Project

Profile

Help

Task #155239 » ⚡ THN Weekly Recap_ Top Cybersecurity Threats, Tools and Tips [27 Jan] - 2025-01-27T15_00_21Z.eml

Anonymous, 01/27/2025 04:00 PM

 
X-He-Spam-Score: -2.1
Return-Path: <bounce-mc.us12_224823558.17990521-9ec5472950@mail50.sea172.mcdlv.net>
Delivered-To: dropbox@plan.io
Received: from m.launch.gmbh ([127.0.0.1])
by m.launch.gmbh with LMTP
id WNNwBHefl2ewlyoAJzdhvw
(envelope-from <bounce-mc.us12_224823558.17990521-9ec5472950@mail50.sea172.mcdlv.net>)
for <dropbox@plan.io>; Mon, 27 Jan 2025 16:00:07 +0100
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on m.launch.gmbh
X-Spam-Level:
X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
DKIM_VALID,DKIM_VALID_AU,DMARC_PASS,HTML_MESSAGE,MIME_QP_LONG_LINE,
RCVD_IN_DNSWL_NONE,SPF_FAIL,SPF_FAIL_IGNORE,SPF_HELO_NONE,
T_KAM_HTML_FONT_INVALID,T_SCC_BODY_TEXT_LINE autolearn=ham
autolearn_force=no version=3.4.6
X-Spam-Report:
* -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at
* https://www.dnswl.org/, no trust
* [64.90.62.163 listed in list.dnswl.org]
* -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
* [score: 0.0000]
* -0.1 DMARC_PASS DMARC check passed
* 5.0 SPF_FAIL SPF check failed
* 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record
* 0.0 HTML_MESSAGE BODY: HTML included in message
* 0.0 MIME_QP_LONG_LINE RAW: Quoted-printable line longer than 76
* chars
* -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
* author's domain
* 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
* valid
* -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
* -0.0 T_SCC_BODY_TEXT_LINE No description available.
* 0.0 T_KAM_HTML_FONT_INVALID Test for Invalidly Named or Formatted
* Colors in HTML
* -5.0 SPF_FAIL_IGNORE Planio Inbox does not consider SPF FAILS on
* redirects
X-Spam-Score: -2.1
Authentication-Results: m.launch.gmbh; dmarc=pass (p=none dis=none) header.from=thehackernews.com
Authentication-Results: m.launch.gmbh; spf=fail smtp.mailfrom=mail50.sea172.mcdlv.net
Authentication-Results: m.launch.gmbh;
dkim=pass (2048-bit key; unprotected) header.d=thehackernews.com header.i=newsletter@thehackernews.com header.a=rsa-sha256 header.s=k3 header.b=HLI+fYwd;
dkim-atps=neutral
Envelope-to: inbox+rlxc+36be+hoax-clearing-center@plan.io
Received: from pdx1-sub0-mail-mx211.dreamhost.com (fltr-in1.mail.dreamhost.com [64.90.62.163])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
(No client certificate requested)
by m.launch.gmbh (Postfix) with ESMTPS id 002C8168873
for <inbox+rlxc+36be+hoax-clearing-center@plan.io>; Mon, 27 Jan 2025 16:00:05 +0100 (CET)
Received: from postfix-inbound-v2-10.inbound.mailchannels.net (inbound-egress-7.mailchannels.net [23.83.220.5])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
(No client certificate requested)
by pdx1-sub0-mail-mx211.dreamhost.com (Postfix) with ESMTPS id 4YhWmg0GXcz4t6M
for <lapor@turnbackhoax.id>; Mon, 27 Jan 2025 07:00:02 -0800 (PST)
ARC-Seal: i=1; s=arc-2022; d=mailchannels.net; t=1737990001; a=rsa-sha256;
cv=none;
b=tsXUUJ3NJYJfegK1pARedUr6ariIEknkKRGznjo54DncZm7LqE+JAOvR0imtwLNryINKKM
UA/Cq/l1F0uhOw9X4NCMwfkBl6jNcmtelq0zqrNTpL5rj6V8BcEx1ZTvrRcg7IRwGm93kQ
aPIApD6eEQgtPV/CFjAN81/EwDF+t5A7YXf+Iao4Pt6CI/fpMPRtU0EX9g0CkuVsqWaRQ8
ok3yY3Rpkf0ol346NJeelektd+YfieW38TpnLOT/W6KwvttXTbsr5yNEbf7LB6r7maOcZH
PfPfc8Cp3GmrdRkIMIh2LE12z3ULItQB4zLn+Veikiz9NGDjh/IXMINg8vayZQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed;
d=mailchannels.net;
s=arc-2022; t=1737990001;
h=from:from:reply-to:reply-to:subject:subject:date:date:
message-id:message-id:to:to:cc:mime-version:mime-version:
content-type:content-type:list-id:list-unsubscribe:
list-unsubscribe-post:dkim-signature;
bh=6h3qXFVMAnUnA6qWG6pgFmVsHN06mvmcVPFaVXuFG2Y=;
b=QS2+oRnTvVP1DxT6/oTjUKN0+jraXe0LL+W9iM2Fiu0gcqul9f8B8UbP8NDsa4v7yaG5mV
yjBS1PRiLnkx7uVyN/AzzAtjmUWk3HuhxVlv1uSoNXKGxWPDI6pUXFAGroXuy1dFxPzmBu
FcxjJwpMwQ3C4dH4yhHQaJbh4u+ap7UEQO0qaKViVoPdOrPSFm15zuzflz+qYpPhpUwydc
Ozr+I4GyatR5RIgDjGkwyplxvVcM4r7KHomu/f9lOjyeBdMDbtXyZzvra/id4Smg/NRVZj
FgWm2/x/GP1dvVE0f+kY0+GdCISXuvPXgQM71ZyQuPfftT/sG7r129mCW20p4A==
ARC-Authentication-Results: i=1;
inbound-rspamd-d95797564-mk5xg;
none
X-VR-STATUS: SPAM
X-Message-ID: kFBajzoQZf3liVDvKlAXpslk
Received: from mail50.sea172.mcdlv.net (mail50.sea172.mcdlv.net
[148.105.10.50])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384)
by 100.112.242.94 (trex/6.10.3);
Mon, 27 Jan 2025 15:00:01 +0000
Authentication-Results: inbound.mailchannels.net;
spf=pass
smtp.mailfrom=bounce-mc.us12_224823558.17990521-9ec5472950@mail50.sea172.mcdlv.net;
dkim=temperror header.d=thehackernews.com;
dmarc=fail (policy=none; pct=100; status=none);
arc=none
Received-SPF: pass (dmarc-service-5d67ddd967-ch8wf: domain of
mail50.sea172.mcdlv.net designates 148.105.10.50 as permitted sender)
client-ip=148.105.10.50;
envelope-from=bounce-mc.us12_224823558.17990521-9ec5472950@mail50.sea172.mcdlv.net;
helo=mail50.sea172.mcdlv.net;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=thehackernews.com;
s=k3; t=1737990000; x=1738260000; i=newsletter@thehackernews.com;
bh=6h3qXFVMAnUnA6qWG6pgFmVsHN06mvmcVPFaVXuFG2Y=;
h=Subject:From:Reply-To:To:Date:Message-ID:X-MC-User:Feedback-ID:
List-ID:List-Unsubscribe:List-Unsubscribe-Post:Content-Type:
MIME-Version:CC:Date:Subject:From;
b=HLI+fYwd5nkJR4bVPukD2B7vKtOd6ne3Bc/twxMndCvFs0ydCvDPkR1URhYEmoQCN
oU0F5SigqiXotdCGZvD6f7FqxY6Hh6qE6FPmWxQP3X0RR4xrmy0xlvaSF0gngoC+3G
fBR8t7cUQ1bssDyG1Vylmma0AQ3vX5Nl4SKsWnWYoLZ++aWVZgLWqRTtk1jLBPwjxS
9GlEyvHS0fjw9aqrhErraCjlrwjPqb/x7dwp+bCDv//WpcOP+RCJbPf2fwE8+6YnKN
e+xwkjuBsbpVGLOhPKhTK6Cv+gNbnBHU6SArtOoVRJMrzi52Z757z+ro6MiwNYt8WI
WfDERJnApYCHw==
Subject: =?utf-8?Q?=E2=9A=A1=20THN=20Weekly=20Recap=3A=20Top=20Cybersecurity=20Threats=2C=20Tools=20and=20Tips=20=5B27=20Jan=5D?=
From: The Hacker News <newsletter@thehackernews.com>
Reply-To: =?utf-8?Q?The=20Hacker=20News?= <newsletter@thehackernews.com>
To: <lapor@turnbackhoax.id>
Date: Mon, 27 Jan 2025 14:59:54 +0000
Message-ID: <f96f7fc0a6a553a99756dd2d3.9ec5472950.20250127145929.43bf0ccf90.4a8dff33@mail50.sea172.mcdlv.net>
X-Mailer: Mailchimp Mailer - **CID43bf0ccf909ec5472950**
X-Campaign: mailchimpf96f7fc0a6a553a99756dd2d3.43bf0ccf90
X-campaignid: mailchimpf96f7fc0a6a553a99756dd2d3.43bf0ccf90
X-Report-Abuse: Please report abuse for this campaign here: https://mailchimp.com/contact/abuse/?u=f96f7fc0a6a553a99756dd2d3&id=43bf0ccf90&e=9ec5472950
X-MC-User: f96f7fc0a6a553a99756dd2d3
Feedback-ID: 224823558:224823558.17990521:us12:mc
List-ID: f96f7fc0a6a553a99756dd2d3mc list <f96f7fc0a6a553a99756dd2d3.6087714.list-id.mcsv.net>
X-Accounttype: pr
List-Unsubscribe: <https://thehackernews.us12.list-manage.com/unsubscribe?u=f96f7fc0a6a553a99756dd2d3&id=992467b2c4&t=h&e=9ec5472950&c=43bf0ccf90>, <mailto:unsubscribe-mc.us12_f96f7fc0a6a553a99756dd2d3.43bf0ccf90-9ec5472950@unsubscribe.mailchimpapp.net?subject=unsubscribe>
List-Unsubscribe-Post: List-Unsubscribe=One-Click
Content-Type: multipart/alternative; boundary="_----------=_MCPart_1126807581"
MIME-Version: 1.0

This is a multi-part message in MIME format

--_----------=_MCPart_1126807581
Content-Type: text/plain; charset="utf-8"; format="fixed"
Content-Transfer-Encoding: quoted-printable

https://thehackernews.com/
https://thehackernews.com/

Welcome to your weekly cybersecurity scoop! Ever thought about how the sam=
e AI meant to protect our hospitals could also compromise them? This week=
=2C we=E2=80=99re breaking down the sophisticated world of AI-driven threa=
ts=2C key updates in regulations=2C and some urgent vulnerabilities in hea=
lthcare tech that need our attention.

As we unpack these complex topics=2C we'll equip you with sharp insights t=
o navigate these turbulent waters. Curious about the solutions? They=E2=80=
=99re smarter and more unexpected than you might think. Let=E2=80=99s dive=
in.


