NTERPOL recovers $39 million in largest BEC scam bust. Global stop-payment mechanism halts massive business email fraud. Seven arrested in Singapore.
Learn more: https://thehackernews.com/2024/08/interpol-recovers-41-million-in-largest.html
Learn more: https://thehackernews.com/2024/08/interpol-recovers-41-million-in-largest.html
🔥17👍7🤔5😱1
Apple tightens Gatekeeper protections in macOS Sequoia.
This enhances security against malware by making it harder for users to bypass critical security checks.
Now, users must navigate to System Settings > Privacy & Security to authorize apps, preventing easy overrides.
Read: https://thehackernews.com/2024/08/apples-new-macos-sequoia-tightens.html
How do you feel about this update? Share your thoughts!
This enhances security against malware by making it harder for users to bypass critical security checks.
Now, users must navigate to System Settings > Privacy & Security to authorize apps, preventing easy overrides.
Read: https://thehackernews.com/2024/08/apples-new-macos-sequoia-tightens.html
How do you feel about this update? Share your thoughts!
👍17🤯8🔥3🤔3😁1
A new Android banking trojan, Chameleon, is targeting Canadian users by posing as a CRM app.
Chameleon can bypass Android restrictions, making it a significant threat.
Learn more: https://thehackernews.com/2024/08/chameleon-android-banking-trojan.html
Chameleon can bypass Android restrictions, making it a significant threat.
Learn more: https://thehackernews.com/2024/08/chameleon-android-banking-trojan.html
👍17🔥5
CrowdStrike reveals root cause of global Windows device crash, implements new safety measures, and faces potential lawsuit from Delta Air Lines.
Read details here: https://thehackernews.com/2024/08/crowdstrike-reveals-root-cause-of.html
Read details here: https://thehackernews.com/2024/08/crowdstrike-reveals-root-cause-of.html
⚡15🔥12😁8🤔3👍1
A South Asian media organization was targeted with a new Go-based backdoor, GoGra.
GoGra utilizes Microsoft Graph API for command-and-control, mimicking techniques used by other advanced threats.
Read: https://thehackernews.com/2024/08/new-go-based-backdoor-gogra-targets.html
GoGra utilizes Microsoft Graph API for command-and-control, mimicking techniques used by other advanced threats.
Read: https://thehackernews.com/2024/08/new-go-based-backdoor-gogra-targets.html
👍11🔥6🤔3
New vulnerabilities in Roundcube webmail could allow attackers to steal emails & passwords via malicious JavaScript.
Three CVEs have been addressed in the latest Roundcube updates. Make sure you're using versions 1.6.8 or 1.5.8 to stay protected.
Read: https://thehackernews.com/2024/08/roundcube-webmail-flaws-allow-hackers.html
Three CVEs have been addressed in the latest Roundcube updates. Make sure you're using versions 1.6.8 or 1.5.8 to stay protected.
Read: https://thehackernews.com/2024/08/roundcube-webmail-flaws-allow-hackers.html
👍13⚡7🔥2
New #Linux Kernel Exploitation Technique Unveiled: SLUBStick
This technique could elevate limited heap vulnerabilities to arbitrary memory read-and-write capabilities, threatening system security.
Researchers have shown SLUBStick can successfully bypass defenses like KASLR with a 99% success rate.
Read: https://thehackernews.com/2024/08/new-linux-kernel-exploit-technique.html
This technique could elevate limited heap vulnerabilities to arbitrary memory read-and-write capabilities, threatening system security.
Researchers have shown SLUBStick can successfully bypass defenses like KASLR with a 99% success rate.
Read: https://thehackernews.com/2024/08/new-linux-kernel-exploit-technique.html
🤯27👍8🔥7😱1
A critical security flaw in Progress Software's WhatsUp Gold is under active exploitation.
This vulnerability allows unauthenticated remote code execution, posing a severe threat to network security.
The flaw (CVE-2024-4885) affects versions released before 2023.1.3. A PoC exploit is already in circulation.
