π¨ πΌ Leverage your human capital to bridge the cybersecurity skills gap and bolster your organization's security. Join industry veterans Michael Beaupre, Neil Khatod, and Mike Heredia in a fireside chat on December 13th.
Gain expert insights on unlocking the potential of your team and effectively utilizing human resources for enhanced security.
Register now and empower your organization with valuable strategies: https://thn.news/R3K1PX5C
Gain expert insights on unlocking the potential of your team and effectively utilizing human resources for enhanced security.
Register now and empower your organization with valuable strategies: https://thn.news/R3K1PX5C
Xmcyber
Webinar - Hays: Bridging the Cybersecurity Skills Gap
π₯12π6
Bitzlato cryptocurrency exchange founder, Anatoly Legkodymov, pleads guilty to aiding money launderers with unlicensed money-transmitting business.
Find details here β₯ https://thehackernews.com/2023/12/founder-of-bitzlato-cryptocurrency.html
Faces up to 5 years in prison.
Find details here β₯ https://thehackernews.com/2023/12/founder-of-bitzlato-cryptocurrency.html
Faces up to 5 years in prison.
π₯11π4π4
ALERT: WordPress 6.4.2 released with CRITICAL security patch.
Update your sites now to protect against remote attacks and arbitrary PHP code execution.
Learn more: https://thehackernews.com/2023/12/wordpress-releases-update-642-to.html
Update your sites now to protect against remote attacks and arbitrary PHP code execution.
Learn more: https://thehackernews.com/2023/12/wordpress-releases-update-642-to.html
π21π₯7π5
β οΈ Macs at risk! Cybercriminals are targeting macOS systems with Trojan-Proxy malware, spreading using pirated software to turn them into "proxy servers" for illegal activities.
Find details here: https://thehackernews.com/2023/12/mac-users-beware-new-trojan-proxy.html
Protect yourself β avoid illegal downloads.
Find details here: https://thehackernews.com/2023/12/mac-users-beware-new-trojan-proxy.html
Protect yourself β avoid illegal downloads.
π€―20π4π4π3
π¨ North Korean threat actor Kimsuky targets South Korean research institutes in a spear-phishing campaign.
Learn how they use backdoors to steal information and execute commands.
Learn more: https://thehackernews.com/2023/12/n-korean-kimsuky-targeting-south-korean.html
Learn how they use backdoors to steal information and execute commands.
Learn more: https://thehackernews.com/2023/12/n-korean-kimsuky-targeting-south-korean.html
π₯9π€5π4
π¨ Ransomware-as-a-Service (RaaS) is reshaping cybercrime. Anyone with limited tech skills can now carry out devastating attacks.
Learn how in this article: https://thehackernews.com/2023/12/ransomware-as-service-growing-threat.html
Learn how in this article: https://thehackernews.com/2023/12/ransomware-as-service-growing-threat.html
π€―13π10π7β‘4π2π€2
β οΈ IMPORTANT
A set ("5Ghoul") of new major security flaws in π‘ 5G mobile network modems impact 714 smartphones models from all major brandsβincluding Apple, Samsung, Google, Xiaomi, OnePlus and more.
Details on 5Ghoul here: https://thehackernews.com/2023/12/new-5g-modems-flaws-affect-ios-devices.html
A set ("5Ghoul") of new major security flaws in π‘ 5G mobile network modems impact 714 smartphones models from all major brandsβincluding Apple, Samsung, Google, Xiaomi, OnePlus and more.
Details on 5Ghoul here: https://thehackernews.com/2023/12/new-5g-modems-flaws-affect-ios-devices.html
π€―34π±7β‘6π5π€5π4π1
ππ» Experts unveil new evasion tactics of GuLoader malware, a sophisticated shellcode-based downloader for dangerous payloads.
Learn more β‘οΈ https://thehackernews.com/2023/12/researchers-unveal-guloader-malwares.html
Learn more β‘οΈ https://thehackernews.com/2023/12/researchers-unveal-guloader-malwares.html
π18π4π2π€―2
π‘οΈ π New Spectre-based side-channel attack SLAM threatens Intel, AMD, and Arm CPUs, potentially leaking sensitive data from kernel memory.
Learn more about SLAM attack : https://thehackernews.com/2023/12/slam-attack-new-spectre-based.html
Learn more about SLAM attack : https://thehackernews.com/2023/12/slam-attack-new-spectre-based.html
π€―19π8π₯4π4β‘1
New process injection technique called "PoolParty" discovered, enabling undetected code execution on Windows systems by bypassing top EDR systems.
