Celebrate SANS Institute's 35th Anniversary with a $1700 Complimentary Cyber Bundle at Network Security 2024! π
Register for in-person training and get a bonus SANS course (AIS247), OnDemand bundle, and a @Night pass to the AI Cybersecurity Summit (Sept 8-9).
Don't miss out: https://thn.news/net-sec-2024
Register for in-person training and get a bonus SANS course (AIS247), OnDemand bundle, and a @Night pass to the AI Cybersecurity Summit (Sept 8-9).
Don't miss out: https://thn.news/net-sec-2024
www.sans.org
NETWORK SECURITY 2024 | SANS Institute
Experience the excitement of SANS live training under the dazzling lights of Las Vegas! When you attend in-person, unlock all-access offerings from hands-on workshops, to AI villages, CTFs and more that await you.
π€11π4π±3π1
Cybersecurity researchers uncovered vulnerabilities in Sonos smart speakers that could allow remote eavesdropping.
The weaknesses allow attackers to execute remote code and covertly capture audio, highlighting the critical need for robust security in IoT devices.
These flaws, impacting devices pre-dating the Sonos S2 release 15.9, put users' privacy at risk.
Learn more: https://thehackernews.com/2024/08/new-flaws-in-sonos-smart-speakers-allow.html
The weaknesses allow attackers to execute remote code and covertly capture audio, highlighting the critical need for robust security in IoT devices.
These flaws, impacting devices pre-dating the Sonos S2 release 15.9, put users' privacy at risk.
Learn more: https://thehackernews.com/2024/08/new-flaws-in-sonos-smart-speakers-allow.html
π₯16π9π€―2
Microsoft has disclosed four security flaws in OpenVPN that could be chained to enable RCE and local privilege escalation.
These vulnerabilities can lead to full control over targeted endpoints, risking data breaches and system compromise.
Read: https://thehackernews.com/2024/08/microsoft-reveals-four-openvpn-flaws.html
These vulnerabilities can lead to full control over targeted endpoints, risking data breaches and system compromise.
Read: https://thehackernews.com/2024/08/microsoft-reveals-four-openvpn-flaws.html
π₯19π€―17π10π±4π3β‘1
Microsoft reveals a new unpatched vulnerability in Office (CVE-2024-38200) that could expose sensitive data to malicious actors.
It affects multiple Office versions and could be exploited via web-based attacks, making it a significant threat.
While a formal patch is expected soon, Microsoft has already rolled out an alternative fix.
Read: https://thehackernews.com/2024/08/microsoft-warns-of-unpatched-office.html
It affects multiple Office versions and could be exploited via web-based attacks, making it a significant threat.
While a formal patch is expected soon, Microsoft has already rolled out an alternative fix.
Read: https://thehackernews.com/2024/08/microsoft-warns-of-unpatched-office.html
π25β‘3π€―1
β‘ Researchers have uncovered critical AWS vulnerabilities that could allow attackers to gain full control over AWS accounts, manipulate AI modules, or exfiltrate sensitive data, putting countless organizations at risk.
Read: https://thehackernews.com/2024/08/experts-uncover-severe-aws-flaws.html
Read: https://thehackernews.com/2024/08/experts-uncover-severe-aws-flaws.html
π€―24π9π₯6π±6π1π€1
A widespread malware campaign is installing rogue Chrome and Edge extensions via fake websites, affecting over 300,000 users.
It hijacks search queries and installs hard-to-remove extensions.
Read: https://thehackernews.com/2024/08/new-malware-hits-300000-users-with.html
It hijacks search queries and installs hard-to-remove extensions.
Read: https://thehackernews.com/2024/08/new-malware-hits-300000-users-with.html
π17π₯8π3
10 newly discovered flaws in Googleβs Quick Share app could allow remote code execution on Windows devices.
These vulnerabilities affect both Android and Windows, potentially enabling attackers to take remote control of the systems.
Read: https://thehackernews.com/2024/08/researchers-uncover-10-flaws-in-googles.html
These vulnerabilities affect both Android and Windows, potentially enabling attackers to take remote control of the systems.
Read: https://thehackernews.com/2024/08/researchers-uncover-10-flaws-in-googles.html
π17π±7π4π3β‘2π₯2π€2
Developers, double-check your dependencies!
Researchers have uncovered a malicious Python package, βsolana-py,β on PyPI, designed to steal Solana blockchain wallet keys.
This deceptive package mimics the legitimate βsolanaβ API and has already been downloaded over 1,100 times, posing a serious threat to developers and end users.
The package injects malicious code into the "init .py" script, exfiltrating sensitive information to an external domain.
Read: https://thehackernews.com/2024/08/rogue-pypi-library-solana-users-steals.html
Researchers have uncovered a malicious Python package, βsolana-py,β on PyPI, designed to steal Solana blockchain wallet keys.
This deceptive package mimics the legitimate βsolanaβ API and has already been downloaded over 1,100 times, posing a serious threat to developers and end users.
The package injects malicious code into the "init .py" script, exfiltrating sensitive information to an external domain.
Read: https://thehackernews.com/2024/08/rogue-pypi-library-solana-users-steals.html
π23π±12π5β‘1π€1
Russian organizations face a new spear-phishing threat, EastWind, using PlugY malware for screen monitoring, keystroke logging, and data theft, endangering sensitive information and security.
