The old way of protecting browsers is outdated. A new report reveals why Browser Isolation isn't enough anymore and how Secure Browser Extensions are stepping up to the challenge.
Learn more: https://thehackernews.com/2024/06/the-next-generation-of-rbi-remote.html
Learn more: https://thehackernews.com/2024/06/the-next-generation-of-rbi-remote.html
π€15π€―4π3
Decoy Dog malware, previously targeting Linux, now has a confirmed Windows variant. APT group HellHounds is using this new version to compromise high-value targets in Russia and maintain persistent access for years.
Learn more: https://thehackernews.com/2024/06/russian-power-companies-it-firms-and.html
Learn more: https://thehackernews.com/2024/06/russian-power-companies-it-firms-and.html
π₯14π11π6π±3β‘1
β‘ Attention, Zyxel NAS Users!
Critical updates released for NAS326 and NAS542 devices address severe vulnerabilities that could allow unauthenticated attackers to execute OS commands.
Learn more: https://thehackernews.com/2024/06/zyxel-releases-patches-for-firmware.html
Update now to secure your data!
Critical updates released for NAS326 and NAS542 devices address severe vulnerabilities that could allow unauthenticated attackers to execute OS commands.
Learn more: https://thehackernews.com/2024/06/zyxel-releases-patches-for-firmware.html
Update now to secure your data!
β‘13π6π₯5π€3
β οΈ TikTok admits a security issue where zero-click hashtag#malware in DMs allowed hackers to hijack high-profile accounts without user interaction.
Find details here: https://thehackernews.com/2024/06/celebrity-tiktok-accounts-compromised.html
Find details here: https://thehackernews.com/2024/06/celebrity-tiktok-accounts-compromised.html
π₯35π20π€―10π2
π¨ ALERT: RansomHub, a rebranded Knight #ransomware, targets healthcare and major entities.
Using legitimate remote desktop tools and recruiting from shutdown groups, it shows evolving cybercriminal tactics.
Learn more: https://thehackernews.com/2024/06/rebranded-knight-ransomware-targeting.html
Using legitimate remote desktop tools and recruiting from shutdown groups, it shows evolving cybercriminal tactics.
Learn more: https://thehackernews.com/2024/06/rebranded-knight-ransomware-targeting.html
π16π₯6π€―1
π‘οΈ Chinese state-sponsored hackers target Southeast Asian government in cyber espionage campaign using new malware like PocoProxy and updated EAGERBEE, along with other known families.
Details here: https://thehackernews.com/2024/06/chinese-state-backed-cyber-espionage.html
Details here: https://thehackernews.com/2024/06/chinese-state-backed-cyber-espionage.html
π₯16π5π2π±2β‘1
π¨ Major communication platform faces backlash for using user data to train AI models without proper consent.
Is your organization's sensitive data at risk?
Learn about the growing threat of Shadow AI & how to combat it with automated SSPM solutions: https://thehackernews.com/2024/06/unpacking-2024s-saas-threat-predictions.html
Is your organization's sensitive data at risk?
Learn about the growing threat of Shadow AI & how to combat it with automated SSPM solutions: https://thehackernews.com/2024/06/unpacking-2024s-saas-threat-predictions.html
π€16π7π₯2π±2
π Python developers beware! A malicious package named "crytic-compilers" was discovered on PyPI, designed to deliver the Lumma info stealer.
Learn more: https://thehackernews.com/2024/06/hackers-target-python-developers-with.html
Learn more: https://thehackernews.com/2024/06/hackers-target-python-developers-with.html
π±21π12π4β‘2π₯1
Google Settles Location Tracking Allegations.
Starting Dec 1, 2024, Google Maps Timeline data will be stored locally on users' devices, boosting privacy.
Learn more: https://thehackernews.com/2024/06/google-maps-timeline-data-to-be-stored.html
Starting Dec 1, 2024, Google Maps Timeline data will be stored locally on users' devices, boosting privacy.
Learn more: https://thehackernews.com/2024/06/google-maps-timeline-data-to-be-stored.html
π₯23π8π€5β‘2
π¨ Alert: Hackers are exploiting legitimate packer software like "BoxedApp" to distribute malware undetected, targeting financial institutions and government agencies.
Read the full story here - https://thehackernews.com/2024/06/hackers-exploit-legitimate-packer.html
Read the full story here - https://thehackernews.com/2024/06/hackers-exploit-legitimate-packer.html
π10π±5π4π₯1
π Password reuse can lead to devastating account takeovers.
Tom's story shows how reusing a strong password across different sites can still expose you to hackers.
Discover the best practices for preventing account takeover attacks: https://thehackernews.com/2024/06/prevent-account-takeover-with-better.html
Tom's story shows how reusing a strong password across different sites can still expose you to hackers.
Discover the best practices for preventing account takeover attacks: https://thehackernews.com/2024/06/prevent-account-takeover-with-better.html
π19π₯12
π€ Muhstik botnet malware is now exploits CVE-2023-33246 in Apache RocketMQ, targeting IoT devices and Linux servers for DDoS attacks and cryptomining.
