π¨ GootLoader malware evolves with new versions, using SEO poisoning and disguised payloads to compromise systems.
Learn about its latest threats and tactics: https://thehackernews.com/2024/07/gootloader-malware-delivers-new.html
Learn about its latest threats and tactics: https://thehackernews.com/2024/07/gootloader-malware-delivers-new.html
π10β‘4π1π€1
π‘οΈ Webinar Alert: Critical ITDR Capabilities Every Professional Must Know.
Join us to learn about the key features that ensure robust identity protection. Get real-life scenarios and actionable tips.
Register now: https://thehacker.news/securing-digital-identity
Don't miss this exclusive webinar.
Join us to learn about the key features that ensure robust identity protection. Get real-life scenarios and actionable tips.
Register now: https://thehacker.news/securing-digital-identity
Don't miss this exclusive webinar.
thehacker.news
Secure Your Digital Identity: Top 5 Criteria for ITDR Solutions
Discover the key capabilities of ITDR solutions in our upcoming webinar.
π13π11β‘3
Learn about Continuous Threat Exposure Management (CTEM) and how it enhances cybersecurity by improving visibility, vulnerability management, and validation.
Learn more: https://thehackernews.com/2024/07/blueprint-for-success-implementing-ctem.html
Learn more: https://thehackernews.com/2024/07/blueprint-for-success-implementing-ctem.html
π12π₯10β‘4
β οΈ A recent DDoS attack reached a staggering 840 million packets per second, according to OVHcloud.
MikroTik routers played a significant role, with many compromised devices amplifying the attack.
Read: https://thehackernews.com/2024/07/ovhcloud-hit-with-record-840-million.html
MikroTik routers played a significant role, with many compromised devices amplifying the attack.
Read: https://thehackernews.com/2024/07/ovhcloud-hit-with-record-840-million.html
π€―45π±13π11β‘8π5π₯2
Apple removes 25 VPN apps, incl. ProtonVPN, Red Shield, NordVPN, & Le VPN, from Russian App Store following government request, sparking concerns over digital freedom and escalating censorship.
Read details: https://thehackernews.com/2024/07/apple-removes-vpn-apps-from-russian-app.html
Read details: https://thehackernews.com/2024/07/apple-removes-vpn-apps-from-russian-app.html
π€―52π±22π8π6π€5π₯4β‘3π3
Four unpatched Gogs Git flaws (CVE-2024-39930 to 39933) let attackers breach instances, steal/modify code, or plant backdoors.
Read more: https://thehackernews.com/2024/07/critical-vulnerabilities-disclosed-in.html
~7,300 exposed instances; 60% in China. Users urged to disable SSH and registration.
Read more: https://thehackernews.com/2024/07/critical-vulnerabilities-disclosed-in.html
~7,300 exposed instances; 60% in China. Users urged to disable SSH and registration.
β‘15π₯8π7π€―2π€1
Experts report a surge in Mekotio trojan attacks in Latin America. It installs via MSI files and AHK scripts, stealing banking information through fake pop-ups, keystroke logging, and screenshots.
Learn more: https://thehackernews.com/2024/07/experts-warn-of-mekotio-banking-trojan.html
Learn more: https://thehackernews.com/2024/07/experts-warn-of-mekotio-banking-trojan.html
π₯6π±6π3
Cybersecurity Disconnect β Only 5% of CISOs report to CEOs; 2/3 are 2 levels down.
Learn key strategies for CISOs to bridge the communication gap with boards, justify cybersecurity budgets, and report risks effectively.
Read: https://thehackernews.com/2024/07/5-key-questions-cisos-must-ask.html
Learn key strategies for CISOs to bridge the communication gap with boards, justify cybersecurity budgets, and report risks effectively.
Read: https://thehackernews.com/2024/07/5-key-questions-cisos-must-ask.html
π12π€―3
Eldorado, a new ransomware-as-a-service (RaaS), targets Windows and Linux systems using Golang, Chacha20, and RSA-OAEP for encryption.
Learn about its capabilities, victims, and the growing ransomware landscape: https://thehackernews.com/2024/07/new-ransomware-as-service-eldorado.html
Learn about its capabilities, victims, and the growing ransomware landscape: https://thehackernews.com/2024/07/new-ransomware-as-service-eldorado.html
π₯12π7π€―1
π¨ Analysis of malware logs on the dark web uncovered 3,300+ users child abuse material consumers. Notably, 4.2% had multiple credentials, indicating persistent offenders.
Read: https://thehackernews.com/2024/07/dark-web-malware-logs-expose-3300-users.html
Read: https://thehackernews.com/2024/07/dark-web-malware-logs-expose-3300-users.html
π€―11π€8π3
New APT group CloudSorcerer targets Russian govt entities using #Microsoft Graph, Yandex Cloud, & Dropbox for C2, with GitHub as an initial C2 server, adapting its behavior dynamically based on host processes like mspaint.exe.
Learn more: https://thehackernews.com/2024/07/new-apt-group-cloudsorcerer-targets.html
Learn more: https://thehackernews.com/2024/07/new-apt-group-cloudsorcerer-targets.html
π₯15π8π4π€4π€―4π2
Unknown threat actors are spreading trojanized jQuery via npm, GitHub, and jsDelivr in a complex supply chain attack.
