Researchers found vulnerabilities in Googleโs Vertex AI, allowing attackers to escalate privileges and exfiltrate models through manipulated custom job permissions and AI Pipelines, gaining backdoor access to Google Cloud and Kubernetes.
https://thehackernews.com/2024/11/researchers-warn-of-privilege.html
https://thehackernews.com/2024/11/researchers-warn-of-privilege.html
๐คฏ13โก6๐6๐5๐ฑ4
๐ด Alert: Iranian state-backed group, Cotton Sandstorm, has unleashed a new cyber espionage toolโWezRat.
This remote access trojan can execute malicious commands, steal sensitive data, and even take screenshots.
Read: https://thehackernews.com/2024/11/iranian-hackers-deploy-wezrat-malware.html
This remote access trojan can execute malicious commands, steal sensitive data, and even take screenshots.
Read: https://thehackernews.com/2024/11/iranian-hackers-deploy-wezrat-malware.html
๐8๐ค5โก4๐ฅ3
๐ด New Threat Alert: BrazenBamboo, a well-resourced group, is exploiting an UNPATCHED zero-day #vulnerability in Fortinet's FortiClient for Windows to extract VPN credentials.
Learn more: https://thehackernews.com/2024/11/warning-deepdata-malware-exploiting.html
Learn more: https://thehackernews.com/2024/11/warning-deepdata-malware-exploiting.html
๐9๐ค5โก2
โก New Zero-Day Alert: Unauthenticated RCE in PAN-OS!
With a CVSS score of 9.3, hackers are exploiting it to deploy web shells, allowing persistent remote access.
๐จ No patches yetโsecure your firewall management interface now.
Details: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
With a CVSS score of 9.3, hackers are exploiting it to deploy web shells, allowing persistent remote access.
๐จ No patches yetโsecure your firewall management interface now.
Details: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
๐19๐11โก4๐ค4๐คฏ2
A critical vulnerability (CVE-2024-10924) in the Really Simple SSL plugin affects 4 Million+ WordPress sites, allowing attackers to bypass 2FA and gain admin access remotely.
Details here: https://thehackernews.com/2024/11/urgent-critical-wordpress-plugin.html
Patch availableโupdate now!
Details here: https://thehackernews.com/2024/11/urgent-critical-wordpress-plugin.html
Patch availableโupdate now!
๐ฅ19๐7๐1
Legal battle exposes NSO Group's continued exploitation of WhatsApp flaws to deploy Pegasus spywareโeven after being sued by Meta.
Court docs reveal sophisticated zero-click attacks & ongoing adaptations to bypass WhatsApp's defenses.
Read: https://thehackernews.com/2024/11/nso-group-exploited-whatsapp-to-install.html
Court docs reveal sophisticated zero-click attacks & ongoing adaptations to bypass WhatsApp's defenses.
Read: https://thehackernews.com/2024/11/nso-group-exploited-whatsapp-to-install.html
๐ฅ12๐7๐6๐ฑ3๐1
A new phishing campaign targets e-commerce shoppers in Europe and the U.S. with fake discounts, using SEO poisoning and typosquatting to steal payment details via fake sites.
Learn more: https://thehackernews.com/2024/11/fake-discount-sites-exploit-black.html
Learn more: https://thehackernews.com/2024/11/fake-discount-sites-exploit-black.html
โก8๐ฅ3๐1
Google is developing a Shielded Email feature, allowing users to create email aliases for signing up online, keeping their real addresses private.
Details: https://thehackernews.com/2024/11/shielded-email-googles-latest-tool-for.html
Details: https://thehackernews.com/2024/11/shielded-email-googles-latest-tool-for.html
๐32๐8๐ฅ6๐ค5๐4๐คฏ3
Compliance-driven pen tests may not keep up with evolving threats. Automated testing slashes costs by 60%, making frequent tests feasible.
Want real-time testing? Learn more about automated solutions: https://thehackernews.com/2024/11/beyond-compliance-advantage-of-year.html
Want real-time testing? Learn more about automated solutions: https://thehackernews.com/2024/11/beyond-compliance-advantage-of-year.html
โก7๐ฅ6๐1
Every day, new tactics and threats emerge, from exploiting hidden tech flaws to tricking people with clever scams. In this weekโs Cybersecurity Recap, we break down the trends shaping the threat landscape and share insights to help you strengthen your defenses.
Dive into this weekโs must-know updates: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_18.html
Dive into this weekโs must-know updates: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_18.html
โก10๐3๐ค3
๐จ SaaS Security is Facing New Threats โ With a growing number of unauthorized apps and the surge of Generative AI tools, businesses are under increased risk.
One in four SaaS apps used by organizations is unauthorizedโthis โShadow SaaSโ creates a massive blind spot, expanding attack surfaces.
Failure to secure these apps exposes businesses to data breaches, compliance violations, and even total system compromise
Learn how to safeguard your organizationโs SaaS environment and stay ahead of emerging risks in the State of SaaS Security 2024 report.
Donโt miss these critical insights. Read Now: https://thehackernews.com/expert-insights/2024/11/state-of-saas-security-report-bold.html
One in four SaaS apps used by organizations is unauthorizedโthis โShadow SaaSโ creates a massive blind spot, expanding attack surfaces.
