π Attention APT hunters! Chinese hacker groups UNC5325 & UNC3886 are exploiting Ivanti flaws (CVE-2024-21893 & CVE-2024-21887) to deploy persistent malware (LITTLELAMB.WOOLTEA, PITSTOP, PITDOG, PITJET, PITHOOK).
Learn more: https://thehackernews.com/2024/02/chinese-hackers-exploiting-ivanti-vpn.html
Learn more: https://thehackernews.com/2024/02/chinese-hackers-exploiting-ivanti-vpn.html
π±14π6π€―6
π· Fancy a glass of malware? New 'SPIKEDWINE' campaign lures European diplomats with fake wine-tasting invites, deploying the sophisticated WINELOADER backdoor.
Learn more: https://thehackernews.com/2024/02/new-backdoor-targeting-european.html
Learn more: https://thehackernews.com/2024/02/new-backdoor-targeting-european.html
π16
β οΈ Alert, developers! North Korean hackers uploaded malware to PyPI. Packages like pycryptoenv and pycryptoconf targeted typos in popular #encryption library.
Learn more: https://thehackernews.com/2024/02/lazarus-exploits-typos-to-sneak-pypi.html
Learn more: https://thehackernews.com/2024/02/lazarus-exploits-typos-to-sneak-pypi.html
π10π₯7π€3π1
U.S. President Biden signs Executive Order to prevent mass data transfersβfrom biometric to financial dataβto 'countries of concern' due to #privacy and national security risks.
Read details here: https://thehackernews.com/2024/02/president-biden-blocks-mass-transfer-of.html
Read details here: https://thehackernews.com/2024/02/president-biden-blocks-mass-transfer-of.html
π17π€―9π5π€3π1
π Data privacy is no longer a maybe, it's a must!
Discover how a CDP can help you ethically personalize customer experiences while complying with regulations.
Join our webinar to discover the secrets of first-party data: https://thehackernews.com/2024/02/building-your-privacy-compliant.html
Discover how a CDP can help you ethically personalize customer experiences while complying with regulations.
Join our webinar to discover the secrets of first-party data: https://thehackernews.com/2024/02/building-your-privacy-compliant.html
π12π€4π₯1
β οΈ Lazarus Group hackers found exploiting a Windows kernel zero-day vulnerability (CVE-2024-21338) weeks after a patch was released, allowing them to gain system-level control and disable security software on targeted systems.
Details here: https://thehackernews.com/2024/02/lazarus-hackers-exploited-windows.html
Details here: https://thehackernews.com/2024/02/lazarus-hackers-exploited-windows.html
π₯20π16π€4π1
Beware! A new π§ Linux malware called "GTPDOOR" has been discovered that targets π‘ telecom networks and leverages the π GPRS Tunneling Protocol (GTP) for command-and-control (C2) communications.
Read details here: https://thehackernews.com/2024/02/gtpdoor-linux-malware-targets-telecoms.html
Read details here: https://thehackernews.com/2024/02/gtpdoor-linux-malware-targets-telecoms.html
π±28π8π6π₯3π1
Data breaches are on the rise at an alarming rate. Is your organization's #cybersecurity strategy ready to adapt?
Don't be the next headline β take a proactive approach to cybersecurity.
Learn the key strategies to protect your business: https://thehackernews.com/2024/02/why-risk-based-approach-to.html
Don't be the next headline β take a proactive approach to cybersecurity.
Learn the key strategies to protect your business: https://thehackernews.com/2024/02/why-risk-based-approach-to.html
π21π1π€―1
New attack technique "Silver SAML" bypasses protections against Golden SAML attacks in apps using Cloud Identity Providers like Microsoft Entra ID.
Read details here: https://thehackernews.com/2024/02/new-silver-saml-attack-evades-golden.html
Read details here: https://thehackernews.com/2024/02/new-silver-saml-attack-evades-golden.html
π₯19π3
Good news for devs β GitHub turned on auto secret scanning push protection by default for all pushes to public repositories.
