Heads up! China-linked hackers are exploiting a zero-day vulnerability in Cisco NX-OS to execute commands as root, undetected, and deliver malware.
Read details: https://thehackernews.com/2024/07/chinese-hackers-exploiting-cisco.html
Read details: https://thehackernews.com/2024/07/chinese-hackers-exploiting-cisco.html
π19β‘9π9π€―1
π Meta's ad-free option in the E.U. hits another roadblock! Regulators say "pay or consent" model breaches competition rules.
But is offering choices really a breach? Whatβs your take?
Read: https://thehackernews.com/2024/07/metas-pay-or-consent-approach-faces-eu.html
But is offering choices really a breach? Whatβs your take?
Read: https://thehackernews.com/2024/07/metas-pay-or-consent-approach-faces-eu.html
π18π6π3β‘2
π¨ New CPU vulnerability alert!
Intel's Raptor Lake & Alder Lake CPUs at risk from "Indirector" side-channel attack.
Read: https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html
Could leak sensitive data.
Intel's Raptor Lake & Alder Lake CPUs at risk from "Indirector" side-channel attack.
Read: https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html
Could leak sensitive data.
π±17π₯9π6π4β‘2π€1
π Average ransomware payment hits $2M, up 500%! Time to ditch outdated MFA and secure your organization with next-gen MFA to defend against sophisticated attacks.
Learn more: https://thehackernews.com/2024/07/how-mfa-failures-are-fueling-500-surge.html
Learn more: https://thehackernews.com/2024/07/how-mfa-failures-are-fueling-500-surge.html
π€―16π10π3π±3π₯1π1
IDC Spotlight: Creating a Cohesive Disaster and Cyber Recovery Strategy. Discover why IDC recommends an integrated approach for Cyber Recovery in 2024/2025.
Read: https://thn.news/cohesive-recovery-strategy
Read: https://thn.news/cohesive-recovery-strategy
Hpe
HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
π17π₯8
β οΈ Alert - A South Korean ERP vendor's update server was hacked to deliver a Go-based backdoor dubbed Xctdoor, stealing sensitive business info with keystrokes and screenshots.
Learn more: https://thehackernews.com/2024/07/south-korean-erp-vendors-server-hacked.html
Learn more: https://thehackernews.com/2024/07/south-korean-erp-vendors-server-hacked.html
π₯17π3β‘2
Israeli entities are under attack by hackers using public frameworks like Donut and Sliver. The campaign, dubbed "Supposed Grasshopper," is using custom WordPress sites for payload delivery.
Learn more: https://thehackernews.com/2024/07/israeli-entities-targeted-by.html
Learn more: https://thehackernews.com/2024/07/israeli-entities-targeted-by.html
π₯27π14π9π8π±5β‘4
Think that job offer is too good to be true? You might be right!
Hackers use fake job descriptions to exploit an MSHTML flaw and deploy MerkSpy spyware, targeting Canada, India, Poland, and the US.
Read: https://thehackernews.com/2024/07/microsoft-mshtml-flaw-exploited-to.html
Hackers use fake job descriptions to exploit an MSHTML flaw and deploy MerkSpy spyware, targeting Canada, India, Poland, and the US.
Read: https://thehackernews.com/2024/07/microsoft-mshtml-flaw-exploited-to.html
π20π4π€3π2β‘1π₯1
Open-Source Intelligence + AI = Game Changer!
AI-powered tools are now handling massive data volumes, real-time analysis, and multilingual content.
Ready to level up your OSINT game?
Learn more: https://thehackernews.com/2024/07/the-emerging-role-of-ai-in-open-source.html
AI-powered tools are now handling massive data volumes, real-time analysis, and multilingual content.
Ready to level up your OSINT game?
Learn more: https://thehackernews.com/2024/07/the-emerging-role-of-ai-in-open-source.html
π₯24π9π€6β‘1π1
Twilio reports a data breach exposing 33 million Authy phone numbers, urges users to update apps and stay vigilant against phishing.
Details here > https://thehackernews.com/2024/07/twilios-authy-app-breach-exposes.html
Details here > https://thehackernews.com/2024/07/twilios-authy-app-breach-exposes.html
π±22π9π₯5π5β‘1π€1
Global police operation disrupts cybercrime networks, shuts down 600 servers linked to Cobalt Strike cyberattacks, and arrests 54 for elderly fraud schemes.
