π₯ North Korean threat actor Jumpy Pisces has allied with the Play #ransomware group, highlighting a troubling milestone in cybercrime. Their tactics, including credential harvesting and advanced persistence.
Learn more: https://thehackernews.com/2024/10/north-korean-group-collaborates-with.html
Learn more: https://thehackernews.com/2024/10/north-korean-group-collaborates-with.html
π11π7β‘3π2
High-severity CVE-2024-50550 #vulnerability in LiteSpeed Cache plugin allows unauthorized access, highlighting critical security implications for WordPress users.
Read: https://thehackernews.com/2024/10/litespeed-cache-plugin-vulnerability.html
Read: https://thehackernews.com/2024/10/litespeed-cache-plugin-vulnerability.html
β‘7π5π₯4π±4
Gather round β weβve got a spooky story for you. Ever heard of ghost logins? Itβs not a tale most IAM teams will tell you.
Ghost logins are forgotten local logins that enable attackers to get around your tightly controlled SSO login and circumvent MFA. With unprecedented levels of credential theft (enabled by infostealer attacks), these accounts are now much more likely to be taken over via credential stuffing attacks.
Learn more π https://thn.news/ghost-logins-explained
Ghost logins are forgotten local logins that enable attackers to get around your tightly controlled SSO login and circumvent MFA. With unprecedented levels of credential theft (enabled by infostealer attacks), these accounts are now much more likely to be taken over via credential stuffing attacks.
Learn more π https://thn.news/ghost-logins-explained
Push Security
What are ghost logins and how can they be exploited?
How ghost logins can be used by cyber attackers for account takeover and persistence.
π₯10π4π2
π‘οΈ LottieFiles faced a supply chain attack compromising its npm package, affecting developers using the libraryβurgent update required.
Read: https://thehackernews.com/2024/10/lottiefiles-issues-warning-about.html
Read: https://thehackernews.com/2024/10/lottiefiles-issues-warning-about.html
π10π1
π A new version of LightSpy #spyware targets iOS, expanding its capabilities with destructive features.
With the number of plugins increasing from 12 to 28, it can capture everything from Wi-Fi credentials to SMS messages and even delete data.
Read: https://thehackernews.com/2024/10/new-lightspy-spyware-version-targets.html
With the number of plugins increasing from 12 to 28, it can capture everything from Wi-Fi credentials to SMS messages and even delete data.
Read: https://thehackernews.com/2024/10/new-lightspy-spyware-version-targets.html
β‘13π7π3π3
π‘οΈ New phishing kit "XiΕ« gΗu" targets multiple countries, including Australia and the U.S., with over 2,000 phishing sites.
It uses Golang and Vue.js to allow attackers to exfiltrate sensitive credentials via Telegram from fake sites.
Read: https://thehackernews.com/2024/11/new-phishing-kit-xiu-gou-targets-users.html
It uses Golang and Vue.js to allow attackers to exfiltrate sensitive credentials via Telegram from fake sites.
Read: https://thehackernews.com/2024/11/new-phishing-kit-xiu-gou-targets-users.html
π11π7
β οΈ Attackers are evolving!
Legacy security tools fail against new threats, with 70% of phishing pages bypassing detection. Explore insights from the "Enterprise Identity Threat Report 2024" on critical identity security risks.
Read: https://thehackernews.com/2024/10/enterprise-identity-threat-report-2024.html
Legacy security tools fail against new threats, with 70% of phishing pages bypassing detection. Explore insights from the "Enterprise Identity Threat Report 2024" on critical identity security risks.
Read: https://thehackernews.com/2024/10/enterprise-identity-threat-report-2024.html
π9β‘3π2π1
Microsoft delays the launch of its Recall feature for Windows Copilot+ PCs, now set for December.
The Recall feature, which creates a comprehensive log of user activity, has faced scrutiny, leading to a redesign focused on privacy controls.
https://thehackernews.com/2024/11/microsoft-delays-windows-copilot-recall.html
The Recall feature, which creates a comprehensive log of user activity, has faced scrutiny, leading to a redesign focused on privacy controls.
https://thehackernews.com/2024/11/microsoft-delays-windows-copilot-recall.html
π13π5β‘4π€―4π€2
π¨ Attention #Cybersecurity Professionals!
Cybercriminals are exploiting identity vulnerabilities, causing data breaches & financial losses.
Join our exclusive WEBINAR to learn key tactics for defending against advanced identity-based threats
Join: https://thehackernews.com/2024/11/stop-lucr-3-attacks-learn-key-identity.html
Cybercriminals are exploiting identity vulnerabilities, causing data breaches & financial losses.
Join our exclusive WEBINAR to learn key tactics for defending against advanced identity-based threats
Join: https://thehackernews.com/2024/11/stop-lucr-3-attacks-learn-key-identity.html
π14π₯6
π¨ Microsoft identifies the Chinese threat actor Storm-0940 using the Quad7 botnet for sophisticated password spray attacks.