** =E2=9A=A1 Threat of the Week
------------------------------------------------------------

Juniper Networks Routers Targeted by J-magic =E2=80=94 A new campaign targ=
eted enterprise-grade Juniper Networks routers (https://thehackernews.com/=
2025/01/custom-backdoor-exploiting-magic-packet.html) between mid-2023 and=
mid-2024 to infect them with a backdoor dubbed J-magic when certain preci=
se conditions. The malware is a variant of a nearly 25-year-old=2C publicl=
y available backdoor referred to as cd00r=2C and is designed to establish=
a reverse shell to an attacker-controlled IP address and port. Semiconduc=
tor=2C energy=2C manufacturing=2C and information technology (IT) sectors=
were the most targeted.


https://thehackernews.uk/non-human-identities-ebook-eb

The Human Touch In Creating and Securing Non-Human Identities (https://the=
hackernews.uk/non-human-identities-ebook-eb)

In today's digital landscape=2C a new class of identities has emerged alon=
gside traditional human users: non-human identities (NHIs).This ebook expl=
ores everything you need to know about managing NHIs in your environment.=
(https://thehackernews.uk/non-human-identities-ebook-eb)
Download (https://thehackernews.uk/non-human-identities-ebook-eb)


** =F0=9F=94=94 Top News
------------------------------------------------------------

* Palo Alto Firewalls Found Vulnerable to Firmware Exploits =E2=80=94 An a=
nalysis of three firewall models from Palo Alto Networks =E2=80=93 PA-3260=
=2C PA-1410=2C and PA-415 =E2=80=93 uncovered (https://thehackernews.com/2=
025/01/palo-alto-firewalls-found-vulnerable-to.html) that they are vulnera=
ble to known security flaws that could be exploited to achieve Secure Boot=
bypass and modify device firmware. In response to the findings=2C Palo Al=
to Networks said exploiting the flaws require an attacker to first comprom=
ise PAN-OS software through other means and obtain elevated privileges to=
access or modify the BIOS firmware. It also said it will be working with=
third-party vendors to develop firmware updates for some of them.
* PlushDaemon Linked to Supply Chain Compromise of South Korean VPN Provid=
er =E2=80=94 A never-before-seen China-aligned hacking group named PlushDa=
emon (https://thehackernews.com/2025/01/plushdaemon-apt-targets-south-kore=
an.html) carried out a supply chain attack targeting a South Korean virtua=
l private network (VPN) provider in 2023 to deliver malware known as SlowS=
tepper=2C a fully-featured backdoor with an extensive set of information g=
athering features. The threat actor is also said to have exploited an unkn=
own vulnerability in Apache HTTP servers and conducted adversary-in-the-mi=
ddle (AitM) attacks to breach other targets of interest. Active since at l=
east 2019=2C the group has singled out individuals and entities in China=
=2C Taiwan=2C Hong Kong=2C South Korea=2C the United States=2C and New Zea=
land.
* Mirai Botnet Launches Record 5.6 Tbps DDoS Attack =E2=80=94 Cloudflare r=
evealed that a Mirai botnet comprising over 13=2C000 IoT devices was respo=
nsible (https://thehackernews.com/2025/01/mirai-botnet-launches-record-56-=
tbps.html) for a record-breaking 5.6 Terabit per second (Tbps) distributed=
denial-of-service (DDoS) attack aimed at an unnamed internet service prov=
ider (ISP) from Eastern Asia. The attack lasted about 80 seconds. The web=
infrastructure company said the average unique source IP address observed=
per second was 5=2C500=2C and the average contribution of each IP address=
per second was around 1 Gbps.
* Over 100 Flaws in LTE and 5G Implementations =E2=80=94 A group of academ=
ics has disclosed (https://thehackernews.com/2025/01/ransacked-over-100-se=
curity-flaws-found.html) 119 security vulnerabilities impacting LTE and 5G=
implementations=2C Open5GS=2C Magma=2C OpenAirInterface=2C Athonet=2C SD-=
Core=2C NextEPC=2C srsRAN=2C that could be exploited by an attacker to dis=
rupt access to service and even gain a foothold into the cellular core net=
work. Some of the identified vulnerabilities could be weaponized to breach=
the cellular core network and leverage that access to monitor cellphone l=
ocation and connection information for all subscribers at a city-wide leve=
l=2C carry out targeted attacks on specific subscribers=2C and perform fur=
ther malicious actions on the network itself.
* Ex-CIA Analyst Pleads Guilty to Sharing Top Secret Docs =E2=80=94 Asif W=
illiam Rahman=2C a former analyst working for the U.S. Central Intelligenc=
e Agency (CIA)=2C pleaded guilty (https://thehackernews.com/2025/01/ex-cia=
-analyst-pleads-guilty-to-sharing.html) to transmitting top secret Nationa=
l Defense Information (NDI) to unauthorized personnel and attempted to cov=
er up the activity. The incident=2C which took place in October 2024=2C in=
volved Rahman sharing documents prepared by the National Geospatial-Intell=
igence Agency and the National Security Agency. They were related to Israe=
l's plans to attack Iran=2C and were subsequently shared on Telegram by an=
account called Middle East Spectator. He has pleaded guilty to two counts=
of willful retention and transmission of classified information related t=
o the national defense. He is expected to be sentenced on May 15=2C 2025=
=2C potentially facing a maximum penalty of 10 years in prison.


** =EF=B8=8F=F0=9F=94=A5 Trending CVEs
------------------------------------------------------------

Your go-to software could be hiding dangerous security flaws=E2=80=94don=
=E2=80=99t wait until it=E2=80=99s too late! Update now and stay ahead of=
the threats before they catch you off guard.

This week=E2=80=99s list includes =E2=80=94 CVE-2025-23006 (https://thehac=
kernews.com/2025/01/sonicwall-urges-immediate-patch-for.html) (SonicWall)=
=2C CVE-2025-20156 (https://thehackernews.com/2025/01/cisco-fixes-critical=
-privilege.html) (Cisco Meeting Management)=2C CVE-2025-21556 (https://the=
hackernews.com/2025/01/oracle-releases-january-2025-patch-to.html) (Oracle=
Agile Product Lifecycle Management Framework)=2C CVE-2025-0411 (https://w=
ww.zerodayinitiative.com/advisories/ZDI-25-045/) (7-Zip)=2C CVE-2025-21613=
(https://www.cve.org/CVERecord?id=3DCVE-2025-21613) (go-git)=2C CVE-2024-=
32444 (https://patchstack.com/articles/unauthenticated-privilege-escalatio=
n-vulnerability-patched-in-real-home-theme/) (RealHomes theme for WordPres=
s)=2C CVE-2024-32555 (https://patchstack.com/articles/unauthenticated-priv=
ilege-escalation-vulnerability-patched-in-real-home-theme/) (Easy Real Est=
ate plugin)=2C CVE-2016-0287 (https://blog.silentsignal.eu/2025/01/21/ibm-=
acs-password-dump/) (IBM i Access Client Solutions)=2C CVE-2024-9042
(https://www.akamai.com/blog/security-research/2024-january-kubernetes-log=
-query-rce-windows) (Kubernetes).


** =F0=9F=93=B0 Around the Cyber World
------------------------------------------------------------

* India and the U.S. Sign Cybercrime MoU =E2=80=94 India and the United St=
ates have signed a memorandum of understanding (MoU) to bolster cooperatio=
n in cybercrime investigations. "The MoU allows the respective agencies of=
the two countries to step up the level of cooperation and training with r=
espect to the use of cyber threat intelligence and digital forensics in cr=
iminal investigations=2C" the Indian Ministry of External Affairs (MEA) sa=
id (https://www.mea.gov.in/press-releases.htm?dtl/38924/India_and_US_sign_=
MoU_on_Cybercrime_Investigations) in a statement.
* Critical Security Flaws in ABB ASPECT-Enterprise=2C NEXUS=2C and MATRIX=
Products =E2=80=94 More than a 100 security flaws (https://global.abb/gro=
up/en/technology/cyber-security/alerts-and-notifications) have been disclo=
sed (https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-01) in AB=
B ASPECT-Enterprise=2C NEXUS=2C and MATRIX series of products that could e=
nable an attacker to disrupt operations or execute remote code. Gjoko Krst=
ikj of Zero Science Lab has been credited with discovering and reporting t=
he flaws.
* 91% of Exposed Exchange Server Instances Still Vulnerable to ProxyLogon=
=E2=80=94 One of the vulnerabilities exploited by the China-linked Salt T=
yphoon hacking group for initial access is CVE-2021-26855 (aka ProxyLogon)=
=2C a nearly four-year-old flaw in Microsoft Exchange Server. According to=
a new analysis from cybersecurity company Tenable=2C 91% of the nearly 30=
=2C000 external-facing instances of Exchange vulnerable to CVE-2021-26855=
have not been updated to close the defect to date. "Salt Typhoon is known=
for maintaining a stealthy presence on victim networks and remaining unde=
tected for a significant time period=2C" it said (https://www.tenable.com/=
blog/salt-typhoon-an-analysis-of-vulnerabilities-exploited-by-this-state-s=
ponsored-actor) .
* IntelBroker Resigns from BreachForums =E2=80=94 The threat actor known a=
s IntelBroker has announced (https://x.com/MonThreat/status/18828969448061=
91521) his resignation as the owner of an illicit cybercrime forum called=
BreachForums=2C citing a lack of time. The development marks the latest t=
wist in the tumultuous history of the online criminal bazaar=2C which has=
been the subject of law enforcement scrutiny=2C resulting in a takedown o=
f its infrastructure (https://thehackernews.com/2024/05/breachforums-retur=
ns-just-weeks-after.html) and the arrest of its previous administrators. I=
ts original creator and owner Conor Brian Fitzpatrick (aka Pompompurin) wa=
s sentenced (https://thehackernews.com/2024/01/breachforums-founder-senten=
ced-to-20.html) to time served and 20 years of supervised release exactly=
a year ago. However=2C newly filed court documents show (https://www.cour=
tlistener.com/docket/67597382/united-states-v-fitzpatrick/) that his sente=
nce has been vacated -- i.e.=2C declared void. "While released
on bond awaiting sentencing=2C Fitzpatrick violated his conditions of rele=
ase immediately by secretly downloading a virtual private network=2C which=
he then used virtually every day to access the Internet without the knowl=
edge of his probation officer=2C" the document reads. "Not only did Fitzpa=
trick commit serious offenses=2C but he also showed a lack of remorse=2C j=
oking about committing additional crimes even after entering a guilty plea=
=2E"
* Cloudflare CDN Bug Leaks User Locations =E2=80=94 A new piece of researc=
h (https://gist.github.com/hackermondev/45a3cdfa52246f1d1201c1e8cdef6117)=
from a 15-year-old security researcher who goes by the name Daniel has un=
covered a novel "deanonymization attack" in the widely used Cloudflare con=
tent delivery network (CDN) that can expose someone's location by sending=
them an image on platforms like Signal=2C Discord=2C and X. The flaw allo=
ws an attacker to extract the location of any target within a 250-mile rad=
ius when a vulnerable app is installed on a target's phone=2C or as a back=
ground application on their laptop=2C simply by sending a specially-crafte=
d payload. Using either a one-click or zero-click approach=2C the attack t=
akes advantage of the fact that Cloudflare stores cache copies of frequent=
ly accessed content on data centers located in close proximity to the user=
s to improve performance. The security researcher developed a Teleport too=
l that let them check which of Cloudflare's data centers had
cached an image=2C which allowed them to triangulate the approximate locat=
ion a Discord=2C Signal=2C or X user might be in. Although the specific is=
sue was closed=2C Daniel noted that the fix could be bypassed using a VPN.=
While the geolocation capability of the attack is not precise=2C it can p=
rovide enough information to infer the geographic region where a person li=
ves=2C and use it as a stepping stone for follow-on intelligence gathering=
=2E "The attack leverages fundamental design decisions in caching and push n=
otification systems=2C demonstrating how infrastructure meant to enhance p=
erformance can be misused for invasive tracking=2C" the researcher said.
* Belsen Group Leaks Fortinet FortiGate Firewall Configs =E2=80=94 A littl=
e-known hacking group named Belsen Group has leaked (https://www.cloudsek.=
com/blog/15k-fortigate-firewall-configs-leaked-by-belsen-group-dumped-usin=
g-zero-day-in-2022) configuration data for over 15=2C000 Fortinet FortiGat=
e firewalls on the dark web for free. This includes configurations and pla=
intext VPN user credentials=2C device serial numbers=2C models=2C and othe=
r data. An analysis (https://doublepulsar.com/2022-zero-day-was-used-to-ra=
id-fortigate-firewall-configs-somebody-just-released-them-a7a74e0b0c7f) of=
the data dump conducted by security researcher Kevin Beaumont has reveale=
d that the configuration data has likely been put together by exploiting C=
VE-2022-40684 (https://thehackernews.com/2022/10/fortinet-warns-of-active-=
exploitation.html) =2C an authentication bypass zero-day vulnerability dis=
closed in October 2022=2C as a zero-day. Of the 15=2C469 distinct affected=
IP addresses=2C 8=2C469 IPs have been found
(https://censys.com/fortigate-config-leak-impact/) to be still online and=
reachable in scans. As many as 5=2C086 IPs are continuing to expose the c=
ompromised FortiGate login interfaces. A majority of the exposures are in=
Mexico=2C Thailand=2C and the U.S. "If your organization has consistently=
adhered to routine best practices in regularly refreshing security creden=
tials and taken the recommended actions in the preceding years=2C the risk=
of the organization's current config or credential detail in the threat a=
ctor=E2=80=99s disclosure is small=2C" Fortinet said (https://www.fortinet=
=2Ecom/blog/psirt-blogs/analysis-of-threat-actor-data-posting) in response t=
o the disclosure. The disclosure comes as another critical flaw (https://w=
ww.kroll.com/en/insights/publications/cyber/fortinet-active-exploitation-c=
ritical-zero-day-vulnerability) in FortiGate devices (CVE-2024-55591 (http=
s://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html) ak=
a Console Chaos) has come under active exploitation in the
wild since November 1=2C 2024.