Learn more: https://thehackernews.com/2024/07/global-police-operation-shuts-down-600.html
Learn more: https://thehackernews.com/2024/07/global-police-operation-shuts-down-600.html
π₯23π14π5π3β‘1
β οΈ Attention IT Pros!
#Microsoft reveals critical vulnerabilities in Rockwell Automation PanelView Plus. Unauthenticated attackers could exploit these to execute code remotely or trigger DoS attacks.
Read: https://thehackernews.com/2024/07/microsoft-uncovers-critical-flaws-in.html
#Microsoft reveals critical vulnerabilities in Rockwell Automation PanelView Plus. Unauthenticated attackers could exploit these to execute code remotely or trigger DoS attacks.
Read: https://thehackernews.com/2024/07/microsoft-uncovers-critical-flaws-in.html
π₯11π10β‘6π2π€2π1
Discover the advanced Zergeca botnet capable of powerful DDoS attacks, proxying, scanning, and more, targeting major countries and using stealthy communication methods.
Read: https://thehackernews.com/2024/07/new-golang-based-zergeca-botnet-capable.html
Read: https://thehackernews.com/2024/07/new-golang-based-zergeca-botnet-capable.html
π₯16β‘9π8π€2
Did you know? Polyfill supply chain attack impacts 380,000+ hosts, affecting major brands like WarnerBros, Hulu, and Mercedes-Benz. The Hetzner network is hit hardest, redirecting users to adult and gambling sites.
Learn more: https://thehackernews.com/2024/07/polyfillio-attack-impacts-over-380000.html
Learn more: https://thehackernews.com/2024/07/polyfillio-attack-impacts-over-380000.html
π9π±9π6β‘4π₯1
π¨ GootLoader malware evolves with new versions, using SEO poisoning and disguised payloads to compromise systems.
Learn about its latest threats and tactics: https://thehackernews.com/2024/07/gootloader-malware-delivers-new.html
Learn about its latest threats and tactics: https://thehackernews.com/2024/07/gootloader-malware-delivers-new.html
π10β‘4π1π€1
π‘οΈ Webinar Alert: Critical ITDR Capabilities Every Professional Must Know.
Join us to learn about the key features that ensure robust identity protection. Get real-life scenarios and actionable tips.
Register now: https://thehacker.news/securing-digital-identity
Don't miss this exclusive webinar.
Join us to learn about the key features that ensure robust identity protection. Get real-life scenarios and actionable tips.
Register now: https://thehacker.news/securing-digital-identity
Don't miss this exclusive webinar.
thehacker.news
Secure Your Digital Identity: Top 5 Criteria for ITDR Solutions
Discover the key capabilities of ITDR solutions in our upcoming webinar.
π13π11β‘3
Learn about Continuous Threat Exposure Management (CTEM) and how it enhances cybersecurity by improving visibility, vulnerability management, and validation.
Learn more: https://thehackernews.com/2024/07/blueprint-for-success-implementing-ctem.html
Learn more: https://thehackernews.com/2024/07/blueprint-for-success-implementing-ctem.html
π12π₯10β‘4
β οΈ A recent DDoS attack reached a staggering 840 million packets per second, according to OVHcloud.
MikroTik routers played a significant role, with many compromised devices amplifying the attack.
Read: https://thehackernews.com/2024/07/ovhcloud-hit-with-record-840-million.html
MikroTik routers played a significant role, with many compromised devices amplifying the attack.
Read: https://thehackernews.com/2024/07/ovhcloud-hit-with-record-840-million.html
π€―45π±13π11β‘8π5π₯2
Apple removes 25 VPN apps, incl. ProtonVPN, Red Shield, NordVPN, & Le VPN, from Russian App Store following government request, sparking concerns over digital freedom and escalating censorship.
Read details: https://thehackernews.com/2024/07/apple-removes-vpn-apps-from-russian-app.html
Read details: https://thehackernews.com/2024/07/apple-removes-vpn-apps-from-russian-app.html
π€―52π±22π8π6π€5π₯4β‘3π3
Four unpatched Gogs Git flaws (CVE-2024-39930 to 39933) let attackers breach instances, steal/modify code, or plant backdoors.
Read more: https://thehackernews.com/2024/07/critical-vulnerabilities-disclosed-in.html
~7,300 exposed instances; 60% in China. Users urged to disable SSH and registration.
Read more: https://thehackernews.com/2024/07/critical-vulnerabilities-disclosed-in.html
~7,300 exposed instances; 60% in China. Users urged to disable SSH and registration.
β‘15π₯8π7π€―2π€1