Play ransomware has turned into Ransomware-as-a-Service (RaaS), allowing other cybercriminals to use it.
Operators offering a complete packageβdocumentation, forums, technical support, and even help with negotiating ransoms.
Read: https://thehackernews.com/2023/11/play-ransomware-goes-commercial-now.html
Operators offering a complete packageβdocumentation, forums, technical support, and even help with negotiating ransoms.
Read: https://thehackernews.com/2023/11/play-ransomware-goes-commercial-now.html
π16π±12π9π€4π3
π Critical Security Alert: Threat actors, including LockBit ransomware affiliates, exploit the Citrix NetScaler flaw ("Citrix Bleed") to hijack user sessions and gain unauthorized access.
Learn more in this article: https://thehackernews.com/2023/11/lockbit-ransomware-exploiting-critical.html
Learn more in this article: https://thehackernews.com/2023/11/lockbit-ransomware-exploiting-critical.html
π₯13π7
π¨ macOS users beware! Atomic Stealer, a $1,000/month malware, is now spreading through deceptive web browser updates via ClearFake.
Find out how it infiltrates your device through compromised websites: https://thehackernews.com/2023/11/clearfake-campaign-expands-to-deliver.html
Find out how it infiltrates your device through compromised websites: https://thehackernews.com/2023/11/clearfake-campaign-expands-to-deliver.html
π14π₯6π4
β οΈ North Korean hackers posing as recruiters infect software developers with cross-platform malware named "BeaverTail" and "InvisibleFerret," targeting Windows, Linux, and macOS systems during fake interviews.
Learn more: https://thehackernews.com/2023/11/north-korean-hackers-pose-as-job.html
Learn more: https://thehackernews.com/2023/11/north-korean-hackers-pose-as-job.html
π₯20π6π€―5π±1
π©βπΌ Employees are embracing AI tools, and the pressure on CISOs is rising. The rapid adoption of AI, like ChatGPT, is reshaping cybersecurity.
Are we prepared for the risks?
Discover the risks and how to mitigate them: https://thehackernews.com/2023/11/ai-solutions-are-new-shadow-it.html
Are we prepared for the risks?
Discover the risks and how to mitigate them: https://thehackernews.com/2023/11/ai-solutions-are-new-shadow-it.html
π₯16π6π€5π1
π Multiple vulnerabilities have been discovered in laptop fingerprint sensors, potentially allowing attackers to bypass Windows Hello authentication on Dell, Lenovo, and Microsoft laptops.
Find out more:https://thehackernews.com/2023/11/new-flaws-in-fingerprint-sensors-let.html
Find out more:https://thehackernews.com/2023/11/new-flaws-in-fingerprint-sensors-let.html
π₯31π8π7π±5π2π€2
North Korean hackers, aka Diamond Sleet, spread a trojanized version of CyberLink's legit app.
Beware - They're using supply chain tricks to smuggle in malicious code.
Learn more about this attack: https://thehackernews.com/2023/11/north-korean-hackers-distribute.html
Beware - They're using supply chain tricks to smuggle in malicious code.
Learn more about this attack: https://thehackernews.com/2023/11/north-korean-hackers-distribute.html
π11π₯8π€―3π€2
Protect your organization from cyber threats with a Master's in Cybersecurity Risk Management from Georgetown University.
Attend a Sample Class β Security Architecture Design β on November 30 : https://thn.news/PqRskMsW
Attend a Sample Class β Security Architecture Design β on November 30 : https://thn.news/PqRskMsW
scs.georgetown.edu
Cybersecurity Risk ManagementβVirtual Sample Class | Georgetown SCS
π18π₯6π4π€3
π¨ Alert: Active malware campaign exploits zero-day vulnerabilities to create a Mirai-based DDoS botnet targeting routers and NVR devices.
Learn more: https://thehackernews.com/2023/11/mirai-based-botnet-exploiting-zero-day.html
Learn more: https://thehackernews.com/2023/11/mirai-based-botnet-exploiting-zero-day.html
π₯9π6β‘2π€2π€―2
Effective Incident Response is more than just tools. It's a process.
Explore the 6-step framework for successful IR: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.
Readn here: https://thehackernews.com/2023/11/6-steps-to-accelerate-cybersecurity.html
Explore the 6-step framework for successful IR: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.
Readn here: https://thehackernews.com/2023/11/6-steps-to-accelerate-cybersecurity.html
π10π₯5π€―3β‘2π2
β οΈ Beware: WailingCrab malware is spreading.