** =F0=9F=8E=A5 Expert Webinar
------------------------------------------------------------

* No More Trade-Offs: Secure Code at Full Speed (https://thehacker.news/de=
vsecops-start-left-appsec?source=3Drecap) =E2=80=94 Tired of security slow=
ing down development=E2=80=94or risky shortcuts putting you at risk? Join=
Sarit Tager=2C VP of Product Management at Palo Alto Networks=2C in this=
must-attend webinar to discover how to break the Dev-Sec standoff. Learn=
how to embed smart=2C seamless security guardrails into your DevOps pipel=
ine=2C prioritize code issues with full ecosystem context=2C and replace=
=E2=80=9Cshift left=E2=80=9D confusion with the clarity of =E2=80=9Cstart=
left=E2=80=9D success. If speed and security feel like a trade-off=2C thi=
s webinar will show you how to have both. Save your spot now.
* The Clear Roadmap to Identity Resilience (https://thehacker.news/buildin=
g-resilient-identity?source=3Dlinkedin) =E2=80=94 Struggling with identity=
security gaps that increase risks and inefficiencies? Join Okta=E2=80=99s=
experts=2C Karl Henrik Smith and Adam Boucher=2C to discover how the Secu=
re Identity Assessment (SIA) delivers a clear=2C actionable roadmap to str=
engthen your identity posture. Learn to identify high-risk gaps=2C streaml=
ine workflows=2C and adopt a scalable=2C phased approach to future-proofin=
g your defenses. Don=E2=80=99t let identity debt hold your organization ba=
ck=E2=80=94gain the insights you need to reduce risk=2C optimize operation=
s=2C and secure business outcomes.

P.S. Know someone who could use this? Share it.


** =F0=9F=94=A7 Cybersecurity Tools
------------------------------------------------------------

* Extension Auditor (https://www.extensionauditor.com/) : With cyber threa=
ts becoming more sophisticated=2C tools like Extension Auditor are essenti=
al for maintaining online safety. This tool evaluates your browser extensi=
ons for security and privacy risks=2C providing a clear analysis of permis=
sions and potential vulnerabilities. Extension Auditor helps you identify=
and manage extensions that could expose you to danger=2C ensuring your br=
owsing is secure and your data remains private.
* AD Threat Hunting Tool (https://github.com/MHaggis/PowerShell-Hunter/tre=
e/main/AD-ThreatHunting) : It is a simple yet powerful PowerShell tool tha=
t helps detect suspicious activities in your Active Directory=2C like pass=
word spray attacks or brute force attempts. It provides real-time alerts=
=2C smart analysis of attack patterns=2C and detailed reports with easy ex=
port options. With built-in testing to simulate attacks=2C this tool is a=
must-have for keeping your AD environment secure and identifying threats=
quickly.


** =F0=9F=94=92 Tip of the Week
------------------------------------------------------------

Essential Network Security Practices =E2=80=94 To effectively secure your=
network=2C you don=E2=80=99t need complex solutions. Keep your network sa=
fe with these easy tips: Use a VPN like NordVPN to protect your data and k=
eep your online activities private. Make sure your firewall is turned on t=
o stop unwanted access. Keep your software and devices updated to fix secu=
rity weaknesses. Choose strong=2C unique passwords for all your accounts a=
nd consider using a password manager to keep track of them. Teach yourself=
and others how to spot phishing scams to avoid giving away sensitive info=
rmation. These basic actions can greatly improve your network=E2=80=99s se=
curity and are simple to implement.


** Conclusion
------------------------------------------------------------

As we close this week's newsletter=2C let's focus on the crucial issue of=
vulnerabilities in healthcare technology. These gaps highlight a pressing=
need for enhanced security measures and more dynamic regulatory framework=
s that can quickly adapt to new threats. How can we fortify our defenses t=
o better protect critical infrastructure? Your expertise is essential as w=
e tackle these challenges and push for more effective solutions. Let=E2=80=
=99s keep the dialogue open and continue to drive progress in our field. S=
tay informed and engaged.

