Researchers describe a new attack method that can bypass web application firewalls (WAFs) and infiltrate systems.
Read: https://thehackernews.com/2022/12/researchers-detail-new-attack-method-to.html
The method worked successfully against WAFs from vendors such as AWS, Cloudflare, F5, Imperva, and Palo Alto Networks
Read: https://thehackernews.com/2022/12/researchers-detail-new-attack-method-to.html
The method worked successfully against WAFs from vendors such as AWS, Cloudflare, F5, Imperva, and Palo Alto Networks
😱42👍23🔥19🤯8👏7🤔7😁4⚡1
Hack-for-hire group Evilnum uses new Janicab malware variant to attack travel, legal and financial entities.
Read: https://thehackernews.com/2022/12/hack-for-hire-group-targets-travel-and.html
Read: https://thehackernews.com/2022/12/hack-for-hire-group-targets-travel-and.html
⚡30👍15🔥9😱9👏8
Cryptocurrency mining attacks against Linux systems are leveraging the open-source CHAOS remote access trojan to gain unauthorized access to the infected systems and mine cryptocurrencies.
Read: https://thehackernews.com/2022/12/cryptocurrency-mining-campaign-hits.html
Read: https://thehackernews.com/2022/12/cryptocurrency-mining-campaign-hits.html
😱12👍9⚡7🤔4
U.S. Department of Health and Human Services (HHS) has issued a warning about ongoing ransomware attacks targeting healthcare entities in the country.
Read: https://thehackernews.com/2022/12/royal-ransomware-threat-takes-aim-at-us.html
Read: https://thehackernews.com/2022/12/royal-ransomware-threat-takes-aim-at-us.html
👍17⚡9😁3
Say goodbye to passwords!
Google is rolling out passkeys support to its stable version of Chrome web browser for Windows, Android and macOS.
Read: https://thehackernews.com/2022/12/google-adds-passkey-support-to-chrome.html
Stay secure and logged in with this next-generation login standard
Google is rolling out passkeys support to its stable version of Chrome web browser for Windows, Android and macOS.
Read: https://thehackernews.com/2022/12/google-adds-passkey-support-to-chrome.html
Stay secure and logged in with this next-generation login standard
🤔91👍24😁16🤯14🔥13⚡2😱1
Stay ahead of the curve and protect your business with the latest cybersecurity news and insights.
Follow our LinkedIn page and join our community for the most relevant and timely cybersecurity news and information.
https://www.linkedin.com/company/thehackernews/
Follow our LinkedIn page and join our community for the most relevant and timely cybersecurity news and information.
https://www.linkedin.com/company/thehackernews/
🔥17👍11🤔9⚡1
Researchers have discovered new vulnerabilities in popular endpoint detection and response (EDR) and antivirus solutions (AV) that can be weaponized against users to carry out wiping attacks.
Read details: https://thehackernews.com/2022/12/researchers-demonstrate-how-edr-and.html
Read details: https://thehackernews.com/2022/12/researchers-demonstrate-how-edr-and.html
😱23👍11🔥6⚡2
Urgent: Fortinet has issued emergency patches for a severe pre-auth RCE vulnerability (CVE-2022-42475) affecting its FortiOS SSL-VPN product that is being actively exploited in the wild.
Read: https://thehackernews.com/2022/12/fortinet-warns-of-active-exploitation.html
Read: https://thehackernews.com/2022/12/fortinet-warns-of-active-exploitation.html
😱28👍17🔥6⚡3
Ugh, not again! Multiple malware campaigns discovered targeting Python and JavaScript developers via the official PyPI and npm repositories.
Read: https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html
Read: https://thehackernews.com/2022/12/malware-strains-targeting-python-and.html
🤯29👍12⚡8👏4🤔2
Cybersecurity researchers have unveiled the inner workings of a devastating new ransomware known as Azov, designed to corrupt data and inflict "impeccable damage" on compromised systems.
