π¨ New Linux Trojan Alert!
Meet "Krasue," a stealthy remote access trojan targeting Thai telecom companies. Krasue relies on a rootkit derived from open-source projects to maintain persistence.
Learn more: https://thehackernews.com/2023/12/new-stealthy-krasue-linux-trojan.html
Meet "Krasue," a stealthy remote access trojan targeting Thai telecom companies. Krasue relies on a rootkit derived from open-source projects to maintain persistence.
Learn more: https://thehackernews.com/2023/12/new-stealthy-krasue-linux-trojan.html
π₯15π5
Did you know? Your app notifications could reveal sensitive information.
Governments are seeking push notification records from Apple & Google to track specific individuals, as stated by U.S. Senator Ron Wyden.
Read here β₯ https://thehackernews.com/2023/12/governments-may-spy-on-you-by.html
Governments are seeking push notification records from Apple & Google to track specific individuals, as stated by U.S. Senator Ron Wyden.
Read here β₯ https://thehackernews.com/2023/12/governments-may-spy-on-you-by.html
π12β‘4π₯4π2
β οΈ Urgent Security Warning -
A new critical Bluetooth vulnerability (CVE-2023-45866) could enable attackers to take control of Android, Linux, macOS, and iOS devices.
Learn how it works: https://thehackernews.com/2023/12/new-bluetooth-flaw-let-hackers-take.html
A new critical Bluetooth vulnerability (CVE-2023-45866) could enable attackers to take control of Android, Linux, macOS, and iOS devices.
Learn how it works: https://thehackernews.com/2023/12/new-bluetooth-flaw-let-hackers-take.html
π±26π€―8π7
π‘οΈπ Strengthen your defenses with Wazuh!
Explore how this OPEN SOURCE security platform integrates threat feeds, enriches threat data, and allows custom threat detection rules.
Check it out: https://thehackernews.com/2023/12/building-robust-threat-intelligence.html
Explore how this OPEN SOURCE security platform integrates threat feeds, enriches threat data, and allows custom threat detection rules.
Check it out: https://thehackernews.com/2023/12/building-robust-threat-intelligence.html
π18π€―3
Your mind is a target!
Trust, empathy, ego, and guilt β these traits make us human. Discover how attackers exploit these traits to compromise security.
Read: https://thehackernews.com/2023/12/hacking-human-mind-exploiting.html
Trust, empathy, ego, and guilt β these traits make us human. Discover how attackers exploit these traits to compromise security.
Read: https://thehackernews.com/2023/12/hacking-human-mind-exploiting.html
π₯27π3π€2
COLDRIVER, a threat actor of strategic interest to Russia, is actively engaged in credential theft and improving evasion techniques.
Learn more about this cyber threat: https://thehackernews.com/2023/12/microsoft-warns-of-coldrivers-evolving.html
Learn more about this cyber threat: https://thehackernews.com/2023/12/microsoft-warns-of-coldrivers-evolving.html
π±6π2
π¨ πΌ Leverage your human capital to bridge the cybersecurity skills gap and bolster your organization's security. Join industry veterans Michael Beaupre, Neil Khatod, and Mike Heredia in a fireside chat on December 13th.
Gain expert insights on unlocking the potential of your team and effectively utilizing human resources for enhanced security.
Register now and empower your organization with valuable strategies: https://thn.news/R3K1PX5C
Gain expert insights on unlocking the potential of your team and effectively utilizing human resources for enhanced security.
Register now and empower your organization with valuable strategies: https://thn.news/R3K1PX5C
Xmcyber
Webinar - Hays: Bridging the Cybersecurity Skills Gap
π₯12π6
Bitzlato cryptocurrency exchange founder, Anatoly Legkodymov, pleads guilty to aiding money launderers with unlicensed money-transmitting business.
Find details here β₯ https://thehackernews.com/2023/12/founder-of-bitzlato-cryptocurrency.html
Faces up to 5 years in prison.
Find details here β₯ https://thehackernews.com/2023/12/founder-of-bitzlato-cryptocurrency.html
Faces up to 5 years in prison.
π₯11π4π4
ALERT: WordPress 6.4.2 released with CRITICAL security patch.
Update your sites now to protect against remote attacks and arbitrary PHP code execution.
Learn more: https://thehackernews.com/2023/12/wordpress-releases-update-642-to.html
Update your sites now to protect against remote attacks and arbitrary PHP code execution.
Learn more: https://thehackernews.com/2023/12/wordpress-releases-update-642-to.html
π21π₯7π5
β οΈ Macs at risk! Cybercriminals are targeting macOS systems with Trojan-Proxy malware, spreading using pirated software to turn them into "proxy servers" for illegal activities.
Find details here: https://thehackernews.com/2023/12/mac-users-beware-new-trojan-proxy.html
Protect yourself β avoid illegal downloads.