View email in browser (https://mailchi.mp/8c066aa8f96d/6xt0udv3ug-17990521=
?e=3D9ec5472950)
The Hacker News . Pearl Omaxe Tower . 810/8 Nsp=2C Pitampura . New Delhi=
=2C Delhi 110034 . India
update your preferences (https://thehackernews.us12.list-manage.com/profil=
e?u=3Df96f7fc0a6a553a99756dd2d3&id=3D992467b2c4&e=3D9ec5472950&c=3D43bf0ccf9=
0) or unsubscribe (https://thehackernews.us12.list-manage.com/unsubscribe?=
u=3Df96f7fc0a6a553a99756dd2d3&id=3D992467b2c4&t=3Db&e=3D9ec5472950&c=3D43bf0=
ccf90)
--_----------=_MCPart_1126807581
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE html><html xmlns=3D"http://www.w3.org/1999/xhtml" xmlns:v=3D"urn=
:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-microsoft-com:office:of=
fice"><head>
<!--[if gte mso 15]>
<xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
<o:PixelsPerInch>96</o:PixelsPerInch>
</o:OfficeDocumentSettings>
</xml>
<![endif]-->
<meta charset=3D"UTF-8" />
<meta http-equiv=3D"X-UA-Compatible" content=3D"IE=3Dedge" />
<meta name=3D"viewport" content=3D"width=3Ddevice-width=2C initial-scale=
=3D1" />
<title>=E2=9A=A1 THN Weekly Recap: Top Cybersecurity Threats=2C Tools and=
Tips [27 Jan]</title>
<link rel=3D"preconnect" href=3D"https://fonts.googleapis.com" />
<link rel=3D"preconnect" href=3D"https://fonts.gstatic.com" crossorigin=3D=
"" />
<!--[if !mso]><!--><link rel=3D"stylesheet" type=3D"text/css" id=3D"newGo=
ogleFontsStatic" href=3D"https://fonts.googleapis.com/css?family=3DRoboto:=
400=2C400i=2C700=2C700i=2C900=2C900i" /><!--<![endif]--><style> =
img{-ms-interpolation-mode:bicubic;}
table=2C td{mso-table-lspace:0pt; mso-table-rspace:0pt;}
.mceStandardButton=2C .mceStandardButton td=2C .mceStandardButto=
n td a{mso-hide:all !important;}
p=2C a=2C li=2C td=2C blockquote{mso-line-height-rule:exactly;}
p=2C a=2C li=2C td=2C body=2C table=2C blockquote{-ms-text-size-=
adjust:100%; -webkit-text-size-adjust:100%;}
@media only screen and (max-width: 480px){
body=2C table=2C td=2C p=2C a=2C li=2C blockquote{-webkit-text=
-size-adjust:none !important;}
}
.mcnPreviewText{display: none !important;}
.bodyCell{margin:0 auto; padding:0; width:100%;}
.ExternalClass=2C .ExternalClass p=2C .ExternalClass td=2C .Exte=
rnalClass div=2C .ExternalClass span=2C .ExternalClass font{line-height:10=
0%;}
.ReadMsgBody{width:100%;} .ExternalClass{width:100%;}
a[x-apple-data-detectors]{color:inherit !important; text-decora=
tion:none !important; font-size:inherit !important; font-family:inherit !i=
mportant; font-weight:inherit !important; line-height:inherit !important;}
body{height:100%; margin:0; padding:0; width:100%; background:=
#ffffff;}
p{margin:0; padding:0;}
table{border-collapse:collapse;}
td=2C p=2C a{word-break:break-word;}
h1=2C h2=2C h3=2C h4=2C h5=2C h6{display:block; margin:0; padd=
ing:0;}
img=2C a img{border:0; height:auto; outline:none; text-decorat=
ion:none;}
a[href^=3D"tel"]=2C a[href^=3D"sms"]{color:inherit; cursor:d=
efault; text-decoration:none;}
li p {margin: 0 !important;}
.ProseMirror a {
pointer-events: none;
}
@media only screen and (max-width: 640px){
.mceClusterLayout td{padding: 4px !important;}
}
@media only screen and (max-width: 480px){
body{width:100% !important; min-width:100% !important; }
body.mobile-native {
-webkit-user-select: none; user-select: none; transiti=
on: transform 0.2s ease-in; transform-origin: top center;
}
body.mobile-native.selection-allowed a=2C body.mobile-nati=
ve.selection-allowed .ProseMirror {
user-select: auto;
-webkit-user-select: auto;
}
colgroup{display: none;}
img{height: auto !important;}
.mceWidthContainer{max-width: 660px !important;}
.mceColumn{display: block !important; width: 100% !importa=
nt;}
.mceColumn-forceSpan{display: table-cell !important; width=
: auto !important;}
.mceColumn-forceSpan .mceButton a{min-width:0 !important;}
.mceBlockContainer{padding-right:16px !important; padding-=
left:16px !important;}
.mceTextBlockContainer{padding-right:16px !important; padd=
ing-left:16px !important;}
.mceBlockContainerE2E{padding-right:0px; padding-left:0px;=
}
.mceSpacing-24{padding-right:16px !important; padding-left=
:16px !important;}
.mceImage=2C .mceLogo{width: 100% !important; height: auto=
!important;}
.mceFooterSection .mceText=2C .mceFooterSection .mceText p=
{font-size: 16px !important; line-height: 140% !important;}
}
div[contenteditable=3D"true"] {outline: 0;}
.ProseMirror h1.empty-node:only-child::before=2C
.ProseMirror h2.empty-node:only-child::before=2C
.ProseMirror h3.empty-node:only-child::before=2C
.ProseMirror h4.empty-node:only-child::before {
content: 'Heading';
}
.ProseMirror p.empty-node:only-child::before=2C .ProseMirror:e=
mpty::before {
content: 'Start typing...';
}
.mceImageBorder {display: inline-block;}
.mceImageBorder img {border: 0 !important;}
body=2C #bodyTable { background-color: rgb(249=2C 251=2C 255); }.mceText=
=2C .mcnTextContent=2C .mceLabel { font-family: Roboto=2C "Helvetica Neue"=
=2C Helvetica=2C Arial=2C sans-serif; }.mceText=2C .mcnTextContent=2C .mce=
Label { color: rgb(0=2C 0=2C 0); }.mceText h2 { margin-bottom: 0px; }.mceT=
ext h3 { margin-bottom: 0px; }.mceText p { margin-bottom: 0px; }.mceText u=
l { margin-bottom: 0px; }.mceText label { margin-bottom: 0px; }.mceText in=
put { margin-bottom: 0px; }.mceSpacing-12 .mceInput + .mceErrorMessage { m=
argin-top: -6px; }.mceText h2 { margin-bottom: 0px; }.mceText h3 { margin-=
bottom: 0px; }.mceText p { margin-bottom: 0px; }.mceText ul { margin-botto=
m: 0px; }.mceText label { margin-bottom: 0px; }.mceText input { margin-bot=
tom: 0px; }.mceSpacing-24 .mceInput + .mceErrorMessage { margin-top: -12px=
; }.mceInput { background-color: transparent; border: 2px solid rgb(208=2C=
208=2C 208); width: 60%; color: rgb(77=2C 77=2C 77); display: block; }.mc=
eInput[type=3D"radio"]=2C .mceInput[type=3D"checkbox"] { float: left; ma=
rgin-right: 12px; display: inline; width: auto !important; }.mceLabel > .m=
ceInput { margin-bottom: 0px; margin-top: 2px; }.mceLabel { display: block=
; }.mceText p=2C .mcnTextContent p { color: rgb(0=2C 0=2C 0); font-family:=
Roboto=2C "Helvetica Neue"=2C Helvetica=2C Arial=2C sans-serif; font-size=
: 16px; font-weight: normal; line-height: 1.5; mso-line-height-alt: 150%;=
text-align: center; direction: ltr; }.mceText h2=2C .mcnTextContent h2 {=
color: rgb(0=2C 0=2C 0); font-family: "Helvetica Neue"=2C Helvetica=2C Ar=
ial=2C Verdana=2C sans-serif; font-size: 25px; font-weight: bold; line-hei=
ght: 1.5; mso-line-height-alt: 150%; text-align: center; direction: ltr; }=
=2EmceText h3=2C .mcnTextContent h3 { color: rgb(0=2C 0=2C 0); font-family:=
"Helvetica Neue"=2C Helvetica=2C Arial=2C Verdana=2C sans-serif; font-siz=
e: 20px; font-weight: bold; line-height: 1.5; mso-line-height-alt: 150%; t=
ext-align: center; direction: ltr; }.mceText a=2C .mcnTextContent a { colo=
r: rgb(0=2C 0=2C 0); font-style: normal; font-weight: normal; text-decorat=
ion: underline; direction: ltr; }p.mcePastedContent=2C h1.mcePastedContent=
=2C h2.mcePastedContent=2C h3.mcePastedContent=2C h4.mcePastedContent { te=
xt-align: left; }.mceSectionBody .mceText h2=2C .mceSectionBody .mcnTextCo=
ntent h2 { }.mceSectionBody .mceText h3=2C .mceSectionBody .mcnTextContent=
h3 { }.mceSectionBody .mceText p=2C .mceSectionBody .mcnTextContent p { }=
=2EmceSectionBody .mceText a=2C .mceSectionBody .mcnTextContent a { font-sty=
le: normal; }.mceSectionFooter .mceText p=2C .mceSectionFooter .mcnTextCon=
tent p { }.mceSectionFooter .mceText a=2C .mceSectionFooter .mcnTextConten=
t a { font-style: normal; }
@media only screen and (max-width: 480px) {
.mceText p { margin: 0px; font-size: 16px !important; line-hei=
ght: 1.5 !important; mso-line-height-alt: 150%; }
}
@media only screen and (max-width: 480px) {
.mceText h2 { font-size: 25px !important; line-height: 1.5 !im=
portant; mso-line-height-alt: 150%; }
}
@media only screen and (max-width: 480px) {
.mceText h3 { font-size: 20px !important; line-height: 1.5 !im=
portant; mso-line-height-alt: 150%; }
}
@media only screen and (max-width: 480px) {
.mceBlockContainer { padding-left: 16px !important; padding-ri=
ght: 16px !important; }
}
@media only screen and (max-width: 480px) {
.mceButtonContainer { width: fit-content !important; max-width=
: fit-content !important; }
}
@media only screen and (max-width: 480px) {
.mceButtonLink { padding: 18px 28px !important; font-size: 16p=
x !important; }
}
@media only screen and (max-width: 480px) {
.mceDividerBlock { border-top-width: 2px !important; }
}
@media only screen and (max-width: 480px) {
.mceDividerContainer { width: 100% !important; }
}
#dataBlockId-9 p=2C #dataBlockId-9 h1=2C #dataBlockId-9 h2=2C #dataBlockId=
-9 h3=2C #dataBlockId-9 h4=2C #dataBlockId-9 ul { text-align: center; }</s=
tyle></head>
<body>
<!--
-->
<!--[if !gte mso 9]><!----><span class=3D"mcnPreviewText" style=3D"displa=
y:none; font-size:0px; line-height:0px; max-height:0px; max-width:0px; opa=
city:0; overflow:hidden; visibility:hidden; mso-hide:all;">Get the insight=
s you need to stay secure and ahead of the curve.</span><!--<![endif]-->
<!--
-->
<div style=3D"display: none; max-height: 0px; overflow: hidden;"> =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=
=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=
=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C=
=C2=A0 =E2=80=87 =C2=AD =CD=8F =E2=80=8C =C2=A0 =E2=80=87 =C2=AD =CD=8F=
=E2=80=8C =C2=A0 =E2=80=87 =C2=AD </div><div style=3D"display:none;">=E2=
=80=87&#xFEFF;=CD=8F =E2=80=87&#xFEFF;=CD=8F =E2=80=87&#xFEFF;=CD=8F =E2=
=80=87&#xFEFF;=CD=8F=E2=80=87&#xFEFF;=CD=8F =E2=80=87&#xFEFF;=CD=8F =E2=80=
=87&#xFEFF;=CD=8F =E2=80=87&#xFEFF;=CD=8F=E2=80=87&#xFEFF;=CD=8F =E2=80=87=
&#xFEFF;=CD=8F =E2=80=87&#xFEFF;=CD=8F =E2=80=87&#xFEFF;=CD=8F=E2=80=87&#x=
FEFF;=CD=8F =E2=80=87&#xFEFF;=CD=8F =E2=80=87&#xFEFF;=CD=8F =E2=80=87&#xFE=
FF;=CD=8F=E2=80=87&#xFEFF;=CD=8F =E2=80=87&#xFEFF;=CD=8F =E2=80=87&#xFEFF;=
=CD=8F =E2=80=87&#xFEFF;=CD=8F=E2=80=87&#xFEFF;=CD=8F =E2=80=87&#xFEFF;=CD=
=8F =E2=80=87&#xFEFF;=CD=8F =E2=80=87&#xFEFF;=CD=8F</div><!--[if !mso]><!=
--><div style=3D"display:none; font-size:0px; line-height:0px; max-height:=
0px; max-width:0px; opacity:0; overflow:hidden; visibility:hidden; mso-hid=
e:all;"><img src=3D"https://thehackernews.us12.list-manage.com/track/open.=
php?u=3Df96f7fc0a6a553a99756dd2d3&id=3D43bf0ccf90&e=3D9ec5472950" height=
=3D"1" width=3D"1" style=3D"display:none; font-size:0px; line-height:0px;=
opacity:0; overflow:hidden; visibility:hidden; mso-hide:all;" alt=3D""></=
div><!--<![endif]-->
<center>
<table border=3D"0" cellpadding=3D"0" cellspacing=3D"0" height=3D"100%" wi=
dth=3D"100%" id=3D"bodyTable" style=3D"background-color: rgb(249=2C 251=2C=
255);">
<tbody><tr>
<td class=3D"bodyCell" align=3D"center" valign=3D"top">
<table id=3D"root" border=3D"0" cellpadding=3D"0" cellspacing=3D"0" width=
=3D"100%"><tbody data-block-id=3D"3" class=3D"mceWrapper"><tr><td style=3D=
"background-color:#f9fbff" valign=3D"top" align=3D"center" class=3D"mceSec=
tionHeader"><!--[if (gte mso 9)|(IE)]><table align=3D"center" border=3D"0=
" cellspacing=3D"0" cellpadding=3D"0" width=3D"660" style=3D"width:660px;"=
><tr><td><![endif]--><table border=3D"0" cellpadding=3D"0" cellspacing=3D=
"0" width=3D"100%" style=3D"max-width:660px" role=3D"presentation"><tbody>=
<tr><td style=3D"background-color:#f9fbff" valign=3D"top" class=3D"mceWrap=
perInner"><table align=3D"center" border=3D"0" cellpadding=3D"0" cellspaci=
ng=3D"0" width=3D"100%" role=3D"presentation" data-block-id=3D"2"><tbody><=
tr class=3D"mceRow"><td style=3D"background-position:center;background-rep=
eat:no-repeat;background-size:cover" valign=3D"top"><table border=3D"0" ce=
llpadding=3D"0" cellspacing=3D"0" width=3D"100%" role=3D"presentation"><tb=
ody><tr><td style=3D"padding-top:0;padding-bottom:0" valign=3D"top" class=
=3D"mceColumn" data-block-id=3D"-4" colspan=3D"12" width=3D"100%"><table b=
order=3D"0" cellpadding=3D"0" cellspacing=3D"0" width=3D"100%" role=3D"pre=
sentation"><tbody><tr><td style=3D"padding-top:48px;padding-bottom:24px;pa=
dding-right:24px;padding-left:24px" valign=3D"top" class=3D"mceBlockContai=
ner" align=3D"center"><a href=3D"https://thehackernews.us12.list-manage.co=
m/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D3f10ac9246&e=3D9ec5472950" style=3D"display:block" target=3D"_blank" data-block-id=3D"1"><span cla=
ss=3D"mceImageBorder" style=3D"border:0;border-radius:0;vertical-align:top=
;margin:0"><img width=3D"306" height=3D"auto" style=3D"width:306px;height:=
auto;max-width:306px !important;border-radius:0;display:block" alt=3D"The=
Hacker News" src=3D"https://mcusercontent.com/f96f7fc0a6a553a99756dd2d3/i=
mages/a0dbd12c-4212-d9ea-e100-137455ad9a42.png" class=3D"mceLogo" /></span=
></a></td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody=
></table></td></tr></tbody></table><!--[if (gte mso 9)|(IE)]></td></tr></=
table><![endif]--></td></tr></tbody><tbody data-block-id=3D"7" class=3D"m=
ceWrapper"><tr><td style=3D"background-color:transparent" valign=3D"top" a=
lign=3D"center" class=3D"mceSectionBody"><!--[if (gte mso 9)|(IE)]><table=
align=3D"center" border=3D"0" cellspacing=3D"0" cellpadding=3D"0" width=
=3D"660" style=3D"width:660px;"><tr><td><![endif]--><table border=3D"0" c=
ellpadding=3D"0" cellspacing=3D"0" width=3D"100%" style=3D"max-width:660px=
" role=3D"presentation"><tbody><tr><td style=3D"background-color:#ffffff"=
valign=3D"top" class=3D"mceWrapperInner"><table align=3D"center" border=
=3D"0" cellpadding=3D"0" cellspacing=3D"0" width=3D"100%" role=3D"presenta=
tion" data-block-id=3D"6"><tbody><tr class=3D"mceRow"><td style=3D"backgro=
und-position:center;background-repeat:no-repeat;background-size:cover" val=
ign=3D"top"><table border=3D"0" cellpadding=3D"0" cellspacing=3D"0" width=
=3D"100%" role=3D"presentation"><tbody><tr><td style=3D"padding-top:0;padd=
ing-bottom:0" valign=3D"top" class=3D"mceColumn" data-block-id=3D"-5" cols=
pan=3D"12" width=3D"100%"><table border=3D"0" cellpadding=3D"0" cellspacin=
g=3D"0" width=3D"100%" role=3D"presentation"><tbody><tr><td style=3D"backg=
round-color:#f9fbff;padding-top:0;padding-bottom:0;padding-right:0;padding=
-left:0" valign=3D"top" class=3D"mceBlockContainer" align=3D"center"><a hr=
ef=3D"https://thehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a=
6a553a99756dd2d3&id=3D3c40b6a43b&e=3D9ec5472950" style=3D"display:block"=
target=3D"_blank" data-block-id=3D"4"><span class=3D"mceImageBorder" styl=
e=3D"border:0;border-radius:0;vertical-align:top;margin:0"><img width=3D"6=
60" height=3D"auto" style=3D"width:660px;height:auto;max-width:660px !impo=
rtant;border-radius:0;display:block" alt=3D"Cybersecurity Weekly Recap" sr=
c=3D"https://mcusercontent.com/f96f7fc0a6a553a99756dd2d3/images/2d4e5755-f=
df5-c2ee-4e43-ec5da7a54543.png" class=3D"mceImage" /></span></a></td></tr>=
<tr><td style=3D"padding-top:0;padding-bottom:0;padding-right:0;padding-le=
ft:0" valign=3D"top"><table width=3D"100%" style=3D"border:0;border-radius=
:0;border-collapse:separate"><tbody><tr><td style=3D"padding-left:24px;pad=
ding-right:24px;padding-top:12px;padding-bottom:12px" class=3D"mceTextBloc=
kContainer"><div data-block-id=3D"16" class=3D"mceText" id=3D"dataBlockId-=
16" style=3D"width:100%"><p style=3D"text-align: left;"><br /></p><p style=
=3D"text-align: left;"><span style=3D"font-family: 'Roboto'=2C 'Helvetica=
Neue'=2C Helvetica=2C Arial=2C sans-serif">Welcome to your weekly cyberse=