Read: https://thehackernews.com/2024/08/russian-government-hit-by-eastwind.html
Read: https://thehackernews.com/2024/08/russian-government-hit-by-eastwind.html
π15β‘9π€7π₯1π±1
Major vulnerabilities found in Ewon Cosy+ remote access solution could allow attackers to gain root privileges and hijack VPN sessions.
Attackers can exploit these flaws to decrypt sensitive data and intercept critical network communications.
Read: https://thehackernews.com/2024/08/industrial-remote-access-tool-ewon-cosy.html
Attackers can exploit these flaws to decrypt sensitive data and intercept critical network communications.
Read: https://thehackernews.com/2024/08/industrial-remote-access-tool-ewon-cosy.html
π₯10π8β‘2π1
A critical #vulnerability (CVE-2024-7589) in OpenSSH on FreeBSD could allow attackers to execute code remotely with root privileges.
Learn more: https://thehackernews.com/2024/08/freebsd-releases-urgent-patch-for-high.html
If you're using FreeBSD, update your systems immediately and restart sshd.
Learn more: https://thehackernews.com/2024/08/freebsd-releases-urgent-patch-for-high.html
If you're using FreeBSD, update your systems immediately and restart sshd.
π₯32π9π€―4β‘2
Researchers uncover critical flaws in the Chinese Solarman and Deye solar management platformsβpotentially allowing hackers to control solar inverters, risking power grid disruptions and compromising sensitive user data.
Learn more: https://thehackernews.com/2024/08/researchers-uncover-vulnerabilities-in.html
Learn more: https://thehackernews.com/2024/08/researchers-uncover-vulnerabilities-in.html
π₯10π5π€―4β‘3
AI boom faces reality check: Generative AI still powerful in cybersecurity, enhancing defenses unpredictably. But high costs & expert handling needed. Not a silver bullet, yet reshaping industries.
Read it here: https://thehackernews.com/2024/08/the-ai-hangover-is-here-end-of-beginning.html
Read it here: https://thehackernews.com/2024/08/the-ai-hangover-is-here-end-of-beginning.html
π13π8β‘5
π¨ Phishing attacks have surged by 40% in the last year, driven by AI. With AI and Phishing-as-a-Service (PhaaS), cybercriminals can craft targeted phishing campaigns almost instantly, exploiting current events.
Learn more: https://thehackernews.com/2024/08/how-phishing-attacks-adapt-quickly-to.html
Learn more: https://thehackernews.com/2024/08/how-phishing-attacks-adapt-quickly-to.html
π12π9π€―7π±5π€1
CERT-UA has uncovered a new phishing campaign that disguises itself as the Security Service of Ukraine, spreading malware capable of remote desktop access.
Read: https://thehackernews.com/2024/08/ukraine-warns-of-new-phishing-campaign.html
Read: https://thehackernews.com/2024/08/ukraine-warns-of-new-phishing-campaign.html
π12π8π₯3
π₯ FBI disrupted the infrastructure of emerging ransomware group Dispossessor. This malware group targeted small-to-mid-sized businesses globally, with 43 victims identified, highlighting the growing risk to less-secure organizations.
https://thehackernews.com/2024/08/fbi-shuts-down-dispossessor-ransomware.html
https://thehackernews.com/2024/08/fbi-shuts-down-dispossessor-ransomware.html
π18π12
How can organizations ensure their sensitive data is secure?
Data Security Posture Management (DSPM)
Check out Sentra_security's DSPM guide to learn:
πΈWhy cloud-first enterprises are adopting DSPM
πΈWhat to look for in DSPM tools
πΈKey features of DSPM
π Read: https://thn.news/sentra-dspm-guide
Data Security Posture Management (DSPM)
Check out Sentra_security's DSPM guide to learn:
πΈWhy cloud-first enterprises are adopting DSPM
πΈWhat to look for in DSPM tools
πΈKey features of DSPM
π Read: https://thn.news/sentra-dspm-guide
www.sentra.io
What is DSPM (Data Security Posture Management)? | Sentra
DSPM secures cloud data by ensuring that sensitive data has always the correct security posture, no matter where itβs been moved. Learn more in our guide.
π5π€5π2
π¨ Critical security flaws in Microsoft's Azure Health Bot Service could have exposed sensitive patient data across multiple tenants.
Hackers could exploit these to move laterally within customer environments, risking large-scale privacy breaches.
Read: https://thehackernews.com/2024/08/researchers-uncover-vulnerabilities-in_0471960302.html
Hackers could exploit these to move laterally within customer environments, risking large-scale privacy breaches.
Read: https://thehackernews.com/2024/08/researchers-uncover-vulnerabilities-in_0471960302.html
π7π€―6π₯5π3
Researchers have uncovered a critical vulnerability, dubbed GhostWrite, in T-Headβs XuanTie C910 and C920 RISC-V CPUs that could allow attackers to gain full access to affected devices.
Read: https://thehackernews.com/2024/08/ghostwrite-new-t-head-cpu-bugs-expose.html
Read: https://thehackernews.com/2024/08/ghostwrite-new-t-head-cpu-bugs-expose.html
π9π5π₯5π€3
China-backed Earth Baku hacker group expands cyber attacks globally, using new #malware (StealthReacher and SneakCross) and tactics to target governments and tech sectors across Europe, Middle East, and Africa.
Learn more: https://thehackernews.com/2024/08/china-backed-earth-baku-expands-cyber.html
Learn more: https://thehackernews.com/2024/08/china-backed-earth-baku-expands-cyber.html
π₯12π3π3