Transparent Tribe launches a new Android malware campaign, targeting mobile users with CapraRAT spyware disguised as popular apps.
Read: https://thehackernews.com/2024/07/caprarat-spyware-disguised-as-popular.html
Read: https://thehackernews.com/2024/07/caprarat-spyware-disguised-as-popular.html
π₯9π6β‘4π±3
π iOS & macOS devs, heads up!
Discover how 3 new vulnerabilities in CocoaPods, a popular Apple developer tool, could lead to supply chain attacks on iOS & macOS apps.
Details here: https://thehackernews.com/2024/07/critical-flaws-in-cocoapods-expose-ios.html
Ensure your dependencies are up-to-date.
Discover how 3 new vulnerabilities in CocoaPods, a popular Apple developer tool, could lead to supply chain attacks on iOS & macOS apps.
Details here: https://thehackernews.com/2024/07/critical-flaws-in-cocoapods-expose-ios.html
Ensure your dependencies are up-to-date.
π10π9π₯3π2
β οΈ Think twice before connecting to "free" Wi-Fi...
A 42-year-old Australian man charged for running fake Wi-Fi hotspots on π« flights to steal personal data of passengers.
Learn more: https://thehackernews.com/2024/07/australian-man-charged-for-fake-wi-fi.html
A 42-year-old Australian man charged for running fake Wi-Fi hotspots on π« flights to steal personal data of passengers.
Learn more: https://thehackernews.com/2024/07/australian-man-charged-for-fake-wi-fi.html
π23π16π€―15β‘3π₯1
Heads up! China-linked hackers are exploiting a zero-day vulnerability in Cisco NX-OS to execute commands as root, undetected, and deliver malware.
Read details: https://thehackernews.com/2024/07/chinese-hackers-exploiting-cisco.html
Read details: https://thehackernews.com/2024/07/chinese-hackers-exploiting-cisco.html
π19β‘9π9π€―1
π Meta's ad-free option in the E.U. hits another roadblock! Regulators say "pay or consent" model breaches competition rules.
But is offering choices really a breach? Whatβs your take?
Read: https://thehackernews.com/2024/07/metas-pay-or-consent-approach-faces-eu.html
But is offering choices really a breach? Whatβs your take?
Read: https://thehackernews.com/2024/07/metas-pay-or-consent-approach-faces-eu.html
π18π6π3β‘2
π¨ New CPU vulnerability alert!
Intel's Raptor Lake & Alder Lake CPUs at risk from "Indirector" side-channel attack.
Read: https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html
Could leak sensitive data.
Intel's Raptor Lake & Alder Lake CPUs at risk from "Indirector" side-channel attack.
Read: https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html
Could leak sensitive data.
π±17π₯9π6π4β‘2π€1
π Average ransomware payment hits $2M, up 500%! Time to ditch outdated MFA and secure your organization with next-gen MFA to defend against sophisticated attacks.
Learn more: https://thehackernews.com/2024/07/how-mfa-failures-are-fueling-500-surge.html
Learn more: https://thehackernews.com/2024/07/how-mfa-failures-are-fueling-500-surge.html
π€―16π10π3π±3π₯1π1
IDC Spotlight: Creating a Cohesive Disaster and Cyber Recovery Strategy. Discover why IDC recommends an integrated approach for Cyber Recovery in 2024/2025.
Read: https://thn.news/cohesive-recovery-strategy
Read: https://thn.news/cohesive-recovery-strategy
Hpe
HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
π17π₯8
β οΈ Alert - A South Korean ERP vendor's update server was hacked to deliver a Go-based backdoor dubbed Xctdoor, stealing sensitive business info with keystrokes and screenshots.
Learn more: https://thehackernews.com/2024/07/south-korean-erp-vendors-server-hacked.html
Learn more: https://thehackernews.com/2024/07/south-korean-erp-vendors-server-hacked.html
π₯17π3β‘2
Israeli entities are under attack by hackers using public frameworks like Donut and Sliver. The campaign, dubbed "Supposed Grasshopper," is using custom WordPress sites for payload delivery.
Learn more: https://thehackernews.com/2024/07/israeli-entities-targeted-by.html
Learn more: https://thehackernews.com/2024/07/israeli-entities-targeted-by.html
π₯27π14π9π8π±5β‘4
Think that job offer is too good to be true? You might be right!
Hackers use fake job descriptions to exploit an MSHTML flaw and deploy MerkSpy spyware, targeting Canada, India, Poland, and the US.
Read: https://thehackernews.com/2024/07/microsoft-mshtml-flaw-exploited-to.html
Hackers use fake job descriptions to exploit an MSHTML flaw and deploy MerkSpy spyware, targeting Canada, India, Poland, and the US.
