π» A new vulnerability, CVE-2024-28085, dubbed "WallEscape," impacts the "wall" command in util-linux, potentially exposing passwords or altering clipboards on Linux distros like Ubuntu & Debian.
Read more β https://thehackernews.com/2024/03/new-linux-bug-could-lead-to-user.html
Read more β https://thehackernews.com/2024/03/new-linux-bug-could-lead-to-user.html
π15π7β‘2π€―2π1
π¨ ALERT: TheMoon botnet, previously thought to be inactive, is back.
Over 40,000 hijacked routers & IoT devices power Faceless, a criminal proxy service used to steal data, attack financial systems, & spread malware like SolarMarker & IcedID.
Read β https://thehackernews.com/2024/03/themoon-botnet-resurfaces-exploiting.html
Over 40,000 hijacked routers & IoT devices power Faceless, a criminal proxy service used to steal data, attack financial systems, & spread malware like SolarMarker & IcedID.
Read β https://thehackernews.com/2024/03/themoon-botnet-resurfaces-exploiting.html
π€8π6π5π€―4π1
β οΈ New security flaws found in Dormakaba's Saflok RFID locks could allow attackers to easily forge keycards and access any room, affecting MILLIONS of hotel locks worldwide.
Read: https://thehackernews.com/2024/03/dormakaba-locks-used-in-millions-of.html
Read: https://thehackernews.com/2024/03/dormakaba-locks-used-in-millions-of.html
π11π₯7π5π€―4β‘2π1
Outdated pen testing is expensive & leaves holes in your security. With automation and AI, companies can now affordably assess network security regularly, spotting vulnerabilities before attackers do.
πͺ Find out how: https://thehackernews.com/2024/03/the-golden-age-of-automated-penetration.html
πͺ Find out how: https://thehackernews.com/2024/03/the-golden-age-of-automated-penetration.html
π€16π₯11π9β‘3π3π€―3
πURGENT SECURITY ALERT!
Secret backdoor found in XZ Utils compression library used by major Linux distros, like Fedora, Kali Linux, and openSUSE. Attackers could breach SSH and take control of systems.
https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html
Update and review your systems immediately.
Secret backdoor found in XZ Utils compression library used by major Linux distros, like Fedora, Kali Linux, and openSUSE. Attackers could breach SSH and take control of systems.
https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html
Update and review your systems immediately.
π€―61π₯19π12π±9π7
β οΈ Mac users, beware! Malicious ads and fake websites are spreading dangerous malware like Atomic Stealer, which can steal your passwords, cryptocurrency, and other sensitive data.
Learn more: https://thehackernews.com/2024/03/hackers-target-macos-users-with.html
Learn more: https://thehackernews.com/2024/03/hackers-target-macos-users-with.html
π24π17π±12π€5π₯4π3π€―1
π¨ Android users beware! Vultur, the notorious banking trojan, is back with upgraded new remote control features, encrypted communication, and stealthy techniques.
Learn more: https://thehackernews.com/2024/04/vultur-android-banking-trojan-returns.html
Learn more: https://thehackernews.com/2024/04/vultur-android-banking-trojan-returns.html
π23π€―11
π±β οΈ Malicious Android apps found on the Google Play Store!
Experts uncover VPN apps hijacking users' devices, covertly turning them into proxy nodes for cybercriminals and fueling botnet operations.
Details here: https://thehackernews.com/2024/04/malicious-apps-caught-secretly-turning.html
Experts uncover VPN apps hijacking users' devices, covertly turning them into proxy nodes for cybercriminals and fueling botnet operations.
Details here: https://thehackernews.com/2024/04/malicious-apps-caught-secretly-turning.html
π17π₯9π5π2β‘1
π Logs are the foundation of monitoring efforts, especially on Windows.
"EventSentry" harnesses the power of detailed log monitoring & real-time validation to detect malware attacks early.
Read: https://thehackernews.com/2024/04/detecting-windows-based-malware-through.html
Don't let blind spots compromise your security.
"EventSentry" harnesses the power of detailed log monitoring & real-time validation to detect malware attacks early.
Read: https://thehackernews.com/2024/04/detecting-windows-based-malware-through.html
Don't let blind spots compromise your security.
π20π±5π€3
Whoβs using AI tools in your organization? Find out in minutes with Nudge Security. Start a free trial and discover every SaaS account ever created by anyone in your org, including generative AI tools.
The best part? Youβll have a full inventory in minutes and you donβt even have to know what apps youβre looking for. No agents, browser plug-ins or network proxies required.
https://thn.news/mitigate-ai-risks
The best part? Youβll have a full inventory in minutes and you donβt even have to know what apps youβre looking for. No agents, browser plug-ins or network proxies required.
https://thn.news/mitigate-ai-risks
Nudgesecurity
Discover & Secure Generative AI Usage with Nudge Security
Balance the productivity benefits of generative AI with security oversight by programmatically discovering the tools your employees are using.
