β οΈ IMPORTANT
A set ("5Ghoul") of new major security flaws in π‘ 5G mobile network modems impact 714 smartphones models from all major brandsβincluding Apple, Samsung, Google, Xiaomi, OnePlus and more.
Details on 5Ghoul here: https://thehackernews.com/2023/12/new-5g-modems-flaws-affect-ios-devices.html
A set ("5Ghoul") of new major security flaws in π‘ 5G mobile network modems impact 714 smartphones models from all major brandsβincluding Apple, Samsung, Google, Xiaomi, OnePlus and more.
Details on 5Ghoul here: https://thehackernews.com/2023/12/new-5g-modems-flaws-affect-ios-devices.html
π€―34π±7β‘6π5π€5π4π1
ππ» Experts unveil new evasion tactics of GuLoader malware, a sophisticated shellcode-based downloader for dangerous payloads.
Learn more β‘οΈ https://thehackernews.com/2023/12/researchers-unveal-guloader-malwares.html
Learn more β‘οΈ https://thehackernews.com/2023/12/researchers-unveal-guloader-malwares.html
π18π4π2π€―2
π‘οΈ π New Spectre-based side-channel attack SLAM threatens Intel, AMD, and Arm CPUs, potentially leaking sensitive data from kernel memory.
Learn more about SLAM attack : https://thehackernews.com/2023/12/slam-attack-new-spectre-based.html
Learn more about SLAM attack : https://thehackernews.com/2023/12/slam-attack-new-spectre-based.html
π€―19π8π₯4π4β‘1
New process injection technique called "PoolParty" discovered, enabling undetected code execution on Windows systems by bypassing top EDR systems.
Learn more: https://thehackernews.com/2023/12/new-poolparty-process-injection.html
Learn more: https://thehackernews.com/2023/12/new-poolparty-process-injection.html
π16π7β‘3π€1
π¨ Beware of Malicious Loan Apps!
18 deceptive Android loan apps on Google Play Store, downloaded 12M+ times. They offer high-interest loans and collect your personal info for blackmail.
Read details here: https://thehackernews.com/2023/12/spyloan-scandal-18-malicious-loan-apps.html
18 deceptive Android loan apps on Google Play Store, downloaded 12M+ times. They offer high-interest loans and collect your personal info for blackmail.
Read details here: https://thehackernews.com/2023/12/spyloan-scandal-18-malicious-loan-apps.html
π15π10π±8π4
Ever wondered why Social Engineering works so well?
Discover the "Psychology of Social Engineering" in our upcoming WEBINAR. Dive deep into a hacker's mind with expert Tim Chase.!
Don't miss out. Register now: https://thehackernews.com/2023/12/webinar-psychology-of-social.html
Discover the "Psychology of Social Engineering" in our upcoming WEBINAR. Dive deep into a hacker's mind with expert Tim Chase.!
Don't miss out. Register now: https://thehackernews.com/2023/12/webinar-psychology-of-social.html
π21π₯3π2
Your first 100 days as a vCISO are crucial. Learn how to succeed with our 5-step action plan. Explore vCISO goals, pitfalls to avoid, and key activities for each phase.
Read: https://thehackernews.com/2023/12/playbook-your-first-100-days-as-vciso-5.html
Read: https://thehackernews.com/2023/12/playbook-your-first-100-days-as-vciso-5.html
π9π₯2
Lazarus Group's new campaign, Operation Blacksmith, utilizes Log4j exploits to deploy Remote Access Trojans (RATs), including NineRAT and DLRAT.
π Read the full article: https://thehackernews.com/2023/12/lazarus-group-using-log4j-exploits-to.html
π Read the full article: https://thehackernews.com/2023/12/lazarus-group-using-log4j-exploits-to.html
π€―9π5π₯2π€2π1
π¨ Tactical overlaps discovered between APT Sandman and China-based threat cluster using KEYPLUG backdoor.
Find details in this article: https://thehackernews.com/2023/12/researchers-unmask-sandman-apts-hidden.html
Find details in this article: https://thehackernews.com/2023/12/researchers-unmask-sandman-apts-hidden.html
π₯13π8π€2β‘1
β οΈ Urgent Update: Apache warns of a critical RCE flaw in Struts 2 web app framework (CVE-2023-50164) that could lead to remote code execution.
Find details here: https://thehackernews.com/2023/12/new-critical-rce-vulnerability.html
Upgrade to patched versions now to prevent potential breaches.
Find details here: https://thehackernews.com/2023/12/new-critical-rce-vulnerability.html
Upgrade to patched versions now to prevent potential breaches.
