β‘ A new remote code execution flaw in Apache Tomcat (CVE-2024-56337) exposes organizations to serious risk.
An uploaded file could turn into malicious JSP codeβresulting in remote code execution.
Β» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
Β» Java users: Incorrect configurations = higher risk.
Β» Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here π https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
An uploaded file could turn into malicious JSP codeβresulting in remote code execution.
Β» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
Β» Java users: Incorrect configurations = higher risk.
Β» Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here π https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
π27π19π€―10β‘5π3π₯1
π¨ CISA has added a high-severity vulnerability in USAHERDS (CVE-2021-44207) to its Known Exploited Vulnerabilities (KEV) catalog. This flaw has an 8.1 CVSS score and allows attackers to execute arbitrary code on affected servers.
Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
π14β‘4π3π±2π₯1
π $308M stolen in a daring crypto heist targeting DMM Bitcoin. North Korean hackers used social engineering and malware to exploit insider access.
π Learn More: https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html
π Learn More: https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html
π±23π₯16π9π€―6β‘4
π¨ Charming Kitten strikes again! Iranian hackers deploy a new C++ variant of the infamous BellaCiao malware, targeting machines across Asia.
Learn how BellaCPP operates and prepare your team for emerging threats: https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
Learn how BellaCPP operates and prepare your team for emerging threats: https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
π26π16π€―5π₯3π€3
β οΈ Apache Traffic Control usersβan SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database.
This flaw is easily exploitable by sending a specially crafted PUT request.
π§ How to act now:
Β» Update to version 8.0.2 ASAP.
Β» Audit access permissions for high-risk roles.
Β» Double-check database configurations for security loopholes.
Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
This flaw is easily exploitable by sending a specially crafted PUT request.
π§ How to act now:
Β» Update to version 8.0.2 ASAP.
Β» Audit access permissions for high-risk roles.
Β» Double-check database configurations for security loopholes.
Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
π30π9π€―8β‘7π₯7π€3π±1
A Brazilian hacker faces U.S. charges for extorting $3.2M in Bitcoin after stealing confidential data from 300,000 customers.
Learn more: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html
Learn more: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html
π₯56π19π10π€6β‘3π€―2
π¨ A critical CVE-2024-52046 vulnerability in Apache MINA, scoring a perfect CVSS 10.0, could enable remote code execution.
The flaw lies in Javaβs deserialization protocol, leaving systems wide open to attack if improperly secured.
Read now: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html
The flaw lies in Javaβs deserialization protocol, leaving systems wide open to attack if improperly secured.
Read now: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html
π₯20π7π6π±3β‘2
π When Devices Turn Against You!
Two dangerous botnetsβFICORA and CAPSAICINβare hijacking vulnerable D-Link routers through known weaknesses.
β οΈ Attack methods include brute force, shell execution, and 12+ DDoS variations.
See how to patch vulnerabilities and prevent attacks here: https://thehackernews.com/2024/12/ficora-and-kaiten-botnets-exploit-old-d.html
Two dangerous botnetsβFICORA and CAPSAICINβare hijacking vulnerable D-Link routers through known weaknesses.
β οΈ Attack methods include brute force, shell execution, and 12+ DDoS variations.
See how to patch vulnerabilities and prevent attacks here: https://thehackernews.com/2024/12/ficora-and-kaiten-botnets-exploit-old-d.html
π18π₯6π6β‘3π±3
π₯ CVE-2024-3393 Alert! A single malicious DNS packet can reboot your Palo Alto firewall and leave your network defenseless.
Important to Know:
Β» This flaw impacts PAN-OS 10.X & 11.X, including Prisma Access.
Β» Repeated attacks could force your firewall into maintenance mode.
Β» Legacy PAN-OS 11.0 users? No fixesβitβs time to upgrade!
βοΈ How to Fix:
Β» Update to PAN-OS 10.1.14-h8 or later.
Β» Use workarounds to disable risky logging until upgrades are complete.
Read now: https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html
Important to Know:
Β» This flaw impacts PAN-OS 10.X & 11.X, including Prisma Access.
Β» Repeated attacks could force your firewall into maintenance mode.
