🔒 Discover how browser security platforms help CISOs cut costs, boost efficiency, and enhance cybersecurity.
Read real-life success stories: https://thehackernews.com/2024/06/how-to-cut-costs-with-browser-security.html
Read real-life success stories: https://thehackernews.com/2024/06/how-to-cut-costs-with-browser-security.html
🤔8👍7
WARNING: Google blocks ads for websites using polyfill[.]io library due to a supply chain attack where the domain was acquired by a Chinese company and modified to redirect users to malicious sites.
Details: https://thehackernews.com/2024/06/over-110000-websites-affected-by.html
Details: https://thehackernews.com/2024/06/over-110000-websites-affected-by.html
😱18👍13😁4👏3
🚨 Alert: Discover how the updated Medusa Android banking trojan targets users in 7 countries, featuring new stealth capabilities and expanded reach.
Read: https://thehackernews.com/2024/06/new-medusa-android-trojan-targets.html
Read: https://thehackernews.com/2024/06/new-medusa-android-trojan-targets.html
👍11🔥6
🕵️♀️ 💳 A new credit card web skimmer called "Caesar Cipher Skimmer" is targeting multiple CMS platforms including WordPress, Magento, and OpenCart to steal financial and payment information.
Details: https://thehackernews.com/2024/06/new-credit-card-skimmer-targets.html
Details: https://thehackernews.com/2024/06/new-credit-card-skimmer-targets.html
🔥11👍9😁1
Apple releases firmware security update for AirPods and Beats devices, addressing a critical Bluetooth vulnerability that could allow unauthorized access and eavesdropping.
Learn more about CVE-2024-27867: https://thehackernews.com/2024/06/apple-patches-airpods-bluetooth.html
Learn more about CVE-2024-27867: https://thehackernews.com/2024/06/apple-patches-airpods-bluetooth.html
🔥11🤔4🤯4⚡2👍1
Explore key strategies to secure software supply chains effectively amidst rising cyber threats. Learn about SBOMs, SLSA, and DevSecOps best practices.
Learn more: https://thehackernews.com/2024/06/practical-guidance-for-securing-your.html
Learn more: https://thehackernews.com/2024/06/practical-guidance-for-securing-your.html
🔥7🤔4👍2
🌍 State-sponsored cyber groups from China and North Korea have been linked to ransomware attacks on global governments and critical infrastructure.
Learn more about the tactics used ➡️ https://thehackernews.com/2024/06/chinese-and-n-korean-hackers-target.html
Learn more about the tactics used ➡️ https://thehackernews.com/2024/06/chinese-and-n-korean-hackers-target.html
😁11👍6👏4🤔3🤯1
🚨 Critical security flaw discovered in Progress Software's MOVEit Transfer.
CVE-2024-5806 allows authentication bypass and is already being exploited. Update now to protect your systems.
Read details: https://thehackernews.com/2024/06/new-moveit-transfer-vulnerability-under.html
CVE-2024-5806 allows authentication bypass and is already being exploited. Update now to protect your systems.
Read details: https://thehackernews.com/2024/06/new-moveit-transfer-vulnerability-under.html
😁13👍9🤯1
🚨 Critical security flaw found in Fortra FileCatalyst Workflow. CVE-2024-5276 scores 9.8 on CVSS. Patch now to protect your data from SQL injection attacks.
Details here ➡️ https://thehackernews.com/2024/06/critical-sqli-vulnerability-found-in.html
Details here ➡️ https://thehackernews.com/2024/06/critical-sqli-vulnerability-found-in.html
👍10
A 22-year-old Russian national has been indicted in the U.S. for cyberattacks against Ukraine and its allies just before Russia's invasion in 2022.
US offers $10M reward. Read more: https://thehackernews.com/2024/06/russian-national-indicted-for-cyber.html
US offers $10M reward. Read more: https://thehackernews.com/2024/06/russian-national-indicted-for-cyber.html
👍21🔥8😁8🤯1
⚠️ Attention developers — A new high-severity prompt injection flaw (CVE-2024-5565) in Vanna AI library exposes databases to remote code execution.
