β οΈ URGENT: Google has urgently patched a critical Chrome flaw, CVE-2024-7971, thatβs being actively exploited.
This #vulnerability could let attackers compromise your system via a malicious HTML page.
Details: https://thehackernews.com/2024/08/google-fixes-high-severity-chrome-flaw.html
Ensure your browser is updated now.
This #vulnerability could let attackers compromise your system via a malicious HTML page.
Details: https://thehackernews.com/2024/08/google-fixes-high-severity-chrome-flaw.html
Ensure your browser is updated now.
π22π6π€4π1
Discover how Zero-Trust Network Access (ZTNA) strengthens cybersecurity, reduces costs, and streamlines remote access.
Explore best practices for seamlessly integrating ZTNA into your existing security systems.
Read: https://thehackernews.com/expert-insights/2024/08/best-practices-for-integrating-ztna.html
Explore best practices for seamlessly integrating ZTNA into your existing security systems.
Read: https://thehackernews.com/expert-insights/2024/08/best-practices-for-integrating-ztna.html
π12π6
"ALBeast," a new vulnerability, puts 15,000 Amazon Web Services' (AWS) applications at risk by allowing attackers to bypass authentication through a flaw in AWS's Application Load Balancer (ALB).
Learn more: https://thehackernews.com/2024/08/new-albeast-vulnerability-exposes.html
Learn more: https://thehackernews.com/2024/08/new-albeast-vulnerability-exposes.html
π8π₯3π2π€2π1
A China-linked threat group, Velvet Ant, has exploited a vulnerability (CVE-2024-20399) in Cisco switches as zero-day to gain control and evade detection.
Read: https://thehackernews.com/2024/08/chinese-hackers-exploit-zero-day-cisco.html
Read: https://thehackernews.com/2024/08/chinese-hackers-exploit-zero-day-cisco.html
π9π5π₯2π2
SolarWinds has released a critical patch for its Web Help Desk (WHD) software to fix a flaw (CVE-2024-28987) that could allow unauthorized remote access.
If you're using versions before 12.8.3 Hotfix 2, it's crucial to update immediately to avoid potential breaches.
Learn more: https://thehackernews.com/2024/08/hardcoded-credential-vulnerability.html
If you're using versions before 12.8.3 Hotfix 2, it's crucial to update immediately to avoid potential breaches.
Learn more: https://thehackernews.com/2024/08/hardcoded-credential-vulnerability.html
π€―10π5π1π€1
A critical backdoor in MIFARE Classic cards allows attackers to clone them and access secure areas within minutes, threatening businesses reliant on these systems.
Learn more: https://thehackernews.com/2024/08/hardware-backdoor-discovered-in-rfid.html
Learn more: https://thehackernews.com/2024/08/hardware-backdoor-discovered-in-rfid.html
π12π₯6π€3π€―2β‘1
The U.S. has extradited and charged a key figure in the Karakurt cybercrime group, which has been stealing data, laundering ransom payments, and extorting victims since 2021.
Read: https://thehackernews.com/2024/08/latvian-hacker-extradited-to-us-for.html
Read: https://thehackernews.com/2024/08/latvian-hacker-extradited-to-us-for.html
π9π4
A new malware, Cthulhu Stealer, is targeting Apple macOS, stealing credentials and cryptocurrency wallets. Sold for $500 a month as part of a malware-as-a-service (MaaS) model, it disguises itself as legitimate software like CleanMyMac.
Read: https://thehackernews.com/2024/08/new-macos-malware-cthulhu-stealer.html
Read: https://thehackernews.com/2024/08/new-macos-malware-cthulhu-stealer.html
π€―12π7π3π₯2
Is your business continuity plan strong enough to survive a Microsoft 365 outage?
Learn how to secure your Microsoft 365 environment with advanced backup solutions, ensuring data resilience against cyberattacks and compliance risks.
Read: https://thehackernews.com/expert-insights/2024/08/how-to-modernize-your-microsoft-365.html
Learn how to secure your Microsoft 365 environment with advanced backup solutions, ensuring data resilience against cyberattacks and compliance risks.
Read: https://thehackernews.com/expert-insights/2024/08/how-to-modernize-your-microsoft-365.html
π8π5π€3
Ransomware evolvesβQilin's latest attack stole Google Chrome credentials by exploiting a Group Policy Object to run a PowerShell script at each login, exposing sensitive data.
Read: https://thehackernews.com/2024/08/new-qilin-ransomware-attack-uses-vpn.html
Read: https://thehackernews.com/2024/08/new-qilin-ransomware-attack-uses-vpn.html
π10π€3π€―1π±1
β‘ Imagine every essential cybersecurity tool at your fingertipsβunified in one intuitive platform, with 24/7 expert support.
Join our webinar for a no-nonsense demo & discover how to achieve total protection with an All-in-One solution.
