β οΈ Singapore authorities arrest six individuals, including five Chinese nationals, linked to a global #cybercrime syndicate.
Laptops, phones, cash & over $850,000 in #cryptocurrency seizedβshowing the scale of the operation.
Learn more: https://thehackernews.com/2024/09/singapore-police-arrest-six-for-alleged.html
Laptops, phones, cash & over $850,000 in #cryptocurrency seizedβshowing the scale of the operation.
Learn more: https://thehackernews.com/2024/09/singapore-police-arrest-six-for-alleged.html
π€―11π7π4π±3
Passwords are riskyβ80% of breaches stem from weak or reused credentials. Passwordless isnβt a cure-all. Legacy systems & biometric privacy pose challenges.
Strengthen security with strong passwords + MFA.
Act now: https://thehackernews.com/2024/09/why-is-it-so-challenging-to-go.html
Strengthen security with strong passwords + MFA.
Act now: https://thehackernews.com/2024/09/why-is-it-so-challenging-to-go.html
π±8π3π₯2π2π2π€―1
π΄ A "Chinese-speaking actor" is behind DragonRank, targeting IIS servers with BadIIS malware for SEO fraud.
Multiple industries, from healthcare to IT, are affected through vulnerable web apps like WordPress and phpMyAdmin.
Learn more: https://thehackernews.com/2024/09/dragonrank-black-hat-seo-campaign.html
Multiple industries, from healthcare to IT, are affected through vulnerable web apps like WordPress and phpMyAdmin.
Learn more: https://thehackernews.com/2024/09/dragonrank-black-hat-seo-campaign.html
π6π€5β‘4π2
π vPenTest is the G2 Leader for Network Penetration Testing! π
Trust isnβt given, itβs earnedβand vPenTest from Vonahi Security has proven its worth! Thanks to outstanding reviews and high ratings from real users on G2, weβve secured the top spot for Network Penetration Testing.
Want to see why? Experience the power of automated pentesting!
Schedule a free demo > https://thn.news/vpentest-network
Trust isnβt given, itβs earnedβand vPenTest from Vonahi Security has proven its worth! Thanks to outstanding reviews and high ratings from real users on G2, weβve secured the top spot for Network Penetration Testing.
Want to see why? Experience the power of automated pentesting!
Schedule a free demo > https://thn.news/vpentest-network
Vonahi Security: Automated Penetration Testing & Cyber Security Services
Network Penetration Testing Platform - vPenTest
vPenTest automates network penetration testing, allowing IT teams to proactively reduce risk by identifying weaknesses that hackers can exploit to gain access to a network and obtain sensitive data.
π€10π9β‘3
β οΈ Quad7 botnet is rapidly compromising SOHO routers and VPNs from TP-LINK, Zyxel, Asus, and NETGEAR. Its new stealthy backdoor increases risks for businesses, especially with remote work setups.
Learn more: https://thehackernews.com/2024/09/quad7-botnet-expands-to-target-soho.html
Learn more: https://thehackernews.com/2024/09/quad7-botnet-expands-to-target-soho.html
π€―11β‘3π3π€3
Starting Oct 1, 2024, WordPress~org will mandate 2FA for accounts updating plugins/themes due to rising attacks on repositories. SVN passwords will add another layer of protection by securing commit access without exposing main credentials.
https://thehackernews.com/2024/09/wordpress-mandates-two-factor.html
https://thehackernews.com/2024/09/wordpress-mandates-two-factor.html
π17π6β‘4π₯1
Irelandβs Data Protection Commission (DPC) has launched a cross-border inquiry into Googleβs AI model (PaLM 2) to investigate compliance with data protection laws.
Learn more: https://thehackernews.com/2024/09/irelands-watchdog-launches-inquiry-into.html
Learn more: https://thehackernews.com/2024/09/irelands-watchdog-launches-inquiry-into.html
π6π€6β‘2π2
β οΈ Iranian APT OilRig is targeting Iraqi government networks with new malware Veaty and Spearal, using DNS tunneling and email-based C2 channels to infiltrate systems.
