π Attacks using stolen credentials are surging, fueled by the rise in infostealers and the criminal marketplaces dealing in them.
TI feeds can alert you to stolen credentials when they appear for sale, but TI providers have no way to check if the credentials are actually valid or not.
Using Push Security, you can now eliminate the noise and get alerts only when verified credentials belonging to your employees appear on criminal marketplaces.
Pushβs browser extension compares stolen credentials from widely-used TI feeds directly against the credentials your employees are actually using β
Find out more here π https://thn.news/push-credential-detection
TI feeds can alert you to stolen credentials when they appear for sale, but TI providers have no way to check if the credentials are actually valid or not.
Using Push Security, you can now eliminate the noise and get alerts only when verified credentials belonging to your employees appear on criminal marketplaces.
Pushβs browser extension compares stolen credentials from widely-used TI feeds directly against the credentials your employees are actually using β
Find out more here π https://thn.news/push-credential-detection
π17π6β‘4π₯4
π¨ A new phishing campaign is slipping past email defenses! Corrupted ZIP files and Office documents bypass antivirus and spam filters, landing directly in your inbox.
π© Why care? These cleverly crafted files could lead you straight to fake login pages or malware-laden sites. One wrong click could cost your dataβor worse.
Read the full breakdown: https://thehackernews.com/2024/12/hackers-use-corrupted-zips-and-office.html
π© Why care? These cleverly crafted files could lead you straight to fake login pages or malware-laden sites. One wrong click could cost your dataβor worse.
Read the full breakdown: https://thehackernews.com/2024/12/hackers-use-corrupted-zips-and-office.html
π17β‘5π₯2π1
π¨ Alert: A critical vulnerability (CVE-2024-10905) in SailPoint's IdentityIQ software exposes sensitive content.
CVSS score? A whopping 10.0βmaximum severity.
Affected versions span from 8.2 to 8.4 and earlier, putting countless systems at risk. Static files that should be locked down are now vulnerable to unauthorized access.
Learn more: https://thehackernews.com/2024/12/critical-sailpoint-identityiq.html
CVSS score? A whopping 10.0βmaximum severity.
Affected versions span from 8.2 to 8.4 and earlier, putting countless systems at risk. Static files that should be locked down are now vulnerable to unauthorized access.
Learn more: https://thehackernews.com/2024/12/critical-sailpoint-identityiq.html
π€9π₯5π3β‘1
π‘οΈ Veeam users, take note! A critical flaw in the Service Provider Console (CVE-2024-42448) could allow remote code execution (RCE).
CVSS score: 9.9/10βthis is as serious as it gets.
π Don't wait, secure your systems today β https://thehackernews.com/2024/12/veeam-issues-patch-for-critical-rce.html
CVSS score: 9.9/10βthis is as serious as it gets.
π Don't wait, secure your systems today β https://thehackernews.com/2024/12/veeam-issues-patch-for-critical-rce.html
π14π€―5β‘1
Cybersecurity agencies have issued a coordinated advisory along with an urgent checklist to combat the Salt Typhoon threatβa nation-state group linked to China that has been infiltrating U.S. telecom networks to steal sensitive data.
Dive into the full story: https://thehackernews.com/2024/12/joint-advisory-warns-of-prc-backed.html
Dive into the full story: https://thehackernews.com/2024/12/joint-advisory-warns-of-prc-backed.html
π€―14β‘5π3
A software supply chain attack targeted Solana's popular Solana's web3.js npm library (400,000+ weekly downloads). Malicious versions (1.95.6 and 1.95.7) were designed to steal users' private keys and drain cryptocurrency wallets.
The backdoor was cleverly hidden in the βaddToQueueβ function, seamlessly blending into legitimate code.
Learn more here π https://thehackernews.com/2024/12/researchers-uncover-backdoor-in-solanas.html
The backdoor was cleverly hidden in the βaddToQueueβ function, seamlessly blending into legitimate code.
Learn more here π https://thehackernews.com/2024/12/researchers-uncover-backdoor-in-solanas.html
π±18π€10π6β‘3π2π₯2π2π€―2
Check out @anyrun_app's Black Friday specials π
π Get up to 3 sandbox licenses for your team as a gift
π Double your search limit in TI Lookup β #ANYRUN's threat intelligence database β for FREE
Secure your deal before Dec 8 π https://thn.news/anyrun-black-friday-tg
π Get up to 3 sandbox licenses for your team as a gift
π Double your search limit in TI Lookup β #ANYRUN's threat intelligence database β for FREE
Secure your deal before Dec 8 π https://thn.news/anyrun-black-friday-tg
π9π5
Europol has dismantled MATRIX, an invite-only encrypted messaging service used by criminals, intercepting 2.3 million messages tied to drug trafficking, arms deals, and money laundering.
Read the full story: https://thehackernews.com/2024/12/europol-dismantles-criminal-messaging.html
Read the full story: https://thehackernews.com/2024/12/europol-dismantles-criminal-messaging.html
β‘19π€―13π7π6π4π€3π₯2π±2
Russia-linked APT group Turla has been hijacking the infrastructure of a Pakistani hacking group to spy on Afghan and Indian government targets by deploying custom #malware, TwoDash and Statuezy.
Learn more: https://thehackernews.com/2024/12/russia-linked-turla-exploits-pakistani.html
Learn more: https://thehackernews.com/2024/12/russia-linked-turla-exploits-pakistani.html
π24π₯8π€―6π5β‘2π1
π¨ CISA flags ProjectSend, Zyxel and CyberPanel flaws as actively exploited.
