FTC fined Avast $16.5 million for collecting and selling users' browsing data despite privacy promises.
Full story: https://thehackernews.com/2024/02/ftc-slams-avast-with-165-million-fine.html
Full story: https://thehackernews.com/2024/02/ftc-slams-avast-with-165-million-fine.html
π22π₯9β‘7π€―7π5π3π±3
Researchers uncovered details of a major vulnerability (CVE-2024-23204) in the Apple Shortcuts app that could have exposed sensitive user data without consent on older iOS, iPadOS, macOS, and watchOS devices.
Learn more: https://thehackernews.com/2024/02/researchers-detail-apples-recent-zero.html
Learn more: https://thehackernews.com/2024/02/researchers-detail-apples-recent-zero.html
π₯21π8β‘2π1
Hacktivism is reshaping the battlefield in digital age wars. Witness how cyber-activism is playing a pivotal role in geopolitical conflicts. Dive deeper into the transformation of hacktivism into a mainstream political tool.
Read: https://thehackernews.com/2024/02/a-new-age-of-hacktivism.html
Read: https://thehackernews.com/2024/02/a-new-age-of-hacktivism.html
π₯16β‘6π6π4π€3
Microsoft releases PyRIT, an automation tool designed to proactively identify risks and ethical concerns in Generative AI systems, including security and #privacy threats.
Learn more: https://thehackernews.com/2024/02/microsoft-releases-pyrit-red-teaming.html
Learn more: https://thehackernews.com/2024/02/microsoft-releases-pyrit-red-teaming.html
π₯19π8π7β‘1
Ever wondered how top security teams stay ahead?
It's all about automation! Learn from the SOC Automation Capability Matrix and transform your response to threats.
Explore now β‘οΈ https://thehackernews.com/2024/02/how-to-use-tiness-soc-automation.html
It's all about automation! Learn from the SOC Automation Capability Matrix and transform your response to threats.
Explore now β‘οΈ https://thehackernews.com/2024/02/how-to-use-tiness-soc-automation.html
π18β‘2π1
π¨ Heads Up - The "django-log-tracker" PyPI package, inactive for over 2 years, has been hijacked to distribute the Nova Sentinel malware.
Learn more: https://thehackernews.com/2024/02/dormant-pypi-package-compromised-to.html
Learn more: https://thehackernews.com/2024/02/dormant-pypi-package-compromised-to.html
π25β‘2
Game over? In a dramatic turn of events, LockBitSupp, a key figure in the notorious LockBit ransomware operation, is "reportedly" cooperating with law enforcement.
Find details here: https://thehackernews.com/2024/02/authorities-claim-lockbit-admin.html
Find details here: https://thehackernews.com/2024/02/authorities-claim-lockbit-admin.html
π27π€10π6π6β‘3π±3π₯2
Cybercriminals are using Google's Cloud Run service to launch large-scale email phishing attacks, distributing banking trojans like Astaroth, Mekotio, and Ousaban.
Read: https://thehackernews.com/2024/02/banking-trojans-target-latin-america.html
Read: https://thehackernews.com/2024/02/banking-trojans-target-latin-america.html
π9π6β‘2π2π€―1
π¨ LockBit ransomware operators are back online after a law enforcement takedown, blaming outdated software for the breach.
They are now calling for increased attacks on the government sector.
Find out more: https://thehackernews.com/2024/02/lockbit-ransomware-group-resurfaces.html
They are now calling for increased attacks on the government sector.
Find out more: https://thehackernews.com/2024/02/lockbit-ransomware-group-resurfaces.html
π33π₯14π€―8π±7β‘4π3π1
Fake npm packages traced back to North Korean hackers, aiming at developers with sophisticated credential-stealing scripts.
Learn more: https://thehackernews.com/2024/02/north-korean-hackers-targeting.html
Protect your projectsβverify your dependencies now.
Learn more: https://thehackernews.com/2024/02/north-korean-hackers-targeting.html
Protect your projectsβverify your dependencies now.
π€―13π₯9π7β‘2π2
π€ Think LLMs are foolproof? Think again! Hackers are exploiting them to steal sensitive data. Protect yourself β learn the latest LLM security risks and how to defend against them.
π Learn more: https://thehackernews.com/2024/02/three-tips-to-protect-your-secrets-from.html
π Learn more: https://thehackernews.com/2024/02/three-tips-to-protect-your-secrets-from.html
π₯13π7β‘5π1
Over 8,000 subdomains belonging to recognized brands and organizations are being exploited for malicious email distribution.
