Identity security is evolving from mere access management to a strategic business necessity.
Explore the critical state of identity security post-breach, highlighting risks and strategic insights for cybersecurity professionals.
Read: https://thehackernews.com/2024/10/permiso-state-of-identity-security-2024.html
Explore the critical state of identity security post-breach, highlighting risks and strategic insights for cybersecurity professionals.
Read: https://thehackernews.com/2024/10/permiso-state-of-identity-security-2024.html
π5π3β‘2π€―1
β οΈ New variants of Grandoreiro banking malware are evolving, targeting 1,700 financial institutions in 45 countries, and employing tactics like mouse tracking and CAPTCHA barriers, despite law enforcement efforts.
Read: https://thehackernews.com/2024/10/new-grandoreiro-banking-malware.html
Read: https://thehackernews.com/2024/10/new-grandoreiro-banking-malware.html
π15π₯3π€3β‘2π1
π¨ Fortinet confirms a critical vulnerability (CVE-2024-47575 / CVSS 9.8) affecting FortiManager is being actively exploited!
It could allow unauthorized remote access, potentially compromising sensitive data & configurations.
https://thehackernews.com/2024/10/fortinet-warns-of-critical.html
Don't waitβpatch now.
It could allow unauthorized remote access, potentially compromising sensitive data & configurations.
https://thehackernews.com/2024/10/fortinet-warns-of-critical.html
Don't waitβpatch now.
π17π₯6π3π1
North Korea's Lazarus Group exploits a zero-day #vulnerability (CVE-2024-4947) in Google Chrome to target the #cryptocurrency sector.
Exploitation strategy involved social media manipulation and fake game promotions.
Learn more: https://thehackernews.com/2024/10/lazarus-group-exploits-google-chrome.html
Exploitation strategy involved social media manipulation and fake game promotions.
Learn more: https://thehackernews.com/2024/10/lazarus-group-exploits-google-chrome.html
π₯15π10π€―4
Cisco has patched CVE-2024-20481, a #vulnerability affecting its ASA and Firepower devices that could lead to a denial-of-service (DoS) for Remote Access VPNs.
Learn more: https://thehackernews.com/2024/10/cisco-issues-urgent-fix-for-asa-and-ftd.html
Learn more: https://thehackernews.com/2024/10/cisco-issues-urgent-fix-for-asa-and-ftd.html
π7π₯7π3π1
Researchers identified a #vulnerability in AWS CDK that may lead to account takeover, with over 1% of users at risk from predictable S3 bucket names.
The solution: update your CDK version and customize bucket names.
Read: https://thehackernews.com/2024/10/aws-cloud-development-kit-vulnerability.html
The solution: update your CDK version and customize bucket names.
Read: https://thehackernews.com/2024/10/aws-cloud-development-kit-vulnerability.html
π10π€5π₯4π3
Generative AI is revolutionizing phishing attacks, posing new challenges for #cybersecurity professionals.
Discover how to combat this evolving threat.
Read β https://thehackernews.com/2024/10/why-phishing-resistant-mfa-is-no-longer.html
Discover how to combat this evolving threat.
Read β https://thehackernews.com/2024/10/why-phishing-resistant-mfa-is-no-longer.html
π10π₯6π4π€4π€―3
A new advanced Qilin #ransomware variant, Qilin.B, features enhanced AES-256-CTR and RSA-4096 encryption, making recovery nearly impossible without the attackers' keys.
Read β https://thehackernews.com/2024/10/new-qilinb-ransomware-variant-emerges.html
Read β https://thehackernews.com/2024/10/new-qilinb-ransomware-variant-emerges.html
π8π₯8β‘3π3
βοΈ LinkedIn has been fined β¬310 million for breaching GDPR regulations concerning user #privacy.
DPC found #LinkedIn's processing lacked necessary user consent and transparency, which could set a precedent for other companies.
Read β https://thehackernews.com/2024/10/irish-watchdog-imposes-record-310.html
DPC found #LinkedIn's processing lacked necessary user consent and transparency, which could set a precedent for other companies.
Read β https://thehackernews.com/2024/10/irish-watchdog-imposes-record-310.html
π24π18π9π₯8
The SEC penalizes four companiesβAvaya, Check Point, Mimecast, and Unisysβfor misleading investors following the 2020 SolarWinds cyberattack.
