๐จ A critical security flaw (CVE-2023-28461) impacting Array Networks AG and vxAG gateways has been added to the CISA's Known Exploited Vulnerabilities catalog after reports of active exploitation.
Read more about the flaw, its exploitation: https://thehackernews.com/2024/11/cisa-urges-agencies-to-patch-critical.html
Read more about the flaw, its exploitation: https://thehackernews.com/2024/11/cisa-urges-agencies-to-patch-critical.html
๐13๐ฅ7
A previously unknown China-linked hacking group, Earth Estries, has been discovered using custom backdoorsโGHOSTSPIDER and MASOL RATโto target Southeast Asian telecoms, #technology companies, and governments.
Read full details: https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
Read full details: https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
๐17๐4
A Russia-aligned hacker group has used zero-day flaws in Firefox and Windows to deliver the RomCom backdoor malware.
The attack requires no user interactionโjust visiting a compromised site is enough to trigger the exploit.
Read the full article: https://thehackernews.com/2024/11/romcom-exploits-zero-day-firefox-and.html
The attack requires no user interactionโjust visiting a compromised site is enough to trigger the exploit.
Read the full article: https://thehackernews.com/2024/11/romcom-exploits-zero-day-firefox-and.html
๐ฅ30๐ฑ21๐5๐3โก2๐ค2๐คฏ1
Turn strategy into action step-by-step! ๐
Master the 5 stages of the CTEM framework and take your cybersecurity to the next level:
1๏ธโฃ Scoping
2๏ธโฃ Discovery
3๏ธโฃ Prioritization
4๏ธโฃ Validation
5๏ธโฃ Mobilization
Donโt just react to threatsโstay ahead of them. Learn how XM Cyber can help you operationalize CTEM and secure your organization effectively.
๐ Discover the Guide: https://thn.news/operationalizing-ctem
๐ก Swipe through the carousel to explore each stage in detail! ๐
Master the 5 stages of the CTEM framework and take your cybersecurity to the next level:
1๏ธโฃ Scoping
2๏ธโฃ Discovery
3๏ธโฃ Prioritization
4๏ธโฃ Validation
5๏ธโฃ Mobilization
Donโt just react to threatsโstay ahead of them. Learn how XM Cyber can help you operationalize CTEM and secure your organization effectively.
๐ Discover the Guide: https://thn.news/operationalizing-ctem
๐ก Swipe through the carousel to explore each stage in detail! ๐
Xmcyber
Operationalizing CTEM with XM Cyber
XM Cyber on Operationalizing The Continuous Threat Exposure Management (CTEM) Framework by Gartnerยฎ
๐20๐ฅ4๐1๐คฏ1
๐ Two critical vulnerabilities found in WordPressโs CleanTalk plugin leave sites exposed to malicious attacks and data theft.
This exploit impacts over 200,000 sitesโupdate your CleanTalk plugin ASAP!
Get the full details here: https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html
This exploit impacts over 200,000 sitesโupdate your CleanTalk plugin ASAP!
Get the full details here: https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html
๐27๐ฅ16๐3๐ฑ2
๐จ New threat alert: Matrix, a lone-wolf hacker, is using IoT devices as a botnet to launch widespread DDoS attack.
Learn how you can secure your systems and prevent similar threats. Full story here: https://thehackernews.com/2024/11/matrix-botnet-exploits-iot-devices-in.html
Learn how you can secure your systems and prevent similar threats. Full story here: https://thehackernews.com/2024/11/matrix-botnet-exploits-iot-devices-in.html
๐ฅ15๐6๐5โก1
๐ INTERPOLโs massive operation across 19 African nations has resulted in over 1,000 arrests and the takedown of 134,000+ malicious networks.
Learn more about how this operation โ https://thehackernews.com/2024/11/interpol-busts-african-cybercrime-1006.html
Learn more about how this operation โ https://thehackernews.com/2024/11/interpol-busts-african-cybercrime-1006.html
๐31๐10โก4๐ฅ4๐ค3๐2๐ฑ2
Zero Trust isnโt just a buzzwordโitโs a necessity. Zero Trust Network Access (ZTNA) can replace VPNs, reduce lateral movement, and harden existing devices, making them nearly impossible to exploit.
Find out how to get started with Zero Trust for a stronger security posture: https://thehackernews.com/expert-insights/2024/11/defensible-security-architecture-and.html
Find out how to get started with Zero Trust for a stronger security posture: https://thehackernews.com/expert-insights/2024/11/defensible-security-architecture-and.html
๐25๐ฅ8๐4
APT-C-60 strikes again โ this time with a targeted attack exploiting the WPS Office vulnerability (CVE-2024-7262) to deploy the SpyGlace backdoor.
Read more about how this advanced attack works: https://thehackernews.com/2024/11/apt-c-60-exploits-wps-office.html
Read more about how this advanced attack works: https://thehackernews.com/2024/11/apt-c-60-exploits-wps-office.html
๐19โก5๐ค2๐ฑ2
A new UEFI bootkit called Bootkitty has been discovered, designed specifically for Linux systemsโmarking a significant shift in the cyber threat landscape.
Read the full analysis โ https://thehackernews.com/2024/11/researchers-discover-bootkitty-first.html
Read the full analysis โ https://thehackernews.com/2024/11/researchers-discover-bootkitty-first.html
๐ฅ27๐ฑ12๐6๐3โก2
Multi-stage cyberattacks are getting harder to detect and more dangerous than ever. Learn how they trick you into letting your guard down.