This sneaky loader spreads through shipping-themed emails. Once in your system, it establishes persistence and communicates via MQTT protocol.
Learn more: https://thehackernews.com/2023/11/alert-new-wailingcrab-malware-loader.html
This sneaky loader spreads through shipping-themed emails. Once in your system, it establishes persistence and communicates via MQTT protocol.
Learn more: https://thehackernews.com/2023/11/alert-new-wailingcrab-malware-loader.html
π₯9π7
π¨ Threat actor Konni, potentially tied to North Korea, deploys RAT in cyber espionage using Russian Word doc, exploiting WinRAR flaw, obfuscated VB scripts, UAC bypass payload, and using encrypted C2 communication.
Learn more: https://thehackernews.com/2023/11/konni-group-using-russian-language.html
Learn more: https://thehackernews.com/2023/11/konni-group-using-russian-language.html
π₯12π5π2π€―2
π¨ Alert: Researchers have discovered publicly exposed Kubernetes configuration secrets, posing a risk of supply chain attacks to blockchain and Fortune-500 companies.
Details: https://thehackernews.com/2023/11/kubernetes-secrets-of-fortune-500.html
46% of records may have valid container image registry credentials.
Details: https://thehackernews.com/2023/11/kubernetes-secrets-of-fortune-500.html
46% of records may have valid container image registry credentials.
π₯18π9π€―4
Researchers found a Rust version of SysJoker, a cross-platform backdoor used by Hamas-affiliated threat actor targeting Israel during ongoing conflict.
Read details here: https://thehackernews.com/2023/11/hamas-linked-cyberattacks-using-rust.html
Read details here: https://thehackernews.com/2023/11/hamas-linked-cyberattacks-using-rust.html
π₯14π10π8π€―2π1
β‘οΈ Has Your Secret Leaked? Here's the easiest way to find out.
GitGuardian launches the "HasMySecretLeaked" service to help developers check if their sensitive information has been exposed on GitHub, such as passwords, API keys, cryptographic certificates.
Read: https://thehackernews.com/2023/11/tell-me-your-secrets-without-telling-me.html
GitGuardian launches the "HasMySecretLeaked" service to help developers check if their sensitive information has been exposed on GitHub, such as passwords, API keys, cryptographic certificates.
Read: https://thehackernews.com/2023/11/tell-me-your-secrets-without-telling-me.html
π21π9β‘6π5π€4
π¨ Watch Out! Cybercriminals are using a malicious Telegram bot called "Telekopye" for large-scale phishing scams, creating fake websites, emails, and more.
Learn more: https://thehackernews.com/2023/11/cybercriminals-using-telekopye-telegram.html
Learn more: https://thehackernews.com/2023/11/cybercriminals-using-telekopye-telegram.html
π23π₯9π6π€―6
π¨ Critical Security Alert β ownCloud, an open-source file-sharing software, has disclosed 3 critical vulnerabilities. These can lead to sensitive information disclosure and unauthorized file modification.
Learn more: https://thehackernews.com/2023/11/warning-3-critical-vulnerabilities.html
Learn more: https://thehackernews.com/2023/11/warning-3-critical-vulnerabilities.html
π₯19π7π4π±4β‘2
π΅οΈββοΈ New Threat Alert: A new web shell called HrServ is part of a suspected APT attack in Afghanistan. HrServ can erase tracks and execute code in memory, increasing the threat's complexity.
Learn more: https://thehackernews.com/2023/11/new-hrservdll-web-shell-detected-in-apt.html
Learn more: https://thehackernews.com/2023/11/new-hrservdll-web-shell-detected-in-apt.html
π₯19π13π7
U.K., U.S., and 16 other international partners have released new GUIDELINES for the development of secure Artificial Intelligence (AI) systems.
Read details here: https://thehackernews.com/2023/11/us-uk-and-global-partners-release.html
Read details here: https://thehackernews.com/2023/11/us-uk-and-global-partners-release.html
π32π€17π€―10π₯6β‘4π4π±2π1
Did you know retailers face a vast cyber attack surface on #CyberMonday?
Today's retail isn't just about sales; it's about securing the SaaS apps that power those sales.
Learn how to fortify your SaaS apps against cyber threats: https://thehackernews.com/2023/11/how-to-handle-retail-saas-security-on.html
Today's retail isn't just about sales; it's about securing the SaaS apps that power those sales.
Learn how to fortify your SaaS apps against cyber threats: https://thehackernews.com/2023/11/how-to-handle-retail-saas-security-on.html
π₯11π6