122Articles
8Categories
2023-07-20Date
🚨
Threat Actors Exploiting Citrix CVE-2023-3519 to Implant WebshellsSUMMARY The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this Cybersecurity Advisory to warn network defenders about exploitation of CVE-2023-3519, an unauthenticated remote code execution (RCE) vulnerability affecting NetScaler (formerly Citrix) Applicati…
KEV
🚨
Threat Actors Exploiting Citrix CVE-2023-3519 to Implant WebshellsSUMMARY The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this Cybersecurity Advisory to warn network defenders about exploitation of CVE-2023-3519, an unauthenticated remote code execution (RCE) vulnerability affecting NetScaler (formerly Citrix) Applicati…
KEV
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-29298 Adobe ColdFusion Improper Access Control Vulnerability CVE-2023-38205 Adobe ColdFusion Improper Access Control Vulnerability These type…
KEV
🐛
New research reveals rapid remediation of MOVEit Transfer vulnerabilities
🐛
CVE-2023-36934: Progress Software MOVEit Transfer SQL Injection Remote Code Execution Vulnerability
🐛
Zyxel Vulnerability Exploited by DDoS Botnets on Linux Systems
🐛
BMC&C: Lights Out Forever
KEV
🐛
Multiple DDoS Botnets Exploiting Recent Zyxel Vulnerability
🐛
The federal government’s cybersecurity policies are falling into place just in time to be stalled again
KEV
🐛
Active exploitation of Citrix Netscaler ADC, Gateway bug underway
🐛
Similarities between newly patched GE Cimplicity flaws, Sandworm attacks observed
🐛
Adobe Rolls Out New Patches for Actively Exploited ColdFusion Vulnerability
KEV
🐛
CISA Releases Cybersecurity Advisory on Threat Actors Exploiting Citrix CVE-2023-3519
KEV
⚠️
Two Jira Plugin Vulnerabilities in Attacker Crosshairs
⚠️
Adobe Releases New Patches for Exploited ColdFusion Vulnerabilities
⚠️
Oracle Releases 508 New Security Patches With July 2023 CPU
⚠️
New P2PInfect Worm Targeting Redis Servers on Linux and Windows Systems
⚠️
EP14: The Permissions Management Nightmare in SharePoint Online
⚠️
Protecting energy infrastructure from cyberattacks
⚠️
Weekly Intelligence Snapshot – Week 29, 2023
⚠️
The Week in Security: Google Cloud Build permissions can be poisoned, WormGPT weaponizes AI
⚠️
New P2P Worm Puts Windows and Linux Redis Servers in its Sights
⚠️
1,000 CISOs strong: How cross-company collaboration strengthens enterprise cybersecurity
⚠️
A look at Chrome’s security review culture
⚠️
P2PInfect: New Peer-to-Peer Worm Targeting Redis Servers
⚠️
New free cloud security tools offered by CISA
⚠️
Supply chain security for Go, Part 3: Shifting left
⚠️
Adobe Fixes ColdFusion Zero-Day - Again
KEV
⚠️
Mallox Ransomware Exploits Weak MS-SQL Servers to Breach Networks
⚠️
Critical Flaws in AMI MegaRAC BMC Software Expose Servers to Remote Attacks
⚠️
Apache OpenMeetings Web Conferencing Tool Exposed to Critical Vulnerabilities
⚠️
New P2PInfect Worm Targeting Redis Servers on Linux and Windows Systems
⚠️
CISA Releases One Industrial Control Systems Advisory
⚠️
Supply chain security for Go, Part 3: Shifting left
⚠️
A look at Chrome’s security review culture
⚠️
The number of contributors to an open source project seems to inversely relate to the number of CVEs published (normalized over the age of the project and the Lines Of Code)
⚠️
Apple employee reportedly didn’t tell Google about zero-day exploit found in Chrome
📢
Commentary on the Implementation Plan for the 2023 US National Cybersecurity Strategy
📢
Industry Experts Urge CISA to Update Secure by Design Guidance
📢
CISA and NSA Issue New Guidance to Strengthen 5G Network Slicing Against Threats
📢
Justice to merge 2 offices in step with cyber implementation plan
🔥
FIN8 APT Delivers BlackCat Ransomware Using Sardonic Backdoor Variant
🔥
Healthcare Organizations in the Crosshairs of Cyberattackers
🔥
JumpCloud breach traced back to North Korean state hackers
🔥
Estée Lauder Takes Down Some Systems Following Cyberattack
🔥
Russian Medical Lab Suspends Some Services After Ransomware Attack
🔥
The State of Ransomware in Education 2023
🔥
The State of Ransomware in Education 2023
🔥
OnDemand | Where Did the Hackers Go? They Ran(somware): Insights into Ransomware Recovery
🔥
Turla's New DeliveryCheck Backdoor Breaches Ukrainian Defense Sector
🔥
Tampa General Hospital Says Hackers Exfiltrated the Data of 1.2 Million Patients
🔥
Combat IT Team Burnout by Embracing Automation
🔥
JumpCloud Cyberattack Linked to North Korean Hackers
🔥
Cosmetics Giant Estée Lauder Targeted by Two Ransomware Groups
🔥
