Explore the dangers of Google Tag Manager misconfigurations with real-world examples.
Learn how to safeguard your data and comply with privacy laws.
Read: https://thehackernews.com/2024/06/new-case-study-unmanaged-gtm-tags.html
Learn how to safeguard your data and comply with privacy laws.
Read: https://thehackernews.com/2024/06/new-case-study-unmanaged-gtm-tags.html
😁12👍9😱4🤔3
China-linked cyber espionage group UNC3886 exploits zero-day vulnerabilities in Fortinet, Ivanti, and VMware devices and evading detection with advanced techniques.
Discover how they operate: https://thehackernews.com/2024/06/chinese-cyber-espionage-group-exploits.html
Discover how they operate: https://thehackernews.com/2024/06/chinese-cyber-espionage-group-exploits.html
🔥17😁8👍6😱1
⚡ Kraken exchange hacked: $3 Million stolen due to zero-day flaw. Researcher exploits bug, extorts company, refuses to return funds.
Read: https://thehackernews.com/2024/06/kraken-crypto-exchange-hit-by-3-million.html
Kraken working with law enforcement, calls actions criminal.
Read: https://thehackernews.com/2024/06/kraken-crypto-exchange-hit-by-3-million.html
Kraken working with law enforcement, calls actions criminal.
😁37👍9😱9⚡3🤔3
Discover the latest evasive malware loader, SquidLoader, targeting Chinese organizations via phishing emails. Learn about its advanced anti-analysis techniques and the ongoing threat of loader malware.
Details ➡️ https://thehackernews.com/2024/06/experts-uncover-new-evasive-squidloader.html
Details ➡️ https://thehackernews.com/2024/06/experts-uncover-new-evasive-squidloader.html
🔥9👍5😁2🤯2🤔1😱1
🔒 Fickle Stealer, a new Rust-based malware, and AZStealer, an open-source Python stealer, target sensitive data from crypto wallets, browsers, and more through multiple attack chains and exfiltration methods.
Learn more: https://thehackernews.com/2024/06/new-rust-based-fickle-malware-uses.html
Learn more: https://thehackernews.com/2024/06/new-rust-based-fickle-malware-uses.html
🔥11😱5👍4😁2
Chinese-linked cyber espionage groups have been uncovered in a long-term infiltration of telecom operators in Asia since 2021, deploying custom malware and stealing credentials.
Read: https://thehackernews.com/2024/06/chinese-cyber-espionage-targets-telecom.html
Read: https://thehackernews.com/2024/06/chinese-cyber-espionage-targets-telecom.html
🔥10👍8😱7😁2🤯2
Explore the challenges MSPs face with too many cybersecurity tools and discover how Guardz's unified platform simplifies operations and enhances security.
Read: https://thehackernews.com/2024/06/tool-overload-why-msps-are-still.html
Read: https://thehackernews.com/2024/06/tool-overload-why-msps-are-still.html
👍13😁7😱3🤔2👏1
Researchers uncover 'UEFIcanhazbufferoverflow' (CVE-2024-0762), a security flaw in Phoenix SecureCore UEFI firmware affecting multiple #Intel processor families.
Learn more: https://thehackernews.com/2024/06/researchers-uncover-uefi-vulnerability.html
Learn more: https://thehackernews.com/2024/06/researchers-uncover-uefi-vulnerability.html
😁16👍9😱8👏1
U.S. bans Kaspersky software over national security concerns, citing Russian government ties. The ban extends to Kaspersky's affiliates, subsidiaries, and parent companies.
Learn about the ban's impact and Kaspersky's response: https://thehackernews.com/2024/06/us-bans-kaspersky-software-citing.html
Learn about the ban's impact and Kaspersky's response: https://thehackernews.com/2024/06/us-bans-kaspersky-software-citing.html
🤯38👍18😁10👏9🤔9😱9🔥4
⚠️ Alert: SolarWinds Serv-U vulnerability (CVE-2024-28995) is under active exploitation. Urgent update required to protect sensitive data from unauthorized access.
Learn more: https://thehackernews.com/2024/06/solarwinds-serv-u-vulnerability-under.html
Learn more: https://thehackernews.com/2024/06/solarwinds-serv-u-vulnerability-under.html
👍10😁7😱6👏1
🚨 Searching for Google Chrome or Microsoft Teams? Be cautious!
