean IT workers posing as contractors are now demanding ransoms from former employers after stealing proprietary data.
These workers avoid using company-issued laptops, rerouting them and leveraging personal devices to evade detection.
https://thehackernews.com/2024/10/north-korean-it-workers-in-western.html
These workers avoid using company-issued laptops, rerouting them and leveraging personal devices to evade detection.
https://thehackernews.com/2024/10/north-korean-it-workers-in-western.html
π9π5π₯5π€―5π3
With rising threats & regulations, companies are scrambling to secure their data. Thatβs where Data Security Posture Management (DSPM) helps.
Join our WEBINAR to see how DSPM works in real-world scenarios & secures every piece of the data puzzle.
https://thehackernews.com/2024/10/the-ultimate-dspm-guide-webinar-on.html
Join our WEBINAR to see how DSPM works in real-world scenarios & secures every piece of the data puzzle.
https://thehackernews.com/2024/10/the-ultimate-dspm-guide-webinar-on.html
π₯17π6π3
Get ahead of the cybersecurity curve by understanding key frameworks and acronyms like DDR, CASB, and NIST for comprehensive data security.
Read: https://thehackernews.com/2024/10/acronym-overdose-navigating-complex.html
Read: https://thehackernews.com/2024/10/acronym-overdose-navigating-complex.html
π₯10π6
A critical XSS vulnerability in Roundcube Webmail has been exploited to steal user credentials via phishing attacks.
Read: https://thehackernews.com/2024/10/hackers-exploit-roundcube-webmail-xss.html
Ensure your systems are updated to versions 1.5.7 or 1.6.7 to avoid these risks!
Read: https://thehackernews.com/2024/10/hackers-exploit-roundcube-webmail-xss.html
Ensure your systems are updated to versions 1.5.7 or 1.6.7 to avoid these risks!
π₯14π13π4
π₯ Researchers revealed severe vulnerabilities in major end-to-end encrypted (E2EE) cloud storage platforms, including Sync, pCloud, and Tresorit. These flaws could allow malicious servers to tamper with or access your sensitive data.
Read: https://thehackernews.com/2024/10/researchers-discover-severe-security.html
Read: https://thehackernews.com/2024/10/researchers-discover-severe-security.html
π±11π6π4
π Weekly #Cybersecurity Recap!
Hackers are getting smarter, but so are we! From macOS flaws to TrickMo Android trojans, here's what you need to know to stay safe.
Catch all the critical updates in our latest newsletter: https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats_21.html
Hackers are getting smarter, but so are we! From macOS flaws to TrickMo Android trojans, here's what you need to know to stay safe.
Catch all the critical updates in our latest newsletter: https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats_21.html
π11π₯5π5
β οΈAPT41, a Chinese nation-state actor, has launched a sophisticated cyber attack against the gaming industry, stealthily gathering critical data like user passwords and network configurations over six months.
Learn more: https://thehackernews.com/2024/10/chinese-nation-state-hackers-apt41-hit.html
Learn more: https://thehackernews.com/2024/10/chinese-nation-state-hackers-apt41-hit.html
π₯12π8π±7π5
π‘ With new vulnerabilities emerging daily, pentest checklists are essential for cybersecurity teams. Each assetβweb apps, networks, APIsβrequires a tailored checklist for its specific threats.
Read: https://thehackernews.com/2024/10/guide-ultimate-pentest-checklist-for.html
Have you updated your pentesting protocols recently?
Read: https://thehackernews.com/2024/10/guide-ultimate-pentest-checklist-for.html
Have you updated your pentesting protocols recently?
π7π€6π₯5
β οΈ CISA has added a critical zero-day vulnerability (CVE-2024-9537) affecting ScienceLogic SL1 to its KEV catalog.
This flaw, with a staggering CVSS score of 9.3, allows for remote code execution.
Read π https://thehackernews.com/2024/10/cisa-adds-sciencelogic-sl1.html
Apply the latest patches.
This flaw, with a staggering CVSS score of 9.3, allows for remote code execution.
Read π https://thehackernews.com/2024/10/cisa-adds-sciencelogic-sl1.html
Apply the latest patches.
