๐จ A security flaw, dubbed AuthQuake, in Microsoftโs Multi-Factor Authentication (MFA) allowed attackers to bypass protection within an hour โ no alerts, no interaction required.
Get the full story here: https://thehackernews.com/2024/12/microsoft-mfa-authquake-flaw-enabled.html
Get the full story here: https://thehackernews.com/2024/12/microsoft-mfa-authquake-flaw-enabled.html
๐ฅ18๐ฑ7๐6
This media is not supported in your browser
VIEW IN TELEGRAM
๐จ A trusted Windows feature, UI Automation, can be exploited by #malware to bypass EDR detection, execute stealthy commands, and steal data undetected.
๐ Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
๐ Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
๐20๐ฅ5๐คฏ4โก3๐2
A Russian state-sponsored group, Secret Blizzard, is leveraging other hackersโ #malware to deploy its tools in Ukraine, raising the stakes in cyber warfare.
Read the full story: https://thehackernews.com/2024/12/secret-blizzard-deploys-kazuar-backdoor.html
Read the full story: https://thehackernews.com/2024/12/secret-blizzard-deploys-kazuar-backdoor.html
๐14๐9๐ฅ7๐คฏ4๐ฑ3๐2โก1
๐จ Operation PowerOFF โ Global law enforcement just shut down 27 DDoS-for-hire platforms, dismantling major stresser services used by cybercriminals to disrupt websites.
Over 300 users and 3 admins are under investigation, with arrests made in France and Germany.
Read: https://thehackernews.com/2024/12/europol-dismantles-27-ddos-attack.html
Over 300 users and 3 admins are under investigation, with arrests made in France and Germany.
Read: https://thehackernews.com/2024/12/europol-dismantles-27-ddos-attack.html
๐ฅ27๐4โก3๐ฑ2
Did you know? Your team could be using dozens of SaaS tools youโre unaware ofโright now!
Unapproved apps, duplicate tenants, and risky OAuth grants are just the tip of the iceberg. Discover how Nudge Security is revolutionizing SaaS visibility and governance.
Read more about the solution here: https://thehackernews.com/2024/01/what-is-nudge-security-and-how-does-it.html
Unapproved apps, duplicate tenants, and risky OAuth grants are just the tip of the iceberg. Discover how Nudge Security is revolutionizing SaaS visibility and governance.
Read more about the solution here: https://thehackernews.com/2024/01/what-is-nudge-security-and-how-does-it.html
๐23
Critical flaw in Hunk Companion plugin (CVE-2024-11972, CVSS: 9.8) allows attackers to install vulnerable plugins, potentially leading to Remote Code Execution (RCE), SQL Injection, and administrative backdoors.
Over 10,000 WordPress sites are at risk. Learn steps to secure your site now: https://thehackernews.com/2024/12/wordpress-hunk-companion-plugin-flaw.html
Over 10,000 WordPress sites are at risk. Learn steps to secure your site now: https://thehackernews.com/2024/12/wordpress-hunk-companion-plugin-flaw.html
๐19๐ฅ3
[Free] Cloud Risk Self-Assessment Checklist
Ready to secure your cloud? Easily evaluate and uncover cloud risk with this simple checklist to help strengthen your security posture.
Downlod Checklist: https://thn.news/cloud-risk-checklist
Ready to secure your cloud? Easily evaluate and uncover cloud risk with this simple checklist to help strengthen your security posture.
Downlod Checklist: https://thn.news/cloud-risk-checklist
๐13๐ฅ4๐คฏ2โก1๐1
๐จ Apple's TCC framework #vulnerability exposed!
A now-patched flaw (CVE-2024-44131) allowed unauthorized apps to access sensitive data like Health info, microphone, and #iCloud backupsโwithout users knowing.
Learn more: https://thehackernews.com/2024/12/researchers-uncover-symlink-exploit.html
A now-patched flaw (CVE-2024-44131) allowed unauthorized apps to access sensitive data like Health info, microphone, and #iCloud backupsโwithout users knowing.
Learn more: https://thehackernews.com/2024/12/researchers-uncover-symlink-exploit.html
๐14๐ฑ10๐4โก2๐ฅ2๐ค1
Gamaredon, a Russian-linked hacking group, targets mobile devices with BoneSpy and PlainGnome, #spyware stealing SMS, call logs, location, and photos in former Soviet states.
Find details here: https://thehackernews.com/2024/12/gamaredon-deploys-android-spyware.html
Find details here: https://thehackernews.com/2024/12/gamaredon-deploys-android-spyware.html
๐14๐9โก5๐ฅ5
Over 296,000 Prometheus Node Exporter instances and 40,300 servers are publicly accessible, exposing sensitive credentials and API keys.
Read the full article: https://thehackernews.com/2024/12/296000-prometheus-instances-exposed.html
Read the full article: https://thehackernews.com/2024/12/296000-prometheus-instances-exposed.html
๐ค17โก10๐5
U.S. DoJ dismantles Rydox marketplace, seizes $225K in cryptocurrency, arrests three Kosovo nationals for selling stolen data and cybercrime tools, impacting 18,000 users.
