83Articles
8Categories
2023-07-25Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023- 35078 Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability These types of vulnerabilities are frequent attack vectors for malici…
KEV
πŸ›
Atlassian Releases Patches for Critical Flaws in Confluence and Bamboo
πŸ›
Ivanti Releases Urgent Patch for EPMM Zero-Day Vulnerability Under Active Exploitation
KEV
πŸ›
Apple Rolls Out Urgent Patches for Zero-Day Flaws Impacting iPhones, iPads and Macs
KEV
πŸ›
Apple Rolls Out Urgent Patches for Zero-Day Flaws Impacting iPhones, iPads and Macs
πŸ›
Ivanti Zero-Day Vulnerability Exploited in Attack on Norwegian Government
πŸ›
Zenbleed: New Flaw in AMD Zen 2 Processors Puts Encryption Keys and Passwords at Risk
πŸ›
New 'Zenbleed' Flaw in AMD Zen 2 Processors Puts Encryption Keys and Passwords at Risk
πŸ›
Threat Actors Exploiting Ivanti Endpoint Manager Mobile CVE-2023-35078
⚠️
A Vulnerability in Ivanti Endpoint Manager Mobile Could Allow for Unauthorized Access to API Paths
⚠️
Norway says Ivanti zero-day was used to hack govt IT systems
⚠️
Ivanti Patches Mobileiron Zero-Day Bug Exploited in Attacks
⚠️
TETRA:BURST β€” 5 New Vulnerabilities Exposed in Widely Used Radio Communication System
⚠️
AMD CPU Vulnerability β€˜Zenbleed’ Can Expose Sensitive Information
⚠️
Apple Releases Security Updates for Multiple Products
⚠️
Five New 'TETRA:BURST' Vulnerabilities Exposed in Widely Used Radio Communication System
KEV
⚠️
VMware fixes bug exposing CF API admin credentials in audit logs
⚠️
CISA Releases Four Industrial Control Systems Advisories
⚠️
TETRA Radio Standard Vulnerabilities Can Expose Military Comms, Industrial Systems
⚠️
Ivanti Zero-Day Used in Norway Government Breach
⚠️
Cloud Is an Easy Conduit for Attackers
⚠️
Managing Legacy Medical, OT, IoT Device Risk in Healthcare
⚠️
CISA warns govt agencies to patch Ivanti bug exploited in attacks
⚠️
Critical Vulnerabilities Found in Radio Encryption System
⚠️
Supply Chain, Open Source Pose Major Challenge to AI Systems
⚠️
Cryptojacking: Understanding and defending against cloud compute resource abuse
⚠️
BookCrossing - 1,582,323 breached accounts
⚠️
Dear all, What are some common subject lines in phishing emails?
πŸ“’
Apple security advisory (AV23-433)
πŸ“’
Casbaneiro Banking Malware Goes Under the Radar with UAC Bypass Technique
πŸ“’
Ivanti security advisory (AV23-434)
πŸ“’
More US States are ramping up data privacy laws in 2023
πŸ“’
Hacker Claims to Have Stolen Sensitive Medical Records from Egypt's Ministry of Health
πŸ“’
[Control systems] Johnson Controls security advisory (AV23-436)
πŸ“’
Citrix security advisory (AV23-435)
πŸ“’
[Control systems] Emerson security advisory (AV23-437)
πŸ“’
[Control systems] Axis Communications security advisory (AV23-439)
πŸ“’
[Control systems] Rockwell Automation security advisory (AV23-438)
πŸ“’
CISA Establishes Regional Election Security Advisors to Strengthen Front Line Support to the Election Community
πŸ“’
Help Your Employees Guard Against Rising Attacks
πŸ“’
HPE security advisory (AV23-440)
πŸ”₯
Roblox data breach exposes developer data
πŸ”₯
Clop Could Make $100m from MOVEit Campaign
πŸ”₯
Law Firm Hack Affects Victims of an Earlier Breach Again
πŸ”₯
Data Breach Costs Hit Record High but Fall For Some
πŸ”₯
Global Ransomware Onslaught: GRIT Discovers 14 Fresh Ransomware Groups
πŸ”₯
Lazarus APT Hackers Hijack Microsoft IIS Servers to Spread Malware
πŸ”₯
RaaS proliferation: 14 new ransomware groups target organizations worldwide
πŸ”₯
Update: North Korean Cyber Group Suspected in JumpCloud Breach
πŸ”₯
Maritime Cyberattack Database Launched by Dutch University
πŸ”₯
ALPHV/BlackCat Ransomware Targeting of Canadian Industries
πŸ”₯
Data Breach Cost Control: Practice and Preparedness Pay Off
πŸ”₯
Who and What is Behind the Malware Proxy Service SocksEscort?
πŸ•΅οΈ
ISC Stormcast For Tuesday, July 25th, 2023 https://isc.sans.edu/podcastdetail/8586, (Tue, Jul 25th)
πŸ•΅οΈ
New York Using AI to Detect Subway Fare Evasion
πŸ•΅οΈ
Thales to Buy Imperva From PE Firm Thoma Bravo for $3.6B
πŸ•΅οΈ
Thales Acquiring Imperva From Thoma Bravo for $3.6 Billion
πŸ•΅οΈ
North Korean Nation-State Actors Exposed in JumpCloud Hack After OPSEC Blunder
πŸ•΅οΈ
Chinese Cyberespionage Group APT31 Targets Eastern European Entities
πŸ•΅οΈ
Webinar Tomorrow: Exposing Common Myths of OT Cybersecurity
πŸ•΅οΈ
How to build stronger security teams
πŸ•΅οΈ
How to write a killer pentest report
πŸ•΅οΈ
Palo Alto Networks Secures Black Hat from Itself
πŸ•΅οΈ
Hacking police radios: 30-year-old crypto flaws in the spotlight
🌐
macOS Under Attack: Examining the Growing Threat and User Perspectives
🌐
Over 400,000 corporate credentials stolen by info-stealing malware
🌐
Mysterious Decoy Dog malware toolkit still lurks in DNS shadows
🌐
Casbaneiro Banking Malware Goes Under the Radar with UAC Bypass Technique
🌐
Realst info-stealing malware targets macOS cryptocurrency users
🌐
New Realst macOS malware steals your cryptocurrency wallets
πŸ“‘
Onetrust Hauls in Another $150 Million on a $4.5 Billion Down Round Valuation
πŸ“‘
Los Angeles SIM Swapper Pleads Guilty to Cybercrime Charges
πŸ“‘
How MDR Helps Solve the Cybersecurity Talent Gap
πŸ“‘
Live Webinar | 2023 Phishing By Industry Benchmarking Report: How Does Your Organisation Measure Up
πŸ“‘
Google Messages Getting Cross-Platform End-to-End Encryption with MLS Protocol
πŸ“‘
Thales Acquiring Imperva From Thoma Bravo for $3.6 Billion
πŸ“‘
Introducing Sophos MDR for Microsoft Defender
πŸ“‘
Microsoft shares temp fix for Outlook Desktop slow saving bug
πŸ“‘
Spyhide Stalkerware is Spying on Tens of Thousands of Phones
πŸ“‘
Google Chrome to offer 'Link Previews' when hovering over links
πŸ“‘
Super Admin elevation bug puts 900,000 MikroTik devices at risk
πŸ“‘
How to Leverage AWS Performance Efficiency Pillar
πŸ“‘
4 Cybersecurity Budget Management Tips