๐จ Software supply chain attack alert! 
 
Two popular Python AI library versions, Ultralytics 8.3.41 & 8.3.42, were compromised to deliver cryptocurrency miners.
 
Read details here: https://thehackernews.com/2024/12/ultralytics-ai-library-compromised.html
Two popular Python AI library versions, Ultralytics 8.3.41 & 8.3.42, were compromised to deliver cryptocurrency miners.
Read details here: https://thehackernews.com/2024/12/ultralytics-ai-library-compromised.html
๐21๐ฅ7๐6โก2๐คฏ1
  ๐จ A botnet named Socks5Systemz has infected over 85,000 machines worldwide, transforming them into anonymous proxy servers marketed on PROXY[.]AM for as much as $700/month. 
 
Learn more: https://thehackernews.com/2024/12/socks5systemz-botnet-powers-illegal.html
Learn more: https://thehackernews.com/2024/12/socks5systemz-botnet-powers-illegal.html
๐คฏ20๐7๐6๐5๐ฅ3
  ๐ Identity isnโt enough. Privileged access needs extra layers of security. 
 
From privilege elevation to quantum-safe connections, here are 7 bolt-ons IAMs like Entra ID need now.
 
Secure your critical sessions. Read more: https://thehackernews.com/2024/12/seven-bolt-ons-to-make-your-entra-id.html
From privilege elevation to quantum-safe connections, here are 7 bolt-ons IAMs like Entra ID need now.
Secure your critical sessions. Read more: https://thehackernews.com/2024/12/seven-bolt-ons-to-make-your-entra-id.html
๐12๐ฅ6๐ฑ5
  ๐ Researchers uncover DeepSeekโs XSS vulnerability and Anthropicโs Claudeโs โZombAIsโ technique, revealing how prompt injection can hijack user accounts and execute malicious commands. 
 
Learn how these attacks work: https://thehackernews.com/2024/12/researchers-uncover-prompt-injection.html
Learn how these attacks work: https://thehackernews.com/2024/12/researchers-uncover-prompt-injection.html
๐15โก4๐คฏ4๐3๐ฅ1
  Exabyte-scale data is here, and traditional methods canโt handle the challenges of securing it across multi-cloud environments. 
 
Learn how Sentraโs Data Security Platform helps organizations tackle these challenges.
 
Read: https://thn.news/sentra-exabyte-data-security
  
  Learn how Sentraโs Data Security Platform helps organizations tackle these challenges.
Read: https://thn.news/sentra-exabyte-data-security
www.sentra.io
  
  Achieve Exabyte Scale Enterprise Data Security | Sentra
  Enterprise data security is harder with growing data and multi-cloud environments. Discover how Sentraโs DSP offers smart, scalable solutions to protect it.
๐7๐คฏ4๐2๐ค2๐ฅ1
  ๐จ Black Basta ransomware operators have adopted new social engineering tricks, targeting victims with email bombs and impersonating IT staff on Microsoft Teams. 
 
Click for insights ๐ https://thehackernews.com/2024/12/black-basta-ransomware-evolves-with.html
Click for insights ๐ https://thehackernews.com/2024/12/black-basta-ransomware-evolves-with.html
๐21๐5๐ฑ4๐ฅ1
  โ ๏ธ A Russia-linked group, UAC-0185, is ramping up phishing attacks targeting Ukraine's defense forces. These attacks use malware delivered through malicious links, leveraging PowerShell scripts and HTML applications to install remote control tools like MeshAgent, giving attackers full access to compromised systems. 
 
Full details: https://thehackernews.com/2024/12/cert-ua-warns-of-phishing-attacks.html
Full details: https://thehackernews.com/2024/12/cert-ua-warns-of-phishing-attacks.html
๐ฅ24๐11๐9โก2๐ค2๐ฑ2
  ๐จ 90% of modern applications rely on open source software (OSS)โbut this innovation comes with a major security price tag. Recent attacks like SolarWinds and Log4j prove just how fragile the supply chain is. 
 
Discover actionable strategies to protect your software supply chain.
 
Donโt wait for the next attackโread more now: https://thehackernews.com/expert-insights/2024/12/securing-open-source-lessons-from.html
Discover actionable strategies to protect your software supply chain.
Donโt wait for the next attackโread more now: https://thehackernews.com/expert-insights/2024/12/securing-open-source-lessons-from.html
๐13๐ค4๐ฅ3๐3
  ๐จ Cyberattacks are evolving fast! From stealthy zero-day exploits to fileless malware and phishing hosted on trusted platforms, the latest threats demand smarter defenses. 
 
๐ See how tools like ANYRUN's sandbox expose hidden dangers in real-time.
 
๐ Stay aheadโread the full breakdown here: https://thehackernews.com/2024/12/ongoing-phishing-and-malware-campaigns.html
๐ See how tools like ANYRUN's sandbox expose hidden dangers in real-time.
๐ Stay aheadโread the full breakdown here: https://thehackernews.com/2024/12/ongoing-phishing-and-malware-campaigns.html
๐ฅ17๐3๐คฏ1
  A suspected China-linked cyber espionage campaign, Operation Digital Eye, targeted major IT service providers in Southern Europe, exploiting Visual Studio Code Remote Tunnels to infiltrate systems. 
 
