A Brazilian hacker faces U.S. charges for extorting $3.2M in Bitcoin after stealing confidential data from 300,000 customers.
Learn more: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html
Learn more: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html
π₯56π19π10π€6β‘3π€―2
π¨ A critical CVE-2024-52046 vulnerability in Apache MINA, scoring a perfect CVSS 10.0, could enable remote code execution.
The flaw lies in Javaβs deserialization protocol, leaving systems wide open to attack if improperly secured.
Read now: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html
The flaw lies in Javaβs deserialization protocol, leaving systems wide open to attack if improperly secured.
Read now: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html
π₯20π7π6π±3β‘2
π When Devices Turn Against You!
Two dangerous botnetsβFICORA and CAPSAICINβare hijacking vulnerable D-Link routers through known weaknesses.
β οΈ Attack methods include brute force, shell execution, and 12+ DDoS variations.
See how to patch vulnerabilities and prevent attacks here: https://thehackernews.com/2024/12/ficora-and-kaiten-botnets-exploit-old-d.html
Two dangerous botnetsβFICORA and CAPSAICINβare hijacking vulnerable D-Link routers through known weaknesses.
β οΈ Attack methods include brute force, shell execution, and 12+ DDoS variations.
See how to patch vulnerabilities and prevent attacks here: https://thehackernews.com/2024/12/ficora-and-kaiten-botnets-exploit-old-d.html
π18π₯6π6β‘3π±3
π₯ CVE-2024-3393 Alert! A single malicious DNS packet can reboot your Palo Alto firewall and leave your network defenseless.
Important to Know:
Β» This flaw impacts PAN-OS 10.X & 11.X, including Prisma Access.
Β» Repeated attacks could force your firewall into maintenance mode.
Β» Legacy PAN-OS 11.0 users? No fixesβitβs time to upgrade!
βοΈ How to Fix:
Β» Update to PAN-OS 10.1.14-h8 or later.
Β» Use workarounds to disable risky logging until upgrades are complete.
Read now: https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html
Important to Know:
Β» This flaw impacts PAN-OS 10.X & 11.X, including Prisma Access.
Β» Repeated attacks could force your firewall into maintenance mode.
Β» Legacy PAN-OS 11.0 users? No fixesβitβs time to upgrade!
βοΈ How to Fix:
Β» Update to PAN-OS 10.1.14-h8 or later.
Β» Use workarounds to disable risky logging until upgrades are complete.
Read now: https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html
π€―32π₯9π7π5β‘2π€1
π Cloud Atlas is deploying VBShower and PowerShowerβmalware that operates in stages, infiltrating networks and harvesting credentials.
π Quick Actions:
βοΈ Patch outdated vulnerabilities like CVE-2018-0802 immediately
βοΈ Monitor for unusual cloud storage activity
βοΈ Deploy advanced monitoring tools for NTFS file changes.
βοΈ Conduct phishing simulations to bolster employee awareness.
Find details here: https://thehackernews.com/2024/12/cloud-atlas-deploys-vbcloud-malware.html
π Quick Actions:
βοΈ Patch outdated vulnerabilities like CVE-2018-0802 immediately
βοΈ Monitor for unusual cloud storage activity
βοΈ Deploy advanced monitoring tools for NTFS file changes.
βοΈ Conduct phishing simulations to bolster employee awareness.
Find details here: https://thehackernews.com/2024/12/cloud-atlas-deploys-vbcloud-malware.html
π€16π10β‘2π₯2
North Korean hackers are targeting job seekers with a deceptive campaign, deploying a new malware called OtterCookie through fake interview tools.
This new JavaScript malware, is:
Β» Stealing files and cryptocurrency wallets.
Β» Communicating directly with attackers via socket(.)io
Β» Constantly evolving to bypass detection.
π Full Report: https://thehackernews.com/2024/12/north-korean-hackers-deploy-ottercookie.html
This new JavaScript malware, is:
Β» Stealing files and cryptocurrency wallets.
Β» Communicating directly with attackers via socket(.)io
Β» Constantly evolving to bypass detection.
π Full Report: https://thehackernews.com/2024/12/north-korean-hackers-deploy-ottercookie.html
π₯26π16π6π±6π5β‘1
β οΈ 15,000+ Four-Faith routers are exposed, with attackers actively exploiting a command injection flaw (CVE-2024-12856).
1οΈβ£ Attackers execute commands remotely via the adj_time_year parameter.
2οΈβ£ Reverse shells enable hackers to stay hidden and in control.
Read: https://thehackernews.com/2024/12/15000-four-faith-routers-exposed-to-new.html
1οΈβ£ Attackers execute commands remotely via the adj_time_year parameter.
2οΈβ£ Reverse shells enable hackers to stay hidden and in control.