New Ransomware With RAT Capabilities Impersonating Sophos
🔥
Cl0p, ALPHV/BlackCat claim separate attacks against Estee Lauder
🔥
Ransomware attack impacts Russian medical laboratory
🔥
JumpCloud Blames North Korean Hackers on Breach
🔥
Breach Roundup: US Ambassador to China's Email Hacked Too
🔥
Turla's New DeliveryCheck Backdoor Breaches Ukrainian Defense Sector
🔥
Microsoft Expands Cloud Logging to Counter Rising Nation-State Cyber Threats
🔥
Security Patch Management Strengthens Ransomware Defense
🕵️
Famed Hacker Kevin Mitnick Dead at 59
KEV
🕵️
ISC Stormcast For Thursday, July 20th, 2023 https://isc.sans.edu/podcastdetail/8580, (Thu, Jul 20th)
🕵️
Threat Actors Enhance Phishing Tactics with Zip Domains
🕵️
Understanding Artificial Intelligence
🕵️
Deobfuscation of Malware Delivered Through a .bat File, (Thu, Jul 20th)
🕵️
Alleged drug baron coordinating drug production in Europe is arrested in Colombia
🕵️
Singapore releases draft guidelines on personal data use in AI training
🕵️
[SANS ISC] Deobfuscation of Malware Delivered Through a .bat File
🕵️
Job Scams Using Bioscience Lures Target Universities
🕵️
Recently Patched GE Cimplicity Vulnerabilities Reminiscent of Russian ICS Attacks
🕵️
Protected: Neo_Net | The Kingpin of Spanish eCrime
🕵️
Bad ad fad leads to IcedID, Gozi infections
🕵️
Nation States Using Cybercrime Groups as Proxies, Warns NCA Chief
🕵️
APT41 hackers target Android users with WyrmSpy, DragonEgg spyware
🕵️
Lessons Learned From Brazil's PIX for US FedNow Program
🕵️
Anonymous Sudan DDoS strikes dominate attacks by KillNet collective
🕵️
My go-to cleaning app for Mac just got a major security upgrade
🕵️
Threat Actors are Targeting Your Web Applications – Here’s How To Protect Them
🕵️
Shenetworks’ Guide to Landing Your First Tech Job
🕵️
North Korean-linked Lazarus Group tied to supply chain attack on JumpCloud
🕵️
Remembering World-Famous Computer Hacker Kevin Mitnick
KEV
🕵️
New AMI BMC Flaws Allowing Takeover and Physical Damage Could Impact Millions of Devices
🕵️
Human Cyber-Risk Can Be Demonstrably Mitigated by Behavior Changing Training: Analysis
🕵️
10 Steps to Help Secure Your APIs
🕵️
Remembrances pour on to social media on the passing of famed hacker Kevin Mitnick
KEV
🕵️
Kevin Mitnick Died
KEV
🕵️
Stolen OpenAI credentials prevalent on the dark web
🕵️
Bioscience, health job lures leveraged in new scam campaign
🕵️
Malware risk inaccurately classified by AI, LLMs
🕵️
New Turla attacks target Exchange servers with DeliveryCheck malware
🕵️
Novel Android spyware strain versions leveraged by APT41
🕵️
Cyber Resilience Act: The Future of Software in the European Union
🕵️
UN security council delegates urge AI controls to defuse potential global threat
🕵️
Black SEO Offerings Gaining Momentum in Underground Forums
🕵️
Feds Warn Hospitals, Telehealth Firms About Web Tracker Use
🕵️
Graylog Buys API Security Firm Resurface for Added Telemetry
🕵️
IBM’s Watson rebooted as a secure AI alternative
🕵️
GitHub warns of Lazarus hackers targeting devs with malicious projects
🕵️
Chinese Threat Group APT41 Linked To Android Malware Attacks
🕵️
Federal Reserve's FedNow Goes Live With Fast Payments
🕵️
North Korean State-Sponsored Hackers Suspected in JumpCloud Supply Chain Attack
🕵️
Deobfuscation of Malware Delivered Through a .bat File, (Thu, Jul 20th)
🕵️
ISC Stormcast For Thursday, July 20th, 2023 https://isc.sans.edu/podcastdetail/8580, (Thu, Jul 20th)
🕵️
LLM in the Cloud — Advantages and Risks
🕵️
Kevin Mitnick Obituary - Las Vegas, NV
KEV
🌐
Bad ad fad leads to IcedID, Gozi infections
🌐
New P2PInfect worm malware targets Linux and Windows Redis servers
🌐
KillNet DDoS Attacks Further Moscow's Psychological Agenda
🌐
Critical AMI MegaRAC bugs can let hackers brick vulnerable servers
🌐
Part I: Implementing Effective Cyber Security Metrics That Reduce Risk Realistically
📡
OpenAI Credentials Stolen by the Thousands for Sale on the Dark Web
📡
Microsoft Set to Expand Access to Detailed Logs in the Wake of Chinese Hacking Operation
📡
Business Continuity and Disaster Recovery: Essential Offerings for Small Medium Businesses
📡
Google Chrome gets Windows 11's new design - how to enable it
📡
Phishing via Google Ads
📡
Renewable technologies add risk to the US electric grid, experts warn
📡
Update: Old Roblox Data Leak Resurfaces, 4000 Users' Personal Information Exposed
📡
A Few More Reasons Why RDP is Insecure (Surprise!)
📡
Updated Researcher Portal Submission Form: Discover the New Fields in the Submission Form
📡
8 common work-from-home scams to avoid