Learn more: https://thehackernews.com/2024/02/8000-subdomains-of-trusted-brands.html
SPF, DKIM, DMARC β they're not enough. "ResurrecAds" is bypassing email security measures with alarming ease.
Learn more: https://thehackernews.com/2024/02/8000-subdomains-of-trusted-brands.html
SPF, DKIM, DMARC β they're not enough. "ResurrecAds" is bypassing email security measures with alarming ease.
π17π€―13β‘2π2π1
π¨ Malicious cyber campaign targets Ukrainian entities in Finland with Remcos RAT via IDAT Loader, utilizing rare steganography technique.
Learn more: https://thehackernews.com/2024/02/new-idat-loader-attacks-using.html
Learn more: https://thehackernews.com/2024/02/new-idat-loader-attacks-using.html
π16π€―8π5β‘4π₯2
β οΈ Alert β Critical security flaw (CVE-2024-1071) found in Ultimate Member WordPress plugin used by 200k sites.
Read more: https://thehackernews.com/2024/02/wordpress-plugin-alert-critical-sqli.html
Update to version 2.8.3 to fix SQL injection vulnerability and prevent data breaches.
Read more: https://thehackernews.com/2024/02/wordpress-plugin-alert-critical-sqli.html
Update to version 2.8.3 to fix SQL injection vulnerability and prevent data breaches.
β‘21π₯8π±5π3π3π1
π€ Security researchers have uncovered a new vulnerability in Hugging Face's Safetensors conversion service that could lead to supply chain attacks, compromising user-submitted models.
Read details: https://thehackernews.com/2024/02/new-hugging-face-vulnerability-exposes.html
Read details: https://thehackernews.com/2024/02/new-hugging-face-vulnerability-exposes.html
π15π8β‘1π±1
π Alert: Five Eyes agencies unveil latest tactics of Russian state-sponsored hacker group APT29, revealing advanced techniques in cybersecurity warfare.
Learn more: https://thehackernews.com/2024/02/five-eyes-agencies-expose-apt29s.html
Learn more: https://thehackernews.com/2024/02/five-eyes-agencies-expose-apt29s.html
π17π8β‘1
π¨ ALERT - Open-source Xeno RAT available on GitHub with features like remote access, audio recording, & hidden VNC. Experts warn of rising RAT attacks.
Learn more: https://thehackernews.com/2024/02/open-source-xeno-rat-trojan-emerges-as.html
Learn more: https://thehackernews.com/2024/02/open-source-xeno-rat-trojan-emerges-as.html
β‘15π9π4π3
Patch your LiteSpeed Cache plugin for WordPress against CVE-2023-40000. This flaw could lead to unauthorized site takeover.
Click for details: https://thehackernews.com/2024/02/wordpress-litespeed-plugin.html
Click for details: https://thehackernews.com/2024/02/wordpress-litespeed-plugin.html
π10π4β‘1
Ever wondered how SOC teams can sift through millions of alerts without missing a beat?
Discover how Threat Intelligence Platforms are revolutionizing SOC investigations and turning chaos into clarity.
Explore how to refine threat hunting: https://thehackernews.com/2024/02/from-alert-to-action-how-to-speed-up.html
Discover how Threat Intelligence Platforms are revolutionizing SOC investigations and turning chaos into clarity.
Explore how to refine threat hunting: https://thehackernews.com/2024/02/from-alert-to-action-how-to-speed-up.html
π18π6π€3β‘2
π‘οΈ Is your Ubiquiti EdgeRouter safe? A joint advisory from cybersecurity and intelligence agencies reveals APT28's use of MooBot to exploit your devices.
Read the full advisory: https://thehackernews.com/2024/02/cybersecurity-agencies-warn-ubiquiti.html
Read the full advisory: https://thehackernews.com/2024/02/cybersecurity-agencies-warn-ubiquiti.html
π11β‘7π4
Mexican users are under siege by a sophisticated cyberattack campaign using tax-themed phishing emails to plant "TimbreStealer," a data-snatching #malware.
Learn more: https://thehackernews.com/2024/02/timbrestealer-malware-spreading-via-tax.html
Learn more: https://thehackernews.com/2024/02/timbrestealer-malware-spreading-via-tax.html
π12π5π€―3π₯2π2β‘1