Find more details on this ongoing threat here: https://thehackernews.com/2024/06/muhstik-botnet-exploiting-apache.html
Find more details on this ongoing threat here: https://thehackernews.com/2024/06/muhstik-botnet-exploiting-apache.html
π14π₯6π1
π¨ 61% of U.S. businesses were hit by software supply chain attacks last year, causing data breaches, financial losses, and reputational harm.
π Learn how to protect your organization from these critical threats: https://thehackernews.com/2024/06/third-party-cyber-attacks-threat-no-one.html
π Learn how to protect your organization from these critical threats: https://thehackernews.com/2024/06/third-party-cyber-attacks-threat-no-one.html
π₯17π8π1
New vulnerabilities are disclosed hourly, new exploits for old vulnerabilities are publicly released and threat actors are updating their techniques continuously.
Knowing where and how to prioritize your security resources to achieve the greatest impact with the least time invested is critical.
Join Intruderβs webinar on June 12, 2024, to learn how to get started: https://thn.news/exposure-management-lessons
Canβt make it? Register for the webinar and a copy will be sent.
Knowing where and how to prioritize your security resources to achieve the greatest impact with the least time invested is critical.
Join Intruderβs webinar on June 12, 2024, to learn how to get started: https://thn.news/exposure-management-lessons
Canβt make it? Register for the webinar and a copy will be sent.
www.intruder.io
Focus on what matters most! Exposure management and your attack surface
Your business, attack surface and the threat landscape are not static - they are constantly changing. Knowing where and how to prioritize your security resources to achieve the greatest impact with the least time invested is critical. Learn about exposureβ¦
π10π₯8
Cybercriminals are exploiting vulnerabilities in Docker and ThinkPHP to deploy cryptominers and web shells.
Learn more about these cyberattacks - https://thehackernews.com/2024/06/commando-cat-cryptojacking-attacks.html
Secure your installations and update your applications to prevent attacks.
Learn more about these cyberattacks - https://thehackernews.com/2024/06/commando-cat-cryptojacking-attacks.html
Secure your installations and update your applications to prevent attacks.
π15π₯6π€―2
π Alert: CERT-UA warns of cyber-attacks on Ukraine's defense forces using the SPECTR malware in SickSync espionage campaign.
Learn more about the tactics used by the Vermin group: https://thehackernews.com/2024/06/spectr-malware-targets-ukraine-defense.html
Learn more about the tactics used by the Vermin group: https://thehackernews.com/2024/06/spectr-malware-targets-ukraine-defense.html
π8π₯7π€―4
π FBI has 7,000+ decryption keys for LockBit ransomware to help victims recover their data for free. If you're a victim, don't pay the ransom.
π§ Here's how to unlock your data: https://thehackernews.com/2024/06/fbi-distributes-7000-lockbit-ransomware.html
π§ Here's how to unlock your data: https://thehackernews.com/2024/06/fbi-distributes-7000-lockbit-ransomware.html
π29π10π€―6π₯2π2β‘1
Growing concerns over responsible π€ AI use:
β Google guides Android devs
β Meta faces EU privacy complaints
β Microsoft's Recall feature raises security red flags
Learn about the potential risks & how they could impact you: https://thehackernews.com/2024/06/the-ai-debate-googles-guidelines-metas.html
β Google guides Android devs
β Meta faces EU privacy complaints
β Microsoft's Recall feature raises security red flags
Learn about the potential risks & how they could impact you: https://thehackernews.com/2024/06/the-ai-debate-googles-guidelines-metas.html
π15π₯10β‘1
Traditional SCA tools often miss critical vulnerabilities and create alert fatigue. Learn how to protect your software supply chain from emerging threats.
π Download the guide for more insights: https://thehackernews.com/2024/06/cyber-landscape-is-evolving-so-should.html
π Download the guide for more insights: https://thehackernews.com/2024/06/cyber-landscape-is-evolving-so-should.html
π₯7π6π€5π±4β‘1
π¨ LightSpy, a malware framework, now targets macOS alongside iOS, Android, and Windows. It uses 10 plugins to gather extensive data from infected devices.
Learn more: https://thehackernews.com/2024/06/lightspy-spywares-macos-variant-found.html
Learn more: https://thehackernews.com/2024/06/lightspy-spywares-macos-variant-found.html
π11β‘9π₯3π1
Ransomware, DDoS, data breaches β 2023 was a tough year for cybersecurity.
The good news? Many of these attacks could have been prevented with better basic practices.
Learn more at our upcoming webinar: https://thehackernews.com/2024/06/ultimate-cyber-hygiene-guide-learn-how.html
SAVE YOUR SPOT NOW!
The good news? Many of these attacks could have been prevented with better basic practices.
Learn more at our upcoming webinar: https://thehackernews.com/2024/06/ultimate-cyber-hygiene-guide-learn-how.html
SAVE YOUR SPOT NOW!
π€15π8π₯4β‘2