π¨ Attention: Researchers uncover security flaws in the Mailcow mail server suite, affecting all versions prior to 2024-04.
These vulnerabilities allow for arbitrary code execution and admin account takeover.
Find details here: https://thehackernews.com/2024/06/mailcow-mail-server-flaws-expose.html
These vulnerabilities allow for arbitrary code execution and admin account takeover.
Find details here: https://thehackernews.com/2024/06/mailcow-mail-server-flaws-expose.html
π₯8π±7π5π4
β οΈ Alert: A new large-scale scam by "markopolo" targets cryptocurrency users with malware-infected applications like Vortax to deliver information stealers such as Rhadamanthys, StealC, and Atomic #macOS Stealer.
π Don't fall for itβget details: https://thehackernews.com/2024/06/warning-markopolos-scam-targeting.html
π Don't fall for itβget details: https://thehackernews.com/2024/06/warning-markopolos-scam-targeting.html
π±10π8π₯4
Void Arachne targets Chinese-speaking users with malicious VPN installers.
This sophisticated attack employs SEO poisoning and promotes compromised MSI files containing nudifiers, deepfake porno-generating software, and AI voice and facial technologies.
https://thehackernews.com/2024/06/void-arachne-uses-deepfakes-and-ai-to.html
This sophisticated attack employs SEO poisoning and promotes compromised MSI files containing nudifiers, deepfake porno-generating software, and AI voice and facial technologies.
https://thehackernews.com/2024/06/void-arachne-uses-deepfakes-and-ai-to.html
π±15π₯9π6π3
Explore the dangers of Google Tag Manager misconfigurations with real-world examples.
Learn how to safeguard your data and comply with privacy laws.
Read: https://thehackernews.com/2024/06/new-case-study-unmanaged-gtm-tags.html
Learn how to safeguard your data and comply with privacy laws.
Read: https://thehackernews.com/2024/06/new-case-study-unmanaged-gtm-tags.html
π12π9π±4π€3
China-linked cyber espionage group UNC3886 exploits zero-day vulnerabilities in Fortinet, Ivanti, and VMware devices and evading detection with advanced techniques.
Discover how they operate: https://thehackernews.com/2024/06/chinese-cyber-espionage-group-exploits.html
Discover how they operate: https://thehackernews.com/2024/06/chinese-cyber-espionage-group-exploits.html
π₯17π8π6π±1
β‘ Kraken exchange hacked: $3 Million stolen due to zero-day flaw. Researcher exploits bug, extorts company, refuses to return funds.
Read: https://thehackernews.com/2024/06/kraken-crypto-exchange-hit-by-3-million.html
Kraken working with law enforcement, calls actions criminal.
Read: https://thehackernews.com/2024/06/kraken-crypto-exchange-hit-by-3-million.html
Kraken working with law enforcement, calls actions criminal.
π37π9π±9β‘3π€3
Discover the latest evasive malware loader, SquidLoader, targeting Chinese organizations via phishing emails. Learn about its advanced anti-analysis techniques and the ongoing threat of loader malware.
Details β‘οΈ https://thehackernews.com/2024/06/experts-uncover-new-evasive-squidloader.html
Details β‘οΈ https://thehackernews.com/2024/06/experts-uncover-new-evasive-squidloader.html
π₯9π5π2π€―2π€1π±1
π Fickle Stealer, a new Rust-based malware, and AZStealer, an open-source Python stealer, target sensitive data from crypto wallets, browsers, and more through multiple attack chains and exfiltration methods.
Learn more: https://thehackernews.com/2024/06/new-rust-based-fickle-malware-uses.html
Learn more: https://thehackernews.com/2024/06/new-rust-based-fickle-malware-uses.html
π₯11π±5π4π2
Chinese-linked cyber espionage groups have been uncovered in a long-term infiltration of telecom operators in Asia since 2021, deploying custom malware and stealing credentials.
Read: https://thehackernews.com/2024/06/chinese-cyber-espionage-targets-telecom.html
Read: https://thehackernews.com/2024/06/chinese-cyber-espionage-targets-telecom.html
π₯10π8π±7π2π€―2
Explore the challenges MSPs face with too many cybersecurity tools and discover how Guardz's unified platform simplifies operations and enhances security.
Read: https://thehackernews.com/2024/06/tool-overload-why-msps-are-still.html
Read: https://thehackernews.com/2024/06/tool-overload-why-msps-are-still.html
π13π7π±3π€2π1
Researchers uncover 'UEFIcanhazbufferoverflow' (CVE-2024-0762), a security flaw in Phoenix SecureCore UEFI firmware affecting multiple #Intel processor families.
