β οΈ Ivanti releases security patches for 4 new flaws in Connect Secure/Policy Secure Gateways.
Flaws could allow attackers to execute arbitrary code or launch DoS attacks.
Learn more: https://thehackernews.com/2024/04/ivanti-rushes-patches-for-4-new-flaw-in.html
Flaws could allow attackers to execute arbitrary code or launch DoS attacks.
Learn more: https://thehackernews.com/2024/04/ivanti-rushes-patches-for-4-new-flaw-in.html
π13π9π₯1π€―1
Your data protection strategy can only be as good as the solutions you choose to implement. This makes being prepared and informed a crucial part of the buying process.
Check out the free Zerto Data Protection Buyers Guide for more buying decision info: https://thn.news/6DQjE1Pa
Check out the free Zerto Data Protection Buyers Guide for more buying decision info: https://thn.news/6DQjE1Pa
Hpe
HPE Zerto Software
HPE Zerto Software guards against downtime with continuous data protection and automation, for secure disaster recovery and smooth workload migration.
π16β‘1π€―1
New HTTP/2 #ulnerability discovered.
"CONTINUATION Flood" attacks can lead to denial-of-service (DoS). This could cause crashes and serious website disruptions.
Find details here: https://thehackernews.com/2024/04/new-http2-vulnerability-exposes-web.html
"CONTINUATION Flood" attacks can lead to denial-of-service (DoS). This could cause crashes and serious website disruptions.
Find details here: https://thehackernews.com/2024/04/new-http2-vulnerability-exposes-web.html
π€―14π9π8π€6β‘1
π¨ Beware of new phishing campaigns targeting the oil and gas sector. Rhadamanthys malware makes a comeback, using a clever vehicle incident lure to trick victims into downloading malicious payloads.
Learn more: https://thehackernews.com/2024/04/new-phishing-campaign-targets-oil-gas.html
Learn more: https://thehackernews.com/2024/04/new-phishing-campaign-targets-oil-gas.html
π±10π5π3β‘2π1π€1
β οΈ Vietnamese hacking group, CoralRaider, targets multiple Asian countries with data-stealing malware, stealing credentials & financial data to sell on underground markets.
Read details: https://thehackernews.com/2024/04/vietnam-based-hackers-steal-financial.html
Read details: https://thehackernews.com/2024/04/vietnam-based-hackers-steal-financial.html
π€―12π4π₯4π€4π3β‘2π±1
β‘ Critical Supply Chain Compromise: Backdoor in XZ Utils allows RCE.
See how to detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library.
Read: https://thn.news/critical-rce-xz-utils
See how to detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library.
Read: https://thn.news/critical-rce-xz-utils
wiz.io
CVE-2024-3094: Critical RCE Vulnerability Found in XZ Utils | Wiz Blog
CVE-2024-3094 is a malicious code vulnerability in versions 5.6.0 and 5.6.1 of XZ Utils, enabling an SSH authentication bypass in certain Linux distributions
π15π€―9β‘4π±3π€2π1
π Multiple China-based hackers are on a spree exploiting zero-day flaws in Ivanti appliances.
Vulnerabilities CVE-2023-46805, CVE-2024-21887, CVE-2024-21893 are being abused.
Learn more: https://thehackernews.com/2024/04/researchers-identify-multiple-china.html
Even financially motivated groups are in on the action.
Vulnerabilities CVE-2023-46805, CVE-2024-21887, CVE-2024-21893 are being abused.
Learn more: https://thehackernews.com/2024/04/researchers-identify-multiple-china.html
Even financially motivated groups are in on the action.
π₯15π6π±5β‘3π€3π1π€―1
β οΈ Financial organizations in APAC & MENA are under attack!
A sophisticated threat dubbed JSOutProx combines JavaScript & .NET to infiltrate systems, targeting banks & big companies.
https://thehackernews.com/2024/04/new-wave-of-jsoutprox-malware-targeting.html
A sophisticated threat dubbed JSOutProx combines JavaScript & .NET to infiltrate systems, targeting banks & big companies.
https://thehackernews.com/2024/04/new-wave-of-jsoutprox-malware-targeting.html
π₯10π7π5π€―3β‘1π±1
β οΈ Watch out for FAKE Adobe Acrobat Reader installers. They carry a nasty malware called Byakugan that steals your data and even drops cryptominers.
https://thehackernews.com/2024/04/from-pdfs-to-payload-bogus-adobe.html
https://thehackernews.com/2024/04/from-pdfs-to-payload-bogus-adobe.html
π23π€―10β‘4π4π₯3π€3π2π±2
π New research reveals critical security risks for AI-as-a-service providers like Hugging Face. Attackers could gain access to hijack models, escalate privileges, and infiltrate CI/CD pipelines.
Details: https://thehackernews.com/2024/04/ai-as-service-providers-vulnerable-to.html
Details: https://thehackernews.com/2024/04/ai-as-service-providers-vulnerable-to.html
π10π4π₯2π€―1
Security β Compliance!
Compliance requirements in cybersecurity are evolving rapidly, demanding stronger organizational skills from CISOs. Building partnerships with legal teams, privacy officers, and audit committees is crucial for success.