Read: https://thehackernews.com/2022/12/cybersecurity-experts-uncover-inner.html
Read: https://thehackernews.com/2022/12/cybersecurity-experts-uncover-inner.html
⚡18👍9🔥3😱3👏2
This severe vulnerability affecting the Amazon ECR Public Gallery may have opened the repositories to potential "deep #software supply chain" attacks.
Read: https://thehackernews.com/2022/12/serious-attacks-could-have-been-staged.html
Read: https://thehackernews.com/2022/12/serious-attacks-could-have-been-staged.html
🤯19👍10🔥4⚡1
Google launches open source availability of OSV-Scanner, a scanner that aims to offer easy access to vulnerability information about various projects.
Read: https://thehackernews.com/2022/12/google-launches-largest-distributed.html
Read: https://thehackernews.com/2022/12/google-launches-largest-distributed.html
🤔20👏12🔥9👍5⚡2
⚡ Zero-day vulnerability alert!
Apple has released security updates to patch a new "actively exploited" 0-day code execution vulnerability.
Make sure to update your iOS, iPadOS, macOS, tvOS, and Safari to keep your devices secure.
https://thehackernews.com/2022/12/new-actively-exploited-zero-day.html
Apple has released security updates to patch a new "actively exploited" 0-day code execution vulnerability.
Make sure to update your iOS, iPadOS, macOS, tvOS, and Safari to keep your devices secure.
https://thehackernews.com/2022/12/new-actively-exploited-zero-day.html
🔥26👍16😁6⚡4😱4
Warning: Hackers are exploiting a new critical zero-day RCE vulnerability (CVE-2022-27518) in Citrix ADC & Gateway to gain control of affected systems.
https://thehackernews.com/2022/12/hackers-actively-exploiting-citrix-adc.html
It is important that users apply latest security patches immediately to protect against this threat.
https://thehackernews.com/2022/12/hackers-actively-exploiting-citrix-adc.html
It is important that users apply latest security patches immediately to protect against this threat.
👍20😱11⚡2
⚡ Stay protected against new vulnerabilities and zero-day attacks by ensuring your devices are up to date with the latest December 2022 Patch Tuesday security updates from Microsoft, Adobe, Apple, Cisco and other major vendors.
https://thehackernews.com/2022/12/december-2022-patch-tuesday-get-latest.html
https://thehackernews.com/2022/12/december-2022-patch-tuesday-get-latest.html
🔥23👍14👏5⚡3
Researchers reveal attackers use legitimate Microsoft-signed drivers in ransomware and malware campaigns against various companies
Read: https://thehackernews.com/2022/12/ransomware-attackers-use-microsoft.html
Read: https://thehackernews.com/2022/12/ransomware-attackers-use-microsoft.html
⚡16🤯11👍10🔥4
New Go-Based "GoTrim" Botnet Threatens WordPress Sites: Protect Your Admin Account Now!
Details: https://thehackernews.com/2022/12/new-gotrim-botnet-attempting-to-break.html
Details: https://thehackernews.com/2022/12/new-gotrim-botnet-attempting-to-break.html
👍23😱12⚡9😁7
FBI has charged 6 individuals and seized 48 domains linked to DDoS-for-hire service platforms.
Read: https://thehackernews.com/2022/12/fbi-charges-6-seizes-48-domains-linked.html
Read: https://thehackernews.com/2022/12/fbi-charges-6-seizes-48-domains-linked.html
👏23👍8😁6🔥4⚡2
Have you heard about how attackers can use SVG files to secretly sneak QBot malware onto Windows systems?
Read this report for more details: https://thehackernews.com/2022/12/hacking-using-svg-files-to-smuggle-qbot.html
Read this report for more details: https://thehackernews.com/2022/12/hacking-using-svg-files-to-smuggle-qbot.html
🤯32👍9⚡6🔥3😁1
Open source repositories under attack: hackers flood NuGet, NPM, and PyPi with over 144,000 malicious packages
Details: https://thehackernews.com/2022/12/hackers-bombard-open-source.html
Details: https://thehackernews.com/2022/12/hackers-bombard-open-source.html
😱36👍14🤯10⚡9🔥7👏4🤔2