Find out how it works: https://thehackernews.com/2024/03/github-rolls-out-default-secret.html
Find out how it works: https://thehackernews.com/2024/03/github-rolls-out-default-secret.html
π19π9π₯5
Five Eyes intelligence alliance warns of cyber threat actors targeting vulnerabilities in Ivanti Connect Secure and Policy Secure gateways. Four vulnerabilities under active attack.
Learn more here: https://thehackernews.com/2024/03/five-eyes-agencies-warn-of-active.html
Learn more here: https://thehackernews.com/2024/03/five-eyes-agencies-warn-of-active.html
π13π₯11π7
A new Linux variant of the notorious BIFROSE RAT targets systems with sophisticated evasion techniques, employing deceptive domains to mimic VMware.
Read details β https://thehackernews.com/2024/03/new-bifrose-linux-malware-variant-using.html
Read details β https://thehackernews.com/2024/03/new-bifrose-linux-malware-variant-using.html
π₯14π3
π¨ Cryptocurrency users! Watch out for a sophisticated phishing attack mimicking Binance, Coinbase, Gemini & more. Don't fall for fake logins, emails, texts, or calls.
Learn more: https://thehackernews.com/2024/03/new-phishing-kit-leverages-sms-voice.html
Learn more: https://thehackernews.com/2024/03/new-phishing-kit-leverages-sms-voice.html
π17π₯9β‘3π€―3
"It'll never happen to us" = Famous last words in data disasters.
The silent heroes of cybersecurity are often the recovery plans that never get tested until D-Day. Check out these invaluable lessons from recent tech mishaps: https://thehackernews.com/2024/03/4-instructive-postmortems-on-data.html
The silent heroes of cybersecurity are often the recovery plans that never get tested until D-Day. Check out these invaluable lessons from recent tech mishaps: https://thehackernews.com/2024/03/4-instructive-postmortems-on-data.html
π32π₯9π4
U.S. DOJ indicted Iranian Alireza Shafie Nasab for cyberattacks on the government and private sectors, offering up to $10 million for info leading to his capture.
Learn more: https://thehackernews.com/2024/03/us-charges-iranian-hacker-offers-10.html
Learn more: https://thehackernews.com/2024/03/us-charges-iranian-hacker-offers-10.html
π25π9π6π€5
A U.S. court has ordered Israeli spyware company NSO Group to disclose the source code and functionality details of its Pegasus spyware to Meta (Facebook/WhatsApp).
Learn more: https://thehackernews.com/2024/03/us-court-orders-nso-group-to-hand-over.html
Learn more: https://thehackernews.com/2024/03/us-court-orders-nso-group-to-hand-over.html
π₯39π21π16π€16π€―14π6
π¨ Multiple U.S. agencies are warning about Phobos ransomware, a RaaS deployed in widespread attacks against critical infrastructure.
Organizations need up-to-date threat intelligence β read more: https://thehackernews.com/2024/03/phobos-ransomware-aggressively.html
Organizations need up-to-date threat intelligence β read more: https://thehackernews.com/2024/03/phobos-ransomware-aggressively.html
π16π13
Roughly 100 malicious AI/ML models have been discovered on the popular Hugging Face development platform.
Read how attackers can gain full system control: https://thehackernews.com/2024/03/over-100-malicious-aiml-models-found-on.html
Read how attackers can gain full system control: https://thehackernews.com/2024/03/over-100-malicious-aiml-models-found-on.html
π€―14π±13π5π2
SaaS apps are everywhere, but are they secure? Mid-market companies face unique risks in managing app usage.
Learn how to manage SaaS security without the headaches π https://thehackernews.com/2024/03/from-500-to-5000-employees-securing-3rd.html
Learn how to manage SaaS security without the headaches π https://thehackernews.com/2024/03/from-500-to-5000-employees-securing-3rd.html
π17
Cybercriminals are abusing India's UPI system by using the XHelper app to launder money on a large scale. They recruit Indian money mules, offering commissions for laundering money through fake mobile payment gateways.
Learn more: https://thehackernews.com/2024/03/how-cybercriminals-are-exploiting.html
Learn more: https://thehackernews.com/2024/03/how-cybercriminals-are-exploiting.html
π15π±9π6π€3