curity scoop! Ever thought about how the same AI meant to protect our hosp=
itals could also compromise them? This week=2C we=E2=80=99re breaking down=
the sophisticated world of AI-driven threats=2C key updates in regulation=
s=2C and some urgent vulnerabilities in healthcare tech that need our atte=
ntion.</span></p><p style=3D"text-align: left;"><br /></p><p style=3D"text=
-align: left;"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C=
Helvetica=2C Arial=2C sans-serif">As we unpack these complex topics=2C we=
'll equip you with sharp insights to navigate these turbulent waters. Curi=
ous about the solutions? They=E2=80=99re smarter and more unexpected than=
you might think. Let=E2=80=99s dive in.</span></p><p style=3D"text-align:=
left;"><br /></p><h2 style=3D"line-height: 1.5; mso-line-height-alt: 150%=
; text-align: left;"><span style=3D"font-size: 20px"><span style=3D"font-f=
amily: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif">=
=E2=9A=A1 Threat of the Week</span></span></h2><p style=3D"text-align: lef=
t;"><br /></p><p style=3D"text-align: left;"><strong><span style=3D"color:=
rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica N=
eue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-color:=
transparent">Juniper Networks Routers Targeted by J-magic </span></span><=
/span></strong><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"f=
ont-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-ser=
if"><span style=3D"background-color: transparent">=E2=80=94</span></span><=
/span><strong><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"fo=
nt-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-seri=
f"><span style=3D"background-color: transparent"> </span></span></span></s=
trong><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-famil=
y: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span=
style=3D"background-color: transparent">A new campaign </span></span></sp=
an><a href=3D"https://thehackernews.us12.list-manage.com/track/click?u=3Df=
96f7fc0a6a553a99756dd2d3&id=3De7afcbbee2&e=3D9ec5472950" target=3D"_blank=
" style=3D"color: #4a6ee0; background: transparent; margin-top: 0pt; margi=
n-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><span style=
=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C san=
s-serif"><span style=3D"background-color: transparent">targeted enterprise=
-grade Juniper Networks routers</span></span></span></a><span style=3D"col=
or:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetic=
a Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-col=
or: transparent"> between mid-2023 and mid-2024 to infect them with a back=
door dubbed J-magic when certain precise conditions. The malware is a vari=
ant of a nearly 25-year-old=2C publicly available backdoor referred to as=
cd00r=2C and is designed to establish a reverse shell to an attacker-cont=
rolled IP address and port. Semiconductor=2C energy=2C manufacturing=2C an=
d information technology (IT) sectors were the most targeted.</span></span=
></span></p><p style=3D"text-align: left;" class=3D"last-child"><br /></p>=
</div></td></tr></tbody></table></td></tr><tr><td style=3D"background-colo=
r:#f5f8ff;padding-top:0;padding-bottom:0;padding-right:0;padding-left:0" v=
align=3D"top" class=3D"mceBlockContainer"><table align=3D"center" border=
=3D"0" cellpadding=3D"0" cellspacing=3D"0" width=3D"100%" style=3D"backgro=
und-color:#f5f8ff;width:100%" role=3D"presentation" class=3D"mceDividerCon=
tainer" data-block-id=3D"17"><tbody><tr><td style=3D"min-width:100%;border=
-top-width:10px;border-top-style:solid;border-top-color:#e2ebff;line-heigh=
t:0;font-size:0" valign=3D"top" class=3D"mceDividerBlock">=C2=A0</td></tr>=
</tbody></table></td></tr><tr><td style=3D"background-color:#f5f8ff" valig=
n=3D"top"><table border=3D"0" cellpadding=3D"0" cellspacing=3D"0" width=3D=
"100%" role=3D"presentation" data-block-id=3D"21"><tbody><tr><td valign=3D=
"top" class=3D"mceSpacerBlock" height=3D"20"></td></tr></tbody></table></t=
d></tr><tr><td style=3D"background-color:#f5f8ff;padding-top:12px;padding-=
bottom:12px;padding-right:0;padding-left:0" valign=3D"top" class=3D"mceBlo=
ckContainer" align=3D"center"><a href=3D"https://thehackernews.us12.list-m=
anage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D799990d43d&e=3D9ec5472950" style=3D"display:block" target=3D"_blank" data-block-id=3D"15">=
<span class=3D"mceImageBorder" style=3D"border:0;border-radius:0;vertical-=
align:top;margin:0"><img width=3D"660" height=3D"auto" style=3D"width:660p=
x;height:auto;max-width:660px !important;border-radius:0;display:block" al=
t=3D"Securing Non-Human Identities" src=3D"https://mcusercontent.com/f96f7=
fc0a6a553a99756dd2d3/images/199c2457-decd-26e4-518b-14ab228f5101.png" clas=
s=3D"mceImage" /></span></a></td></tr><tr><td style=3D"padding-top:0;paddi=
ng-bottom:0;padding-right:0;padding-left:0" valign=3D"top"><table width=3D=
"100%" style=3D"border:0;background-color:#f5f8ff;border-radius:0;border-c=
ollapse:separate"><tbody><tr><td style=3D"padding-left:24px;padding-right:=
24px;padding-top:12px;padding-bottom:12px" class=3D"mceTextBlockContainer"=
><div data-block-id=3D"19" class=3D"mceText" id=3D"dataBlockId-19" style=
=3D"width:100%"><p style=3D"text-align: left;"><a href=3D"https://thehacke=
rnews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D=
b042c515c9&e=3D9ec5472950" target=3D"_blank" style=3D"color: #0042a9;"><s=
trong><span style=3D"font-size: 20px">The Human Touch In Creating and Secu=
ring Non-Human Identities</span></strong></a></p><p style=3D"text-align: l=
eft;"><br /></p><p style=3D"text-align: left;" class=3D"last-child"><a hre=
f=3D"https://thehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a6=
a553a99756dd2d3&id=3Dd5c17b6664&e=3D9ec5472950" target=3D"_blank" style=
=3D"color: #2b2b2b; text-decoration: none;">In today's digital landscape=
=2C a new class of identities has emerged alongside traditional human user=
s: non-human identities (NHIs).This ebook explores everything you need to=
know about managing NHIs in your environment.</a></p></div></td></tr></tb=
ody></table></td></tr><tr><td style=3D"background-color:#f5f8ff;padding-to=
p:12px;padding-bottom:12px;padding-right:24px;padding-left:24px" valign=3D=
"top" class=3D"mceBlockContainer" align=3D"center"><div><!--[if !mso]><!-=
-></div><table align=3D"center" border=3D"0" cellpadding=3D"0" cellspacing=
=3D"0" width=3D"100%" style=3D"max-width:282px" role=3D"presentation" data=
-block-id=3D"20" class=3D"mceButtonContainer"><tbody><tr class=3D"mceStand=
ardButton"><td style=3D"background-color:#0042a9;border-radius:50px;text-a=
lign:center" valign=3D"top" class=3D"mceButton"><a href=3D"https://thehack=
ernews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=
=3D9bd7b0e7ee&e=3D9ec5472950" target=3D"_blank" class=3D"mceButtonLink" s=
tyle=3D"background-color:#0042a9;border-radius:50px;border:2px none #00000=
0;color:#ffffff;display:block;font-family:'Helvetica Neue'=2C Helvetica=2C=
Arial=2C Verdana=2C sans-serif;font-size:16px;font-weight:bold;font-style=
:normal;padding:16px 28px;text-decoration:none;min-width:30px;text-align:c=
enter;direction:ltr;letter-spacing:0px" rel=3D"noreferrer">Download</a></t=
d></tr></tbody></table><div><!--<![endif]--></div><table align=3D"center"=
border=3D"0" cellpadding=3D"0" cellspacing=3D"0" width=3D"100%" style=3D"=
max-width:282px" role=3D"presentation" data-block-id=3D"20" class=3D"mceBu=
ttonContainer"><tbody><tr>
<!--[if mso]>
<td align=3D"center">
<v:roundrect xmlns:v=3D"urn:schemas-microsoft-com:vml"
xmlns:w=3D"urn:schemas-microsoft-com:office:word"
href=3D"https://thehackernews.uk/non-human-identities-ebook-eb"
style=3D"v-text-anchor:middle; width:282px; height:49.76px;"
arcsize=3D"18%"
strokecolor=3D"#0042a9"
strokeweight=3D"1px"
fillcolor=3D"#0042a9">
<v:stroke dashstyle=3D"solid"/>
<w:anchorlock />
<center style=3D"
color: #ffffff;
display: block;
font-family: 'Helvetica Neue'=2C Helvetica=2C Arial=2C Verdana=2C sans-ser=
if;
font-size: 16;
font-style: normal;
font-weight: bold;
letter-spacing: 0px;
text-decoration: none;
text-align: center;
direction: ltr;"
>
Download
</center>
</v:roundrect>
</td>
<![endif]-->
</tr></tbody></table></td></tr><tr><td style=3D"background-color:#f5f8ff"=
valign=3D"top"><table border=3D"0" cellpadding=3D"0" cellspacing=3D"0" wi=
dth=3D"100%" role=3D"presentation" data-block-id=3D"22"><tbody><tr><td val=
ign=3D"top" class=3D"mceSpacerBlock" height=3D"20"></td></tr></tbody></tab=
le></td></tr><tr><td style=3D"background-color:#f5f8ff;padding-top:0;paddi=
ng-bottom:0;padding-right:0;padding-left:0" valign=3D"top" class=3D"mceBlo=
ckContainer"><table align=3D"center" border=3D"0" cellpadding=3D"0" cellsp=
acing=3D"0" width=3D"100%" style=3D"background-color:#f5f8ff;width:100%" r=
ole=3D"presentation" class=3D"mceDividerContainer" data-block-id=3D"18"><t=
body><tr><td style=3D"min-width:100%;border-top-width:10px;border-top-styl=
e:solid;border-top-color:#e2ebff;line-height:0;font-size:0" valign=3D"top"=
class=3D"mceDividerBlock">=C2=A0</td></tr></tbody></table></td></tr><tr><=
td style=3D"padding-top:0;padding-bottom:0;padding-right:0;padding-left:0"=
valign=3D"top"><table width=3D"100%" style=3D"border:0;border-radius:0;bo=
rder-collapse:separate"><tbody><tr><td style=3D"padding-left:24px;padding-=
right:24px;padding-top:12px;padding-bottom:12px" class=3D"mceTextBlockCont=
ainer"><div data-block-id=3D"5" class=3D"mceText" id=3D"dataBlockId-5" sty=
le=3D"width:100%"><p style=3D"text-align: left;"><br /></p><h2 style=3D"te=
xt-align: left;"><span style=3D"font-size: 20px"><span style=3D"font-famil=
y: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif">=F0=
=9F=94=94 Top News</span></span></h2><p class=3D"mcePastedContent" style=
=3D"text-align: left;"><br /></p><ul style=3D"color: rgb(14=2C 16=2C 26);=
background: transparent; margin-top: 0pt; margin-bottom: 0pt;"><li style=
=3D"text-align: left;"><p class=3D"mcePastedContent" style=3D"text-align:=
left;"><strong><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"=
font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-se=
rif"><span style=3D"background-color: transparent">Palo Alto Firewalls Fou=
nd Vulnerable to Firmware Exploits </span></span></span></strong><span sty=
le=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C=
'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"back=
ground-color: transparent">=E2=80=94</span></span></span><strong><span sty=
le=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C=
'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"back=
ground-color: transparent"> </span></span></span></strong><span style=3D"c=
olor:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvet=
ica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-c=
olor: transparent">An analysis of three firewall models from Palo Alto Net=
works =E2=80=93 PA-3260=2C PA-1410=2C and PA-415 =E2=80=93 </span></span><=
/span><a href=3D"https://thehackernews.us12.list-manage.com/track/click?u=
=3Df96f7fc0a6a553a99756dd2d3&id=3De099c0382b&e=3D9ec5472950" target=3D"_b=
lank" style=3D"color: #4a6ee0; background: transparent; margin-top: 0pt; m=
argin-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><span sty=
le=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C s=
ans-serif"><span style=3D"background-color: transparent">uncovered</span><=
/span></span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D=
"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-s=
erif"><span style=3D"background-color: transparent"> that they are vulnera=
ble to known security flaws that could be exploited to achieve Secure Boot=
bypass and modify device firmware. In response to the findings=2C Palo Al=
to Networks said exploiting the flaws require an attacker to first comprom=
ise PAN-OS software through other means and obtain elevated privileges to=
access or modify the BIOS firmware. It also said it will be working with=
third-party vendors to develop firmware updates for some of them.</span><=
/span></span></p></li><li style=3D"text-align: left;"><p class=3D"mcePaste=
dContent" style=3D"text-align: left;"><strong><span style=3D"color:rgb(14=
=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=
=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-color: tra=
nsparent">PlushDaemon Linked to Supply Chain Compromise of South Korean VP=
N Provider </span></span></span></strong><span style=3D"color:rgb(14=2C 16=
=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helv=
etica=2C Arial=2C sans-serif"><span style=3D"background-color: transparent=
">=E2=80=94</span></span></span><strong><span style=3D"color:rgb(14=2C 16=
=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helv=
etica=2C Arial=2C sans-serif"><span style=3D"background-color: transparent=
"> </span></span></span></strong><span style=3D"color:rgb(14=2C 16=2C 26);=
"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C=
Arial=2C sans-serif"><span style=3D"background-color: transparent">A neve=
r-before-seen China-aligned hacking group named </span></span></span><a hr=
ef=3D"https://thehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a=
6a553a99756dd2d3&id=3Dcf4dab396b&e=3D9ec5472950" target=3D"_blank" style=
=3D"color: #4a6ee0; background: transparent; margin-top: 0pt; margin-botto=
m: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-=
family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif">=
<span style=3D"background-color: transparent">PlushDaemon</span></span></s=
pan></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-fam=
ily: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><sp=
an style=3D"background-color: transparent"> carried out a supply chain att=
ack targeting a South Korean virtual private network (VPN) provider in 202=
3 to deliver malware known as SlowStepper=2C a fully-featured backdoor wit=
h an extensive set of information gathering features. The threat actor is=
also said to have exploited an unknown vulnerability in Apache HTTP serve=
rs and conducted adversary-in-the-middle (AitM) attacks to breach other ta=
rgets of interest. Active since at least 2019=2C the group has singled out=
individuals and entities in China=2C Taiwan=2C Hong Kong=2C South Korea=
=2C the United States=2C and New Zealand.</span></span></span></p></li><li=
style=3D"text-align: left;"><p class=3D"mcePastedContent" style=3D"text-a=
lign: left;"><strong><span style=3D"color:rgb(14=2C 16=2C 26);"><span styl=
e=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sa=
ns-serif"><span style=3D"background-color: transparent">Mirai Botnet Launc=
hes Record 5.6 Tbps DDoS Attack </span></span></span></strong><span style=
=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'H=
elvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"backgro=
und-color: transparent">=E2=80=94</span></span></span><strong><span style=
=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'H=
elvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"backgro=
und-color: transparent"> </span></span></span></strong><span style=3D"colo=
r:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica=
Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-colo=
r: transparent">Cloudflare revealed that a Mirai botnet comprising over 13=
=2C000 IoT devices was </span></span></span><a href=3D"https://thehackerne=
ws.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D80a=
