π‘ Cyberattacks on SMBs are rising, but many can't afford full-time CISOs. The vCISO model offers a cost-effective solution.
π The vCISO Academy by Cynomi equips MSPs & MSSPs with the skills to meet the growing demand.
Learn more: https://thehackernews.com/2024/11/the-vciso-academy-transforming-msps-and.html
π The vCISO Academy by Cynomi equips MSPs & MSSPs with the skills to meet the growing demand.
Learn more: https://thehackernews.com/2024/11/the-vciso-academy-transforming-msps-and.html
π13β‘9π4
β οΈ Critical "potential" RCE vulnerability in PAN-OS could expose your network to cybercriminals.
Palo Alto Networks advises securing management interfaces ASAP.
π Details here: https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html
Palo Alto Networks advises securing management interfaces ASAP.
π Details here: https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html
π16β‘12π8π€―3π±1
β οΈ New phishing campaign spreading Remcos RAT via Excel attachments! Itβs a fileless variant, making it even harder to detect.
Read: https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html
π Update your defenses NOW!
Read: https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html
π Update your defenses NOW!
π₯15π6π5β‘3
π¨ Critical Command Injection Flaws found in Aruba Networking Access Points!
Remote code execution is possibleβCVE-2024-42509 & CVE-2024-47460 threaten your networkβs security. Don't wait for an attack!
Read more: https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html
π Patch your devices NOW.
Remote code execution is possibleβCVE-2024-42509 & CVE-2024-47460 threaten your networkβs security. Don't wait for an attack!
Read more: https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html
π Patch your devices NOW.
π10β‘7π3
π Critical vulnerabilities discovered in popular open-source machine learning (ML) tools like Weave, ZenML, and Mage AI.
These flaws could lead to hijacked servers and compromised pipelines.
Read the full report here π https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html
These flaws could lead to hijacked servers and compromised pipelines.
Read the full report here π https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html
π±12π7π3π2
DTCC cuts breach risks by 11% with Automated Security Validation. Using Pentera, they boosted security, reduced costs, and freed up expert resourcesβwithout adding staff.
Is your team ahead, or falling behind? π€
Read how DTCC is leading the way: https://thehackernews.com/2024/11/the-roi-of-security-investments-how.html
Is your team ahead, or falling behind? π€
Read how DTCC is leading the way: https://thehackernews.com/2024/11/the-roi-of-security-investments-how.html
β‘5π4
π¨ SEO poisoning attack alert! GootLoader malware spreads by exploiting searches like "Are Bengal Cats legal in Australia?"
Read more: https://thehackernews.com/2024/11/new-gootloader-campaign-targets-users.html
Read more: https://thehackernews.com/2024/11/new-gootloader-campaign-targets-users.html
π₯7π5π3
π Imagine your banking app or car's software secretly turning on you...
This isn't a movie plotβit's the world of cyber in 2024. Dive into this weekβs wildest cyber threats and top defense tips in our latest weekly recap.
Read it here: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_11.html
This isn't a movie plotβit's the world of cyber in 2024. Dive into this weekβs wildest cyber threats and top defense tips in our latest weekly recap.
Read it here: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_11.html
π16π₯4π4
A new ransomware, Ymir, uses advanced memory management tactics to execute malicious code stealthily.
It targeted a Colombian organization after credentials were stolen by RustyStealer.
Read: https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
It targeted a Colombian organization after credentials were stolen by RustyStealer.
Read: https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
π12π€5π₯4π2
π‘οΈ North Korean hackers are using Flutter apps to target macOS with malware, bypassing traditional Apple security through signed developer IDs. Cryptocurrency companies are at risk.
Learn more: https://thehackernews.com/2024/11/north-korean-hackers-target-macos-using.html
Learn more: https://thehackernews.com/2024/11/north-korean-hackers-target-macos-using.html
π14π€―8π₯3π1
π Revolutionizing SOCs: Behavioral Analytics is BackβBetter than Ever!
Discover how behavioral analytics is transforming SOC incident response, improving speed and accuracy, and reducing resource costs.
Read: https://thehackernews.com/2024/11/5-ways-behavioral-analytics-is.html
Discover how behavioral analytics is transforming SOC incident response, improving speed and accuracy, and reducing resource costs.
Read: https://thehackernews.com/2024/11/5-ways-behavioral-analytics-is.html
π₯8π2π€2
π¨ Cybercriminals have a new weapon: GoIssue, a tool that targets #GitHub developers with bulk phishing emails.
