π₯ A SonicWall #vulnerability (CVE-2024-40766) is under active exploitation.
This critical flaw allows attackers to bypass access controls and potentially crash firewalls, compromising business operations. Don't wait.
https://thehackernews.com/2024/09/sonicwall-urges-users-to-patch-critical.html
Patch now or risk falling victim.
This critical flaw allows attackers to bypass access controls and potentially crash firewalls, compromising business operations. Don't wait.
https://thehackernews.com/2024/09/sonicwall-urges-users-to-patch-critical.html
Patch now or risk falling victim.
π19π7β‘2π₯2π±1
Two men were indicted for running WWH Club, a dark web marketplace with 350,000+ users selling stolen personal data and hacking services. Despite law enforcement, WWH Club remains active, underscoring the resilience of cybercrime.
Read: https://thehackernews.com/2024/09/fbi-cracks-down-on-dark-web-marketplace.html
Read: https://thehackernews.com/2024/09/fbi-cracks-down-on-dark-web-marketplace.html
π12π₯7π€5π±4β‘2π2
North Korean hackers are targeting developers on #LinkedIn with fake job offers, using coding tests to infect macOS. Once inside, they steal credentials, access code, and drain crypto funds. Social engineering remains a serious cyber threat
Read: https://thehackernews.com/2024/09/north-korean-threat-actors-deploy.html
Read: https://thehackernews.com/2024/09/north-korean-threat-actors-deploy.html
π€―35π₯16π14π12π7π±5π€3β‘2
U.S. and allies link Russian hacking group Cadet Blizzard to GRUβs 161st Center.
Targets: NATO, EU critical infrastructure, aiming to sabotage and steal data with WhisperGate malware.
Learn more: https://thehackernews.com/2024/09/us-offers-10-million-for-info-on.html
Targets: NATO, EU critical infrastructure, aiming to sabotage and steal data with WhisperGate malware.
Learn more: https://thehackernews.com/2024/09/us-offers-10-million-for-info-on.html
π16π€10π6π₯1
π¨ A new cyber espionage threat, TIDRONE, is targeting drone manufacturers in Taiwanβpotentially compromising military operations.
TIDRONE uses custom malware like CXCLNT and CLNTEND to exploit system vulnerabilities and steal sensitive data.
https://thehackernews.com/2024/09/tidrone-espionage-group-targets-taiwan.html
TIDRONE uses custom malware like CXCLNT and CLNTEND to exploit system vulnerabilities and steal sensitive data.
https://thehackernews.com/2024/09/tidrone-espionage-group-targets-taiwan.html
π16π3π₯1π1π€1
β οΈ Progress Software has released security updates for a critical vulnerability (CVE-2024-7591) in LoadMaster & Multi-Tenant hypervisors, allowing unauthenticated attackers to execute system commands.
https://thehackernews.com/2024/09/progress-software-issues-patch-for.html
Donβt risk your infrastructure. Update systems now!
https://thehackernews.com/2024/09/progress-software-issues-patch-for.html
Donβt risk your infrastructure. Update systems now!
π₯12π10β‘2
With businesses relying on SaaS tools like Microsoft 365, attackers are targeting platforms like Teams & SharePoint.
Implementing MFA and AI-driven detection is crucial for data resilience.
Ready to defend? Start here: https://thehackernews.com/expert-insights/2024/09/achieving-data-resilience-in-microsoft.html
Implementing MFA and AI-driven detection is crucial for data resilience.
Ready to defend? Start here: https://thehackernews.com/expert-insights/2024/09/achieving-data-resilience-in-microsoft.html
π10π7π€2π€―2β‘1
Mustang Panda APT is exploiting VS Code to target Southeast Asian governments. It allows hackers to run commands, steal data, and spread malware via VS Codeβs reverse shell.
Read for details: https://thehackernews.com/2024/09/chinese-hackers-exploit-visual-studio.html
Strengthen defenses nowβmonitor for these tactics!
Read for details: https://thehackernews.com/2024/09/chinese-hackers-exploit-visual-studio.html
Strengthen defenses nowβmonitor for these tactics!
π€5π€―4π2
Blind Eagle APT targets Colombiaβs insurance sector with custom Quasar RAT via phishing and Google Drive.
Learn more: https://thehackernews.com/2024/09/blind-eagle-targets-colombian-insurance.html
Sensitive data at riskβsecure your systems and train employees to spot threats.
Learn more: https://thehackernews.com/2024/09/blind-eagle-targets-colombian-insurance.html
Sensitive data at riskβsecure your systems and train employees to spot threats.
π6π€―3π€2π1
Introducing Wing Security's SaaS Pulseβa FREE tool for continuous SaaS risk management! Stay ahead of risks like leaked credentials & shadow IT with automated monitoring.
Learn more: https://thehackernews.com/2024/09/wing-security-saas-pulse-continuous.html
Start securing your SaaS stack today.
Learn more: https://thehackernews.com/2024/09/wing-security-saas-pulse-continuous.html
Start securing your SaaS stack today.
π6π€3π2π₯1
Adding more cybersecurity tools increases third-party risk and widens your attack surface. Each new tool can expose you to vendor vulnerabilities.
