AitM phishing attacks are bypassing MFA, EDR, and email filters with alarming success. These attacks hijack live sessions, giving attackers control of critical accounts. Is your business ready?
Review your security protocols now: https://thehackernews.com/2024/08/how-to-stop-aitm-phishing-attack.html
Review your security protocols now: https://thehackernews.com/2024/08/how-to-stop-aitm-phishing-attack.html
π9π€5π4π€―4π₯3β‘1
A critical security flaw in Atlassian Confluence has been exploited for cryptocurrency mining. This vulnerability, CVE-2023-22527, allows unauthorized access, leading to potential severe financial and operational damage.
Read: https://thehackernews.com/2024/08/atlassian-confluence-vulnerability.html
Read: https://thehackernews.com/2024/08/atlassian-confluence-vulnerability.html
π7π5π€5π₯3β‘1
Chinese-speaking users are the target of a sophisticated cyberattack involving Cobalt Strike. The attackers used phishing emails with malicious ZIP files, initiating a stealthy infection that compromised systems for over two weeks.
Read: https://thehackernews.com/2024/08/new-cyberattack-targets-chinese.html
Read: https://thehackernews.com/2024/08/new-cyberattack-targets-chinese.html
π11π€―4
North Korean threat actors are publishing malicious packages on the npm registry targeting developers and stealing #cryptocurrency.
Read: https://thehackernews.com/2024/08/north-korean-hackers-target-developers.html
It's time to double-check your dependencies! Be proactive in securing your development environment.
Read: https://thehackernews.com/2024/08/north-korean-hackers-target-developers.html
It's time to double-check your dependencies! Be proactive in securing your development environment.
π17π€―7π€2
SANS Institute has released a new strategy guide highlighting a 50% rise in ransomware attacks on Industrial Control Systems (ICS) in 2023. The guide details five critical controls essential for safeguarding ICS environments.
Read: https://thehackernews.com/2024/08/sans-institute-unveils-critical.html
Read: https://thehackernews.com/2024/08/sans-institute-unveils-critical.html
π12π2
Iranian threat group GreenCharlie is ramping up phishing attacks, targeting U.S. political campaigns with new network infrastructure.
Read: https://thehackernews.com/2024/08/iranian-hackers-set-up-new-network-to.html
Stay vigilant, regularly update your security protocols, and educate your teams on the latest phishing tactics.
Read: https://thehackernews.com/2024/08/iranian-hackers-set-up-new-network-to.html
Stay vigilant, regularly update your security protocols, and educate your teams on the latest phishing tactics.
π11π6π€4π±4β‘3
A new #malware campaign is exploiting #GoogleSheets as a command-and-control (C2) tool, targeting over 70 global organizations across various sectors. The attackers, posing as tax authorities, deploy the Voldemort malware to steal data.
Read more: https://thehackernews.com/2024/08/cyberattackers-exploit-google-sheets.html
Read more: https://thehackernews.com/2024/08/cyberattackers-exploit-google-sheets.html
π24π€11β‘4
A critical zero-day vulnerability in Google Chrome has been exploited by North Korean actors to deploy the FudModule rootkit.
#Microsoft links the attack to a Lazarus Group subgroup, notorious for advanced cyber campaigns.
https://thehackernews.com/2024/08/north-korean-hackers-deploy-fudmodule.html
#Microsoft links the attack to a Lazarus Group subgroup, notorious for advanced cyber campaigns.
https://thehackernews.com/2024/08/north-korean-hackers-deploy-fudmodule.html
π₯34π14π10π€5π2
Roblox developers targeted by malicious npm packages mimicking popular libraries. Attackers employed techniques like brandjacking and starjacking to make the packages seem legitimate, leading to significant security breaches.
Read: https://thehackernews.com/2024/09/malicious-npm-packages-mimicking.html
Read: https://thehackernews.com/2024/09/malicious-npm-packages-mimicking.html
π€―25π10π8π4β‘3π€3
RansomHub has compromised data from over 210 victims across critical sectors, using double extortion and intermittent encryption to challenge cybersecurity teams.
Learn more: https://thehackernews.com/2024/09/ransomhub-ransomware-group-targets-210.html
Learn more: https://thehackernews.com/2024/09/ransomhub-ransomware-group-targets-210.html
π₯15π6π5
A former employee attempted to extort $750,000 from his previous employer by threatening to shut down servers and delete backups. He faces 35 years for hacking, sabotage, and wire fraud charges.
