๐ โWords matter,โ says INTERPOL.
Shifting from "pig butchering" to "romance baiting" shifts the narrative to support victims, not shame them.
Victims are not just losing moneyโthey're trapped in emotional manipulation by transnational organized crime groups.
Read to know how these scams operate and how to defend against them ๐ https://thehackernews.com/2024/12/interpol-pushes-for-romance-baiting-to.html
Shifting from "pig butchering" to "romance baiting" shifts the narrative to support victims, not shame them.
Victims are not just losing moneyโthey're trapped in emotional manipulation by transnational organized crime groups.
Read to know how these scams operate and how to defend against them ๐ https://thehackernews.com/2024/12/interpol-pushes-for-romance-baiting-to.html
๐12๐4โก3๐2๐ฅ1๐ค1
APT29, a Russia-linked threat group, is repurposing legitimate red team tools for cyberespionage:
ยป Targeting: Governments, researchers, and think tanks
ยป Scale: 200 victims hit in just one day
ยป Method: Malicious RDP files that bypass malware defenses
Why should you care? These attacks silently steal data like credentials and sensitive documentsโwithout leaving a trace.
๐ Stay informed. Details here: https://thehackernews.com/2024/12/apt29-hackers-target-high-value-victims.html
ยป Targeting: Governments, researchers, and think tanks
ยป Scale: 200 victims hit in just one day
ยป Method: Malicious RDP files that bypass malware defenses
Why should you care? These attacks silently steal data like credentials and sensitive documentsโwithout leaving a trace.
๐ Stay informed. Details here: https://thehackernews.com/2024/12/apt29-hackers-target-high-value-victims.html
๐ฅ14๐5๐3โก1
๐ 2024โs Cybersecurity Benchmark is Here! Cynet just achieved 100% Detection Visibility and 100% Protection in the 2024 MITRE ATT&CK Evaluation.
Hereโs why this matters:
๐ก๏ธ 100% Detection across every test.
๐ซ No false positives, no delays.
๐ Protection on every attack step executed.
Evaluate how your current vendor compares. Read more about Cynetโs performance: https://thehackernews.com/2024/12/only-cynet-delivers-100-protection-and.html
Hereโs why this matters:
๐ก๏ธ 100% Detection across every test.
๐ซ No false positives, no delays.
๐ Protection on every attack step executed.
Evaluate how your current vendor compares. Read more about Cynetโs performance: https://thehackernews.com/2024/12/only-cynet-delivers-100-protection-and.html
๐14๐10โก5๐ฅ1
๐จ A critical flaw (CVE-2024-12356, CVSS score: 9.8) has been discovered in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) products.
An unauthenticated attacker could exploit this to inject commands and execute arbitrary OS actions, posing a serious security risk.
Learn more: https://thehackernews.com/2024/12/beyondtrust-issues-urgent-patch-for.html
An unauthenticated attacker could exploit this to inject commands and execute arbitrary OS actions, posing a serious security risk.
Learn more: https://thehackernews.com/2024/12/beyondtrust-issues-urgent-patch-for.html
๐คฏ8โก4๐1๐ฅ1๐ฑ1
Are tech debt challenges holding you back?
๐ Dive into ActiveState's latest whitepaper, featuring best practices to turn tech debt into a strategic advantage.
๐ Learn how effective open source management can reduce opportunity costs and security risks. Empower your team with actionable insights.
Download now: https://thn.news/tech-debt-best-practices
๐ Dive into ActiveState's latest whitepaper, featuring best practices to turn tech debt into a strategic advantage.
๐ Learn how effective open source management can reduce opportunity costs and security risks. Empower your team with actionable insights.
Download now: https://thn.news/tech-debt-best-practices
โก4๐ฅ3๐คฏ2๐1
๐ Would you click on a fake DocuSign email? Thousands already did.
Phishers are baiting employees with urgent DocuSign alerts, exploiting trusted services like HubSpot Free Form Builder to redirect users to fake Office 365 login pages for credential theft.
The numbers tell the story:
๐ป 20,000+ users in Europe impacted
๐ ๏ธ Bulletproof hosting powers attackersโ infrastructure
๐ Increasing abuse of trusted tools like Google Calendar
๐ Learn more: https://thehackernews.com/2024/12/hubphish-exploits-hubspot-tools-to.html
Phishers are baiting employees with urgent DocuSign alerts, exploiting trusted services like HubSpot Free Form Builder to redirect users to fake Office 365 login pages for credential theft.
The numbers tell the story:
๐ป 20,000+ users in Europe impacted
๐ ๏ธ Bulletproof hosting powers attackersโ infrastructure
๐ Increasing abuse of trusted tools like Google Calendar
๐ Learn more: https://thehackernews.com/2024/12/hubphish-exploits-hubspot-tools-to.html
๐24๐ฑ3๐ฅ2โก1
โ ๏ธ Ukraineโs CERT-UA uncovers a malware attack targeting military personnel.
