SASE improves networks but lacks in defending against phishing and takeovers.
Learn how secure browser extensions complete your cyber security strategy: https://thehackernews.com/2024/03/sase-solutions-fall-short-without.html
Learn how secure browser extensions complete your cyber security strategy: https://thehackernews.com/2024/03/sase-solutions-fall-short-without.html
π8π3π€―1
π‘οΈ A now-patched vulnerability (CVE-2024-21388) in Microsoft Edge could have allowed attackers to covertly install browser extensions without user consent.
Find details here: https://thehackernews.com/2024/03/microsoft-edge-bug-could-have-allowed.html
If you use Edge, make sure you've updated to the latest version.
Find details here: https://thehackernews.com/2024/03/microsoft-edge-bug-could-have-allowed.html
If you use Edge, make sure you've updated to the latest version.
π±16π9π7π€―5π₯2
π¨ CISA alerts on a security flaw in Microsoft SharePoint Server now part of the KEV catalog due to active exploitation.
Vulnerability CVE-2023-24955 allows remote code execution for Site Owners.
Read: https://thehackernews.com/2024/03/cisa-warns-hackers-actively-attacking.html
Users urged to patch following May 2023 updates.
Vulnerability CVE-2023-24955 allows remote code execution for Site Owners.
Read: https://thehackernews.com/2024/03/cisa-warns-hackers-actively-attacking.html
Users urged to patch following May 2023 updates.
π€―10π5π2
With a Georgetown master's you'll gain the tactical skills to plan for, respond to, and mitigate information security threats.
https://thehackernews.uk/cybersecurity-webinar-2024
https://thehackernews.uk/cybersecurity-webinar-2024
π11π5π2π€2π₯1π€―1
π΅οΈββοΈ Indian government entities & energy companies targeted by cyber espionage using "HackBrowserData" malware to steal sensitive info.
Details: https://thehackernews.com/2024/03/hackers-target-indian-defense-and.html
Attack campaign named OperationFlightNight leverages Slack for data exfiltration.
Details: https://thehackernews.com/2024/03/hackers-target-indian-defense-and.html
Attack campaign named OperationFlightNight leverages Slack for data exfiltration.
π12π€―8π7
Telegram's new Peer-to-Peer Login (P2PL) feature offers free premium membership but in exchange for using your phone number as a relay to send OTP SMS messages to othersβpotentially exposing their phone numbers to strangers.
Learn more: https://thehackernews.com/2024/03/telegram-offers-premium-subscription-in.html
Learn more: https://thehackernews.com/2024/03/telegram-offers-premium-subscription-in.html
π±28π18π15π₯8π4π€―2
β οΈ Researchers have cracked AMD's defenses with a new attack called "ZenHammer"βa variant of the RowHammer attackβtargeting Zen 2 & Zen 3 systems equipped with DDR5 chips.
Find details here: https://thehackernews.com/2024/03/new-zenhammer-attack-bypasses-rowhammer.html
Find details here: https://thehackernews.com/2024/03/new-zenhammer-attack-bypasses-rowhammer.html
π€―16π€6π3π±3π₯2
π Learn how to secure your web applications in a world where malicious attacks are getting smarter.
Don't miss our cybersecurity webinar on identifying and tackling security blind spots with experts from F5 and OPSWAT.
Save you spot now: https://thehackernews.com/2024/03/new-webinar-avoiding-application.html
Don't miss our cybersecurity webinar on identifying and tackling security blind spots with experts from F5 and OPSWAT.
Save you spot now: https://thehackernews.com/2024/03/new-webinar-avoiding-application.html
π€―8π7π2
π‘οΈ Mishandled API keys & passwords are a ticking time bomb π£ in your software.
Don't wait for disaster β make security a non-negotiable part of your dev cycle.
Learn more: https://thehackernews.com/2024/03/behind-scenes-art-of-safeguarding-non.html
Don't wait for disaster β make security a non-negotiable part of your dev cycle.
Learn more: https://thehackernews.com/2024/03/behind-scenes-art-of-safeguarding-non.html
π€―7π±6π5π1
Buying the wrong #dataprotection solution is a #disaster waiting to happen.
Gain a better understanding of data protection challenges and establish your buying criteria using Zerto's Data Protection Buyers Guide!
Get the free full guide here: https://thn.news/data-protection-buyers-guide
Gain a better understanding of data protection challenges and establish your buying criteria using Zerto's Data Protection Buyers Guide!
Get the free full guide here: https://thn.news/data-protection-buyers-guide
Hpe
HPE Zerto Software
HPE Zerto Software guards against downtime with continuous data protection and automation, for secure disaster recovery and smooth workload migration.
