π Italy has fined OpenAI β¬15 Million for violating GDPR.
Key issues:
Β» Processing user data without legal basis
Β» Failing to notify users about a 2023 security breach
Β» No age verification, exposing kids under 13 to risky content
π Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
Key issues:
Β» Processing user data without legal basis
Β» Failing to notify users about a 2023 security breach
Β» No age verification, exposing kids under 13 to risky content
π Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
π44π20π₯7π€―7π€6β‘3π3
π A U.S. judge held NSO Group liable for breaching WhatsAppβs terms of service and misusing its servers to silently deploy Pegasus spyware, targeting 1,400 users within a single month.
Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
β‘30π9π8π₯5π3π€―2π±2π€1
π¨ Rockstar2FA, a notorious phishing-as-a-service (PhaaS) toolkit, suffered a major collapse on November 11. In its place, FlowerStorm has emerged as the new threat. These tools exploit legitimate services like Cloudflare Turnstile to bypass detection effortlessly.
π Key Targets:
Β» Sectors: Engineering, real estate, consulting
Β» Countries: U.S., Canada, UK, Germany, India
If you operate in these industries, youβre already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.
π Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
π Key Targets:
Β» Sectors: Engineering, real estate, consulting
Β» Countries: U.S., Canada, UK, Germany, India
If you operate in these industries, youβre already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.
π Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
β‘14π€9π6
π¨ Top 10 Cybersecurity Trends for 2025: From AI-powered attacks to zero-day threats & supply chain risks, the future of cyber defense is evolving fast. Are you ready?
π Read: https://thehackernews.com/2024/12/top-10-cybersecurity-trends-to-expect.html
π Read: https://thehackernews.com/2024/12/top-10-cybersecurity-trends-to-expect.html
π16π€―7β‘2π₯2
π¨βπ» Is AI rewriting cybersecurity rules? Criminals are using LLMs to create natural-looking malware that evades detection.
π‘οΈ Whatβs happening:
Β» 10,000+ malware variants generated at scale.
Β» 88% trick tools like VirusTotal.
Β» Detection systems risk degradation over time.
π Learn more: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
π‘οΈ Whatβs happening:
Β» 10,000+ malware variants generated at scale.
Β» 88% trick tools like VirusTotal.
Β» Detection systems risk degradation over time.
π Learn more: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
π±12π₯8π6π6π€―5
β‘ A new remote code execution flaw in Apache Tomcat (CVE-2024-56337) exposes organizations to serious risk.
An uploaded file could turn into malicious JSP codeβresulting in remote code execution.
Β» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
Β» Java users: Incorrect configurations = higher risk.
Β» Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here π https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
An uploaded file could turn into malicious JSP codeβresulting in remote code execution.
Β» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
Β» Java users: Incorrect configurations = higher risk.
Β» Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here π https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
π27π19π€―10β‘5π3π₯1
π¨ CISA has added a high-severity vulnerability in USAHERDS (CVE-2021-44207) to its Known Exploited Vulnerabilities (KEV) catalog. This flaw has an 8.1 CVSS score and allows attackers to execute arbitrary code on affected servers.
Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
π14β‘4π3π±2π₯1
π $308M stolen in a daring crypto heist targeting DMM Bitcoin. North Korean hackers used social engineering and malware to exploit insider access.
π Learn More: https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html
π Learn More: https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html
π±23π₯16π9π€―6β‘4
π¨ Charming Kitten strikes again! Iranian hackers deploy a new C++ variant of the infamous BellaCiao malware, targeting machines across Asia.
Learn how BellaCPP operates and prepare your team for emerging threats: https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
Learn how BellaCPP operates and prepare your team for emerging threats: https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
π26π16π€―5π₯3π€3
β οΈ Apache Traffic Control usersβan SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database.
This flaw is easily exploitable by sending a specially crafted PUT request.
π§ How to act now:
Β» Update to version 8.0.2 ASAP.
Β» Audit access permissions for high-risk roles.
Β» Double-check database configurations for security loopholes.
Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
This flaw is easily exploitable by sending a specially crafted PUT request.
π§ How to act now:
Β» Update to version 8.0.2 ASAP.
Β» Audit access permissions for high-risk roles.
Β» Double-check database configurations for security loopholes.
Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
π30π9π€―8β‘7π₯7π€3π±1
A Brazilian hacker faces U.S. charges for extorting $3.2M in Bitcoin after stealing confidential data from 300,000 customers.
Learn more: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html
Learn more: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html
π₯56π19π10π€6β‘3π€―2
π¨ A critical CVE-2024-52046 vulnerability in Apache MINA, scoring a perfect CVSS 10.0, could enable remote code execution.
The flaw lies in Javaβs deserialization protocol, leaving systems wide open to attack if improperly secured.
Read now: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html
The flaw lies in Javaβs deserialization protocol, leaving systems wide open to attack if improperly secured.
Read now: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html
π₯20π7π6π±3β‘2
π When Devices Turn Against You!
Two dangerous botnetsβFICORA and CAPSAICINβare hijacking vulnerable D-Link routers through known weaknesses.
β οΈ Attack methods include brute force, shell execution, and 12+ DDoS variations.
See how to patch vulnerabilities and prevent attacks here: https://thehackernews.com/2024/12/ficora-and-kaiten-botnets-exploit-old-d.html
Two dangerous botnetsβFICORA and CAPSAICINβare hijacking vulnerable D-Link routers through known weaknesses.
β οΈ Attack methods include brute force, shell execution, and 12+ DDoS variations.