Disguised as the Army+ app, this sophisticated attack:
ยป Exploits Cloudflare Workers and Pages to host fake login pages.
ยป Tricks users into giving up credentials.
ยป Installs OpenSSH and steals cryptographic keys via the TOR network.
๐ก Even legitimate services are becoming a haven for cybercriminals, raising red flags for CISOs and CTOs.
๐ Read the full analysis here: https://thehackernews.com/2024/12/uac-0125-abuses-cloudflare-workers-to.html
Disguised as the Army+ app, this sophisticated attack:
ยป Exploits Cloudflare Workers and Pages to host fake login pages.
ยป Tricks users into giving up credentials.
ยป Installs OpenSSH and steals cryptographic keys via the TOR network.
๐ก Even legitimate services are becoming a haven for cybercriminals, raising red flags for CISOs and CTOs.
๐ Read the full analysis here: https://thehackernews.com/2024/12/uac-0125-abuses-cloudflare-workers-to.html
๐15๐ฅ8๐5โก1๐คฏ1
Netflix has been fined โฌ4.75M for violating GDPR by failing to explain how it used customer data like email addresses and payment details between 2018โ2020.
Read more: https://thehackernews.com/2024/12/dutch-dpa-fines-netflix-475-million-for.html
Read more: https://thehackernews.com/2024/12/dutch-dpa-fines-netflix-475-million-for.html
โก19๐7๐ฅ7๐6๐3๐ค1
๐ฅ Critical Alert: CISAโs new directive, BOD 25-01, sets a new benchmark in cloud security for federal agencies.
Why? Misconfigurations and weak controls are opening doors to attackers.
Key Deadlines:
ยป By Feb 2025: Identify all cloud tenants
ยป By Apr 2025: Deploy SCuBA assessment tools
ยป By Jun 2025: Implement mandatory policies
๐ Learn how to protect your communications effectively: https://thehackernews.com/2024/12/cisa-mandates-cloud-security-for.html
๐ก๏ธ Regularly update security configurations to reduce your attack surface.
Why? Misconfigurations and weak controls are opening doors to attackers.
Key Deadlines:
ยป By Feb 2025: Identify all cloud tenants
ยป By Apr 2025: Deploy SCuBA assessment tools
ยป By Jun 2025: Implement mandatory policies
๐ Learn how to protect your communications effectively: https://thehackernews.com/2024/12/cisa-mandates-cloud-security-for.html
๐ก๏ธ Regularly update security configurations to reduce your attack surface.
๐11โก4๐2
๐ Fortinet's Wireless LAN Manager (FortiWLM) is vulnerable to a path traversal flaw (CVE-2023-34990) with a 9.6/10 CVSS score.
Why itโs urgent: It allows attackers to...
1๏ธโฃ Access admin accounts using static session IDs.
2๏ธโฃ Execute unauthorized commands by chaining vulnerabilities.
3๏ธโฃ Gain root access to your network in minutes.
๐ ๏ธ Patch now:
Affected versions: 8.5.0 to 8.6.5.
Fixed in 8.6.6โupdate immediately.
Read: https://thehackernews.com/2024/12/fortinet-warns-of-critical-fortiwlm.html
Why itโs urgent: It allows attackers to...
1๏ธโฃ Access admin accounts using static session IDs.
2๏ธโฃ Execute unauthorized commands by chaining vulnerabilities.
3๏ธโฃ Gain root access to your network in minutes.
๐ ๏ธ Patch now:
Affected versions: 8.5.0 to 8.6.5.
Fixed in 8.6.6โupdate immediately.
Read: https://thehackernews.com/2024/12/fortinet-warns-of-critical-fortiwlm.html
๐ฅ15๐6โก2๐ค2
๐จ What if your device unknowingly became a tool for cybercrime? Itโs happening now.
Mirai malware strikes Juniper SSR devices, leveraging default passwords to turn them into DDoS attack machines. Over 90% of breached systems had unaltered factory settings.
๐ Donโt leave the door open. Secure your systems today.
Read the full report: https://thehackernews.com/2024/12/juniper-warns-of-mirai-botnet-targeting.html
Mirai malware strikes Juniper SSR devices, leveraging default passwords to turn them into DDoS attack machines. Over 90% of breached systems had unaltered factory settings.
๐ Donโt leave the door open. Secure your systems today.
Read the full report: https://thehackernews.com/2024/12/juniper-warns-of-mirai-botnet-targeting.html
๐ฅ10๐8๐4โก3๐2๐ค2
Threat actors are tricking developers with fake npm packages like typescript-eslint lookalikes, amassing thousands of downloads.
Compromised tools = compromised enterprises. One wrong download could breach your entire development cycle.
๐ Your move:
โ Review your dependencies.
โ Learn how these attacks work.
โ Build a resilient security strategy.
