π¨ Black Basta ransomware operators have adopted new social engineering tricks, targeting victims with email bombs and impersonating IT staff on Microsoft Teams.
Click for insights π https://thehackernews.com/2024/12/black-basta-ransomware-evolves-with.html
Click for insights π https://thehackernews.com/2024/12/black-basta-ransomware-evolves-with.html
π21π5π±4π₯1
β οΈ A Russia-linked group, UAC-0185, is ramping up phishing attacks targeting Ukraine's defense forces. These attacks use malware delivered through malicious links, leveraging PowerShell scripts and HTML applications to install remote control tools like MeshAgent, giving attackers full access to compromised systems.
Full details: https://thehackernews.com/2024/12/cert-ua-warns-of-phishing-attacks.html
Full details: https://thehackernews.com/2024/12/cert-ua-warns-of-phishing-attacks.html
π₯24π11π9β‘2π€2π±2
π¨ 90% of modern applications rely on open source software (OSS)βbut this innovation comes with a major security price tag. Recent attacks like SolarWinds and Log4j prove just how fragile the supply chain is.
Discover actionable strategies to protect your software supply chain.
Donβt wait for the next attackβread more now: https://thehackernews.com/expert-insights/2024/12/securing-open-source-lessons-from.html
Discover actionable strategies to protect your software supply chain.
Donβt wait for the next attackβread more now: https://thehackernews.com/expert-insights/2024/12/securing-open-source-lessons-from.html
π13π€4π₯3π3
π¨ Cyberattacks are evolving fast! From stealthy zero-day exploits to fileless malware and phishing hosted on trusted platforms, the latest threats demand smarter defenses.
π See how tools like ANYRUN's sandbox expose hidden dangers in real-time.
π Stay aheadβread the full breakdown here: https://thehackernews.com/2024/12/ongoing-phishing-and-malware-campaigns.html
π See how tools like ANYRUN's sandbox expose hidden dangers in real-time.
π Stay aheadβread the full breakdown here: https://thehackernews.com/2024/12/ongoing-phishing-and-malware-campaigns.html
π₯17π3π€―1
A suspected China-linked cyber espionage campaign, Operation Digital Eye, targeted major IT service providers in Southern Europe, exploiting Visual Studio Code Remote Tunnels to infiltrate systems.
Learn more: https://thehackernews.com/2024/12/hackers-weaponize-visual-studio-code.html
Learn more: https://thehackernews.com/2024/12/hackers-weaponize-visual-studio-code.html
π12π₯5π1
Belgian and Dutch authorities have arrested 8 suspects linked to a massive phishing scam that stole millions. The gang used fake banking calls and phishing links to con victims, with some even posing as police at victims' doorsteps.
Full story: https://thehackernews.com/2024/12/phone-phishing-gang-busted-eight.html
Full story: https://thehackernews.com/2024/12/phone-phishing-gang-busted-eight.html
π18π7π₯4π€―1
The Georgetown Master's in Cybersecurity Risk Management covers business, law, computer science, and organizational change.
Learn more: https://thn.news/georgetown-masters-cyber-risk-ig
Learn more: https://thn.news/georgetown-masters-cyber-risk-ig
π22π€1
π¨ Sophisticated mobile phishing campaign uncovered! Attackers are distributing the updated Antidot banking trojan, now called AppLite Banker, targeting unsuspecting job seekers.
Learn how this threat operates and what measures to take: https://thehackernews.com/2024/12/fake-recruiters-distribute-banking.html
Learn how this threat operates and what measures to take: https://thehackernews.com/2024/12/fake-recruiters-distribute-banking.html
π11π₯5π€4
A critical vulnerability (CVE-2024-50623) in Cleo's file transfer software is under active, widespread exploitationβaffecting fully patched systems.
The flaw allows unauthenticated remote code execution through unrestricted file uploads, enabling attackers to execute arbitrary code.
Over 4,200 organizations use Cleo software globallyβthis is a major security concern for logistics, consumer products, and more.
Get critical insights: https://thehackernews.com/2024/12/cleo-file-transfer-vulnerability-under.html
The flaw allows unauthenticated remote code execution through unrestricted file uploads, enabling attackers to execute arbitrary code.
Over 4,200 organizations use Cleo software globallyβthis is a major security concern for logistics, consumer products, and more.
Get critical insights: https://thehackernews.com/2024/12/cleo-file-transfer-vulnerability-under.html
π13π€―3π2
π€ Traditional pentesting is falling behind. Cyberattacks happen dailyβautomation ensures your defenses are always ready, not just once a year.
Automated pentesting delivers frequent, accurate, and cost-efficient assessments, ensuring real-time visibility into your vulnerabilities.
Discover how automation is changing the game: https://thehackernews.com/2024/12/the-future-of-network-security.html
Automated pentesting delivers frequent, accurate, and cost-efficient assessments, ensuring real-time visibility into your vulnerabilities.
Discover how automation is changing the game: https://thehackernews.com/2024/12/the-future-of-network-security.html
π24π4β‘3
π₯ Critical Security Alert! Ivanti uncovers a CVSS 10.0-rated vulnerability allowing unauthenticated attackers to gain admin access in their Cloud Services Application.
