π¨ New Malware Alert: VietCredCare is targeting Facebook advertisers in Vietnam, hijacking accounts with positive Meta ad credits.
The stolen accounts are used to post political content or to propagate phishing and affiliate scams.
Learn more: https://thehackernews.com/2024/02/new-vietcredcare-stealer-targeting.html
The stolen accounts are used to post political content or to propagate phishing and affiliate scams.
Learn more: https://thehackernews.com/2024/02/new-vietcredcare-stealer-targeting.html
π₯15β‘4π4
Legacy systems + no security pro = open doors for hackers.
Ransomware, phishing, state actors... Healthcare data is gold for criminals. See the alarming stats & why your defenses need an overhaul.
Learn more: https://thehackernews.com/2024/02/cybersecurity-for-healthcarediagnosing.html
Ransomware, phishing, state actors... Healthcare data is gold for criminals. See the alarming stats & why your defenses need an overhaul.
Learn more: https://thehackernews.com/2024/02/cybersecurity-for-healthcarediagnosing.html
π₯9π7β‘4
β οΈ Millions of Android, Linux, and ChromeOS devices are vulnerable new Wi-Fi attacks! Hackers can steal data or spy on you.
Details here: https://thehackernews.com/2024/02/new-wi-fi-vulnerabilities-expose.html
No patch yet, manually configure CA certificates for protection.
Details here: https://thehackernews.com/2024/02/new-wi-fi-vulnerabilities-expose.html
No patch yet, manually configure CA certificates for protection.
π€―35π8π6π₯5β‘3π1
A software likely used by Russian Consular Department may have been compromised in a cyberattack linked to North Korea, delivering the Konni RAT malware.
Learn more: https://thehackernews.com/2024/02/russian-government-software-backdoored.html
Learn more: https://thehackernews.com/2024/02/russian-government-software-backdoored.html
β‘10π4π€―2
π¨ Threat Alert: Hackers are now weaponizing SSH-Snake, an open-source, self-replicating, fileless network mapping tool, for malicious purposes.
Find details here: https://thehackernews.com/2024/02/cybercriminals-weaponizing-open-source.html
Find details here: https://thehackernews.com/2024/02/cybercriminals-weaponizing-open-source.html
π±16π6π₯5β‘4π1
U.S. State Department is offering rewards up to $15 Million for information on LockBit #ransomware leaders.
Learn more: https://thehackernews.com/2024/02/us-offers-15-million-bounty-to-hunt.html
Learn more: https://thehackernews.com/2024/02/us-offers-15-million-bounty-to-hunt.html
π10π8π6β‘4π₯2π€2π±1
Did you know? 25% of SaaS is underutilized or over-deployed.
Nudge Security offers automated workflows to manage access, ensure compliance, streamline offboarding, and optimize costs.
Learn more: https://thehackernews.com/2024/02/6-ways-to-simplify-saas-identity.html
Nudge Security offers automated workflows to manage access, ensure compliance, streamline offboarding, and optimize costs.
Learn more: https://thehackernews.com/2024/02/6-ways-to-simplify-saas-identity.html
π₯9π6β‘5π±2
WTF is ASPM? Join the conversation on Feb. 28th with James Berthoty, SecEng at Pager Duty and OX Security, to learn about the emerging ASPM market.
James will share insights on what's working, what's not and implementation strategies.
Register now: https://thehackernews.co/realities-of-aspm
James will share insights on what's working, what's not and implementation strategies.
Register now: https://thehackernews.co/realities-of-aspm
β‘8π₯6π5π±2π€1
β‘ Apple's iMessage is getting a major security upgrade with PQ3, a new post-quantum cryptography protocol that protects against future attacks from quantum computers.
Learn more: https://thehackernews.com/2024/02/apple-unveils-pq3-protocol-post-quantum.html
Learn more: https://thehackernews.com/2024/02/apple-unveils-pq3-protocol-post-quantum.html
π€30π8π6π₯6π5π±4β‘1
FTC fined Avast $16.5 million for collecting and selling users' browsing data despite privacy promises.