Rethink your strategyβadopt smarter, holistic approaches for true security.
Learn more: https://thehackernews.com/2024/09/one-more-tool-will-do-it-reflecting-on.html
Rethink your strategyβadopt smarter, holistic approaches for true security.
Learn more: https://thehackernews.com/2024/09/one-more-tool-will-do-it-reflecting-on.html
π15π4π€―4π€3β‘2π1
π₯ New "RAMBO" attack uses radio signals from a deviceβs RAM to steal sensitive data, including keystrokes, encryption keys, & biometrics. Attackers can intercept this data with off-the-shelf radio gear.
Learn more: https://thehackernews.com/2024/09/new-rambo-attack-uses-ram-radio-signals.html
Learn more: https://thehackernews.com/2024/09/new-rambo-attack-uses-ram-radio-signals.html
π₯21π€―11π€8π2π±2β‘1
Become a leader in cybersecurity risk management with Georgetown. Learn more in our webinar on September 18.
Sign up: https://thn.news/cyber-risk-webinar-ig
Sign up: https://thn.news/cyber-risk-webinar-ig
scs.georgetown.edu
Programs in Cybersecurity Risk Management Webinar | Georgetown SCS
π10π€3β‘2π1
FinTech, Healthcare & SaaS thrive on dataβso do cybercriminals.
As digital ecosystems grow complex, non-human identities like API keys and bots are key targets. Secure them to protect sensitive data and build trust.
Learn more: https://thehackernews.com/expert-insights/2024/09/fintech-healthcare-saas-need-non-human.html
As digital ecosystems grow complex, non-human identities like API keys and bots are key targets. Secure them to protect sensitive data and build trust.
Learn more: https://thehackernews.com/expert-insights/2024/09/fintech-healthcare-saas-need-non-human.html
β‘7π3
Mustang Panda upgrades its #malware arsenal with new tools like FDMTP & PTSOCKET, boosting data theft and espionage across APAC.
Learn how these advanced attacks may impact your organization: https://thehackernews.com/2024/09/mustang-panda-deploys-advanced-malware.html
Learn how these advanced attacks may impact your organization: https://thehackernews.com/2024/09/mustang-panda-deploys-advanced-malware.html
π8π4
β‘ A new side-channel attack, PIXHELL, exploits audio gaps in air-gapped computers to steal data through LCD screen noises.
By manipulating pixel patterns on the screen, hackers can generate acoustic signals to exfiltrate sensitive data.
Read: https://thehackernews.com/2024/09/new-pixhell-attack-exploits-screen.html
By manipulating pixel patterns on the screen, hackers can generate acoustic signals to exfiltrate sensitive data.
Read: https://thehackernews.com/2024/09/new-pixhell-attack-exploits-screen.html
π€―22π4π€4β‘3π3
π¨ China-linked hackers launch new attacks across SE Asia, codenamed "Crimson Palace."
Using C2 relay points to deliver malware, they exploit trusted networks. New malware like TattleTale is collecting sensitive browser & network data.
https://thehackernews.com/2024/09/experts-identify-3-chinese-linked.html
Using C2 relay points to deliver malware, they exploit trusted networks. New malware like TattleTale is collecting sensitive browser & network data.
https://thehackernews.com/2024/09/experts-identify-3-chinese-linked.html
π7π€―4
π₯ Shadow apps are silently expanding your organizationβs attack surface, and most IT teams arenβt even aware.
Proactive measures, like using SSPM, can help security teams detect and mitigate shadow app risks.
Learn more: https://thehackernews.com/2024/09/shining-light-on-shadow-apps-invisible.html
Proactive measures, like using SSPM, can help security teams detect and mitigate shadow app risks.
Learn more: https://thehackernews.com/2024/09/shining-light-on-shadow-apps-invisible.html
π7π₯6π2
CosmicBeetle launches ScRansom, new #ransomware hitting SMBs globally. Linked to RansomHub, it targets manufacturing, healthcare, tech & more. Exploits vulnerabilities for sophisticated attacks.
Learn more: https://thehackernews.com/2024/09/cosmicbeetle-deploys-custom-scransom.html
Learn more: https://thehackernews.com/2024/09/cosmicbeetle-deploys-custom-scransom.html
π9π₯3π3π€1
Ivanti issued updates for 10 critical Endpoint Manager vulnerabilities, including CVE-2024-29847 (CVSS 10.0), which allows remote code execution.
Details: https://thehackernews.com/2024/09/ivanti-releases-urgent-security-updates.html
No known exploits yet, but updates are essential. Don't delay!
Details: https://thehackernews.com/2024/09/ivanti-releases-urgent-security-updates.html
No known exploits yet, but updates are essential. Don't delay!
π8π€6π₯2π2
#Microsoftβs September Patch Tuesday addresses 79 vulnerabilities, including 7 critical ones, with 3 under active attack. CVE-2024-43491 (CVSS 9.8) is a major threat with remote code execution risk.
Details here: https://thehackernews.com/2024/09/microsoft-issues-patches-for-79-flaws.html
Patch your systems immediately!
Details here: https://thehackernews.com/2024/09/microsoft-issues-patches-for-79-flaws.html
Patch your systems immediately!
π10π7π₯6β‘2π2π€1