π‘οΈπ» AndroxGh0st malware is evolving!
Now exploiting multiple critical vulnerabilities while collaborating with the Mozi botnet, it's a serious threat to IoT and cloud security.
π Read now: https://thehackernews.com/2024/11/androxgh0st-malware-integrates-mozi.html
Now exploiting multiple critical vulnerabilities while collaborating with the Mozi botnet, it's a serious threat to IoT and cloud security.
π Read now: https://thehackernews.com/2024/11/androxgh0st-malware-integrates-mozi.html
π₯19π6π3
π΅οΈββοΈπ° The founder of Bitcoin Fog, a major #cryptocurrency mixer, sentenced to 12+ years for laundering over $400M tied to darknet crime.
Read the full story π https://thehackernews.com/2024/11/bitcoin-fog-founder-sentenced-to-12.html
Read the full story π https://thehackernews.com/2024/11/bitcoin-fog-founder-sentenced-to-12.html
β‘9π7π€―7π₯2π1
π‘ Cyberattacks on SMBs are rising, but many can't afford full-time CISOs. The vCISO model offers a cost-effective solution.
π The vCISO Academy by Cynomi equips MSPs & MSSPs with the skills to meet the growing demand.
Learn more: https://thehackernews.com/2024/11/the-vciso-academy-transforming-msps-and.html
π The vCISO Academy by Cynomi equips MSPs & MSSPs with the skills to meet the growing demand.
Learn more: https://thehackernews.com/2024/11/the-vciso-academy-transforming-msps-and.html
π13β‘9π4
β οΈ Critical "potential" RCE vulnerability in PAN-OS could expose your network to cybercriminals.
Palo Alto Networks advises securing management interfaces ASAP.
π Details here: https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html
Palo Alto Networks advises securing management interfaces ASAP.
π Details here: https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html
π16β‘12π8π€―3π±1
β οΈ New phishing campaign spreading Remcos RAT via Excel attachments! Itβs a fileless variant, making it even harder to detect.
Read: https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html
π Update your defenses NOW!
Read: https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html
π Update your defenses NOW!
π₯15π6π5β‘3
π¨ Critical Command Injection Flaws found in Aruba Networking Access Points!
Remote code execution is possibleβCVE-2024-42509 & CVE-2024-47460 threaten your networkβs security. Don't wait for an attack!
Read more: https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html
π Patch your devices NOW.
Remote code execution is possibleβCVE-2024-42509 & CVE-2024-47460 threaten your networkβs security. Don't wait for an attack!
Read more: https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html
π Patch your devices NOW.
π10β‘7π3
π Critical vulnerabilities discovered in popular open-source machine learning (ML) tools like Weave, ZenML, and Mage AI.
These flaws could lead to hijacked servers and compromised pipelines.
Read the full report here π https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html
These flaws could lead to hijacked servers and compromised pipelines.
Read the full report here π https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html
π±12π7π3π2
DTCC cuts breach risks by 11% with Automated Security Validation. Using Pentera, they boosted security, reduced costs, and freed up expert resourcesβwithout adding staff.
Is your team ahead, or falling behind? π€
Read how DTCC is leading the way: https://thehackernews.com/2024/11/the-roi-of-security-investments-how.html
Is your team ahead, or falling behind? π€
Read how DTCC is leading the way: https://thehackernews.com/2024/11/the-roi-of-security-investments-how.html
β‘5π4
π¨ SEO poisoning attack alert! GootLoader malware spreads by exploiting searches like "Are Bengal Cats legal in Australia?"
Read more: https://thehackernews.com/2024/11/new-gootloader-campaign-targets-users.html
Read more: https://thehackernews.com/2024/11/new-gootloader-campaign-targets-users.html
π₯7π5π3
π Imagine your banking app or car's software secretly turning on you...
This isn't a movie plotβit's the world of cyber in 2024. Dive into this weekβs wildest cyber threats and top defense tips in our latest weekly recap.
Read it here: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_11.html
This isn't a movie plotβit's the world of cyber in 2024. Dive into this weekβs wildest cyber threats and top defense tips in our latest weekly recap.
Read it here: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_11.html
π16π₯4π4
A new ransomware, Ymir, uses advanced memory management tactics to execute malicious code stealthily.
