Researchers uncover 'UEFIcanhazbufferoverflow' (CVE-2024-0762), a security flaw in Phoenix SecureCore UEFI firmware affecting multiple #Intel processor families.
Learn more: https://thehackernews.com/2024/06/researchers-uncover-uefi-vulnerability.html
Learn more: https://thehackernews.com/2024/06/researchers-uncover-uefi-vulnerability.html
π16π9π±8π1
U.S. bans Kaspersky software over national security concerns, citing Russian government ties. The ban extends to Kaspersky's affiliates, subsidiaries, and parent companies.
Learn about the ban's impact and Kaspersky's response: https://thehackernews.com/2024/06/us-bans-kaspersky-software-citing.html
Learn about the ban's impact and Kaspersky's response: https://thehackernews.com/2024/06/us-bans-kaspersky-software-citing.html
π€―38π18π10π9π€9π±9π₯4
β οΈ Alert: SolarWinds Serv-U vulnerability (CVE-2024-28995) is under active exploitation. Urgent update required to protect sensitive data from unauthorized access.
Learn more: https://thehackernews.com/2024/06/solarwinds-serv-u-vulnerability-under.html
Learn more: https://thehackernews.com/2024/06/solarwinds-serv-u-vulnerability-under.html
π10π7π±6π1
π¨ Searching for Google Chrome or Microsoft Teams? Be cautious!
Cybercriminals are exploiting search engines to redirect users to fake websites & distribute trojanized versions of popular apps to spread the Oyster #malware.
Read: https://thehackernews.com/2024/06/oyster-backdoor-spreading-via.html
Cybercriminals are exploiting search engines to redirect users to fake websites & distribute trojanized versions of popular apps to spread the Oyster #malware.
Read: https://thehackernews.com/2024/06/oyster-backdoor-spreading-via.html
π14π11π±7π2
π Beware of ZIP files!
Discover how a new phishing campaign targets Pakistan using military-themed emails to spread PHANTOM#SPIKE, a custom backdoor granting remote system access.
Learn more: https://thehackernews.com/2024/06/military-themed-emails-used-to-spread.html
Discover how a new phishing campaign targets Pakistan using military-themed emails to spread PHANTOM#SPIKE, a custom backdoor granting remote system access.
Learn more: https://thehackernews.com/2024/06/military-themed-emails-used-to-spread.html
π₯11π±9π6π€3π€―1
π¨ New Threat Alert!
Chinese-speaking SneakyChef hackers are targeting government entities worldwide and AI-focused organizations with sophisticated SugarGh0st and SpiceRAT malware.
Get the latest insights β https://thehackernews.com/2024/06/chinese-hackers-deploy-spicerat-and.html
Chinese-speaking SneakyChef hackers are targeting government entities worldwide and AI-focused organizations with sophisticated SugarGh0st and SpiceRAT malware.
Get the latest insights β https://thehackernews.com/2024/06/chinese-hackers-deploy-spicerat-and.html
π14π₯5π€―5π€3
Discover the power of SOC Automation Capability Matrix for cybersecurity incident response and workflow automation. Perfect for enhancing your security operations.
Read: https://thehackernews.com/2024/02/how-to-use-tiness-soc-automation.html
Read: https://thehackernews.com/2024/02/how-to-use-tiness-soc-automation.html
π18π€5π±1
U.S. Treasury sanctions 12 Kaspersky executives following Commerce Department's ban on Kaspersky software in the U.S. The company and CEO remain unaffected.
Learn more: https://thehackernews.com/2024/06/us-treasury-sanctions-12-kaspersky.html
Learn more: https://thehackernews.com/2024/06/us-treasury-sanctions-12-kaspersky.html
π18π€11π€―6π4π±4π2
π¨ Beware: A new adware, AdsExhaust, is targeting Meta Quest app seekers with malicious downloads, manipulating browsers, and generating unauthorized revenue through sophisticated techniques.
Read: https://thehackernews.com/2024/06/warning-new-adware-campaign-targets.html
Read: https://thehackernews.com/2024/06/warning-new-adware-campaign-targets.html
π₯10π5π±4
New cybercrime gang ExCobalt targets Russian organizations with sophisticated GoRed backdoor.