Read: https://thehackernews.com/2024/12/15000-four-faith-routers-exposed-to-new.html
π±28π17π€5β‘3π₯2
π 600,000+ users impacted! A widespread campaign compromised 16+ extensions, including tools for AI and VPNs, using phishing and malicious code injection.
Learn more: https://thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html
Learn more: https://thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html
π€―29π15π11π€7β‘4π₯1
What if your password manager or note-taking tool became a hackerβs entry point? Recent attacks on Chrome Store extensions reveal just how exposed your organization might be.
β Why It Matters:
Β» Browser extensions are a silent threatβgranted access to sensitive data like cookies and identities.
Β» Credential theft can lead to organizational data breaches and compliance nightmares.
π‘Key Takeaways:
Β» Limit user-installed extensions.
Β» Implement risk-based policies to block risky permissions.
Β» Stay updated on the latest threats.
π Check out this guide to learn how: https://thehackernews.com/2024/12/when-good-extensions-go-bad-takeaways.html
β Why It Matters:
Β» Browser extensions are a silent threatβgranted access to sensitive data like cookies and identities.
Β» Credential theft can lead to organizational data breaches and compliance nightmares.
π‘Key Takeaways:
Β» Limit user-installed extensions.
Β» Implement risk-based policies to block risky permissions.
Β» Stay updated on the latest threats.
π Check out this guide to learn how: https://thehackernews.com/2024/12/when-good-extensions-go-bad-takeaways.html
π21π11π3β‘2π₯2π€1π±1
π¨ Are hospitals prepared for the next big cyber attack? The HHS proposes new HIPAA updates to safeguard patient data and critical systems.
πProposed Solutions:
πΎ Encrypt sensitive data everywhere
π Map assets and identify vulnerabilities
β± Set recovery protocols within 72 hours
Read more: https://thehackernews.com/2024/12/new-hipaa-rules-mandate-72-hour-data.html
πProposed Solutions:
πΎ Encrypt sensitive data everywhere
π Map assets and identify vulnerabilities
β± Set recovery protocols within 72 hours
Read more: https://thehackernews.com/2024/12/new-hipaa-rules-mandate-72-hour-data.html
π25β‘7π€―5π₯2π1
π Three flaws in Microsoft Azure's Apache Airflow integration could have let attackers:
π© Gain shadow admin access to Kubernetes clusters
π΅οΈββοΈ Exfiltrate sensitive data
π― Deploy undetected malware
π These misconfigurations allow attackers to tamper with logs, deploy privileged pods, and burrow deeper into cloud environmentsβall under the radar.
π Learn more: https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html
π© Gain shadow admin access to Kubernetes clusters
π΅οΈββοΈ Exfiltrate sensitive data
π― Deploy undetected malware
π These misconfigurations allow attackers to tamper with logs, deploy privileged pods, and burrow deeper into cloud environmentsβall under the radar.
π Learn more: https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html
π±12π₯5π4β‘2π2π€2
π¨ Suspected Chinese state-sponsored hackers breached the U.S. Treasury via a compromised API key from BeyondTrust, a third-party vendor.
π‘ Hereβs what happened:
Β» Attackers gained access to a key securing BeyondTrustβs cloud-based remote support service.
Β» They bypassed security to remotely access Treasury workstations and unclassified documents.
Β» CVE-2024-12356, a critical vulnerability (CVSS 9.8), was actively exploited.
β‘οΈ Read More: https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html
π‘ Hereβs what happened:
Β» Attackers gained access to a key securing BeyondTrustβs cloud-based remote support service.
Β» They bypassed security to remotely access Treasury workstations and unclassified documents.
Β» CVE-2024-12356, a critical vulnerability (CVSS 9.8), was actively exploited.
β‘οΈ Read More: https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html
π₯31π€―9β‘5π4π2π€2
π Department of Justice has finalized a rule blocking bulk transfers of Americansβ sensitive personal data to adversarial nations like China, Russia, and North Korea.
Β» Data like Social Security numbers, geolocation, biometrics, and health information is now protected.
Β» These countries have used such data for espionage, AI development, and suppressing freedoms.
Read full story here π https://thehackernews.com/2024/12/new-us-doj-rule-halts-bulk-data.html
Β» Data like Social Security numbers, geolocation, biometrics, and health information is now protected.
Β» These countries have used such data for espionage, AI development, and suppressing freedoms.
Read full story here π https://thehackernews.com/2024/12/new-us-doj-rule-halts-bulk-data.html
π24π10π₯7π3
The U.S. Treasury just sanctioned two major entitiesβone Iranian and one Russianβfor meddling in the 2024 presidential election through AI-powered disinformation campaigns.
Hereβs what they did:
π οΈ Created deepfakes and synthetic content using AI.
π Built a network of 100+ fake news sites to spread misinformation.