Read: https://thehackernews.com/2024/08/critical-security-flaw-in-whatsup-gold.html
Update to the latest version immediately to protect your systems!
This vulnerability allows unauthenticated remote code execution, posing a severe threat to network security.
The flaw (CVE-2024-4885) affects versions released before 2023.1.3. A PoC exploit is already in circulation.
Read: https://thehackernews.com/2024/08/critical-security-flaw-in-whatsup-gold.html
Update to the latest version immediately to protect your systems!
🔥13👍6😁4
FBI and CISA warn of BlackSuit ransomware, with demands soaring to $500M and individual ransoms hitting $60M. These actors use sophisticated methods like phishing, RDP exploits, and legitimate RMM tools to infiltrate and persist in networks.
https://thehackernews.com/2024/08/fbi-and-cisa-warn-of-blacksuit.html
https://thehackernews.com/2024/08/fbi-and-cisa-warn-of-blacksuit.html
🔥16👍7😱3🤯2
Researchers have uncovered a sophisticated phishing campaign leveraging Google Drawings and WhatsApp links.
This attack cleverly uses trusted platforms to bypass security measures, making it more challenging to detect.
Read: https://thehackernews.com/2024/08/new-phishing-scam-uses-google-drawings.html
This attack cleverly uses trusted platforms to bypass security measures, making it more challenging to detect.
Read: https://thehackernews.com/2024/08/new-phishing-scam-uses-google-drawings.html
🔥12😁5👍3😱3🤯2
Microsoft is addressing two critical vulnerabilities in the Windows Update system.
These flaws could allow attackers to stage downgrade attacks, replacing current Windows files with older, vulnerable versions.
Read: https://thehackernews.com/2024/08/windows-downgrade-attack-risks-exposing.html
These flaws could allow attackers to stage downgrade attacks, replacing current Windows files with older, vulnerable versions.
Read: https://thehackernews.com/2024/08/windows-downgrade-attack-risks-exposing.html
😁15🤯10🔥8👍6
SANS Network Security 2024 is happening this September in Las Vegas!
This event is crucial for staying ahead of cybersecurity threats and advancements.
It features 45+ courses, 40+ GIAC certifications, and AI-focused keynotes by Daniel Miessler.
Register now: https://thehackernews.com/2024/08/unlock-future-of-cybersecurity.html
Don't miss out on this opportunity to enhance your cybersecurity skills!
This event is crucial for staying ahead of cybersecurity threats and advancements.
It features 45+ courses, 40+ GIAC certifications, and AI-focused keynotes by Daniel Miessler.
Register now: https://thehackernews.com/2024/08/unlock-future-of-cybersecurity.html
Don't miss out on this opportunity to enhance your cybersecurity skills!
👍17😱5🔥2
A new "0.0.0.0 Day" vulnerability, existing for 18 years, affects major web browsers (Chrome, Firefox, Safari) on MacOS and Linux devices.
This flaw could let malicious sites access local services.
Read: https://thehackernews.com/2024/08/0000-day-18-year-old-browser.html
This flaw could let malicious sites access local services.
Read: https://thehackernews.com/2024/08/0000-day-18-year-old-browser.html
🤯38🔥14😱7👍6😁5⚡1
Relying only on Automated Security Validation (ASV) is insufficient for full protection against cyber threats. While ASV identifies and validates vulnerabilities, it must be integrated with broader threat management strategies for complete security.
Learn how combining ASV with Continuous Threat Exposure Management (CTEM) enhances cybersecurity efficiency and effectiveness.
Read: https://thehackernews.com/2024/08/automated-security-validation-one-very.html
Learn how combining ASV with Continuous Threat Exposure Management (CTEM) enhances cybersecurity efficiency and effectiveness.
Read: https://thehackernews.com/2024/08/automated-security-validation-one-very.html
👍20
North Korea-linked threat actor Kimsuky has launched new attacks targeting university staff and researchers.
Kimsuky uses spear-phishing campaigns to deploy custom tools and gain persistent access to compromised systems.