See how to patch vulnerabilities and prevent attacks here: https://thehackernews.com/2024/12/ficora-and-kaiten-botnets-exploit-old-d.html
π18π₯6π6β‘3π±3
π₯ CVE-2024-3393 Alert! A single malicious DNS packet can reboot your Palo Alto firewall and leave your network defenseless.
Important to Know:
Β» This flaw impacts PAN-OS 10.X & 11.X, including Prisma Access.
Β» Repeated attacks could force your firewall into maintenance mode.
Β» Legacy PAN-OS 11.0 users? No fixesβitβs time to upgrade!
βοΈ How to Fix:
Β» Update to PAN-OS 10.1.14-h8 or later.
Β» Use workarounds to disable risky logging until upgrades are complete.
Read now: https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html
Important to Know:
Β» This flaw impacts PAN-OS 10.X & 11.X, including Prisma Access.
Β» Repeated attacks could force your firewall into maintenance mode.
Β» Legacy PAN-OS 11.0 users? No fixesβitβs time to upgrade!
βοΈ How to Fix:
Β» Update to PAN-OS 10.1.14-h8 or later.
Β» Use workarounds to disable risky logging until upgrades are complete.
Read now: https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html
π€―32π₯9π7π5β‘2π€1
π Cloud Atlas is deploying VBShower and PowerShowerβmalware that operates in stages, infiltrating networks and harvesting credentials.
π Quick Actions:
βοΈ Patch outdated vulnerabilities like CVE-2018-0802 immediately
βοΈ Monitor for unusual cloud storage activity
βοΈ Deploy advanced monitoring tools for NTFS file changes.
βοΈ Conduct phishing simulations to bolster employee awareness.
Find details here: https://thehackernews.com/2024/12/cloud-atlas-deploys-vbcloud-malware.html
π Quick Actions:
βοΈ Patch outdated vulnerabilities like CVE-2018-0802 immediately
βοΈ Monitor for unusual cloud storage activity
βοΈ Deploy advanced monitoring tools for NTFS file changes.
βοΈ Conduct phishing simulations to bolster employee awareness.
Find details here: https://thehackernews.com/2024/12/cloud-atlas-deploys-vbcloud-malware.html
π€16π10β‘2π₯2
North Korean hackers are targeting job seekers with a deceptive campaign, deploying a new malware called OtterCookie through fake interview tools.
This new JavaScript malware, is:
Β» Stealing files and cryptocurrency wallets.
Β» Communicating directly with attackers via socket(.)io
Β» Constantly evolving to bypass detection.
π Full Report: https://thehackernews.com/2024/12/north-korean-hackers-deploy-ottercookie.html
This new JavaScript malware, is:
Β» Stealing files and cryptocurrency wallets.
Β» Communicating directly with attackers via socket(.)io
Β» Constantly evolving to bypass detection.
π Full Report: https://thehackernews.com/2024/12/north-korean-hackers-deploy-ottercookie.html
π₯26π16π6π±6π5β‘1
β οΈ 15,000+ Four-Faith routers are exposed, with attackers actively exploiting a command injection flaw (CVE-2024-12856).
1οΈβ£ Attackers execute commands remotely via the adj_time_year parameter.
2οΈβ£ Reverse shells enable hackers to stay hidden and in control.
Read: https://thehackernews.com/2024/12/15000-four-faith-routers-exposed-to-new.html
1οΈβ£ Attackers execute commands remotely via the adj_time_year parameter.
2οΈβ£ Reverse shells enable hackers to stay hidden and in control.
Read: https://thehackernews.com/2024/12/15000-four-faith-routers-exposed-to-new.html
π±28π17π€5β‘3π₯2
π 600,000+ users impacted! A widespread campaign compromised 16+ extensions, including tools for AI and VPNs, using phishing and malicious code injection.
Learn more: https://thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html
Learn more: https://thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html
π€―29π15π11π€7β‘4π₯1
What if your password manager or note-taking tool became a hackerβs entry point? Recent attacks on Chrome Store extensions reveal just how exposed your organization might be.
β Why It Matters:
Β» Browser extensions are a silent threatβgranted access to sensitive data like cookies and identities.
Β» Credential theft can lead to organizational data breaches and compliance nightmares.
π‘Key Takeaways:
Β» Limit user-installed extensions.
Β» Implement risk-based policies to block risky permissions.
Β» Stay updated on the latest threats.
π Check out this guide to learn how: https://thehackernews.com/2024/12/when-good-extensions-go-bad-takeaways.html
β Why It Matters:
Β» Browser extensions are a silent threatβgranted access to sensitive data like cookies and identities.
Β» Credential theft can lead to organizational data breaches and compliance nightmares.
π‘Key Takeaways:
Β» Limit user-installed extensions.
Β» Implement risk-based policies to block risky permissions.
Β» Stay updated on the latest threats.
π Check out this guide to learn how: https://thehackernews.com/2024/12/when-good-extensions-go-bad-takeaways.html
π21π11π3β‘2π₯2π€1π±1
π¨ Are hospitals prepared for the next big cyber attack? The HHS proposes new HIPAA updates to safeguard patient data and critical systems.
πProposed Solutions:
πΎ Encrypt sensitive data everywhere
π Map assets and identify vulnerabilities
β± Set recovery protocols within 72 hours
Read more: https://thehackernews.com/2024/12/new-hipaa-rules-mandate-72-hour-data.html
πProposed Solutions:
πΎ Encrypt sensitive data everywhere
π Map assets and identify vulnerabilities
β± Set recovery protocols within 72 hours
Read more: https://thehackernews.com/2024/12/new-hipaa-rules-mandate-72-hour-data.html
π25β‘7π€―5π₯2π1