Netflix has been fined β¬4.75M for violating GDPR by failing to explain how it used customer data like email addresses and payment details between 2018β2020.
Read more: https://thehackernews.com/2024/12/dutch-dpa-fines-netflix-475-million-for.html
Read more: https://thehackernews.com/2024/12/dutch-dpa-fines-netflix-475-million-for.html
β‘19π7π₯7π6π3π€1
π₯ Critical Alert: CISAβs new directive, BOD 25-01, sets a new benchmark in cloud security for federal agencies.
Why? Misconfigurations and weak controls are opening doors to attackers.
Key Deadlines:
Β» By Feb 2025: Identify all cloud tenants
Β» By Apr 2025: Deploy SCuBA assessment tools
Β» By Jun 2025: Implement mandatory policies
π Learn how to protect your communications effectively: https://thehackernews.com/2024/12/cisa-mandates-cloud-security-for.html
π‘οΈ Regularly update security configurations to reduce your attack surface.
Why? Misconfigurations and weak controls are opening doors to attackers.
Key Deadlines:
Β» By Feb 2025: Identify all cloud tenants
Β» By Apr 2025: Deploy SCuBA assessment tools
Β» By Jun 2025: Implement mandatory policies
π Learn how to protect your communications effectively: https://thehackernews.com/2024/12/cisa-mandates-cloud-security-for.html
π‘οΈ Regularly update security configurations to reduce your attack surface.
π11β‘4π2
π Fortinet's Wireless LAN Manager (FortiWLM) is vulnerable to a path traversal flaw (CVE-2023-34990) with a 9.6/10 CVSS score.
Why itβs urgent: It allows attackers to...
1οΈβ£ Access admin accounts using static session IDs.
2οΈβ£ Execute unauthorized commands by chaining vulnerabilities.
3οΈβ£ Gain root access to your network in minutes.
π οΈ Patch now:
Affected versions: 8.5.0 to 8.6.5.
Fixed in 8.6.6βupdate immediately.
Read: https://thehackernews.com/2024/12/fortinet-warns-of-critical-fortiwlm.html
Why itβs urgent: It allows attackers to...
1οΈβ£ Access admin accounts using static session IDs.
2οΈβ£ Execute unauthorized commands by chaining vulnerabilities.
3οΈβ£ Gain root access to your network in minutes.
π οΈ Patch now:
Affected versions: 8.5.0 to 8.6.5.
Fixed in 8.6.6βupdate immediately.
Read: https://thehackernews.com/2024/12/fortinet-warns-of-critical-fortiwlm.html
π₯15π6β‘2π€2
π¨ What if your device unknowingly became a tool for cybercrime? Itβs happening now.
Mirai malware strikes Juniper SSR devices, leveraging default passwords to turn them into DDoS attack machines. Over 90% of breached systems had unaltered factory settings.
π Donβt leave the door open. Secure your systems today.
Read the full report: https://thehackernews.com/2024/12/juniper-warns-of-mirai-botnet-targeting.html
Mirai malware strikes Juniper SSR devices, leveraging default passwords to turn them into DDoS attack machines. Over 90% of breached systems had unaltered factory settings.
π Donβt leave the door open. Secure your systems today.
Read the full report: https://thehackernews.com/2024/12/juniper-warns-of-mirai-botnet-targeting.html
π₯10π8π4β‘3π2π€2
Threat actors are tricking developers with fake npm packages like typescript-eslint lookalikes, amassing thousands of downloads.
Compromised tools = compromised enterprises. One wrong download could breach your entire development cycle.
π Your move:
β Review your dependencies.
β Learn how these attacks work.
β Build a resilient security strategy.
π Read here: https://thehackernews.com/2024/12/thousands-download-malicious-npm.html
Compromised tools = compromised enterprises. One wrong download could breach your entire development cycle.
π Your move:
β Review your dependencies.
β Learn how these attacks work.
β Build a resilient security strategy.
π Read here: https://thehackernews.com/2024/12/thousands-download-malicious-npm.html
π17π€―6π4β‘2
π¨ CISA warns of an actively exploited critical flaw (CVE-2024-12356, CVSS: 9.8) in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) products.
Attackers can exploit this flaw to run arbitrary commandsβno authentication required.
Read: https://thehackernews.com/2024/12/cisa-adds-critical-flaw-in-beyondtrust.html
Attackers can exploit this flaw to run arbitrary commandsβno authentication required.
Read: https://thehackernews.com/2024/12/cisa-adds-critical-flaw-in-beyondtrust.html
π12π9β‘5π€1
π Attackers are exploiting Fortinet's CVE-2023-48788 (CVSS 9.3) to install remote desktop tools like AnyDesk and ScreenConnect.
Theyβve already targeted companies across 12 countries, leveraging:
Β» SQL injection for unauthorized access
Β» Password recovery tools like Mimikatz
Β» PowerShell scripts for persistence
Donβt just patch vulnerabilitiesβassume attackers are already inside.
Find details here: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html
Theyβve already targeted companies across 12 countries, leveraging:
Β» SQL injection for unauthorized access
Β» Password recovery tools like Mimikatz
Β» PowerShell scripts for persistence
Donβt just patch vulnerabilitiesβassume attackers are already inside.
Find details here: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html
β‘10π8π₯6π3
π Alert: Two critical vulnerabilities in Sophos Firewalls could grant attackers remote code execution and privileged access.
π§ Action Plan:
βοΈ Update to v21 MR1 or newer.
βοΈ Restrict SSH access immediately.
βοΈ Ensure user portals are not WAN-exposed.
