Ensuring data security remains crucial, which is why GigaOm recently released a new DSPM report highlighting industry leaders.
Sentra has emerged as a leader and rapid innovator, receiving high scores for its data mapping, access intelligence, and on-premises capabilities.
View the full report here π
https://thn.news/data-security-posture
Sentra has emerged as a leader and rapid innovator, receiving high scores for its data mapping, access intelligence, and on-premises capabilities.
View the full report here π
https://thn.news/data-security-posture
www.sentra.io
GigaOm Radar for Data Security Posture Management (DSPM) 2025 | Sentra
Sentra is proud to be recognized on the GigaOm Radar for Data Security Posture Management (DSPM) for the second year in a row.
π16π₯6π±1
π¨ Alert: Rust-based worm P2PInfect botnet has evolved to target misconfigured Redis servers with ransomware and cryptocurrency miners, showcasing new financial motivations and advanced evasion techniques.
Learn more: https://thehackernews.com/2024/06/rust-based-p2pinfect-botnet-evolves.html
Learn more: https://thehackernews.com/2024/06/rust-based-p2pinfect-botnet-evolves.html
π14π₯12β‘3π±3
Alert: TeamViewer detected an irregularity in its internal corporate IT environment. Investigations are ongoing to identify the attackers and the method of intrusion.
Learn more: https://thehackernews.com/2024/06/teamviewer-detects-security-breach-in.html
Learn more: https://thehackernews.com/2024/06/teamviewer-detects-security-breach-in.html
π€―19π12π7π₯2
Multiple critical vulnerabilities have been identified in Emerson Rosemount gas chromatographs that could be exploited to execute arbitrary commands, bypass authentication, and cause DoS conditions.
Read: https://thehackernews.com/2024/06/researchers-warn-of-flaws-in-widely.html
Read: https://thehackernews.com/2024/06/researchers-warn-of-flaws-in-widely.html
π₯8π7β‘1
π΅οΈββοΈ Researchers unveil SnailLoad β a new side-channel attack exploiting network latency spy on users' web activity remotely, achieving up to 98% for video content and 63% for website visits.
Read: https://thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
Read: https://thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
π18π€―2π±2
From PowerShell scripts to mimicking legitimate apps, discover how the 8220 Gang exploits Oracle WebLogic Server vulnerabilities using fileless techniques for cryptocurrency mining.
Read: https://thehackernews.com/2024/06/8220-gang-exploits-oracle-weblogic.html
Read: https://thehackernews.com/2024/06/8220-gang-exploits-oracle-weblogic.html
π13π±3
Don't let your #SaaS become a trojan horse!
Threat actors exploit misconfigured settings, dormant machine IDs, unauthorized access to breach networks. Extend Zero Trust to SaaS with posture management to lock it down.
Learn more: https://thehackernews.com/2024/06/combatting-evolving-saas-kill-chain-how.html
Threat actors exploit misconfigured settings, dormant machine IDs, unauthorized access to breach networks. Extend Zero Trust to SaaS with posture management to lock it down.
Learn more: https://thehackernews.com/2024/06/combatting-evolving-saas-kill-chain-how.html
π15
GitLab releases security updates fixing 14 vulnerabilities, including critical CI/CD flaw CVE-2024-5655. Update now to ensure protection.
Read: https://thehackernews.com/2024/06/gitlab-releases-patch-for-critical-cicd.html
Read: https://thehackernews.com/2024/06/gitlab-releases-patch-for-critical-cicd.html
π16π6
π¨ Just when you thought your biggest online worry was autocorrect... Think again!
North Korean Kimsuky group is using a new malicious Chrome extension, TRANSLATEXT, to steal sensitive info from South Korean academia.
Details here: https://thehackernews.com/2024/06/kimsuky-using-translatext-chrome.html
North Korean Kimsuky group is using a new malicious Chrome extension, TRANSLATEXT, to steal sensitive info from South Korean academia.
Details here: https://thehackernews.com/2024/06/kimsuky-using-translatext-chrome.html
π15π10π€―4
β οΈ Attention website operators! Starting Nov 1, 2024, Google Chrome will block sites using Entrust certificates due to security issues.
Read: https://thehackernews.com/2024/06/google-to-block-entrust-certificates-in.html
Don't get caught off guardβswitch to a trusted CA before it's too late.
Read: https://thehackernews.com/2024/06/google-to-block-entrust-certificates-in.html
Don't get caught off guardβswitch to a trusted CA before it's too late.
π40π±7π€6π4π4π₯3
π¨ Critical Alert for Network Admins!
