π¨ Cisco issued patches for a high-severity flaw (CVE-2024-20337) in Secure Client software on Windows, Linux, and macOS. Attackers could hijack VPN sessions.
Check and update now: https://thehackernews.com/2024/03/cisco-issues-patch-for-high-severity.html
Check and update now: https://thehackernews.com/2024/03/cisco-issues-patch-for-high-severity.html
π₯13π±9β‘3π2π1
π Meta announces plans for interoperability between WhatsApp, Messenger, and third-party messaging services, maintaining end-to-end encryption in response to the EU's Digital Markets Act.
Learn more: https://thehackernews.com/2024/03/meta-details-whatsapp-and-messenger.html
Learn more: https://thehackernews.com/2024/03/meta-details-whatsapp-and-messenger.html
π23π₯8π€8π2
Explore the lesser-known pitfalls of secrets storage and management. Avoid the top 5 secrets management mistakes that could compromise your infrastructure.
Learn from the pros how to secure your API keys, certificates, and more.
Read: https://thehackernews.com/2024/03/secrets-sensei-conquering-secrets.html
Learn from the pros how to secure your API keys, certificates, and more.
Read: https://thehackernews.com/2024/03/secrets-sensei-conquering-secrets.html
π26π₯11β‘1
β‘ Alert β’ Microsoft confirms Russian hackers (Midnight Blizzard) stole internal data & some source code after a January email breach. They're using stolen data to target customers.
Learn more β¬ https://thehackernews.com/2024/03/microsoft-confirms-russian-hackers.html
Learn more β¬ https://thehackernews.com/2024/03/microsoft-confirms-russian-hackers.html
π44π€―20π±19β‘10π8
β οΈ Hackers are getting faster! Magnet Goblin, a threat group known for fast exploitation of 1-day vulnerabilities, targets edge devices & public servers to deploy malware like Nerbian RAT.
Learn more β’ https://thehackernews.com/2024/03/magnet-goblin-hacker-group-leveraging-1.html
Learn more β’ https://thehackernews.com/2024/03/magnet-goblin-hacker-group-leveraging-1.html
π17π7π€2
β οΈ URGENT patch needed! Progress OpenEdge Authentication Gateway/AdminServer vulnerability (CVE-2024-1403) allows authentication bypass.
Proof-of-concept exploit is available.
Learn more: https://thehackernews.com/2024/03/proof-of-concept-exploit-released-for.html
Update to supported versions ASAP.
Proof-of-concept exploit is available.
Learn more: https://thehackernews.com/2024/03/proof-of-concept-exploit-released-for.html
Update to supported versions ASAP.
π20π6
πAlert: Cybercriminals weaponizing vulnerabilities in JetBrains TeamCity software to deploy BianLian ransomware for extortion attacks.
Learn more: https://thehackernews.com/2024/03/bianlian-threat-actors-exploiting.html
Learn more: https://thehackernews.com/2024/03/bianlian-threat-actors-exploiting.html
π10π€―1
Are you looking for a better way to keep up with the ever-expanding attack surface?
Gartner established the Continuous Threat Exposure Management (CTEM) framework to help security teams prioritize and validate issues into an actionable remediation plan.
Join XMCyber's webinar featuring Gartner VP Analyst Pete Shoard to learn:
β Why adopting CTEM is essential to control your threat landscape
β What are the 5 steps of the CTEM program
β How you can operationalize CTEM in your organization
Register Now: https://thehackernews.uk/ctem-framework-webinar
Gartner established the Continuous Threat Exposure Management (CTEM) framework to help security teams prioritize and validate issues into an actionable remediation plan.
Join XMCyber's webinar featuring Gartner VP Analyst Pete Shoard to learn:
β Why adopting CTEM is essential to control your threat landscape
β What are the 5 steps of the CTEM program
β How you can operationalize CTEM in your organization
Register Now: https://thehackernews.uk/ctem-framework-webinar
π19
π Protecting data in the cloud requires a new approach. Discover why browser-based DLP is the key to securing corporate data online.
Get insights from LayerX's comprehensive guide:
https://thehackernews.com/2024/03/data-leakage-prevention-in-age-of-cloud.html
Get insights from LayerX's comprehensive guide:
https://thehackernews.com/2024/03/data-leakage-prevention-in-age-of-cloud.html
π16
β οΈ Beware of fake DocuSign emails β they're designed to trick you into downloading the New CHAVECLOAK Android banking malware.
