π₯ Shadow apps are silently expanding your organizationβs attack surface, and most IT teams arenβt even aware.
Proactive measures, like using SSPM, can help security teams detect and mitigate shadow app risks.
Learn more: https://thehackernews.com/2024/09/shining-light-on-shadow-apps-invisible.html
Proactive measures, like using SSPM, can help security teams detect and mitigate shadow app risks.
Learn more: https://thehackernews.com/2024/09/shining-light-on-shadow-apps-invisible.html
π7π₯6π2
CosmicBeetle launches ScRansom, new #ransomware hitting SMBs globally. Linked to RansomHub, it targets manufacturing, healthcare, tech & more. Exploits vulnerabilities for sophisticated attacks.
Learn more: https://thehackernews.com/2024/09/cosmicbeetle-deploys-custom-scransom.html
Learn more: https://thehackernews.com/2024/09/cosmicbeetle-deploys-custom-scransom.html
π9π₯3π3π€1
Ivanti issued updates for 10 critical Endpoint Manager vulnerabilities, including CVE-2024-29847 (CVSS 10.0), which allows remote code execution.
Details: https://thehackernews.com/2024/09/ivanti-releases-urgent-security-updates.html
No known exploits yet, but updates are essential. Don't delay!
Details: https://thehackernews.com/2024/09/ivanti-releases-urgent-security-updates.html
No known exploits yet, but updates are essential. Don't delay!
π8π€6π₯2π2
#Microsoftβs September Patch Tuesday addresses 79 vulnerabilities, including 7 critical ones, with 3 under active attack. CVE-2024-43491 (CVSS 9.8) is a major threat with remote code execution risk.
Details here: https://thehackernews.com/2024/09/microsoft-issues-patches-for-79-flaws.html
Patch your systems immediately!
Details here: https://thehackernews.com/2024/09/microsoft-issues-patches-for-79-flaws.html
Patch your systems immediately!
π10π7π₯6β‘2π2π€1
North Korean hackers are targeting developers through job interviews by embedding malware in coding assessments, exploiting job seekers' focus to compromise their systems.
Learn more: https://thehackernews.com/2024/09/developers-beware-lazarus-group-uses.html
Learn more: https://thehackernews.com/2024/09/developers-beware-lazarus-group-uses.html
π₯14π€6π2π2π2
Microsoft 365βs Shared Responsibility Model means YOU must protect your data, not Microsoft. Assuming they handle backups can lead to costly mistakes.
A proactive strategy can save you from compliance breaches & losses.
Read > https://thehackernews.com/expert-insights/2024/08/how-to-modernize-your-microsoft-365.html
A proactive strategy can save you from compliance breaches & losses.
Read > https://thehackernews.com/expert-insights/2024/08/how-to-modernize-your-microsoft-365.html
π€17π€―6π4π2
β οΈ Singapore authorities arrest six individuals, including five Chinese nationals, linked to a global #cybercrime syndicate.
Laptops, phones, cash & over $850,000 in #cryptocurrency seizedβshowing the scale of the operation.
Learn more: https://thehackernews.com/2024/09/singapore-police-arrest-six-for-alleged.html
Laptops, phones, cash & over $850,000 in #cryptocurrency seizedβshowing the scale of the operation.
Learn more: https://thehackernews.com/2024/09/singapore-police-arrest-six-for-alleged.html
π€―11π7π4π±3
Passwords are riskyβ80% of breaches stem from weak or reused credentials. Passwordless isnβt a cure-all. Legacy systems & biometric privacy pose challenges.
Strengthen security with strong passwords + MFA.
Act now: https://thehackernews.com/2024/09/why-is-it-so-challenging-to-go.html
Strengthen security with strong passwords + MFA.
Act now: https://thehackernews.com/2024/09/why-is-it-so-challenging-to-go.html
π±8π3π₯2π2π2π€―1
π΄ A "Chinese-speaking actor" is behind DragonRank, targeting IIS servers with BadIIS malware for SEO fraud.
Multiple industries, from healthcare to IT, are affected through vulnerable web apps like WordPress and phpMyAdmin.
Learn more: https://thehackernews.com/2024/09/dragonrank-black-hat-seo-campaign.html
Multiple industries, from healthcare to IT, are affected through vulnerable web apps like WordPress and phpMyAdmin.
Learn more: https://thehackernews.com/2024/09/dragonrank-black-hat-seo-campaign.html
π6π€5β‘4π2
π vPenTest is the G2 Leader for Network Penetration Testing! π
Trust isnβt given, itβs earnedβand vPenTest from Vonahi Security has proven its worth! Thanks to outstanding reviews and high ratings from real users on G2, weβve secured the top spot for Network Penetration Testing.
Want to see why? Experience the power of automated pentesting!
Schedule a free demo > https://thn.news/vpentest-network
Trust isnβt given, itβs earnedβand vPenTest from Vonahi Security has proven its worth! Thanks to outstanding reviews and high ratings from real users on G2, weβve secured the top spot for Network Penetration Testing.
Want to see why? Experience the power of automated pentesting!
Schedule a free demo > https://thn.news/vpentest-network
Vonahi Security: Automated Penetration Testing & Cyber Security Services
Network Penetration Testing Platform - vPenTest
vPenTest automates network penetration testing, allowing IT teams to proactively reduce risk by identifying weaknesses that hackers can exploit to gain access to a network and obtain sensitive data.
π€10π9β‘3
β οΈ Quad7 botnet is rapidly compromising SOHO routers and VPNs from TP-LINK, Zyxel, Asus, and NETGEAR. Its new stealthy backdoor increases risks for businesses, especially with remote work setups.