a7f8c3b&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6ee0; backgr=
ound: transparent; margin-top: 0pt; margin-bottom: 0pt;"><span style=3D"co=
lor:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=2C 'Helve=
tica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-=
color: transparent">responsible</span></span></span></a><span style=3D"col=
or:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetic=
a Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-col=
or: transparent"> for a record-breaking 5.6 Terabit per second (Tbps) dist=
ributed denial-of-service (DDoS) attack aimed at an unnamed internet servi=
ce provider (ISP) from Eastern Asia. The attack lasted about 80 seconds. T=
he web infrastructure company said the average unique source IP address ob=
served per second was 5=2C500=2C and the average contribution of each IP a=
ddress per second was around 1 Gbps.</span></span></span></p></li><li styl=
e=3D"text-align: left;"><p class=3D"mcePastedContent" style=3D"text-align:=
left;"><strong><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"=
font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-se=
rif"><span style=3D"background-color: transparent">Over 100 Flaws in LTE a=
nd 5G Implementations</span></span></span></strong><span style=3D"color:rg=
b(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neu=
e'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-color: t=
ransparent"> =E2=80=94</span></span></span><strong><span style=3D"color:rg=
b(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neu=
e'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-color: t=
ransparent"> </span></span></span></strong><span style=3D"color:rgb(14=2C=
16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C H=
elvetica=2C Arial=2C sans-serif"><span style=3D"background-color: transpar=
ent">A group of academics has </span></span></span><a href=3D"https://theh=
ackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&i=
d=3Def3f3b39e9&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6ee0;=
background: transparent; margin-top: 0pt; margin-bottom: 0pt;"><span styl=
e=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=2C=
'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"back=
ground-color: transparent">disclosed</span></span></span></a><span style=
=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'H=
elvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"backgro=
und-color: transparent"> 119 security vulnerabilities impacting LTE and 5G=
implementations=2C Open5GS=2C Magma=2C OpenAirInterface=2C Athonet=2C SD-=
Core=2C NextEPC=2C srsRAN=2C that could be exploited by an attacker to dis=
rupt access to service and even gain a foothold into the cellular core net=
work. Some of the identified vulnerabilities could be weaponized to breach=
the cellular core network and leverage that access to monitor cellphone l=
ocation and connection information for all subscribers at a city-wide leve=
l=2C carry out targeted attacks on specific subscribers=2C and perform fur=
ther malicious actions on the network itself.</span></span></span></p></li=
><li style=3D"text-align: left;"><p class=3D"mcePastedContent" style=3D"te=
xt-align: left;"><strong><span style=3D"color:rgb(14=2C 16=2C 26);"><span=
style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=
=2C sans-serif"><span style=3D"background-color: transparent">Ex-CIA Analy=
st Pleads Guilty to Sharing Top Secret Docs </span></span></span></strong>=
<span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Ro=
boto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=
=3D"background-color: transparent">=E2=80=94</span></span></span><strong><=
span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Rob=
oto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=
=3D"background-color: transparent"> </span></span></span></strong><span st=
yle=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C=
'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"back=
ground-color: transparent">Asif William Rahman=2C a former analyst working=
for the U.S. Central Intelligence Agency (CIA)=2C </span></span></span><a=
href=3D"https://thehackernews.us12.list-manage.com/track/click?u=3Df96f7f=
c0a6a553a99756dd2d3&id=3D3068329afc&e=3D9ec5472950" target=3D"_blank" sty=
le=3D"color: #4a6ee0; background: transparent; margin-top: 0pt; margin-bot=
tom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"fon=
t-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif=
"><span style=3D"background-color: transparent">pleaded guilty</span></spa=
n></span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"fon=
t-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif=
"><span style=3D"background-color: transparent"> to transmitting top secre=
t National Defense Information (NDI) to unauthorized personnel and attempt=
ed to cover up the activity. The incident=2C which took place in October 2=
024=2C involved Rahman sharing documents prepared by the National Geospati=
al-Intelligence Agency and the National Security Agency. They were related=
to Israel's plans to attack Iran=2C and were subsequently shared on Teleg=
ram by an account called Middle East Spectator. He has pleaded guilty to t=
wo counts of willful retention and transmission of classified information=
related to the national defense. He is expected to be sentenced on May 15=
=2C 2025=2C potentially facing a maximum penalty of 10 years in prison.</s=
pan></span></span></p></li></ul><p class=3D"mcePastedContent" style=3D"tex=
t-align: left;"><br /></p><h3 style=3D"text-align: left;"><span style=3D"f=
ont-size: 18px"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=
=2C Helvetica=2C Arial=2C sans-serif">=EF=B8=8F=F0=9F=94=A5 Trending CVEs<=
/span></span></h3><p class=3D"mcePastedContent" style=3D"text-align: left;=
"><br /></p><p class=3D"mcePastedContent" style=3D"background: transparent=
; margin-top: 0pt; margin-bottom: 0pt; text-align: left;"><span style=3D"c=
olor:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvet=
ica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-c=
olor: transparent">Your go-to software could be hiding dangerous security=
flaws=E2=80=94don=E2=80=99t wait until it=E2=80=99s too late! Update now=
and stay ahead of the threats before they catch you off guard.</span></sp=
an></span></p><p class=3D"mcePastedContent" style=3D"background: transpare=
nt; margin-top: 0pt; margin-bottom: 0pt; text-align: left;"><span style=3D=
"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helv=
etica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background=
-color: transparent">This week=E2=80=99s list includes =E2=80=94</span></s=
pan></span><strong><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=
=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C san=
s-serif"><span style=3D"background-color: transparent"> </span></span></sp=
an></strong><a href=3D"https://thehackernews.us12.list-manage.com/track/cl=
ick?u=3Df96f7fc0a6a553a99756dd2d3&id=3D28550b7c44&e=3D9ec5472950" target=
=3D"_blank" style=3D"color: #4a6ee0; background: transparent; margin-top:=
0pt; margin-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><s=
pan style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Ari=
al=2C sans-serif"><span style=3D"background-color: transparent">CVE-2025-2=
3006</span></span></span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><s=
pan style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Ari=
al=2C sans-serif"><span style=3D"background-color: transparent"> (SonicWal=
l)=2C </span></span></span><a href=3D"https://thehackernews.us12.list-mana=
ge.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D93c2dd36b1&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6ee0; background: transparent=
; margin-top: 0pt; margin-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=
=2C 224);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Hel=
vetica=2C Arial=2C sans-serif"><span style=3D"background-color: transparen=
t">CVE-2025-20156</span></span></span></a><span style=3D"color:rgb(14=2C 1=
6=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Hel=
vetica=2C Arial=2C sans-serif"><span style=3D"background-color: transparen=
t"> (Cisco Meeting Management)=2C </span></span></span><a href=3D"https://=
thehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2=
d3&id=3D03077ed778&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6=
ee0; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"><span=
style=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Robot=
o'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D=
"background-color: transparent">CVE-2025-21556</span></span></span></a><sp=
an style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Robot=
o'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D=
"background-color: transparent"> (Oracle Agile Product Lifecycle Managemen=
t Framework)=2C </span></span></span><a href=3D"https://thehackernews.us12=
=2Elist-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D6105c831f9=
&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6ee0; background: t=
ransparent; margin-top: 0pt; margin-bottom: 0pt;"><span style=3D"color:rgb=
(74=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Ne=
ue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-color:=
transparent">CVE-2025-0411</span></span></span></a><span style=3D"color:r=
gb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Ne=
ue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-color:=
transparent"> (7-Zip)=2C </span></span></span><a href=3D"https://thehacke=
rnews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D=
eb55b58486&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6ee0; bac=
kground: transparent; margin-top: 0pt; margin-bottom: 0pt;"><span style=3D=
"color:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=2C 'He=
lvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"backgrou=
nd-color: transparent">CVE-2025-21613</span></span></span></a><span style=
=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'H=
elvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"backgro=
und-color: transparent"> (go-git)=2C </span></span></span><a href=3D"https=
://thehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756=
dd2d3&id=3Df69e1378fa&e=3D9ec5472950" target=3D"_blank" style=3D"color: #=
4a6ee0; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"><sp=
an style=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Rob=
oto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=
=3D"background-color: transparent">CVE-2024-32444</span></span></span></a>=
<span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Ro=
boto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=
=3D"background-color: transparent"> (RealHomes theme for WordPress)=2C </s=
pan></span></span><a href=3D"https://thehackernews.us12.list-manage.com/tr=
ack/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3Df7e5a70acf&e=3D9ec5472950" t=
arget=3D"_blank" style=3D"color: #4a6ee0; background: transparent; margin-=
top: 0pt; margin-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);=
"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C=
Arial=2C sans-serif"><span style=3D"background-color: transparent">CVE-20=
24-32555</span></span></span></a><span style=3D"color:rgb(14=2C 16=2C 26);=
"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C=
Arial=2C sans-serif"><span style=3D"background-color: transparent"> (Easy=
Real Estate plugin)=2C </span></span></span><a href=3D"https://thehackern=
ews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D32=
30e2b1b1&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6ee0; backg=
round: transparent; margin-top: 0pt; margin-bottom: 0pt;"><span style=3D"c=
olor:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=2C 'Helv=
etica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background=
-color: transparent">CVE-2016-0287</span></span></span></a><span style=3D"=
color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helve=
tica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-=
color: transparent"> (IBM i Access Client Solutions)=2C </span></span></sp=
an><a href=3D"https://thehackernews.us12.list-manage.com/track/click?u=3Df=
96f7fc0a6a553a99756dd2d3&id=3D3c4c1520aa&e=3D9ec5472950" target=3D"_blank=
" style=3D"color: #4a6ee0; background: transparent; margin-top: 0pt; margi=
n-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><span style=
=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C san=
s-serif"><span style=3D"background-color: transparent">CVE-2024-9042</span=
></span></span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=
=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C san=
s-serif"><span style=3D"background-color: transparent"> (Kubernetes).</spa=
n></span></span></p><p style=3D"text-align: left;"><br /></p><h2 style=3D"=
text-align: left;"><span style=3D"font-size: 20px"><span style=3D"font-fam=
ily: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif">=F0=
=9F=93=B0 Around the Cyber World</span></span></h2><p class=3D"mcePastedCo=
ntent" style=3D"text-align: left;"><br /></p><ul style=3D"color: rgb(14=2C=
16=2C 26); background: transparent; margin-top: 0pt; margin-bottom: 0pt;"=
><li style=3D"text-align: left;"><p class=3D"mcePastedContent" style=3D"te=
xt-align: left;"><strong><span style=3D"color:rgb(14=2C 16=2C 26);"><span=
style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=
=2C sans-serif"><span style=3D"background-color: transparent">India and th=
e U.S. Sign Cybercrime MoU </span></span></span></strong><span style=3D"co=
lor:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helveti=
ca Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-co=
lor: transparent">=E2=80=94</span></span></span><strong><span style=3D"col=
or:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetic=
a Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-col=
or: transparent"> </span></span></span></strong><span style=3D"color:rgb(1=
4=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=
=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-color: tra=
nsparent">India and the United States have signed a memorandum of understa=
nding (MoU) to bolster cooperation in cybercrime investigations. "The MoU=
allows the respective agencies of the two countries to step up the level=
of cooperation and training with respect to the use of cyber threat intel=
ligence and digital forensics in criminal investigations=2C" the Indian Mi=
nistry of External Affairs (MEA) </span></span></span><a href=3D"https://t=
hehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d=
3&id=3Dfd8e9ce55c&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6e=
e0; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"><span s=
tyle=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=
=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"b=
ackground-color: transparent">said</span></span></span></a><span style=3D"=
color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helve=
tica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-=
color: transparent"> in a statement.</span></span></span></p></li><li styl=
e=3D"text-align: left;"><p class=3D"mcePastedContent" style=3D"text-align:=
left;"><strong><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"=
font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-se=
