Gartner's latest CTEM report highlights Adversarial Exposure Validation (AEV) as vital for cybersecurity, combining breach simulation with pentesting to streamline security assessments, automate testing, and enhance resilience.
Learn more: https://thehackernews.com/2024/08/ctem-in-spotlight-how-gartners-new.html
Learn more: https://thehackernews.com/2024/08/ctem-in-spotlight-how-gartners-new.html
π13π€4
A newly discovered zero-day flaw in Versa Director has been exploited by the infamous Volt Typhoon group, enabling them to inject undetected malicious code, bypassing traditional security measures.
Learn more: https://thehackernews.com/2024/08/chinese-volt-typhoon-exploits-versa.html
Learn more: https://thehackernews.com/2024/08/chinese-volt-typhoon-exploits-versa.html
π€13π5
π¨ MacOS Users Beware: A new variant of the HZ RAT backdoor has surfaced, and itβs now targeting users of popular Chinese messaging apps like DingTalk and WeChat.
This #malware doesn't just sit quietlyβit connects to a command-and-control server, giving attackers the power to execute commands and steal your sensitive information.
β οΈ Why it matters: If you're using these apps on a Mac, you could be at risk. Ensure your system is secure, and always be vigilant about the software you install.
Read: https://thehackernews.com/2024/08/macos-version-of-hz-rat-backdoor.html
P.S. Share this with your network to keep them informed.
This #malware doesn't just sit quietlyβit connects to a command-and-control server, giving attackers the power to execute commands and steal your sensitive information.
β οΈ Why it matters: If you're using these apps on a Mac, you could be at risk. Ensure your system is secure, and always be vigilant about the software you install.
Read: https://thehackernews.com/2024/08/macos-version-of-hz-rat-backdoor.html
P.S. Share this with your network to keep them informed.
π€15π9π₯7
A critical vulnerability (CVE-2024-6386) has been discovered in the WPML WordPress plugin.
With a CVSS score of 9.9, this flaw could allow attackers to execute code remotely, putting over a million websites at risk.
The vulnerability affects all versions before 4.6.13, released on August 20, 2024. Immediate updates are essential.
Read: https://thehackernews.com/2024/08/critical-wpml-plugin-flaw-exposes.html
Ensure your site is secureβupdate the WPML plugin now.
With a CVSS score of 9.9, this flaw could allow attackers to execute code remotely, putting over a million websites at risk.
The vulnerability affects all versions before 4.6.13, released on August 20, 2024. Immediate updates are essential.
Read: https://thehackernews.com/2024/08/critical-wpml-plugin-flaw-exposes.html
Ensure your site is secureβupdate the WPML plugin now.
π₯15π5π±4π2π€―1
CISA has added a critical Apache OFBiz flaw, CVE-2024-38856, to its Known Exploited Vulnerabilities list. It allows RCE attacks, putting countless businesses at serious risk.
https://thehackernews.com/2024/08/cisa-flags-critical-apache-ofbiz-flaw.html
PoC exploits are already public, so update your systems immediately.
https://thehackernews.com/2024/08/cisa-flags-critical-apache-ofbiz-flaw.html
PoC exploits are already public, so update your systems immediately.
π14π€4π±3
π¨ Alert: BlackByte ransomware is exploiting a recently patched VMware ESXi vulnerability (CVE-2024-37085) to escalate privileges and compromise systems.
But that's not all... they're also using vulnerable drivers to disable security measures, making this attack especially dangerous.
Read: https://thehackernews.com/2024/08/blackbyte-ransomware-exploits-vmware.html
P.S. If this was helpful, consider resharing β»οΈ to help others stay protected!
But that's not all... they're also using vulnerable drivers to disable security measures, making this attack especially dangerous.
Read: https://thehackernews.com/2024/08/blackbyte-ransomware-exploits-vmware.html
P.S. If this was helpful, consider resharing β»οΈ to help others stay protected!
π26π€6π±5π1π€―1
A South Korea-aligned cyber espionage group, APT-C-60, has exploited a critical flaw in Kingsoft WPS Office to deploy the SpyGlace backdoor.
Read: https://thehackernews.com/2024/08/apt-c-60-group-exploit-wps-office-flaw.html
Ensure your security teams are updated on CVE-2024-7262 and CVE-2024-7263.
Read: https://thehackernews.com/2024/08/apt-c-60-group-exploit-wps-office-flaw.html
Ensure your security teams are updated on CVE-2024-7262 and CVE-2024-7263.
π14π6π4π₯1
π¨ A critical vulnerability in Fortra's FileCatalyst Workflow, tracked as CVE-2024-6633, exposes users to remote admin access attacks.
Severity Level: CVSS 9.8
Learn more: https://thehackernews.com/2024/08/fortra-issues-patch-for-high-risk.html
If you havenβt patched your system yet, do it NOW.
Severity Level: CVSS 9.8
Learn more: https://thehackernews.com/2024/08/fortra-issues-patch-for-high-risk.html
If you havenβt patched your system yet, do it NOW.
π10π€7π4π₯4
Pavel Durov, CEO of #Telegram, has been formally charged by French prosecutors for facilitating criminal activities on the platform.
Learn about the investigation and its implications: https://thehackernews.com/2024/08/french-authorities-charge-telegram-ceo.html
Learn about the investigation and its implications: https://thehackernews.com/2024/08/french-authorities-charge-telegram-ceo.html
π€―69π±19π€15π12
π¨ A severe vulnerability in AVTECH IP cameras (CVE-2024-7029) is now being weaponized by hackers, creating a botnet. Unpatched & easily exploitable, this flaw poses a massive risk to commercial, financial, and healthcare sectors.
