๐ Fortinet's Wireless LAN Manager (FortiWLM) is vulnerable to a path traversal flaw (CVE-2023-34990) with a 9.6/10 CVSS score.
Why itโs urgent: It allows attackers to...
1๏ธโฃ Access admin accounts using static session IDs.
2๏ธโฃ Execute unauthorized commands by chaining vulnerabilities.
3๏ธโฃ Gain root access to your network in minutes.
๐ ๏ธ Patch now:
Affected versions: 8.5.0 to 8.6.5.
Fixed in 8.6.6โupdate immediately.
Read: https://thehackernews.com/2024/12/fortinet-warns-of-critical-fortiwlm.html
Why itโs urgent: It allows attackers to...
1๏ธโฃ Access admin accounts using static session IDs.
2๏ธโฃ Execute unauthorized commands by chaining vulnerabilities.
3๏ธโฃ Gain root access to your network in minutes.
๐ ๏ธ Patch now:
Affected versions: 8.5.0 to 8.6.5.
Fixed in 8.6.6โupdate immediately.
Read: https://thehackernews.com/2024/12/fortinet-warns-of-critical-fortiwlm.html
๐ฅ15๐6โก2๐ค2
๐จ What if your device unknowingly became a tool for cybercrime? Itโs happening now.
Mirai malware strikes Juniper SSR devices, leveraging default passwords to turn them into DDoS attack machines. Over 90% of breached systems had unaltered factory settings.
๐ Donโt leave the door open. Secure your systems today.
Read the full report: https://thehackernews.com/2024/12/juniper-warns-of-mirai-botnet-targeting.html
Mirai malware strikes Juniper SSR devices, leveraging default passwords to turn them into DDoS attack machines. Over 90% of breached systems had unaltered factory settings.
๐ Donโt leave the door open. Secure your systems today.
Read the full report: https://thehackernews.com/2024/12/juniper-warns-of-mirai-botnet-targeting.html
๐ฅ10๐8๐4โก3๐2๐ค2
Threat actors are tricking developers with fake npm packages like typescript-eslint lookalikes, amassing thousands of downloads.
Compromised tools = compromised enterprises. One wrong download could breach your entire development cycle.
๐ Your move:
โ Review your dependencies.
โ Learn how these attacks work.
โ Build a resilient security strategy.
๐ Read here: https://thehackernews.com/2024/12/thousands-download-malicious-npm.html
Compromised tools = compromised enterprises. One wrong download could breach your entire development cycle.
๐ Your move:
โ Review your dependencies.
โ Learn how these attacks work.
โ Build a resilient security strategy.
๐ Read here: https://thehackernews.com/2024/12/thousands-download-malicious-npm.html
๐17๐คฏ6๐4โก2
๐จ CISA warns of an actively exploited critical flaw (CVE-2024-12356, CVSS: 9.8) in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) products.
Attackers can exploit this flaw to run arbitrary commandsโno authentication required.
Read: https://thehackernews.com/2024/12/cisa-adds-critical-flaw-in-beyondtrust.html
Attackers can exploit this flaw to run arbitrary commandsโno authentication required.
Read: https://thehackernews.com/2024/12/cisa-adds-critical-flaw-in-beyondtrust.html
๐12๐9โก5๐ค1
๐ Attackers are exploiting Fortinet's CVE-2023-48788 (CVSS 9.3) to install remote desktop tools like AnyDesk and ScreenConnect.
Theyโve already targeted companies across 12 countries, leveraging:
ยป SQL injection for unauthorized access
ยป Password recovery tools like Mimikatz
ยป PowerShell scripts for persistence
Donโt just patch vulnerabilitiesโassume attackers are already inside.
Find details here: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html
Theyโve already targeted companies across 12 countries, leveraging:
ยป SQL injection for unauthorized access
ยป Password recovery tools like Mimikatz
ยป PowerShell scripts for persistence
Donโt just patch vulnerabilitiesโassume attackers are already inside.
