Cybercriminals are using Godot Engine, a popular open-source game engine, to spread #malware undetected across Windows, macOS, and Linux devices.
Over 17,000 systems have been infected since June 2024.
Find details here β https://thehackernews.com/2024/11/cybercriminals-exploit-popular-game.html
Over 17,000 systems have been infected since June 2024.
Find details here β https://thehackernews.com/2024/11/cybercriminals-exploit-popular-game.html
π15π₯8π€―4β‘2π€1
π¨ A software supply chain attack has been active for over a year on npm.
Researchers discovered a seemingly harmless xmlrpc library that secretly exfiltrated sensitive data and mined cryptocurrency.
π Read more: https://thehackernews.com/2024/11/xmlrpc-npm-library-turns-malicious.html
Researchers discovered a seemingly harmless xmlrpc library that secretly exfiltrated sensitive data and mined cryptocurrency.
π Read more: https://thehackernews.com/2024/11/xmlrpc-npm-library-turns-malicious.html
π±22π6β‘3π3π€3
With tools struggling to keep up, AppSec teams are often left overwhelmed. "Shift left" was supposed to be the answer, but the true breakthrough is βshift right.β
Curious about how this change is shaping AppSec?
Learn more in the article: https://thehackernews.com/expert-insights/2024/11/breathing-new-life-into-stagnant-appsec.html
Curious about how this change is shaping AppSec?
Learn more in the article: https://thehackernews.com/expert-insights/2024/11/breathing-new-life-into-stagnant-appsec.html
π12π5π€1
Nearly two dozen security vulnerabilities have been identified in Advantech EKI industrial-grade wireless access point devices, which could allow remote attackers to fully compromise industrial systems
Learn more β https://thehackernews.com/2024/11/over-two-dozen-flaws-identified-in.html
Learn more β https://thehackernews.com/2024/11/over-two-dozen-flaws-identified-in.html
π±11π6π₯3π1
π A 59-year-old man sentenced to 4 years for sharing sensitive corporate and political data with China's Ministry of State Security (MSS).
π Read more: https://thehackernews.com/2024/11/us-citizen-sentenced-for-spying-on.html
π Read more: https://thehackernews.com/2024/11/us-citizen-sentenced-for-spying-on.html
π€―25π9π8π₯7β‘6π±2
π¨ Microsoft just addressed critical security flaws impacting its AI, cloud, and ERP offerings, with one flaw (CVE-2024-49035) already exploited in the wild.
Get the full details β https://thehackernews.com/2024/11/microsoft-fixes-ai-cloud-and-erp.html
Get the full details β https://thehackernews.com/2024/11/microsoft-fixes-ai-cloud-and-erp.html
π12β‘7π€4π3π2π₯1
β οΈ Warning: Rockstar 2FA phishing kit bypasses Microsoft 365 MFA, intercepting credentials and session cookies. MFA is no longer enough.
Learn how this threat works and how to protect your business: https://thehackernews.com/2024/11/phishing-as-service-rockstar-2fa.html
Learn how this threat works and how to protect your business: https://thehackernews.com/2024/11/phishing-as-service-rockstar-2fa.html
β‘20π±10π6π4π3π€3π₯2
The digital and physical worlds are merging, opening up new opportunities but also creating significant security challenges.
Failing to secure both realms can lead to devastating breaches.
Learn how to protect your business from these evolving threats: https://thehackernews.com/2024/11/protecting-tomorrows-world-shaping.html
Failing to secure both realms can lead to devastating breaches.
Learn how to protect your business from these evolving threats: https://thehackernews.com/2024/11/protecting-tomorrows-world-shaping.html
π21π€4π₯2
Russian hacker Mikhail Matveev, tied to LockBit & Hive ransomware, arrested in Russia. The US had offered a $10M reward for his role in global ransomware attacks.
Learn more: https://thehackernews.com/2024/11/wanted-russian-cybercriminal-linked-to.html
Learn more: https://thehackernews.com/2024/11/wanted-russian-cybercriminal-linked-to.html
π52π€―32π₯17π15β‘9π±8π€3π1
π° Operation HAECHI-V, led by INTERPOL and 40 countries, dismantled a massive e-crime syndicate, arresting over 5,500 suspects, seizing $400M in virtual assets, and recovering billions, delivering a strong warning to cybercriminals worldwide.
https://thehackernews.com/2024/12/interpol-arrests-5500-in-global.html
https://thehackernews.com/2024/12/interpol-arrests-5500-in-global.html
π32π₯10π4π€―3π±3
π¨ Over a dozen #Android apps on Google Play, downloaded over 8 million times, have been found to carry malware called SpyLoan. These apps prey on vulnerable users seeking quick loans.
These apps donβt just trap users in high-interest loansβthey steal personal and financial data, leading to extortion and harassment.
Find out how this global scam operates: https://thehackernews.com/2024/12/8-million-android-users-hit-by-spyloan.html
These apps donβt just trap users in high-interest loansβthey steal personal and financial data, leading to extortion and harassment.
Find out how this global scam operates: https://thehackernews.com/2024/12/8-million-android-users-hit-by-spyloan.html
π₯24π8π±6π2
β‘ WEBINAR ALERT: Hackers are already targeting AI apps while youβre building them. If security isnβt baked in, the costs could be devastating.
Ready to future-proof your AI development? Join the webinar thatβs equipping developers and tech leaders to secure tomorrowβs innovations, today.
Register Now: https://thehackernews.com/2024/12/a-guide-to-securing-ai-app-development.html
Ready to future-proof your AI development? Join the webinar thatβs equipping developers and tech leaders to secure tomorrowβs innovations, today.
