π¨ Beware of fake browser updates! Cybercriminals are using this tactic to deliver RATs and info stealers like BitRAT and Lumma Stealer.
Find out how this affordable malware is enabling cybercriminals to steal sensitive data: https://thehackernews.com/2024/06/beware-fake-browser-updates-deliver.html
#cybersecurity #hacking
Find out how this affordable malware is enabling cybercriminals to steal sensitive data: https://thehackernews.com/2024/06/beware-fake-browser-updates-deliver.html
#cybersecurity #hacking
π₯15π7π±6π5β‘1
π¨ Attention South Korean businesses!
Andariel group targets educational institutes, manufacturing firms, and construction companies with new Golang-based backdoor Dora RAT.
Learn more: https://thehackernews.com/2024/06/andariel-hackers-target-south-korean.html
Andariel group targets educational institutes, manufacturing firms, and construction companies with new Golang-based backdoor Dora RAT.
Learn more: https://thehackernews.com/2024/06/andariel-hackers-target-south-korean.html
π€―16π10
π Researcher uncovered authorization bypass issues in Cox modems, allowing attackers to run malicious commands and remotely access PII from millions of devices.
Read more: https://thehackernews.com/2024/06/researcher-uncovers-flaws-in-cox-modems.html
Read more: https://thehackernews.com/2024/06/researcher-uncovers-flaws-in-cox-modems.html
π₯13π€―5π2π±2β‘1
π Operation Endgame!
Odd, the elusive cybercriminal behind Emotet, has been identified with multiple aliases. Law enforcement seeks your help to uncover his network.
Learn more: https://thehackernews.com/2024/06/authorities-ramp-up-efforts-to-capture.html
Odd, the elusive cybercriminal behind Emotet, has been identified with multiple aliases. Law enforcement seeks your help to uncover his network.
Learn more: https://thehackernews.com/2024/06/authorities-ramp-up-efforts-to-capture.html
π16π8β‘3
Cato's SASE Threat Report uncovers critical enterprise and network threats through extensive data analysis.
Security professionals: Don't miss these crucial findings and insights!
π Click to learn more: https://thehackernews.com/2024/06/sase-threat-report-8-key-findings-for.html
Security professionals: Don't miss these crucial findings and insights!
π Click to learn more: https://thehackernews.com/2024/06/sase-threat-report-8-key-findings-for.html
π18β‘2
π΅οΈββοΈ Attention developers!
A new suspicious package named "glup-debugger-log" has been discovered on the npm registry, designed to drop a RAT on compromised systems.
Learn more: https://thehackernews.com/2024/06/researchers-uncover-rat-dropping-npm.html
A new suspicious package named "glup-debugger-log" has been discovered on the npm registry, designed to drop a RAT on compromised systems.
Learn more: https://thehackernews.com/2024/06/researchers-uncover-rat-dropping-npm.html
π₯16π14β‘5
Imagine if you could focus on the 20% of vulnerabilities that actually matter and see an 80% improvement in your security posture.
Or, gain 80% more time to focus on activities critical to keeping your business secureβ¦
Join Intruderβs webinar on June 12, 2024 to find out how to achieve this today.
Canβt make it? Register for the webinar and a copy will be sent: https://thn.news/exposure-management-webinar
Or, gain 80% more time to focus on activities critical to keeping your business secureβ¦
Join Intruderβs webinar on June 12, 2024 to find out how to achieve this today.
Canβt make it? Register for the webinar and a copy will be sent: https://thn.news/exposure-management-webinar
www.intruder.io
Focus on what matters most! Exposure management and your attack surface
Your business, attack surface and the threat landscape are not static - they are constantly changing. Knowing where and how to prioritize your security resources to achieve the greatest impact with the least time invested is critical. Learn about exposureβ¦
π18π₯1
π¨ Alert - CISA has added a critical flaw in Oracle WebLogic Server to its KEV catalog due to active exploitation.
Details: https://thehackernews.com/2024/06/oracle-weblogic-server-os-command.html
This OS command injection vulnerability (CVE-2017-3506) could allow attackers to take control of affected servers.
Details: https://thehackernews.com/2024/06/oracle-weblogic-server-os-command.html
This OS command injection vulnerability (CVE-2017-3506) could allow attackers to take control of affected servers.
π14π±6π₯5β‘1
π¨ DarkGate shifts from AutoIt to AutoHotkey, highlighting its continuous evolution to evade detection.
Latest version packs new commands but drops some old ones. Learn more: https://thehackernews.com/2024/06/darkgate-malware-replaces-autoit-with.html
Latest version packs new commands but drops some old ones. Learn more: https://thehackernews.com/2024/06/darkgate-malware-replaces-autoit-with.html
π14π₯5β‘4
π¨ Red Alert: Snowflake customers must enable MFA now to prevent account compromise from stolen credentials π obtained through information-stealing malware.
Learn more: https://thehackernews.com/2024/06/snowflake-warns-targeted-credential.html
Act immediately to protect your organization.