Β» Legacy PAN-OS 11.0 users? No fixesβitβs time to upgrade!
βοΈ How to Fix:
Β» Update to PAN-OS 10.1.14-h8 or later.
Β» Use workarounds to disable risky logging until upgrades are complete.
Read now: https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html
π€―32π₯9π7π5β‘2π€1
π Cloud Atlas is deploying VBShower and PowerShowerβmalware that operates in stages, infiltrating networks and harvesting credentials.
π Quick Actions:
βοΈ Patch outdated vulnerabilities like CVE-2018-0802 immediately
βοΈ Monitor for unusual cloud storage activity
βοΈ Deploy advanced monitoring tools for NTFS file changes.
βοΈ Conduct phishing simulations to bolster employee awareness.
Find details here: https://thehackernews.com/2024/12/cloud-atlas-deploys-vbcloud-malware.html
π Quick Actions:
βοΈ Patch outdated vulnerabilities like CVE-2018-0802 immediately
βοΈ Monitor for unusual cloud storage activity
βοΈ Deploy advanced monitoring tools for NTFS file changes.
βοΈ Conduct phishing simulations to bolster employee awareness.
Find details here: https://thehackernews.com/2024/12/cloud-atlas-deploys-vbcloud-malware.html
π€16π10β‘2π₯2
North Korean hackers are targeting job seekers with a deceptive campaign, deploying a new malware called OtterCookie through fake interview tools.
This new JavaScript malware, is:
Β» Stealing files and cryptocurrency wallets.
Β» Communicating directly with attackers via socket(.)io
Β» Constantly evolving to bypass detection.
π Full Report: https://thehackernews.com/2024/12/north-korean-hackers-deploy-ottercookie.html
This new JavaScript malware, is:
Β» Stealing files and cryptocurrency wallets.
Β» Communicating directly with attackers via socket(.)io
Β» Constantly evolving to bypass detection.
π Full Report: https://thehackernews.com/2024/12/north-korean-hackers-deploy-ottercookie.html
π₯26π16π6π±6π5β‘1
β οΈ 15,000+ Four-Faith routers are exposed, with attackers actively exploiting a command injection flaw (CVE-2024-12856).
1οΈβ£ Attackers execute commands remotely via the adj_time_year parameter.
2οΈβ£ Reverse shells enable hackers to stay hidden and in control.
Read: https://thehackernews.com/2024/12/15000-four-faith-routers-exposed-to-new.html
1οΈβ£ Attackers execute commands remotely via the adj_time_year parameter.
2οΈβ£ Reverse shells enable hackers to stay hidden and in control.
Read: https://thehackernews.com/2024/12/15000-four-faith-routers-exposed-to-new.html
π±28π17π€5β‘3π₯2
π 600,000+ users impacted! A widespread campaign compromised 16+ extensions, including tools for AI and VPNs, using phishing and malicious code injection.
Learn more: https://thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html
Learn more: https://thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html
π€―29π15π11π€7β‘4π₯1
What if your password manager or note-taking tool became a hackerβs entry point? Recent attacks on Chrome Store extensions reveal just how exposed your organization might be.
β Why It Matters:
Β» Browser extensions are a silent threatβgranted access to sensitive data like cookies and identities.
Β» Credential theft can lead to organizational data breaches and compliance nightmares.
π‘Key Takeaways:
Β» Limit user-installed extensions.
Β» Implement risk-based policies to block risky permissions.
Β» Stay updated on the latest threats.
π Check out this guide to learn how: https://thehackernews.com/2024/12/when-good-extensions-go-bad-takeaways.html
β Why It Matters:
Β» Browser extensions are a silent threatβgranted access to sensitive data like cookies and identities.
Β» Credential theft can lead to organizational data breaches and compliance nightmares.
π‘Key Takeaways:
Β» Limit user-installed extensions.
Β» Implement risk-based policies to block risky permissions.
Β» Stay updated on the latest threats.
π Check out this guide to learn how: https://thehackernews.com/2024/12/when-good-extensions-go-bad-takeaways.html
π21π11π3β‘2π₯2π€1π±1
π¨ Are hospitals prepared for the next big cyber attack? The HHS proposes new HIPAA updates to safeguard patient data and critical systems.