Read the story: https://thehackernews.com/2024/12/fbi-busts-rydox-marketplace-with-7600.html
Read the story: https://thehackernews.com/2024/12/fbi-busts-rydox-marketplace-with-7600.html
๐16๐ฅ8โก5๐5
๐จ New Malware Alert: PUMAKIT, a #Linux rootkit, employs advanced stealth tactics to evade detection and escalate privileges.
Itโs not just hiding filesโitโs altering core system behavior while remaining invisible to system tools.
Learn how PUMAKIT operates ๐ https://thehackernews.com/2024/12/new-linux-rootkit-pumakit-uses-advanced.html
Itโs not just hiding filesโitโs altering core system behavior while remaining invisible to system tools.
Learn how PUMAKIT operates ๐ https://thehackernews.com/2024/12/new-linux-rootkit-pumakit-uses-advanced.html
๐ฅ17๐8๐ฑ5โก2๐2
๐ฅ Iranian-linked IOCONTROL malware exploits IoT and OT devices, targeting SCADA systems and fuel infrastructure with advanced evasion tactics like MQTT and DNS-over-HTTPS.
๐ Learn how this sophisticated malware operates https://thehackernews.com/2024/12/iran-linked-iocontrol-malware-targets.html
๐ Learn how this sophisticated malware operates https://thehackernews.com/2024/12/iran-linked-iocontrol-malware-targets.html
โก24๐6๐ค6๐4๐4๐ฑ4๐ฅ2
๐จ U.S. DoJ indicts 14 North Koreans for a $88M IT fraud scheme involving identity theft, extortion, and data breaches. $2.26M seized and a $5M reward announced for tips.
Learn more: https://thehackernews.com/2024/12/doj-indicts-14-north-koreans-for-88m-it.html
Learn more: https://thehackernews.com/2024/12/doj-indicts-14-north-koreans-for-88m-it.html
๐21๐ฅ7๐คฏ4๐2โก1
๐ก๏ธ Critical OpenWrt #vulnerability (CVE-2024-54143) discovered โ With just a 12-character hash collision, attackers can replace legitimate firmware with a malicious alternative, all without authentication.
Discover the technical details: https://thehackernews.com/2024/12/critical-openwrt-vulnerability-exposes.html
Discover the technical details: https://thehackernews.com/2024/12/critical-openwrt-vulnerability-exposes.html
๐คฏ15๐12๐ฅ7๐ฑ6๐2โก1
๐จ Why Do Great Companies Still Get Breached? Advanced solutions donโt always mean advanced protection.
๐๏ธ Join Silverfortโs CISO, John Paul Cunningham, as he explores:
โCommon vulnerabilities often overlooked, even with advanced solutions
โHow attackers bypass traditional defenses
โ Practical strategies to address hidden risks and blind spots
๐ 16 December, 2024
๐ Donโt miss outโReserve your spot for this exclusive webinar: https://thehacker.news/ciso-perspective-data-breaches
๐ฌ โStrengthening defenses isnโt just about toolsโitโs about strategy.โ
๐๏ธ Join Silverfortโs CISO, John Paul Cunningham, as he explores:
โCommon vulnerabilities often overlooked, even with advanced solutions
โHow attackers bypass traditional defenses
โ Practical strategies to address hidden risks and blind spots
๐ 16 December, 2024
๐ Donโt miss outโReserve your spot for this exclusive webinar: https://thehacker.news/ciso-perspective-data-breaches
๐ฌ โStrengthening defenses isnโt just about toolsโitโs about strategy.โ
๐19๐ฅ5โก3๐ค2
"United States Department of Justice.pdf" โ Legit? Think Again!
New Backdoor Targeting Thai Officials. Hackers are deploying a stealthy backdoor, Yokai, by disguising malware as trusted documents.
๐ฏ What happened? DLL side-loading enables attackers to bypass defenses.
๐ก Backdoor connects to attacker-controlled servers for total system control. Without proactive measures, businesses risk breaches that cost millions.
Hereโs what you can do NOW:
1๏ธโฃ Train teams on spotting spear-phishing lures.
2๏ธโฃ Audit systems for DLL side-loading vulnerabilities.
3๏ธโฃ Strengthen your endpoint defenses.
Find details here: https://thehackernews.com/2024/12/thai-officials-targeted-in-yokai.html
New Backdoor Targeting Thai Officials. Hackers are deploying a stealthy backdoor, Yokai, by disguising malware as trusted documents.
๐ฏ What happened? DLL side-loading enables attackers to bypass defenses.
๐ก Backdoor connects to attacker-controlled servers for total system control. Without proactive measures, businesses risk breaches that cost millions.
Hereโs what you can do NOW:
1๏ธโฃ Train teams on spotting spear-phishing lures.