Learn more: https://thehackernews.com/2024/10/sec-charges-4-companies-over-misleading.html
Learn more: https://thehackernews.com/2024/10/sec-charges-4-companies-over-misleading.html
π9π9
π Apple has launched its Private Cloud Compute Virtual Research Environment (VRE) for security researchers to validate its #privacy and security claims.
It offers rewards between $50,000 and $1,000,000 for identifying flaws.
Read: https://thehackernews.com/2024/10/apple-opens-pcc-source-code-for.html
It offers rewards between $50,000 and $1,000,000 for identifying flaws.
Read: https://thehackernews.com/2024/10/apple-opens-pcc-source-code-for.html
π₯19π€―10π7π4π±4π3
Attention: CVE-2024-41992 #vulnerability in Wi-Fi Test Suite could give attackers full control over Arcadyan routers. The flaw allows for command injection, enabling full administrative access.
Find details here β https://thehackernews.com/2024/10/researchers-discover-command-injection.html
Find details here β https://thehackernews.com/2024/10/researchers-discover-command-injection.html
π€―12π10β‘3π2
π¨ Four members of the notorious REvil ransomware gang have been sentenced in Russia, a rare conviction in the cybercrime world.
Read π https://thehackernews.com/2024/10/four-revil-ransomware-members-sentenced.html
Read π https://thehackernews.com/2024/10/four-revil-ransomware-members-sentenced.html
π₯20π€―1
β οΈ CERT-UA warns of a sophisticated email attack using RDP files to breach sensitive systems in Ukraine.
Read: https://thehackernews.com/2024/10/cert-ua-identifies-malicious-rdp-files.html
Read: https://thehackernews.com/2024/10/cert-ua-identifies-malicious-rdp-files.html
π₯9π6π5
Explore the rise of AI impersonation fraud and its implications for cybersecurity.
Learn how to safeguard your organization against these emerging threats.
Read: https://thehackernews.com/2024/10/eliminating-ai-deepfake-threats-is-your.html
Learn how to safeguard your organization against these emerging threats.
Read: https://thehackernews.com/2024/10/eliminating-ai-deepfake-threats-is-your.html
π13π₯7
TeamTNT shifts tactics to target Docker environments for #cryptocurrency mining by exploiting exposed daemons to deploy malware and cryptominers.
Read: https://thehackernews.com/2024/10/notorious-hacker-group-teamtnt-launches.html
Read: https://thehackernews.com/2024/10/notorious-hacker-group-teamtnt-launches.html
π11π€7π3
A new attack technique bypasses Microsoft's Driver Signature Enforcement on fully patched Windows systems, enabling attackers to load unsigned kernel drivers and compromising the integrity of OS security.
Learn more: https://thehackernews.com/2024/10/researchers-uncover-os-downgrade.html
Learn more: https://thehackernews.com/2024/10/researchers-uncover-os-downgrade.html
π₯15π12π€―10π6π2
A staggering 10-fold increase in phishing pages created with Webflow has been observed, targeting over 120 organizations globally.
Discover how to stay ahead of evolving threats: https://thehackernews.com/2024/10/cybercriminals-use-webflow-to-deceive.html
Discover how to stay ahead of evolving threats: https://thehackernews.com/2024/10/cybercriminals-use-webflow-to-deceive.html
π12π₯8π2
π¦ΉββοΈ AI manipulation, π©οΈ cloud storage flaws, and a major π£ AWS vulnerability - this week's cybersecurity recap is packed!
https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats_28.html
Don't let your friends and colleagues fall victim to the latest cyber threats. Share this newsletter with them, it's a must-read!
https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats_28.html
Don't let your friends and colleagues fall victim to the latest cyber threats. Share this newsletter with them, it's a must-read!
π12π₯5
β οΈ Alert for developers - Three packages found to contain the BeaverTail #malware linked to North Korean cyber campaigns.
Find details here: https://thehackernews.com/2024/10/beavertail-malware-resurfaces-in.html
Find details here: https://thehackernews.com/2024/10/beavertail-malware-resurfaces-in.html
π₯8β‘2π2