π¨ A critical flaw (CVE-2024-12356, CVSS score: 9.8) has been discovered in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) products.
An unauthenticated attacker could exploit this to inject commands and execute arbitrary OS actions, posing a serious security risk.
Learn more: https://thehackernews.com/2024/12/beyondtrust-issues-urgent-patch-for.html
An unauthenticated attacker could exploit this to inject commands and execute arbitrary OS actions, posing a serious security risk.
Learn more: https://thehackernews.com/2024/12/beyondtrust-issues-urgent-patch-for.html
π€―8β‘4π1π₯1π±1
Are tech debt challenges holding you back?
π Dive into ActiveState's latest whitepaper, featuring best practices to turn tech debt into a strategic advantage.
π Learn how effective open source management can reduce opportunity costs and security risks. Empower your team with actionable insights.
Download now: https://thn.news/tech-debt-best-practices
π Dive into ActiveState's latest whitepaper, featuring best practices to turn tech debt into a strategic advantage.
π Learn how effective open source management can reduce opportunity costs and security risks. Empower your team with actionable insights.
Download now: https://thn.news/tech-debt-best-practices
β‘4π₯3π€―2π1
π Would you click on a fake DocuSign email? Thousands already did.
Phishers are baiting employees with urgent DocuSign alerts, exploiting trusted services like HubSpot Free Form Builder to redirect users to fake Office 365 login pages for credential theft.
The numbers tell the story:
π» 20,000+ users in Europe impacted
π οΈ Bulletproof hosting powers attackersβ infrastructure
π Increasing abuse of trusted tools like Google Calendar
π Learn more: https://thehackernews.com/2024/12/hubphish-exploits-hubspot-tools-to.html
Phishers are baiting employees with urgent DocuSign alerts, exploiting trusted services like HubSpot Free Form Builder to redirect users to fake Office 365 login pages for credential theft.
The numbers tell the story:
π» 20,000+ users in Europe impacted
π οΈ Bulletproof hosting powers attackersβ infrastructure
π Increasing abuse of trusted tools like Google Calendar
π Learn more: https://thehackernews.com/2024/12/hubphish-exploits-hubspot-tools-to.html
π24π±3π₯2β‘1
β οΈ Ukraineβs CERT-UA uncovers a malware attack targeting military personnel.
Disguised as the Army+ app, this sophisticated attack:
Β» Exploits Cloudflare Workers and Pages to host fake login pages.
Β» Tricks users into giving up credentials.
Β» Installs OpenSSH and steals cryptographic keys via the TOR network.
π‘ Even legitimate services are becoming a haven for cybercriminals, raising red flags for CISOs and CTOs.
π Read the full analysis here: https://thehackernews.com/2024/12/uac-0125-abuses-cloudflare-workers-to.html
Disguised as the Army+ app, this sophisticated attack:
Β» Exploits Cloudflare Workers and Pages to host fake login pages.
Β» Tricks users into giving up credentials.
Β» Installs OpenSSH and steals cryptographic keys via the TOR network.
π‘ Even legitimate services are becoming a haven for cybercriminals, raising red flags for CISOs and CTOs.
π Read the full analysis here: https://thehackernews.com/2024/12/uac-0125-abuses-cloudflare-workers-to.html
π15π₯8π5β‘1π€―1
Netflix has been fined β¬4.75M for violating GDPR by failing to explain how it used customer data like email addresses and payment details between 2018β2020.
Read more: https://thehackernews.com/2024/12/dutch-dpa-fines-netflix-475-million-for.html
Read more: https://thehackernews.com/2024/12/dutch-dpa-fines-netflix-475-million-for.html
β‘19π7π₯7π6π3π€1
π₯ Critical Alert: CISAβs new directive, BOD 25-01, sets a new benchmark in cloud security for federal agencies.
Why? Misconfigurations and weak controls are opening doors to attackers.
Key Deadlines:
Β» By Feb 2025: Identify all cloud tenants
Β» By Apr 2025: Deploy SCuBA assessment tools
Β» By Jun 2025: Implement mandatory policies
π Learn how to protect your communications effectively: https://thehackernews.com/2024/12/cisa-mandates-cloud-security-for.html
π‘οΈ Regularly update security configurations to reduce your attack surface.
Why? Misconfigurations and weak controls are opening doors to attackers.