rif"><span style=3D"background-color: transparent">Critical Security Flaws=
in ABB ASPECT-Enterprise=2C NEXUS=2C and MATRIX Products</span></span></s=
pan></strong><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"fon=
t-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif=
"><span style=3D"background-color: transparent"> =E2=80=94 More than a </s=
pan></span></span><a href=3D"https://thehackernews.us12.list-manage.com/tr=
ack/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3Decaebfdce1&e=3D9ec5472950" t=
arget=3D"_blank" style=3D"color: #4a6ee0; background: transparent; margin-=
top: 0pt; margin-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);=
"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C=
Arial=2C sans-serif"><span style=3D"background-color: transparent">100 se=
curity flaws</span></span></span></a><span style=3D"color:rgb(14=2C 16=2C=
26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helveti=
ca=2C Arial=2C sans-serif"><span style=3D"background-color: transparent">=
have been </span></span></span><a href=3D"https://thehackernews.us12.list=
-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D90bcaf1a71&e=3D=
9ec5472950" target=3D"_blank" style=3D"color: #4a6ee0; background: transp=
arent; margin-top: 0pt; margin-bottom: 0pt;"><span style=3D"color:rgb(74=
=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=
=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-color: tra=
nsparent">disclosed</span></span></span></a><span style=3D"color:rgb(14=2C=
16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C H=
elvetica=2C Arial=2C sans-serif"><span style=3D"background-color: transpar=
ent"> in ABB ASPECT-Enterprise=2C NEXUS=2C and MATRIX series of products t=
hat could enable an attacker to disrupt operations or execute remote code.=
Gjoko Krstikj of Zero Science Lab has been credited with discovering and=
reporting the flaws.</span></span></span></p></li><li style=3D"text-align=
: left;"><p class=3D"mcePastedContent" style=3D"text-align: left;"><strong=
><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'R=
oboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span styl=
e=3D"background-color: transparent">91% of Exposed Exchange Server Instanc=
es Still Vulnerable to ProxyLogon</span></span></span></strong><span style=
=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'H=
elvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"backgro=
und-color: transparent"> =E2=80=94 One of the vulnerabilities exploited by=
the China-linked Salt Typhoon hacking group for initial access is CVE-202=
1-26855 (aka ProxyLogon)=2C a nearly four-year-old flaw in Microsoft Excha=
nge Server. According to a new analysis from cybersecurity company Tenable=
=2C 91% of the nearly 30=2C000 external-facing instances of Exchange vulne=
rable to CVE-2021-26855 have not been updated to close the defect to date.=
"Salt Typhoon is known for maintaining a stealthy presence on victim netw=
orks and remaining undetected for a significant time period=2C" it </span>=
</span></span><a href=3D"https://thehackernews.us12.list-manage.com/track/=
click?u=3Df96f7fc0a6a553a99756dd2d3&id=3Dfa15e39d3b&e=3D9ec5472950" targe=
t=3D"_blank" style=3D"color: #4a6ee0; background: transparent; margin-top:=
0pt; margin-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><s=
pan style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Ari=
al=2C sans-serif"><span style=3D"background-color: transparent">said</span=
></span></span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=
=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C san=
s-serif"><span style=3D"background-color: transparent">.</span></span></sp=
an></p></li><li style=3D"text-align: left;"><p class=3D"mcePastedContent"=
style=3D"text-align: left;"><strong><span style=3D"color:rgb(14=2C 16=2C=
26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helveti=
ca=2C Arial=2C sans-serif"><span style=3D"background-color: transparent">I=
ntelBroker Resigns from BreachForums </span></span></span></strong><span s=
tyle=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=
=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"b=
ackground-color: transparent">=E2=80=94</span></span></span><strong><span=
style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=
=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"b=
ackground-color: transparent"> </span></span></span></strong><span style=
=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'H=
elvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"backgro=
und-color: transparent">The threat actor known as IntelBroker has </span><=
/span></span><a href=3D"https://thehackernews.us12.list-manage.com/track/c=
lick?u=3Df96f7fc0a6a553a99756dd2d3&id=3Da0725f88e4&e=3D9ec5472950" target=
=3D"_blank" style=3D"color: #4a6ee0; background: transparent; margin-top:=
0pt; margin-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><s=
pan style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Ari=
al=2C sans-serif"><span style=3D"background-color: transparent">announced<=
/span></span></span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span s=
tyle=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C=
sans-serif"><span style=3D"background-color: transparent"> his resignatio=
n as the owner of an illicit cybercrime forum called BreachForums=2C citin=
g a lack of time. The development marks the latest twist in the tumultuous=
history of the online criminal bazaar=2C which has been the subject of la=
w enforcement scrutiny=2C resulting in a </span></span></span><a href=3D"h=
ttps://thehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a9=
9756dd2d3&id=3Dc6edda572e&e=3D9ec5472950" target=3D"_blank" style=3D"colo=
r: #4a6ee0; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"=
><span style=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-family:=
'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span s=
tyle=3D"background-color: transparent">takedown of its infrastructure</spa=
n></span></span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=
=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C san=
s-serif"><span style=3D"background-color: transparent"> and the arrest of=
its previous administrators. Its original creator and owner Conor Brian F=
itzpatrick (aka Pompompurin) was </span></span></span><a href=3D"https://t=
hehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d=
3&id=3De659a28180&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6e=
e0; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"><span s=
tyle=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=
=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"b=
ackground-color: transparent">sentenced</span></span></span></a><span styl=
e=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C '=
Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"backgr=
ound-color: transparent"> to time served and 20 years of supervised releas=
e exactly a year ago. However=2C newly filed court documents </span></span=
></span><a href=3D"https://thehackernews.us12.list-manage.com/track/click?=
u=3Df96f7fc0a6a553a99756dd2d3&id=3D3c40250d06&e=3D9ec5472950" target=3D"_=
blank" style=3D"color: #4a6ee0; background: transparent; margin-top: 0pt;=
margin-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><span s=
tyle=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C=
sans-serif"><span style=3D"background-color: transparent">show</span></sp=
an></span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"fo=
nt-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-seri=
f"><span style=3D"background-color: transparent"> that his sentence has be=
en vacated -- i.e.=2C declared void. "While released on bond awaiting sent=
encing=2C Fitzpatrick violated his conditions of release immediately by se=
cretly downloading a virtual private network=2C which he then used virtual=
ly every day to access the Internet without the knowledge of his probation=
officer=2C" the document reads. "Not only did Fitzpatrick commit serious=
offenses=2C but he also showed a lack of remorse=2C joking about committi=
ng additional crimes even after entering a guilty plea."</span></span></sp=
an></p></li><li style=3D"text-align: left;"><p class=3D"mcePastedContent"=
style=3D"text-align: left;"><strong><span style=3D"color:rgb(14=2C 16=2C=
26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helveti=
ca=2C Arial=2C sans-serif"><span style=3D"background-color: transparent">C=
loudflare CDN Bug Leaks User Locations </span></span></span></strong><span=
style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=
=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"b=
ackground-color: transparent">=E2=80=94</span></span></span><strong><span=
style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=
=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"b=
ackground-color: transparent"> </span></span></span></strong><span style=
=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'H=
elvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"backgro=
und-color: transparent">A </span></span></span><a href=3D"https://thehacke=
rnews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D=
4018bcd3df&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6ee0; bac=
kground: transparent; margin-top: 0pt; margin-bottom: 0pt;"><span style=3D=
"color:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=2C 'He=
lvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"backgrou=
nd-color: transparent">new piece of research</span></span></span></a><span=
style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=
=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"b=
ackground-color: transparent"> from a 15-year-old security researcher who=
goes by the name Daniel has uncovered a novel "deanonymization attack" in=
the widely used Cloudflare content delivery network (CDN) that can expose=
someone's location by sending them an image on platforms like Signal=2C D=
iscord=2C and X. The flaw allows an attacker to extract the location of an=
y target within a 250-mile radius when a vulnerable app is installed on a=
target's phone=2C or as a background application on their laptop=2C simpl=
y by sending a specially-crafted payload. Using either a one-click or zero=
-click approach=2C the attack takes advantage of the fact that Cloudflare=
stores cache copies of frequently accessed content on data centers locate=
d in close proximity to the users to improve performance. The security res=
earcher developed a Teleport tool that let them check which of Cloudflare'=
s data centers had cached an image=2C which allowed them to triangulate th=
e approximate location a Discord=2C Signal=2C or X user might be in. Altho=
ugh the specific issue was closed=2C Daniel noted that the fix could be by=
passed using a VPN. While the geolocation capability of the attack is not=
precise=2C it can provide enough information to infer the geographic regi=
on where a person lives=2C and use it as a stepping stone for follow-on in=
telligence gathering. "The attack leverages fundamental design decisions i=
n caching and push notification systems=2C demonstrating how infrastructur=
e meant to enhance performance can be misused for invasive tracking=2C" th=
e researcher said.</span></span></span></p></li><li style=3D"text-align: l=
eft;"><p class=3D"mcePastedContent" style=3D"text-align: left;"><strong><s=
pan style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Robo=
to'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=
=3D"background-color: transparent">Belsen Group Leaks Fortinet FortiGate F=
irewall Configs</span></span></span></strong><span style=3D"color:rgb(14=
=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=
=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-color: tra=
nsparent"> =E2=80=94 A little-known hacking group named Belsen Group has <=
/span></span></span><a href=3D"https://thehackernews.us12.list-manage.com/=
track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D4982b36b19&e=3D9ec5472950"=
target=3D"_blank" style=3D"color: #4a6ee0; background: transparent; margi=
n-top: 0pt; margin-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224=
);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=
=2C Arial=2C sans-serif"><span style=3D"background-color: transparent">lea=
ked</span></span></span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><sp=
an style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Aria=
l=2C sans-serif"><span style=3D"background-color: transparent"> configurat=
ion data for over 15=2C000 Fortinet FortiGate firewalls on the dark web fo=
r free. This includes configurations and plaintext VPN user credentials=2C=
device serial numbers=2C models=2C and other data. An </span></span></spa=
n><a href=3D"https://thehackernews.us12.list-manage.com/track/click?u=3Df9=
6f7fc0a6a553a99756dd2d3&id=3D84ca2ace1d&e=3D9ec5472950" target=3D"_blank"=
style=3D"color: #4a6ee0; background: transparent; margin-top: 0pt; margin=
-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><span style=3D=
"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-s=
erif"><span style=3D"background-color: transparent">analysis</span></span>=
</span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-=
family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif">=
<span style=3D"background-color: transparent"> of the data dump conducted=
by security researcher Kevin Beaumont has revealed that the configuration=
data has likely been put together by exploiting </span></span></span><a h=
ref=3D"https://thehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0=
a6a553a99756dd2d3&id=3D5effdfbbf5&e=3D9ec5472950" target=3D"_blank" style=
=3D"color: #4a6ee0; background: transparent; margin-top: 0pt; margin-botto=
m: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-=
family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif">=
<span style=3D"background-color: transparent">CVE-2022-40684</span></span>=
</span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-=
family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif">=
<span style=3D"background-color: transparent">=2C an authentication bypass=
zero-day vulnerability disclosed in October 2022=2C as a zero-day. Of the=
15=2C469 distinct affected IP addresses=2C 8=2C469 IPs have been </span><=
/span></span><a href=3D"https://thehackernews.us12.list-manage.com/track/c=
lick?u=3Df96f7fc0a6a553a99756dd2d3&id=3D9ed3afde89&e=3D9ec5472950" target=
=3D"_blank" style=3D"color: #4a6ee0; background: transparent; margin-top:=
0pt; margin-bottom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><s=
pan style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Ari=
al=2C sans-serif"><span style=3D"background-color: transparent">found</spa=
n></span></span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=
=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C san=
s-serif"><span style=3D"background-color: transparent"> to be still online=
and reachable in scans. As many as 5=2C086 IPs are continuing to expose t=
he compromised FortiGate login interfaces. A majority of the exposures are=
in Mexico=2C Thailand=2C and the U.S. "If your organization has consisten=
tly adhered to routine best practices in regularly refreshing security cre=
dentials and taken the recommended actions in the preceding years=2C the r=
isk of the organization's current config or credential detail in the threa=