What it does:
- Hijacks your screen
- Logs your keystrokes
- Uses fake pop-ups to capture your banking logins
Read: https://thehackernews.com/2024/03/new-banking-trojan-chavecloak-targets.html
What it does:
- Hijacks your screen
- Logs your keystrokes
- Uses fake pop-ups to capture your banking logins
Read: https://thehackernews.com/2024/03/new-banking-trojan-chavecloak-targets.html
π20π₯15
β οΈ Heads up, WordPress admins! Over 3,900 websites compromised in weeks.
A high-severity flaw in the Ultimate Member plugin exposes sites to attacks, leading to phishing scams.
Learn more: https://thehackernews.com/2024/03/malware-campaign-exploits-popup-builder.html
Secure your sites NOW.
A high-severity flaw in the Ultimate Member plugin exposes sites to attacks, leading to phishing scams.
Learn more: https://thehackernews.com/2024/03/malware-campaign-exploits-popup-builder.html
Secure your sites NOW.
π₯13π6π3π€―2
For the first time, Russia detains a South Korean national, Baek Won-soon, on cyber espionage charges. Transferred from Vladivostok to Moscow for further investigation.
Learn more: https://thehackernews.com/2024/03/south-korean-citizen-detained-in-russia.html
Learn more: https://thehackernews.com/2024/03/south-korean-citizen-detained-in-russia.html
π±18π9π€―5π2
Heads up, developers! Hackers are targeting crypto wallets with sneaky PyPI packages. Thousands of downloads already affected. Check your dependencies!
Learn more: https://thehackernews.com/2024/03/watch-out-these-pypi-python-packages.html
Learn more: https://thehackernews.com/2024/03/watch-out-these-pypi-python-packages.html
π15π€―6
Tired of being overwhelmed by security exposures?
Discover the power of Continuous Threat Exposure Management (CTEM). Identify critical assets, prioritize risks, and get actionable recommendations for improved security posture.
Get started π https://thehackernews.com/2024/03/ctem-101-go-beyond-vulnerability.html
Discover the power of Continuous Threat Exposure Management (CTEM). Identify critical assets, prioritize risks, and get actionable recommendations for improved security posture.
Get started π https://thehackernews.com/2024/03/ctem-101-go-beyond-vulnerability.html
π₯13π9
π¨ Microsoft releases Patch Tuesday updates to patch 61 new vulnerabilities, including privilege escalation flaws in Azure, Windows, & Authenticator.
Update ASAP. Learn more: https://thehackernews.com/2024/03/microsofts-march-updates-fix-61.html
Update ASAP. Learn more: https://thehackernews.com/2024/03/microsofts-march-updates-fix-61.html
π14π7π3π₯1
π¨ Alert: A new phishing campaign uses a Java-based downloader to distribute VCURMS & STRRAT RATs, leveraging public services like AWS & GitHub for malware hosting.
Learn more: https://thehackernews.com/2024/03/alert-cybercriminals-deploying-vcurms.html
Learn more: https://thehackernews.com/2024/03/alert-cybercriminals-deploying-vcurms.html
π±11π4π1
Beware of adversary-in-the-middle attacks: Hackers create fake login pages to steal credentials and manipulate MFA prompts. Protect yourself by verifying websites and being cautious with links
Read: https://thehackernews.com/2024/02/4-ways-hackers-use-social-engineering.html
Read: https://thehackernews.com/2024/02/4-ways-hackers-use-social-engineering.html
π₯12π7π1
Researchers reveal Google's Gemini AI is vulnerable to LLM attacks that could leak sensitive data, generate harmful content, and be used for malicious purposes.
Read: https://thehackernews.com/2024/03/researchers-highlight-googles-gemini-ai.html
Read: https://thehackernews.com/2024/03/researchers-highlight-googles-gemini-ai.html
π27π5
Cybercriminals are now targeting the latest weak spotβidentities within SaaS applications.
Join our webinar to learn how to secure both human and non-human identities against data breaches and financial losses.
Register now: https://thehackernews.com/2024/03/join-our-webinar-on-protecting-human.html
Join our webinar to learn how to secure both human and non-human identities against data breaches and financial losses.
Register now: https://thehackernews.com/2024/03/join-our-webinar-on-protecting-human.html
π19π2
Latest version of PixPirate Android banking trojan evades detection by removing the ability to launch the app from the home screen. The complex infection chain involves both a downloader and the main malicious app working in tandem.
Read: https://thehackernews.com/2024/03/pixpirate-android-banking-trojan-using.html
Read: https://thehackernews.com/2024/03/pixpirate-android-banking-trojan-using.html
π11π₯5