Google Project Zero introduces 'Naptime,' an LLM-powered framework for vulnerability research. It boosts LLMs' CyberSecEval 2 performance, using advanced tools to better identify and exploit software flaws.
Read: https://thehackernews.com/2024/06/google-introduces-project-naptime-for.html
Read: https://thehackernews.com/2024/06/google-introduces-project-naptime-for.html
π14π11π€6π₯2
Overwhelmed by cybersecurity threats?
Cybersixgillβs IQ Report Generator automates CTI reports in minutes, freeing your team for proactive defense measures.
Donβt miss outβsee how it works: https://thehackernews.com/2024/06/ease-burden-with-ai-driven-threat.html
Cybersixgillβs IQ Report Generator automates CTI reports in minutes, freeing your team for proactive defense measures.
Donβt miss outβsee how it works: https://thehackernews.com/2024/06/ease-burden-with-ai-driven-threat.html
π16π€6
π¨ Alert: Popular WordPress plugins backdoored to create rogue admin accounts. Users advised to inspect sites, remove suspicious admins, and update affected plugins.
Learn more: https://thehackernews.com/2024/06/multiple-wordpress-plugins-compromised.html
Learn more: https://thehackernews.com/2024/06/multiple-wordpress-plugins-compromised.html
π₯13π4π4
π‘οΈ Four Vietnamese nationals linked to the FIN9 cybercrime group indicted in the U.S., accused of causing over $71 million in losses through computer intrusions.
Learn how they pulled it off and what charges they face: https://thehackernews.com/2024/06/4-fin9-linked-vietnamese-hackers.html
Learn how they pulled it off and what charges they face: https://thehackernews.com/2024/06/4-fin9-linked-vietnamese-hackers.html
π€14π3π₯2
WikiLeaks founder Julian Assange freed after 5 years in U.K. prison. His 14-year legal battle ends with a plea deal.
Read details here: https://thehackernews.com/2024/06/wikileaks-julian-assange-released-from.html
Assange has left the U.K. and is en route to Australia.
Read details here: https://thehackernews.com/2024/06/wikileaks-julian-assange-released-from.html
Assange has left the U.K. and is en route to Australia.
π89π15π₯8β‘3π1
Researchers uncover a new attack technique called GrimResource, exploited in the wild, which uses specially crafted Microsoft Management Saved Console (MSC) files to achieve full code execution and evade security defenses.
Details: https://thehackernews.com/2024/06/new-attack-technique-exploits-microsoft.html
Details: https://thehackernews.com/2024/06/new-attack-technique-exploits-microsoft.html
π₯11π±6π3π2
New threat actor "Boolka" uses SQL injection to infect websites with BMANAGER trojan, stealing data via malicious scripts.
Learn more about their sophisticated tactics: https://thehackernews.com/2024/06/new-cyberthreat-boolka-deploying.html
Learn more about their sophisticated tactics: https://thehackernews.com/2024/06/new-cyberthreat-boolka-deploying.html
π9π6π±5π1
π Tight on budget but need to ramp up data security in #Googleworkspace? Donβt miss the exclusive webinar: "Data Loss & Leaks Prevention: Beyond GAM." Peek behind the curtain to see how top IT pros have achieved a stunning 98% increase in compliance and security by maximizing the native capabilities of Googleapps and automating routine Googlework space admin tasks β all without breaking the bank.
π‘ Topics covered will include:
β’ Automation of External Files Sharing Audits
β’ Monitoring and Taking Action on Out of Domain Email Forwarding
β’ Management of 'Zombie Drives' and more
Donβt miss out on this zero-fluff, zero-filler, 100% hands-on live event brought to you by Zenphi! Secure a spot today by registering for free here: https://thn.news/dlp-google-workspace
π‘ Topics covered will include:
β’ Automation of External Files Sharing Audits
β’ Monitoring and Taking Action on Out of Domain Email Forwarding
β’ Management of 'Zombie Drives' and more
Donβt miss out on this zero-fluff, zero-filler, 100% hands-on live event brought to you by Zenphi! Secure a spot today by registering for free here: https://thn.news/dlp-google-workspace
π19π€5
π Discover how browser security platforms help CISOs cut costs, boost efficiency, and enhance cybersecurity.
Read real-life success stories: https://thehackernews.com/2024/06/how-to-cut-costs-with-browser-security.html
Read real-life success stories: https://thehackernews.com/2024/06/how-to-cut-costs-with-browser-security.html
π€8π7
WARNING: Google blocks ads for websites using polyfill[.]io library due to a supply chain attack where the domain was acquired by a Chinese company and modified to redirect users to malicious sites.
Details: https://thehackernews.com/2024/06/over-110000-websites-affected-by.html
Details: https://thehackernews.com/2024/06/over-110000-websites-affected-by.html
π±18π13π4π3
π¨ Alert: Discover how the updated Medusa Android banking trojan targets users in 7 countries, featuring new stealth capabilities and expanded reach.
