Russian-linked cyber espionage group TAG-110 is targeting organizations in Central Asia, East Asia, and Europe using sophisticated custom malware tools, HATVIBE and CHERRYSPY.
Learn how to defend against these targeted cyberattacksโ https://thehackernews.com/2024/11/russian-hackers-deploy-hatvibe-and.html
Learn how to defend against these targeted cyberattacksโ https://thehackernews.com/2024/11/russian-hackers-deploy-hatvibe-and.html
๐ฅ18๐11๐คฏ5๐4โก1๐1
A China-linked nation-state group named TAG-112 targeted Tibetan media and university websites, using a cyber espionage campaign to deliver the Cobalt Strike post-exploitation toolkit.
Learn more โ https://thehackernews.com/2024/11/china-linked-tag-112-targets-tibetan.html
Learn more โ https://thehackernews.com/2024/11/china-linked-tag-112-targets-tibetan.html
โก10๐9๐ฅ4๐คฏ1
๐ Watch out! The threat actor Mysterious Elephant (APT-K-47) is using a new trick: exploiting WinRARโs security flaw to spread malware.
Their latest campaign uses Hajj-themed lures to deceive victims into executing a malicious payload disguised as a Microsoft CHM file.
Learn more about the tactics https://thehackernews.com/2024/11/apt-k-47-uses-hajj-themed-lures-to.html
Their latest campaign uses Hajj-themed lures to deceive victims into executing a malicious payload disguised as a Microsoft CHM file.
Learn more about the tactics https://thehackernews.com/2024/11/apt-k-47-uses-hajj-themed-lures-to.html
๐20โก5๐ฅ5๐ค4
Sapphire Sleet, a North Korea-linked threat group, has stolen over $10 million in cryptocurrency through sophisticated social engineering schemes.
Curious how these attacks work? Learn more: https://thehackernews.com/2024/11/north-korean-hackers-steal-10m-with-ai.html
Curious how these attacks work? Learn more: https://thehackernews.com/2024/11/north-korean-hackers-steal-10m-with-ai.html
๐18๐คฏ6โก5๐ฅ2๐ฑ1
Google blocks over 1,000 websites linked to Chinaโs GLASSBRIDGE influence operation.
These fake news sites push pro-China narratives, disguising themselves as legitimate news outlets.
Learn more: https://thehackernews.com/2024/11/google-exposes-glassbridge-pro-china.html
These fake news sites push pro-China narratives, disguising themselves as legitimate news outlets.
Learn more: https://thehackernews.com/2024/11/google-exposes-glassbridge-pro-china.html
๐43๐ฑ11๐9โก4๐4๐ค4๐ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
Researchers have uncovered new attack techniques targeting infrastructure-as-code (IaC) and policy-as-code (PaC) tools like HashiCorp's Terraform and Open Policy Agent (OPA), posing a severe risk to cloud platforms.
Learn how this attack works: https://thehackernews.com/2024/11/cybersecurity-flaws-in-iac-and-pac.html
Learn how this attack works: https://thehackernews.com/2024/11/cybersecurity-flaws-in-iac-and-pac.html
๐19๐ฅ10โก2๐คฏ1
Ever heard of attackers mimicking your device's profile to bypass security? Itโs happening right now.
Modern phishing attacks gather detailed device info to impersonate victims, making detection harder than ever.
Learn more about these advanced techniques: https://thehackernews.com/2024/11/flying-under-radar-security-evasion.html
Modern phishing attacks gather detailed device info to impersonate victims, making detection harder than ever.
Learn more about these advanced techniques: https://thehackernews.com/2024/11/flying-under-radar-security-evasion.html
๐11๐ฅ9๐6โก4๐คฏ1
Google has just rolled out a new feature called "Restore Credentials," making it easier than ever to securely access third-party apps when transferring data to a new #Android device.
Discover how this feature works. https://thehackernews.com/2024/11/googles-new-restore-credentials-tool.html
Discover how this feature works. https://thehackernews.com/2024/11/googles-new-restore-credentials-tool.html
๐21โก4๐4๐4๐ฅ3
๐จ A critical security flaw (CVE-2023-28461) impacting Array Networks AG and vxAG gateways has been added to the CISA's Known Exploited Vulnerabilities catalog after reports of active exploitation.
Read more about the flaw, its exploitation: https://thehackernews.com/2024/11/cisa-urges-agencies-to-patch-critical.html
Read more about the flaw, its exploitation: https://thehackernews.com/2024/11/cisa-urges-agencies-to-patch-critical.html
๐13๐ฅ7
A previously unknown China-linked hacking group, Earth Estries, has been discovered using custom backdoorsโGHOSTSPIDER and MASOL RATโto target Southeast Asian telecoms, #technology companies, and governments.
Read full details: https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
Read full details: https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
๐17๐4
A Russia-aligned hacker group has used zero-day flaws in Firefox and Windows to deliver the RomCom backdoor malware.
The attack requires no user interactionโjust visiting a compromised site is enough to trigger the exploit.
Read the full article: https://thehackernews.com/2024/11/romcom-exploits-zero-day-firefox-and.html
The attack requires no user interactionโjust visiting a compromised site is enough to trigger the exploit.
