#1 Most trusted publication for breaking cybersecurity and hacking news, insights, and analysis for information security professionals.thehackernews.com The InternetJoined October 2010
🚨 Developers Beware! A new social engineering scam is on the rise, luring software engineers with fake job interviews only to infect their systems with BeaverTail and InvisibleFerret backdoors #malware.
thehackernews.com/2024/04/bogus-…#cybersecurity#hacking
Multiple severe vulnerabilities discovered in Brocade SANnav SAN management application.
From insecure root access to lack of authentication and encryption, one flaw even allows unauthenticated remote attackers to log in as root!
Read: thehackernews.com/2024/04/severe…#cybersecurity
🛡️ Did you know 70% of successful breaches begin at the endpoint? Unprotected devices are gateways for devastating cyberattacks.
This guide shares 10 must-know tips, from identifying vulnerabilities to implementing robust security solutions: thehackernews.com/2024/04/10-cri…#infosec
🆘 Attention, Palo Alto Networks users!
A critical #vulnerability (CVE-2024-3400) in PAN-OS could expose your systems to remote code execution attacks.
Good news: Hotfixes and remediation steps available.
Read full advisory: thehackernews.com/2024/04/palo-a…#hacking#infosec
🚨 Attention #WordPress users!
A critical SQL injection #vulnerability (CVE-2024-27956) in the WP-Automatic plugin is being actively exploited. With a max severity of 9.9/10, this bug enables site takeovers and malicious activities.
Details: thehackernews.com/2024/04/hacker…#hacking
Most network attacks aren't ultra-sophisticated. They often use common tools that exploit multiple vulnerabilities.
A simulation shows how attackers can gain access through something as simple as a malicious email attachment.
thehackernews.com/2024/04/networ…#cybersecurity
The new #YARA search tool from @anyrun_app helps you quickly find relevant threats.
🔍 Scan the service's public #malware database using your own YARA rules to identify matching files. Explore the findings further in the sandbox.
Learn more ➡️ thehackernews.uk/yara-malware-s…
U.S. Department of Justice arrested two founders of #cryptocurrency mixer Samourai, seizing the service, for allegedly enabling over $2 billion in illegal transactions and laundering more than $100 million in criminal proceeds.
Learn more: thehackernews.com/2024/04/doj-ar…
CISOs face rising compliance requirements.
But compliance isn't just a "necessary evil" – it's a strategic tool for evaluating cyber risk, gaining budget and increasing customer confidence.
Learn how CISOs are turning compliance into a business enabler: thehackernews.com/2024/04/ciso-p…
🍪🔒 Google has once again delayed its plans to deprecate third-party tracking cookies in Chrome, now targeting the second half of 2024, this time due to regulatory reviews.
Click here to learn more: thehackernews.com/2024/04/google…#technews#privacy
New stealthy #malware campaign exploits 2 ZERO-DAY flaws in Cisco devices, enabling covert data collection & reconnaissance by a state-sponsored actor.
Details: thehackernews.com/2024/04/state-…
"Line Runner" and "Line Dancer" implants allow config changes and traffic capture.
UPDATE — Airbus CERT releases Python scripts to scan for the critical CrushFTP flaw (CVE-2024-4040) that allows remote code execution. The zero-day has been exploited in attacks against U.S. entities.
Check: thehackernews.com/2024/04/critic…#infosec
What to consider when evaluating tools to help activate & keep up with #CTEM?🧐
We got your answers right here⬇️
Check out @XMCyber_’s Buyer’s Guide to Meeting & Maintaining CTEM & start building consistent, actionable exposure remediation plans.
thn.news/ctem-buyers-gu…
U.S. Treasury Department has sanctioned two Iranian firms and four individuals for their involvement in malicious cyber activities targeting U.S. companies and government entities on behalf of the IRGC-CEC.
More details. 👇 thehackernews.com/2024/04/us-tre…#hacking#CyberSecurity
🕵️♂️ Heads up! Researchers have uncovered a sneaky attack delivering #malware called SSLoad through phishing emails. This cunning malware infiltrates systems, steals sensitive data, and relays it back to the attackers.
Read: thehackernews.com/2024/04/resear…#cybersecurity#hacking
IT offboarding is my favorite task! Said no one, ever.
Automate 90% of IT manual offboarding tasks with Nudge Security. Discover ALL SaaS identities and automate steps to revoke access, including OAuth grants and non-SSO accounts.
Get started here: thn.news/automated-it-o…
🚨 New Player on the Block: APT73 Ransomware Group Emerges!
Self-proclaimed as an "APT," this group has taken a spin from LockBit's playbook. Their first victim? Trifecta, a US customer service platform.
