Italy's data watchdog accuses ChatGPT of violating EU privacy laws by collecting sensitive data and exposing children to inappropriate content.
Read the details here, including Apple's warning about the proposed U.K. law → https://thehackernews.com/2024/01/italian-data-protection-watchdog.html
Read the details here, including Apple's warning about the proposed U.K. law → https://thehackernews.com/2024/01/italian-data-protection-watchdog.html
👍14🔥6🤔5👏4😁4
🔒 Strengthening Your Cybersecurity Posture.
Did you know that less than half of cybersecurity pros have complete visibility into vulnerabilities? Regular assessments are key.
Learn more: https://thehackernews.com/2024/01/top-security-posture-vulnerabilities.html
Did you know that less than half of cybersecurity pros have complete visibility into vulnerabilities? Regular assessments are key.
Learn more: https://thehackernews.com/2024/01/top-security-posture-vulnerabilities.html
👍14
🕵️♂️ Chinese hackers, Mustang Panda, targeted Myanmar's Ministry of Defence and Foreign Affairs using custom malware like PUBLOAD and TONESHELL. They delivered it through disguised Microsoft updates and booby-trapped files.
Read details: https://thehackernews.com/2024/01/china-linked-hackers-target-myanmars.html
Read details: https://thehackernews.com/2024/01/china-linked-hackers-target-myanmars.html
🤔10👍6
🚀 ANYRUN now supports Linux!
🐧 Linux faces frequent cyber threats targeting passwords, browser data, wallets, and logins. But with ANYRUN update you can:
✔️ Collect #IOCs using Ubuntu VM
✔️ Analyze Linux-based malware
Try ANYRUN free today! https://thehackernews.co/malware-sandbox
🐧 Linux faces frequent cyber threats targeting passwords, browser data, wallets, and logins. But with ANYRUN update you can:
✔️ Collect #IOCs using Ubuntu VM
✔️ Analyze Linux-based malware
Try ANYRUN free today! https://thehackernews.co/malware-sandbox
any.run
ANY.RUN - Get Trial
Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools.
👍22🔥14😱3
Hackers could write ANY file on your GitLab server while creating a workspace. This critical flaw (CVE-2024-0402) affects all versions before 16.5.8!
Patch NOW. Details here → https://thehackernews.com/2024/01/urgent-upgrade-gitlab-critical.html
Patch NOW. Details here → https://thehackernews.com/2024/01/urgent-upgrade-gitlab-critical.html
🤯9⚡6👍5😁5👏3
Big Bust in Brazil: Key Grandoreiro #malware operators Arrested!
Brazilian law enforcement has taken down a major cybercrime ring behind the notorious Grandoreiro banking trojan.
Find details here → https://thehackernews.com/2024/01/brazilian-feds-dismantle-grandoreiro.html
Brazilian law enforcement has taken down a major cybercrime ring behind the notorious Grandoreiro banking trojan.
Find details here → https://thehackernews.com/2024/01/brazilian-feds-dismantle-grandoreiro.html
👏19🤔7😁4👍3⚡1😱1
🚨 A new glibc flaw (CVE-2023-6246) gives attackers root access on Linux.
This high-severity vulnerability impacts major distros like Debian, Ubuntu, and Fedora. Don't wait, update your systems!
Find details here → https://thehackernews.com/2024/01/new-glibc-flaw-grants-attackers-root.html
This high-severity vulnerability impacts major distros like Debian, Ubuntu, and Fedora. Don't wait, update your systems!
Find details here → https://thehackernews.com/2024/01/new-glibc-flaw-grants-attackers-root.html
🔥15⚡6👍3
⚠️ Chinese nation-state hacker group UTA0178 weaponized Ivanti VPN vulnerabilities to deploy the Rust-based KrustyLoader, cryptocurrency miners, and the Golang-based Silver post-exploitation framework.
Read details here → https://thehackernews.com/2024/01/chinese-hackers-exploiting-critical-vpn.html
Read details here → https://thehackernews.com/2024/01/chinese-hackers-exploiting-critical-vpn.html
👍19😱4
☠️ Plug it in, get hacked!
Threat group UNC4990 weaponizes USBs to target Italian businesses, healthcare, transportation, and more. They steal crypto, hijacks wallets & even takes screenshots.
Learn how this threat actor operates → https://thehackernews.com/2024/01/italian-businesses-hit-by-weaponized.html
Threat group UNC4990 weaponizes USBs to target Italian businesses, healthcare, transportation, and more. They steal crypto, hijacks wallets & even takes screenshots.
Learn how this threat actor operates → https://thehackernews.com/2024/01/italian-businesses-hit-by-weaponized.html
🤯13👍8👏4
CISOs, heads up! SEC is tightening SaaS security regulations.
New regulations hold companies responsible for data breaches in SaaS apps and their connected 3rd-party tools.
Learn more: https://thehackernews.com/2024/01/the-sec-wont-let-cisos-be-understanding.html
Also, get a new report to assess whether you're vulnerable.
New regulations hold companies responsible for data breaches in SaaS apps and their connected 3rd-party tools.
Learn more: https://thehackernews.com/2024/01/the-sec-wont-let-cisos-be-understanding.html
Also, get a new report to assess whether you're vulnerable.
