⚠️ Researchers have identified a high-severity #vulnerability (CVE-2024-10979) in PostgreSQL, allowing unprivileged users to alter environment variables, leading to potential code execution or information leaks.
Read: https://thehackernews.com/2024/11/high-severity-flaw-in-postgresql-allows.html
Read: https://thehackernews.com/2024/11/high-severity-flaw-in-postgresql-allows.html
⚡13🔥8👍5🤯4
Warning -- PXA Stealer, a new Python-based #malware, is targeting European & Asian gov and education sectors, stealing sensitive data like credentials & financial info.
Learn more: https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html
Learn more: https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html
⚡14🤯3👍2
AI in IAM = smarter security!
Machine learning analyzes behavior patterns to detect anomalies, enabling quicker & precise threat responses.
Learn how it reduces false positives, boosts efficiency & strengthens defenses: https://thehackernews.com/2024/11/how-ai-is-transforming-iam-and-identity.html
Machine learning analyzes behavior patterns to detect anomalies, enabling quicker & precise threat responses.
Learn how it reduces false positives, boosts efficiency & strengthens defenses: https://thehackernews.com/2024/11/how-ai-is-transforming-iam-and-identity.html
👍7⚡6🤔2🤯2
🔐 Trust is the foundation of your business—how solid is your certificate management?
Join our exclusive webinar to gain actionable insights into crypto agility and post-quantum cryptography from industry experts.
Don’t miss out—secure your spot now: https://thehackernews.com/2024/11/master-certificate-management-join-this.html
Join our exclusive webinar to gain actionable insights into crypto agility and post-quantum cryptography from industry experts.
Don’t miss out—secure your spot now: https://thehackernews.com/2024/11/master-certificate-management-join-this.html
👍7⚡5🔥3
Researchers found vulnerabilities in Google’s Vertex AI, allowing attackers to escalate privileges and exfiltrate models through manipulated custom job permissions and AI Pipelines, gaining backdoor access to Google Cloud and Kubernetes.
https://thehackernews.com/2024/11/researchers-warn-of-privilege.html
https://thehackernews.com/2024/11/researchers-warn-of-privilege.html
🤯13⚡6👍6😁5😱4
🔴 Alert: Iranian state-backed group, Cotton Sandstorm, has unleashed a new cyber espionage tool—WezRat.
This remote access trojan can execute malicious commands, steal sensitive data, and even take screenshots.
Read: https://thehackernews.com/2024/11/iranian-hackers-deploy-wezrat-malware.html
This remote access trojan can execute malicious commands, steal sensitive data, and even take screenshots.
Read: https://thehackernews.com/2024/11/iranian-hackers-deploy-wezrat-malware.html
😁8🤔5⚡4🔥3
🔴 New Threat Alert: BrazenBamboo, a well-resourced group, is exploiting an UNPATCHED zero-day #vulnerability in Fortinet's FortiClient for Windows to extract VPN credentials.
Learn more: https://thehackernews.com/2024/11/warning-deepdata-malware-exploiting.html
Learn more: https://thehackernews.com/2024/11/warning-deepdata-malware-exploiting.html
😁9🤔5⚡2
⚡ New Zero-Day Alert: Unauthenticated RCE in PAN-OS!
With a CVSS score of 9.3, hackers are exploiting it to deploy web shells, allowing persistent remote access.
🚨 No patches yet—secure your firewall management interface now.
Details: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
With a CVSS score of 9.3, hackers are exploiting it to deploy web shells, allowing persistent remote access.
🚨 No patches yet—secure your firewall management interface now.
Details: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
👍19😁11⚡4🤔4🤯2
A critical vulnerability (CVE-2024-10924) in the Really Simple SSL plugin affects 4 Million+ WordPress sites, allowing attackers to bypass 2FA and gain admin access remotely.
Details here: https://thehackernews.com/2024/11/urgent-critical-wordpress-plugin.html
Patch available—update now!
Details here: https://thehackernews.com/2024/11/urgent-critical-wordpress-plugin.html
Patch available—update now!
🔥19😁7👍1
Legal battle exposes NSO Group's continued exploitation of WhatsApp flaws to deploy Pegasus spyware—even after being sued by Meta.
Court docs reveal sophisticated zero-click attacks & ongoing adaptations to bypass WhatsApp's defenses.
Read: https://thehackernews.com/2024/11/nso-group-exploited-whatsapp-to-install.html
Court docs reveal sophisticated zero-click attacks & ongoing adaptations to bypass WhatsApp's defenses.
Read: https://thehackernews.com/2024/11/nso-group-exploited-whatsapp-to-install.html
🔥12👍7😁6😱3👏1
A new phishing campaign targets e-commerce shoppers in Europe and the U.S. with fake discounts, using SEO poisoning and typosquatting to steal payment details via fake sites.