Register Now: https://thehackernews.com/2024/12/a-guide-to-securing-ai-app-development.html
π12π4π₯2β‘1
Manufacturing & healthcare sectors are being targeted by SmokeLoader #malwareβmodular, evasive, and deadly.
With plugins that steal data, mine crypto, and launch DDoS, no system is safe.
Full story here: https://thehackernews.com/2024/12/smokeloader-malware-resurfaces.html
With plugins that steal data, mine crypto, and launch DDoS, no system is safe.
Full story here: https://thehackernews.com/2024/12/smokeloader-malware-resurfaces.html
π13π5β‘3π€1
π¨ Over 1,000 victims targeted by the new Horns&Hooves malware campaign.
Using fake emails disguised as customer requests, attackers deploy NetSupport RAT & BurnsRAT, leading to data theft & ransomware risks.
π Read more: https://thehackernews.com/2024/12/horns-campaign-delivers-rats-via-fake.html
Using fake emails disguised as customer requests, attackers deploy NetSupport RAT & BurnsRAT, leading to data theft & ransomware risks.
π Read more: https://thehackernews.com/2024/12/horns-campaign-delivers-rats-via-fake.html
π16β‘4π3π₯2π€―2
π§ Kimsuky, a North Korea-aligned #hacking group, now uses Russian email services like Mail[.]ru to disguise phishing attacks aimed at stealing credentials.
Discover how these campaigns operate: https://thehackernews.com/2024/12/north-korean-kimsuky-hackers-use.html
Discover how these campaigns operate: https://thehackernews.com/2024/12/north-korean-kimsuky-hackers-use.html
π13π3π₯2
Researchers have uncovered critical vulnerabilities in Palo Alto Networks and SonicWall VPN clients, which could allow attackers to achieve remote code execution on Windows and macOS systems, install malicious root certificates, and execute privileged commands.
A proof-of-concept tool, NachoVPN, has been released.
π Read more: https://thehackernews.com/2024/12/nachovpn-tool-exploits-flaws-in-popular.html
A proof-of-concept tool, NachoVPN, has been released.
π Read more: https://thehackernews.com/2024/12/nachovpn-tool-exploits-flaws-in-popular.html
π17π5β‘4π1
Cybersecurity is moving beyond 'castle & moat' defenses. Modern threats target critical systemsβlights, water, citiesβraising stakes to safety & national security.
Legacy OT systems need modern solutions like PAM & Zero Trust to stay secure.
Learn more: https://thehackernews.com/expert-insights/2024/11/beyond-castle-walls-operational.html
Legacy OT systems need modern solutions like PAM & Zero Trust to stay secure.
Learn more: https://thehackernews.com/expert-insights/2024/11/beyond-castle-walls-operational.html
π14π₯3β‘1π1
A 10-year-old flaw in Cisco ASA (CVE-2014-2120) is being actively exploited. This vulnerability allows attackers to execute XSS attacks remotely.
If your Cisco ASA isn't updated, you could be the next target.
Learn more: https://thehackernews.com/2024/12/cisco-warns-of-exploitation-of-decade.html
If your Cisco ASA isn't updated, you could be the next target.
Learn more: https://thehackernews.com/2024/12/cisco-warns-of-exploitation-of-decade.html
π14π8π±4β‘3π₯2
π Attacks using stolen credentials are surging, fueled by the rise in infostealers and the criminal marketplaces dealing in them.
TI feeds can alert you to stolen credentials when they appear for sale, but TI providers have no way to check if the credentials are actually valid or not.
Using Push Security, you can now eliminate the noise and get alerts only when verified credentials belonging to your employees appear on criminal marketplaces.
Pushβs browser extension compares stolen credentials from widely-used TI feeds directly against the credentials your employees are actually using β
Find out more here π https://thn.news/push-credential-detection
TI feeds can alert you to stolen credentials when they appear for sale, but TI providers have no way to check if the credentials are actually valid or not.
Using Push Security, you can now eliminate the noise and get alerts only when verified credentials belonging to your employees appear on criminal marketplaces.
Pushβs browser extension compares stolen credentials from widely-used TI feeds directly against the credentials your employees are actually using β
Find out more here π https://thn.news/push-credential-detection
π17π6β‘4π₯4
π¨ A new phishing campaign is slipping past email defenses! Corrupted ZIP files and Office documents bypass antivirus and spam filters, landing directly in your inbox.
π© Why care? These cleverly crafted files could lead you straight to fake login pages or malware-laden sites. One wrong click could cost your dataβor worse.
Read the full breakdown: https://thehackernews.com/2024/12/hackers-use-corrupted-zips-and-office.html
π© Why care? These cleverly crafted files could lead you straight to fake login pages or malware-laden sites. One wrong click could cost your dataβor worse.
Read the full breakdown: https://thehackernews.com/2024/12/hackers-use-corrupted-zips-and-office.html
π17β‘5π₯2π1
π¨ Alert: A critical vulnerability (CVE-2024-10905) in SailPoint's IdentityIQ software exposes sensitive content.
CVSS score? A whopping 10.0βmaximum severity.
Affected versions span from 8.2 to 8.4 and earlier, putting countless systems at risk. Static files that should be locked down are now vulnerable to unauthorized access.
Learn more: https://thehackernews.com/2024/12/critical-sailpoint-identityiq.html
CVSS score? A whopping 10.0βmaximum severity.
Affected versions span from 8.2 to 8.4 and earlier, putting countless systems at risk. Static files that should be locked down are now vulnerable to unauthorized access.
Learn more: https://thehackernews.com/2024/12/critical-sailpoint-identityiq.html
π€9π₯5π3β‘1