🚨 Microsoft found Kremlin-backed nation-state activity exploiting a security flaw in Outlook, risking victims' accounts.
Learn how folder permissions were used to extract valuable info: https://thehackernews.com/2023/12/microsoft-warns-of-kremlin-backed-apt28.html
Learn how folder permissions were used to extract valuable info: https://thehackernews.com/2023/12/microsoft-warns-of-kremlin-backed-apt28.html
👍10👏4😁3🤔2😱2
🚨 ALERT — Over 15,000 Go module repositories on GitHub are vulnerable to repojacking attacks.
Find out why and what actions need to be taken to address this issue.
Details here ➥ https://thehackernews.com/2023/12/15000-go-module-repositories-on-github.html
Find out why and what actions need to be taken to address this issue.
Details here ➥ https://thehackernews.com/2023/12/15000-go-module-repositories-on-github.html
🤯9🔥5👍4😁4⚡2
🚨 Webinar alert!
SoFi+ Sentra = Successful Data Security Posture Management (DSPM) for Fintech and Regulated Data.
🗓 Date: December 13
🕝 Time: 12:00 PM EST
Get ready for a fascinating discussion with SoFi, an innovative cloud-native financial services provider, about navigating data challenges while staying compliant with regulations and seamlessly managing third-party integrations.
Find out how they achieved all this through successfully implementing Sentra's DSPM solution.
🎙️ Featured Speakers:
➥ Pritam H Mungse , Director of Product Security at SoFi
➥ Zachary Schulze, Sr. Staff Application Security Engineer at SoFi
➥ Aviv Zisso, Director of Customer Success at Sentra
Register here — https://thn.news/sofi-webinar
SoFi+ Sentra = Successful Data Security Posture Management (DSPM) for Fintech and Regulated Data.
🗓 Date: December 13
🕝 Time: 12:00 PM EST
Get ready for a fascinating discussion with SoFi, an innovative cloud-native financial services provider, about navigating data challenges while staying compliant with regulations and seamlessly managing third-party integrations.
Find out how they achieved all this through successfully implementing Sentra's DSPM solution.
🎙️ Featured Speakers:
➥ Pritam H Mungse , Director of Product Security at SoFi
➥ Zachary Schulze, Sr. Staff Application Security Engineer at SoFi
➥ Aviv Zisso, Director of Customer Success at Sentra
Register here — https://thn.news/sofi-webinar
www.sentra.io
Webinar Recording: SoFi’s DSPM Success Story with Sentra
Security leaders are now adopting DSPM for comprehensive coverage, continuous discovery, and accurate classification of sensitive cloud data.
👍16
Microsoft Copilot transforms how we work with AI across Microsoft 365 apps.
Surprise: It can access everything 🤯 you've worked on in M365.
Is your data safe?
Learn more about this productivity powerhouse and its security implications: https://thehackernews.com/2023/12/generative-ai-security-preventing.html
Surprise: It can access everything 🤯 you've worked on in M365.
Is your data safe?
Learn more about this productivity powerhouse and its security implications: https://thehackernews.com/2023/12/generative-ai-security-preventing.html
🤯16👍10🔥5😱3
🆘 iPhone Users Alert: Beware of FAKE Lockdown Mode!
Attackers can now deceive you, enabling malware to persist even after a reboot.
Learn how this post-exploitation tampering technique works ➥ https://thehackernews.com/2023/12/warning-for-iphone-users-experts-warn.html
Attackers can now deceive you, enabling malware to persist even after a reboot.
Learn how this post-exploitation tampering technique works ➥ https://thehackernews.com/2023/12/warning-for-iphone-users-experts-warn.html
👍8😁8🔥6⚡2
📰 Russian-linked Doppelganger influence operation exposed targeting Ukraine, U.S., and Germany with AI-powered FAKE NEWS and social media.
Read this report here ➥ https://thehackernews.com/2023/12/russias-ai-powered-disinformation.html
Read this report here ➥ https://thehackernews.com/2023/12/russias-ai-powered-disinformation.html
😁16👍7👏6🤯6🔥3⚡2
Attention Android users! Qualcomm has disclosed 3 high-severity security vulnerabilities that were exploited in October 2023.
Learn more about them ➥ https://thehackernews.com/2023/12/qualcomm-releases-details-on-chip.html
Learn more about them ➥ https://thehackernews.com/2023/12/qualcomm-releases-details-on-chip.html
🔥14👍8⚡6😱1
🛡️ Atlassian has released software fixes to address four critical flaws in its software that could lead to remote code execution if exploited.
Find details here: https://thehackernews.com/2023/12/atlassian-releases-critical-software.html
Find details here: https://thehackernews.com/2023/12/atlassian-releases-critical-software.html
👍10🔥7
🕵️♂️ CISA warns of an ongoing cyber threat targeting government servers via an Adobe ColdFusion vulnerability (CVE-2023-26360).
Learn more: https://thehackernews.com/2023/12/hackers-exploited-coldfusion.html
Update your software now.