Find details here: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html
โก10๐8๐ฅ6๐3
๐ Alert: Two critical vulnerabilities in Sophos Firewalls could grant attackers remote code execution and privileged access.
๐ง Action Plan:
โ๏ธ Update to v21 MR1 or newer.
โ๏ธ Restrict SSH access immediately.
โ๏ธ Ensure user portals are not WAN-exposed.
๐ Full advisory here: https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html
๐ง Action Plan:
โ๏ธ Update to v21 MR1 or newer.
โ๏ธ Restrict SSH access immediately.
โ๏ธ Ensure user portals are not WAN-exposed.
๐ Full advisory here: https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html
๐17โก7๐คฏ5
The notorious Lazarus Group is targeting nuclear engineers using trojanized VNC tools disguised as job assessments for aerospace roles.
Theyโve introduced a new modular malwareโCookiePlusโcapable of evading top-tier detection systems.
๐ Explore the full story here: https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html
Theyโve introduced a new modular malwareโCookiePlusโcapable of evading top-tier detection systems.
๐ Explore the full story here: https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html
๐18โก10๐9
๐ฅ A dual Russian-Israeli national charged as the mastermind behind LockBit ransomwareโa cyber weapon that caused chaos across 120+ countries and left $500M in illicit profits.
ยป Targeted hospitals, schools, and critical infrastructure.
ยป Gained access to systems using custom malware to disable antivirus.
ยป LockBit is now planning a comeback with version 4.0!
Explore the full story of LockBitโs rise and fall: https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
ยป Targeted hospitals, schools, and critical infrastructure.
ยป Gained access to systems using custom malware to disable antivirus.
ยป LockBit is now planning a comeback with version 4.0!
Explore the full story of LockBitโs rise and fall: https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
๐36๐12๐ค8โก7
๐ Italy has fined OpenAI โฌ15 Million for violating GDPR.
Key issues:
ยป Processing user data without legal basis
ยป Failing to notify users about a 2023 security breach
ยป No age verification, exposing kids under 13 to risky content
๐ Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
Key issues:
ยป Processing user data without legal basis
ยป Failing to notify users about a 2023 security breach
ยป No age verification, exposing kids under 13 to risky content
๐ Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
๐44๐20๐ฅ7๐คฏ7๐ค6โก3๐3
๐ A U.S. judge held NSO Group liable for breaching WhatsAppโs terms of service and misusing its servers to silently deploy Pegasus spyware, targeting 1,400 users within a single month.
Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
โก30๐9๐8๐ฅ5๐3๐คฏ2๐ฑ2๐ค1
๐จ Rockstar2FA, a notorious phishing-as-a-service (PhaaS) toolkit, suffered a major collapse on November 11. In its place, FlowerStorm has emerged as the new threat. These tools exploit legitimate services like Cloudflare Turnstile to bypass detection effortlessly.
๐ Key Targets:
ยป Sectors: Engineering, real estate, consulting
ยป Countries: U.S., Canada, UK, Germany, India
If you operate in these industries, youโre already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.
๐ Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
๐ Key Targets:
ยป Sectors: Engineering, real estate, consulting
ยป Countries: U.S., Canada, UK, Germany, India
If you operate in these industries, youโre already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.
๐ Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
โก14๐ค9๐6
๐จ Top 10 Cybersecurity Trends for 2025: From AI-powered attacks to zero-day threats & supply chain risks, the future of cyber defense is evolving fast. Are you ready?
๐ Read: https://thehackernews.com/2024/12/top-10-cybersecurity-trends-to-expect.html
๐ Read: https://thehackernews.com/2024/12/top-10-cybersecurity-trends-to-expect.html
๐16๐คฏ7โก2๐ฅ2
๐จโ๐ป Is AI rewriting cybersecurity rules? Criminals are using LLMs to create natural-looking malware that evades detection.
๐ก๏ธ Whatโs happening:
ยป 10,000+ malware variants generated at scale.
ยป 88% trick tools like VirusTotal.