Learn more: https://thehackernews.com/2024/11/fake-discount-sites-exploit-black.html
Learn more: https://thehackernews.com/2024/11/fake-discount-sites-exploit-black.html
⚡8🔥3👍1
Google is developing a Shielded Email feature, allowing users to create email aliases for signing up online, keeping their real addresses private.
Details: https://thehackernews.com/2024/11/shielded-email-googles-latest-tool-for.html
Details: https://thehackernews.com/2024/11/shielded-email-googles-latest-tool-for.html
👏32😁8🔥6🤔5👍4🤯3
Compliance-driven pen tests may not keep up with evolving threats. Automated testing slashes costs by 60%, making frequent tests feasible.
Want real-time testing? Learn more about automated solutions: https://thehackernews.com/2024/11/beyond-compliance-advantage-of-year.html
Want real-time testing? Learn more about automated solutions: https://thehackernews.com/2024/11/beyond-compliance-advantage-of-year.html
⚡7🔥6👍1
Every day, new tactics and threats emerge, from exploiting hidden tech flaws to tricking people with clever scams. In this week’s Cybersecurity Recap, we break down the trends shaping the threat landscape and share insights to help you strengthen your defenses.
Dive into this week’s must-know updates: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_18.html
Dive into this week’s must-know updates: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_18.html
⚡10👍3🤔3
🚨 SaaS Security is Facing New Threats – With a growing number of unauthorized apps and the surge of Generative AI tools, businesses are under increased risk.
One in four SaaS apps used by organizations is unauthorized—this “Shadow SaaS” creates a massive blind spot, expanding attack surfaces.
Failure to secure these apps exposes businesses to data breaches, compliance violations, and even total system compromise
Learn how to safeguard your organization’s SaaS environment and stay ahead of emerging risks in the State of SaaS Security 2024 report.
Don’t miss these critical insights. Read Now: https://thehackernews.com/expert-insights/2024/11/state-of-saas-security-report-bold.html
One in four SaaS apps used by organizations is unauthorized—this “Shadow SaaS” creates a massive blind spot, expanding attack surfaces.
Failure to secure these apps exposes businesses to data breaches, compliance violations, and even total system compromise
Learn how to safeguard your organization’s SaaS environment and stay ahead of emerging risks in the State of SaaS Security 2024 report.
Don’t miss these critical insights. Read Now: https://thehackernews.com/expert-insights/2024/11/state-of-saas-security-report-bold.html
👍13⚡3😁2
🚨 New stealth #malware "BabbleLoader" is bypassing AI detection with a slew of evasive tricks, making it one of the most sophisticated threats in the wild.
Learn how BabbleLoader works and how to defend against it: https://thehackernews.com/2024/11/new-stealthy-babbleloader-malware.html
Learn how BabbleLoader works and how to defend against it: https://thehackernews.com/2024/11/new-stealthy-babbleloader-malware.html
👍13⚡5😁3
Major security flaws in Progress Kemp LoadMaster (CVE-2024-1212) and VMware vCenter Server (CVE-2024-38812 and CVE-2024-38813) are actively being exploited.
Learn how to mitigate this flaw and secure your system before it’s too late – Read more: https://thehackernews.com/2024/11/cisa-alert-active-exploitation-of.html
Learn how to mitigate this flaw and secure your system before it’s too late – Read more: https://thehackernews.com/2024/11/cisa-alert-active-exploitation-of.html
👏6⚡4👍3😁2🤔1
T-Mobile confirmed being targeted in a Chinese cyber espionage campaign alongside other telecom giants like AT&T, Verizon, and Lumen Technologies.
The attack, attributed to Salt Typhoon, aims to harvest sensitive communications from high-value intelligence targets.
Explore the full analysis of this widespread cyber threat and its potential consequences: https://thehackernews.com/2024/11/chinese-hackers-exploit-t-mobile-and.html
The attack, attributed to Salt Typhoon, aims to harvest sensitive communications from high-value intelligence targets.
Explore the full analysis of this widespread cyber threat and its potential consequences: https://thehackernews.com/2024/11/chinese-hackers-exploit-t-mobile-and.html
😁11👍5🔥5⚡2
A new variant of the Helldown ransomware is now targeting #Linux and virtualized infrastructures via VMware, broadening its attack surface to industries like #healthcare, manufacturing, and IT services.
With evolving tactics, this marks a major shift in ransomware strategies, now focusing on virtual machines and cloud-based infrastructures.
Learn how Helldown is evolving — https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
With evolving tactics, this marks a major shift in ransomware strategies, now focusing on virtual machines and cloud-based infrastructures.
Learn how Helldown is evolving — https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
🤔10🔥6👍2🤯2
⚡️ Attention: Palo Alto Networks has released patches for actively exploited PAN-OS vulnerabilities—make sure to apply them ASAP!
Find UPDATE here: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
Find UPDATE here: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
👍12🔥8👏1