β οΈ Attention IT Pros!
#Microsoft reveals critical vulnerabilities in Rockwell Automation PanelView Plus. Unauthenticated attackers could exploit these to execute code remotely or trigger DoS attacks.
Read: https://thehackernews.com/2024/07/microsoft-uncovers-critical-flaws-in.html
#Microsoft reveals critical vulnerabilities in Rockwell Automation PanelView Plus. Unauthenticated attackers could exploit these to execute code remotely or trigger DoS attacks.
Read: https://thehackernews.com/2024/07/microsoft-uncovers-critical-flaws-in.html
π₯11π10β‘6π2π€2π1
Discover the advanced Zergeca botnet capable of powerful DDoS attacks, proxying, scanning, and more, targeting major countries and using stealthy communication methods.
Read: https://thehackernews.com/2024/07/new-golang-based-zergeca-botnet-capable.html
Read: https://thehackernews.com/2024/07/new-golang-based-zergeca-botnet-capable.html
π₯16β‘9π8π€2
Did you know? Polyfill supply chain attack impacts 380,000+ hosts, affecting major brands like WarnerBros, Hulu, and Mercedes-Benz. The Hetzner network is hit hardest, redirecting users to adult and gambling sites.
Learn more: https://thehackernews.com/2024/07/polyfillio-attack-impacts-over-380000.html
Learn more: https://thehackernews.com/2024/07/polyfillio-attack-impacts-over-380000.html
π9π±9π6β‘4π₯1
π¨ GootLoader malware evolves with new versions, using SEO poisoning and disguised payloads to compromise systems.
Learn about its latest threats and tactics: https://thehackernews.com/2024/07/gootloader-malware-delivers-new.html
Learn about its latest threats and tactics: https://thehackernews.com/2024/07/gootloader-malware-delivers-new.html
π10β‘4π1π€1
π‘οΈ Webinar Alert: Critical ITDR Capabilities Every Professional Must Know.
Join us to learn about the key features that ensure robust identity protection. Get real-life scenarios and actionable tips.
Register now: https://thehacker.news/securing-digital-identity
Don't miss this exclusive webinar.
Join us to learn about the key features that ensure robust identity protection. Get real-life scenarios and actionable tips.
Register now: https://thehacker.news/securing-digital-identity
Don't miss this exclusive webinar.
thehacker.news
Secure Your Digital Identity: Top 5 Criteria for ITDR Solutions
Discover the key capabilities of ITDR solutions in our upcoming webinar.
π13π11β‘3
Learn about Continuous Threat Exposure Management (CTEM) and how it enhances cybersecurity by improving visibility, vulnerability management, and validation.
Learn more: https://thehackernews.com/2024/07/blueprint-for-success-implementing-ctem.html
Learn more: https://thehackernews.com/2024/07/blueprint-for-success-implementing-ctem.html
π12π₯10β‘4
β οΈ A recent DDoS attack reached a staggering 840 million packets per second, according to OVHcloud.
MikroTik routers played a significant role, with many compromised devices amplifying the attack.
Read: https://thehackernews.com/2024/07/ovhcloud-hit-with-record-840-million.html
MikroTik routers played a significant role, with many compromised devices amplifying the attack.
Read: https://thehackernews.com/2024/07/ovhcloud-hit-with-record-840-million.html
π€―45π±13π11β‘8π5π₯2
Apple removes 25 VPN apps, incl. ProtonVPN, Red Shield, NordVPN, & Le VPN, from Russian App Store following government request, sparking concerns over digital freedom and escalating censorship.
Read details: https://thehackernews.com/2024/07/apple-removes-vpn-apps-from-russian-app.html
Read details: https://thehackernews.com/2024/07/apple-removes-vpn-apps-from-russian-app.html
π€―52π±22π8π6π€5π₯4β‘3π3
Four unpatched Gogs Git flaws (CVE-2024-39930 to 39933) let attackers breach instances, steal/modify code, or plant backdoors.
Read more: https://thehackernews.com/2024/07/critical-vulnerabilities-disclosed-in.html
~7,300 exposed instances; 60% in China. Users urged to disable SSH and registration.
Read more: https://thehackernews.com/2024/07/critical-vulnerabilities-disclosed-in.html
~7,300 exposed instances; 60% in China. Users urged to disable SSH and registration.
β‘15π₯8π7π€―2π€1
Experts report a surge in Mekotio trojan attacks in Latin America. It installs via MSI files and AHK scripts, stealing banking information through fake pop-ups, keystroke logging, and screenshots.
Learn more: https://thehackernews.com/2024/07/experts-warn-of-mekotio-banking-trojan.html
Learn more: https://thehackernews.com/2024/07/experts-warn-of-mekotio-banking-trojan.html
π₯6π±6π3
Cybersecurity Disconnect β Only 5% of CISOs report to CEOs; 2/3 are 2 levels down.