Read: https://thehackernews.com/2024/06/new-medusa-android-trojan-targets.html
Read: https://thehackernews.com/2024/06/new-medusa-android-trojan-targets.html
π11π₯6
π΅οΈββοΈ π³ A new credit card web skimmer called "Caesar Cipher Skimmer" is targeting multiple CMS platforms including WordPress, Magento, and OpenCart to steal financial and payment information.
Details: https://thehackernews.com/2024/06/new-credit-card-skimmer-targets.html
Details: https://thehackernews.com/2024/06/new-credit-card-skimmer-targets.html
π₯11π9π1
Apple releases firmware security update for AirPods and Beats devices, addressing a critical Bluetooth vulnerability that could allow unauthorized access and eavesdropping.
Learn more about CVE-2024-27867: https://thehackernews.com/2024/06/apple-patches-airpods-bluetooth.html
Learn more about CVE-2024-27867: https://thehackernews.com/2024/06/apple-patches-airpods-bluetooth.html
π₯11π€4π€―4β‘2π1
Explore key strategies to secure software supply chains effectively amidst rising cyber threats. Learn about SBOMs, SLSA, and DevSecOps best practices.
Learn more: https://thehackernews.com/2024/06/practical-guidance-for-securing-your.html
Learn more: https://thehackernews.com/2024/06/practical-guidance-for-securing-your.html
π₯7π€4π2
π State-sponsored cyber groups from China and North Korea have been linked to ransomware attacks on global governments and critical infrastructure.
Learn more about the tactics used β‘οΈ https://thehackernews.com/2024/06/chinese-and-n-korean-hackers-target.html
Learn more about the tactics used β‘οΈ https://thehackernews.com/2024/06/chinese-and-n-korean-hackers-target.html
π11π6π4π€3π€―1
π¨ Critical security flaw discovered in Progress Software's MOVEit Transfer.
CVE-2024-5806 allows authentication bypass and is already being exploited. Update now to protect your systems.
Read details: https://thehackernews.com/2024/06/new-moveit-transfer-vulnerability-under.html
CVE-2024-5806 allows authentication bypass and is already being exploited. Update now to protect your systems.
Read details: https://thehackernews.com/2024/06/new-moveit-transfer-vulnerability-under.html
π13π9π€―1
π¨ Critical security flaw found in Fortra FileCatalyst Workflow. CVE-2024-5276 scores 9.8 on CVSS. Patch now to protect your data from SQL injection attacks.
Details here β‘οΈ https://thehackernews.com/2024/06/critical-sqli-vulnerability-found-in.html
Details here β‘οΈ https://thehackernews.com/2024/06/critical-sqli-vulnerability-found-in.html
π10
A 22-year-old Russian national has been indicted in the U.S. for cyberattacks against Ukraine and its allies just before Russia's invasion in 2022.
US offers $10M reward. Read more: https://thehackernews.com/2024/06/russian-national-indicted-for-cyber.html
US offers $10M reward. Read more: https://thehackernews.com/2024/06/russian-national-indicted-for-cyber.html
π21π₯8π8π€―1
β οΈ Attention developers β A new high-severity prompt injection flaw (CVE-2024-5565) in Vanna AI library exposes databases to remote code execution.
Find out how this flaw could impact your projects: https://thehackernews.com/2024/06/prompt-injection-flaw-in-vanna-ai.html
Find out how this flaw could impact your projects: https://thehackernews.com/2024/06/prompt-injection-flaw-in-vanna-ai.html
π14
Discover the power of Python in blockchain development with AlgoKit!
Explore how you can build decentralized applications securely and efficiently.
Learn about setup, benefits, and getting started with dApps: https://thehackernews.com/2024/06/how-to-use-python-to-build-secure.html
Explore how you can build decentralized applications securely and efficiently.
Learn about setup, benefits, and getting started with dApps: https://thehackernews.com/2024/06/how-to-use-python-to-build-secure.html
π17π₯4
Ensuring data security remains crucial, which is why GigaOm recently released a new DSPM report highlighting industry leaders.
Sentra has emerged as a leader and rapid innovator, receiving high scores for its data mapping, access intelligence, and on-premises capabilities.
View the full report here π
https://thn.news/data-security-posture
Sentra has emerged as a leader and rapid innovator, receiving high scores for its data mapping, access intelligence, and on-premises capabilities.
View the full report here π
https://thn.news/data-security-posture
www.sentra.io
GigaOm Radar for Data Security Posture Management (DSPM) 2025 | Sentra
Sentra is proud to be recognized on the GigaOm Radar for Data Security Posture Management (DSPM) for the second year in a row.
π16π₯6π±1