Explore their tactics: https://thehackernews.com/2024/06/excobalt-cyber-gang-targets-russian.html
Explore their tactics: https://thehackernews.com/2024/06/excobalt-cyber-gang-targets-russian.html
π18π11π€6π5π±4π€―1
Cyber espionage groups are using Rafel RAT, an open-source Android tool, disguised as popular apps like Instagram, WhatsApp, and more. This malware conducts data theft and device manipulation.
Read: https://thehackernews.com/2024/06/iranian-hackers-deploy-rafel-rat-in.html
Read: https://thehackernews.com/2024/06/iranian-hackers-deploy-rafel-rat-in.html
π18π±11π€―6
π RedJuliett, a suspected China-linked cyber group, target Taiwan and other countries in extensive cyber espionage campaign, exploiting vulnerabilities in internet-facing devices for intelligence gathering.
Read: https://thehackernews.com/2024/06/redjuliett-cyber-espionage-campaign.html
Read: https://thehackernews.com/2024/06/redjuliett-cyber-espionage-campaign.html
π€11π€―8π3π±2
Join Luke Jennings, VP R&D at Push Security, to explore the impact of the ongoing Snowflake incident and the practical steps that organizations can take to investigate and respond effectively, avoiding some of the common pitfalls relating to how identities are configured in Snowflake
Register for the webinar here: https://go.thn.li/snowflake-webinar-tel
Register for the webinar here: https://go.thn.li/snowflake-webinar-tel
π10π±8
π¨ Critical security flaw (CVE-2024-37032) discovered in Ollama, an open-source AI platform, could lead to remote code execution.
Learn more: https://thehackernews.com/2024/06/critical-rce-vulnerability-discovered.html
Over 1,000 exposed instances found. Patch available in v0.1.34.
Learn more: https://thehackernews.com/2024/06/critical-rce-vulnerability-discovered.html
Over 1,000 exposed instances found. Patch available in v0.1.34.
β‘17π€6π3
Google Project Zero introduces 'Naptime,' an LLM-powered framework for vulnerability research. It boosts LLMs' CyberSecEval 2 performance, using advanced tools to better identify and exploit software flaws.
Read: https://thehackernews.com/2024/06/google-introduces-project-naptime-for.html
Read: https://thehackernews.com/2024/06/google-introduces-project-naptime-for.html
π14π11π€6π₯2
Overwhelmed by cybersecurity threats?
Cybersixgillβs IQ Report Generator automates CTI reports in minutes, freeing your team for proactive defense measures.
Donβt miss outβsee how it works: https://thehackernews.com/2024/06/ease-burden-with-ai-driven-threat.html
Cybersixgillβs IQ Report Generator automates CTI reports in minutes, freeing your team for proactive defense measures.
Donβt miss outβsee how it works: https://thehackernews.com/2024/06/ease-burden-with-ai-driven-threat.html
π16π€6
π¨ Alert: Popular WordPress plugins backdoored to create rogue admin accounts. Users advised to inspect sites, remove suspicious admins, and update affected plugins.
Learn more: https://thehackernews.com/2024/06/multiple-wordpress-plugins-compromised.html
Learn more: https://thehackernews.com/2024/06/multiple-wordpress-plugins-compromised.html
π₯13π4π4
π‘οΈ Four Vietnamese nationals linked to the FIN9 cybercrime group indicted in the U.S., accused of causing over $71 million in losses through computer intrusions.
Learn how they pulled it off and what charges they face: https://thehackernews.com/2024/06/4-fin9-linked-vietnamese-hackers.html
Learn how they pulled it off and what charges they face: https://thehackernews.com/2024/06/4-fin9-linked-vietnamese-hackers.html
π€14π3π₯2
WikiLeaks founder Julian Assange freed after 5 years in U.K. prison. His 14-year legal battle ends with a plea deal.
Read details here: https://thehackernews.com/2024/06/wikileaks-julian-assange-released-from.html
Assange has left the U.K. and is en route to Australia.
Read details here: https://thehackernews.com/2024/06/wikileaks-julian-assange-released-from.html
Assange has left the U.K. and is en route to Australia.
π89π15π₯8β‘3π1
Researchers uncover a new attack technique called GrimResource, exploited in the wild, which uses specially crafted Microsoft Management Saved Console (MSC) files to achieve full code execution and evade security defenses.
Details: https://thehackernews.com/2024/06/new-attack-technique-exploits-microsoft.html
Details: https://thehackernews.com/2024/06/new-attack-technique-exploits-microsoft.html
π₯11π±6π3π2