Learn about Continuous Threat Exposure Management (CTEM) and how it enhances cybersecurity by improving visibility, vulnerability management, and validation.
Learn more: https://thehackernews.com/2024/07/blueprint-for-success-implementing-ctem.html
Learn more: https://thehackernews.com/2024/07/blueprint-for-success-implementing-ctem.html
π12π₯10β‘4
β οΈ A recent DDoS attack reached a staggering 840 million packets per second, according to OVHcloud.
MikroTik routers played a significant role, with many compromised devices amplifying the attack.
Read: https://thehackernews.com/2024/07/ovhcloud-hit-with-record-840-million.html
MikroTik routers played a significant role, with many compromised devices amplifying the attack.
Read: https://thehackernews.com/2024/07/ovhcloud-hit-with-record-840-million.html
π€―45π±13π11β‘8π5π₯2
Apple removes 25 VPN apps, incl. ProtonVPN, Red Shield, NordVPN, & Le VPN, from Russian App Store following government request, sparking concerns over digital freedom and escalating censorship.
Read details: https://thehackernews.com/2024/07/apple-removes-vpn-apps-from-russian-app.html
Read details: https://thehackernews.com/2024/07/apple-removes-vpn-apps-from-russian-app.html
π€―52π±22π8π6π€5π₯4β‘3π3
Four unpatched Gogs Git flaws (CVE-2024-39930 to 39933) let attackers breach instances, steal/modify code, or plant backdoors.
Read more: https://thehackernews.com/2024/07/critical-vulnerabilities-disclosed-in.html
~7,300 exposed instances; 60% in China. Users urged to disable SSH and registration.
Read more: https://thehackernews.com/2024/07/critical-vulnerabilities-disclosed-in.html
~7,300 exposed instances; 60% in China. Users urged to disable SSH and registration.
β‘15π₯8π7π€―2π€1
Experts report a surge in Mekotio trojan attacks in Latin America. It installs via MSI files and AHK scripts, stealing banking information through fake pop-ups, keystroke logging, and screenshots.
Learn more: https://thehackernews.com/2024/07/experts-warn-of-mekotio-banking-trojan.html
Learn more: https://thehackernews.com/2024/07/experts-warn-of-mekotio-banking-trojan.html
π₯6π±6π3
Cybersecurity Disconnect β Only 5% of CISOs report to CEOs; 2/3 are 2 levels down.
Learn key strategies for CISOs to bridge the communication gap with boards, justify cybersecurity budgets, and report risks effectively.
Read: https://thehackernews.com/2024/07/5-key-questions-cisos-must-ask.html
Learn key strategies for CISOs to bridge the communication gap with boards, justify cybersecurity budgets, and report risks effectively.
Read: https://thehackernews.com/2024/07/5-key-questions-cisos-must-ask.html
π12π€―3
Eldorado, a new ransomware-as-a-service (RaaS), targets Windows and Linux systems using Golang, Chacha20, and RSA-OAEP for encryption.
Learn about its capabilities, victims, and the growing ransomware landscape: https://thehackernews.com/2024/07/new-ransomware-as-service-eldorado.html
Learn about its capabilities, victims, and the growing ransomware landscape: https://thehackernews.com/2024/07/new-ransomware-as-service-eldorado.html
π₯12π7π€―1
π¨ Analysis of malware logs on the dark web uncovered 3,300+ users child abuse material consumers. Notably, 4.2% had multiple credentials, indicating persistent offenders.
Read: https://thehackernews.com/2024/07/dark-web-malware-logs-expose-3300-users.html
Read: https://thehackernews.com/2024/07/dark-web-malware-logs-expose-3300-users.html
π€―11π€8π3
New APT group CloudSorcerer targets Russian govt entities using #Microsoft Graph, Yandex Cloud, & Dropbox for C2, with GitHub as an initial C2 server, adapting its behavior dynamically based on host processes like mspaint.exe.
Learn more: https://thehackernews.com/2024/07/new-apt-group-cloudsorcerer-targets.html
Learn more: https://thehackernews.com/2024/07/new-apt-group-cloudsorcerer-targets.html
π₯15π8π4π€4π€―4π2
Unknown threat actors are spreading trojanized jQuery via npm, GitHub, and jsDelivr in a complex supply chain attack.
Malware hides in the seldom-used 'end' function of jQuery, used by 'fadeTo'.
Learn more: https://thehackernews.com/2024/07/trojanized-jquery-packages-found-on-npm.html
Malware hides in the seldom-used 'end' function of jQuery, used by 'fadeTo'.
Learn more: https://thehackernews.com/2024/07/trojanized-jquery-packages-found-on-npm.html
π€12π€―7π4
π Global cybersecurity agencies warn about China-linked APT40's rapid exploit adaptation, targeting vulnerabilities in widely-used software across multiple countries.