ยป Detection systems risk degradation over time.
๐ Learn more: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
๐ก๏ธ Whatโs happening:
ยป 10,000+ malware variants generated at scale.
ยป 88% trick tools like VirusTotal.
ยป Detection systems risk degradation over time.
๐ Learn more: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
๐ฑ12๐ฅ8๐6๐6๐คฏ5
โก A new remote code execution flaw in Apache Tomcat (CVE-2024-56337) exposes organizations to serious risk.
An uploaded file could turn into malicious JSP codeโresulting in remote code execution.
ยป Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
ยป Java users: Incorrect configurations = higher risk.
ยป Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here ๐ https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
An uploaded file could turn into malicious JSP codeโresulting in remote code execution.
ยป Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
ยป Java users: Incorrect configurations = higher risk.
ยป Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here ๐ https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
๐27๐19๐คฏ10โก5๐3๐ฅ1
๐จ CISA has added a high-severity vulnerability in USAHERDS (CVE-2021-44207) to its Known Exploited Vulnerabilities (KEV) catalog. This flaw has an 8.1 CVSS score and allows attackers to execute arbitrary code on affected servers.
Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
๐14โก4๐3๐ฑ2๐ฅ1
๐ $308M stolen in a daring crypto heist targeting DMM Bitcoin. North Korean hackers used social engineering and malware to exploit insider access.
๐ Learn More: https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html
๐ Learn More: https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html
๐ฑ23๐ฅ16๐9๐คฏ6โก4
๐จ Charming Kitten strikes again! Iranian hackers deploy a new C++ variant of the infamous BellaCiao malware, targeting machines across Asia.
Learn how BellaCPP operates and prepare your team for emerging threats: https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
Learn how BellaCPP operates and prepare your team for emerging threats: https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
๐26๐16๐คฏ5๐ฅ3๐ค3
โ ๏ธ Apache Traffic Control usersโan SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database.
This flaw is easily exploitable by sending a specially crafted PUT request.
๐ง How to act now:
ยป Update to version 8.0.2 ASAP.
ยป Audit access permissions for high-risk roles.
ยป Double-check database configurations for security loopholes.
Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
This flaw is easily exploitable by sending a specially crafted PUT request.
๐ง How to act now:
ยป Update to version 8.0.2 ASAP.
ยป Audit access permissions for high-risk roles.
ยป Double-check database configurations for security loopholes.
Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
๐30๐9๐คฏ8โก7๐ฅ7๐ค3๐ฑ1
A Brazilian hacker faces U.S. charges for extorting $3.2M in Bitcoin after stealing confidential data from 300,000 customers.
Learn more: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html
Learn more: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html
๐ฅ56๐19๐10๐ค6โก3๐คฏ2
๐จ A critical CVE-2024-52046 vulnerability in Apache MINA, scoring a perfect CVSS 10.0, could enable remote code execution.
The flaw lies in Javaโs deserialization protocol, leaving systems wide open to attack if improperly secured.
Read now: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html
The flaw lies in Javaโs deserialization protocol, leaving systems wide open to attack if improperly secured.
Read now: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html
๐ฅ20๐7๐6๐ฑ3โก2
๐ When Devices Turn Against You!
Two dangerous botnetsโFICORA and CAPSAICINโare hijacking vulnerable D-Link routers through known weaknesses.
โ ๏ธ Attack methods include brute force, shell execution, and 12+ DDoS variations.
See how to patch vulnerabilities and prevent attacks here: https://thehackernews.com/2024/12/ficora-and-kaiten-botnets-exploit-old-d.html
Two dangerous botnetsโFICORA and CAPSAICINโare hijacking vulnerable D-Link routers through known weaknesses.
โ ๏ธ Attack methods include brute force, shell execution, and 12+ DDoS variations.
See how to patch vulnerabilities and prevent attacks here: https://thehackernews.com/2024/12/ficora-and-kaiten-botnets-exploit-old-d.html
๐18๐ฅ6๐6โก3๐ฑ3