Key Deadlines:
Β» By Feb 2025: Identify all cloud tenants
Β» By Apr 2025: Deploy SCuBA assessment tools
Β» By Jun 2025: Implement mandatory policies
π Learn how to protect your communications effectively: https://thehackernews.com/2024/12/cisa-mandates-cloud-security-for.html
π‘οΈ Regularly update security configurations to reduce your attack surface.
π11β‘4π2
π Fortinet's Wireless LAN Manager (FortiWLM) is vulnerable to a path traversal flaw (CVE-2023-34990) with a 9.6/10 CVSS score.
Why itβs urgent: It allows attackers to...
1οΈβ£ Access admin accounts using static session IDs.
2οΈβ£ Execute unauthorized commands by chaining vulnerabilities.
3οΈβ£ Gain root access to your network in minutes.
π οΈ Patch now:
Affected versions: 8.5.0 to 8.6.5.
Fixed in 8.6.6βupdate immediately.
Read: https://thehackernews.com/2024/12/fortinet-warns-of-critical-fortiwlm.html
Why itβs urgent: It allows attackers to...
1οΈβ£ Access admin accounts using static session IDs.
2οΈβ£ Execute unauthorized commands by chaining vulnerabilities.
3οΈβ£ Gain root access to your network in minutes.
π οΈ Patch now:
Affected versions: 8.5.0 to 8.6.5.
Fixed in 8.6.6βupdate immediately.
Read: https://thehackernews.com/2024/12/fortinet-warns-of-critical-fortiwlm.html
π₯15π6β‘2π€2
π¨ What if your device unknowingly became a tool for cybercrime? Itβs happening now.
Mirai malware strikes Juniper SSR devices, leveraging default passwords to turn them into DDoS attack machines. Over 90% of breached systems had unaltered factory settings.
π Donβt leave the door open. Secure your systems today.
Read the full report: https://thehackernews.com/2024/12/juniper-warns-of-mirai-botnet-targeting.html
Mirai malware strikes Juniper SSR devices, leveraging default passwords to turn them into DDoS attack machines. Over 90% of breached systems had unaltered factory settings.
π Donβt leave the door open. Secure your systems today.
Read the full report: https://thehackernews.com/2024/12/juniper-warns-of-mirai-botnet-targeting.html
π₯10π8π4β‘3π2π€2
Threat actors are tricking developers with fake npm packages like typescript-eslint lookalikes, amassing thousands of downloads.
Compromised tools = compromised enterprises. One wrong download could breach your entire development cycle.
π Your move:
β Review your dependencies.
β Learn how these attacks work.
β Build a resilient security strategy.
π Read here: https://thehackernews.com/2024/12/thousands-download-malicious-npm.html
Compromised tools = compromised enterprises. One wrong download could breach your entire development cycle.
π Your move:
β Review your dependencies.
β Learn how these attacks work.
β Build a resilient security strategy.
π Read here: https://thehackernews.com/2024/12/thousands-download-malicious-npm.html
π17π€―6π4β‘2
π¨ CISA warns of an actively exploited critical flaw (CVE-2024-12356, CVSS: 9.8) in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) products.
Attackers can exploit this flaw to run arbitrary commandsβno authentication required.
Read: https://thehackernews.com/2024/12/cisa-adds-critical-flaw-in-beyondtrust.html
Attackers can exploit this flaw to run arbitrary commandsβno authentication required.
Read: https://thehackernews.com/2024/12/cisa-adds-critical-flaw-in-beyondtrust.html
π12π9β‘5π€1
π Attackers are exploiting Fortinet's CVE-2023-48788 (CVSS 9.3) to install remote desktop tools like AnyDesk and ScreenConnect.
Theyβve already targeted companies across 12 countries, leveraging:
Β» SQL injection for unauthorized access
Β» Password recovery tools like Mimikatz
Β» PowerShell scripts for persistence
Donβt just patch vulnerabilitiesβassume attackers are already inside.
Find details here: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html
Theyβve already targeted companies across 12 countries, leveraging:
Β» SQL injection for unauthorized access
Β» Password recovery tools like Mimikatz
Β» PowerShell scripts for persistence
Donβt just patch vulnerabilitiesβassume attackers are already inside.
Find details here: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html
β‘10π8π₯6π3
π Alert: Two critical vulnerabilities in Sophos Firewalls could grant attackers remote code execution and privileged access.
π§ Action Plan:
βοΈ Update to v21 MR1 or newer.
βοΈ Restrict SSH access immediately.
βοΈ Ensure user portals are not WAN-exposed.
