A misconfigured TikTok pixel nearly caused a costly GDPR violation for a global travel company, showing how simple oversights can lead to significant fines and reputational damage.
Learn more: https://thehackernews.com/2024/11/tiktok-pixel-privacy-nightmare-new-case.html
Learn more: https://thehackernews.com/2024/11/tiktok-pixel-privacy-nightmare-new-case.html
π7β‘2π2π€2π±1
Ransomware is evolvingβtargeting local backups & SaaS. Avoid 5 BCDR oversights that leave you exposed. Prioritize immutable backups, automated testing, & threat detection.
Read: https://thehackernews.com/2024/11/5-bcdr-oversights-that-leave-you-exposed-to-ransomware.html
Are you ready to recover?
Read: https://thehackernews.com/2024/11/5-bcdr-oversights-that-leave-you-exposed-to-ransomware.html
Are you ready to recover?
π7β‘3π3
π The rise of cloaking and deepfakes is shaking up cybersecurity.
Google warns that fraudsters are using cloaking tactics to impersonate legitimate sites, leading to scams and malware installs.
Read: https://thehackernews.com/2024/11/google-warns-of-rising-cloaking-scams.html
Stay alert to these evolving threats!
Google warns that fraudsters are using cloaking tactics to impersonate legitimate sites, leading to scams and malware installs.
Read: https://thehackernews.com/2024/11/google-warns-of-rising-cloaking-scams.html
Stay alert to these evolving threats!
π₯13π4π2β‘1
Researchers reveal over 70,000 domains have been hijacked by cybercriminals using a stealthy technique called Sitting Ducks.
This attack targets DNS misconfigurations, making it nearly impossible to detect.
Read: https://thehackernews.com/2024/11/experts-uncover-70000-hijacked-domains.html
This attack targets DNS misconfigurations, making it nearly impossible to detect.
Read: https://thehackernews.com/2024/11/experts-uncover-70000-hijacked-domains.html
π12π₯5β‘3π3
π¨ Urgent : CISA warns of active exploitation of critical flaws in Palo Alto Networks Expedition OS and SQL services (CVEs 9463 & 9465).
Read: https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html
These vulnerabilities could lead to severe breaches if not addressed promptly.
Read: https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html
These vulnerabilities could lead to severe breaches if not addressed promptly.
π9π8β‘4π3
Ilya Lichtenstein sentenced to 5 years for masterminding the 2016 Bitfinex hack, stealing $10.5B in #Bitcoin.
His laundering tactics included crypto mixers and fake identities, highlighting the evolving threat in crypto security.
Read: https://thehackernews.com/2024/11/bitfinex-hacker-sentenced-to-5-years.html
His laundering tactics included crypto mixers and fake identities, highlighting the evolving threat in crypto security.
Read: https://thehackernews.com/2024/11/bitfinex-hacker-sentenced-to-5-years.html
π19β‘6π4π₯1π€―1
β οΈ Researchers have identified a high-severity #vulnerability (CVE-2024-10979) in PostgreSQL, allowing unprivileged users to alter environment variables, leading to potential code execution or information leaks.
Read: https://thehackernews.com/2024/11/high-severity-flaw-in-postgresql-allows.html
Read: https://thehackernews.com/2024/11/high-severity-flaw-in-postgresql-allows.html
β‘13π₯8π5π€―4
Warning -- PXA Stealer, a new Python-based #malware, is targeting European & Asian gov and education sectors, stealing sensitive data like credentials & financial info.
Learn more: https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html
Learn more: https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html
β‘14π€―3π2
AI in IAM = smarter security!
Machine learning analyzes behavior patterns to detect anomalies, enabling quicker & precise threat responses.
Learn how it reduces false positives, boosts efficiency & strengthens defenses: https://thehackernews.com/2024/11/how-ai-is-transforming-iam-and-identity.html
Machine learning analyzes behavior patterns to detect anomalies, enabling quicker & precise threat responses.
Learn how it reduces false positives, boosts efficiency & strengthens defenses: https://thehackernews.com/2024/11/how-ai-is-transforming-iam-and-identity.html
π7β‘6π€2π€―2
π Trust is the foundation of your businessβhow solid is your certificate management?
Join our exclusive webinar to gain actionable insights into crypto agility and post-quantum cryptography from industry experts.
Donβt miss outβsecure your spot now: https://thehackernews.com/2024/11/master-certificate-management-join-this.html
Join our exclusive webinar to gain actionable insights into crypto agility and post-quantum cryptography from industry experts.