π6β‘5π€2π1
VMware has released updates for CVE-2024-38812, a critical #vulnerability in vCenter Server.
With a CVSS score of 9.8, this heap-overflow flaw could allow remote code execution, fundamentally jeopardizing organizational security.
Read: https://thehackernews.com/2024/10/vmware-releases-vcenter-server-update.html
With a CVSS score of 9.8, this heap-overflow flaw could allow remote code execution, fundamentally jeopardizing organizational security.
Read: https://thehackernews.com/2024/10/vmware-releases-vcenter-server-update.html
π16β‘4π₯4π1
π Join FREE webinar on threat investigations from Anyrun.
ποΈ Wed, Oct 23, 2 PM GMT
Register now β‘οΈ https://thn.news/threat-investigations-ti-lookup
π Learn how to discover in-depth threat context, enrich your investigations with #IOCs, and search through #TI database with 40+ parameters.
ποΈ Wed, Oct 23, 2 PM GMT
Register now β‘οΈ https://thn.news/threat-investigations-ti-lookup
π Learn how to discover in-depth threat context, enrich your investigations with #IOCs, and search through #TI database with 40+ parameters.
Webinarjam
How to Improve Threat Investigations with TI Lookup
Learn effective methods for gathering intel on new malware and phishing threats
π€6π5π₯5π1
π¨ Researchers warn about Ethereum key-stealing npm packages!
The identified packages, including ethers-mew and ethers-web3, allow attackers to gain SSH access by modifying the authorized keys file, making them particularly dangerous.
Read: https://thehackernews.com/2024/10/malicious-npm-packages-target.html
The identified packages, including ethers-mew and ethers-web3, allow attackers to gain SSH access by modifying the authorized keys file, making them particularly dangerous.
Read: https://thehackernews.com/2024/10/malicious-npm-packages-target.html
π€―15π6π5π₯4
β οΈ Two malware families, Bumblebee and Latrodectus, have resurfaced, leveraging advanced phishing campaigns after setbacks from Operation Endgame.
Learn more: https://thehackernews.com/2024/10/bumblebee-and-latrodectus-malware.html
Learn more: https://thehackernews.com/2024/10/bumblebee-and-latrodectus-malware.html
π13β‘6π₯1π1
Learn how bad actors exploit Docker remote API servers to deploy crypto miners and discover essential security practices for your organization.
Learn more: https://thehackernews.com/2024/10/cybercriminals-exploiting-docker-api.html
Learn more: https://thehackernews.com/2024/10/cybercriminals-exploiting-docker-api.html
π₯11π3π2
A new #vulnerability in Styra's Open Policy Agent (CVE-2024-8260) could expose NTLM credentials to attackers.
Attackers can exploit it to relay authentication, reinforcing the need for stringent input validation across all applications.
Read: https://thehackernews.com/2024/10/security-flaw-in-styras-opa-exposes.html
Attackers can exploit it to relay authentication, reinforcing the need for stringent input validation across all applications.
Read: https://thehackernews.com/2024/10/security-flaw-in-styras-opa-exposes.html
π€―11π4π3
A new phishing campaign targets Russian-speaking users with advanced RATs using Gophish.
The attack uses both Maldoc and HTML-based infections, requiring user interactionβan important reminder for professionals to train teams on recognizing phishing attempts.
https://thehackernews.com/2024/10/gophish-framework-used-in-phishing.html
The attack uses both Maldoc and HTML-based infections, requiring user interactionβan important reminder for professionals to train teams on recognizing phishing attempts.
https://thehackernews.com/2024/10/gophish-framework-used-in-phishing.html
π₯10π€―6π5π€4π±4π2π1
π Discover the risks of unmanaged service accounts in Active Directory and how to effectively monitor them for enhanced security.
Learn more about monitoring service accounts and safeguarding your network π https://thehackernews.com/2024/10/a-comprehensive-guide-to-finding.html
Learn more about monitoring service accounts and safeguarding your network π https://thehackernews.com/2024/10/a-comprehensive-guide-to-finding.html
π7π6β‘3