Learn key strategies for CISOs to bridge the communication gap with boards, justify cybersecurity budgets, and report risks effectively.
Read: https://thehackernews.com/2024/07/5-key-questions-cisos-must-ask.html
Learn key strategies for CISOs to bridge the communication gap with boards, justify cybersecurity budgets, and report risks effectively.
Read: https://thehackernews.com/2024/07/5-key-questions-cisos-must-ask.html
π12π€―3
Eldorado, a new ransomware-as-a-service (RaaS), targets Windows and Linux systems using Golang, Chacha20, and RSA-OAEP for encryption.
Learn about its capabilities, victims, and the growing ransomware landscape: https://thehackernews.com/2024/07/new-ransomware-as-service-eldorado.html
Learn about its capabilities, victims, and the growing ransomware landscape: https://thehackernews.com/2024/07/new-ransomware-as-service-eldorado.html
π₯12π7π€―1
π¨ Analysis of malware logs on the dark web uncovered 3,300+ users child abuse material consumers. Notably, 4.2% had multiple credentials, indicating persistent offenders.
Read: https://thehackernews.com/2024/07/dark-web-malware-logs-expose-3300-users.html
Read: https://thehackernews.com/2024/07/dark-web-malware-logs-expose-3300-users.html
π€―11π€8π3
New APT group CloudSorcerer targets Russian govt entities using #Microsoft Graph, Yandex Cloud, & Dropbox for C2, with GitHub as an initial C2 server, adapting its behavior dynamically based on host processes like mspaint.exe.
Learn more: https://thehackernews.com/2024/07/new-apt-group-cloudsorcerer-targets.html
Learn more: https://thehackernews.com/2024/07/new-apt-group-cloudsorcerer-targets.html
π₯15π8π4π€4π€―4π2
Unknown threat actors are spreading trojanized jQuery via npm, GitHub, and jsDelivr in a complex supply chain attack.
Malware hides in the seldom-used 'end' function of jQuery, used by 'fadeTo'.
Learn more: https://thehackernews.com/2024/07/trojanized-jquery-packages-found-on-npm.html
Malware hides in the seldom-used 'end' function of jQuery, used by 'fadeTo'.
Learn more: https://thehackernews.com/2024/07/trojanized-jquery-packages-found-on-npm.html
π€12π€―7π4
π Global cybersecurity agencies warn about China-linked APT40's rapid exploit adaptation, targeting vulnerabilities in widely-used software across multiple countries.
Learn more: https://thehackernews.com/2024/07/cybersecurity-agencies-warn-of-china.html
Learn more: https://thehackernews.com/2024/07/cybersecurity-agencies-warn-of-china.html
π10π6β‘4π₯1
π¨ Ongoing GuardZoo surveillance targets Middle East military via Android malware. Initiated Oct '19 by Houthi-aligned group, over 450 victims in Yemen, Egypt, Oman, Qatar, Saudi Arabia, Turkey, UAE.
Learn more: https://thehackernews.com/2024/07/guardzoo-malware-targets-over-450.html
Learn more: https://thehackernews.com/2024/07/guardzoo-malware-targets-over-450.html
π13π₯12π±4π1
Researchers reveal Jenkins Script Console vulnerability exploited for crypto mining. Learn about the risks and how to protect your CI/CD infrastructure.
Learn more: https://thehackernews.com/2024/07/hackers-exploiting-jenkins-script.html
Learn more: https://thehackernews.com/2024/07/hackers-exploiting-jenkins-script.html
π₯10π7
β οΈ New BlastRADIUS flaw in RADIUS protocol allows MitM attacks, bypassing integrity checks.
Attackers can modify Access-Request packets undetected, forcing user auth.
https://thehackernews.com/2024/07/radius-protocol-vulnerability-exposes.html
ISPs & orgs must update RADIUS servers, use TLS/IPSec, and avoid PAP/CHAP methods.
Attackers can modify Access-Request packets undetected, forcing user auth.
https://thehackernews.com/2024/07/radius-protocol-vulnerability-exposes.html
ISPs & orgs must update RADIUS servers, use TLS/IPSec, and avoid PAP/CHAP methods.
π€―13π6π₯6β‘1π1
π οΈ Discover the security and privacy risks of leading customer service chatbots with the new Exposure Rating toolβan advanced risk assessment for your website!
Learn more: https://thehackernews.com/expert-insights/2024/07/9-customer-service-chatbots-ranked-for.html
Learn more: https://thehackernews.com/expert-insights/2024/07/9-customer-service-chatbots-ranked-for.html
π₯9π4π4β‘1