It targeted a Colombian organization after credentials were stolen by RustyStealer.
Read: https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
It targeted a Colombian organization after credentials were stolen by RustyStealer.
Read: https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
π12π€5π₯4π2
π‘οΈ North Korean hackers are using Flutter apps to target macOS with malware, bypassing traditional Apple security through signed developer IDs. Cryptocurrency companies are at risk.
Learn more: https://thehackernews.com/2024/11/north-korean-hackers-target-macos-using.html
Learn more: https://thehackernews.com/2024/11/north-korean-hackers-target-macos-using.html
π14π€―8π₯3π1
π Revolutionizing SOCs: Behavioral Analytics is BackβBetter than Ever!
Discover how behavioral analytics is transforming SOC incident response, improving speed and accuracy, and reducing resource costs.
Read: https://thehackernews.com/2024/11/5-ways-behavioral-analytics-is.html
Discover how behavioral analytics is transforming SOC incident response, improving speed and accuracy, and reducing resource costs.
Read: https://thehackernews.com/2024/11/5-ways-behavioral-analytics-is.html
π₯8π2π€2
π¨ Cybercriminals have a new weapon: GoIssue, a tool that targets #GitHub developers with bulk phishing emails.
This method can steal credentials and compromise repositories. With prices slashed, attacks are now more scalable.
Read: https://thehackernews.com/2024/11/new-phishing-tool-goissue-targets.html
This method can steal credentials and compromise repositories. With prices slashed, attacks are now more scalable.
Read: https://thehackernews.com/2024/11/new-phishing-tool-goissue-targets.html
π6π₯5π2π±1
Researchers have identified a #vulnerability in Citrix Virtual Apps that allows unauthenticated RCE through improper deserialization.
Read more: https://thehackernews.com/2024/11/new-flaws-in-citrix-virtual-apps-enable.html
Patches are available, but many organizations may still be exposed if not updated.
Read more: https://thehackernews.com/2024/11/new-flaws-in-citrix-virtual-apps-enable.html
Patches are available, but many organizations may still be exposed if not updated.
π₯14π1
Protect your organization with a Georgetown Master's in Cybersecurity Risk Management. Attend a sample class on November 19.
https://thn.news/cyber-risk-sample-class-ig
https://thn.news/cyber-risk-sample-class-ig
π12π₯5β‘3π€3π€―3π2π1π±1
π¨ Microsoft warns of actively exploited flaws in NTLM (CVE-2024-43451) & Task Scheduler (CVE-2024-49039), allowing NTLMv2 hash disclosure and privilege escalation to restricted RPC functions.
Find details on the November Patch Tuesday update: https://thehackernews.com/2024/11/microsoft-fixes-90-new-vulnerabilities.html
Find details on the November Patch Tuesday update: https://thehackernews.com/2024/11/microsoft-fixes-90-new-vulnerabilities.html
π₯14π5π5
The βDream Jobβ campaign isnβt just a scamβitβs a sophisticated cyberattack.
Iranian hacker group TA455 mimics North Korean tactics, using fake job offers to deploy malware in the aerospace sector.
Learn more: https://thehackernews.com/2024/11/iranian-hackers-use-dream-job-lures-to.html
Iranian hacker group TA455 mimics North Korean tactics, using fake job offers to deploy malware in the aerospace sector.
Learn more: https://thehackernews.com/2024/11/iranian-hackers-use-dream-job-lures-to.html
π11π10π₯6
π¨ OvrC cloud platformβs critical security flaws (CVE up to 9.2) allow attackers to bypass firewalls, hijack devices, and execute arbitrary code on IoT systems, threatening critical infrastructure.
Learn more: https://thehackernews.com/2024/11/ovrc-platform-vulnerabilities-expose.html
Learn more: https://thehackernews.com/2024/11/ovrc-platform-vulnerabilities-expose.html
π11β‘3π3π3
Bitdefender has released a free decryptor for ShrinkLocker, a #ransomware that uses BitLocker to lock files, and can compromise entire networks in under 10 minutes.
Read: https://thehackernews.com/2024/11/free-decryptor-released-for-bitlocker.html
Read: https://thehackernews.com/2024/11/free-decryptor-released-for-bitlocker.html
π14β‘4π3π€―3