New malware PG_MEM targets PostgreSQL databases with weak passwords, exploiting features to mine cryptocurrency and potentially control servers.
Once inside, attackers can deploy malware, steal data, and even control the server.
Read: https://thehackernews.com/2024/08/new-malware-pgmem-targets-postgresql.html
Once inside, attackers can deploy malware, steal data, and even control the server.
Read: https://thehackernews.com/2024/08/new-malware-pgmem-targets-postgresql.html
π14π±5
#GitHub has released critical fixes for 3 flaws in Enterprise Server, including CVE-2024-6800 (CVSS 9.5).
This flaw could allow attackers to gain admin privileges, posing serious risks to organizations using SAML SSO.
Details: https://thehackernews.com/2024/08/github-patches-critical-security-flaw.html
This flaw could allow attackers to gain admin privileges, posing serious risks to organizations using SAML SSO.
Details: https://thehackernews.com/2024/08/github-patches-critical-security-flaw.html
π8π4π2
π¨ A critical flaw in LiteSpeed Cache plugin could allow attackers to gain admin access to WordPress sites.
This vulnerability (CVE-2024-28000) affects over 5 million sites, leaving businesses exposed to severe security risks.
Read: https://thehackernews.com/2024/08/critical-flaw-in-wordpress-litespeed.html
This vulnerability (CVE-2024-28000) affects over 5 million sites, leaving businesses exposed to severe security risks.
Read: https://thehackernews.com/2024/08/critical-flaw-in-wordpress-litespeed.html
π10π€―5π4
β οΈ URGENT: Google has urgently patched a critical Chrome flaw, CVE-2024-7971, thatβs being actively exploited.
This #vulnerability could let attackers compromise your system via a malicious HTML page.
Details: https://thehackernews.com/2024/08/google-fixes-high-severity-chrome-flaw.html
Ensure your browser is updated now.
This #vulnerability could let attackers compromise your system via a malicious HTML page.
Details: https://thehackernews.com/2024/08/google-fixes-high-severity-chrome-flaw.html
Ensure your browser is updated now.
π22π6π€4π1
Discover how Zero-Trust Network Access (ZTNA) strengthens cybersecurity, reduces costs, and streamlines remote access.
Explore best practices for seamlessly integrating ZTNA into your existing security systems.
Read: https://thehackernews.com/expert-insights/2024/08/best-practices-for-integrating-ztna.html
Explore best practices for seamlessly integrating ZTNA into your existing security systems.
Read: https://thehackernews.com/expert-insights/2024/08/best-practices-for-integrating-ztna.html
π12π6
"ALBeast," a new vulnerability, puts 15,000 Amazon Web Services' (AWS) applications at risk by allowing attackers to bypass authentication through a flaw in AWS's Application Load Balancer (ALB).
Learn more: https://thehackernews.com/2024/08/new-albeast-vulnerability-exposes.html
Learn more: https://thehackernews.com/2024/08/new-albeast-vulnerability-exposes.html
π8π₯3π2π€2π1
A China-linked threat group, Velvet Ant, has exploited a vulnerability (CVE-2024-20399) in Cisco switches as zero-day to gain control and evade detection.
Read: https://thehackernews.com/2024/08/chinese-hackers-exploit-zero-day-cisco.html
Read: https://thehackernews.com/2024/08/chinese-hackers-exploit-zero-day-cisco.html
π9π5π₯2π2
SolarWinds has released a critical patch for its Web Help Desk (WHD) software to fix a flaw (CVE-2024-28987) that could allow unauthorized remote access.
If you're using versions before 12.8.3 Hotfix 2, it's crucial to update immediately to avoid potential breaches.
Learn more: https://thehackernews.com/2024/08/hardcoded-credential-vulnerability.html
If you're using versions before 12.8.3 Hotfix 2, it's crucial to update immediately to avoid potential breaches.
Learn more: https://thehackernews.com/2024/08/hardcoded-credential-vulnerability.html
π€―10π5π1π€1
A critical backdoor in MIFARE Classic cards allows attackers to clone them and access secure areas within minutes, threatening businesses reliant on these systems.
Learn more: https://thehackernews.com/2024/08/hardware-backdoor-discovered-in-rfid.html
Learn more: https://thehackernews.com/2024/08/hardware-backdoor-discovered-in-rfid.html
π12π₯6π€3π€―2β‘1
The U.S. has extradited and charged a key figure in the Karakurt cybercrime group, which has been stealing data, laundering ransom payments, and extorting victims since 2021.
Read: https://thehackernews.com/2024/08/latvian-hacker-extradited-to-us-for.html
Read: https://thehackernews.com/2024/08/latvian-hacker-extradited-to-us-for.html
π9π4
A new malware, Cthulhu Stealer, is targeting Apple macOS, stealing credentials and cryptocurrency wallets. Sold for $500 a month as part of a malware-as-a-service (MaaS) model, it disguises itself as legitimate software like CleanMyMac.