Attackers use links, embedded QR codes, and other sneaky methods to steal your credentials.
Learn how to spot these hidden threats: https://thehackernews.com/2024/11/latest-multi-stage-attack-scenarios.html
Attackers use links, embedded QR codes, and other sneaky methods to steal your credentials.
Learn how to spot these hidden threats: https://thehackernews.com/2024/11/latest-multi-stage-attack-scenarios.html
๐17๐ฅ12๐คฏ4โก3๐2
A critical #vulnerability (CVE-2024-11680) in the ProjectSend file-sharing app is being actively exploited.
It allows attackers to execute malicious code on vulnerable servers.
Donโt wait for an attackโpatch now: https://thehackernews.com/2024/11/critical-flaw-in-projectsend-under.html
It allows attackers to execute malicious code on vulnerable servers.
Donโt wait for an attackโpatch now: https://thehackernews.com/2024/11/critical-flaw-in-projectsend-under.html
๐26๐ฑ9โก4๐2๐2
T-Mobile has detected attempted cyber intrusions from an external provider's networkโbut no sensitive data was accessed.
Find out more: https://thehackernews.com/2024/11/us-telecom-giant-t-mobile-detects.html
Find out more: https://thehackernews.com/2024/11/us-telecom-giant-t-mobile-detects.html
๐19๐ค9๐2๐1๐ฑ1
Cybercriminals are using Godot Engine, a popular open-source game engine, to spread #malware undetected across Windows, macOS, and Linux devices.
Over 17,000 systems have been infected since June 2024.
Find details here โ https://thehackernews.com/2024/11/cybercriminals-exploit-popular-game.html
Over 17,000 systems have been infected since June 2024.
Find details here โ https://thehackernews.com/2024/11/cybercriminals-exploit-popular-game.html
๐15๐ฅ8๐คฏ4โก2๐ค1
๐จ A software supply chain attack has been active for over a year on npm.
Researchers discovered a seemingly harmless xmlrpc library that secretly exfiltrated sensitive data and mined cryptocurrency.
๐ Read more: https://thehackernews.com/2024/11/xmlrpc-npm-library-turns-malicious.html
Researchers discovered a seemingly harmless xmlrpc library that secretly exfiltrated sensitive data and mined cryptocurrency.
๐ Read more: https://thehackernews.com/2024/11/xmlrpc-npm-library-turns-malicious.html
๐ฑ22๐6โก3๐3๐ค3
With tools struggling to keep up, AppSec teams are often left overwhelmed. "Shift left" was supposed to be the answer, but the true breakthrough is โshift right.โ
Curious about how this change is shaping AppSec?
Learn more in the article: https://thehackernews.com/expert-insights/2024/11/breathing-new-life-into-stagnant-appsec.html
Curious about how this change is shaping AppSec?
Learn more in the article: https://thehackernews.com/expert-insights/2024/11/breathing-new-life-into-stagnant-appsec.html
๐12๐5๐ค1
Nearly two dozen security vulnerabilities have been identified in Advantech EKI industrial-grade wireless access point devices, which could allow remote attackers to fully compromise industrial systems
Learn more โ https://thehackernews.com/2024/11/over-two-dozen-flaws-identified-in.html
Learn more โ https://thehackernews.com/2024/11/over-two-dozen-flaws-identified-in.html
๐ฑ11๐6๐ฅ3๐1
๐ A 59-year-old man sentenced to 4 years for sharing sensitive corporate and political data with China's Ministry of State Security (MSS).
๐ Read more: https://thehackernews.com/2024/11/us-citizen-sentenced-for-spying-on.html
๐ Read more: https://thehackernews.com/2024/11/us-citizen-sentenced-for-spying-on.html
๐คฏ25๐9๐8๐ฅ7โก6๐ฑ2
๐จ Microsoft just addressed critical security flaws impacting its AI, cloud, and ERP offerings, with one flaw (CVE-2024-49035) already exploited in the wild.
Get the full details โ https://thehackernews.com/2024/11/microsoft-fixes-ai-cloud-and-erp.html
Get the full details โ https://thehackernews.com/2024/11/microsoft-fixes-ai-cloud-and-erp.html
๐12โก7๐ค4๐3๐2๐ฅ1
โ ๏ธ Warning: Rockstar 2FA phishing kit bypasses Microsoft 365 MFA, intercepting credentials and session cookies. MFA is no longer enough.
Learn how this threat works and how to protect your business: https://thehackernews.com/2024/11/phishing-as-service-rockstar-2fa.html
Learn how this threat works and how to protect your business: https://thehackernews.com/2024/11/phishing-as-service-rockstar-2fa.html
โก20๐ฑ10๐6๐4๐3๐ค3๐ฅ2
The digital and physical worlds are merging, opening up new opportunities but also creating significant security challenges.
Failing to secure both realms can lead to devastating breaches.
Learn how to protect your business from these evolving threats: https://thehackernews.com/2024/11/protecting-tomorrows-world-shaping.html
Failing to secure both realms can lead to devastating breaches.
Learn how to protect your business from these evolving threats: https://thehackernews.com/2024/11/protecting-tomorrows-world-shaping.html
๐21๐ค4๐ฅ2