👍15🔥7🤔2
Forget the dark web!
Free samples, tutorials, kits... everything needed for a complete phishing attack ... Hackers are building phishing empires on Telegram, with tools and data as cheap as takeout.
Learn more: https://thehackernews.com/2024/01/telegram-marketplaces-fuel-phishing.html
Free samples, tutorials, kits... everything needed for a complete phishing attack ... Hackers are building phishing empires on Telegram, with tools and data as cheap as takeout.
Learn more: https://thehackernews.com/2024/01/telegram-marketplaces-fuel-phishing.html
😁31🔥15👍4🤔3🤯1
⚡ ALERT: Two high-severity flaws found in Ivanti's Connect Secure, Policy Secure and Neurons for ZTA.
CVE-2024-21893 is actively exploited, granting access to restricted resources. CVE-2024-21888 enables escalation to admin.
Details → https://thehackernews.com/2024/01/alert-ivanti-discloses-2-new-zero-day.html
CVE-2024-21893 is actively exploited, granting access to restricted resources. CVE-2024-21888 enables escalation to admin.
Details → https://thehackernews.com/2024/01/alert-ivanti-discloses-2-new-zero-day.html
⚡12👍8😱4
⚠️ Critical Apple kernel bug in iOS, macOS, and more exploited in the wild. CISA urges FCEB agencies to patch by February 21st.
Get the details: https://thehackernews.com/2024/02/cisa-warns-of-active-exploitation-of.html
Don't wait for a breach, take action now.
Get the details: https://thehackernews.com/2024/02/cisa-warns-of-active-exploitation-of.html
Don't wait for a breach, take action now.
👍16😁3
⚠️ Warning - Chinese espionage group UNC5221 attacking Ivanti Connect Secure VPN & Policy Secure devices, and using custom web shells like BUSHWALK, CHAINLINE, FRAMESTING, and LIGHTWIRE variant.
Details here → https://thehackernews.com/2024/02/warning-new-malware-emerges-in-attacks.html
Patch ASAP!
Details here → https://thehackernews.com/2024/02/warning-new-malware-emerges-in-attacks.html
Patch ASAP!
👍19
Sysadmins, beware!
New HeadCrab 2.0 malware is using fileless techniques to turn Redis servers into a botnet for illegal cryptocurrency mining.
Details here → https://thehackernews.com/2024/02/headcrab-20-goes-fileless-targeting.html
New HeadCrab 2.0 malware is using fileless techniques to turn Redis servers into a botnet for illegal cryptocurrency mining.
Details here → https://thehackernews.com/2024/02/headcrab-20-goes-fileless-targeting.html
👍13⚡5
🛡️ U.S. government took down a China-linked 'KV-botnet' malware network that hijacked hundreds of SOHO routers to target critical infrastructure such as power grids and hospitals.
More details here → https://thehackernews.com/2024/02/us-feds-shut-down-china-linked-kv.html
More details here → https://thehackernews.com/2024/02/us-feds-shut-down-china-linked-kv.html
👍15⚡6😁4🤔2
Alert, Docker users! A cryptojacking campaign called "Commando Cat" is exploiting exposed APIs. Secure your instances now.
Learn more → https://thehackernews.com/2024/02/exposed-docker-apis-under-attack-in.html
Learn more → https://thehackernews.com/2024/02/exposed-docker-apis-under-attack-in.html
👍14🤔4😱4⚡2🔥1
🔐 Is your vulnerability management program truly effective?
Learn how tracking metrics like cyber hygiene, scan coverage, and risk score can boost 💪 your organization's security.
Get the insights you need: https://thehackernews.com/2024/02/why-right-metrics-matter-when-it-comes.html
Learn how tracking metrics like cyber hygiene, scan coverage, and risk score can boost 💪 your organization's security.
Get the insights you need: https://thehackernews.com/2024/02/why-right-metrics-matter-when-it-comes.html
👍18
🚨 FritzFrog botnet returns, using Log4Shell, memory-resident payloads, and PwnKit to exploit unpatched INTERNAL systems. Employing new tactics to stay hidden and evade detection.
Learn more about FritzFrog → https://thehackernews.com/2024/02/fritzfrog-returns-with-log4shell-and.html
Learn more about FritzFrog → https://thehackernews.com/2024/02/fritzfrog-returns-with-log4shell-and.html
🔥9👍7👏5⚡3🤯1
Cloudflare, a web infrastructure company, suffered nation-state attack. Hackers accessed documentation, source code, and attempted data center breach.
Read full story for details: https://thehackernews.com/2024/02/cloudflare-breach-nation-state-hackers.html
Read full story for details: https://thehackernews.com/2024/02/cloudflare-breach-nation-state-hackers.html
🤯49🤔13🔥11👍10⚡6😁5👏4
🔒 INTERPOL disrupted a massive cybercrime network with 1,900 IP addresses. 70 suspects identified, 31 arrested across Europe, South Sudan, and Zimbabwe.
Details here → https://thehackernews.com/2024/02/interpol-arrests-31-in-global-operation.html
Details here → https://thehackernews.com/2024/02/interpol-arrests-31-in-global-operation.html
🔥17👏11👍8⚡5