๐ Read here: https://thehackernews.com/2024/12/thousands-download-malicious-npm.html
Compromised tools = compromised enterprises. One wrong download could breach your entire development cycle.
๐ Your move:
โ Review your dependencies.
โ Learn how these attacks work.
โ Build a resilient security strategy.
๐ Read here: https://thehackernews.com/2024/12/thousands-download-malicious-npm.html
๐17๐คฏ6๐4โก2
๐จ CISA warns of an actively exploited critical flaw (CVE-2024-12356, CVSS: 9.8) in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) products.
Attackers can exploit this flaw to run arbitrary commandsโno authentication required.
Read: https://thehackernews.com/2024/12/cisa-adds-critical-flaw-in-beyondtrust.html
Attackers can exploit this flaw to run arbitrary commandsโno authentication required.
Read: https://thehackernews.com/2024/12/cisa-adds-critical-flaw-in-beyondtrust.html
๐12๐9โก5๐ค1
๐ Attackers are exploiting Fortinet's CVE-2023-48788 (CVSS 9.3) to install remote desktop tools like AnyDesk and ScreenConnect.
Theyโve already targeted companies across 12 countries, leveraging:
ยป SQL injection for unauthorized access
ยป Password recovery tools like Mimikatz
ยป PowerShell scripts for persistence
Donโt just patch vulnerabilitiesโassume attackers are already inside.
Find details here: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html
Theyโve already targeted companies across 12 countries, leveraging:
ยป SQL injection for unauthorized access
ยป Password recovery tools like Mimikatz
ยป PowerShell scripts for persistence
Donโt just patch vulnerabilitiesโassume attackers are already inside.
Find details here: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html
โก10๐8๐ฅ6๐3
๐ Alert: Two critical vulnerabilities in Sophos Firewalls could grant attackers remote code execution and privileged access.
๐ง Action Plan:
โ๏ธ Update to v21 MR1 or newer.
โ๏ธ Restrict SSH access immediately.
โ๏ธ Ensure user portals are not WAN-exposed.
๐ Full advisory here: https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html
๐ง Action Plan:
โ๏ธ Update to v21 MR1 or newer.
โ๏ธ Restrict SSH access immediately.
โ๏ธ Ensure user portals are not WAN-exposed.
๐ Full advisory here: https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html
๐17โก7๐คฏ5
The notorious Lazarus Group is targeting nuclear engineers using trojanized VNC tools disguised as job assessments for aerospace roles.
Theyโve introduced a new modular malwareโCookiePlusโcapable of evading top-tier detection systems.
๐ Explore the full story here: https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html
Theyโve introduced a new modular malwareโCookiePlusโcapable of evading top-tier detection systems.
๐ Explore the full story here: https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html
๐18โก10๐9
๐ฅ A dual Russian-Israeli national charged as the mastermind behind LockBit ransomwareโa cyber weapon that caused chaos across 120+ countries and left $500M in illicit profits.
ยป Targeted hospitals, schools, and critical infrastructure.
ยป Gained access to systems using custom malware to disable antivirus.
ยป LockBit is now planning a comeback with version 4.0!
Explore the full story of LockBitโs rise and fall: https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
ยป Targeted hospitals, schools, and critical infrastructure.
ยป Gained access to systems using custom malware to disable antivirus.
ยป LockBit is now planning a comeback with version 4.0!
Explore the full story of LockBitโs rise and fall: https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
๐36๐12๐ค8โก7
๐ Italy has fined OpenAI โฌ15 Million for violating GDPR.
Key issues:
ยป Processing user data without legal basis
ยป Failing to notify users about a 2023 security breach
ยป No age verification, exposing kids under 13 to risky content
๐ Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
Key issues:
ยป Processing user data without legal basis
ยป Failing to notify users about a 2023 security breach
ยป No age verification, exposing kids under 13 to risky content
๐ Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
๐44๐20๐ฅ7๐คฏ7๐ค6โก3๐3
๐ A U.S. judge held NSO Group liable for breaching WhatsAppโs terms of service and misusing its servers to silently deploy Pegasus spyware, targeting 1,400 users within a single month.
Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
โก30๐9๐8๐ฅ5๐3๐คฏ2๐ฑ2๐ค1
๐จ Rockstar2FA, a notorious phishing-as-a-service (PhaaS) toolkit, suffered a major collapse on November 11. In its place, FlowerStorm has emerged as the new threat. These tools exploit legitimate services like Cloudflare Turnstile to bypass detection effortlessly.
๐ Key Targets:
ยป Sectors: Engineering, real estate, consulting
ยป Countries: U.S., Canada, UK, Germany, India
If you operate in these industries, youโre already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.
๐ Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
๐ Key Targets:
ยป Sectors: Engineering, real estate, consulting
ยป Countries: U.S., Canada, UK, Germany, India
If you operate in these industries, youโre already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.
๐ Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
โก14๐ค9๐6