Juniper Networks just dropped an urgent security patch.
β CVE-2024-2973: Authentication bypass flaw
β CVSS score: 10.0
β Affects Session Smart Router & Conductor in HA configs
Read: https://thehackernews.com/2024/07/juniper-networks-releases-critical.html
Juniper Networks just dropped an urgent security patch.
β CVE-2024-2973: Authentication bypass flaw
β CVSS score: 10.0
β Affects Session Smart Router & Conductor in HA configs
Read: https://thehackernews.com/2024/07/juniper-networks-releases-critical.html
π₯16π5π2π±1
π¨ A critical OpenSSH flaw (CVE-2024-6387) allows unauthenticated remote code execution on glibc-based Linux systems. 14 million servers at risk.
https://thehackernews.com/2024/07/new-openssh-vulnerability-could-lead-to.html
Apply the latest patches now!
https://thehackernews.com/2024/07/new-openssh-vulnerability-could-lead-to.html
Apply the latest patches now!
π±31π₯10π8β‘3π€―3π1
π ALERT: Software from Conceptworld trojanized to spread info-stealing malware!
If you downloaded Notezilla, RecentX, or Copywhiz in June, check your systems NOW!
Details here: https://thehackernews.com/2024/07/indian-software-firms-products-hacked.html
If you downloaded Notezilla, RecentX, or Copywhiz in June, check your systems NOW!
Details here: https://thehackernews.com/2024/07/indian-software-firms-products-hacked.html
π₯11π4
Explore end-to-end secrets security strategies to protect machine identities, prevent breaches, and empower developers with secure credential management practices.
Read: https://thehackernews.com/2024/07/end-to-end-secrets-security-making-plan.html
Read: https://thehackernews.com/2024/07/end-to-end-secrets-security-making-plan.html
π10π₯7
Transparent Tribe launches a new Android malware campaign, targeting mobile users with CapraRAT spyware disguised as popular apps.
Read: https://thehackernews.com/2024/07/caprarat-spyware-disguised-as-popular.html
Read: https://thehackernews.com/2024/07/caprarat-spyware-disguised-as-popular.html
π₯9π6β‘4π±3
π iOS & macOS devs, heads up!
Discover how 3 new vulnerabilities in CocoaPods, a popular Apple developer tool, could lead to supply chain attacks on iOS & macOS apps.
Details here: https://thehackernews.com/2024/07/critical-flaws-in-cocoapods-expose-ios.html
Ensure your dependencies are up-to-date.
Discover how 3 new vulnerabilities in CocoaPods, a popular Apple developer tool, could lead to supply chain attacks on iOS & macOS apps.
Details here: https://thehackernews.com/2024/07/critical-flaws-in-cocoapods-expose-ios.html
Ensure your dependencies are up-to-date.
π10π9π₯3π2
β οΈ Think twice before connecting to "free" Wi-Fi...
A 42-year-old Australian man charged for running fake Wi-Fi hotspots on π« flights to steal personal data of passengers.
Learn more: https://thehackernews.com/2024/07/australian-man-charged-for-fake-wi-fi.html
A 42-year-old Australian man charged for running fake Wi-Fi hotspots on π« flights to steal personal data of passengers.
Learn more: https://thehackernews.com/2024/07/australian-man-charged-for-fake-wi-fi.html
π23π16π€―15β‘3π₯1
Heads up! China-linked hackers are exploiting a zero-day vulnerability in Cisco NX-OS to execute commands as root, undetected, and deliver malware.
Read details: https://thehackernews.com/2024/07/chinese-hackers-exploiting-cisco.html
Read details: https://thehackernews.com/2024/07/chinese-hackers-exploiting-cisco.html
π19β‘9π9π€―1
π Meta's ad-free option in the E.U. hits another roadblock! Regulators say "pay or consent" model breaches competition rules.
But is offering choices really a breach? Whatβs your take?
Read: https://thehackernews.com/2024/07/metas-pay-or-consent-approach-faces-eu.html
But is offering choices really a breach? Whatβs your take?
Read: https://thehackernews.com/2024/07/metas-pay-or-consent-approach-faces-eu.html
π18π6π3β‘2
π¨ New CPU vulnerability alert!
Intel's Raptor Lake & Alder Lake CPUs at risk from "Indirector" side-channel attack.
Read: https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html
Could leak sensitive data.
Intel's Raptor Lake & Alder Lake CPUs at risk from "Indirector" side-channel attack.
Read: https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html
Could leak sensitive data.
π±17π₯9π6π4β‘2π€1