Learn more: rakeshkrish.medium.com/apt73-eraleig-…
via @RakeshKrish12
197K Followers 1K FollowingCofounder @hackinghub_io, Advisor @Trick3st @CaidoIO. I hack companies and make content about it. Bug Bounty Village & #NahamCon organizer. ex @hacker0x01🇮🇷
207K Followers 6K FollowingFounder @Binary_Defense @TrustedSec Co-Owner https://t.co/HQC75WhdJh. @WeHackHealth Podcast. Fam First/Hacker/CSO/USMC/Intel/Fitness. Motto: Make world a better place
161K Followers 6K FollowingThe leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world...Unleash Ingenuity™
88K Followers 2K FollowingHacker, bounties, entrepreneur. I help cybersecurity companies produce amazing content for their blogs and socials. Founder of: @haksecio and @hacker_content
0 Followers 31 FollowingMarketing strategist passionate about #opensource and developer communities. Sharing insights and strategies to empower #opensourcebusinesses
61 Followers 807 FollowingNos dedicamos a simplificar y enseñar sobre el apasionante mundo de la tecnología blockchain, Bitcoin y el trading de criptomonedas.
220 Followers 22 FollowingSoftware Engineering, DevOps, SaaS, Security and AWS Solutions Architecture (I work for @AWSCloud -but my opinions are my own)
197K Followers 1K FollowingCofounder @hackinghub_io, Advisor @Trick3st @CaidoIO. I hack companies and make content about it. Bug Bounty Village & #NahamCon organizer. ex @hacker0x01🇮🇷
207K Followers 6K FollowingFounder @Binary_Defense @TrustedSec Co-Owner https://t.co/HQC75WhdJh. @WeHackHealth Podcast. Fam First/Hacker/CSO/USMC/Intel/Fitness. Motto: Make world a better place
161K Followers 6K FollowingThe leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world...Unleash Ingenuity™
101K Followers 2 FollowingMonitor your external network, search the Internet of Things and perform empirical market research. You can also find us on https://t.co/nPLFbFy8R5
52K Followers 1K FollowingONE autonomous platform to prevent, detect, respond, and hunt. Do more, save time, secure your enterprise: https://t.co/N75g1HAnCs 🐱💻
289K Followers 3K FollowingThe only official HackerOne Twitter account.
Peace of mind from security's greatest minds. #HackForGood #togetherwehitharder
2K Followers 701 FollowingSmart, secure workflows for your whole team. Get started with our free, fully-loaded Community Edition - https://t.co/qmewAtzVuo
84 Followers 125 FollowingEntro Security is the #SecretsManagement platform that finally lets you take control of your secrets across vaults, code, chats and platforms.
177 Followers 192 FollowingSyxsense is world’s first IT and security solution provider to offer patch management, vulnerability scans, and Endpoint Detection and Response (EDR).
99 Followers 101 FollowingHated by website spoofers, loved by your customers. Memcyco: the only brandjacking defense able to eliminate the ‘window of exposure’ of ‘fake website up’.
152K Followers 1K FollowingThe finance company that's helping members get their money right. Bank, borrow, and invest — all in one app. NMLS #1121636
Questions: @SoFiSupport
583 Followers 680 Following♟️Stratégie et manipulation de masses. Pourquoi créer une crise de confiance mondiale ? les raisons sont diverses sur différents plans !
202 Followers 64 FollowingCloud Data Security Redefined.
Sentra’s multi-cloud #datasecurity platform, discovers, classifies and prioritizes the most business-critical data security risks
663 Followers 175 FollowingAppOmni is the pioneer of SaaS security (#SSPM). Our comprehensive platform prevents security gaps and data leakage exposure across your entire SaaS estate.
3K Followers 58 FollowingVanta is the leading trust management platform that helps simplify & centralize security for organizations of all sizes.
SOC 2, ISO 27001, HIPAA, GDPR, & more.
2K Followers 548 FollowingSafeBreach simulates hacker breach methods to quantify risks and validate how well your security controls can stand up to a breach. Funded by @Sequoia
6K Followers 2K FollowingVaronis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification, and threat analytics.
3K Followers 524 FollowingSee, Protect and Manage every asset. Reveal every threat and manage risk.
Armis is THE asset intelligence cybersecurity company.
5K Followers 972 FollowingThe leading API security company, providing the context needed to discover APIs, stop attacks, and remediate vulnerabilities to accelerate business innovation.
705 Followers 6 FollowingProtect your APIs from data leakage, authorization issues, abuse, misuse and data corruption with no agents and no network modifications.
2K Followers 853 FollowingXM Cyber uncovers hidden attack paths to your critical assets in cloud & on-prem, so you can cut them off at key junctures & quickly eradicate risk #SeeAllWays
33K Followers 556 FollowingHacker, Bug Bounty Hunter - Top 5 All Time @Hacker0x01, Top 20 @BugCrowd. Live Hacking Events Winner & Founder of @shockwave_sec - Attack Surface Management
512 Followers 110 FollowingSilverfort presents an innovative platform capable of securing every authentication scenario across the entire corporate network and cloud infrastructure.
3K Followers 481 FollowingWorld record breaking IT infrastructure supporting 100's of millions of online users, Gcore is a Luxembourg based global IT solutions provider
4.0M Followers 24 FollowingDogecoin is an open source peer-to-peer cryptocurrency, favored by shibas worldwide. Elon Musk thinks we're pretty cool. [RTs are not endorsements]
379 Followers 257 FollowingCyolo gives enterprises of all types the visibility & control they need to securely manage who can connect to what and what they can do while they’re connected.