PAM automates password management and rotation, a simple yet powerful way to prevent breaches.
It minimizes human error, helping you stay ahead of credential-based attacks.
Learn how PAM secures your systems with automated password management: https://thehackernews.com/2024/11/10-most-impactful-pam-use-cases-for.html
It minimizes human error, helping you stay ahead of credential-based attacks.
Learn how PAM secures your systems with automated password management: https://thehackernews.com/2024/11/10-most-impactful-pam-use-cases-for.html
๐9โก3๐3
๐จ New China-linked APT Gelsemium targets #LinuxโThe notorious group has launched a new Linux backdoor, WolfsBane, alongside another malware tool called FireWood, raising cybersecurity alarms.
WolfsBane and FireWood are targeting East & Southeast Asia, exploiting unknown vulnerabilities to steal sensitive data.
Read: https://thehackernews.com/2024/11/chinese-apt-gelsemium-targets-linux.html
WolfsBane and FireWood are targeting East & Southeast Asia, exploiting unknown vulnerabilities to steal sensitive data.
Read: https://thehackernews.com/2024/11/chinese-apt-gelsemium-targets-linux.html
๐ฑ10๐6โก4๐3
Over 145,000 industrial control systems (ICS) are exposed to the internet across 175 countries, with the U.S. leading the pack.
New malware strains like FrostyGoop are leveraging vulnerabilities in Modbus TCP to target exposed ICS devices.
Read โ https://thehackernews.com/2024/11/over-145000-industrial-control-systems.html
New malware strains like FrostyGoop are leveraging vulnerabilities in Modbus TCP to target exposed ICS devices.
Read โ https://thehackernews.com/2024/11/over-145000-industrial-control-systems.html
๐13๐ฅ5โก1
๐จ THREAT ALERT! Over 2,000 Palo Alto Networks devices have been compromised in an ongoing, widespread attack.
The vulnerabilities, CVE-2024-0012 and CVE-2024-9474, could allow attackers to execute arbitrary code and deploy malware on affected devices.
๐ Donโt wait for a breachโlearn more about this campaign and how to protect your devices: https://thehackernews.com/2024/11/warning-over-2000-palo-alto-networks.html
The vulnerabilities, CVE-2024-0012 and CVE-2024-9474, could allow attackers to execute arbitrary code and deploy malware on affected devices.
๐ Donโt wait for a breachโlearn more about this campaign and how to protect your devices: https://thehackernews.com/2024/11/warning-over-2000-palo-alto-networks.html
โก14๐4๐4๐คฏ4๐ฑ3
๐ก๏ธโก Is Your Business Prepared for Certificate Revocations?
Donโt wait for a crisis! Check out our latest webinar to learn how automation can quickly minimize disruptions when certificates are revoked.
Watch NOW and learn how to stay agile: https://thehacker.news/rapid-ssl-certificate
Donโt wait for a crisis! Check out our latest webinar to learn how automation can quickly minimize disruptions when certificates are revoked.
Watch NOW and learn how to stay agile: https://thehacker.news/rapid-ssl-certificate
๐10โก6
๐ Malicious Python packages impersonating AI models like ChatGPT and Claude have been found on PyPI.
Theyโve been used to deploy a dangerous information stealer, JarkaStealer, which silently harvested sensitive data from victims before erasing all traces.
Discover the full extent of this attack โ https://thehackernews.com/2024/11/pypi-attack-chatgpt-claude.html
Theyโve been used to deploy a dangerous information stealer, JarkaStealer, which silently harvested sensitive data from victims before erasing all traces.
Discover the full extent of this attack โ https://thehackernews.com/2024/11/pypi-attack-chatgpt-claude.html
๐15๐8๐ฅ4โก2๐1
โ
Microsoft seized 240 fraudulent websites linked to an Egypt-based cybercriminal behind the ONNX phishing kit.
โ The DoJ dismantled PopeyeTools, a marketplace for stolen financial data and fraud tools.
โ Meta took down over 2M accounts tied to Southeast Asian pig butchering scam centers.