t actor=E2=80=99s disclosure is small=2C" Fortinet </span></span></span><a=
href=3D"https://thehackernews.us12.list-manage.com/track/click?u=3Df96f7f=
c0a6a553a99756dd2d3&id=3D68d31c5ca5&e=3D9ec5472950" target=3D"_blank" sty=
le=3D"color: #4a6ee0; background: transparent; margin-top: 0pt; margin-bot=
tom: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"fon=
t-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif=
"><span style=3D"background-color: transparent">said</span></span></span><=
/a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family:=
'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span s=
tyle=3D"background-color: transparent"> in response to the disclosure. The=
disclosure comes as </span></span></span><a href=3D"https://thehackernews=
=2Eus12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D86601=
e19c8&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6ee0; backgrou=
nd: transparent; margin-top: 0pt; margin-bottom: 0pt;"><span style=3D"colo=
r:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=2C 'Helveti=
ca Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-co=
lor: transparent">another critical flaw</span></span></span></a><span styl=
e=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C '=
Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"backgr=
ound-color: transparent"> in FortiGate devices (</span></span></span><a hr=
ef=3D"https://thehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a=
6a553a99756dd2d3&id=3D0c184f01a9&e=3D9ec5472950" target=3D"_blank" style=
=3D"color: #4a6ee0; background: transparent; margin-top: 0pt; margin-botto=
m: 0pt;"><span style=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-=
family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif">=
<span style=3D"background-color: transparent">CVE-2024-55591</span></span>=
</span></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-=
family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif">=
<span style=3D"background-color: transparent"> aka Console Chaos) has come=
under active exploitation in the wild since November 1=2C 2024.</span></s=
pan></span></p></li></ul><p class=3D"mcePastedContent" style=3D"text-align=
: left;"><br /></p><h2 style=3D"text-align: left;"><span style=3D"font-siz=
e: 20px"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helve=
tica=2C Arial=2C sans-serif">=F0=9F=8E=A5 Expert Webinar</span></span></h2=
><p class=3D"mcePastedContent" style=3D"text-align: left;"><br /></p><ul s=
tyle=3D"color: rgb(14=2C 16=2C 26); background: transparent; margin-top: 0=
pt; margin-bottom: 0pt;"><li style=3D"text-align: left;"><p class=3D"mcePa=
stedContent" style=3D"text-align: left;"><a href=3D"https://thehackernews.=
us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3Dfa80b3=
76be&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6ee0; backgroun=
d: transparent; margin-top: 0pt; margin-bottom: 0pt;"><strong><span style=
=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=2C=
'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"back=
ground-color: transparent">No More Trade-Offs: Secure Code at Full Speed</=
span></span></span></strong></a><span style=3D"color:rgb(14=2C 16=2C 26);"=
><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C=
Arial=2C sans-serif"><span style=3D"background-color: transparent"> =E2=
=80=94 Tired of security slowing down development=E2=80=94or risky shortcu=
ts putting you at risk? Join Sarit Tager=2C VP of Product Management at Pa=
lo Alto Networks=2C in this must-attend webinar to discover how to break t=
he Dev-Sec standoff. Learn how to embed smart=2C seamless security guardra=
ils into your DevOps pipeline=2C prioritize code issues with full ecosyste=
m context=2C and replace =E2=80=9Cshift left=E2=80=9D confusion with the c=
larity of =E2=80=9Cstart left=E2=80=9D success. If speed and security feel=
like a trade-off=2C this webinar will show you how to have both. Save you=
r spot now.</span></span></span></p></li><li style=3D"text-align: left;"><=
p class=3D"mcePastedContent" style=3D"text-align: left;"><a href=3D"https:=
//thehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756d=
d2d3&id=3Dbb8deaf2e9&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4=
a6ee0; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"><str=
ong><span style=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-famil=
y: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span=
style=3D"background-color: transparent">The Clear Roadmap to Identity Res=
ilience</span></span></span></strong></a><span style=3D"color:rgb(14=2C 16=
=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helv=
etica=2C Arial=2C sans-serif"><span style=3D"background-color: transparent=
"> =E2=80=94 Struggling with identity security gaps that increase risks an=
d inefficiencies? Join Okta=E2=80=99s experts=2C Karl Henrik Smith and Ada=
m Boucher=2C to discover how the Secure Identity Assessment (SIA) delivers=
a clear=2C actionable roadmap to strengthen your identity posture. Learn=
to identify high-risk gaps=2C streamline workflows=2C and adopt a scalabl=
e=2C phased approach to future-proofing your defenses. Don=E2=80=99t let i=
dentity debt hold your organization back=E2=80=94gain the insights you nee=
d to reduce risk=2C optimize operations=2C and secure business outcomes.</=
span></span></span></p></li></ul><p style=3D"text-align: left;"><br /></p>=
<p style=3D"text-align: left;"><em><span style=3D"font-family: 'Roboto'=2C=
'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif">P.S. Know someone w=
ho could use this? Share it.</span></em></p><p style=3D"text-align: left;"=
><br /></p><h2 style=3D"text-align: left;"><span style=3D"font-size: 20px"=
><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C=
Arial=2C sans-serif">=F0=9F=94=A7 Cybersecurity Tools</span></span></h2><=
p class=3D"mcePastedContent" style=3D"text-align: left;"><br /></p><ul sty=
le=3D"color: rgb(14=2C 16=2C 26); background: transparent; margin-top: 0pt=
; margin-bottom: 0pt;"><li style=3D"text-align: left;"><p class=3D"mcePast=
edContent" style=3D"text-align: left;"><a href=3D"https://thehackernews.us=
12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd2d3&id=3D86b55ab9=
e0&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a6ee0; background:=
transparent; margin-top: 0pt; margin-bottom: 0pt;"><span style=3D"color:r=
gb(74=2C 110=2C 224);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica=
Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-colo=
r: transparent">Extension Auditor</span></span></span></a><span style=3D"c=
olor:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvet=
ica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"background-c=
olor: transparent">: With cyber threats becoming more sophisticated=2C too=
ls like Extension Auditor are essential for maintaining online safety. Thi=
s tool evaluates your browser extensions for security and privacy risks=2C=
providing a clear analysis of permissions and potential vulnerabilities.=
Extension Auditor helps you identify and manage extensions that could exp=
ose you to danger=2C ensuring your browsing is secure and your data remain=
s private.</span></span></span></p></li><li style=3D"text-align: left;"><p=
class=3D"mcePastedContent" style=3D"text-align: left;"><a href=3D"https:/=
/thehackernews.us12.list-manage.com/track/click?u=3Df96f7fc0a6a553a99756dd=
2d3&id=3Dc71ded1995&e=3D9ec5472950" target=3D"_blank" style=3D"color: #4a=
6ee0; background: transparent; margin-top: 0pt; margin-bottom: 0pt;"><span=
style=3D"color:rgb(74=2C 110=2C 224);"><span style=3D"font-family: 'Robot=
o'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D=
"background-color: transparent">AD Threat Hunting Tool</span></span></span=
></a><span style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family=
: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span=
style=3D"background-color: transparent">: It is a simple yet powerful Pow=
erShell tool that helps detect suspicious activities in your Active Direct=
ory=2C like password spray attacks or brute force attempts. It provides re=
al-time alerts=2C smart analysis of attack patterns=2C and detailed report=
s with easy export options. With built-in testing to simulate attacks=2C t=
his tool is a must-have for keeping your AD environment secure and identif=
ying threats quickly.</span></span></span></p></li></ul><p class=3D"mcePas=
tedContent" style=3D"text-align: left;"><br /></p><h2 style=3D"text-align:=
left;"><span style=3D"font-size: 20px"><span style=3D"font-family: 'Robot=
o'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif">=F0=9F=94=92 T=
ip of the Week</span></span></h2><p style=3D"text-align: left;"><br /></p>=
<p style=3D"text-align: left;"><strong><span style=3D"color:rgb(14=2C 16=
=2C 26);"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Helv=
etica=2C Arial=2C sans-serif"><span style=3D"background-color: transparent=
">Essential Network Security Practices</span></span></span></strong><span=
style=3D"color:rgb(14=2C 16=2C 26);"><span style=3D"font-family: 'Roboto'=
=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-serif"><span style=3D"b=
ackground-color: transparent"> =E2=80=94 To effectively secure your networ=
k=2C you don=E2=80=99t need complex solutions. Keep your network safe with=
these easy tips: Use a VPN like NordVPN to protect your data and keep you=
r online activities private. Make sure your firewall is turned on to stop=
unwanted access. Keep your software and devices updated to fix security w=
eaknesses. Choose strong=2C unique passwords for all your accounts and con=
sider using a password manager to keep track of them. Teach yourself and o=
thers how to spot phishing scams to avoid giving away sensitive informatio=
n. These basic actions can greatly improve your network=E2=80=99s security=
and are simple to implement.</span></span></span></p><p style=3D"text-ali=
gn: left;"><br /></p><h2 style=3D"text-align: left;"><span style=3D"font-s=
ize: 20px"><span style=3D"font-family: 'Roboto'=2C 'Helvetica Neue'=2C Hel=
vetica=2C Arial=2C sans-serif">Conclusion</span></span></h2><p style=3D"te=
xt-align: left;"><br /></p><p style=3D"text-align: left;"><span style=3D"f=
ont-family: 'Roboto'=2C 'Helvetica Neue'=2C Helvetica=2C Arial=2C sans-ser=
if">As we close this week's newsletter=2C let's focus on the crucial issue=
of vulnerabilities in healthcare technology. These gaps highlight a press=
ing need for enhanced security measures and more dynamic regulatory framew=
orks that can quickly adapt to new threats. How can we fortify our defense=
s to better protect critical infrastructure? Your expertise is essential a=
s we tackle these challenges and push for more effective solutions. Let=E2=
=80=99s keep the dialogue open and continue to drive progress in our field=
=2E Stay informed and engaged.</span></p><p style=3D"text-align: left;" clas=
s=3D"last-child"><br /></p></div></td></tr></tbody></table></td></tr></tbo=
dy></table></td></tr></tbody></table></td></tr></tbody></table></td></tr><=
/tbody></table><!--[if (gte mso 9)|(IE)]></td></tr></table><![endif]--><=
/td></tr></tbody><tbody data-block-id=3D"13" class=3D"mceWrapper"><tr><td=
style=3D"background-color:transparent" valign=3D"top" align=3D"center" cl=
ass=3D"mceSectionFooter"><!--[if (gte mso 9)|(IE)]><table align=3D"center=
" border=3D"0" cellspacing=3D"0" cellpadding=3D"0" width=3D"660" style=3D"=
width:660px;"><tr><td><![endif]--><table border=3D"0" cellpadding=3D"0" c=
ellspacing=3D"0" width=3D"100%" style=3D"max-width:660px" role=3D"presenta=
tion"><tbody><tr><td style=3D"background-color:#ffffff" valign=3D"top" cla=
ss=3D"mceWrapperInner"><table align=3D"center" border=3D"0" cellpadding=3D=
"0" cellspacing=3D"0" width=3D"100%" role=3D"presentation" data-block-id=
=3D"12"><tbody><tr class=3D"mceRow"><td style=3D"background-position:cente=
r;background-repeat:no-repeat;background-size:cover" valign=3D"top"><table=
border=3D"0" cellpadding=3D"0" cellspacing=3D"0" width=3D"100%" role=3D"p=
resentation"><tbody><tr><td style=3D"padding-top:0;padding-bottom:0" valig=
n=3D"top" class=3D"mceColumn" data-block-id=3D"-6" colspan=3D"12" width=3D=
"100%"><table border=3D"0" cellpadding=3D"0" cellspacing=3D"0" width=3D"10=
0%" role=3D"presentation"><tbody><tr><td style=3D"background-color:#f9fbff=
;padding-top:100px;padding-bottom:12px;padding-right:8px;padding-left:8px"=
valign=3D"top"><table align=3D"center" border=3D"0" cellpadding=3D"0" cel=
lspacing=3D"0" width=3D"100%" role=3D"presentation" data-block-id=3D"11" i=
d=3D"section_6e88166a546e8b78a19e31f84799115a" class=3D"mceFooterSection">=
<tbody><tr class=3D"mceRow"><td style=3D"background-color:#f9fbff;backgrou=
nd-position:center;background-repeat:no-repeat;background-size:cover;paddi=
ng-top:0px;padding-bottom:0px" valign=3D"top"><table border=3D"0" cellpadd=
ing=3D"0" cellspacing=3D"12" width=3D"100%" role=3D"presentation"><tbody><=
tr><td style=3D"padding-top:0;padding-bottom:0" valign=3D"top" class=3D"mc=
eColumn" data-block-id=3D"-3" colspan=3D"12" width=3D"100%"><table border=
=3D"0" cellpadding=3D"0" cellspacing=3D"0" width=3D"100%" role=3D"presenta=
tion"><tbody><tr><td style=3D"padding-top:0;padding-bottom:0;padding-right=
:0;padding-left:0" valign=3D"top" align=3D"center"><table width=3D"100%" s=
tyle=3D"border:0;border-radius:0;border-collapse:separate"><tbody><tr><td=
style=3D"padding-left:16px;padding-right:16px;padding-top:12px;padding-bo=
ttom:12px" class=3D"mceTextBlockContainer"><div data-block-id=3D"9" class=
=3D"mceText" id=3D"dataBlockId-9" style=3D"display:inline-block;width:100%=
"><p class=3D"last-child"><a href=3D"https://mailchi.mp/8c066aa8f96d/6xt0u=
dv3ug-17990521?e=3D9ec5472950"><span style=3D"font-size: 11px">View email in=
browser</span></a><span style=3D"font-size: 11px"><br />
The Hacker News &middot; Pearl Omaxe Tower &middot; 810/8 Nsp=2C Pitampura=
&middot; New Delhi=2C Delhi 110034 &middot; India
<br /></span><a href=3D"https://thehackernews.us12.list-manage.com/profile=
?u=3Df96f7fc0a6a553a99756dd2d3&id=3D992467b2c4&e=3D9ec5472950&c=3D43bf0ccf90=
"><span style=3D"font-size: 11px">update your preferences</span></a><span=
style=3D"font-size: 11px"> or </span><a href=3D"https://thehackernews.us1=
2.list-manage.com/unsubscribe?u=3Df96f7fc0a6a553a99756dd2d3&id=3D992467b2c=
4&t=3Db&e=3D9ec5472950&c=3D43bf0ccf90"><span style=3D"font-size: 11px">unsub=
scribe</span></a></p></div></td></tr></tbody></table></td></tr><tr><td val=
ign=3D"top" class=3D"mceLayoutContainer" align=3D"center"><table align=3D"=
center" border=3D"0" cellpadding=3D"0" cellspacing=3D"0" width=3D"100%" ro=
le=3D"presentation" data-block-id=3D"-2"><tbody><tr class=3D"mceRow"><td s=
tyle=3D"background-position:center;background-repeat:no-repeat;background-=
size:cover;padding-top:0px;padding-bottom:0px" valign=3D"top"><table borde=
r=3D"0" cellpadding=3D"0" cellspacing=3D"24" width=3D"100%" role=3D"presen=
tation"><tbody></tbody></table></td></tr></tbody></table></td></tr></tbody=
></table></td></tr></tbody></table></td></tr></tbody></table></td></tr></t=
body></table></td></tr></tbody></table></td></tr></tbody></table></td></tr=
></tbody></table><!--[if (gte mso 9)|(IE)]></td></tr></table><![endif]--=
></td></tr></tbody></table>
</td>
</tr>
</tbody></table>
</center>
</body></html>
--_----------=_MCPart_1126807581--
    (1-1/1)