Read: https://thehackernews.com/2024/08/university-professors-targeted-by-north.html
Kimsuky uses spear-phishing campaigns to deploy custom tools and gain persistent access to compromised systems.
Read: https://thehackernews.com/2024/08/university-professors-targeted-by-north.html
🤔18👍4👏2😁1
U.S. cybersecurity agency CISA warns of hackers exploiting Cisco's legacy Smart Install (SMI) feature that could lead to unauthorized access to sensitive data.
Learn more: https://thehackernews.com/2024/08/cisa-warns-of-hackers-exploiting-legacy.html
Learn more: https://thehackernews.com/2024/08/cisa-warns-of-hackers-exploiting-legacy.html
🔥16👍6😁1
U.S. DoJ charges a Nashville man for running a "laptop farm" to help North Koreans get remote IT jobs in the U.S. and U.K., fraudulently obtaining over $250,000 and causing companies significant losses.
Read: https://thehackernews.com/2024/08/doj-charges-nashville-man-for-helping.html
Read: https://thehackernews.com/2024/08/doj-charges-nashville-man-for-helping.html
👍17🤔11🤯3😁2
Celebrate SANS Institute's 35th Anniversary with a $1700 Complimentary Cyber Bundle at Network Security 2024! 🎉
Register for in-person training and get a bonus SANS course (AIS247), OnDemand bundle, and a @Night pass to the AI Cybersecurity Summit (Sept 8-9).
Don't miss out: https://thn.news/net-sec-2024
Register for in-person training and get a bonus SANS course (AIS247), OnDemand bundle, and a @Night pass to the AI Cybersecurity Summit (Sept 8-9).
Don't miss out: https://thn.news/net-sec-2024
www.sans.org
NETWORK SECURITY 2024 | SANS Institute
Experience the excitement of SANS live training under the dazzling lights of Las Vegas! When you attend in-person, unlock all-access offerings from hands-on workshops, to AI villages, CTFs and more that await you.
🤔11👍4😱3👏1
Cybersecurity researchers uncovered vulnerabilities in Sonos smart speakers that could allow remote eavesdropping.
The weaknesses allow attackers to execute remote code and covertly capture audio, highlighting the critical need for robust security in IoT devices.
These flaws, impacting devices pre-dating the Sonos S2 release 15.9, put users' privacy at risk.
Learn more: https://thehackernews.com/2024/08/new-flaws-in-sonos-smart-speakers-allow.html
The weaknesses allow attackers to execute remote code and covertly capture audio, highlighting the critical need for robust security in IoT devices.
These flaws, impacting devices pre-dating the Sonos S2 release 15.9, put users' privacy at risk.
Learn more: https://thehackernews.com/2024/08/new-flaws-in-sonos-smart-speakers-allow.html
🔥16👍9🤯2
Microsoft has disclosed four security flaws in OpenVPN that could be chained to enable RCE and local privilege escalation.
These vulnerabilities can lead to full control over targeted endpoints, risking data breaches and system compromise.
Read: https://thehackernews.com/2024/08/microsoft-reveals-four-openvpn-flaws.html
These vulnerabilities can lead to full control over targeted endpoints, risking data breaches and system compromise.
Read: https://thehackernews.com/2024/08/microsoft-reveals-four-openvpn-flaws.html
🔥19🤯17👍10😱4😁3⚡1
Microsoft reveals a new unpatched vulnerability in Office (CVE-2024-38200) that could expose sensitive data to malicious actors.
It affects multiple Office versions and could be exploited via web-based attacks, making it a significant threat.
While a formal patch is expected soon, Microsoft has already rolled out an alternative fix.
Read: https://thehackernews.com/2024/08/microsoft-warns-of-unpatched-office.html
It affects multiple Office versions and could be exploited via web-based attacks, making it a significant threat.
While a formal patch is expected soon, Microsoft has already rolled out an alternative fix.
Read: https://thehackernews.com/2024/08/microsoft-warns-of-unpatched-office.html
👍25⚡3🤯1