This method can steal credentials and compromise repositories. With prices slashed, attacks are now more scalable.
Read: https://thehackernews.com/2024/11/new-phishing-tool-goissue-targets.html
This method can steal credentials and compromise repositories. With prices slashed, attacks are now more scalable.
Read: https://thehackernews.com/2024/11/new-phishing-tool-goissue-targets.html
π6π₯5π2π±1
Researchers have identified a #vulnerability in Citrix Virtual Apps that allows unauthenticated RCE through improper deserialization.
Read more: https://thehackernews.com/2024/11/new-flaws-in-citrix-virtual-apps-enable.html
Patches are available, but many organizations may still be exposed if not updated.
Read more: https://thehackernews.com/2024/11/new-flaws-in-citrix-virtual-apps-enable.html
Patches are available, but many organizations may still be exposed if not updated.
π₯14π1
Protect your organization with a Georgetown Master's in Cybersecurity Risk Management. Attend a sample class on November 19.
https://thn.news/cyber-risk-sample-class-ig
https://thn.news/cyber-risk-sample-class-ig
π12π₯5β‘3π€3π€―3π2π1π±1
π¨ Microsoft warns of actively exploited flaws in NTLM (CVE-2024-43451) & Task Scheduler (CVE-2024-49039), allowing NTLMv2 hash disclosure and privilege escalation to restricted RPC functions.
Find details on the November Patch Tuesday update: https://thehackernews.com/2024/11/microsoft-fixes-90-new-vulnerabilities.html
Find details on the November Patch Tuesday update: https://thehackernews.com/2024/11/microsoft-fixes-90-new-vulnerabilities.html
π₯14π5π5
The βDream Jobβ campaign isnβt just a scamβitβs a sophisticated cyberattack.
Iranian hacker group TA455 mimics North Korean tactics, using fake job offers to deploy malware in the aerospace sector.
Learn more: https://thehackernews.com/2024/11/iranian-hackers-use-dream-job-lures-to.html
Iranian hacker group TA455 mimics North Korean tactics, using fake job offers to deploy malware in the aerospace sector.
Learn more: https://thehackernews.com/2024/11/iranian-hackers-use-dream-job-lures-to.html
π11π10π₯6
π¨ OvrC cloud platformβs critical security flaws (CVE up to 9.2) allow attackers to bypass firewalls, hijack devices, and execute arbitrary code on IoT systems, threatening critical infrastructure.
Learn more: https://thehackernews.com/2024/11/ovrc-platform-vulnerabilities-expose.html
Learn more: https://thehackernews.com/2024/11/ovrc-platform-vulnerabilities-expose.html
π11β‘3π3π3
Bitdefender has released a free decryptor for ShrinkLocker, a #ransomware that uses BitLocker to lock files, and can compromise entire networks in under 10 minutes.
Read: https://thehackernews.com/2024/11/free-decryptor-released-for-bitlocker.html
Read: https://thehackernews.com/2024/11/free-decryptor-released-for-bitlocker.html
π14β‘4π3π€―3
π¨ 90% of network traffic flows through browsers. This makes them a prime target for cybercriminals. Phishing, data leakage & credential theft are increasing threats.
Check out LayerXβs guide for CISOs on protecting your teams and data.
Read: https://thehackernews.com/2024/11/comprehensive-guide-to-building-strong.html
Check out LayerXβs guide for CISOs on protecting your teams and data.
Read: https://thehackernews.com/2024/11/comprehensive-guide-to-building-strong.html
π13β‘5π1
On November 19, GigaOm Analyst, Paul Stringfellow and Sentra's Director of Product Marketing, David S., will share the latest insights from Gigaomβs recent DSPM report.
This session will spotlight critical factors in choosing a DSPM provider and reveal why DSPM is emerging as a distinct and essential component of modern data security.
Donβt miss this opportunity to learn directly from the experts!
Reserve your spot here π https://thn.news/dspm-webinar
This session will spotlight critical factors in choosing a DSPM provider and reveal why DSPM is emerging as a distinct and essential component of modern data security.
Donβt miss this opportunity to learn directly from the experts!
Reserve your spot here π https://thn.news/dspm-webinar
www.sentra.io
Webinar: Securing Data Everywhere and Always with DSPM
How Data Security Posture Management (DSPM) is - finally- giving organizations a way to automatically discover, classify, and secure all their data.
π13β‘2π€2π€―2π1