Failure to secure these apps exposes businesses to data breaches, compliance violations, and even total system compromise
Learn how to safeguard your organizationโs SaaS environment and stay ahead of emerging risks in the State of SaaS Security 2024 report.
Donโt miss these critical insights. Read Now: https://thehackernews.com/expert-insights/2024/11/state-of-saas-security-report-bold.html
๐13โก3๐2
๐จ New stealth #malware "BabbleLoader" is bypassing AI detection with a slew of evasive tricks, making it one of the most sophisticated threats in the wild.
Learn how BabbleLoader works and how to defend against it: https://thehackernews.com/2024/11/new-stealthy-babbleloader-malware.html
Learn how BabbleLoader works and how to defend against it: https://thehackernews.com/2024/11/new-stealthy-babbleloader-malware.html
๐13โก5๐3
Major security flaws in Progress Kemp LoadMaster (CVE-2024-1212) and VMware vCenter Server (CVE-2024-38812 and CVE-2024-38813) are actively being exploited.
Learn how to mitigate this flaw and secure your system before itโs too late โ Read more: https://thehackernews.com/2024/11/cisa-alert-active-exploitation-of.html
Learn how to mitigate this flaw and secure your system before itโs too late โ Read more: https://thehackernews.com/2024/11/cisa-alert-active-exploitation-of.html
๐6โก4๐3๐2๐ค1
T-Mobile confirmed being targeted in a Chinese cyber espionage campaign alongside other telecom giants like AT&T, Verizon, and Lumen Technologies.
The attack, attributed to Salt Typhoon, aims to harvest sensitive communications from high-value intelligence targets.
Explore the full analysis of this widespread cyber threat and its potential consequences: https://thehackernews.com/2024/11/chinese-hackers-exploit-t-mobile-and.html
The attack, attributed to Salt Typhoon, aims to harvest sensitive communications from high-value intelligence targets.
Explore the full analysis of this widespread cyber threat and its potential consequences: https://thehackernews.com/2024/11/chinese-hackers-exploit-t-mobile-and.html
๐11๐5๐ฅ5โก2
A new variant of the Helldown ransomware is now targeting #Linux and virtualized infrastructures via VMware, broadening its attack surface to industries like #healthcare, manufacturing, and IT services.
With evolving tactics, this marks a major shift in ransomware strategies, now focusing on virtual machines and cloud-based infrastructures.
Learn how Helldown is evolving โ https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
With evolving tactics, this marks a major shift in ransomware strategies, now focusing on virtual machines and cloud-based infrastructures.
Learn how Helldown is evolving โ https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
๐ค10๐ฅ6๐2๐คฏ2
โก๏ธ Attention: Palo Alto Networks has released patches for actively exploited PAN-OS vulnerabilitiesโmake sure to apply them ASAP!
Find UPDATE here: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
Find UPDATE here: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
๐12๐ฅ8๐1
๐ Can You See the Attack Before It Happens?
In this new eBook, "11 Attack Stories Prevented by XM Cyber", we reveal real-world examples of how attackers exploit security gaps to reach critical assetsโand how XM Cyber stops them in their tracks.
Donโt waitโget ahead of the next attack. Download the eBook today: https://thn.news/preemptive-attack-stories
In this new eBook, "11 Attack Stories Prevented by XM Cyber", we reveal real-world examples of how attackers exploit security gaps to reach critical assetsโand how XM Cyber stops them in their tracks.
Donโt waitโget ahead of the next attack. Download the eBook today: https://thn.news/preemptive-attack-stories
Xmcyber
With XM Cyber you can see the attack before it happens
๐11๐ค4๐1
Ngioweb malware is fueling a massive proxy service, NSOCKS, with 80% of its bots coming from vulnerable IoT devices like routers and cameras.
This botnet runs a daily average of 35,000 active bots, with some remaining in operation for over a month.
Learn how this botnet operates โ https://thehackernews.com/2024/11/ngioweb-botnet-fuels-nsocks-residential.html
This botnet runs a daily average of 35,000 active bots, with some remaining in operation for over a month.
Learn how this botnet operates โ https://thehackernews.com/2024/11/ngioweb-botnet-fuels-nsocks-residential.html
๐ค10๐7โก2
A new attack is hijacking misconfigured Jupyter Notebooks to fuel illegal live sports streaming. These systems, used for data science, are now prime targets for malicious actors.
Learn how this attack works & what it means for your security measures โ https://thehackernews.com/2024/11/hackers-hijack-unsecured-jupyter.html
Learn how this attack works & what it means for your security measures โ https://thehackernews.com/2024/11/hackers-hijack-unsecured-jupyter.html
๐คฏ14๐8๐3๐ค2๐ฑ2
๐ Urgent Alert: A high-severity vulnerability in Oracle's Agile PLM Framework is actively being exploited.
No username or password required, CVE-2024-21287 could leak sensitive data without any authentication.
Read the full advisory โ https://thehackernews.com/2024/11/oracle-warns-of-agile-plm-vulnerability.html
No username or password required, CVE-2024-21287 could leak sensitive data without any authentication.
Read the full advisory โ https://thehackernews.com/2024/11/oracle-warns-of-agile-plm-vulnerability.html
๐7๐คฏ5โก3๐2๐ค2