Full story: https://thehackernews.com/2024/02/ftc-slams-avast-with-165-million-fine.html
Full story: https://thehackernews.com/2024/02/ftc-slams-avast-with-165-million-fine.html
π22π₯9β‘7π€―7π5π3π±3
Researchers uncovered details of a major vulnerability (CVE-2024-23204) in the Apple Shortcuts app that could have exposed sensitive user data without consent on older iOS, iPadOS, macOS, and watchOS devices.
Learn more: https://thehackernews.com/2024/02/researchers-detail-apples-recent-zero.html
Learn more: https://thehackernews.com/2024/02/researchers-detail-apples-recent-zero.html
π₯21π8β‘2π1
Hacktivism is reshaping the battlefield in digital age wars. Witness how cyber-activism is playing a pivotal role in geopolitical conflicts. Dive deeper into the transformation of hacktivism into a mainstream political tool.
Read: https://thehackernews.com/2024/02/a-new-age-of-hacktivism.html
Read: https://thehackernews.com/2024/02/a-new-age-of-hacktivism.html
π₯16β‘6π6π4π€3
Microsoft releases PyRIT, an automation tool designed to proactively identify risks and ethical concerns in Generative AI systems, including security and #privacy threats.
Learn more: https://thehackernews.com/2024/02/microsoft-releases-pyrit-red-teaming.html
Learn more: https://thehackernews.com/2024/02/microsoft-releases-pyrit-red-teaming.html
π₯19π8π7β‘1
Ever wondered how top security teams stay ahead?
It's all about automation! Learn from the SOC Automation Capability Matrix and transform your response to threats.
Explore now β‘οΈ https://thehackernews.com/2024/02/how-to-use-tiness-soc-automation.html
It's all about automation! Learn from the SOC Automation Capability Matrix and transform your response to threats.
Explore now β‘οΈ https://thehackernews.com/2024/02/how-to-use-tiness-soc-automation.html
π18β‘2π1
π¨ Heads Up - The "django-log-tracker" PyPI package, inactive for over 2 years, has been hijacked to distribute the Nova Sentinel malware.
Learn more: https://thehackernews.com/2024/02/dormant-pypi-package-compromised-to.html
Learn more: https://thehackernews.com/2024/02/dormant-pypi-package-compromised-to.html
π25β‘2
Game over? In a dramatic turn of events, LockBitSupp, a key figure in the notorious LockBit ransomware operation, is "reportedly" cooperating with law enforcement.
Find details here: https://thehackernews.com/2024/02/authorities-claim-lockbit-admin.html
Find details here: https://thehackernews.com/2024/02/authorities-claim-lockbit-admin.html
π27π€10π6π6β‘3π±3π₯2
Cybercriminals are using Google's Cloud Run service to launch large-scale email phishing attacks, distributing banking trojans like Astaroth, Mekotio, and Ousaban.
Read: https://thehackernews.com/2024/02/banking-trojans-target-latin-america.html
Read: https://thehackernews.com/2024/02/banking-trojans-target-latin-america.html
π9π6β‘2π2π€―1
π¨ LockBit ransomware operators are back online after a law enforcement takedown, blaming outdated software for the breach.
They are now calling for increased attacks on the government sector.
Find out more: https://thehackernews.com/2024/02/lockbit-ransomware-group-resurfaces.html
They are now calling for increased attacks on the government sector.
Find out more: https://thehackernews.com/2024/02/lockbit-ransomware-group-resurfaces.html
π33π₯14π€―8π±7β‘4π3π1
Fake npm packages traced back to North Korean hackers, aiming at developers with sophisticated credential-stealing scripts.
Learn more: https://thehackernews.com/2024/02/north-korean-hackers-targeting.html
Protect your projectsβverify your dependencies now.
Learn more: https://thehackernews.com/2024/02/north-korean-hackers-targeting.html
Protect your projectsβverify your dependencies now.
π€―13π₯9π7β‘2π2
π€ Think LLMs are foolproof? Think again! Hackers are exploiting them to steal sensitive data. Protect yourself β learn the latest LLM security risks and how to defend against them.
π Learn more: https://thehackernews.com/2024/02/three-tips-to-protect-your-secrets-from.html
π Learn more: https://thehackernews.com/2024/02/three-tips-to-protect-your-secrets-from.html
π₯13π7β‘5π1