72Articles
8Categories
2023-08-04Date
πŸ›
FBI, CISA, and NSA Reveal Top Exploited Vulnerabilities of 2022
πŸ›
Exploitation of Ivanti EPMM Flaw Picking Up as New Vulnerability Is Disclosed
πŸ›
CISA Advisory of Top 42 Frequently Exploited Flaws of 2022
⚠️
Mysterious Team Bangladesh Hackers Launched 750 DDoS Attacks and Hacked 78 Website
⚠️
Major Cybersecurity Agencies Collaborate to Unveil 2022's Most Exploited Vulnerabilities
⚠️
Dozens of RCE Vulnerabilities Impact Milesight Industrial Router
⚠️
670 ICS Vulnerabilities Disclosed by CISA in First Half of 2023: Analysis
⚠️
Decommissioned Medical Infusion Pumps Expose Wi-Fi Configuration Data
⚠️
Five Eyes Agencies Call Attention to Most Frequently Exploited Vulnerabilities
⚠️
Patching Conundrum: 4-Year Old Flaw Again Tops Most-Hit List
⚠️
Patching Conundrum: 5-Year Old Flaw Again Tops Most-Hit List
⚠️
Threat Actors Abuse Cloudflare Tunnel for Persistent Access, Data Theft
⚠️
Microsoft Criticized Over Handling of Critical Power Platform Vulnerability
⚠️
In Other News: Cybersecurity Funding Rebounds, Cloud Threats, BeyondTrust Vulnerability
⚠️
CISA Releases its Cybersecurity Strategic Plan
⚠️
Hackers Deliver Magniber Ransomware Disguised as Windows Security Update Package
⚠️
Cyber Security Today, Week in Review for Friday, August 4, 2023
⚠️
California Hospital Chain Facing Ransom, Service Disruption
⚠️
New PaperCut critical bug exposes unpatched servers to RCE attacks
⚠️
Meet Window Snyder, the trailblazer who helped secure the internet and billions of devices
⚠️
Health data of 1.7 million Oregon residents accessed by MOVEit hackers
⚠️
Pixel Binary Transparency: verifiable security for Pixel devices
⚠️
Microsoft mitigates Power Platform Custom Code information disclosure vulnerability
⚠️
Pawning your users to Cloudflare is not how you offer your users security; fedi admins must realize this.
πŸ“’
Points.com Vulnerabilities Allowed Customer Data Theft, Rewards Program Hacking
πŸ“’
CISA Cybersecurity Strategic Plan: Shifting the Arc of National Risk to Create a Safer Future
πŸ“’
Ivanti security advisory (AV23-462)
πŸ“’
US CISA Urges Improvements to Key Computer Component
πŸ“’
ISMG Editors: Financial Services Special
πŸ”₯
Are Leaked Credentials Dumps Used by Attackers?, (Fri, Aug 4th)
πŸ”₯
Poor access management besets most cloud compromises, Google says
πŸ”₯
Malicious npm Packages Found Exfiltrating Sensitive Data from Developers
πŸ”₯
Hawai’I’s Gemini North Observatory Suspends Operations Following Cyberattack
πŸ”₯
US Government Contractor Serco Discloses Data Breach After MOVEit Transfer Attacks
πŸ”₯
A Cyberattack Has Disrupted Hospitals and Health Care in Five States
πŸ”₯
UK Sounds Warning Over Targeted Healthcare Attack
πŸ”₯
The Week in Ransomware - August 4th 2023 - Targeting VMware ESXi
πŸ”₯
Israel cybersecurity agency says no breach after senior official self-infects home PC with malware
πŸ”₯
Ransomware attacks cost manufacturing sector $46 billion in downtime since 2018, report claims
πŸ•΅οΈ
ISC Stormcast For Friday, August 4th, 2023 https://isc.sans.edu/podcastdetail/8602, (Fri, Aug 4th)
πŸ•΅οΈ
New hVNC Malware Targets macOS Devices
πŸ•΅οΈ
Hacker Group of 1980s is Back with Secure Coding Framework for Developers
πŸ•΅οΈ
What is Business Email Compromise (BEC) Attacks? – Prevention Guide
πŸ•΅οΈ
New Version of Rilide Data Theft Malware Adapts to Chrome Extension Manifest V3
πŸ•΅οΈ
New York Couple Plead Guilty to Bitcoin Laundering
πŸ•΅οΈ
Rilide Stealer Evolves to Target Chrome Extension Manifest V3
πŸ•΅οΈ
Boarding Pass Selfies and Cybersecurity Don't Mix
πŸ•΅οΈ
Friday Squid Blogging: 2023 Squid Oil Global Market Report
🌐
These Are the Top Five Cloud Security Risks, Qualys Says
🌐
Fake VMware vConnector package on PyPI targets IT pros
🌐
Hackers can Abuse Microsoft Office Executables to Download Malware
🌐
Google explains how Android malware slips onto Google Play Store
πŸŽ™οΈ
Cyber Security Today, August 4, 2023 -- The shadow hanging over your IT network
πŸ“‘
Fake FlipperZero Site Used to Phish Users
πŸ“‘
IOTW Italian banks hit with DDoS attacks
πŸ“‘
Political Milestones for AI
πŸ“‘
SCARF Cipher Sets New Standards in Protecting Sensitive Data
πŸ“‘
Webinar - Making PAM Great Again: Solving the Top 5 Identity Team PAM Challenges
πŸ“‘
Burger King Forgets to put a Password on Their Systems, Again
πŸ“‘
NYC Couple Pleads Guilty to Money Laundering in $3.6 Billion Bitfinex Hack
πŸ“‘
Spotify down: music searches, pages, account signups not working
πŸ“‘
Teach a Man to Phish and He’s Set for Life
πŸ“‘
Extended warranty robocallers fined $300 million after 5 billion scam calls
πŸ“‘
Mondee Security Lapse Exposed Flight Itineraries and Unencrypted Credit Card Numbers
πŸ“‘
Malicious Apps Use Sneaky Versioning Technique to Bypass Google Play Store Scanners
πŸ“‘
Microsoft kills Cortana in Windows 11 preview, long live AI!
πŸ“‘
FBI warns of scammers posing as NFT devs to steal your crypto
πŸ“‘
Microsoft fixes flaw after being called irresponsible by Tenable CEO
πŸ“‘
β€œCrocodile of Wall Street” and her husband plead guilty to giant-sized cryptocrimes
πŸ“‘
Break IT/OT Silos by Expanding SOC Responsibilities
πŸ“‘
Airbnb security tips | Kaspersky official blog
πŸ“‘
Check cybersecurity pre-invest – Week in security with Tony Anscombe