π¨ Fortinet confirms a critical vulnerability (CVE-2024-47575 / CVSS 9.8) affecting FortiManager is being actively exploited!
It could allow unauthorized remote access, potentially compromising sensitive data & configurations.
https://thehackernews.com/2024/10/fortinet-warns-of-critical.html
Don't waitβpatch now.
It could allow unauthorized remote access, potentially compromising sensitive data & configurations.
https://thehackernews.com/2024/10/fortinet-warns-of-critical.html
Don't waitβpatch now.
π17π₯6π3π1
North Korea's Lazarus Group exploits a zero-day #vulnerability (CVE-2024-4947) in Google Chrome to target the #cryptocurrency sector.
Exploitation strategy involved social media manipulation and fake game promotions.
Learn more: https://thehackernews.com/2024/10/lazarus-group-exploits-google-chrome.html
Exploitation strategy involved social media manipulation and fake game promotions.
Learn more: https://thehackernews.com/2024/10/lazarus-group-exploits-google-chrome.html
π₯15π10π€―4
Cisco has patched CVE-2024-20481, a #vulnerability affecting its ASA and Firepower devices that could lead to a denial-of-service (DoS) for Remote Access VPNs.
Learn more: https://thehackernews.com/2024/10/cisco-issues-urgent-fix-for-asa-and-ftd.html
Learn more: https://thehackernews.com/2024/10/cisco-issues-urgent-fix-for-asa-and-ftd.html
π7π₯7π3π1
Researchers identified a #vulnerability in AWS CDK that may lead to account takeover, with over 1% of users at risk from predictable S3 bucket names.
The solution: update your CDK version and customize bucket names.
Read: https://thehackernews.com/2024/10/aws-cloud-development-kit-vulnerability.html
The solution: update your CDK version and customize bucket names.
Read: https://thehackernews.com/2024/10/aws-cloud-development-kit-vulnerability.html
π10π€5π₯4π3
Generative AI is revolutionizing phishing attacks, posing new challenges for #cybersecurity professionals.
Discover how to combat this evolving threat.
Read β https://thehackernews.com/2024/10/why-phishing-resistant-mfa-is-no-longer.html
Discover how to combat this evolving threat.
Read β https://thehackernews.com/2024/10/why-phishing-resistant-mfa-is-no-longer.html
π10π₯6π4π€4π€―3
A new advanced Qilin #ransomware variant, Qilin.B, features enhanced AES-256-CTR and RSA-4096 encryption, making recovery nearly impossible without the attackers' keys.
Read β https://thehackernews.com/2024/10/new-qilinb-ransomware-variant-emerges.html
Read β https://thehackernews.com/2024/10/new-qilinb-ransomware-variant-emerges.html
π8π₯8β‘3π3
βοΈ LinkedIn has been fined β¬310 million for breaching GDPR regulations concerning user #privacy.
DPC found #LinkedIn's processing lacked necessary user consent and transparency, which could set a precedent for other companies.
Read β https://thehackernews.com/2024/10/irish-watchdog-imposes-record-310.html
DPC found #LinkedIn's processing lacked necessary user consent and transparency, which could set a precedent for other companies.
Read β https://thehackernews.com/2024/10/irish-watchdog-imposes-record-310.html
π24π18π9π₯8
The SEC penalizes four companiesβAvaya, Check Point, Mimecast, and Unisysβfor misleading investors following the 2020 SolarWinds cyberattack.
Learn more: https://thehackernews.com/2024/10/sec-charges-4-companies-over-misleading.html
Learn more: https://thehackernews.com/2024/10/sec-charges-4-companies-over-misleading.html
π9π9
π Apple has launched its Private Cloud Compute Virtual Research Environment (VRE) for security researchers to validate its #privacy and security claims.
It offers rewards between $50,000 and $1,000,000 for identifying flaws.
Read: https://thehackernews.com/2024/10/apple-opens-pcc-source-code-for.html
It offers rewards between $50,000 and $1,000,000 for identifying flaws.
Read: https://thehackernews.com/2024/10/apple-opens-pcc-source-code-for.html
π₯19π€―10π7π4π±4π3
Attention: CVE-2024-41992 #vulnerability in Wi-Fi Test Suite could give attackers full control over Arcadyan routers. The flaw allows for command injection, enabling full administrative access.