π Full advisory here: https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html
π§ Action Plan:
βοΈ Update to v21 MR1 or newer.
βοΈ Restrict SSH access immediately.
βοΈ Ensure user portals are not WAN-exposed.
π Full advisory here: https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html
π17β‘7π€―5
The notorious Lazarus Group is targeting nuclear engineers using trojanized VNC tools disguised as job assessments for aerospace roles.
Theyβve introduced a new modular malwareβCookiePlusβcapable of evading top-tier detection systems.
π Explore the full story here: https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html
Theyβve introduced a new modular malwareβCookiePlusβcapable of evading top-tier detection systems.
π Explore the full story here: https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html
π18β‘10π9
π₯ A dual Russian-Israeli national charged as the mastermind behind LockBit ransomwareβa cyber weapon that caused chaos across 120+ countries and left $500M in illicit profits.
Β» Targeted hospitals, schools, and critical infrastructure.
Β» Gained access to systems using custom malware to disable antivirus.
Β» LockBit is now planning a comeback with version 4.0!
Explore the full story of LockBitβs rise and fall: https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
Β» Targeted hospitals, schools, and critical infrastructure.
Β» Gained access to systems using custom malware to disable antivirus.
Β» LockBit is now planning a comeback with version 4.0!
Explore the full story of LockBitβs rise and fall: https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
π36π12π€8β‘7
π Italy has fined OpenAI β¬15 Million for violating GDPR.
Key issues:
Β» Processing user data without legal basis
Β» Failing to notify users about a 2023 security breach
Β» No age verification, exposing kids under 13 to risky content
π Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
Key issues:
Β» Processing user data without legal basis
Β» Failing to notify users about a 2023 security breach
Β» No age verification, exposing kids under 13 to risky content
π Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
π44π20π₯7π€―7π€6β‘3π3
π A U.S. judge held NSO Group liable for breaching WhatsAppβs terms of service and misusing its servers to silently deploy Pegasus spyware, targeting 1,400 users within a single month.
Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
β‘30π9π8π₯5π3π€―2π±2π€1
π¨ Rockstar2FA, a notorious phishing-as-a-service (PhaaS) toolkit, suffered a major collapse on November 11. In its place, FlowerStorm has emerged as the new threat. These tools exploit legitimate services like Cloudflare Turnstile to bypass detection effortlessly.
π Key Targets:
Β» Sectors: Engineering, real estate, consulting
Β» Countries: U.S., Canada, UK, Germany, India
If you operate in these industries, youβre already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.
π Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
π Key Targets:
Β» Sectors: Engineering, real estate, consulting
Β» Countries: U.S., Canada, UK, Germany, India
If you operate in these industries, youβre already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.
π Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
β‘14π€9π6
π¨ Top 10 Cybersecurity Trends for 2025: From AI-powered attacks to zero-day threats & supply chain risks, the future of cyber defense is evolving fast. Are you ready?
π Read: https://thehackernews.com/2024/12/top-10-cybersecurity-trends-to-expect.html
π Read: https://thehackernews.com/2024/12/top-10-cybersecurity-trends-to-expect.html
π16π€―7β‘2π₯2
π¨βπ» Is AI rewriting cybersecurity rules? Criminals are using LLMs to create natural-looking malware that evades detection.
π‘οΈ Whatβs happening:
Β» 10,000+ malware variants generated at scale.
Β» 88% trick tools like VirusTotal.
Β» Detection systems risk degradation over time.
π Learn more: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
π‘οΈ Whatβs happening:
Β» 10,000+ malware variants generated at scale.
Β» 88% trick tools like VirusTotal.
Β» Detection systems risk degradation over time.
π Learn more: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
π±12π₯8π6π6π€―5
β‘ A new remote code execution flaw in Apache Tomcat (CVE-2024-56337) exposes organizations to serious risk.
An uploaded file could turn into malicious JSP codeβresulting in remote code execution.
Β» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
Β» Java users: Incorrect configurations = higher risk.
Β» Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here π https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
An uploaded file could turn into malicious JSP codeβresulting in remote code execution.
Β» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
Β» Java users: Incorrect configurations = higher risk.
Β» Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here π https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
π27π19π€―10β‘5π3π₯1
π¨ CISA has added a high-severity vulnerability in USAHERDS (CVE-2021-44207) to its Known Exploited Vulnerabilities (KEV) catalog. This flaw has an 8.1 CVSS score and allows attackers to execute arbitrary code on affected servers.
Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
π14β‘4π3π±2π₯1