Whoβs using AI tools in your organization? Find out in minutes with Nudge Security. Start a free trial and discover every SaaS account ever created by anyone in your org, including generative AI tools.
The best part? Youβll have a full inventory in minutes and you donβt even have to know what apps youβre looking for. No agents, browser plug-ins or network proxies required.
https://thn.news/mitigate-ai-risks
The best part? Youβll have a full inventory in minutes and you donβt even have to know what apps youβre looking for. No agents, browser plug-ins or network proxies required.
https://thn.news/mitigate-ai-risks
Nudgesecurity
Discover & Secure Generative AI Usage with Nudge Security
Balance the productivity benefits of generative AI with security oversight by programmatically discovering the tools your employees are using.
π19π₯6π1π1
π TA558 threat actor launches massive phishing campaign targeting Latin American sectors, deploying Venom RAT. Hotels, finance, government among primary targets in Spain, Mexico, U.S., Colombia, Brazil, and more.
Learn more: https://thehackernews.com/2024/04/massive-phishing-campaign-strikes-latin.html
Learn more: https://thehackernews.com/2024/04/massive-phishing-campaign-strikes-latin.html
π₯14π9π€―4π2
Google agrees to delete BILLION of browsing records to settle class action lawsuit, alleging tracking without consent in Chrome's Incognito Mode.
Find details here: https://thehackernews.com/2024/04/google-to-delete-billions-of-browsing.html
Find details here: https://thehackernews.com/2024/04/google-to-delete-billions-of-browsing.html
π€―52π17π₯12π9π4
China-linked hacker group Earth Freybug is now using a new malware named "UNAPIMON" to fly under the radar.
Learn more: https://thehackernews.com/2024/04/china-linked-hackers-deploy-new.html
Researchers shed light on their espionage and financially motivated activities.
Learn more: https://thehackernews.com/2024/04/china-linked-hackers-deploy-new.html
Researchers shed light on their espionage and financially motivated activities.
π19π8π₯6π2
π Malicious code discovered in widely used Linux tool XZ Utils could lead to remote code execution. The incident underscores the dangers of open-source software reliance.
Read now: https://thehackernews.com/2024/04/malicious-code-in-xz-utils-for-linux.html
If you use Linux, take action NOW.
Read now: https://thehackernews.com/2024/04/malicious-code-in-xz-utils-for-linux.html
If you use Linux, take action NOW.
π€―35π17π€9π₯7π5β‘1
What makes Cloud Security tough? Lack of visibility, inconsistent permissions, blurred ownership...
Hybrid attack path analysis is crucial for complete security. Continuous Threat Exposure Management (CTEM) helps block critical attack vectors.
Learn: https://thehackernews.com/2024/04/harnessing-power-of-ctem-for-cloud.html
Hybrid attack path analysis is crucial for complete security. Continuous Threat Exposure Management (CTEM) helps block critical attack vectors.
Learn: https://thehackernews.com/2024/04/harnessing-power-of-ctem-for-cloud.html
π18π6π3π€2
π¨ Heads up, WordPress admins!
A critical SQL injection flaw in the LayerSlider plugin (CVE-2024-2879) could lead to sensitive data leaks. If you haven't updated, make sure to install version 7.10.1 or latest.
Find details: https://thehackernews.com/2024/04/critical-security-flaw-found-in-popular.html
A critical SQL injection flaw in the LayerSlider plugin (CVE-2024-2879) could lead to sensitive data leaks. If you haven't updated, make sure to install version 7.10.1 or latest.
Find details: https://thehackernews.com/2024/04/critical-security-flaw-found-in-popular.html
π₯11π8π±3π1
β οΈ Banking trojan Mispadu expands to Italy, Poland, and Sweden, stealing thousands of credentials with sophisticated tactics like phishing emails and keystroke capture.
Read details: https://thehackernews.com/2024/04/mispadu-trojan-targets-europe-thousands.html
Read details: https://thehackernews.com/2024/04/mispadu-trojan-targets-europe-thousands.html
π₯11π6
Google Chrome is testing a new feature called "Device Bound Session Credentials" to fight against session cookie theft by #malware.
DBSC links auth sessions directly to users' devices to stop cookie theft hacks.
Learn more about it: https://thehackernews.com/2024/04/google-chrome-beta-tests-new-dbsc.html
DBSC links auth sessions directly to users' devices to stop cookie theft hacks.
Learn more about it: https://thehackernews.com/2024/04/google-chrome-beta-tests-new-dbsc.html
π38π9π€―5β‘1π₯1
Confused about vulnerability management (VM) vs. attack surface management (ASM)?
They're both important but different. But together, they form a robust defense against cyber threats.
Learn how: https://thehackernews.com/2024/04/attack-surface-management-vs.html
They're both important but different. But together, they form a robust defense against cyber threats.
Learn how: https://thehackernews.com/2024/04/attack-surface-management-vs.html
π16π6π5
β οΈ U.S. Cyber Safety Review Board slams Microsoft for security failures that enabled a major data breach by China-backed hackers.
Read details: https://thehackernews.com/2024/04/us-cyber-safety-board-slams-microsoft.html
Read details: https://thehackernews.com/2024/04/us-cyber-safety-board-slams-microsoft.html
π14π₯10π7π€6
π₯ Google's Pixel smartphones under attack!
