The Georgetown Master's in Cybersecurity Risk Management covers business, law, computer science, and organizational change.
Learn more: https://thn.news/georgetown-masters-cyber-risk-ig
Learn more: https://thn.news/georgetown-masters-cyber-risk-ig
๐22๐ค1
๐จ Sophisticated mobile phishing campaign uncovered! Attackers are distributing the updated Antidot banking trojan, now called AppLite Banker, targeting unsuspecting job seekers.
Learn how this threat operates and what measures to take: https://thehackernews.com/2024/12/fake-recruiters-distribute-banking.html
Learn how this threat operates and what measures to take: https://thehackernews.com/2024/12/fake-recruiters-distribute-banking.html
๐11๐ฅ5๐ค4
A critical vulnerability (CVE-2024-50623) in Cleo's file transfer software is under active, widespread exploitationโaffecting fully patched systems.
The flaw allows unauthenticated remote code execution through unrestricted file uploads, enabling attackers to execute arbitrary code.
Over 4,200 organizations use Cleo software globallyโthis is a major security concern for logistics, consumer products, and more.
Get critical insights: https://thehackernews.com/2024/12/cleo-file-transfer-vulnerability-under.html
The flaw allows unauthenticated remote code execution through unrestricted file uploads, enabling attackers to execute arbitrary code.
Over 4,200 organizations use Cleo software globallyโthis is a major security concern for logistics, consumer products, and more.
Get critical insights: https://thehackernews.com/2024/12/cleo-file-transfer-vulnerability-under.html
๐13๐คฏ3๐2
๐ค Traditional pentesting is falling behind. Cyberattacks happen dailyโautomation ensures your defenses are always ready, not just once a year.
Automated pentesting delivers frequent, accurate, and cost-efficient assessments, ensuring real-time visibility into your vulnerabilities.
Discover how automation is changing the game: https://thehackernews.com/2024/12/the-future-of-network-security.html
Automated pentesting delivers frequent, accurate, and cost-efficient assessments, ensuring real-time visibility into your vulnerabilities.
Discover how automation is changing the game: https://thehackernews.com/2024/12/the-future-of-network-security.html
๐24๐4โก3
๐ฅ Critical Security Alert! Ivanti uncovers a CVSS 10.0-rated vulnerability allowing unauthenticated attackers to gain admin access in their Cloud Services Application.
This flaw isnโt aloneโIvanti has patched multiple critical vulnerabilities in its Connect Secure and CSA products.
๐ Don't waitโexplore the critical details and ensure your systems are secure: https://thehackernews.com/2024/12/ivanti-issues-critical-security-updates.html
This flaw isnโt aloneโIvanti has patched multiple critical vulnerabilities in its Connect Secure and CSA products.
๐ Don't waitโexplore the critical details and ensure your systems are secure: https://thehackernews.com/2024/12/ivanti-issues-critical-security-updates.html
๐16๐6๐คฏ5โก3๐2๐ฅ1
U.S. has unsealed charges against a Chinese hacker for exploiting a zero-day #vulnerability in 81,000 Sophos firewalls, enabling the infiltration of critical systems, the theft of sensitive data, and targeting U.S. infrastructure.
Learn more: https://thehackernews.com/2024/12/us-charges-chinese-hacker-for.html
Learn more: https://thehackernews.com/2024/12/us-charges-chinese-hacker-for.html
๐43๐26๐คฏ3
๐ป Microsoftโs final Patch Tuesday of 2024 fixed 72 vulnerabilities, including one actively exploited in the wild: CVE-2024-49138.
Ensure your systems are updated now.
๐ Read more: https://thehackernews.com/2024/12/microsoft-fixes-72-flaws-including.html
Ensure your systems are updated now.
๐ Read more: https://thehackernews.com/2024/12/microsoft-fixes-72-flaws-including.html
๐26๐9๐ค5๐3๐ฑ2
Discover how Zero Trust, immutable backups, and encryption can secure Microsoft365โstarting with Zero Trust, where every access request is verified.
Learn key strategies to protect your environment.
Read the full article now: https://thehackernews.com/expert-insights/2024/12/5-strategies-to-combat-ransomware-and.html
Learn key strategies to protect your environment.
Read the full article now: https://thehackernews.com/expert-insights/2024/12/5-strategies-to-combat-ransomware-and.html
๐16
๐จ A new surveillance tool, EagleMsgSpy, has been exposed as a powerful spyware linked to Chinese police departments, secretly collecting vast data from mobile devices since 2017.
๐ Read full details here: https://thehackernews.com/2024/12/chinese-eaglemsgspy-spyware-found.html
๐ Read full details here: https://thehackernews.com/2024/12/chinese-eaglemsgspy-spyware-found.html
โก16๐11๐คฏ9๐ค4๐ฅ1
โก WEBINAR ALERT: SaaS apps are transforming businessโbut are they secure?
Join KPMG Canada & AppOmni to learn how to protect your data from risks.
Register now: https://thehackernews.uk/saas-appsec-cyber-risk
Join KPMG Canada & AppOmni to learn how to protect your data from risks.