Learn: https://thehackernews.com/2024/04/ciso-perspectives-on-complying-with.html
Compliance requirements in cybersecurity are evolving rapidly, demanding stronger organizational skills from CISOs. Building partnerships with legal teams, privacy officers, and audit committees is crucial for success.
Learn: https://thehackernews.com/2024/04/ciso-perspectives-on-complying-with.html
π30π₯9β‘2
β οΈ ALERT: Exploit alert for Magento users!
A critical flaw, CVE-2024-20720, allows threat actors to sneak a persistent backdoor into e-commerce sites and deploy skimmers to steal financial data.
Learn more: https://thehackernews.com/2024/04/hackers-exploit-magento-bug-to-steal.html
A critical flaw, CVE-2024-20720, allows threat actors to sneak a persistent backdoor into e-commerce sites and deploy skimmers to steal financial data.
Learn more: https://thehackernews.com/2024/04/hackers-exploit-magento-bug-to-steal.html
π27π€―10β‘1
π Google sues app developers for massive cryptocurrency scam.
Scammers tricked 100,000+ users into downloading fake investment apps, stealing money under the promise of high returns.
Learn more: https://thehackernews.com/2024/04/google-sues-app-developers-over-fake.html
Scammers tricked 100,000+ users into downloading fake investment apps, stealing money under the promise of high returns.
Learn more: https://thehackernews.com/2024/04/google-sues-app-developers-over-fake.html
π21π11π6π€5π€―2
π Latin America targeted in a new phishing attack. Beware of emails with HTML files or ZIP attachments posing as invoices.
Cybercriminals are also using suspended domains and CAPTCHA verification to mask malicious files.
Learn more: https://thehackernews.com/2024/04/cybercriminals-targeting-latin-america.html
Cybercriminals are also using suspended domains and CAPTCHA verification to mask malicious files.
Learn more: https://thehackernews.com/2024/04/cybercriminals-targeting-latin-america.html
π27π₯7π€―4β‘2
β οΈ Beware of Latrodectus malware. This powerful new threat is believed to be linked to the notorious IcedID group. It can execute commands, evade detection, and pave the way for further attacks.
Learn more: https://thehackernews.com/2024/04/watch-out-for-latrodectus-this-malware.html
Learn more: https://thehackernews.com/2024/04/watch-out-for-latrodectus-this-malware.html
π14π₯4β‘1
π‘οΈ Google adds V8 Sandbox to Chrome, designed to combat memory corruption issues within its JavaScript engineβaddressing the root cause of many zero-day exploits.
Read details here: https://thehackernews.com/2024/04/google-chrome-adds-v8-sandbox-new.html
Read details here: https://thehackernews.com/2024/04/google-chrome-adds-v8-sandbox-new.html
π24π€―11π3β‘2π₯1
β οΈ Urgent Alert: Hackers are exploiting vulnerabilities (CVE-2024-3272 and CVE-2024-3273) in D-Link NAS devices.
Up to 92,000 devices affected, allowing data theft and device control.
https://thehackernews.com/2024/04/critical-flaws-leave-92000-d-link-nas.html
D-Link won't fix it β upgrade or disconnect ASAP!
Up to 92,000 devices affected, allowing data theft and device control.
https://thehackernews.com/2024/04/critical-flaws-leave-92000-d-link-nas.html
D-Link won't fix it β upgrade or disconnect ASAP!
π12β‘8π€―5
Hackers using fake invoices to spread dangerous malware like Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and crypto wallet stealers.
They let them take over your computer, steal passwords and sensitive data, and empty crypto wallets.
https://thehackernews.com/2024/04/attackers-using-obfuscation-tools-to.html
They let them take over your computer, steal passwords and sensitive data, and empty crypto wallets.
https://thehackernews.com/2024/04/attackers-using-obfuscation-tools-to.html
π14π€―4
Gain full visibility into privileged access activities with One Identity PAM Essentials. Its simplified approach eliminates complexity, reduces operational overhead, and ensures compliance with regulatory requirements.
Discover more: https://thehackernews.com/2024/03/embracing-cloud-revolutionizing.html
Discover more: https://thehackernews.com/2024/03/embracing-cloud-revolutionizing.html
π14π1π€―1
π¨ Hackers could take control of your LG Smart TV β Multiple security vulnerabilities have been uncovered in LG webOS, allowing unauthorized access.
Get the details and check if you need the update π
https://thehackernews.com/2024/04/researchers-discover-lg-smart-tv.html
Get the details and check if you need the update π
https://thehackernews.com/2024/04/researchers-discover-lg-smart-tv.html
π€10π6π€―4π2π±1
Did you know that 80% of app security issues stem from outdated dependencies?
Join Justin Clareburt, Product Owner at Mend Renovate, for a live session on April 17th. Discover how automated dependency updates can keep your apps modern, secure, and bug-free.
Register now: https://thn.news/updating-dependencies-webinar
Join Justin Clareburt, Product Owner at Mend Renovate, for a live session on April 17th. Discover how automated dependency updates can keep your apps modern, secure, and bug-free.
Register now: https://thn.news/updating-dependencies-webinar
Mend.io
Mend Renovate: Updating Dependencies Webinar
Improve your code while reducing security risks with automated dependency updates.
π17