Find out how this flaw could impact your projects: https://thehackernews.com/2024/06/prompt-injection-flaw-in-vanna-ai.html
Find out how this flaw could impact your projects: https://thehackernews.com/2024/06/prompt-injection-flaw-in-vanna-ai.html
👍14
Discover the power of Python in blockchain development with AlgoKit!
Explore how you can build decentralized applications securely and efficiently.
Learn about setup, benefits, and getting started with dApps: https://thehackernews.com/2024/06/how-to-use-python-to-build-secure.html
Explore how you can build decentralized applications securely and efficiently.
Learn about setup, benefits, and getting started with dApps: https://thehackernews.com/2024/06/how-to-use-python-to-build-secure.html
👍17🔥4
Ensuring data security remains crucial, which is why GigaOm recently released a new DSPM report highlighting industry leaders.
Sentra has emerged as a leader and rapid innovator, receiving high scores for its data mapping, access intelligence, and on-premises capabilities.
View the full report here 👇
https://thn.news/data-security-posture
Sentra has emerged as a leader and rapid innovator, receiving high scores for its data mapping, access intelligence, and on-premises capabilities.
View the full report here 👇
https://thn.news/data-security-posture
www.sentra.io
GigaOm Radar for Data Security Posture Management (DSPM) 2025 | Sentra
Sentra is proud to be recognized on the GigaOm Radar for Data Security Posture Management (DSPM) for the second year in a row.
👍16🔥6😱1
🚨 Alert: Rust-based worm P2PInfect botnet has evolved to target misconfigured Redis servers with ransomware and cryptocurrency miners, showcasing new financial motivations and advanced evasion techniques.
Learn more: https://thehackernews.com/2024/06/rust-based-p2pinfect-botnet-evolves.html
Learn more: https://thehackernews.com/2024/06/rust-based-p2pinfect-botnet-evolves.html
👍14🔥12⚡3😱3
Alert: TeamViewer detected an irregularity in its internal corporate IT environment. Investigations are ongoing to identify the attackers and the method of intrusion.
Learn more: https://thehackernews.com/2024/06/teamviewer-detects-security-breach-in.html
Learn more: https://thehackernews.com/2024/06/teamviewer-detects-security-breach-in.html
🤯19👍12😁7🔥2
Multiple critical vulnerabilities have been identified in Emerson Rosemount gas chromatographs that could be exploited to execute arbitrary commands, bypass authentication, and cause DoS conditions.
Read: https://thehackernews.com/2024/06/researchers-warn-of-flaws-in-widely.html
Read: https://thehackernews.com/2024/06/researchers-warn-of-flaws-in-widely.html
🔥8👍7⚡1
🕵️♂️ Researchers unveil SnailLoad — a new side-channel attack exploiting network latency spy on users' web activity remotely, achieving up to 98% for video content and 63% for website visits.
Read: https://thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
Read: https://thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
👍18🤯2😱2
From PowerShell scripts to mimicking legitimate apps, discover how the 8220 Gang exploits Oracle WebLogic Server vulnerabilities using fileless techniques for cryptocurrency mining.
Read: https://thehackernews.com/2024/06/8220-gang-exploits-oracle-weblogic.html
Read: https://thehackernews.com/2024/06/8220-gang-exploits-oracle-weblogic.html
👍13😱3
Don't let your #SaaS become a trojan horse!
Threat actors exploit misconfigured settings, dormant machine IDs, unauthorized access to breach networks. Extend Zero Trust to SaaS with posture management to lock it down.
Learn more: https://thehackernews.com/2024/06/combatting-evolving-saas-kill-chain-how.html
Threat actors exploit misconfigured settings, dormant machine IDs, unauthorized access to breach networks. Extend Zero Trust to SaaS with posture management to lock it down.
Learn more: https://thehackernews.com/2024/06/combatting-evolving-saas-kill-chain-how.html
👍15
GitLab releases security updates fixing 14 vulnerabilities, including critical CI/CD flaw CVE-2024-5655. Update now to ensure protection.
Read: https://thehackernews.com/2024/06/gitlab-releases-patch-for-critical-cicd.html
Read: https://thehackernews.com/2024/06/gitlab-releases-patch-for-critical-cicd.html
👍16😁6