Learn more: https://thehackernews.com/2024/07/cybersecurity-agencies-warn-of-china.html
Learn more: https://thehackernews.com/2024/07/cybersecurity-agencies-warn-of-china.html
π10π6β‘4π₯1
π¨ Ongoing GuardZoo surveillance targets Middle East military via Android malware. Initiated Oct '19 by Houthi-aligned group, over 450 victims in Yemen, Egypt, Oman, Qatar, Saudi Arabia, Turkey, UAE.
Learn more: https://thehackernews.com/2024/07/guardzoo-malware-targets-over-450.html
Learn more: https://thehackernews.com/2024/07/guardzoo-malware-targets-over-450.html
π13π₯12π±4π1
Researchers reveal Jenkins Script Console vulnerability exploited for crypto mining. Learn about the risks and how to protect your CI/CD infrastructure.
Learn more: https://thehackernews.com/2024/07/hackers-exploiting-jenkins-script.html
Learn more: https://thehackernews.com/2024/07/hackers-exploiting-jenkins-script.html
π₯10π7
β οΈ New BlastRADIUS flaw in RADIUS protocol allows MitM attacks, bypassing integrity checks.
Attackers can modify Access-Request packets undetected, forcing user auth.
https://thehackernews.com/2024/07/radius-protocol-vulnerability-exposes.html
ISPs & orgs must update RADIUS servers, use TLS/IPSec, and avoid PAP/CHAP methods.
Attackers can modify Access-Request packets undetected, forcing user auth.
https://thehackernews.com/2024/07/radius-protocol-vulnerability-exposes.html
ISPs & orgs must update RADIUS servers, use TLS/IPSec, and avoid PAP/CHAP methods.
π€―13π6π₯6β‘1π1
π οΈ Discover the security and privacy risks of leading customer service chatbots with the new Exposure Rating toolβan advanced risk assessment for your website!
Learn more: https://thehackernews.com/expert-insights/2024/07/9-customer-service-chatbots-ranked-for.html
Learn more: https://thehackernews.com/expert-insights/2024/07/9-customer-service-chatbots-ranked-for.html
π₯9π4π4β‘1
π¨ New OpenSSH vulnerability (CVE-2024-6409) found in RHEL 9's versions 8.7p1 & 8.8p1, allowing RCE via race condition in privsep child process.
Read: https://thehackernews.com/2024/07/new-openssh-vulnerability-discovered.html
β οΈ Active exploits detected! This bug is distinct from CVE-2024-6387 but shares similarities.
Read: https://thehackernews.com/2024/07/new-openssh-vulnerability-discovered.html
β οΈ Active exploits detected! This bug is distinct from CVE-2024-6387 but shares similarities.
π±19π₯9π6π€―3β‘1
Crypto analysts expose HuiOne Guarantee, a key platform for cybercriminals in SE Asia.
Linked to $11B in transactions, HuiOne offers money laundering, tech, & data services, supporting pig butchering scams.
Read: https://thehackernews.com/2024/07/crypto-analysts-expose-huione.html
Linked to $11B in transactions, HuiOne offers money laundering, tech, & data services, supporting pig butchering scams.
Read: https://thehackernews.com/2024/07/crypto-analysts-expose-huione.html
π₯11π6β‘5π1
Microsoft's latest Patch Tuesday update addresses 143 security flaws, with 2 already under active exploitation. Critical vulnerabilities include issues in Hyper-V and MSHTML.
Timely updates can prevent significant security incidents. Experts stress the importance of regular updates and vigilance.
Find details here: https://thehackernews.com/2024/07/microsofts-july-update-patches-143.html
Timely updates can prevent significant security incidents. Experts stress the importance of regular updates and vigilance.
Find details here: https://thehackernews.com/2024/07/microsofts-july-update-patches-143.html
π₯17β‘6π3π3π1
ITDR is revolutionizing identity protection in the fight against ransomware.
Identity protection lags 20 years behind, but ITDR provides comprehensive coverage and real-time threat mitigation.
Learn more: https://thehackernews.com/2024/07/true-protection-or-false-promise.html
Have you evaluated your ITDR solutions recently? Don't wait until it's too late.
Identity protection lags 20 years behind, but ITDR provides comprehensive coverage and real-time threat mitigation.
Learn more: https://thehackernews.com/2024/07/true-protection-or-false-promise.html
Have you evaluated your ITDR solutions recently? Don't wait until it's too late.
π10β‘3π€3π1
New ransomware group EstateRansomware exploits Veeam software vulnerability, uses dormant VPN accounts for initial access, and deploys persistent backdoors in sophisticated attacks.
Learn more: https://thehackernews.com/2024/07/new-ransomware-group-exploiting-veeam.html
Learn more: https://thehackernews.com/2024/07/new-ransomware-group-exploiting-veeam.html
π€―7π4π3β‘2