π΅οΈ Chinese state-backed hackers exploited FortiOS SSL-VPN flaws to breach a Dutch military network, deploying a stealthy backdoor called COATHANGER.
Learn more: https://thehackernews.com/2024/02/chinese-hackers-exploited-fortigate.html
Learn more: https://thehackernews.com/2024/02/chinese-hackers-exploited-fortigate.html
π€13π9π3π€―3
Governments and tech giants such as France, the U.K., the U.S., Google, Meta, and Microsoft have joined forces to combat the misuse of commercial spyware for human rights violations.
Learn more: https://thehackernews.com/2024/02/global-coalition-and-tech-giants-unite.html
Learn more: https://thehackernews.com/2024/02/global-coalition-and-tech-giants-unite.html
π29π€6
2024 marks the rise of vCISO services, with 45% of MSPs and MSSPs joining the trend. Position yourself as a cybersecurity leader.
Watch the webinar for a 5-phase action plan to vCISO success: https://thehackernews.com/2024/02/new-webinar-5-steps-to-vciso-success.html
Watch the webinar for a 5-phase action plan to vCISO success: https://thehackernews.com/2024/02/new-webinar-5-steps-to-vciso-success.html
π15
π₯ A critical vulnerability has been found in the shim bootloader, leaving millions of Linux systems vulnerable to attack.
Learn more about CVE-2023-40547: https://thehackernews.com/2024/02/critical-bootloader-vulnerability-in.html
Update your device immediately if it uses shim and Secure Boot.
Learn more about CVE-2023-40547: https://thehackernews.com/2024/02/critical-bootloader-vulnerability-in.html
Update your device immediately if it uses shim and Secure Boot.
π€―23β‘6π5π±5π1
π¨ Exciting News from ANYRUN:
Introducing Threat Intelligence Lookup! π
Unlock contextual data and malware samples related to specific #IOCs, TTPs, and keywords, speeding up your investigations and boosting your cybersecurity defenses.
Try it now! π https://thehackernews.co/496HXQ1
Introducing Threat Intelligence Lookup! π
Unlock contextual data and malware samples related to specific #IOCs, TTPs, and keywords, speeding up your investigations and boosting your cybersecurity defenses.
Try it now! π https://thehackernews.co/496HXQ1
any.run
Threat Intelligence Lookup, a searchable database of IOCs and events for threat hunting
Access cyber threat intelligence online with TI Lookup, a vast repository of threat data extracted from ANY.RUN's malware analysis sessions. Identify threats and discover context information related to specific IOCs, TTPs, and artifacts in processes, commandβ¦
π20π5π€4π1
π URGENT: Cisco, Fortinet, and VMware have (again!) released patches for new critical vulnerabilities in their products.
Patch immediately to prevent device takeover, data theft, and operational disruption.
Learn more: https://thehackernews.com/2024/02/critical-patches-released-for-new-flaws.html
Patch immediately to prevent device takeover, data theft, and operational disruption.
Learn more: https://thehackernews.com/2024/02/critical-patches-released-for-new-flaws.html
π20π€11π₯6π€―5
β οΈ North Korean APT Kimsuky caught using new Golang-based info stealer "Troll Stealer" & malware "GoBear," both signed with stolen certificates, targeting sensitive data like SSH keys, browser data & system info.
Learn more β https://thehackernews.com/2024/02/kimsukys-new-golang-stealer-troll-and.html
Learn more β https://thehackernews.com/2024/02/kimsukys-new-golang-stealer-troll-and.html
π13π₯6π€―5π2
Google starts blocking sideloading of shady Android apps in Singapore. This pilot program targets apps that could potentially abuse permissions to steal one-time passwords and sensitive data.
Learn more: https://thehackernews.com/2024/02/google-starts-blocking-sideloading-of.html
Learn more: https://thehackernews.com/2024/02/google-starts-blocking-sideloading-of.html
π€10π9β‘1π1
π¨ Alert: HijackLoader malware evolves with stealthier defense evasion techniques, posing a greater challenge to cybersecurity defenses.
This malware is getting smarter and harder to detect. Click to learn more: https://thehackernews.com/2024/02/hijackloader-evolves-researchers-decode.html
This malware is getting smarter and harder to detect. Click to learn more: https://thehackernews.com/2024/02/hijackloader-evolves-researchers-decode.html
π11π₯7β‘5
Unified identity isn't just a buzzwordβit's a game-changer in cybersecurity. Discover how consolidating identity challenges can bolster your organization's security posture.
Read: https://thehackernews.com/2024/02/unified-identity-look-for-meaning.html
Read: https://thehackernews.com/2024/02/unified-identity-look-for-meaning.html
π12π€7π₯3β‘1
Chinese state-sponsored hacking group, Volt Typhoon, infiltrates U.S. critical infrastructure networks for over five years, posing a significant threat to essential services.