Register now: https://thehackernews.uk/saas-appsec-cyber-risk
๐12๐4๐ค2
๐ ZLoader #malware is backโwith a stealthy upgrade. The latest version employs DNS tunneling for encrypted communication, raising the stakes for detection efforts.
This isnโt just an update; ZLoader now includes an interactive shell capable of executing over a dozen commands, a game-changer for #ransomware attacks.
Dive into the details. https://thehackernews.com/2024/12/zloader-malware-returns-with-dns.html
This isnโt just an update; ZLoader now includes an interactive shell capable of executing over a dozen commands, a game-changer for #ransomware attacks.
Dive into the details. https://thehackernews.com/2024/12/zloader-malware-returns-with-dns.html
๐ฅ15๐8๐คฏ2
๐จ A security flaw, dubbed AuthQuake, in Microsoftโs Multi-Factor Authentication (MFA) allowed attackers to bypass protection within an hour โ no alerts, no interaction required.
Get the full story here: https://thehackernews.com/2024/12/microsoft-mfa-authquake-flaw-enabled.html
Get the full story here: https://thehackernews.com/2024/12/microsoft-mfa-authquake-flaw-enabled.html
๐ฅ18๐ฑ7๐6
This media is not supported in your browser
VIEW IN TELEGRAM
๐จ A trusted Windows feature, UI Automation, can be exploited by #malware to bypass EDR detection, execute stealthy commands, and steal data undetected.
๐ Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
๐ Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
๐20๐ฅ5๐คฏ4โก3๐2
A Russian state-sponsored group, Secret Blizzard, is leveraging other hackersโ #malware to deploy its tools in Ukraine, raising the stakes in cyber warfare.
Read the full story: https://thehackernews.com/2024/12/secret-blizzard-deploys-kazuar-backdoor.html
Read the full story: https://thehackernews.com/2024/12/secret-blizzard-deploys-kazuar-backdoor.html
๐14๐9๐ฅ7๐คฏ4๐ฑ3๐2โก1
๐จ Operation PowerOFF โ Global law enforcement just shut down 27 DDoS-for-hire platforms, dismantling major stresser services used by cybercriminals to disrupt websites.
Over 300 users and 3 admins are under investigation, with arrests made in France and Germany.
Read: https://thehackernews.com/2024/12/europol-dismantles-27-ddos-attack.html
Over 300 users and 3 admins are under investigation, with arrests made in France and Germany.
Read: https://thehackernews.com/2024/12/europol-dismantles-27-ddos-attack.html
๐ฅ27๐4โก3๐ฑ2
Did you know? Your team could be using dozens of SaaS tools youโre unaware ofโright now!
Unapproved apps, duplicate tenants, and risky OAuth grants are just the tip of the iceberg. Discover how Nudge Security is revolutionizing SaaS visibility and governance.
Read more about the solution here: https://thehackernews.com/2024/01/what-is-nudge-security-and-how-does-it.html
Unapproved apps, duplicate tenants, and risky OAuth grants are just the tip of the iceberg. Discover how Nudge Security is revolutionizing SaaS visibility and governance.
Read more about the solution here: https://thehackernews.com/2024/01/what-is-nudge-security-and-how-does-it.html
๐23
Critical flaw in Hunk Companion plugin (CVE-2024-11972, CVSS: 9.8) allows attackers to install vulnerable plugins, potentially leading to Remote Code Execution (RCE), SQL Injection, and administrative backdoors.
Over 10,000 WordPress sites are at risk. Learn steps to secure your site now: https://thehackernews.com/2024/12/wordpress-hunk-companion-plugin-flaw.html
Over 10,000 WordPress sites are at risk. Learn steps to secure your site now: https://thehackernews.com/2024/12/wordpress-hunk-companion-plugin-flaw.html
๐19๐ฅ3
[Free] Cloud Risk Self-Assessment Checklist
Ready to secure your cloud? Easily evaluate and uncover cloud risk with this simple checklist to help strengthen your security posture.
Downlod Checklist: https://thn.news/cloud-risk-checklist
Ready to secure your cloud? Easily evaluate and uncover cloud risk with this simple checklist to help strengthen your security posture.
Downlod Checklist: https://thn.news/cloud-risk-checklist
๐13๐ฅ4๐คฏ2โก1๐1
๐จ Apple's TCC framework #vulnerability exposed!
A now-patched flaw (CVE-2024-44131) allowed unauthorized apps to access sensitive data like Health info, microphone, and #iCloud backupsโwithout users knowing.
Learn more: https://thehackernews.com/2024/12/researchers-uncover-symlink-exploit.html
A now-patched flaw (CVE-2024-44131) allowed unauthorized apps to access sensitive data like Health info, microphone, and #iCloud backupsโwithout users knowing.
Learn more: https://thehackernews.com/2024/12/researchers-uncover-symlink-exploit.html
๐14๐ฑ10๐4โก2๐ฅ2๐ค1
Gamaredon, a Russian-linked hacking group, targets mobile devices with BoneSpy and PlainGnome, #spyware stealing SMS, call logs, location, and photos in former Soviet states.
Find details here: https://thehackernews.com/2024/12/gamaredon-deploys-android-spyware.html
Find details here: https://thehackernews.com/2024/12/gamaredon-deploys-android-spyware.html
๐14๐9โก5๐ฅ5