Learn more: https://thehackernews.com/2024/09/quad7-botnet-expands-to-target-soho.html
Learn more: https://thehackernews.com/2024/09/quad7-botnet-expands-to-target-soho.html
π€―11β‘3π3π€3
Starting Oct 1, 2024, WordPress~org will mandate 2FA for accounts updating plugins/themes due to rising attacks on repositories. SVN passwords will add another layer of protection by securing commit access without exposing main credentials.
https://thehackernews.com/2024/09/wordpress-mandates-two-factor.html
https://thehackernews.com/2024/09/wordpress-mandates-two-factor.html
π17π6β‘4π₯1
Irelandβs Data Protection Commission (DPC) has launched a cross-border inquiry into Googleβs AI model (PaLM 2) to investigate compliance with data protection laws.
Learn more: https://thehackernews.com/2024/09/irelands-watchdog-launches-inquiry-into.html
Learn more: https://thehackernews.com/2024/09/irelands-watchdog-launches-inquiry-into.html
π6π€6β‘2π2
β οΈ Iranian APT OilRig is targeting Iraqi government networks with new malware Veaty and Spearal, using DNS tunneling and email-based C2 channels to infiltrate systems.
Learn more: https://thehackernews.com/2024/09/iranian-cyber-group-oilrig-targets.html
Learn more: https://thehackernews.com/2024/09/iranian-cyber-group-oilrig-targets.html
π7π€4π3π€―3β‘2
SaaS adoption is skyrocketing, but so are blind spots and third-party risks.
π Visibility is the key to identifying and mitigating these risks. Every layer of your SaaS ecosystem must be accounted forβare you aware of every app in use?
Learn more: https://thehackernews.com/expert-insights/2024/09/how-confident-are-you-that-your.html
π Visibility is the key to identifying and mitigating these risks. Every layer of your SaaS ecosystem must be accounted forβare you aware of every app in use?
Learn more: https://thehackernews.com/expert-insights/2024/09/how-confident-are-you-that-your.html
π8β‘2π1
π₯ Selenium Grid Targeted for Crypto Mining!
Default no-auth settings make it a prime target for attackers injecting crypto miners and proxyjacking scripts.
Learn more: https://thehackernews.com/2024/09/exposed-selenium-grid-servers-targeted.html
Default no-auth settings make it a prime target for attackers injecting crypto miners and proxyjacking scripts.
Learn more: https://thehackernews.com/2024/09/exposed-selenium-grid-servers-targeted.html
π6π₯5π4π€2
AIβs potential is limitless, but only if we can trust it.
Their unpredictability introduces significant concerns, mainly regarding data security and privacy.
How can developers ensure their AI products are not just innovative, but safe?
Find out in this blog by Sentraβs CTO and Co-Founder, Ron Reiter: https://thn.news/ai-data-privacy-tips
Their unpredictability introduces significant concerns, mainly regarding data security and privacy.
How can developers ensure their AI products are not just innovative, but safe?
Find out in this blog by Sentraβs CTO and Co-Founder, Ron Reiter: https://thn.news/ai-data-privacy-tips
www.sentra.io
Security Strategies for AI and Data Privacy | Sentra Blog
AI often relies on vast amounts of data to function effectively, making it critical to ensure data privacy & security, especially for sensitive data. Read more.
β‘11π4π3π€1
π¨ Alert: Over 1.3M Android TV Boxes Compromised by New 'Vo1d' Malware.
This backdoor installs harmful apps undetected, targeting vulnerable OS versions. Businesses with unmonitored devices may unknowingly be affected
Read: https://thehackernews.com/2024/09/beware-new-vo1d-malware-infects-13.html
This backdoor installs harmful apps undetected, targeting vulnerable OS versions. Businesses with unmonitored devices may unknowingly be affected
Read: https://thehackernews.com/2024/09/beware-new-vo1d-malware-infects-13.html
π€12π3π€―3
β οΈ New threat actor IntelBroker is selling data from Apple, Space-Eyes, & Facebook.
Cato CTRL's investigation reveals how deeply cybercriminals are embedded in hacking forums. If these giants can be compromised, so can anyone.
Read: https://thehackernews.com/2024/09/top-3-threat-report-insights-for-q2-2024.html
Cato CTRL's investigation reveals how deeply cybercriminals are embedded in hacking forums. If these giants can be compromised, so can anyone.
Read: https://thehackernews.com/2024/09/top-3-threat-report-insights-for-q2-2024.html
π₯8π5π2
GitLab has just released patches for 17 vulnerabilities, including a critical flaw (CVE-2024-6678) with a CVSS score of 9.9/10.
This flaw could allow attackers to execute pipeline jobs as arbitrary users, posing a severe risk to your development environments.
This is the fourth critical flaw GitLab has patched in the past year.
Learn more: https://thehackernews.com/2024/09/urgent-gitlab-patches-critical-flaw.html
Donβt wait for an exploitβapply the update today!
This flaw could allow attackers to execute pipeline jobs as arbitrary users, posing a severe risk to your development environments.
This is the fourth critical flaw GitLab has patched in the past year.
Learn more: https://thehackernews.com/2024/09/urgent-gitlab-patches-critical-flaw.html
Donβt wait for an exploitβapply the update today!
π10π7π€―6π2π₯1
π Researchers have uncovered Ajina.Banker, a new #Android malware that steals financial data and intercepts 2FA via #Telegram.
It spreads through fake apps, targeting users across Central Asia.
Find details here: https://thehackernews.com/2024/09/new-android-malware-ajinabanker-steals.html
Double-check app sources and educate clients on mobile security best practices.
It spreads through fake apps, targeting users across Central Asia.
Find details here: https://thehackernews.com/2024/09/new-android-malware-ajinabanker-steals.html
Double-check app sources and educate clients on mobile security best practices.
π16β‘7π2