Don't miss it: https://thehackernews.com/2024/08/webinar-experience-power-of-must-have.html
Join our webinar for a no-nonsense demo & discover how to achieve total protection with an All-in-One solution.
Don't miss it: https://thehackernews.com/2024/08/webinar-experience-power-of-must-have.html
π13π€4π€―2
New vulnerabilities emerge every hour. Discover how exposure management enhances cybersecurity, prioritizes vulnerabilities, and optimizes security efforts.
Learn steps for implementation: https://thehackernews.com/2024/08/focus-on-what-matters-most-exposure.html
Learn steps for implementation: https://thehackernews.com/2024/08/focus-on-what-matters-most-exposure.html
π10π€―5
PEAKLIGHT, a new memory-only dropper, is deploying malware on Windows systems via pirated movie files. It uses PowerShell scripts to install information stealers like Lumma Stealer and CryptBot.
Read: https://thehackernews.com/2024/08/new-peaklight-dropper-deployed-in.html
Read: https://thehackernews.com/2024/08/new-peaklight-dropper-deployed-in.html
π13π₯3π2
Iranian state-backed hackers, APT42, have been caught using WhatsApp to target high-profile individuals worldwide.
U.S. accuses Iran of election interference attempts.
Read: https://thehackernews.com/2024/08/meta-exposes-iranian-hacker-group.html
Stay one step aheadβknowledge is your best defense.
U.S. accuses Iran of election interference attempts.
Read: https://thehackernews.com/2024/08/meta-exposes-iranian-hacker-group.html
Stay one step aheadβknowledge is your best defense.
π12π₯8π€―4π3β‘1
CISA has added a new #vulnerability in Versa Director (CVE-2024-39717) to its Known Exploited Vulnerabilities catalog due to active exploitation.
This flaw lets attackers upload malicious files, posing a serious threat to organizations.
Read: https://thehackernews.com/2024/08/cisa-urges-federal-agencies-to-patch.html
This flaw lets attackers upload malicious files, posing a serious threat to organizations.
Read: https://thehackernews.com/2024/08/cisa-urges-federal-agencies-to-patch.html
π14π€9β‘1
'Sedexp' Linux malware identifiedβtargeting financial systems by hiding credit card skimmers. Sedexp leverages udev rules for persistence, triggering its malicious actions upon every system reboot.
Learn more: https://thehackernews.com/2024/08/new-linux-malware-sedexp-hides-credit.html
Learn more: https://thehackernews.com/2024/08/new-linux-malware-sedexp-hides-credit.html
π12π€5π₯2π±2β‘1π1
π₯ Telegram founder Pavel Durov has been arrested in France due to the platform's content moderation failures, which have been linked to widespread cybercrime and illegal activities.
Read details: https://thehackernews.com/2024/08/telegram-founder-pavel-durov-arrested.html
Read details: https://thehackernews.com/2024/08/telegram-founder-pavel-durov-arrested.html
π€―153π±45π€23π₯17π14π10π8β‘7
π¨ Researchers have uncovered NGate, a new Android malware that relays NFC payment data to attackers. Targeting Czech banks, it clones payment cards and withdraws funds from ATMs.
Read: https://thehackernews.com/2024/08/new-android-malware-ngate-steals-nfc.html
Read: https://thehackernews.com/2024/08/new-android-malware-ngate-steals-nfc.html
π₯17π4π€4β‘2
π¨ Two critical vulnerabilities have been discovered in the Traccar GPS tracking system, potentially allowing unauthenticated attackers to achieve remote code execution.
Read details: https://thehackernews.com/2024/08/critical-flaws-in-traccar-gps-system.html
Read details: https://thehackernews.com/2024/08/critical-flaws-in-traccar-gps-system.html
π15β‘4π€―4π2π₯1
Researchers uncover 20+ vulnerabilities in ML software supply chains, posing serious security risks to MLOps platforms.
These flaws could lead to arbitrary code execution or even allow malicious datasets to infiltrate systems, affecting the integrity of AI-driven operations.
Read: https://thehackernews.com/2024/08/researchers-identify-over-20-supply.html
These flaws could lead to arbitrary code execution or even allow malicious datasets to infiltrate systems, affecting the integrity of AI-driven operations.
Read: https://thehackernews.com/2024/08/researchers-identify-over-20-supply.html
π14π€―6π€4β‘2π2
Tools like Slack & Teams are great for daily use, but they weren't built with a security-first approach. Protect sensitive data with SalaX Secure Collaboration 2024, offering end-to-end encryption for secure business communication.
Read: https://thehackernews.com/2024/08/unpacking-slack-hacks-6-ways-to-protect.html
Read: https://thehackernews.com/2024/08/unpacking-slack-hacks-6-ways-to-protect.html
π16β‘4π₯1