Read the full article: https://thehackernews.com/2024/11/romcom-exploits-zero-day-firefox-and.html
๐ฅ30๐ฑ21๐5๐3โก2๐ค2๐คฏ1
Turn strategy into action step-by-step! ๐
Master the 5 stages of the CTEM framework and take your cybersecurity to the next level:
1๏ธโฃ Scoping
2๏ธโฃ Discovery
3๏ธโฃ Prioritization
4๏ธโฃ Validation
5๏ธโฃ Mobilization
Donโt just react to threatsโstay ahead of them. Learn how XM Cyber can help you operationalize CTEM and secure your organization effectively.
๐ Discover the Guide: https://thn.news/operationalizing-ctem
๐ก Swipe through the carousel to explore each stage in detail! ๐
Master the 5 stages of the CTEM framework and take your cybersecurity to the next level:
1๏ธโฃ Scoping
2๏ธโฃ Discovery
3๏ธโฃ Prioritization
4๏ธโฃ Validation
5๏ธโฃ Mobilization
Donโt just react to threatsโstay ahead of them. Learn how XM Cyber can help you operationalize CTEM and secure your organization effectively.
๐ Discover the Guide: https://thn.news/operationalizing-ctem
๐ก Swipe through the carousel to explore each stage in detail! ๐
Xmcyber
Operationalizing CTEM with XM Cyber
XM Cyber on Operationalizing The Continuous Threat Exposure Management (CTEM) Framework by Gartnerยฎ
๐20๐ฅ4๐1๐คฏ1
๐ Two critical vulnerabilities found in WordPressโs CleanTalk plugin leave sites exposed to malicious attacks and data theft.
This exploit impacts over 200,000 sitesโupdate your CleanTalk plugin ASAP!
Get the full details here: https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html
This exploit impacts over 200,000 sitesโupdate your CleanTalk plugin ASAP!
Get the full details here: https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html
๐27๐ฅ16๐3๐ฑ2
๐จ New threat alert: Matrix, a lone-wolf hacker, is using IoT devices as a botnet to launch widespread DDoS attack.
Learn how you can secure your systems and prevent similar threats. Full story here: https://thehackernews.com/2024/11/matrix-botnet-exploits-iot-devices-in.html
Learn how you can secure your systems and prevent similar threats. Full story here: https://thehackernews.com/2024/11/matrix-botnet-exploits-iot-devices-in.html
๐ฅ15๐6๐5โก1
๐ INTERPOLโs massive operation across 19 African nations has resulted in over 1,000 arrests and the takedown of 134,000+ malicious networks.
Learn more about how this operation โ https://thehackernews.com/2024/11/interpol-busts-african-cybercrime-1006.html
Learn more about how this operation โ https://thehackernews.com/2024/11/interpol-busts-african-cybercrime-1006.html
๐31๐10โก4๐ฅ4๐ค3๐2๐ฑ2
Zero Trust isnโt just a buzzwordโitโs a necessity. Zero Trust Network Access (ZTNA) can replace VPNs, reduce lateral movement, and harden existing devices, making them nearly impossible to exploit.
Find out how to get started with Zero Trust for a stronger security posture: https://thehackernews.com/expert-insights/2024/11/defensible-security-architecture-and.html
Find out how to get started with Zero Trust for a stronger security posture: https://thehackernews.com/expert-insights/2024/11/defensible-security-architecture-and.html
๐25๐ฅ8๐4
APT-C-60 strikes again โ this time with a targeted attack exploiting the WPS Office vulnerability (CVE-2024-7262) to deploy the SpyGlace backdoor.
Read more about how this advanced attack works: https://thehackernews.com/2024/11/apt-c-60-exploits-wps-office.html
Read more about how this advanced attack works: https://thehackernews.com/2024/11/apt-c-60-exploits-wps-office.html
๐19โก5๐ค2๐ฑ2
A new UEFI bootkit called Bootkitty has been discovered, designed specifically for Linux systemsโmarking a significant shift in the cyber threat landscape.
Read the full analysis โ https://thehackernews.com/2024/11/researchers-discover-bootkitty-first.html
Read the full analysis โ https://thehackernews.com/2024/11/researchers-discover-bootkitty-first.html
๐ฅ27๐ฑ12๐6๐3โก2
Multi-stage cyberattacks are getting harder to detect and more dangerous than ever. Learn how they trick you into letting your guard down.
Attackers use links, embedded QR codes, and other sneaky methods to steal your credentials.
Learn how to spot these hidden threats: https://thehackernews.com/2024/11/latest-multi-stage-attack-scenarios.html
Attackers use links, embedded QR codes, and other sneaky methods to steal your credentials.
Learn how to spot these hidden threats: https://thehackernews.com/2024/11/latest-multi-stage-attack-scenarios.html
๐17๐ฅ12๐คฏ4โก3๐2
A critical #vulnerability (CVE-2024-11680) in the ProjectSend file-sharing app is being actively exploited.
It allows attackers to execute malicious code on vulnerable servers.
Donโt wait for an attackโpatch now: https://thehackernews.com/2024/11/critical-flaw-in-projectsend-under.html
It allows attackers to execute malicious code on vulnerable servers.
Donโt wait for an attackโpatch now: https://thehackernews.com/2024/11/critical-flaw-in-projectsend-under.html
๐26๐ฑ9โก4๐2๐2
T-Mobile has detected attempted cyber intrusions from an external provider's networkโbut no sensitive data was accessed.
Find out more: https://thehackernews.com/2024/11/us-telecom-giant-t-mobile-detects.html
Find out more: https://thehackernews.com/2024/11/us-telecom-giant-t-mobile-detects.html
๐19๐ค9๐2๐1๐ฑ1