Find all details here: https://thehackernews.com/2024/11/microsoft-meta-and-doj-disrupt-global.html
โ The DoJ dismantled PopeyeTools, a marketplace for stolen financial data and fraud tools.
โ Meta took down over 2M accounts tied to Southeast Asian pig butchering scam centers.
Find all details here: https://thehackernews.com/2024/11/microsoft-meta-and-doj-disrupt-global.html
๐17โก6๐ฅ2๐2๐ค2
Russian-linked cyber espionage group TAG-110 is targeting organizations in Central Asia, East Asia, and Europe using sophisticated custom malware tools, HATVIBE and CHERRYSPY.
Learn how to defend against these targeted cyberattacksโ https://thehackernews.com/2024/11/russian-hackers-deploy-hatvibe-and.html
Learn how to defend against these targeted cyberattacksโ https://thehackernews.com/2024/11/russian-hackers-deploy-hatvibe-and.html
๐ฅ18๐11๐คฏ5๐4โก1๐1
A China-linked nation-state group named TAG-112 targeted Tibetan media and university websites, using a cyber espionage campaign to deliver the Cobalt Strike post-exploitation toolkit.
Learn more โ https://thehackernews.com/2024/11/china-linked-tag-112-targets-tibetan.html
Learn more โ https://thehackernews.com/2024/11/china-linked-tag-112-targets-tibetan.html
โก10๐9๐ฅ4๐คฏ1
๐ Watch out! The threat actor Mysterious Elephant (APT-K-47) is using a new trick: exploiting WinRARโs security flaw to spread malware.
Their latest campaign uses Hajj-themed lures to deceive victims into executing a malicious payload disguised as a Microsoft CHM file.
Learn more about the tactics https://thehackernews.com/2024/11/apt-k-47-uses-hajj-themed-lures-to.html
Their latest campaign uses Hajj-themed lures to deceive victims into executing a malicious payload disguised as a Microsoft CHM file.
Learn more about the tactics https://thehackernews.com/2024/11/apt-k-47-uses-hajj-themed-lures-to.html
๐20โก5๐ฅ5๐ค4
Sapphire Sleet, a North Korea-linked threat group, has stolen over $10 million in cryptocurrency through sophisticated social engineering schemes.
Curious how these attacks work? Learn more: https://thehackernews.com/2024/11/north-korean-hackers-steal-10m-with-ai.html
Curious how these attacks work? Learn more: https://thehackernews.com/2024/11/north-korean-hackers-steal-10m-with-ai.html
๐18๐คฏ6โก5๐ฅ2๐ฑ1
Google blocks over 1,000 websites linked to Chinaโs GLASSBRIDGE influence operation.
These fake news sites push pro-China narratives, disguising themselves as legitimate news outlets.
Learn more: https://thehackernews.com/2024/11/google-exposes-glassbridge-pro-china.html
These fake news sites push pro-China narratives, disguising themselves as legitimate news outlets.
Learn more: https://thehackernews.com/2024/11/google-exposes-glassbridge-pro-china.html
๐43๐ฑ11๐9โก4๐4๐ค4๐ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
Researchers have uncovered new attack techniques targeting infrastructure-as-code (IaC) and policy-as-code (PaC) tools like HashiCorp's Terraform and Open Policy Agent (OPA), posing a severe risk to cloud platforms.
Learn how this attack works: https://thehackernews.com/2024/11/cybersecurity-flaws-in-iac-and-pac.html
Learn how this attack works: https://thehackernews.com/2024/11/cybersecurity-flaws-in-iac-and-pac.html
๐19๐ฅ10โก2๐คฏ1
Ever heard of attackers mimicking your device's profile to bypass security? Itโs happening right now.
Modern phishing attacks gather detailed device info to impersonate victims, making detection harder than ever.
Learn more about these advanced techniques: https://thehackernews.com/2024/11/flying-under-radar-security-evasion.html
Modern phishing attacks gather detailed device info to impersonate victims, making detection harder than ever.