Find details here β https://thehackernews.com/2024/10/researchers-discover-command-injection.html
Find details here β https://thehackernews.com/2024/10/researchers-discover-command-injection.html
π€―12π10β‘3π2
π¨ Four members of the notorious REvil ransomware gang have been sentenced in Russia, a rare conviction in the cybercrime world.
Read π https://thehackernews.com/2024/10/four-revil-ransomware-members-sentenced.html
Read π https://thehackernews.com/2024/10/four-revil-ransomware-members-sentenced.html
π₯20π€―1
β οΈ CERT-UA warns of a sophisticated email attack using RDP files to breach sensitive systems in Ukraine.
Read: https://thehackernews.com/2024/10/cert-ua-identifies-malicious-rdp-files.html
Read: https://thehackernews.com/2024/10/cert-ua-identifies-malicious-rdp-files.html
π₯9π6π5
Explore the rise of AI impersonation fraud and its implications for cybersecurity.
Learn how to safeguard your organization against these emerging threats.
Read: https://thehackernews.com/2024/10/eliminating-ai-deepfake-threats-is-your.html
Learn how to safeguard your organization against these emerging threats.
Read: https://thehackernews.com/2024/10/eliminating-ai-deepfake-threats-is-your.html
π13π₯7
TeamTNT shifts tactics to target Docker environments for #cryptocurrency mining by exploiting exposed daemons to deploy malware and cryptominers.
Read: https://thehackernews.com/2024/10/notorious-hacker-group-teamtnt-launches.html
Read: https://thehackernews.com/2024/10/notorious-hacker-group-teamtnt-launches.html
π11π€7π3
A new attack technique bypasses Microsoft's Driver Signature Enforcement on fully patched Windows systems, enabling attackers to load unsigned kernel drivers and compromising the integrity of OS security.
Learn more: https://thehackernews.com/2024/10/researchers-uncover-os-downgrade.html
Learn more: https://thehackernews.com/2024/10/researchers-uncover-os-downgrade.html
π₯15π12π€―10π6π2
A staggering 10-fold increase in phishing pages created with Webflow has been observed, targeting over 120 organizations globally.
Discover how to stay ahead of evolving threats: https://thehackernews.com/2024/10/cybercriminals-use-webflow-to-deceive.html
Discover how to stay ahead of evolving threats: https://thehackernews.com/2024/10/cybercriminals-use-webflow-to-deceive.html
π12π₯8π2
π¦ΉββοΈ AI manipulation, π©οΈ cloud storage flaws, and a major π£ AWS vulnerability - this week's cybersecurity recap is packed!
https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats_28.html
Don't let your friends and colleagues fall victim to the latest cyber threats. Share this newsletter with them, it's a must-read!
https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats_28.html
Don't let your friends and colleagues fall victim to the latest cyber threats. Share this newsletter with them, it's a must-read!
π12π₯5
β οΈ Alert for developers - Three packages found to contain the BeaverTail #malware linked to North Korean cyber campaigns.
Find details here: https://thehackernews.com/2024/10/beavertail-malware-resurfaces-in.html
Find details here: https://thehackernews.com/2024/10/beavertail-malware-resurfaces-in.html
π₯8β‘2π2
β οΈ Russian espionage group UNC5812 is using Telegram to deliver #malware designed to undermine military recruitment in Ukraine.
Threats like SUNSPINNER and CraxsRAT exploit vulnerabilities in #Android and Windows.
Read: https://thehackernews.com/2024/10/russian-espionage-group-targets.html
Threats like SUNSPINNER and CraxsRAT exploit vulnerabilities in #Android and Windows.
Read: https://thehackernews.com/2024/10/russian-espionage-group-targets.html
π12β‘5π2
π¨ New OT security threats are emerging as ships and cranes become more digital.
Find out how SSHβs PrivX OT Edition can help tackle these challenges in marine and industrial operations.
Read: https://thehackernews.com/2024/10/sailing-seven-seas-securely-from-port.html
Find out how SSHβs PrivX OT Edition can help tackle these challenges in marine and industrial operations.
Read: https://thehackernews.com/2024/10/sailing-seven-seas-securely-from-port.html
π7π₯4