One of these enables attackers to bypass authentication and execute arbitrary commands β ransomware campaigns like PSAUX & Helldown are already exploiting it.
Read: https://thehackernews.com/2024/12/cisa-warns-of-active-exploitation-of.html
One of these enables attackers to bypass authentication and execute arbitrary commands β ransomware campaigns like PSAUX & Helldown are already exploiting it.
Read: https://thehackernews.com/2024/12/cisa-warns-of-active-exploitation-of.html
π₯16π3π2
U.K. National Crime Agency has disrupted Russian money laundering networks, leading to 84 arrests and the seizure of Β£20 million in cash and #cryptocurrency.
These networks werenβt just about moneyβthey funded Russian espionage and connected to cybercriminal gangs across the globe.
π Read more: https://thehackernews.com/2024/12/nca-busts-russian-crypto-networks.html
These networks werenβt just about moneyβthey funded Russian espionage and connected to cybercriminal gangs across the globe.
π Read more: https://thehackernews.com/2024/12/nca-busts-russian-crypto-networks.html
π18π10β‘4
MirrorFace, a China-linked group, is deploying the dormant ANEL backdoorβunused since 2018βin a new spear-phishing campaign targeting Japan.
Explore how these tactics are bypassing security measures: https://thehackernews.com/2024/12/anel-and-noopdoor-backdoors-weaponized.html
Explore how these tactics are bypassing security measures: https://thehackernews.com/2024/12/anel-and-noopdoor-backdoors-weaponized.html
π28π5π1
π¨ Chinese hackers launched a stealthy four-month-long cyberattack targeting a major U.S. organization, harvesting emails and stealing sensitive data.
The attackers exploited Exchange Servers and used advanced tools like FileZilla and PowerShell.
Read the full story π https://thehackernews.com/2024/12/researchers-uncover-4-month-cyberattack.html
The attackers exploited Exchange Servers and used advanced tools like FileZilla and PowerShell.
Read the full story π https://thehackernews.com/2024/12/researchers-uncover-4-month-cyberattack.html
π24π€8π5π5β‘2π€―1
π¨ Earth Minotaur is using an advanced toolkit, MOONSHINE, to deploy the DarkNimbus backdoor across Android and Windows devices, targeting vulnerable communities like Tibetans and Uyghurs.
Find details here βhttps://thehackernews.com/2024/12/hackers-target-uyghurs-and-tibetans.html
Find details here βhttps://thehackernews.com/2024/12/hackers-target-uyghurs-and-tibetans.html
π19π3π€2
π¨ A critical vulnerability (CVE-2024-41713) in Mitel MiCollab could let attackers access sensitive system files and potentially perform unauthorized administrative actions without authentication.
Full details here: https://thehackernews.com/2024/12/critical-mitel-micollab-flaw-exposes.html
Full details here: https://thehackernews.com/2024/12/critical-mitel-micollab-flaw-exposes.html
π15β‘3π3
Europol has shut down Manson Market, a notorious marketplace facilitating large-scale online fraud, seizing over 50 servers and arresting two suspects.
Learn more: https://thehackernews.com/2024/12/europol-shuts-down-manson-market-fraud.html
Learn more: https://thehackernews.com/2024/12/europol-shuts-down-manson-market-fraud.html
π21π13π€3
π¨ 77 banks and crypto exchanges under attack...
DroidBot, a new Android malware, is wreaking havoc across Europe. This $3,000/month malware-as-a-service disguises itself as popular apps to infiltrate devices.
Discover how this hidden threat operates and which countries are under attack: https://thehackernews.com/2024/12/this-3000-android-trojan-targeting.html
DroidBot, a new Android malware, is wreaking havoc across Europe. This $3,000/month malware-as-a-service disguises itself as popular apps to infiltrate devices.
Discover how this hidden threat operates and which countries are under attack: https://thehackernews.com/2024/12/this-3000-android-trojan-targeting.html
π30π8π±6π1
β οΈ Gamaredon threat actor is leveraging Cloudflare Tunnels and DNS fast-fluxing to hide malware delivery systems, targeting Ukrainian entities with GammaDrop malware.
Learn about these advanced tactics: https://thehackernews.com/2024/12/hackers-leveraging-cloudflare-tunnels.html
Learn about these advanced tactics: https://thehackernews.com/2024/12/hackers-leveraging-cloudflare-tunnels.html
π13π6π₯4π€―3π2π±1
π¨ New Malware Alert! Passwords, cookies, and moreβgone in seconds.
The RevC2 backdoor, part of the More_eggs operation, is now stealing browser data using WebSockets.
Read the full story here: https://thehackernews.com/2024/12/moreeggs-maas-expands-operations-with.html
The RevC2 backdoor, part of the More_eggs operation, is now stealing browser data using WebSockets.
Read the full story here: https://thehackernews.com/2024/12/moreeggs-maas-expands-operations-with.html
π±15π9π4π€―4π₯2
π¨ New vulnerabilities in MLflow, H2O, PyTorch, and MLeap expose open-source machine learning (ML) tools and AI frameworks to the risk of remote code execution.
Read the full story for more details: https://thehackernews.com/2024/12/researchers-uncover-flaws-in-popular.html
Read the full story for more details: https://thehackernews.com/2024/12/researchers-uncover-flaws-in-popular.html
π19π±18π5π₯2β‘1π1