π¨ Exciting News from ANYRUN:
Introducing Threat Intelligence Lookup! π
Unlock contextual data and malware samples related to specific #IOCs, TTPs, and keywords, speeding up your investigations and boosting your cybersecurity defenses.
Try it now! π https://thehackernews.co/496HXQ1
Introducing Threat Intelligence Lookup! π
Unlock contextual data and malware samples related to specific #IOCs, TTPs, and keywords, speeding up your investigations and boosting your cybersecurity defenses.
Try it now! π https://thehackernews.co/496HXQ1
any.run
Threat Intelligence Lookup, a searchable database of IOCs and events for threat hunting
Access cyber threat intelligence online with TI Lookup, a vast repository of threat data extracted from ANY.RUN's malware analysis sessions. Identify threats and discover context information related to specific IOCs, TTPs, and artifacts in processes, commandβ¦
π20π5π€4π1
π URGENT: Cisco, Fortinet, and VMware have (again!) released patches for new critical vulnerabilities in their products.
Patch immediately to prevent device takeover, data theft, and operational disruption.
Learn more: https://thehackernews.com/2024/02/critical-patches-released-for-new-flaws.html
Patch immediately to prevent device takeover, data theft, and operational disruption.
Learn more: https://thehackernews.com/2024/02/critical-patches-released-for-new-flaws.html
π20π€11π₯6π€―5
β οΈ North Korean APT Kimsuky caught using new Golang-based info stealer "Troll Stealer" & malware "GoBear," both signed with stolen certificates, targeting sensitive data like SSH keys, browser data & system info.
Learn more β https://thehackernews.com/2024/02/kimsukys-new-golang-stealer-troll-and.html
Learn more β https://thehackernews.com/2024/02/kimsukys-new-golang-stealer-troll-and.html
π13π₯6π€―5π2
Google starts blocking sideloading of shady Android apps in Singapore. This pilot program targets apps that could potentially abuse permissions to steal one-time passwords and sensitive data.
Learn more: https://thehackernews.com/2024/02/google-starts-blocking-sideloading-of.html
Learn more: https://thehackernews.com/2024/02/google-starts-blocking-sideloading-of.html
π€10π9β‘1π1
π¨ Alert: HijackLoader malware evolves with stealthier defense evasion techniques, posing a greater challenge to cybersecurity defenses.
This malware is getting smarter and harder to detect. Click to learn more: https://thehackernews.com/2024/02/hijackloader-evolves-researchers-decode.html
This malware is getting smarter and harder to detect. Click to learn more: https://thehackernews.com/2024/02/hijackloader-evolves-researchers-decode.html
π11π₯7β‘5
Unified identity isn't just a buzzwordβit's a game-changer in cybersecurity. Discover how consolidating identity challenges can bolster your organization's security posture.
Read: https://thehackernews.com/2024/02/unified-identity-look-for-meaning.html
Read: https://thehackernews.com/2024/02/unified-identity-look-for-meaning.html
π12π€7π₯3β‘1
Chinese state-sponsored hacking group, Volt Typhoon, infiltrates U.S. critical infrastructure networks for over five years, posing a significant threat to essential services.
Read: https://thehackernews.com/2024/02/chinese-hackers-operate-undetected-in.html
Read: https://thehackernews.com/2024/02/chinese-hackers-operate-undetected-in.html
π€―14π11π8π₯6π4β‘1π€1
π¨ Deja Vu for Ivanti users!
Another authentication bypass security vulnerability (CVE-2024-22024) has been found in #Ivanti products, affecting Connect Secure, Policy Secure, and ZTA gateways.
Details: https://thehackernews.com/2024/02/warning-new-ivanti-auth-bypass-flaw.html
Don't wait, patch ASAP to secure your devices!
Another authentication bypass security vulnerability (CVE-2024-22024) has been found in #Ivanti products, affecting Connect Secure, Policy Secure, and ZTA gateways.
Details: https://thehackernews.com/2024/02/warning-new-ivanti-auth-bypass-flaw.html
Don't wait, patch ASAP to secure your devices!
π16β‘6
π Urgent: Patch it now - Hackers are exploiting it!
Fortinet has unveiled a critical security flaw in its SSL VPN, CVE-2024-21762, allowing hackers to execute arbitrary code.
Learn more: https://thehackernews.com/2024/02/fortinet-warns-of-critical-fortios-ssl.html
Fortinet has unveiled a critical security flaw in its SSL VPN, CVE-2024-21762, allowing hackers to execute arbitrary code.