πProposed Solutions:
πΎ Encrypt sensitive data everywhere
π Map assets and identify vulnerabilities
β± Set recovery protocols within 72 hours
Read more: https://thehackernews.com/2024/12/new-hipaa-rules-mandate-72-hour-data.html
πProposed Solutions:
πΎ Encrypt sensitive data everywhere
π Map assets and identify vulnerabilities
β± Set recovery protocols within 72 hours
Read more: https://thehackernews.com/2024/12/new-hipaa-rules-mandate-72-hour-data.html
π25β‘7π€―5π₯2π1
π Three flaws in Microsoft Azure's Apache Airflow integration could have let attackers:
π© Gain shadow admin access to Kubernetes clusters
π΅οΈββοΈ Exfiltrate sensitive data
π― Deploy undetected malware
π These misconfigurations allow attackers to tamper with logs, deploy privileged pods, and burrow deeper into cloud environmentsβall under the radar.
π Learn more: https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html
π© Gain shadow admin access to Kubernetes clusters
π΅οΈββοΈ Exfiltrate sensitive data
π― Deploy undetected malware
π These misconfigurations allow attackers to tamper with logs, deploy privileged pods, and burrow deeper into cloud environmentsβall under the radar.
π Learn more: https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html
π±12π₯5π4β‘2π2π€2
π¨ Suspected Chinese state-sponsored hackers breached the U.S. Treasury via a compromised API key from BeyondTrust, a third-party vendor.
π‘ Hereβs what happened:
Β» Attackers gained access to a key securing BeyondTrustβs cloud-based remote support service.
Β» They bypassed security to remotely access Treasury workstations and unclassified documents.
Β» CVE-2024-12356, a critical vulnerability (CVSS 9.8), was actively exploited.
β‘οΈ Read More: https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html
π‘ Hereβs what happened:
Β» Attackers gained access to a key securing BeyondTrustβs cloud-based remote support service.
Β» They bypassed security to remotely access Treasury workstations and unclassified documents.
Β» CVE-2024-12356, a critical vulnerability (CVSS 9.8), was actively exploited.
β‘οΈ Read More: https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html
π₯31π€―9β‘5π4π2π€2
π Department of Justice has finalized a rule blocking bulk transfers of Americansβ sensitive personal data to adversarial nations like China, Russia, and North Korea.
Β» Data like Social Security numbers, geolocation, biometrics, and health information is now protected.
Β» These countries have used such data for espionage, AI development, and suppressing freedoms.
Read full story here π https://thehackernews.com/2024/12/new-us-doj-rule-halts-bulk-data.html
Β» Data like Social Security numbers, geolocation, biometrics, and health information is now protected.
Β» These countries have used such data for espionage, AI development, and suppressing freedoms.
Read full story here π https://thehackernews.com/2024/12/new-us-doj-rule-halts-bulk-data.html
π24π10π₯7π3
The U.S. Treasury just sanctioned two major entitiesβone Iranian and one Russianβfor meddling in the 2024 presidential election through AI-powered disinformation campaigns.
Hereβs what they did:
π οΈ Created deepfakes and synthetic content using AI.
π Built a network of 100+ fake news sites to spread misinformation.
π° Backed by intelligence agencies like Iran's IRGC and Russia's GRU.
Learn the latest tactics π https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html
Hereβs what they did:
π οΈ Created deepfakes and synthetic content using AI.
π Built a network of 100+ fake news sites to spread misinformation.
π° Backed by intelligence agencies like Iran's IRGC and Russia's GRU.
Learn the latest tactics π https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html
π22π10π±8π€3π€―1
β οΈ Click. Click. Hacked?
DoubleClickjacking: A new clickjacking variant that stealthily exploits timing gaps between clicks to hijack accounts.
This attack bypasses protections like X-Frame-Options and SameSite cookies.
Read the article: https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
DoubleClickjacking: A new clickjacking variant that stealthily exploits timing gaps between clicks to hijack accounts.
This attack bypasses protections like X-Frame-Options and SameSite cookies.
Read the article: https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
π€―42π₯16π6π3