Read: https://thehackernews.com/2024/07/microsoft-mshtml-flaw-exploited-to.html
π20π4π€3π2β‘1π₯1
Open-Source Intelligence + AI = Game Changer!
AI-powered tools are now handling massive data volumes, real-time analysis, and multilingual content.
Ready to level up your OSINT game?
Learn more: https://thehackernews.com/2024/07/the-emerging-role-of-ai-in-open-source.html
AI-powered tools are now handling massive data volumes, real-time analysis, and multilingual content.
Ready to level up your OSINT game?
Learn more: https://thehackernews.com/2024/07/the-emerging-role-of-ai-in-open-source.html
π₯24π9π€6β‘1π1
Twilio reports a data breach exposing 33 million Authy phone numbers, urges users to update apps and stay vigilant against phishing.
Details here > https://thehackernews.com/2024/07/twilios-authy-app-breach-exposes.html
Details here > https://thehackernews.com/2024/07/twilios-authy-app-breach-exposes.html
π±22π9π₯5π5β‘1π€1
Global police operation disrupts cybercrime networks, shuts down 600 servers linked to Cobalt Strike cyberattacks, and arrests 54 for elderly fraud schemes.
Learn more: https://thehackernews.com/2024/07/global-police-operation-shuts-down-600.html
Learn more: https://thehackernews.com/2024/07/global-police-operation-shuts-down-600.html
π₯23π14π5π3β‘1
β οΈ Attention IT Pros!
#Microsoft reveals critical vulnerabilities in Rockwell Automation PanelView Plus. Unauthenticated attackers could exploit these to execute code remotely or trigger DoS attacks.
Read: https://thehackernews.com/2024/07/microsoft-uncovers-critical-flaws-in.html
#Microsoft reveals critical vulnerabilities in Rockwell Automation PanelView Plus. Unauthenticated attackers could exploit these to execute code remotely or trigger DoS attacks.
Read: https://thehackernews.com/2024/07/microsoft-uncovers-critical-flaws-in.html
π₯11π10β‘6π2π€2π1
Discover the advanced Zergeca botnet capable of powerful DDoS attacks, proxying, scanning, and more, targeting major countries and using stealthy communication methods.
Read: https://thehackernews.com/2024/07/new-golang-based-zergeca-botnet-capable.html
Read: https://thehackernews.com/2024/07/new-golang-based-zergeca-botnet-capable.html
π₯16β‘9π8π€2
Did you know? Polyfill supply chain attack impacts 380,000+ hosts, affecting major brands like WarnerBros, Hulu, and Mercedes-Benz. The Hetzner network is hit hardest, redirecting users to adult and gambling sites.
Learn more: https://thehackernews.com/2024/07/polyfillio-attack-impacts-over-380000.html
Learn more: https://thehackernews.com/2024/07/polyfillio-attack-impacts-over-380000.html
π9π±9π6β‘4π₯1
π¨ GootLoader malware evolves with new versions, using SEO poisoning and disguised payloads to compromise systems.
Learn about its latest threats and tactics: https://thehackernews.com/2024/07/gootloader-malware-delivers-new.html
Learn about its latest threats and tactics: https://thehackernews.com/2024/07/gootloader-malware-delivers-new.html
π10β‘4π1π€1
π‘οΈ Webinar Alert: Critical ITDR Capabilities Every Professional Must Know.
Join us to learn about the key features that ensure robust identity protection. Get real-life scenarios and actionable tips.
Register now: https://thehacker.news/securing-digital-identity
Don't miss this exclusive webinar.
Join us to learn about the key features that ensure robust identity protection. Get real-life scenarios and actionable tips.
Register now: https://thehacker.news/securing-digital-identity
Don't miss this exclusive webinar.
thehacker.news
Secure Your Digital Identity: Top 5 Criteria for ITDR Solutions
Discover the key capabilities of ITDR solutions in our upcoming webinar.
π13π11β‘3
Learn about Continuous Threat Exposure Management (CTEM) and how it enhances cybersecurity by improving visibility, vulnerability management, and validation.
Learn more: https://thehackernews.com/2024/07/blueprint-for-success-implementing-ctem.html
Learn more: https://thehackernews.com/2024/07/blueprint-for-success-implementing-ctem.html
π12π₯10β‘4
β οΈ A recent DDoS attack reached a staggering 840 million packets per second, according to OVHcloud.
MikroTik routers played a significant role, with many compromised devices amplifying the attack.
Read: https://thehackernews.com/2024/07/ovhcloud-hit-with-record-840-million.html
MikroTik routers played a significant role, with many compromised devices amplifying the attack.
Read: https://thehackernews.com/2024/07/ovhcloud-hit-with-record-840-million.html
π€―45π±13π11β‘8π5π₯2