Learn more: https://thehackernews.com/2023/12/hackers-exploited-coldfusion.html
Update your software now.
👏7🤯6👍2
🚨 Security Alert: 21 vulnerabilities, known as Sierra:21, have been found in Sierra Wireless AirLink cellular routers and open-source software components.
Find out ➡️ https://thehackernews.com/2023/12/sierra21-flaws-in-sierra-wireless.html
Find out ➡️ https://thehackernews.com/2023/12/sierra21-flaws-in-sierra-wireless.html
😁7👍1
🔒 Embracing Automation for Security: Learn how organizations are using 🤖 automation to tackle digital threats and streamline operations.
Click to read more: https://thehackernews.com/2023/12/scaling-security-operations-with.html
Click to read more: https://thehackernews.com/2023/12/scaling-security-operations-with.html
👍8🔥3⚡1
🚨 Malicious browser extensions are a growing threat.
Learn how to spot potentially malicious ones and protect your privacy and security from these hidden dangers.
Get complete report here: https://thehackernews.com/2023/12/new-report-unveiling-threat-of.html
Learn how to spot potentially malicious ones and protect your privacy and security from these hidden dangers.
Get complete report here: https://thehackernews.com/2023/12/new-report-unveiling-threat-of.html
👍13⚡4😁2🤔1
🚨 Attackers can exploit the Amazon Web Services Security Token Service (AWS STS) to infiltrate cloud accounts and carry out follow-on attacks.
Learn how: https://thehackernews.com/2023/12/alert-threat-actors-can-leverage-aws.html
Learn how: https://thehackernews.com/2023/12/alert-threat-actors-can-leverage-aws.html
👍18🤯6🤔3😱2⚡1
🔒 Meta's Messenger gets a major security boost. End-to-end 🗝️ encryption is now default for personal calls and messages.
Find details here: https://thehackernews.com/2023/12/meta-launches-default-end-to-end.html
Find details here: https://thehackernews.com/2023/12/meta-launches-default-end-to-end.html
👏18🔥6😁2
🚨 New Linux Trojan Alert!
Meet "Krasue," a stealthy remote access trojan targeting Thai telecom companies. Krasue relies on a rootkit derived from open-source projects to maintain persistence.
Learn more: https://thehackernews.com/2023/12/new-stealthy-krasue-linux-trojan.html
Meet "Krasue," a stealthy remote access trojan targeting Thai telecom companies. Krasue relies on a rootkit derived from open-source projects to maintain persistence.
Learn more: https://thehackernews.com/2023/12/new-stealthy-krasue-linux-trojan.html
🔥15👍5
Did you know? Your app notifications could reveal sensitive information.
Governments are seeking push notification records from Apple & Google to track specific individuals, as stated by U.S. Senator Ron Wyden.
Read here ➥ https://thehackernews.com/2023/12/governments-may-spy-on-you-by.html
Governments are seeking push notification records from Apple & Google to track specific individuals, as stated by U.S. Senator Ron Wyden.
Read here ➥ https://thehackernews.com/2023/12/governments-may-spy-on-you-by.html
👍12⚡4🔥4👏2
⚠️ Urgent Security Warning -
A new critical Bluetooth vulnerability (CVE-2023-45866) could enable attackers to take control of Android, Linux, macOS, and iOS devices.
Learn how it works: https://thehackernews.com/2023/12/new-bluetooth-flaw-let-hackers-take.html
A new critical Bluetooth vulnerability (CVE-2023-45866) could enable attackers to take control of Android, Linux, macOS, and iOS devices.
Learn how it works: https://thehackernews.com/2023/12/new-bluetooth-flaw-let-hackers-take.html
😱26🤯8👍7
🛡️🔗 Strengthen your defenses with Wazuh!
Explore how this OPEN SOURCE security platform integrates threat feeds, enriches threat data, and allows custom threat detection rules.
Check it out: https://thehackernews.com/2023/12/building-robust-threat-intelligence.html
Explore how this OPEN SOURCE security platform integrates threat feeds, enriches threat data, and allows custom threat detection rules.
Check it out: https://thehackernews.com/2023/12/building-robust-threat-intelligence.html
👍18🤯3
Your mind is a target!
Trust, empathy, ego, and guilt – these traits make us human. Discover how attackers exploit these traits to compromise security.
Read: https://thehackernews.com/2023/12/hacking-human-mind-exploiting.html
Trust, empathy, ego, and guilt – these traits make us human. Discover how attackers exploit these traits to compromise security.
Read: https://thehackernews.com/2023/12/hacking-human-mind-exploiting.html
🔥27👍3🤔2
COLDRIVER, a threat actor of strategic interest to Russia, is actively engaged in credential theft and improving evasion techniques.
Learn more about this cyber threat: https://thehackernews.com/2023/12/microsoft-warns-of-coldrivers-evolving.html
Learn more about this cyber threat: https://thehackernews.com/2023/12/microsoft-warns-of-coldrivers-evolving.html
😱6👍2