Cybercriminals are exploiting search engines to redirect users to fake websites & distribute trojanized versions of popular apps to spread the Oyster #malware.
Read: https://thehackernews.com/2024/06/oyster-backdoor-spreading-via.html
Cybercriminals are exploiting search engines to redirect users to fake websites & distribute trojanized versions of popular apps to spread the Oyster #malware.
Read: https://thehackernews.com/2024/06/oyster-backdoor-spreading-via.html
😁14👍11😱7👏2
📁 Beware of ZIP files!
Discover how a new phishing campaign targets Pakistan using military-themed emails to spread PHANTOM#SPIKE, a custom backdoor granting remote system access.
Learn more: https://thehackernews.com/2024/06/military-themed-emails-used-to-spread.html
Discover how a new phishing campaign targets Pakistan using military-themed emails to spread PHANTOM#SPIKE, a custom backdoor granting remote system access.
Learn more: https://thehackernews.com/2024/06/military-themed-emails-used-to-spread.html
🔥11😱9👍6🤔3🤯1
🚨 New Threat Alert!
Chinese-speaking SneakyChef hackers are targeting government entities worldwide and AI-focused organizations with sophisticated SugarGh0st and SpiceRAT malware.
Get the latest insights — https://thehackernews.com/2024/06/chinese-hackers-deploy-spicerat-and.html
Chinese-speaking SneakyChef hackers are targeting government entities worldwide and AI-focused organizations with sophisticated SugarGh0st and SpiceRAT malware.
Get the latest insights — https://thehackernews.com/2024/06/chinese-hackers-deploy-spicerat-and.html
👍14🔥5🤯5🤔3
Discover the power of SOC Automation Capability Matrix for cybersecurity incident response and workflow automation. Perfect for enhancing your security operations.
Read: https://thehackernews.com/2024/02/how-to-use-tiness-soc-automation.html
Read: https://thehackernews.com/2024/02/how-to-use-tiness-soc-automation.html
👍18🤔5😱1
U.S. Treasury sanctions 12 Kaspersky executives following Commerce Department's ban on Kaspersky software in the U.S. The company and CEO remain unaffected.
Learn more: https://thehackernews.com/2024/06/us-treasury-sanctions-12-kaspersky.html
Learn more: https://thehackernews.com/2024/06/us-treasury-sanctions-12-kaspersky.html
👍18🤔11🤯6😁4😱4👏2
🚨 Beware: A new adware, AdsExhaust, is targeting Meta Quest app seekers with malicious downloads, manipulating browsers, and generating unauthorized revenue through sophisticated techniques.
Read: https://thehackernews.com/2024/06/warning-new-adware-campaign-targets.html
Read: https://thehackernews.com/2024/06/warning-new-adware-campaign-targets.html
🔥10👍5😱4
New cybercrime gang ExCobalt targets Russian organizations with sophisticated GoRed backdoor.
Explore their tactics: https://thehackernews.com/2024/06/excobalt-cyber-gang-targets-russian.html
Explore their tactics: https://thehackernews.com/2024/06/excobalt-cyber-gang-targets-russian.html
👏18😁11🤔6👍5😱4🤯1
Cyber espionage groups are using Rafel RAT, an open-source Android tool, disguised as popular apps like Instagram, WhatsApp, and more. This malware conducts data theft and device manipulation.
Read: https://thehackernews.com/2024/06/iranian-hackers-deploy-rafel-rat-in.html
Read: https://thehackernews.com/2024/06/iranian-hackers-deploy-rafel-rat-in.html
👍18😱11🤯6
🛑 RedJuliett, a suspected China-linked cyber group, target Taiwan and other countries in extensive cyber espionage campaign, exploiting vulnerabilities in internet-facing devices for intelligence gathering.
Read: https://thehackernews.com/2024/06/redjuliett-cyber-espionage-campaign.html
Read: https://thehackernews.com/2024/06/redjuliett-cyber-espionage-campaign.html
🤔11🤯8👍3😱2
Join Luke Jennings, VP R&D at Push Security, to explore the impact of the ongoing Snowflake incident and the practical steps that organizations can take to investigate and respond effectively, avoiding some of the common pitfalls relating to how identities are configured in Snowflake
Register for the webinar here: https://go.thn.li/snowflake-webinar-tel
Register for the webinar here: https://go.thn.li/snowflake-webinar-tel
👍10😱8