2๏ธโฃ Audit systems for DLL side-loading vulnerabilities.
3๏ธโฃ Strengthen your endpoint defenses.
Find details here: https://thehackernews.com/2024/12/thai-officials-targeted-in-yokai.html
๐22โก5๐ฅ4๐2
๐จ Could Your Device Be a Secret Cybercriminal Tool?
The Federal Office of Information Security (BSI) just disrupted BADBOX, a malware preloaded on common devices like picture frames and cheap android phones.
๐ก Whatโs the risk?
โข Devices turned into ad fraud machines, routing hackers' internet traffic.
โข Stolen authentication codes, fake Gmail & WhatsApp accounts created.
โ ๏ธ Why it matters:
This isnโt just a malware problemโit's a supply chain crisis. If a device seems "too cheap," it might come with hidden costs.
๐ Learn more: https://thehackernews.com/2024/12/germany-disrupts-badbox-malware-on.html
The Federal Office of Information Security (BSI) just disrupted BADBOX, a malware preloaded on common devices like picture frames and cheap android phones.
๐ก Whatโs the risk?
โข Devices turned into ad fraud machines, routing hackers' internet traffic.
โข Stolen authentication codes, fake Gmail & WhatsApp accounts created.
โ ๏ธ Why it matters:
This isnโt just a malware problemโit's a supply chain crisis. If a device seems "too cheap," it might come with hidden costs.
๐ Learn more: https://thehackernews.com/2024/12/germany-disrupts-badbox-malware-on.html
๐31๐ฑ8โก3๐ฅ2๐1๐ค1
โ ๏ธ Ukraineโs SSU uncovered a shocking case involving 15- and 16-year-olds who were tricked by the FSB into espionage missions disguised as innocent quests, assisting in reconnaissance for airstrikes.
๐ Key Insights:
โ How: Teens were sent coordinates, tasked to take photos/videos of key locations.
โ Impact: Data shared via encrypted chats led to airstrikes on Ukrainian soil.
โ Key Arrests: Ukraineโs SSU detained multiple operatives, including a Russian police officer orchestrating the missions.
Read how Ukraine dismantled this operation and what it means for cyber and physical security.
Full story here: https://thehackernews.com/2024/12/ukrainian-minors-recruited-for-cyber.html
๐ Key Insights:
โ How: Teens were sent coordinates, tasked to take photos/videos of key locations.
โ Impact: Data shared via encrypted chats led to airstrikes on Ukrainian soil.
โ Key Arrests: Ukraineโs SSU detained multiple operatives, including a Russian police officer orchestrating the missions.
Read how Ukraine dismantled this operation and what it means for cyber and physical security.
Full story here: https://thehackernews.com/2024/12/ukrainian-minors-recruited-for-cyber.html
๐28๐คฏ19๐14๐ฅ6๐ค5โก1๐1
๐จ A new PHP-based backdoor, Glutton, is wreaking havoc across the globe, targeting China, the US, Cambodia, Pakistan, and South Africa. This APT41's toolkit doesnโt stop thereโitโs also attacking cybercriminals!
โถ Uses compromised enterprise hosts as bait ๐ฃ
โถ Infects popular PHP frameworks like Laravel and ThinkPHP
โถ Modular framework with 22 unique commands for stealthy infiltration
โถ Surprisingly lacks typical nation-state-level encryptionโwhy?
โถ Leaves no files behindโensures stealth through FastCGI processes
๐ See how Glutton operates. Read the full story: https://thehackernews.com/2024/12/new-glutton-malware-exploits-popular.html
โถ Uses compromised enterprise hosts as bait ๐ฃ
โถ Infects popular PHP frameworks like Laravel and ThinkPHP
โถ Modular framework with 22 unique commands for stealthy infiltration
โถ Surprisingly lacks typical nation-state-level encryptionโwhy?
โถ Leaves no files behindโensures stealth through FastCGI processes
๐ See how Glutton operates. Read the full story: https://thehackernews.com/2024/12/new-glutton-malware-exploits-popular.html
๐คฏ16๐6๐4๐ค2๐ฑ2๐ฅ1
Double Scammed? Hereโs How - Fraudsters are re-victimizing people by offering โrefundsโ via Europol and Interpol-branded scams:
๐ Fake profiles, stolen accounts, and malicious links.
๐ธ Promises of recovering stolen moneyโฆ at a high cost.
Even educated professionals are falling prey to these advanced tactics.
๐ Explore the latest trends and expert analysis here: https://thehackernews.com/2024/12/new-investment-scam-leverages-ai-social.html
๐ Fake profiles, stolen accounts, and malicious links.
๐ธ Promises of recovering stolen moneyโฆ at a high cost.
Even educated professionals are falling prey to these advanced tactics.
๐ Explore the latest trends and expert analysis here: https://thehackernews.com/2024/12/new-investment-scam-leverages-ai-social.html
๐11๐6๐ฅ2