Learn more: https://thehackernews.com/2024/06/researchers-uncover-uefi-vulnerability.html
Learn more: https://thehackernews.com/2024/06/researchers-uncover-uefi-vulnerability.html
π16π9π±8π1
U.S. bans Kaspersky software over national security concerns, citing Russian government ties. The ban extends to Kaspersky's affiliates, subsidiaries, and parent companies.
Learn about the ban's impact and Kaspersky's response: https://thehackernews.com/2024/06/us-bans-kaspersky-software-citing.html
Learn about the ban's impact and Kaspersky's response: https://thehackernews.com/2024/06/us-bans-kaspersky-software-citing.html
π€―38π18π10π9π€9π±9π₯4
β οΈ Alert: SolarWinds Serv-U vulnerability (CVE-2024-28995) is under active exploitation. Urgent update required to protect sensitive data from unauthorized access.
Learn more: https://thehackernews.com/2024/06/solarwinds-serv-u-vulnerability-under.html
Learn more: https://thehackernews.com/2024/06/solarwinds-serv-u-vulnerability-under.html
π10π7π±6π1
π¨ Searching for Google Chrome or Microsoft Teams? Be cautious!
Cybercriminals are exploiting search engines to redirect users to fake websites & distribute trojanized versions of popular apps to spread the Oyster #malware.
Read: https://thehackernews.com/2024/06/oyster-backdoor-spreading-via.html
Cybercriminals are exploiting search engines to redirect users to fake websites & distribute trojanized versions of popular apps to spread the Oyster #malware.
Read: https://thehackernews.com/2024/06/oyster-backdoor-spreading-via.html
π14π11π±7π2
π Beware of ZIP files!
Discover how a new phishing campaign targets Pakistan using military-themed emails to spread PHANTOM#SPIKE, a custom backdoor granting remote system access.
Learn more: https://thehackernews.com/2024/06/military-themed-emails-used-to-spread.html
Discover how a new phishing campaign targets Pakistan using military-themed emails to spread PHANTOM#SPIKE, a custom backdoor granting remote system access.
Learn more: https://thehackernews.com/2024/06/military-themed-emails-used-to-spread.html
π₯11π±9π6π€3π€―1
π¨ New Threat Alert!
Chinese-speaking SneakyChef hackers are targeting government entities worldwide and AI-focused organizations with sophisticated SugarGh0st and SpiceRAT malware.
Get the latest insights β https://thehackernews.com/2024/06/chinese-hackers-deploy-spicerat-and.html
Chinese-speaking SneakyChef hackers are targeting government entities worldwide and AI-focused organizations with sophisticated SugarGh0st and SpiceRAT malware.
Get the latest insights β https://thehackernews.com/2024/06/chinese-hackers-deploy-spicerat-and.html
π14π₯5π€―5π€3
Discover the power of SOC Automation Capability Matrix for cybersecurity incident response and workflow automation. Perfect for enhancing your security operations.
Read: https://thehackernews.com/2024/02/how-to-use-tiness-soc-automation.html
Read: https://thehackernews.com/2024/02/how-to-use-tiness-soc-automation.html
π18π€5π±1
U.S. Treasury sanctions 12 Kaspersky executives following Commerce Department's ban on Kaspersky software in the U.S. The company and CEO remain unaffected.
Learn more: https://thehackernews.com/2024/06/us-treasury-sanctions-12-kaspersky.html
Learn more: https://thehackernews.com/2024/06/us-treasury-sanctions-12-kaspersky.html
π18π€11π€―6π4π±4π2
π¨ Beware: A new adware, AdsExhaust, is targeting Meta Quest app seekers with malicious downloads, manipulating browsers, and generating unauthorized revenue through sophisticated techniques.
Read: https://thehackernews.com/2024/06/warning-new-adware-campaign-targets.html
Read: https://thehackernews.com/2024/06/warning-new-adware-campaign-targets.html
π₯10π5π±4
New cybercrime gang ExCobalt targets Russian organizations with sophisticated GoRed backdoor.
Explore their tactics: https://thehackernews.com/2024/06/excobalt-cyber-gang-targets-russian.html
Explore their tactics: https://thehackernews.com/2024/06/excobalt-cyber-gang-targets-russian.html
π18π11π€6π5π±4π€―1
Cyber espionage groups are using Rafel RAT, an open-source Android tool, disguised as popular apps like Instagram, WhatsApp, and more. This malware conducts data theft and device manipulation.
Read: https://thehackernews.com/2024/06/iranian-hackers-deploy-rafel-rat-in.html
Read: https://thehackernews.com/2024/06/iranian-hackers-deploy-rafel-rat-in.html
π18π±11π€―6