Find details here: https://thehackernews.com/2023/12/mac-users-beware-new-trojan-proxy.html
Protect yourself β avoid illegal downloads.
π€―20π4π4π3
π¨ North Korean threat actor Kimsuky targets South Korean research institutes in a spear-phishing campaign.
Learn how they use backdoors to steal information and execute commands.
Learn more: https://thehackernews.com/2023/12/n-korean-kimsuky-targeting-south-korean.html
Learn how they use backdoors to steal information and execute commands.
Learn more: https://thehackernews.com/2023/12/n-korean-kimsuky-targeting-south-korean.html
π₯9π€5π4
π¨ Ransomware-as-a-Service (RaaS) is reshaping cybercrime. Anyone with limited tech skills can now carry out devastating attacks.
Learn how in this article: https://thehackernews.com/2023/12/ransomware-as-service-growing-threat.html
Learn how in this article: https://thehackernews.com/2023/12/ransomware-as-service-growing-threat.html
π€―13π10π7β‘4π2π€2
β οΈ IMPORTANT
A set ("5Ghoul") of new major security flaws in π‘ 5G mobile network modems impact 714 smartphones models from all major brandsβincluding Apple, Samsung, Google, Xiaomi, OnePlus and more.
Details on 5Ghoul here: https://thehackernews.com/2023/12/new-5g-modems-flaws-affect-ios-devices.html
A set ("5Ghoul") of new major security flaws in π‘ 5G mobile network modems impact 714 smartphones models from all major brandsβincluding Apple, Samsung, Google, Xiaomi, OnePlus and more.
Details on 5Ghoul here: https://thehackernews.com/2023/12/new-5g-modems-flaws-affect-ios-devices.html
π€―34π±7β‘6π5π€5π4π1
ππ» Experts unveil new evasion tactics of GuLoader malware, a sophisticated shellcode-based downloader for dangerous payloads.
Learn more β‘οΈ https://thehackernews.com/2023/12/researchers-unveal-guloader-malwares.html
Learn more β‘οΈ https://thehackernews.com/2023/12/researchers-unveal-guloader-malwares.html
π18π4π2π€―2
π‘οΈ π New Spectre-based side-channel attack SLAM threatens Intel, AMD, and Arm CPUs, potentially leaking sensitive data from kernel memory.
Learn more about SLAM attack : https://thehackernews.com/2023/12/slam-attack-new-spectre-based.html
Learn more about SLAM attack : https://thehackernews.com/2023/12/slam-attack-new-spectre-based.html
π€―19π8π₯4π4β‘1
New process injection technique called "PoolParty" discovered, enabling undetected code execution on Windows systems by bypassing top EDR systems.
Learn more: https://thehackernews.com/2023/12/new-poolparty-process-injection.html
Learn more: https://thehackernews.com/2023/12/new-poolparty-process-injection.html
π16π7β‘3π€1
π¨ Beware of Malicious Loan Apps!
18 deceptive Android loan apps on Google Play Store, downloaded 12M+ times. They offer high-interest loans and collect your personal info for blackmail.
Read details here: https://thehackernews.com/2023/12/spyloan-scandal-18-malicious-loan-apps.html
18 deceptive Android loan apps on Google Play Store, downloaded 12M+ times. They offer high-interest loans and collect your personal info for blackmail.
Read details here: https://thehackernews.com/2023/12/spyloan-scandal-18-malicious-loan-apps.html
π15π10π±8π4
Ever wondered why Social Engineering works so well?
Discover the "Psychology of Social Engineering" in our upcoming WEBINAR. Dive deep into a hacker's mind with expert Tim Chase.!
Don't miss out. Register now: https://thehackernews.com/2023/12/webinar-psychology-of-social.html
Discover the "Psychology of Social Engineering" in our upcoming WEBINAR. Dive deep into a hacker's mind with expert Tim Chase.!
Don't miss out. Register now: https://thehackernews.com/2023/12/webinar-psychology-of-social.html
π21π₯3π2
Your first 100 days as a vCISO are crucial. Learn how to succeed with our 5-step action plan. Explore vCISO goals, pitfalls to avoid, and key activities for each phase.
Read: https://thehackernews.com/2023/12/playbook-your-first-100-days-as-vciso-5.html
Read: https://thehackernews.com/2023/12/playbook-your-first-100-days-as-vciso-5.html
π9π₯2
Lazarus Group's new campaign, Operation Blacksmith, utilizes Log4j exploits to deploy Remote Access Trojans (RATs), including NineRAT and DLRAT.
π Read the full article: https://thehackernews.com/2023/12/lazarus-group-using-log4j-exploits-to.html
π Read the full article: https://thehackernews.com/2023/12/lazarus-group-using-log4j-exploits-to.html
π€―9π5π₯2π€2π1