π° Backed by intelligence agencies like Iran's IRGC and Russia's GRU.
Learn the latest tactics π https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html
Hereβs what they did:
π οΈ Created deepfakes and synthetic content using AI.
π Built a network of 100+ fake news sites to spread misinformation.
π° Backed by intelligence agencies like Iran's IRGC and Russia's GRU.
Learn the latest tactics π https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html
π22π10π±8π€3π€―1
β οΈ Click. Click. Hacked?
DoubleClickjacking: A new clickjacking variant that stealthily exploits timing gaps between clicks to hijack accounts.
This attack bypasses protections like X-Frame-Options and SameSite cookies.
Read the article: https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
DoubleClickjacking: A new clickjacking variant that stealthily exploits timing gaps between clicks to hijack accounts.
This attack bypasses protections like X-Frame-Options and SameSite cookies.
Read the article: https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
π€―42π₯16π6π3
π¨ Three Russian-German nationals charged with espionage and sabotage by German prosecutors.
One suspect, Dieter S., allegedly scouted military sites and planned attacks to disrupt Germany's support for Ukraine.
Learn more: https://thehackernews.com/2025/01/three-russian-german-nationals-charged.html
One suspect, Dieter S., allegedly scouted military sites and planned attacks to disrupt Germany's support for Ukraine.
Learn more: https://thehackernews.com/2025/01/three-russian-german-nationals-charged.html
π16π4π₯3
π A new npm package poses as a vulnerability detector for Ethereum smart contracts but silently installs Quasar RATβa remote access trojan that gives attackers:
π₯οΈ Full control over your system
π‘οΈ Persistence via Windows Registry tweaks
π‘ Command-and-Control connections to steal data
π Read the full analysis: https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html
π₯οΈ Full control over your system
π‘οΈ Persistence via Windows Registry tweaks
π‘ Command-and-Control connections to steal data
π Read the full analysis: https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html
π30π±8
β‘ Did you know? Cross-domain attackers often stay hidden for weeks before escalating privileges.
Why do attackers thrive? Because fragmented security tools leave gapsβand adversaries like FAMOUS CHOLLIMA are exploiting every one of them.
π¬ Question: Are your identity systems truly secure, or just compliant?
π‘ Expert Take: A unified platform transforms identity systems into secure perimeters by:
Β» Closing blind spots with end-to-end visibility.
Β» Integrating seamlessly across cloud, SaaS, and on-prem environments.
Β» Accelerating threat detection for proactive defense.
π Learn how to level up your defenses: https://thehackernews.com/2025/01/cross-domain-attacks-growing-threat-to.html
Attackers move fastβyour defenses need to be faster.
Why do attackers thrive? Because fragmented security tools leave gapsβand adversaries like FAMOUS CHOLLIMA are exploiting every one of them.
π¬ Question: Are your identity systems truly secure, or just compliant?
π‘ Expert Take: A unified platform transforms identity systems into secure perimeters by:
Β» Closing blind spots with end-to-end visibility.
Β» Integrating seamlessly across cloud, SaaS, and on-prem environments.
Β» Accelerating threat detection for proactive defense.
π Learn how to level up your defenses: https://thehackernews.com/2025/01/cross-domain-attacks-growing-threat-to.html
Attackers move fastβyour defenses need to be faster.
π17π₯15
β οΈ Researchers have uncovered details of now-patched vulnerabilities in Dynamics 365 and Power Apps Web API that exposed sensitive user data, including emails, financial information, and password hashes.
π Learn more: https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html
π Learn more: https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html
π18π7π₯6π5β‘3
π Apple will pay $95M to settle claims that Siri accidentally recorded and shared private conversations with third parties.
π Key Details:
Β» Covers Siri-enabled devices from 2014 to 2024.
Β» Claim up to $20 per device (max 5).
Β» Apple introduced new privacy settings, but is it enough?
π Get the full story: https://thehackernews.com/2025/01/apple-to-pay-siri-users-20-per-device.html
π Key Details:
Β» Covers Siri-enabled devices from 2014 to 2024.
Β» Claim up to $20 per device (max 5).
Β» Apple introduced new privacy settings, but is it enough?
π Get the full story: https://thehackernews.com/2025/01/apple-to-pay-siri-users-20-per-device.html
π₯29π13π9β‘2π€1
π¨ Critical Update: With Edgio services shutting down, Microsoft is migrating all .NET workloads to Azure Front Door CDNs.
π‘ Deadline: January 7, 2025.
π Scan your codebase and update references today to avoid downtime.
Learn more: https://thehackernews.com/2025/01/critical-deadline-update-old-net.html
π‘ Deadline: January 7, 2025.
π Scan your codebase and update references today to avoid downtime.
Learn more: https://thehackernews.com/2025/01/critical-deadline-update-old-net.html
π18π6