New threat actor "Boolka" uses SQL injection to infect websites with BMANAGER trojan, stealing data via malicious scripts.
Learn more about their sophisticated tactics: https://thehackernews.com/2024/06/new-cyberthreat-boolka-deploying.html
Learn more about their sophisticated tactics: https://thehackernews.com/2024/06/new-cyberthreat-boolka-deploying.html
π9π6π±5π1
π Tight on budget but need to ramp up data security in #Googleworkspace? Donβt miss the exclusive webinar: "Data Loss & Leaks Prevention: Beyond GAM." Peek behind the curtain to see how top IT pros have achieved a stunning 98% increase in compliance and security by maximizing the native capabilities of Googleapps and automating routine Googlework space admin tasks β all without breaking the bank.
π‘ Topics covered will include:
β’ Automation of External Files Sharing Audits
β’ Monitoring and Taking Action on Out of Domain Email Forwarding
β’ Management of 'Zombie Drives' and more
Donβt miss out on this zero-fluff, zero-filler, 100% hands-on live event brought to you by Zenphi! Secure a spot today by registering for free here: https://thn.news/dlp-google-workspace
π‘ Topics covered will include:
β’ Automation of External Files Sharing Audits
β’ Monitoring and Taking Action on Out of Domain Email Forwarding
β’ Management of 'Zombie Drives' and more
Donβt miss out on this zero-fluff, zero-filler, 100% hands-on live event brought to you by Zenphi! Secure a spot today by registering for free here: https://thn.news/dlp-google-workspace
π19π€5
π Discover how browser security platforms help CISOs cut costs, boost efficiency, and enhance cybersecurity.
Read real-life success stories: https://thehackernews.com/2024/06/how-to-cut-costs-with-browser-security.html
Read real-life success stories: https://thehackernews.com/2024/06/how-to-cut-costs-with-browser-security.html
π€8π7
WARNING: Google blocks ads for websites using polyfill[.]io library due to a supply chain attack where the domain was acquired by a Chinese company and modified to redirect users to malicious sites.
Details: https://thehackernews.com/2024/06/over-110000-websites-affected-by.html
Details: https://thehackernews.com/2024/06/over-110000-websites-affected-by.html
π±18π13π4π3
π¨ Alert: Discover how the updated Medusa Android banking trojan targets users in 7 countries, featuring new stealth capabilities and expanded reach.
Read: https://thehackernews.com/2024/06/new-medusa-android-trojan-targets.html
Read: https://thehackernews.com/2024/06/new-medusa-android-trojan-targets.html
π11π₯6
π΅οΈββοΈ π³ A new credit card web skimmer called "Caesar Cipher Skimmer" is targeting multiple CMS platforms including WordPress, Magento, and OpenCart to steal financial and payment information.
Details: https://thehackernews.com/2024/06/new-credit-card-skimmer-targets.html
Details: https://thehackernews.com/2024/06/new-credit-card-skimmer-targets.html
π₯11π9π1
Apple releases firmware security update for AirPods and Beats devices, addressing a critical Bluetooth vulnerability that could allow unauthorized access and eavesdropping.
Learn more about CVE-2024-27867: https://thehackernews.com/2024/06/apple-patches-airpods-bluetooth.html
Learn more about CVE-2024-27867: https://thehackernews.com/2024/06/apple-patches-airpods-bluetooth.html
π₯11π€4π€―4β‘2π1
Explore key strategies to secure software supply chains effectively amidst rising cyber threats. Learn about SBOMs, SLSA, and DevSecOps best practices.
Learn more: https://thehackernews.com/2024/06/practical-guidance-for-securing-your.html
Learn more: https://thehackernews.com/2024/06/practical-guidance-for-securing-your.html
π₯7π€4π2
π State-sponsored cyber groups from China and North Korea have been linked to ransomware attacks on global governments and critical infrastructure.
Learn more about the tactics used β‘οΈ https://thehackernews.com/2024/06/chinese-and-n-korean-hackers-target.html
Learn more about the tactics used β‘οΈ https://thehackernews.com/2024/06/chinese-and-n-korean-hackers-target.html
π11π6π4π€3π€―1
π¨ Critical security flaw discovered in Progress Software's MOVEit Transfer.
CVE-2024-5806 allows authentication bypass and is already being exploited. Update now to protect your systems.
Read details: https://thehackernews.com/2024/06/new-moveit-transfer-vulnerability-under.html
CVE-2024-5806 allows authentication bypass and is already being exploited. Update now to protect your systems.
Read details: https://thehackernews.com/2024/06/new-moveit-transfer-vulnerability-under.html
π13π9π€―1
π¨ Critical security flaw found in Fortra FileCatalyst Workflow. CVE-2024-5276 scores 9.8 on CVSS. Patch now to protect your data from SQL injection attacks.