π19π₯6π1π1
π TA558 threat actor launches massive phishing campaign targeting Latin American sectors, deploying Venom RAT. Hotels, finance, government among primary targets in Spain, Mexico, U.S., Colombia, Brazil, and more.
Learn more: https://thehackernews.com/2024/04/massive-phishing-campaign-strikes-latin.html
Learn more: https://thehackernews.com/2024/04/massive-phishing-campaign-strikes-latin.html
π₯14π9π€―4π2
Google agrees to delete BILLION of browsing records to settle class action lawsuit, alleging tracking without consent in Chrome's Incognito Mode.
Find details here: https://thehackernews.com/2024/04/google-to-delete-billions-of-browsing.html
Find details here: https://thehackernews.com/2024/04/google-to-delete-billions-of-browsing.html
π€―52π17π₯12π9π4
China-linked hacker group Earth Freybug is now using a new malware named "UNAPIMON" to fly under the radar.
Learn more: https://thehackernews.com/2024/04/china-linked-hackers-deploy-new.html
Researchers shed light on their espionage and financially motivated activities.
Learn more: https://thehackernews.com/2024/04/china-linked-hackers-deploy-new.html
Researchers shed light on their espionage and financially motivated activities.
π19π8π₯6π2
π Malicious code discovered in widely used Linux tool XZ Utils could lead to remote code execution. The incident underscores the dangers of open-source software reliance.
Read now: https://thehackernews.com/2024/04/malicious-code-in-xz-utils-for-linux.html
If you use Linux, take action NOW.
Read now: https://thehackernews.com/2024/04/malicious-code-in-xz-utils-for-linux.html
If you use Linux, take action NOW.
π€―35π17π€9π₯7π5β‘1
What makes Cloud Security tough? Lack of visibility, inconsistent permissions, blurred ownership...
Hybrid attack path analysis is crucial for complete security. Continuous Threat Exposure Management (CTEM) helps block critical attack vectors.
Learn: https://thehackernews.com/2024/04/harnessing-power-of-ctem-for-cloud.html
Hybrid attack path analysis is crucial for complete security. Continuous Threat Exposure Management (CTEM) helps block critical attack vectors.
Learn: https://thehackernews.com/2024/04/harnessing-power-of-ctem-for-cloud.html
π18π6π3π€2
π¨ Heads up, WordPress admins!
A critical SQL injection flaw in the LayerSlider plugin (CVE-2024-2879) could lead to sensitive data leaks. If you haven't updated, make sure to install version 7.10.1 or latest.
Find details: https://thehackernews.com/2024/04/critical-security-flaw-found-in-popular.html
A critical SQL injection flaw in the LayerSlider plugin (CVE-2024-2879) could lead to sensitive data leaks. If you haven't updated, make sure to install version 7.10.1 or latest.
Find details: https://thehackernews.com/2024/04/critical-security-flaw-found-in-popular.html
π₯11π8π±3π1
β οΈ Banking trojan Mispadu expands to Italy, Poland, and Sweden, stealing thousands of credentials with sophisticated tactics like phishing emails and keystroke capture.
Read details: https://thehackernews.com/2024/04/mispadu-trojan-targets-europe-thousands.html
Read details: https://thehackernews.com/2024/04/mispadu-trojan-targets-europe-thousands.html
π₯11π6
Google Chrome is testing a new feature called "Device Bound Session Credentials" to fight against session cookie theft by #malware.
DBSC links auth sessions directly to users' devices to stop cookie theft hacks.
Learn more about it: https://thehackernews.com/2024/04/google-chrome-beta-tests-new-dbsc.html
DBSC links auth sessions directly to users' devices to stop cookie theft hacks.
Learn more about it: https://thehackernews.com/2024/04/google-chrome-beta-tests-new-dbsc.html
π38π9π€―5β‘1π₯1
Confused about vulnerability management (VM) vs. attack surface management (ASM)?
They're both important but different. But together, they form a robust defense against cyber threats.
Learn how: https://thehackernews.com/2024/04/attack-surface-management-vs.html
They're both important but different. But together, they form a robust defense against cyber threats.
Learn how: https://thehackernews.com/2024/04/attack-surface-management-vs.html
π16π6π5
β οΈ U.S. Cyber Safety Review Board slams Microsoft for security failures that enabled a major data breach by China-backed hackers.
Read details: https://thehackernews.com/2024/04/us-cyber-safety-board-slams-microsoft.html
Read details: https://thehackernews.com/2024/04/us-cyber-safety-board-slams-microsoft.html
π14π₯10π7π€6