This flaw isnβt aloneβIvanti has patched multiple critical vulnerabilities in its Connect Secure and CSA products.
π Don't waitβexplore the critical details and ensure your systems are secure: https://thehackernews.com/2024/12/ivanti-issues-critical-security-updates.html
This flaw isnβt aloneβIvanti has patched multiple critical vulnerabilities in its Connect Secure and CSA products.
π Don't waitβexplore the critical details and ensure your systems are secure: https://thehackernews.com/2024/12/ivanti-issues-critical-security-updates.html
π16π6π€―5β‘3π2π₯1
U.S. has unsealed charges against a Chinese hacker for exploiting a zero-day #vulnerability in 81,000 Sophos firewalls, enabling the infiltration of critical systems, the theft of sensitive data, and targeting U.S. infrastructure.
Learn more: https://thehackernews.com/2024/12/us-charges-chinese-hacker-for.html
Learn more: https://thehackernews.com/2024/12/us-charges-chinese-hacker-for.html
π43π26π€―3
π» Microsoftβs final Patch Tuesday of 2024 fixed 72 vulnerabilities, including one actively exploited in the wild: CVE-2024-49138.
Ensure your systems are updated now.
π Read more: https://thehackernews.com/2024/12/microsoft-fixes-72-flaws-including.html
Ensure your systems are updated now.
π Read more: https://thehackernews.com/2024/12/microsoft-fixes-72-flaws-including.html
π26π9π€5π3π±2
Discover how Zero Trust, immutable backups, and encryption can secure Microsoft365βstarting with Zero Trust, where every access request is verified.
Learn key strategies to protect your environment.
Read the full article now: https://thehackernews.com/expert-insights/2024/12/5-strategies-to-combat-ransomware-and.html
Learn key strategies to protect your environment.
Read the full article now: https://thehackernews.com/expert-insights/2024/12/5-strategies-to-combat-ransomware-and.html
π16
π¨ A new surveillance tool, EagleMsgSpy, has been exposed as a powerful spyware linked to Chinese police departments, secretly collecting vast data from mobile devices since 2017.
π Read full details here: https://thehackernews.com/2024/12/chinese-eaglemsgspy-spyware-found.html
π Read full details here: https://thehackernews.com/2024/12/chinese-eaglemsgspy-spyware-found.html
β‘16π11π€―9π€4π₯1
β‘ WEBINAR ALERT: SaaS apps are transforming businessβbut are they secure?
Join KPMG Canada & AppOmni to learn how to protect your data from risks.
Register now: https://thehackernews.uk/saas-appsec-cyber-risk
Join KPMG Canada & AppOmni to learn how to protect your data from risks.
Register now: https://thehackernews.uk/saas-appsec-cyber-risk
π12π4π€2
π ZLoader #malware is backβwith a stealthy upgrade. The latest version employs DNS tunneling for encrypted communication, raising the stakes for detection efforts.
This isnβt just an update; ZLoader now includes an interactive shell capable of executing over a dozen commands, a game-changer for #ransomware attacks.
Dive into the details. https://thehackernews.com/2024/12/zloader-malware-returns-with-dns.html
This isnβt just an update; ZLoader now includes an interactive shell capable of executing over a dozen commands, a game-changer for #ransomware attacks.
Dive into the details. https://thehackernews.com/2024/12/zloader-malware-returns-with-dns.html
π₯15π8π€―2
π¨ A security flaw, dubbed AuthQuake, in Microsoftβs Multi-Factor Authentication (MFA) allowed attackers to bypass protection within an hour β no alerts, no interaction required.
Get the full story here: https://thehackernews.com/2024/12/microsoft-mfa-authquake-flaw-enabled.html
Get the full story here: https://thehackernews.com/2024/12/microsoft-mfa-authquake-flaw-enabled.html
π₯18π±7π6
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ A trusted Windows feature, UI Automation, can be exploited by #malware to bypass EDR detection, execute stealthy commands, and steal data undetected.
π Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
π Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
π20π₯5π€―4β‘3π2
A Russian state-sponsored group, Secret Blizzard, is leveraging other hackersβ #malware to deploy its tools in Ukraine, raising the stakes in cyber warfare.
Read the full story: https://thehackernews.com/2024/12/secret-blizzard-deploys-kazuar-backdoor.html
Read the full story: https://thehackernews.com/2024/12/secret-blizzard-deploys-kazuar-backdoor.html
π14π9π₯7π€―4π±3π2β‘1
π¨ Operation PowerOFF β Global law enforcement just shut down 27 DDoS-for-hire platforms, dismantling major stresser services used by cybercriminals to disrupt websites.
Over 300 users and 3 admins are under investigation, with arrests made in France and Germany.
Read: https://thehackernews.com/2024/12/europol-dismantles-27-ddos-attack.html
Over 300 users and 3 admins are under investigation, with arrests made in France and Germany.
Read: https://thehackernews.com/2024/12/europol-dismantles-27-ddos-attack.html
π₯27π4β‘3π±2