β‘13π₯5π4π1
π Apple released patches for multiple vulnerabilities in iOS, iPadOS, macOS, tvOS, watchOS, and Safariβand also backported fixes for two recently disclosed zero-day vulnerabilities to older devices.
Get details here: https://thehackernews.com/2023/12/apple-releases-security-updates-to.html
Get details here: https://thehackernews.com/2023/12/apple-releases-security-updates-to.html
π22π5π₯4π€―4π3β‘1
Alert: New malware campaign spreading MrAnon Stealer, a Python-based malware, via fake hotel booking PDFs.
Learn more: https://thehackernews.com/2023/12/new-mranon-stealer-targeting-german-it.html
It steals credentials, system info, browser sessions, and cryptocurrency extensions.
Learn more: https://thehackernews.com/2023/12/new-mranon-stealer-targeting-german-it.html
It steals credentials, system info, browser sessions, and cryptocurrency extensions.
π22β‘3
π΅οΈββοΈ 2023 has witnessed 11 high-profile attacks in just 13 months, all exploiting non-human access.
Find out why non-human identities are the new perimeter: https://thehackernews.com/2023/12/non-human-access-is-path-of-least.html
Find out why non-human identities are the new perimeter: https://thehackernews.com/2023/12/non-human-access-is-path-of-least.html
π16π€5π€―2
APT28, a Russian threat actor, is using Israel-Hamas war-related lures to distribute the HeadLace backdoor. This targeted campaign affects 13 nations globally.
Read: https://thehackernews.com/2023/12/russian-apt28-hackers-targeting-13.html
Read: https://thehackernews.com/2023/12/russian-apt28-hackers-targeting-13.html
π17π€―7π±2
Hacking incidents in healthcare have tripled from 2018 to 2022. To defend against cyberthreats, organizations should adopt an attacker's mindset, focusing on asset inventory and monitoring.
Learn how attackers operate in the digital age: https://thehackernews.com/2023/12/unveiling-cyber-threats-to-healthcare.html
Learn how attackers operate in the digital age: https://thehackernews.com/2023/12/unveiling-cyber-threats-to-healthcare.html
π22π4π₯3
π‘οΈ Microsoft's final Patch Tuesday of 2023 is here, addressing 33 software flaws.
This release includes 4 Critical and 29 Important fixes, making it one of the lightest in recent years.
Read: https://thehackernews.com/2023/12/microsofts-final-2023-patch-tuesday-33.html
This release includes 4 Critical and 29 Important fixes, making it one of the lightest in recent years.
Read: https://thehackernews.com/2023/12/microsofts-final-2023-patch-tuesday-33.html
π€12π8π4π₯2π2
π¨ Ukraine's largest telecom operator, π‘ Kyivstar, hit by a cyberattack, disrupting mobile and internet services.
Read more about this here: https://thehackernews.com/2023/12/major-cyber-attack-paralyzes-kyivstar.html
Read more about this here: https://thehackernews.com/2023/12/major-cyber-attack-paralyzes-kyivstar.html
π±18π11π8π€―4π₯3π2
Microsoft warns that adversaries are using OAuth apps for cryptocurrency mining and phishing attacks, enabling them to maintain access even after losing your account.
Details here: https://thehackernews.com/2023/12/microsoft-warns-of-hackers-exploiting.html
Protect yourself with multi-factor authentication and regular audits.
Details here: https://thehackernews.com/2023/12/microsoft-warns-of-hackers-exploiting.html
Protect yourself with multi-factor authentication and regular audits.
π€23π1
π΅οΈββοΈ Identifying malware families and decrypting HTTPS traffic are key to cyber investigations.
Learn how a MITM proxy can help analysts intercept and decode malicious communication.
Click to read more: https://thehackernews.com/2023/12/how-to-analyze-malwares-network-traffic.html
Learn how a MITM proxy can help analysts intercept and decode malicious communication.
Click to read more: https://thehackernews.com/2023/12/how-to-analyze-malwares-network-traffic.html
π16β‘6π₯1
β‘οΈ Google boosts Android security with Clang sanitizers.
Meet "IntSan" and "BoundSan," designed to catch vulnerabilities in the cellular baseband.
Learn how these tools work: https://thehackernews.com/2023/12/google-using-clang-sanitizers-to.html
Meet "IntSan" and "BoundSan," designed to catch vulnerabilities in the cellular baseband.
Learn how these tools work: https://thehackernews.com/2023/12/google-using-clang-sanitizers-to.html
π17π€6π₯4π2