π Full advisory here: https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html
π§ Action Plan:
βοΈ Update to v21 MR1 or newer.
βοΈ Restrict SSH access immediately.
βοΈ Ensure user portals are not WAN-exposed.
π Full advisory here: https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html
π17β‘7π€―5
The notorious Lazarus Group is targeting nuclear engineers using trojanized VNC tools disguised as job assessments for aerospace roles.
Theyβve introduced a new modular malwareβCookiePlusβcapable of evading top-tier detection systems.
π Explore the full story here: https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html
Theyβve introduced a new modular malwareβCookiePlusβcapable of evading top-tier detection systems.
π Explore the full story here: https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html
π18β‘10π9
π₯ A dual Russian-Israeli national charged as the mastermind behind LockBit ransomwareβa cyber weapon that caused chaos across 120+ countries and left $500M in illicit profits.
Β» Targeted hospitals, schools, and critical infrastructure.
Β» Gained access to systems using custom malware to disable antivirus.
Β» LockBit is now planning a comeback with version 4.0!
Explore the full story of LockBitβs rise and fall: https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
Β» Targeted hospitals, schools, and critical infrastructure.
Β» Gained access to systems using custom malware to disable antivirus.
Β» LockBit is now planning a comeback with version 4.0!
Explore the full story of LockBitβs rise and fall: https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
π36π12π€8β‘7
π Italy has fined OpenAI β¬15 Million for violating GDPR.
Key issues:
Β» Processing user data without legal basis
Β» Failing to notify users about a 2023 security breach
Β» No age verification, exposing kids under 13 to risky content
π Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
Key issues:
Β» Processing user data without legal basis
Β» Failing to notify users about a 2023 security breach
Β» No age verification, exposing kids under 13 to risky content
π Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
π44π20π₯7π€―7π€6β‘3π3
π A U.S. judge held NSO Group liable for breaching WhatsAppβs terms of service and misusing its servers to silently deploy Pegasus spyware, targeting 1,400 users within a single month.
Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
β‘30π9π8π₯5π3π€―2π±2π€1
π¨ Rockstar2FA, a notorious phishing-as-a-service (PhaaS) toolkit, suffered a major collapse on November 11. In its place, FlowerStorm has emerged as the new threat. These tools exploit legitimate services like Cloudflare Turnstile to bypass detection effortlessly.
π Key Targets:
Β» Sectors: Engineering, real estate, consulting
Β» Countries: U.S., Canada, UK, Germany, India
If you operate in these industries, youβre already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.
π Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
π Key Targets:
Β» Sectors: Engineering, real estate, consulting
Β» Countries: U.S., Canada, UK, Germany, India
If you operate in these industries, youβre already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.
π Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
β‘14π€9π6
π¨ Top 10 Cybersecurity Trends for 2025: From AI-powered attacks to zero-day threats & supply chain risks, the future of cyber defense is evolving fast. Are you ready?
π Read: https://thehackernews.com/2024/12/top-10-cybersecurity-trends-to-expect.html
π Read: https://thehackernews.com/2024/12/top-10-cybersecurity-trends-to-expect.html
π16π€―7β‘2π₯2
π¨βπ» Is AI rewriting cybersecurity rules? Criminals are using LLMs to create natural-looking malware that evades detection.
π‘οΈ Whatβs happening:
Β» 10,000+ malware variants generated at scale.
Β» 88% trick tools like VirusTotal.
Β» Detection systems risk degradation over time.
π Learn more: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
π‘οΈ Whatβs happening:
Β» 10,000+ malware variants generated at scale.
Β» 88% trick tools like VirusTotal.
Β» Detection systems risk degradation over time.
π Learn more: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
π±12π₯8π6π6π€―5
β‘ A new remote code execution flaw in Apache Tomcat (CVE-2024-56337) exposes organizations to serious risk.
An uploaded file could turn into malicious JSP codeβresulting in remote code execution.
Β» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
Β» Java users: Incorrect configurations = higher risk.
Β» Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here π https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
An uploaded file could turn into malicious JSP codeβresulting in remote code execution.
Β» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
Β» Java users: Incorrect configurations = higher risk.
Β» Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here π https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
π27π19π€―10β‘5π3π₯1
π¨ CISA has added a high-severity vulnerability in USAHERDS (CVE-2021-44207) to its Known Exploited Vulnerabilities (KEV) catalog. This flaw has an 8.1 CVSS score and allows attackers to execute arbitrary code on affected servers.
Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
π14β‘4π3π±2π₯1
π $308M stolen in a daring crypto heist targeting DMM Bitcoin. North Korean hackers used social engineering and malware to exploit insider access.
π Learn More: https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html
π Learn More: https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html
π±23π₯16π9π€―6β‘4
π¨ Charming Kitten strikes again! Iranian hackers deploy a new C++ variant of the infamous BellaCiao malware, targeting machines across Asia.
Learn how BellaCPP operates and prepare your team for emerging threats: https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
Learn how BellaCPP operates and prepare your team for emerging threats: https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
π26π16π€―5π₯3π€3
β οΈ Apache Traffic Control usersβan SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database.
This flaw is easily exploitable by sending a specially crafted PUT request.
π§ How to act now:
Β» Update to version 8.0.2 ASAP.
Β» Audit access permissions for high-risk roles.
Β» Double-check database configurations for security loopholes.
Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
This flaw is easily exploitable by sending a specially crafted PUT request.
π§ How to act now:
Β» Update to version 8.0.2 ASAP.
Β» Audit access permissions for high-risk roles.
Β» Double-check database configurations for security loopholes.
Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
π30π9π€―8β‘7π₯7π€3π±1