Learn more: https://thehackernews.com/2024/09/iranian-cyber-group-oilrig-targets.html
Learn more: https://thehackernews.com/2024/09/iranian-cyber-group-oilrig-targets.html
π7π€4π3π€―3β‘2
SaaS adoption is skyrocketing, but so are blind spots and third-party risks.
π Visibility is the key to identifying and mitigating these risks. Every layer of your SaaS ecosystem must be accounted forβare you aware of every app in use?
Learn more: https://thehackernews.com/expert-insights/2024/09/how-confident-are-you-that-your.html
π Visibility is the key to identifying and mitigating these risks. Every layer of your SaaS ecosystem must be accounted forβare you aware of every app in use?
Learn more: https://thehackernews.com/expert-insights/2024/09/how-confident-are-you-that-your.html
π8β‘2π1
π₯ Selenium Grid Targeted for Crypto Mining!
Default no-auth settings make it a prime target for attackers injecting crypto miners and proxyjacking scripts.
Learn more: https://thehackernews.com/2024/09/exposed-selenium-grid-servers-targeted.html
Default no-auth settings make it a prime target for attackers injecting crypto miners and proxyjacking scripts.
Learn more: https://thehackernews.com/2024/09/exposed-selenium-grid-servers-targeted.html
π6π₯5π4π€2
AIβs potential is limitless, but only if we can trust it.
Their unpredictability introduces significant concerns, mainly regarding data security and privacy.
How can developers ensure their AI products are not just innovative, but safe?
Find out in this blog by Sentraβs CTO and Co-Founder, Ron Reiter: https://thn.news/ai-data-privacy-tips
Their unpredictability introduces significant concerns, mainly regarding data security and privacy.
How can developers ensure their AI products are not just innovative, but safe?
Find out in this blog by Sentraβs CTO and Co-Founder, Ron Reiter: https://thn.news/ai-data-privacy-tips
www.sentra.io
Security Strategies for AI and Data Privacy | Sentra Blog
AI often relies on vast amounts of data to function effectively, making it critical to ensure data privacy & security, especially for sensitive data. Read more.
β‘11π4π3π€1
π¨ Alert: Over 1.3M Android TV Boxes Compromised by New 'Vo1d' Malware.
This backdoor installs harmful apps undetected, targeting vulnerable OS versions. Businesses with unmonitored devices may unknowingly be affected
Read: https://thehackernews.com/2024/09/beware-new-vo1d-malware-infects-13.html
This backdoor installs harmful apps undetected, targeting vulnerable OS versions. Businesses with unmonitored devices may unknowingly be affected
Read: https://thehackernews.com/2024/09/beware-new-vo1d-malware-infects-13.html
π€12π3π€―3
β οΈ New threat actor IntelBroker is selling data from Apple, Space-Eyes, & Facebook.
Cato CTRL's investigation reveals how deeply cybercriminals are embedded in hacking forums. If these giants can be compromised, so can anyone.
Read: https://thehackernews.com/2024/09/top-3-threat-report-insights-for-q2-2024.html
Cato CTRL's investigation reveals how deeply cybercriminals are embedded in hacking forums. If these giants can be compromised, so can anyone.
Read: https://thehackernews.com/2024/09/top-3-threat-report-insights-for-q2-2024.html
π₯8π5π2
GitLab has just released patches for 17 vulnerabilities, including a critical flaw (CVE-2024-6678) with a CVSS score of 9.9/10.
This flaw could allow attackers to execute pipeline jobs as arbitrary users, posing a severe risk to your development environments.
This is the fourth critical flaw GitLab has patched in the past year.
Learn more: https://thehackernews.com/2024/09/urgent-gitlab-patches-critical-flaw.html
Donβt wait for an exploitβapply the update today!