Learn more: https://thehackernews.com/2024/06/snowflake-warns-targeted-credential.html
Act immediately to protect your organization.
π19β‘5π4
A sophisticated cyber attack targeting Ukraine's endpoints has been discovered, aiming to deploy Cobalt Strike.
Learn how this multi-stage attack unfolds and the evasion techniques used by the attackers.
Read: https://thehackernews.com/2024/06/hackers-use-ms-excel-macro-to-launch.html
Learn how this multi-stage attack unfolds and the evasion techniques used by the attackers.
Read: https://thehackernews.com/2024/06/hackers-use-ms-excel-macro-to-launch.html
π₯18β‘4π3π1
π΅οΈββοΈ Threat intelligence decay is real, and it's putting your organization at risk. Learn how AI is exacerbating this challenge and what you can do to stay ahead.
π Read this article for more insights: https://thehackernews.com/expert-insights/2024/06/leveraging-ai-as-tool-in-threat.html
π Read this article for more insights: https://thehackernews.com/expert-insights/2024/06/leveraging-ai-as-tool-in-threat.html
π11β‘4π4
Nudge Security has discovered over 500 unique GenAI apps in customer environments without the need for agents, browser plug-ins, or any prior knowledge of the apps in use.
See how you can discover, secure, and govern GenAI use with a free 14-day trial: https://thn.news/mitigate-genaI-risks
See how you can discover, secure, and govern GenAI use with a free 14-day trial: https://thn.news/mitigate-genaI-risks
Nudgesecurity
Discover & Secure Generative AI Usage with Nudge Security
Balance the productivity benefits of generative AI with security oversight by programmatically discovering the tools your employees are using.
π₯8π5π€5π±1
β οΈ Critical security flaw discovered in Progress Telerik Report Server (CVE-2024-4358, CVSS 9.8/10).
Remote attackers could bypass authentication and create rogue admin users.
Learn more: https://thehackernews.com/2024/06/telerik-report-server-flaw-could-let.html
Update to version 2024 Q2 (10.1.24.514) ASAP.
Remote attackers could bypass authentication and create rogue admin users.
Learn more: https://thehackernews.com/2024/06/telerik-report-server-flaw-could-let.html
Update to version 2024 Q2 (10.1.24.514) ASAP.
π13π€―8π3π₯2
The old way of protecting browsers is outdated. A new report reveals why Browser Isolation isn't enough anymore and how Secure Browser Extensions are stepping up to the challenge.
Learn more: https://thehackernews.com/2024/06/the-next-generation-of-rbi-remote.html
Learn more: https://thehackernews.com/2024/06/the-next-generation-of-rbi-remote.html
π€15π€―4π3
Decoy Dog malware, previously targeting Linux, now has a confirmed Windows variant. APT group HellHounds is using this new version to compromise high-value targets in Russia and maintain persistent access for years.
Learn more: https://thehackernews.com/2024/06/russian-power-companies-it-firms-and.html
Learn more: https://thehackernews.com/2024/06/russian-power-companies-it-firms-and.html
π₯14π11π6π±3β‘1
β‘ Attention, Zyxel NAS Users!
Critical updates released for NAS326 and NAS542 devices address severe vulnerabilities that could allow unauthenticated attackers to execute OS commands.
Learn more: https://thehackernews.com/2024/06/zyxel-releases-patches-for-firmware.html
Update now to secure your data!
Critical updates released for NAS326 and NAS542 devices address severe vulnerabilities that could allow unauthenticated attackers to execute OS commands.
Learn more: https://thehackernews.com/2024/06/zyxel-releases-patches-for-firmware.html
Update now to secure your data!
β‘13π6π₯5π€3
β οΈ TikTok admits a security issue where zero-click hashtag#malware in DMs allowed hackers to hijack high-profile accounts without user interaction.
Find details here: https://thehackernews.com/2024/06/celebrity-tiktok-accounts-compromised.html
Find details here: https://thehackernews.com/2024/06/celebrity-tiktok-accounts-compromised.html
π₯35π20π€―10π2
π¨ ALERT: RansomHub, a rebranded Knight #ransomware, targets healthcare and major entities.
Using legitimate remote desktop tools and recruiting from shutdown groups, it shows evolving cybercriminal tactics.
Learn more: https://thehackernews.com/2024/06/rebranded-knight-ransomware-targeting.html
Using legitimate remote desktop tools and recruiting from shutdown groups, it shows evolving cybercriminal tactics.
Learn more: https://thehackernews.com/2024/06/rebranded-knight-ransomware-targeting.html
π16π₯6π€―1
π‘οΈ Chinese state-sponsored hackers target Southeast Asian government in cyber espionage campaign using new malware like PocoProxy and updated EAGERBEE, along with other known families.
Details here: https://thehackernews.com/2024/06/chinese-state-backed-cyber-espionage.html
Details here: https://thehackernews.com/2024/06/chinese-state-backed-cyber-espionage.html
π₯16π5π2π±2β‘1