Learn more: https://thehackernews.com/2023/12/new-poolparty-process-injection.html
Learn more: https://thehackernews.com/2023/12/new-poolparty-process-injection.html
π16π7β‘3π€1
π¨ Beware of Malicious Loan Apps!
18 deceptive Android loan apps on Google Play Store, downloaded 12M+ times. They offer high-interest loans and collect your personal info for blackmail.
Read details here: https://thehackernews.com/2023/12/spyloan-scandal-18-malicious-loan-apps.html
18 deceptive Android loan apps on Google Play Store, downloaded 12M+ times. They offer high-interest loans and collect your personal info for blackmail.
Read details here: https://thehackernews.com/2023/12/spyloan-scandal-18-malicious-loan-apps.html
π15π10π±8π4
Ever wondered why Social Engineering works so well?
Discover the "Psychology of Social Engineering" in our upcoming WEBINAR. Dive deep into a hacker's mind with expert Tim Chase.!
Don't miss out. Register now: https://thehackernews.com/2023/12/webinar-psychology-of-social.html
Discover the "Psychology of Social Engineering" in our upcoming WEBINAR. Dive deep into a hacker's mind with expert Tim Chase.!
Don't miss out. Register now: https://thehackernews.com/2023/12/webinar-psychology-of-social.html
π21π₯3π2
Your first 100 days as a vCISO are crucial. Learn how to succeed with our 5-step action plan. Explore vCISO goals, pitfalls to avoid, and key activities for each phase.
Read: https://thehackernews.com/2023/12/playbook-your-first-100-days-as-vciso-5.html
Read: https://thehackernews.com/2023/12/playbook-your-first-100-days-as-vciso-5.html
π9π₯2
Lazarus Group's new campaign, Operation Blacksmith, utilizes Log4j exploits to deploy Remote Access Trojans (RATs), including NineRAT and DLRAT.
π Read the full article: https://thehackernews.com/2023/12/lazarus-group-using-log4j-exploits-to.html
π Read the full article: https://thehackernews.com/2023/12/lazarus-group-using-log4j-exploits-to.html
π€―9π5π₯2π€2π1
π¨ Tactical overlaps discovered between APT Sandman and China-based threat cluster using KEYPLUG backdoor.
Find details in this article: https://thehackernews.com/2023/12/researchers-unmask-sandman-apts-hidden.html
Find details in this article: https://thehackernews.com/2023/12/researchers-unmask-sandman-apts-hidden.html
π₯13π8π€2β‘1
β οΈ Urgent Update: Apache warns of a critical RCE flaw in Struts 2 web app framework (CVE-2023-50164) that could lead to remote code execution.
Find details here: https://thehackernews.com/2023/12/new-critical-rce-vulnerability.html
Upgrade to patched versions now to prevent potential breaches.
Find details here: https://thehackernews.com/2023/12/new-critical-rce-vulnerability.html
Upgrade to patched versions now to prevent potential breaches.
β‘13π₯5π4π1
π Apple released patches for multiple vulnerabilities in iOS, iPadOS, macOS, tvOS, watchOS, and Safariβand also backported fixes for two recently disclosed zero-day vulnerabilities to older devices.
Get details here: https://thehackernews.com/2023/12/apple-releases-security-updates-to.html
Get details here: https://thehackernews.com/2023/12/apple-releases-security-updates-to.html
π22π5π₯4π€―4π3β‘1
Alert: New malware campaign spreading MrAnon Stealer, a Python-based malware, via fake hotel booking PDFs.
Learn more: https://thehackernews.com/2023/12/new-mranon-stealer-targeting-german-it.html
It steals credentials, system info, browser sessions, and cryptocurrency extensions.
Learn more: https://thehackernews.com/2023/12/new-mranon-stealer-targeting-german-it.html
It steals credentials, system info, browser sessions, and cryptocurrency extensions.
π22β‘3
π΅οΈββοΈ 2023 has witnessed 11 high-profile attacks in just 13 months, all exploiting non-human access.
Find out why non-human identities are the new perimeter: https://thehackernews.com/2023/12/non-human-access-is-path-of-least.html
Find out why non-human identities are the new perimeter: https://thehackernews.com/2023/12/non-human-access-is-path-of-least.html
π16π€5π€―2
APT28, a Russian threat actor, is using Israel-Hamas war-related lures to distribute the HeadLace backdoor. This targeted campaign affects 13 nations globally.
Read: https://thehackernews.com/2023/12/russian-apt28-hackers-targeting-13.html
Read: https://thehackernews.com/2023/12/russian-apt28-hackers-targeting-13.html
π17π€―7π±2