74Articles
8Categories
2023-08-01Date
🚨
Threat Actors Exploiting Ivanti EPMM VulnerabilitiesSUMMARY The Cybersecurity and Infrastructure Security Agency (CISA) and the Norwegian National Cyber Security Centre (NCSC-NO) are releasing this joint Cybersecurity Advisory (CSA) in response to active exploitation of CVE-2023-35078 and CVE-2023-35081. Advanced persistent threat…
KEV
πŸ›
CISA and International Partner NCSC-NO Release Joint Cybersecurity Advisory on Threat Actors Exploiting Ivanti EPMM Vulnerabilities
πŸ›
CVE-2021-34506 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
πŸ›
CVE-2021-42307 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
πŸ›
CVE-2021-31982 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
πŸ›
CVE-2021-34475 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
πŸ›
CVE-2023-28261 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
πŸ›
CVE-2022-29144 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
⚠️
136: Team Xecutor
⚠️
White House Unveils β€˜Whole of Society’ Push To Expand Cybersecurity Workforce
⚠️
The Race Against Time in Ransomware Attacks
⚠️
Meta Subsidiaries Must Pay $14M Over Misleading Data Collection Disclosure
⚠️
Ransomware Attacks Frequently Target Organizations with 51-200 Employees
⚠️
Hacker Conversations: Youssef Sammouda, Bug Bounty Hunter
⚠️
Stremio Vulnerability Exposes Millions to Attack
⚠️
How to manage a mass password reset due to a ransomware attack
⚠️
Socket Scores $20M as Investors Bet on Software Supply Chain Security Startups
⚠️
CISA issues new warning on actively exploited Ivanti MobileIron bugs
KEV
⚠️
Why Many Organizations Are Consolidating Tool Sets With MSPs
⚠️
Firefox fixes a flurry of flaws in the first of two releases this month
⚠️
Investing in a Robust Cybersecurity Workforce
πŸ“’
Mozilla security advisory (AV23-452)
πŸ“’
[Control systems] APSystems security advisory (AV23-453)
πŸ“’
GitLab security advisory (AV23-454)
πŸ”₯
Enterprises Should Layer-up Security to Avoid Legal Repercussions
πŸ”₯
Web Browsing is the Primary Entry Vector for Ransomware Infections
πŸ”₯
Ransomware Attacks on Industrial Organizations Doubled in Past Year: Report
πŸ”₯
Bedding Giant Tempur Sealy Takes Systems Offline Following Cyberattack
πŸ”₯
Spike in Ransomware Delivery via URLs, Reports Unit 42
πŸ”₯
Mattress Giant Tempur Sealy Hit with Cyberattack Forcing System Shutdown
πŸ”₯
The State of Ransomware in State and Local Government 2023
πŸ”₯
Retail chain Hot Topic discloses wave of credential-stuffing attacks
πŸ”₯
Hackers use new malware to breach air-gapped devices in Eastern Europe
πŸ”₯
Hosting Provider Accused of Facilitating Nation-State Hacks
πŸ”₯
Tennessee Heart Clinic Tells 170,000 of Hacking, Data Breach
πŸ•΅οΈ
ISC Stormcast For Tuesday, August 1st, 2023 https://isc.sans.edu/podcastdetail/8596, (Tue, Aug 1st)
πŸ•΅οΈ
Possible Chinese Malware in US Systems a β€˜Ticking Time Bomb’: Report
πŸ•΅οΈ
200 Canon Printer Models May Expose Wi-Fi Connection Data
πŸ•΅οΈ
China's APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe
πŸ•΅οΈ
Researchers Expose Space Pirates' Cyber Campaign Across Russia and Serbia
πŸ•΅οΈ
New Android Malware Via WhatsApp steals Call logs, Locations, & Contacts
πŸ•΅οΈ
Hacking AI Resume Screening with Text in a White Font
πŸ•΅οΈ
Meow Campaign Reaches Misconfigured Jupyter Notebook Instances
πŸ•΅οΈ
A Long-Running Credential Phishing Expedition
πŸ•΅οΈ
CyberheistNews Vol 13 #31 [Beware of the Barbie Scams] What You Need to Know After the Recent Movie Release
πŸ•΅οΈ
Researchers Expose Space Pirates' Cyber Campaign Across Russia and Serbia
πŸ•΅οΈ
Iranian Hackers Posed as Israelis in Targeted LinkedIn Phishing Attack
πŸ•΅οΈ
Summary of DNS over HTTPS requests against our honeypots., (Tue, Aug 1st)
πŸ•΅οΈ
Weaponized Excel, OneNote, or PDF Attachments Deliver New WikiLoader Malware
πŸ•΅οΈ
Nile Raises $175 Million for Secure NaaS Solutions
πŸ•΅οΈ
Silk Security Emerges from Stealth With $12.5 Million Seed Funding
πŸ•΅οΈ
SpecterOps Updates BloodHound Active Directory Mapping Tool
πŸ•΅οΈ
Burp Suite 2023.8 Released – What’s New!
πŸ•΅οΈ
Nearly All Modern CPUs Leak Data to New Collide+Power Side-Channel Attack
πŸ•΅οΈ
Iran-Run ISP β€˜Cloudzy’ Caught Supporting Nation-State APTs, Cybercrime Hacking Groups
πŸ•΅οΈ
Threat actors abuse Google AMP for evasive phishing attacks
πŸ•΅οΈ
Forgepoint Capital Places $20M Series A Bet on Converge Insurance
πŸ•΅οΈ
Why Security Leaders Need to Have a 'Broadness of Skills'
πŸ•΅οΈ
Business-to-Business Synthetic ID Fraud Is on the Rise
πŸ•΅οΈ
Microsoft Defender for Office 365 gets highest rating in SE Labs Enterprise Email Security Services test for Q1 2023
🌐
Cybercriminals Renting WikiLoader to Target Italian Organizations with Banking Trojan
🌐
New WikiLoader Malware Employs Sophisticated Evasion
🌐
European Bank Customers Targeted in SpyNote Android Trojan Campaign
🌐
SpyNote Android Spyware Strikes Financial Institutions Through Smishing Campaigns
🌐
Cybercriminals train AI chatbots for phishing, malware attacks
🌐
Hackers Steal Signal, Whatsapp User Data With Fake Android Chat App
🌐
New NodeStealer Targeting Facebook Business Accounts and Crypto Wallets
🌐
4 Generative AI Security Benefits
πŸ“‘
Be Aware of Exposure of Sensitive Data on Wi-Fi Settings for Canon Inkjet Printers
πŸ“‘
What is Data Security Posture Management (DSPM)?
πŸ“‘
Dynatrace Acquires Cloud-Native Debugging Platform Rookout
πŸ“‘
How to Leverage the AWS Cost Optimization Pillar
πŸ“‘
A Better Way to Secure Servers & Cloud Workloads
πŸ“‘
Quantum computing: Will it break crypto security within a few years?