Learn more: https://thehackernews.com/2024/02/fortinet-warns-of-critical-fortios-ssl.html
π10π₯10β‘7π3
π¨ New backdoor called Zardoor used in cyberattack on Saudi Islamic charity, stealing data for over 2 years. Hackers use everyday tools like WMI to move undetected.
Read our full report: https://thehackernews.com/2024/02/stealthy-zardoor-backdoor-targets-saudi.html
Read our full report: https://thehackernews.com/2024/02/stealthy-zardoor-backdoor-targets-saudi.html
π10π9β‘6
Concerned about the expanded attack surface in the cloud?
Wazuh, an open-source cybersecurity platform, provides real-time threat detection and incident response for your cloud environments.
Check it out: https://thehackernews.com/2024/02/wazuh-in-cloud-era-navigating.html
Wazuh, an open-source cybersecurity platform, provides real-time threat detection and incident response for your cloud environments.
Check it out: https://thehackernews.com/2024/02/wazuh-in-cloud-era-navigating.html
π26β‘4π₯2π1
New banking trojan "Coyote" targeting 61 Brazilian banks.
It uses Nim and Node.js for evasion and the Squirrel installer framework for distribution. Coyote steals data and can take screenshots.
Learn more: https://thehackernews.com/2024/02/new-coyote-trojan-targets-61-brazilian.html
It uses Nim and Node.js for evasion and the Squirrel installer framework for distribution. Coyote steals data and can take screenshots.
Learn more: https://thehackernews.com/2024/02/new-coyote-trojan-targets-61-brazilian.html
π₯10π9β‘3
Stop chasing false alarms! Myrror prioritizes vulnerabilities by impact, not noise. Focus on what truly matters & defend against supply chain attacks.
Learn how to protect your code from hidden threats: https://thehackernews.com/2024/02/hands-on-review-myrror-security-code.html
Learn how to protect your code from hidden threats: https://thehackernews.com/2024/02/hands-on-review-myrror-security-code.html
π15π₯1
β οΈ Android users, beware! A new variant of MoqHao malware silently auto-executes upon installation, snatching data, and hijacking Wi-Fiβall without you needing to lift a finger.
Learn more: https://thehackernews.com/2024/02/new-variant-of-moqhao-android-malware.html
Learn more: https://thehackernews.com/2024/02/new-variant-of-moqhao-android-malware.html
π±23π8π₯2
π΅οΈββοΈ Raspberry Robin malware has been spotted using new exploits and is now spreading via Discord for wider infection, while also being improved to make it stealthier than before.
Learn more: https://thehackernews.com/2024/02/raspberry-robin-malware-upgrades-with.html
Learn more: https://thehackernews.com/2024/02/raspberry-robin-malware-upgrades-with.html
π₯23π9π€3
U.S. Justice Department cracks down on cybercrime, seizing infrastructure used to sell the notorious "Warzone RAT" and arresting two individuals involved in its distribution and support.
Learn more: https://thehackernews.com/2024/02/us-doj-dismantles-warzone-rat.html
Learn more: https://thehackernews.com/2024/02/us-doj-dismantles-warzone-rat.html
π±21π11π₯4
π π» Microsoft is bringing Linux-like Sudo for Windows 11, a new feature that allows users to run commands with administrator privileges without having to open a new elevated console window.
https://thehackernews.com/2024/02/microsoft-introduces-linux-like-sudo.html
https://thehackernews.com/2024/02/microsoft-introduces-linux-like-sudo.html
π58π33π±16π€―11π₯6π€4
π The U.S. Department of State is offering up to π° $10 million for information on Hive ransomware operators, and an additional $5 million for those involved in Hive ransomware activities.
Read details here: https://thehackernews.com/2024/02/us-offers-10-million-bounty-for-info.html
Read details here: https://thehackernews.com/2024/02/us-offers-10-million-bounty-for-info.html
π₯20π10π7π±1
π CISA teams up with OpenSSF to introduce a framework called "Principles for Package Repository Security," aimed at fortifying open-source software ecosystems against cyber threats.
Learn more: https://thehackernews.com/2024/02/cisa-and-openssf-release-framework-for.html
Learn more: https://thehackernews.com/2024/02/cisa-and-openssf-release-framework-for.html
π18π₯3β‘1
Ever wondered why cyber attacks seem unstoppable? It's the identity blind spots! Check out how Silverfort's platform fills this crucial gap, ensuring rapid detection and containment of compromised accounts.
Learn more: https://thehackernews.com/2024/02/why-are-compromised-identities.html
Learn more: https://thehackernews.com/2024/02/why-are-compromised-identities.html
π€―12π6β‘3π₯1