π¨ Deja Vu for Ivanti users!
Another authentication bypass security vulnerability (CVE-2024-22024) has been found in #Ivanti products, affecting Connect Secure, Policy Secure, and ZTA gateways.
Details: https://thehackernews.com/2024/02/warning-new-ivanti-auth-bypass-flaw.html
Don't wait, patch ASAP to secure your devices!
Another authentication bypass security vulnerability (CVE-2024-22024) has been found in #Ivanti products, affecting Connect Secure, Policy Secure, and ZTA gateways.
Details: https://thehackernews.com/2024/02/warning-new-ivanti-auth-bypass-flaw.html
Don't wait, patch ASAP to secure your devices!
π16β‘6
π Urgent: Patch it now - Hackers are exploiting it!
Fortinet has unveiled a critical security flaw in its SSL VPN, CVE-2024-21762, allowing hackers to execute arbitrary code.
Learn more: https://thehackernews.com/2024/02/fortinet-warns-of-critical-fortios-ssl.html
Fortinet has unveiled a critical security flaw in its SSL VPN, CVE-2024-21762, allowing hackers to execute arbitrary code.
Learn more: https://thehackernews.com/2024/02/fortinet-warns-of-critical-fortios-ssl.html
π10π₯10β‘7π3
π¨ New backdoor called Zardoor used in cyberattack on Saudi Islamic charity, stealing data for over 2 years. Hackers use everyday tools like WMI to move undetected.
Read our full report: https://thehackernews.com/2024/02/stealthy-zardoor-backdoor-targets-saudi.html
Read our full report: https://thehackernews.com/2024/02/stealthy-zardoor-backdoor-targets-saudi.html
π10π9β‘6
Concerned about the expanded attack surface in the cloud?
Wazuh, an open-source cybersecurity platform, provides real-time threat detection and incident response for your cloud environments.
Check it out: https://thehackernews.com/2024/02/wazuh-in-cloud-era-navigating.html
Wazuh, an open-source cybersecurity platform, provides real-time threat detection and incident response for your cloud environments.
Check it out: https://thehackernews.com/2024/02/wazuh-in-cloud-era-navigating.html
π26β‘4π₯2π1
New banking trojan "Coyote" targeting 61 Brazilian banks.
It uses Nim and Node.js for evasion and the Squirrel installer framework for distribution. Coyote steals data and can take screenshots.
Learn more: https://thehackernews.com/2024/02/new-coyote-trojan-targets-61-brazilian.html
It uses Nim and Node.js for evasion and the Squirrel installer framework for distribution. Coyote steals data and can take screenshots.
Learn more: https://thehackernews.com/2024/02/new-coyote-trojan-targets-61-brazilian.html
π₯10π9β‘3
Stop chasing false alarms! Myrror prioritizes vulnerabilities by impact, not noise. Focus on what truly matters & defend against supply chain attacks.
Learn how to protect your code from hidden threats: https://thehackernews.com/2024/02/hands-on-review-myrror-security-code.html
Learn how to protect your code from hidden threats: https://thehackernews.com/2024/02/hands-on-review-myrror-security-code.html
π15π₯1
β οΈ Android users, beware! A new variant of MoqHao malware silently auto-executes upon installation, snatching data, and hijacking Wi-Fiβall without you needing to lift a finger.
Learn more: https://thehackernews.com/2024/02/new-variant-of-moqhao-android-malware.html
Learn more: https://thehackernews.com/2024/02/new-variant-of-moqhao-android-malware.html
π±23π8π₯2
π΅οΈββοΈ Raspberry Robin malware has been spotted using new exploits and is now spreading via Discord for wider infection, while also being improved to make it stealthier than before.
Learn more: https://thehackernews.com/2024/02/raspberry-robin-malware-upgrades-with.html
Learn more: https://thehackernews.com/2024/02/raspberry-robin-malware-upgrades-with.html
π₯23π9π€3
U.S. Justice Department cracks down on cybercrime, seizing infrastructure used to sell the notorious "Warzone RAT" and arresting two individuals involved in its distribution and support.
Learn more: https://thehackernews.com/2024/02/us-doj-dismantles-warzone-rat.html
Learn more: https://thehackernews.com/2024/02/us-doj-dismantles-warzone-rat.html
π±21π11π₯4
π π» Microsoft is bringing Linux-like Sudo for Windows 11, a new feature that allows users to run commands with administrator privileges without having to open a new elevated console window.
https://thehackernews.com/2024/02/microsoft-introduces-linux-like-sudo.html
https://thehackernews.com/2024/02/microsoft-introduces-linux-like-sudo.html
π58π33π±16π€―11π₯6π€4
π The U.S. Department of State is offering up to π° $10 million for information on Hive ransomware operators, and an additional $5 million for those involved in Hive ransomware activities.