This flaw could allow attackers to execute pipeline jobs as arbitrary users, posing a severe risk to your development environments.
This is the fourth critical flaw GitLab has patched in the past year.
Learn more: https://thehackernews.com/2024/09/urgent-gitlab-patches-critical-flaw.html
Donβt wait for an exploitβapply the update today!
π10π7π€―6π2π₯1
π Researchers have uncovered Ajina.Banker, a new #Android malware that steals financial data and intercepts 2FA via #Telegram.
It spreads through fake apps, targeting users across Central Asia.
Find details here: https://thehackernews.com/2024/09/new-android-malware-ajinabanker-steals.html
Double-check app sources and educate clients on mobile security best practices.
It spreads through fake apps, targeting users across Central Asia.
Find details here: https://thehackernews.com/2024/09/new-android-malware-ajinabanker-steals.html
Double-check app sources and educate clients on mobile security best practices.
π16β‘7π2
π Just-in-time access in Privileged Identity Management (PIM) faces scrutiny for security gaps. Attackers know how to exploit it, making "just-in-time" feel like "all-the-time" access.
Learn more: https://thehackernews.com/expert-insights/2024/09/privileged-identity-management-pim-for.html
Learn more: https://thehackernews.com/expert-insights/2024/09/privileged-identity-management-pim-for.html
π€10π€―4π3
π¨ A new Linux malware, "Hadooken," is exploiting weak credentials and vulnerabilities in Oracle Weblogic to deploy cryptocurrency miners and DDoS botnets.
https://thehackernews.com/2024/09/new-linux-malware-campaign-exploits.html
The malware uses Python and shell scripts to spread laterally, creating a persistent threat.
https://thehackernews.com/2024/09/new-linux-malware-campaign-exploits.html
The malware uses Python and shell scripts to spread laterally, creating a persistent threat.
π16π10π€9π±3π2
β οΈ Cybercriminals are exploiting PoC exploits for two critical vulnerabilities (CVE-2024-6670, CVE-2024-6671) in WhatsUp Gold, with attacks starting just 5 hours after the PoC release.
Details here: https://thehackernews.com/2024/09/progress-whatsup-gold-exploited-just.html
Patch your systems NOW to avoid becoming a target!
Details here: https://thehackernews.com/2024/09/progress-whatsup-gold-exploited-just.html
Patch your systems NOW to avoid becoming a target!
π€―7π6β‘3π3π€3
New TrickMo variant uses advanced evasion to steal credentials & intercept 2FA codes.
It deploys fake login screens, keylogging, & screen recording to target banking users.
https://thehackernews.com/2024/09/trickmo-android-trojan-exploits.html
It also exploits #Android's Accessibility Services for full device control.
It deploys fake login screens, keylogging, & screen recording to target banking users.
https://thehackernews.com/2024/09/trickmo-android-trojan-exploits.html
It also exploits #Android's Accessibility Services for full device control.
π₯12π4π€4π2β‘1
A 17-year-old was arrested after launching a #cyberattack on TfL, exposing the sensitive data of thousands.
This isn't an isolated eventβgroups like Scattered Spider are exploiting cloud infrastructures, especially in finance and insurance.
Read: https://thehackernews.com/2024/09/17-year-old-arrested-in-connection-with.html
This isn't an isolated eventβgroups like Scattered Spider are exploiting cloud infrastructures, especially in finance and insurance.
Read: https://thehackernews.com/2024/09/17-year-old-arrested-in-connection-with.html
π15π7π₯6β‘3π2
Phishing causes over 80% of unauthorized access. Traditional defenses, like MFA, are vulnerable as attackers bypass them. Beyond Identityβs deterministic security eliminates phishable credentials like passwords and OTPs for stronger protection.
https://thehackernews.com/2024/09/say-goodbye-to-phishing-must-haves-to.html
https://thehackernews.com/2024/09/say-goodbye-to-phishing-must-haves-to.html
π10π6π€3