91Articles
8Categories
2023-08-07Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2017-18368 Zyxel P660HN-T1A Routers Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber a…
KEV
πŸ›
Researchers Uncover New High-Severity Vulnerability in PaperCut Software
πŸ›
IBM SDK, Java Technology Flaw Lets Remote Attacker Execute Arbitrary
πŸ›
Chromium: CVE-2023-4068 Type Confusion in V8
πŸ›
Chromium: CVE-2023-4069 Type Confusion in V8
πŸ›
Chromium: CVE-2023-4070 Type Confusion in V8
πŸ›
Chromium: CVE-2023-4071 Heap buffer overflow in Visuals
πŸ›
Chromium: CVE-2023-4072 Out of bounds read and write in WebGL
πŸ›
Chromium: CVE-2023-4073 Out of bounds memory access in ANGLE
πŸ›
Chromium: CVE-2023-4074 Use after free in Blink Task Scheduling
πŸ›
Chromium: CVE-2023-4075 Use after free in Cast
πŸ›
Chromium: CVE-2023-4076 Use after free in WebRTC
πŸ›
Chromium: CVE-2023-4077 Insufficient data validation in Extensions
πŸ›
Chromium: CVE-2023-4078 Inappropriate implementation in Extensions
πŸ›
CVE-2023-38157 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
⚠️
Assess multi-cloud security with the open-source CNAPPgoat project
⚠️
Enhancing Security Operations Using Wazuh: Open Source XDR and SIEM
⚠️
Microsoft Signing Key Stolen by Chinese
⚠️
Data Theft Extortion Attacks Rise 25 Percent in Just One Quarter and Take Top Attack Spot
⚠️
Reptile Rootkit Targets Linux Systems in South Korea
⚠️
VPNs remain a risky gamble for remote access
⚠️
GitHub Warns of Social Engineering Campaign Targeting Employees in the Technology Industry
⚠️
C-Suite, Rank-And-File at Odds Over Security’s Role
⚠️
New PaperCut Vulnerability Allows Remote Code Execution
⚠️
Microsoft Addresses Azure AD FlawΒ Following Criticism from Tenable’s CEO
⚠️
New Malware Campaign Targets Inexperienced Cyber Criminals with OpenBullet Configs
⚠️
Spanish Police Arrest 3 Behind Payment Card Fraud
⚠️
New SkidMap Malware Attacking Wide Range of Linux Distributions
⚠️
Cl0p Ransomware Gang Revises its Extortion Strategy
⚠️
Critical Bugs Found in PaperCut Allow RCE
⚠️
Nigerian Man Admits to $1.3M Business Email Compromise Scam
⚠️
News Alert: GhangorCloud selected to demo Deep AI-based capabilities at India’s G20 Summit
πŸ“’
White House Pushes Cybersecurity Defense for K-12 Schools
πŸ“’
Broad SBOM Adoption Takes Root as Businesses Watch Their Supply Chains
πŸ“’
Russian Hackers Overwhelm Spanish Sites With DDoS Attacks
πŸ“’
CISA Unveils Cybersecurity Strategic Plan for Next 3 Years
πŸ“’
US β€˜Lagging Behind’ on Border Gateway Protocol Security Practices, CISA and FCC Chiefs Say
πŸ“’
Live Webinar | Fortifying Data Security in Education: Microsoft 365 & Google Workspace Protection Aligned with NCSC Guidelines
πŸ”₯
Cyber Security Today, August 7, 2023 - Ransomware attack hits US hospitals, a Canadian insurer is sideswiped by MOVEit hacks, and more
πŸ”₯
Cyberattacks on Governments and Public Services Were Way up This Spring, Research Shows
πŸ”₯
Colorado Department of Higher Education Discloses Ransomware Attack, Data Breach
πŸ”₯
UK Sounds Warning Over Targeted Healthcare Attack
πŸ”₯
Colorado Department of Higher Education Warns of Massive Data Breach