π16π€―2
A sneaky new service called "Darcula" is helping cybercriminals steal your info. They're impersonating postal services, airlines, even the IRS and using iMessage and Google Messages to slip past firewalls.
Learn more β https://thehackernews.com/2024/03/darcula-phishing-network-leveraging-rcs.html
Learn more β https://thehackernews.com/2024/03/darcula-phishing-network-leveraging-rcs.html
π€―12π8π₯3π3
Finland's Poliisi has accused APT31, a Chinese nation-state actor, of a cyber attack on the country's Parliament in 2020-2021.
Learn more β https://thehackernews.com/2024/03/finland-blames-chinese-hacking-group.html
Learn more β https://thehackernews.com/2024/03/finland-blames-chinese-hacking-group.html
π13π4π€―2π₯1
β οΈ π§ Linux users, beware! A nasty piece of malware named DinodasRAT is on the loose, targeting China, Taiwan, Turkey, and Uzbekistan. It's a C++ juggernaut capable of stealing a treasure trove of sensitive data.
Read details β https://thehackernews.com/2024/03/linux-version-of-dinodasrat-spotted-in.html
Read details β https://thehackernews.com/2024/03/linux-version-of-dinodasrat-spotted-in.html
π€―27π13π₯8β‘7π5
β οΈ π©βπ» PyPI under attack...again.
π Python's Package Index temporarily shut down new user sign-ups and project creation due to a surge of malicious typosquatting attempts.
Learn more: https://thehackernews.com/2024/03/pypi-halts-sign-ups-amid-surge-of.html
Malware aimed to snag cryptocurrency wallets and more.
π Python's Package Index temporarily shut down new user sign-ups and project creation due to a surge of malicious typosquatting attempts.
Learn more: https://thehackernews.com/2024/03/pypi-halts-sign-ups-amid-surge-of.html
Malware aimed to snag cryptocurrency wallets and more.
π±25π₯8π7π5π3β‘2
π» A new vulnerability, CVE-2024-28085, dubbed "WallEscape," impacts the "wall" command in util-linux, potentially exposing passwords or altering clipboards on Linux distros like Ubuntu & Debian.
Read more β https://thehackernews.com/2024/03/new-linux-bug-could-lead-to-user.html
Read more β https://thehackernews.com/2024/03/new-linux-bug-could-lead-to-user.html
π15π7β‘2π€―2π1
π¨ ALERT: TheMoon botnet, previously thought to be inactive, is back.
Over 40,000 hijacked routers & IoT devices power Faceless, a criminal proxy service used to steal data, attack financial systems, & spread malware like SolarMarker & IcedID.
Read β https://thehackernews.com/2024/03/themoon-botnet-resurfaces-exploiting.html
Over 40,000 hijacked routers & IoT devices power Faceless, a criminal proxy service used to steal data, attack financial systems, & spread malware like SolarMarker & IcedID.
Read β https://thehackernews.com/2024/03/themoon-botnet-resurfaces-exploiting.html
π€8π6π5π€―4π1
β οΈ New security flaws found in Dormakaba's Saflok RFID locks could allow attackers to easily forge keycards and access any room, affecting MILLIONS of hotel locks worldwide.
Read: https://thehackernews.com/2024/03/dormakaba-locks-used-in-millions-of.html
Read: https://thehackernews.com/2024/03/dormakaba-locks-used-in-millions-of.html
π11π₯7π5π€―4β‘2π1
Outdated pen testing is expensive & leaves holes in your security. With automation and AI, companies can now affordably assess network security regularly, spotting vulnerabilities before attackers do.
πͺ Find out how: https://thehackernews.com/2024/03/the-golden-age-of-automated-penetration.html
πͺ Find out how: https://thehackernews.com/2024/03/the-golden-age-of-automated-penetration.html
π€16π₯11π9β‘3π3π€―3
πURGENT SECURITY ALERT!
Secret backdoor found in XZ Utils compression library used by major Linux distros, like Fedora, Kali Linux, and openSUSE. Attackers could breach SSH and take control of systems.
https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html
Update and review your systems immediately.
Secret backdoor found in XZ Utils compression library used by major Linux distros, like Fedora, Kali Linux, and openSUSE. Attackers could breach SSH and take control of systems.
https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html
Update and review your systems immediately.
π€―61π₯19π12π±9π7
β οΈ Mac users, beware! Malicious ads and fake websites are spreading dangerous malware like Atomic Stealer, which can steal your passwords, cryptocurrency, and other sensitive data.
Learn more: https://thehackernews.com/2024/03/hackers-target-macos-users-with.html
Learn more: https://thehackernews.com/2024/03/hackers-target-macos-users-with.html
π24π17π±12π€5π₯4π3π€―1