Learn more: https://thehackernews.com/2024/09/ex-engineer-charged-in-missouri-for.html
Learn more: https://thehackernews.com/2024/09/ex-engineer-charged-in-missouri-for.html
π10π9π5π€5π₯3π€―1
FBI and CISA issue urgent ransomware advisory; CISOs stress adopting phishing-resistant MFA to counter AI-driven cyber threats.
Donβt wait until itβs too late. Act now to protect your organization
Read on > https://thehackernews.com/2024/09/next-generation-attacks-same-targets.html
Donβt wait until itβs too late. Act now to protect your organization
Read on > https://thehackernews.com/2024/09/next-generation-attacks-same-targets.html
π±14π3π€1
π AI is set to transform how we manage vulnerabilities.
Join this online webinar to discover how AI is revolutionizing vulnerability management by identifying, prioritizing, and remediating security risks faster and more efficiently.
π₯ Watch now: https://thehackernews.com/2024/09/webinar-learn-to-boost-cybersecurity.html
Join this online webinar to discover how AI is revolutionizing vulnerability management by identifying, prioritizing, and remediating security risks faster and more efficiently.
π₯ Watch now: https://thehackernews.com/2024/09/webinar-learn-to-boost-cybersecurity.html
π11π6π3π€1
Eight vulnerabilities have been identified in Microsoft apps for macOS (like Outlook, Teams, and OneNote) that could allow attackers to bypass security controls.
Read details here: https://thehackernews.com/2024/09/new-flaws-in-microsoft-macos-apps-could.html
Read details here: https://thehackernews.com/2024/09/new-flaws-in-microsoft-macos-apps-could.html
π14π8π±6π₯4π€―4π€3
Brazil faces a new wave of cyberattacks targeting mobile users with Rocinante, an Android banking trojan.
Read: https://thehackernews.com/2024/09/rocinante-trojan-poses-as-banking-apps.html
Act nowβeducate your teams about this threat and review your security protocols.
Read: https://thehackernews.com/2024/09/rocinante-trojan-poses-as-banking-apps.html
Act nowβeducate your teams about this threat and review your security protocols.
π19π7π₯5π€4π€―4
A new #ransomware variant, Cicada3301, is making headlines for its advanced tactics and SMB focus. Cicada3301 not only targets Windows and #Linux/ESXi systems but also embeds compromised user credentials for further exploitation.
https://thehackernews.com/2024/09/new-rust-based-ransomware-cicada3301.html
https://thehackernews.com/2024/09/new-rust-based-ransomware-cicada3301.html
π±21π5π3β‘1π€―1
A hacktivist group called Head Mare has been linked to sophisticated cyberattacks targeting organizations in Russia and Belarus. Victims span industries like government, energy, and manufacturing.
Read: https://thehackernews.com/2024/09/hacktivists-exploits-winrar.html
Read: https://thehackernews.com/2024/09/hacktivists-exploits-winrar.html
π₯19π€5π2
A $40B data analytics company suffered a major breach after a secret was accidentally shared in a Jira comment, underscoring the urgent need to rethink secret management as they spread across tools like Slack and Confluence, doubling the attack surface.
https://thehackernews.com/2024/09/secrets-exposed-why-your-ciso-should.html
https://thehackernews.com/2024/09/secrets-exposed-why-your-ciso-should.html
π€20π₯7π3π2
A new #malware campaign is spoofing Palo Alto Networks' GlobalProtect VPN to deliver WikiLoader via SEO malvertising.
Learn more to update your defenses and stay ahead of these evolving threats: https://thehackernews.com/2024/09/hackers-use-fake-globalprotect-vpn.html
Learn more to update your defenses and stay ahead of these evolving threats: https://thehackernews.com/2024/09/hackers-use-fake-globalprotect-vpn.html
π16π5
Clearview AI has been hit with a β¬30.5M fine for scraping billions of facial images without consent. Dutch authorities are even investigating personal liability for Clearview's management.
Read: https://thehackernews.com/2024/09/clearview-ai-faces-305m-fine-for.html
Read: https://thehackernews.com/2024/09/clearview-ai-faces-305m-fine-for.html
π16π₯9π6π€―4
Zyxel has patched a critical #vulnerability (CVE-2024-7261) that allowed unauthenticated attackers to execute OS commands on certain routers and access points.
Learn more: https://thehackernews.com/2024/09/zyxel-patches-critical-os-command.html
Learn more: https://thehackernews.com/2024/09/zyxel-patches-critical-os-command.html
π15