Find details here: https://thehackernews.com/2024/11/microsoft-warns-of-chinese-botnet.html
Find details here: https://thehackernews.com/2024/11/microsoft-warns-of-chinese-botnet.html
π10π6π€3
β οΈ Researchers have uncovered EMERALDWHALE, a massive campaign exploiting exposed Git configurations to siphon over 15,000 credentials and clone 10,000 private repositories.
Read: https://thehackernews.com/2024/11/massive-git-config-breach-exposes-15000.html
Read: https://thehackernews.com/2024/11/massive-git-config-breach-exposes-15000.html
π12π€―8π4β‘2
π¨Cybersecurity at the Olympics: A New Threat Emerges! Learn about the evolving tactics of cyber groups like Emennet Pasargad and their implications for cybersecurity strategies.
Read: https://thehackernews.com/2024/11/inside-irans-cyber-playbook-ai-fake.html
Read: https://thehackernews.com/2024/11/inside-irans-cyber-playbook-ai-fake.html
π12π₯5β‘3π2
π¨ SaaS Misconfigurations Are a Major Threat!
With so many apps and integrations, the risk of data breaches has never been higher. Here are 5 common misconfigurations you need to address NOW!
Read: https://thehackernews.com/2024/11/5-saas-misconfigurations-leading-to.html
With so many apps and integrations, the risk of data breaches has never been higher. Here are 5 common misconfigurations you need to address NOW!
Read: https://thehackernews.com/2024/11/5-saas-misconfigurations-leading-to.html
π15π12β‘4π₯1
π¨ A new Android malware, FakeCall, has emerged, utilizing sophisticated voice phishing (vishing) techniques to deceive users.
This malware can capture SMS, contacts, and stream live video, redirecting calls to fraudulent sources.
Read: https://thehackernews.com/2024/11/new-fakecall-malware-variant-hijacks.html
This malware can capture SMS, contacts, and stream live video, redirecting calls to fraudulent sources.
Read: https://thehackernews.com/2024/11/new-fakecall-malware-variant-hijacks.html
π20π€―14π5π3π±3
Google's AI framework, π€ Big Sleep, discovers a zero-day vulnerability in the widely used SQLite database engine, demonstrating the future of automated vulnerability detection.
Learn more: https://thehackernews.com/2024/11/googles-ai-tool-big-sleep-finds-zero.html
Learn more: https://thehackernews.com/2024/11/googles-ai-tool-big-sleep-finds-zero.html
π14π€―13π₯8
πππ€ As retail traffic surges this holiday season, AI-driven threats are expected to spike.
Discover how "Grinch bots" are impacting the retail industry and strategies to enhance bot detection for a seamless holiday shopping experience.
https://thehackernews.com/2024/11/cyber-threats-that-could-impact-retail.html
Discover how "Grinch bots" are impacting the retail industry and strategies to enhance bot detection for a seamless holiday shopping experience.
https://thehackernews.com/2024/11/cyber-threats-that-could-impact-retail.html
π9β‘4π1
German law enforcement has disrupted the criminal service dstat[.]cc, enabling easy DDoS attacks for non-technical users.
Find details here: https://thehackernews.com/2024/11/german-police-disrupt-ddos-for-hire.html
Find details here: https://thehackernews.com/2024/11/german-police-disrupt-ddos-for-hire.html
π11β‘9
β οΈ Six critical security flaws have been discovered in the Ollama AI framework, enabling potential model poisoning and theft. With a staggering number of unpatched instances, itβs crucial to filter internet-facing endpoints effectively.
Read: https://thehackernews.com/2024/11/critical-flaws-in-ollama-ai-framework.html
Read: https://thehackernews.com/2024/11/critical-flaws-in-ollama-ai-framework.html
π8π4β‘2
π» Don't miss out on our latest #cybersecurity newsletter!
This week, we're diving into the chaos as hackers ramp up attacks, including North Korean ransomware collaboration and evasive password spraying tactics.
https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats.html
This week, we're diving into the chaos as hackers ramp up attacks, including North Korean ransomware collaboration and evasive password spraying tactics.
https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats.html
π₯10π8π3π€―3β‘1
Google warns of active exploitation of CVE-2024-43093 in Android.
This #vulnerability allows unauthorized access to critical directories, emphasizing the need for timely updates and patching processes.
https://thehackernews.com/2024/11/google-warns-of-actively-exploited-cve.html
This #vulnerability allows unauthorized access to critical directories, emphasizing the need for timely updates and patching processes.
https://thehackernews.com/2024/11/google-warns-of-actively-exploited-cve.html
π₯16π11π4β‘3π±2π€1