Details here β‘οΈ https://thehackernews.com/2024/06/critical-sqli-vulnerability-found-in.html
Details here β‘οΈ https://thehackernews.com/2024/06/critical-sqli-vulnerability-found-in.html
π10
A 22-year-old Russian national has been indicted in the U.S. for cyberattacks against Ukraine and its allies just before Russia's invasion in 2022.
US offers $10M reward. Read more: https://thehackernews.com/2024/06/russian-national-indicted-for-cyber.html
US offers $10M reward. Read more: https://thehackernews.com/2024/06/russian-national-indicted-for-cyber.html
π21π₯8π8π€―1
β οΈ Attention developers β A new high-severity prompt injection flaw (CVE-2024-5565) in Vanna AI library exposes databases to remote code execution.
Find out how this flaw could impact your projects: https://thehackernews.com/2024/06/prompt-injection-flaw-in-vanna-ai.html
Find out how this flaw could impact your projects: https://thehackernews.com/2024/06/prompt-injection-flaw-in-vanna-ai.html
π14
Discover the power of Python in blockchain development with AlgoKit!
Explore how you can build decentralized applications securely and efficiently.
Learn about setup, benefits, and getting started with dApps: https://thehackernews.com/2024/06/how-to-use-python-to-build-secure.html
Explore how you can build decentralized applications securely and efficiently.
Learn about setup, benefits, and getting started with dApps: https://thehackernews.com/2024/06/how-to-use-python-to-build-secure.html
π17π₯4
Ensuring data security remains crucial, which is why GigaOm recently released a new DSPM report highlighting industry leaders.
Sentra has emerged as a leader and rapid innovator, receiving high scores for its data mapping, access intelligence, and on-premises capabilities.
View the full report here π
https://thn.news/data-security-posture
Sentra has emerged as a leader and rapid innovator, receiving high scores for its data mapping, access intelligence, and on-premises capabilities.
View the full report here π
https://thn.news/data-security-posture
www.sentra.io
GigaOm Radar for Data Security Posture Management (DSPM) 2025 | Sentra
Sentra is proud to be recognized on the GigaOm Radar for Data Security Posture Management (DSPM) for the second year in a row.
π16π₯6π±1
π¨ Alert: Rust-based worm P2PInfect botnet has evolved to target misconfigured Redis servers with ransomware and cryptocurrency miners, showcasing new financial motivations and advanced evasion techniques.
Learn more: https://thehackernews.com/2024/06/rust-based-p2pinfect-botnet-evolves.html
Learn more: https://thehackernews.com/2024/06/rust-based-p2pinfect-botnet-evolves.html
π14π₯12β‘3π±3
Alert: TeamViewer detected an irregularity in its internal corporate IT environment. Investigations are ongoing to identify the attackers and the method of intrusion.
Learn more: https://thehackernews.com/2024/06/teamviewer-detects-security-breach-in.html
Learn more: https://thehackernews.com/2024/06/teamviewer-detects-security-breach-in.html
π€―19π12π7π₯2
Multiple critical vulnerabilities have been identified in Emerson Rosemount gas chromatographs that could be exploited to execute arbitrary commands, bypass authentication, and cause DoS conditions.
Read: https://thehackernews.com/2024/06/researchers-warn-of-flaws-in-widely.html
Read: https://thehackernews.com/2024/06/researchers-warn-of-flaws-in-widely.html
π₯8π7β‘1
π΅οΈββοΈ Researchers unveil SnailLoad β a new side-channel attack exploiting network latency spy on users' web activity remotely, achieving up to 98% for video content and 63% for website visits.
Read: https://thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
Read: https://thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
π18π€―2π±2
From PowerShell scripts to mimicking legitimate apps, discover how the 8220 Gang exploits Oracle WebLogic Server vulnerabilities using fileless techniques for cryptocurrency mining.
Read: https://thehackernews.com/2024/06/8220-gang-exploits-oracle-weblogic.html
Read: https://thehackernews.com/2024/06/8220-gang-exploits-oracle-weblogic.html
π13π±3
Don't let your #SaaS become a trojan horse!
Threat actors exploit misconfigured settings, dormant machine IDs, unauthorized access to breach networks. Extend Zero Trust to SaaS with posture management to lock it down.
Learn more: https://thehackernews.com/2024/06/combatting-evolving-saas-kill-chain-how.html
Threat actors exploit misconfigured settings, dormant machine IDs, unauthorized access to breach networks. Extend Zero Trust to SaaS with posture management to lock it down.
Learn more: https://thehackernews.com/2024/06/combatting-evolving-saas-kill-chain-how.html
π15