Learn more: https://thehackernews.com/2024/12/hackers-weaponize-visual-studio-code.html
Learn more: https://thehackernews.com/2024/12/hackers-weaponize-visual-studio-code.html
๐12๐ฅ5๐1
  Belgian and Dutch authorities have arrested 8 suspects linked to a massive phishing scam that stole millions. The gang used fake banking calls and phishing links to con victims, with some even posing as police at victims' doorsteps. 
 
Full story: https://thehackernews.com/2024/12/phone-phishing-gang-busted-eight.html
Full story: https://thehackernews.com/2024/12/phone-phishing-gang-busted-eight.html
๐18๐7๐ฅ4๐คฏ1
  The Georgetown Master's in Cybersecurity Risk Management covers business, law, computer science, and organizational change.
Learn more: https://thn.news/georgetown-masters-cyber-risk-ig
Learn more: https://thn.news/georgetown-masters-cyber-risk-ig
๐22๐ค1
  ๐จ Sophisticated mobile phishing campaign uncovered! Attackers are distributing the updated Antidot banking trojan, now called AppLite Banker, targeting unsuspecting job seekers. 
 
Learn how this threat operates and what measures to take: https://thehackernews.com/2024/12/fake-recruiters-distribute-banking.html
Learn how this threat operates and what measures to take: https://thehackernews.com/2024/12/fake-recruiters-distribute-banking.html
๐11๐ฅ5๐ค4
  A critical vulnerability (CVE-2024-50623) in Cleo's file transfer software is under active, widespread exploitationโaffecting fully patched systems. 
 
The flaw allows unauthenticated remote code execution through unrestricted file uploads, enabling attackers to execute arbitrary code.
 
Over 4,200 organizations use Cleo software globallyโthis is a major security concern for logistics, consumer products, and more.
 
Get critical insights: https://thehackernews.com/2024/12/cleo-file-transfer-vulnerability-under.html
The flaw allows unauthenticated remote code execution through unrestricted file uploads, enabling attackers to execute arbitrary code.
Over 4,200 organizations use Cleo software globallyโthis is a major security concern for logistics, consumer products, and more.
Get critical insights: https://thehackernews.com/2024/12/cleo-file-transfer-vulnerability-under.html
๐13๐คฏ3๐2
  ๐ค Traditional pentesting is falling behind. Cyberattacks happen dailyโautomation ensures your defenses are always ready, not just once a year.
Automated pentesting delivers frequent, accurate, and cost-efficient assessments, ensuring real-time visibility into your vulnerabilities.
Discover how automation is changing the game: https://thehackernews.com/2024/12/the-future-of-network-security.html
Automated pentesting delivers frequent, accurate, and cost-efficient assessments, ensuring real-time visibility into your vulnerabilities.
Discover how automation is changing the game: https://thehackernews.com/2024/12/the-future-of-network-security.html
๐24๐4โก3
  ๐ฅ Critical Security Alert! Ivanti uncovers a CVSS 10.0-rated vulnerability allowing unauthenticated attackers to gain admin access in their Cloud Services Application.
This flaw isnโt aloneโIvanti has patched multiple critical vulnerabilities in its Connect Secure and CSA products.
๐ Don't waitโexplore the critical details and ensure your systems are secure: https://thehackernews.com/2024/12/ivanti-issues-critical-security-updates.html
This flaw isnโt aloneโIvanti has patched multiple critical vulnerabilities in its Connect Secure and CSA products.
๐ Don't waitโexplore the critical details and ensure your systems are secure: https://thehackernews.com/2024/12/ivanti-issues-critical-security-updates.html
๐16๐6๐คฏ5โก3๐2๐ฅ1
  U.S. has unsealed charges against a Chinese hacker for exploiting a zero-day #vulnerability in 81,000 Sophos firewalls, enabling the infiltration of critical systems, the theft of sensitive data, and targeting U.S. infrastructure. 
 
Learn more: https://thehackernews.com/2024/12/us-charges-chinese-hacker-for.html
Learn more: https://thehackernews.com/2024/12/us-charges-chinese-hacker-for.html
๐43๐26๐คฏ3
  ๐ป Microsoftโs final Patch Tuesday of 2024 fixed 72 vulnerabilities, including one actively exploited in the wild: CVE-2024-49138. 
 
Ensure your systems are updated now.
 
๐ Read more: https://thehackernews.com/2024/12/microsoft-fixes-72-flaws-including.html
Ensure your systems are updated now.
๐ Read more: https://thehackernews.com/2024/12/microsoft-fixes-72-flaws-including.html
๐26๐9๐ค5๐3๐ฑ2
  Discover how Zero Trust, immutable backups, and encryption can secure Microsoft365โstarting with Zero Trust, where every access request is verified. 
 
Learn key strategies to protect your environment.
 
Read the full article now: https://thehackernews.com/expert-insights/2024/12/5-strategies-to-combat-ransomware-and.html
Learn key strategies to protect your environment.
Read the full article now: https://thehackernews.com/expert-insights/2024/12/5-strategies-to-combat-ransomware-and.html
๐16
  ๐จ A new surveillance tool, EagleMsgSpy, has been exposed as a powerful spyware linked to Chinese police departments, secretly collecting vast data from mobile devices since 2017. 
 
๐ Read full details here: https://thehackernews.com/2024/12/chinese-eaglemsgspy-spyware-found.html
๐ Read full details here: https://thehackernews.com/2024/12/chinese-eaglemsgspy-spyware-found.html
โก16๐11๐คฏ9๐ค4๐ฅ1