Read: https://thehackernews.com/2024/08/new-macos-malware-cthulhu-stealer.html
Read: https://thehackernews.com/2024/08/new-macos-malware-cthulhu-stealer.html
π€―12π7π3π₯2
Is your business continuity plan strong enough to survive a Microsoft 365 outage?
Learn how to secure your Microsoft 365 environment with advanced backup solutions, ensuring data resilience against cyberattacks and compliance risks.
Read: https://thehackernews.com/expert-insights/2024/08/how-to-modernize-your-microsoft-365.html
Learn how to secure your Microsoft 365 environment with advanced backup solutions, ensuring data resilience against cyberattacks and compliance risks.
Read: https://thehackernews.com/expert-insights/2024/08/how-to-modernize-your-microsoft-365.html
π8π5π€3
Ransomware evolvesβQilin's latest attack stole Google Chrome credentials by exploiting a Group Policy Object to run a PowerShell script at each login, exposing sensitive data.
Read: https://thehackernews.com/2024/08/new-qilin-ransomware-attack-uses-vpn.html
Read: https://thehackernews.com/2024/08/new-qilin-ransomware-attack-uses-vpn.html
π10π€3π€―1π±1
β‘ Imagine every essential cybersecurity tool at your fingertipsβunified in one intuitive platform, with 24/7 expert support.
Join our webinar for a no-nonsense demo & discover how to achieve total protection with an All-in-One solution.
Don't miss it: https://thehackernews.com/2024/08/webinar-experience-power-of-must-have.html
Join our webinar for a no-nonsense demo & discover how to achieve total protection with an All-in-One solution.
Don't miss it: https://thehackernews.com/2024/08/webinar-experience-power-of-must-have.html
π13π€4π€―2
New vulnerabilities emerge every hour. Discover how exposure management enhances cybersecurity, prioritizes vulnerabilities, and optimizes security efforts.
Learn steps for implementation: https://thehackernews.com/2024/08/focus-on-what-matters-most-exposure.html
Learn steps for implementation: https://thehackernews.com/2024/08/focus-on-what-matters-most-exposure.html
π10π€―5
PEAKLIGHT, a new memory-only dropper, is deploying malware on Windows systems via pirated movie files. It uses PowerShell scripts to install information stealers like Lumma Stealer and CryptBot.
Read: https://thehackernews.com/2024/08/new-peaklight-dropper-deployed-in.html
Read: https://thehackernews.com/2024/08/new-peaklight-dropper-deployed-in.html
π13π₯3π2
Iranian state-backed hackers, APT42, have been caught using WhatsApp to target high-profile individuals worldwide.
U.S. accuses Iran of election interference attempts.
Read: https://thehackernews.com/2024/08/meta-exposes-iranian-hacker-group.html
Stay one step aheadβknowledge is your best defense.
U.S. accuses Iran of election interference attempts.
Read: https://thehackernews.com/2024/08/meta-exposes-iranian-hacker-group.html
Stay one step aheadβknowledge is your best defense.
π12π₯8π€―4π3β‘1
CISA has added a new #vulnerability in Versa Director (CVE-2024-39717) to its Known Exploited Vulnerabilities catalog due to active exploitation.
This flaw lets attackers upload malicious files, posing a serious threat to organizations.
Read: https://thehackernews.com/2024/08/cisa-urges-federal-agencies-to-patch.html
This flaw lets attackers upload malicious files, posing a serious threat to organizations.
Read: https://thehackernews.com/2024/08/cisa-urges-federal-agencies-to-patch.html
π14π€9β‘1
'Sedexp' Linux malware identifiedβtargeting financial systems by hiding credit card skimmers. Sedexp leverages udev rules for persistence, triggering its malicious actions upon every system reboot.
Learn more: https://thehackernews.com/2024/08/new-linux-malware-sedexp-hides-credit.html
Learn more: https://thehackernews.com/2024/08/new-linux-malware-sedexp-hides-credit.html
π12π€5π₯2π±2β‘1π1
π₯ Telegram founder Pavel Durov has been arrested in France due to the platform's content moderation failures, which have been linked to widespread cybercrime and illegal activities.
Read details: https://thehackernews.com/2024/08/telegram-founder-pavel-durov-arrested.html
Read details: https://thehackernews.com/2024/08/telegram-founder-pavel-durov-arrested.html
π€―153π±45π€23π₯17π14π10π8β‘7
π¨ Researchers have uncovered NGate, a new Android malware that relays NFC payment data to attackers. Targeting Czech banks, it clones payment cards and withdraws funds from ATMs.
Read: https://thehackernews.com/2024/08/new-android-malware-ngate-steals-nfc.html
Read: https://thehackernews.com/2024/08/new-android-malware-ngate-steals-nfc.html
π₯17π4π€4β‘2