Read: https://thehackernews.com/2024/08/unpatched-avtech-ip-camera-flaw.html
Read: https://thehackernews.com/2024/08/unpatched-avtech-ip-camera-flaw.html
π13π€―4π2
π U.S. agencies have identified an Iranian hacking group, Pioneer Kitten, as the force behind a wave of ransomware attacks.
Key sectors like education, healthcare, and defense are under fire, with sensitive data hanging in the balance.
Read: https://thehackernews.com/2024/08/us-agencies-warn-of-iranian-hacking.html
Key sectors like education, healthcare, and defense are under fire, with sensitive data hanging in the balance.
Read: https://thehackernews.com/2024/08/us-agencies-warn-of-iranian-hacking.html
π€16π11π€―4π₯3β‘2π2
π‘οΈ Cybersecurity experts weigh in on why the SBOM is not enough.
While the SBOM is a foundational first step towards bringing transparency to the internal components of business-critical software, it is, at its core, just a simple list of ingredients.
Learn how organizations can go beyond the SBOM and adopt a more comprehensive software risk assessment in the latest webinar from ReversingLabs: https://thn.news/dont-stop-sbom
While the SBOM is a foundational first step towards bringing transparency to the internal components of business-critical software, it is, at its core, just a simple list of ingredients.
Learn how organizations can go beyond the SBOM and adopt a more comprehensive software risk assessment in the latest webinar from ReversingLabs: https://thn.news/dont-stop-sbom
ReversingLabs
Take Your Software Security to the Next Level: Donβt Stop at the SBOM | ReversingLabs
In this webinar, you'll learn how your business can go beyond the SBOM to effectively manage software supply chain risk.
π₯9π3
Researchers uncovered attacks exploiting Safari and Chrome flaws, linked to Russian APT29, using watering hole tactics on Mongolian government sites.
Read: https://thehackernews.com/2024/08/russian-hackers-exploit-safari-and.html
Read: https://thehackernews.com/2024/08/russian-hackers-exploit-safari-and.html
π€11π4π1
APT32 has been exploiting spear-phishing to infiltrate and compromise a Vietnamese human rights organization for over four years. They deployed Cobalt Strike Beacons to steal sensitive data, including Google Chrome cookies and personal information.
Read: https://thehackernews.com/2024/08/vietnamese-human-rights-group-targeted.html
Read: https://thehackernews.com/2024/08/vietnamese-human-rights-group-targeted.html
π12π±3π₯2π2
AitM phishing attacks are bypassing MFA, EDR, and email filters with alarming success. These attacks hijack live sessions, giving attackers control of critical accounts. Is your business ready?
Review your security protocols now: https://thehackernews.com/2024/08/how-to-stop-aitm-phishing-attack.html
Review your security protocols now: https://thehackernews.com/2024/08/how-to-stop-aitm-phishing-attack.html
π9π€5π4π€―4π₯3β‘1
A critical security flaw in Atlassian Confluence has been exploited for cryptocurrency mining. This vulnerability, CVE-2023-22527, allows unauthorized access, leading to potential severe financial and operational damage.
Read: https://thehackernews.com/2024/08/atlassian-confluence-vulnerability.html
Read: https://thehackernews.com/2024/08/atlassian-confluence-vulnerability.html
π7π5π€5π₯3β‘1
Chinese-speaking users are the target of a sophisticated cyberattack involving Cobalt Strike. The attackers used phishing emails with malicious ZIP files, initiating a stealthy infection that compromised systems for over two weeks.
Read: https://thehackernews.com/2024/08/new-cyberattack-targets-chinese.html
Read: https://thehackernews.com/2024/08/new-cyberattack-targets-chinese.html
π11π€―4
North Korean threat actors are publishing malicious packages on the npm registry targeting developers and stealing #cryptocurrency.
Read: https://thehackernews.com/2024/08/north-korean-hackers-target-developers.html
It's time to double-check your dependencies! Be proactive in securing your development environment.
Read: https://thehackernews.com/2024/08/north-korean-hackers-target-developers.html
It's time to double-check your dependencies! Be proactive in securing your development environment.
π17π€―7π€2
SANS Institute has released a new strategy guide highlighting a 50% rise in ransomware attacks on Industrial Control Systems (ICS) in 2023. The guide details five critical controls essential for safeguarding ICS environments.
Read: https://thehackernews.com/2024/08/sans-institute-unveils-critical.html
Read: https://thehackernews.com/2024/08/sans-institute-unveils-critical.html
π12π2
Iranian threat group GreenCharlie is ramping up phishing attacks, targeting U.S. political campaigns with new network infrastructure.
Read: https://thehackernews.com/2024/08/iranian-hackers-set-up-new-network-to.html
Stay vigilant, regularly update your security protocols, and educate your teams on the latest phishing tactics.
Read: https://thehackernews.com/2024/08/iranian-hackers-set-up-new-network-to.html
Stay vigilant, regularly update your security protocols, and educate your teams on the latest phishing tactics.
π11π6π€4π±4β‘3
A new #malware campaign is exploiting #GoogleSheets as a command-and-control (C2) tool, targeting over 70 global organizations across various sectors. The attackers, posing as tax authorities, deploy the Voldemort malware to steal data.
Read more: https://thehackernews.com/2024/08/cyberattackers-exploit-google-sheets.html
Read more: https://thehackernews.com/2024/08/cyberattackers-exploit-google-sheets.html
π24π€11β‘4