Donβt miss outβsecure your spot now: https://thehackernews.com/2024/11/master-certificate-management-join-this.html
π7β‘5π₯3
Researchers found vulnerabilities in Googleβs Vertex AI, allowing attackers to escalate privileges and exfiltrate models through manipulated custom job permissions and AI Pipelines, gaining backdoor access to Google Cloud and Kubernetes.
https://thehackernews.com/2024/11/researchers-warn-of-privilege.html
https://thehackernews.com/2024/11/researchers-warn-of-privilege.html
π€―13β‘6π6π5π±4
π΄ Alert: Iranian state-backed group, Cotton Sandstorm, has unleashed a new cyber espionage toolβWezRat.
This remote access trojan can execute malicious commands, steal sensitive data, and even take screenshots.
Read: https://thehackernews.com/2024/11/iranian-hackers-deploy-wezrat-malware.html
This remote access trojan can execute malicious commands, steal sensitive data, and even take screenshots.
Read: https://thehackernews.com/2024/11/iranian-hackers-deploy-wezrat-malware.html
π8π€5β‘4π₯3
π΄ New Threat Alert: BrazenBamboo, a well-resourced group, is exploiting an UNPATCHED zero-day #vulnerability in Fortinet's FortiClient for Windows to extract VPN credentials.
Learn more: https://thehackernews.com/2024/11/warning-deepdata-malware-exploiting.html
Learn more: https://thehackernews.com/2024/11/warning-deepdata-malware-exploiting.html
π9π€5β‘2
β‘ New Zero-Day Alert: Unauthenticated RCE in PAN-OS!
With a CVSS score of 9.3, hackers are exploiting it to deploy web shells, allowing persistent remote access.
π¨ No patches yetβsecure your firewall management interface now.
Details: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
With a CVSS score of 9.3, hackers are exploiting it to deploy web shells, allowing persistent remote access.
π¨ No patches yetβsecure your firewall management interface now.
Details: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
π19π11β‘4π€4π€―2
A critical vulnerability (CVE-2024-10924) in the Really Simple SSL plugin affects 4 Million+ WordPress sites, allowing attackers to bypass 2FA and gain admin access remotely.
Details here: https://thehackernews.com/2024/11/urgent-critical-wordpress-plugin.html
Patch availableβupdate now!
Details here: https://thehackernews.com/2024/11/urgent-critical-wordpress-plugin.html
Patch availableβupdate now!
π₯19π7π1
Legal battle exposes NSO Group's continued exploitation of WhatsApp flaws to deploy Pegasus spywareβeven after being sued by Meta.
Court docs reveal sophisticated zero-click attacks & ongoing adaptations to bypass WhatsApp's defenses.
Read: https://thehackernews.com/2024/11/nso-group-exploited-whatsapp-to-install.html
Court docs reveal sophisticated zero-click attacks & ongoing adaptations to bypass WhatsApp's defenses.
Read: https://thehackernews.com/2024/11/nso-group-exploited-whatsapp-to-install.html
π₯12π7π6π±3π1
A new phishing campaign targets e-commerce shoppers in Europe and the U.S. with fake discounts, using SEO poisoning and typosquatting to steal payment details via fake sites.
Learn more: https://thehackernews.com/2024/11/fake-discount-sites-exploit-black.html
Learn more: https://thehackernews.com/2024/11/fake-discount-sites-exploit-black.html
β‘8π₯3π1
Google is developing a Shielded Email feature, allowing users to create email aliases for signing up online, keeping their real addresses private.
Details: https://thehackernews.com/2024/11/shielded-email-googles-latest-tool-for.html
Details: https://thehackernews.com/2024/11/shielded-email-googles-latest-tool-for.html
π32π8π₯6π€5π4π€―3
Compliance-driven pen tests may not keep up with evolving threats. Automated testing slashes costs by 60%, making frequent tests feasible.
Want real-time testing? Learn more about automated solutions: https://thehackernews.com/2024/11/beyond-compliance-advantage-of-year.html
Want real-time testing? Learn more about automated solutions: https://thehackernews.com/2024/11/beyond-compliance-advantage-of-year.html
β‘7π₯6π1
Every day, new tactics and threats emerge, from exploiting hidden tech flaws to tricking people with clever scams. In this weekβs Cybersecurity Recap, we break down the trends shaping the threat landscape and share insights to help you strengthen your defenses.
Dive into this weekβs must-know updates: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_18.html
Dive into this weekβs must-know updates: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_18.html
β‘10π3π€3