Malware hides in the seldom-used 'end' function of jQuery, used by 'fadeTo'.
Learn more: https://thehackernews.com/2024/07/trojanized-jquery-packages-found-on-npm.html
Malware hides in the seldom-used 'end' function of jQuery, used by 'fadeTo'.
Learn more: https://thehackernews.com/2024/07/trojanized-jquery-packages-found-on-npm.html
π€12π€―7π4
π Global cybersecurity agencies warn about China-linked APT40's rapid exploit adaptation, targeting vulnerabilities in widely-used software across multiple countries.
Learn more: https://thehackernews.com/2024/07/cybersecurity-agencies-warn-of-china.html
Learn more: https://thehackernews.com/2024/07/cybersecurity-agencies-warn-of-china.html
π10π6β‘4π₯1
π¨ Ongoing GuardZoo surveillance targets Middle East military via Android malware. Initiated Oct '19 by Houthi-aligned group, over 450 victims in Yemen, Egypt, Oman, Qatar, Saudi Arabia, Turkey, UAE.
Learn more: https://thehackernews.com/2024/07/guardzoo-malware-targets-over-450.html
Learn more: https://thehackernews.com/2024/07/guardzoo-malware-targets-over-450.html
π13π₯12π±4π1
Researchers reveal Jenkins Script Console vulnerability exploited for crypto mining. Learn about the risks and how to protect your CI/CD infrastructure.
Learn more: https://thehackernews.com/2024/07/hackers-exploiting-jenkins-script.html
Learn more: https://thehackernews.com/2024/07/hackers-exploiting-jenkins-script.html
π₯10π7
β οΈ New BlastRADIUS flaw in RADIUS protocol allows MitM attacks, bypassing integrity checks.
Attackers can modify Access-Request packets undetected, forcing user auth.
https://thehackernews.com/2024/07/radius-protocol-vulnerability-exposes.html
ISPs & orgs must update RADIUS servers, use TLS/IPSec, and avoid PAP/CHAP methods.
Attackers can modify Access-Request packets undetected, forcing user auth.
https://thehackernews.com/2024/07/radius-protocol-vulnerability-exposes.html
ISPs & orgs must update RADIUS servers, use TLS/IPSec, and avoid PAP/CHAP methods.
π€―13π6π₯6β‘1π1
π οΈ Discover the security and privacy risks of leading customer service chatbots with the new Exposure Rating toolβan advanced risk assessment for your website!
Learn more: https://thehackernews.com/expert-insights/2024/07/9-customer-service-chatbots-ranked-for.html
Learn more: https://thehackernews.com/expert-insights/2024/07/9-customer-service-chatbots-ranked-for.html
π₯9π4π4β‘1
π¨ New OpenSSH vulnerability (CVE-2024-6409) found in RHEL 9's versions 8.7p1 & 8.8p1, allowing RCE via race condition in privsep child process.
Read: https://thehackernews.com/2024/07/new-openssh-vulnerability-discovered.html
β οΈ Active exploits detected! This bug is distinct from CVE-2024-6387 but shares similarities.
Read: https://thehackernews.com/2024/07/new-openssh-vulnerability-discovered.html
β οΈ Active exploits detected! This bug is distinct from CVE-2024-6387 but shares similarities.
π±19π₯9π6π€―3β‘1
Crypto analysts expose HuiOne Guarantee, a key platform for cybercriminals in SE Asia.
Linked to $11B in transactions, HuiOne offers money laundering, tech, & data services, supporting pig butchering scams.
Read: https://thehackernews.com/2024/07/crypto-analysts-expose-huione.html
Linked to $11B in transactions, HuiOne offers money laundering, tech, & data services, supporting pig butchering scams.
Read: https://thehackernews.com/2024/07/crypto-analysts-expose-huione.html
π₯11π6β‘5π1
Microsoft's latest Patch Tuesday update addresses 143 security flaws, with 2 already under active exploitation. Critical vulnerabilities include issues in Hyper-V and MSHTML.
Timely updates can prevent significant security incidents. Experts stress the importance of regular updates and vigilance.
Find details here: https://thehackernews.com/2024/07/microsofts-july-update-patches-143.html
Timely updates can prevent significant security incidents. Experts stress the importance of regular updates and vigilance.
Find details here: https://thehackernews.com/2024/07/microsofts-july-update-patches-143.html
π₯17β‘6π3π3π1
ITDR is revolutionizing identity protection in the fight against ransomware.
Identity protection lags 20 years behind, but ITDR provides comprehensive coverage and real-time threat mitigation.
Learn more: https://thehackernews.com/2024/07/true-protection-or-false-promise.html
Have you evaluated your ITDR solutions recently? Don't wait until it's too late.
Identity protection lags 20 years behind, but ITDR provides comprehensive coverage and real-time threat mitigation.
Learn more: https://thehackernews.com/2024/07/true-protection-or-false-promise.html
Have you evaluated your ITDR solutions recently? Don't wait until it's too late.
π10β‘3π€3π1