Learn more about these advanced techniques: https://thehackernews.com/2024/11/flying-under-radar-security-evasion.html
๐11๐ฅ9๐6โก4๐คฏ1
Google has just rolled out a new feature called "Restore Credentials," making it easier than ever to securely access third-party apps when transferring data to a new #Android device.
Discover how this feature works. https://thehackernews.com/2024/11/googles-new-restore-credentials-tool.html
Discover how this feature works. https://thehackernews.com/2024/11/googles-new-restore-credentials-tool.html
๐21โก4๐4๐4๐ฅ3
๐จ A critical security flaw (CVE-2023-28461) impacting Array Networks AG and vxAG gateways has been added to the CISA's Known Exploited Vulnerabilities catalog after reports of active exploitation.
Read more about the flaw, its exploitation: https://thehackernews.com/2024/11/cisa-urges-agencies-to-patch-critical.html
Read more about the flaw, its exploitation: https://thehackernews.com/2024/11/cisa-urges-agencies-to-patch-critical.html
๐13๐ฅ7
A previously unknown China-linked hacking group, Earth Estries, has been discovered using custom backdoorsโGHOSTSPIDER and MASOL RATโto target Southeast Asian telecoms, #technology companies, and governments.
Read full details: https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
Read full details: https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
๐17๐4
A Russia-aligned hacker group has used zero-day flaws in Firefox and Windows to deliver the RomCom backdoor malware.
The attack requires no user interactionโjust visiting a compromised site is enough to trigger the exploit.
Read the full article: https://thehackernews.com/2024/11/romcom-exploits-zero-day-firefox-and.html
The attack requires no user interactionโjust visiting a compromised site is enough to trigger the exploit.
Read the full article: https://thehackernews.com/2024/11/romcom-exploits-zero-day-firefox-and.html
๐ฅ30๐ฑ21๐5๐3โก2๐ค2๐คฏ1
Turn strategy into action step-by-step! ๐
Master the 5 stages of the CTEM framework and take your cybersecurity to the next level:
1๏ธโฃ Scoping
2๏ธโฃ Discovery
3๏ธโฃ Prioritization
4๏ธโฃ Validation
5๏ธโฃ Mobilization
Donโt just react to threatsโstay ahead of them. Learn how XM Cyber can help you operationalize CTEM and secure your organization effectively.
๐ Discover the Guide: https://thn.news/operationalizing-ctem
๐ก Swipe through the carousel to explore each stage in detail! ๐
Master the 5 stages of the CTEM framework and take your cybersecurity to the next level:
1๏ธโฃ Scoping
2๏ธโฃ Discovery
3๏ธโฃ Prioritization
4๏ธโฃ Validation
5๏ธโฃ Mobilization
Donโt just react to threatsโstay ahead of them. Learn how XM Cyber can help you operationalize CTEM and secure your organization effectively.
๐ Discover the Guide: https://thn.news/operationalizing-ctem
๐ก Swipe through the carousel to explore each stage in detail! ๐
Xmcyber
Operationalizing CTEM with XM Cyber
XM Cyber on Operationalizing The Continuous Threat Exposure Management (CTEM) Framework by Gartnerยฎ
๐20๐ฅ4๐1๐คฏ1
๐ Two critical vulnerabilities found in WordPressโs CleanTalk plugin leave sites exposed to malicious attacks and data theft.
This exploit impacts over 200,000 sitesโupdate your CleanTalk plugin ASAP!
Get the full details here: https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html
This exploit impacts over 200,000 sitesโupdate your CleanTalk plugin ASAP!
Get the full details here: https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html
๐27๐ฅ16๐3๐ฑ2
๐จ New threat alert: Matrix, a lone-wolf hacker, is using IoT devices as a botnet to launch widespread DDoS attack.
Learn how you can secure your systems and prevent similar threats. Full story here: https://thehackernews.com/2024/11/matrix-botnet-exploits-iot-devices-in.html
Learn how you can secure your systems and prevent similar threats. Full story here: https://thehackernews.com/2024/11/matrix-botnet-exploits-iot-devices-in.html
๐ฅ15๐6๐5โก1