Two new Android security flaws - CVE-2024-29745 & CVE-2024-29748 - uncovered, exploited in the wild by forensic companies.
Learn more: https://thehackernews.com/2024/04/google-warns-android-zero-day-flaws-in.html
Two new Android security flaws - CVE-2024-29745 & CVE-2024-29748 - uncovered, exploited in the wild by forensic companies.
Learn more: https://thehackernews.com/2024/04/google-warns-android-zero-day-flaws-in.html
π₯29π10π±8π5β‘4π€4π€―4
β οΈ Ivanti releases security patches for 4 new flaws in Connect Secure/Policy Secure Gateways.
Flaws could allow attackers to execute arbitrary code or launch DoS attacks.
Learn more: https://thehackernews.com/2024/04/ivanti-rushes-patches-for-4-new-flaw-in.html
Flaws could allow attackers to execute arbitrary code or launch DoS attacks.
Learn more: https://thehackernews.com/2024/04/ivanti-rushes-patches-for-4-new-flaw-in.html
π13π9π₯1π€―1
Your data protection strategy can only be as good as the solutions you choose to implement. This makes being prepared and informed a crucial part of the buying process.
Check out the free Zerto Data Protection Buyers Guide for more buying decision info: https://thn.news/6DQjE1Pa
Check out the free Zerto Data Protection Buyers Guide for more buying decision info: https://thn.news/6DQjE1Pa
Hpe
HPE Zerto Software
HPE Zerto Software guards against downtime with continuous data protection and automation, for secure disaster recovery and smooth workload migration.
π16β‘1π€―1
New HTTP/2 #ulnerability discovered.
"CONTINUATION Flood" attacks can lead to denial-of-service (DoS). This could cause crashes and serious website disruptions.
Find details here: https://thehackernews.com/2024/04/new-http2-vulnerability-exposes-web.html
"CONTINUATION Flood" attacks can lead to denial-of-service (DoS). This could cause crashes and serious website disruptions.
Find details here: https://thehackernews.com/2024/04/new-http2-vulnerability-exposes-web.html
π€―14π9π8π€6β‘1
π¨ Beware of new phishing campaigns targeting the oil and gas sector. Rhadamanthys malware makes a comeback, using a clever vehicle incident lure to trick victims into downloading malicious payloads.
Learn more: https://thehackernews.com/2024/04/new-phishing-campaign-targets-oil-gas.html
Learn more: https://thehackernews.com/2024/04/new-phishing-campaign-targets-oil-gas.html
π±10π5π3β‘2π1π€1
β οΈ Vietnamese hacking group, CoralRaider, targets multiple Asian countries with data-stealing malware, stealing credentials & financial data to sell on underground markets.
Read details: https://thehackernews.com/2024/04/vietnam-based-hackers-steal-financial.html
Read details: https://thehackernews.com/2024/04/vietnam-based-hackers-steal-financial.html
π€―12π4π₯4π€4π3β‘2π±1
β‘ Critical Supply Chain Compromise: Backdoor in XZ Utils allows RCE.
See how to detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library.
Read: https://thn.news/critical-rce-xz-utils
See how to detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library.
Read: https://thn.news/critical-rce-xz-utils
wiz.io
CVE-2024-3094: Critical RCE Vulnerability Found in XZ Utils | Wiz Blog
CVE-2024-3094 is a malicious code vulnerability in versions 5.6.0 and 5.6.1 of XZ Utils, enabling an SSH authentication bypass in certain Linux distributions
π15π€―9β‘4π±3π€2π1
π Multiple China-based hackers are on a spree exploiting zero-day flaws in Ivanti appliances.
Vulnerabilities CVE-2023-46805, CVE-2024-21887, CVE-2024-21893 are being abused.
Learn more: https://thehackernews.com/2024/04/researchers-identify-multiple-china.html
Even financially motivated groups are in on the action.
Vulnerabilities CVE-2023-46805, CVE-2024-21887, CVE-2024-21893 are being abused.
Learn more: https://thehackernews.com/2024/04/researchers-identify-multiple-china.html
Even financially motivated groups are in on the action.
π₯15π6π±5β‘3π€3π1π€―1
β οΈ Financial organizations in APAC & MENA are under attack!
A sophisticated threat dubbed JSOutProx combines JavaScript & .NET to infiltrate systems, targeting banks & big companies.
https://thehackernews.com/2024/04/new-wave-of-jsoutprox-malware-targeting.html
A sophisticated threat dubbed JSOutProx combines JavaScript & .NET to infiltrate systems, targeting banks & big companies.
https://thehackernews.com/2024/04/new-wave-of-jsoutprox-malware-targeting.html
π₯10π7π5π€―3β‘1π±1
β οΈ Watch out for FAKE Adobe Acrobat Reader installers. They carry a nasty malware called Byakugan that steals your data and even drops cryptominers.
https://thehackernews.com/2024/04/from-pdfs-to-payload-bogus-adobe.html
https://thehackernews.com/2024/04/from-pdfs-to-payload-bogus-adobe.html
π23π€―10β‘4π4π₯3π€3π2π±2