Read: https://thehackernews.com/2024/02/chinese-hackers-operate-undetected-in.html
Read: https://thehackernews.com/2024/02/chinese-hackers-operate-undetected-in.html
π€―14π11π8π₯6π4β‘1π€1
π¨ Deja Vu for Ivanti users!
Another authentication bypass security vulnerability (CVE-2024-22024) has been found in #Ivanti products, affecting Connect Secure, Policy Secure, and ZTA gateways.
Details: https://thehackernews.com/2024/02/warning-new-ivanti-auth-bypass-flaw.html
Don't wait, patch ASAP to secure your devices!
Another authentication bypass security vulnerability (CVE-2024-22024) has been found in #Ivanti products, affecting Connect Secure, Policy Secure, and ZTA gateways.
Details: https://thehackernews.com/2024/02/warning-new-ivanti-auth-bypass-flaw.html
Don't wait, patch ASAP to secure your devices!
π16β‘6
π Urgent: Patch it now - Hackers are exploiting it!
Fortinet has unveiled a critical security flaw in its SSL VPN, CVE-2024-21762, allowing hackers to execute arbitrary code.
Learn more: https://thehackernews.com/2024/02/fortinet-warns-of-critical-fortios-ssl.html
Fortinet has unveiled a critical security flaw in its SSL VPN, CVE-2024-21762, allowing hackers to execute arbitrary code.
Learn more: https://thehackernews.com/2024/02/fortinet-warns-of-critical-fortios-ssl.html
π10π₯10β‘7π3
π¨ New backdoor called Zardoor used in cyberattack on Saudi Islamic charity, stealing data for over 2 years. Hackers use everyday tools like WMI to move undetected.
Read our full report: https://thehackernews.com/2024/02/stealthy-zardoor-backdoor-targets-saudi.html
Read our full report: https://thehackernews.com/2024/02/stealthy-zardoor-backdoor-targets-saudi.html
π10π9β‘6
Concerned about the expanded attack surface in the cloud?
Wazuh, an open-source cybersecurity platform, provides real-time threat detection and incident response for your cloud environments.
Check it out: https://thehackernews.com/2024/02/wazuh-in-cloud-era-navigating.html
Wazuh, an open-source cybersecurity platform, provides real-time threat detection and incident response for your cloud environments.
Check it out: https://thehackernews.com/2024/02/wazuh-in-cloud-era-navigating.html
π26β‘4π₯2π1
New banking trojan "Coyote" targeting 61 Brazilian banks.
It uses Nim and Node.js for evasion and the Squirrel installer framework for distribution. Coyote steals data and can take screenshots.
Learn more: https://thehackernews.com/2024/02/new-coyote-trojan-targets-61-brazilian.html
It uses Nim and Node.js for evasion and the Squirrel installer framework for distribution. Coyote steals data and can take screenshots.
Learn more: https://thehackernews.com/2024/02/new-coyote-trojan-targets-61-brazilian.html
π₯10π9β‘3
Stop chasing false alarms! Myrror prioritizes vulnerabilities by impact, not noise. Focus on what truly matters & defend against supply chain attacks.
Learn how to protect your code from hidden threats: https://thehackernews.com/2024/02/hands-on-review-myrror-security-code.html
Learn how to protect your code from hidden threats: https://thehackernews.com/2024/02/hands-on-review-myrror-security-code.html
π15π₯1
β οΈ Android users, beware! A new variant of MoqHao malware silently auto-executes upon installation, snatching data, and hijacking Wi-Fiβall without you needing to lift a finger.
Learn more: https://thehackernews.com/2024/02/new-variant-of-moqhao-android-malware.html
Learn more: https://thehackernews.com/2024/02/new-variant-of-moqhao-android-malware.html
π±23π8π₯2
π΅οΈββοΈ Raspberry Robin malware has been spotted using new exploits and is now spreading via Discord for wider infection, while also being improved to make it stealthier than before.
Learn more: https://thehackernews.com/2024/02/raspberry-robin-malware-upgrades-with.html
Learn more: https://thehackernews.com/2024/02/raspberry-robin-malware-upgrades-with.html
π₯23π9π€3
U.S. Justice Department cracks down on cybercrime, seizing infrastructure used to sell the notorious "Warzone RAT" and arresting two individuals involved in its distribution and support.
Learn more: https://thehackernews.com/2024/02/us-doj-dismantles-warzone-rat.html
Learn more: https://thehackernews.com/2024/02/us-doj-dismantles-warzone-rat.html
π±21π11π₯4