Read details here: https://thehackernews.com/2024/02/us-offers-10-million-bounty-for-info.html
Read details here: https://thehackernews.com/2024/02/us-offers-10-million-bounty-for-info.html
π₯20π10π7π±1
π CISA teams up with OpenSSF to introduce a framework called "Principles for Package Repository Security," aimed at fortifying open-source software ecosystems against cyber threats.
Learn more: https://thehackernews.com/2024/02/cisa-and-openssf-release-framework-for.html
Learn more: https://thehackernews.com/2024/02/cisa-and-openssf-release-framework-for.html
π18π₯3β‘1
Ever wondered why cyber attacks seem unstoppable? It's the identity blind spots! Check out how Silverfort's platform fills this crucial gap, ensuring rapid detection and containment of compromised accounts.
Learn more: https://thehackernews.com/2024/02/why-are-compromised-identities.html
Learn more: https://thehackernews.com/2024/02/why-are-compromised-identities.html
π€―12π6β‘3π₯1
A free Rhysida ransomware decryptor has been released!
Researchers have discovered a vulnerability in the Rhysida #malware, allowing them to develop a decryption tool.
Learn more: https://thehackernews.com/2024/02/rhysida-ransomware-cracked-free.html
Researchers have discovered a vulnerability in the Rhysida #malware, allowing them to develop a decryption tool.
Learn more: https://thehackernews.com/2024/02/rhysida-ransomware-cracked-free.html
π₯25π8π7π€2β‘1
π¨ CISA warns of an exploited vulnerability in Roundcube email software that could lead to information disclosure through malicious link references in plain text messages.
Learn more: https://thehackernews.com/2024/02/alert-cisa-warns-of-active-roundcube.html
Learn more: https://thehackernews.com/2024/02/alert-cisa-warns-of-active-roundcube.html
π₯18π±4π3
π Urgent: Hackers exploit Ivanti security flaw to deploy stealthy DSLog backdoor. Don't wait β factory reset appliances and apply the latest patches immediately.
Learn more: https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Learn more: https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
π€9π6π3π±2
Data Detection & Response (DDR) is not just a buzzword.
Data protection has evolved in the cloud era, shifting focus from permissions and physical access.
To secure the dynamic cloud landscape, Sentra has released a tailored DDR guide.
Check it out: https://thehackernews.co/data-detection-and-response
Data protection has evolved in the cloud era, shifting focus from permissions and physical access.
To secure the dynamic cloud landscape, Sentra has released a tailored DDR guide.
Check it out: https://thehackernews.co/data-detection-and-response
www.sentra.io
What Is Data Detection and Response (DDR)
Learn about Data Detection and Response (DDR), a cloud data security solution for identifying real-time threats to sensitive assets.
β‘10π7π5π±3π€2π1
PikaBot malware undergoes a dramatic transformation, simplifying its code and communication methods.
Click to learn more: https://thehackernews.com/2024/02/pikabot-resurfaces-with-streamlined.html
Click to learn more: https://thehackernews.com/2024/02/pikabot-resurfaces-with-streamlined.html
π10π8β‘4
π¨Glupteba botnet upgrades with UEFI firmware stealth tech, making it undetectable by regular antivirus. This nasty malware steals info, mines #cryptocurrency , and attacks your router.
Learn more: https://thehackernews.com/2024/02/glupteba-botnet-evades-detection-with.html
Learn more: https://thehackernews.com/2024/02/glupteba-botnet-evades-detection-with.html
π₯19π12β‘5
β οΈ Zero-day alert!
π» Microsoft released security patches for 73 flaws in its software for February 2024. This includes 5 critical and 2 actively exploited zero-day vulnerabilities.
Details here: https://thehackernews.com/2024/02/microsoft-rolls-out-patches-for-73.html
Don't wait, π‘οΈ update your systems now.
π» Microsoft released security patches for 73 flaws in its software for February 2024. This includes 5 critical and 2 actively exploited zero-day vulnerabilities.
Details here: https://thehackernews.com/2024/02/microsoft-rolls-out-patches-for-73.html
Don't wait, π‘οΈ update your systems now.
π28π₯6π±2π1
π¨ ALERT: Beware, traders!
Hackers are exploiting a ZERO-DAY flaw in Microsoft Defender SmartScreen to deliver DarkMe malware. This sophisticated attack can steal your data and give hackers access to your financial accounts.
Learn more: https://thehackernews.com/2024/02/darkme-malware-targets-traders-using.html
Hackers are exploiting a ZERO-DAY flaw in Microsoft Defender SmartScreen to deliver DarkMe malware. This sophisticated attack can steal your data and give hackers access to your financial accounts.
Learn more: https://thehackernews.com/2024/02/darkme-malware-targets-traders-using.html
π28β‘6π5