πŸ”₯
US hospital network hit with ransomware attack
πŸ”₯
Clop Ransomware Now Uses Torrents to Leak Data and Evade Takedowns
πŸ”₯
North Korean hackers 'ScarCruft' breached Russian missile maker
πŸ”₯
Colorado Warns Ransomware Attack Caused Massive Data Breach
πŸ”₯
Hackers increasingly abuse Cloudflare Tunnels for stealthy connections
πŸ”₯
Authorities Warn Health Sector of Attacks by Rhysida Group
πŸ”₯
Colorado warns hackers stole 16 years of public school data in ransomware attack
πŸ”₯
TargetCompany Ransomware Abuses FUD Obfuscator Packers
πŸ•΅οΈ
ISC Stormcast For Monday, August 7th, 2023 https://isc.sans.edu/podcastdetail/8604, (Mon, Aug 7th)
πŸ•΅οΈ
Welcome to the New Have I Been Pwned Domain Search Subscription Service
πŸ•΅οΈ
Research Jailbreak Tesla’s Software-Locked Features Worth up to $15,000
πŸ•΅οΈ
Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems
πŸ•΅οΈ
New 'Deep Learning Attack' Deciphers Laptop Keystrokes with 95% Accuracy
πŸ•΅οΈ
New SkidMap Redis Malware Variant Targeting Vulnerable Redis Servers
πŸ•΅οΈ
[New Product] Supercharge Your Anti-Phishing Defense with KnowBe4’s PhishER Plus!
πŸ•΅οΈ
Vendor Email Compromise Attacks Use the Same Playbook for Multiple Attacks
πŸ•΅οΈ
Phishing Attacks Continue to Use Attachments as HTML Files Containing Java Dominate
πŸ•΅οΈ
Fraud Masquerades as Anti-Fraud
πŸ•΅οΈ
North Korean Hackers Targets Russian Missile Engineering Firm
πŸ•΅οΈ
North Korean Hackers Targeted Russian Missile Developer
πŸ•΅οΈ
AI researchers claim 93% accuracy in detecting keystrokes over Zoom audio
πŸ•΅οΈ
Cyberinsurance Firm Resilience Raises $100 Million to Expand Its Cyber Risk Platform
πŸ•΅οΈ
Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things
πŸ•΅οΈ
Microsoft AI Red Team building future of safer AI
πŸ•΅οΈ
Keep your sensitive data secure by using Encrypted Forms 2.0 from Jotform
πŸ•΅οΈ
GUEST ESSAY: Why any sudden influx of spam emails is an indicator of a likely security issue
πŸ•΅οΈ
Black Hat Fireside Chat: Horizon3.ai makes a strong case for continuous, self-service pentesting
πŸ•΅οΈ
Databases beware: Abusing Microsoft SQL Server with SQLRecon
πŸ•΅οΈ
The evolution of security analyst experience
πŸ•΅οΈ
AI researchers claim 93% accuracy in detecting keystrokes over Zoom audio
🌐
Fake VMware vConnector Package on PyPI Targets IT Pros
🌐
Hacktivists Fund Their Operations Using Common Cybercrime Tactics
🌐
New SkidMap Redis Malware Variant Targets Vulnerable Redis Servers
🌐
Spyware Maker Letmespy Shuts Down After Hacker Deletes Server Data
🌐
Latest Batloader Campaigns Use Pyarmor Pro for Evasion
πŸ“‘
FBI Alert: Crypto Scammers are Masquerading as NFT Developers
πŸ“‘
NYC Couple Pleads Guilty to Money Laundering in $3.6 Billion Bitfinex Hack
πŸ“‘
New Acoustic Attack Steals Data From Keystrokes With 95% Accuracy
πŸ“‘
SophosAI at DEF CON: Orchestrating large-scale scams using text, audio and image generative AI
πŸ“‘
Multi-Modal Data Protection With AI’s Help
πŸ“‘
Google Play apps with 2.5M installs load ads when screen's off
πŸ“‘
Live Webinar | Phishing Has a New Look: Deep Dive into AI's Impact on Phishing & Security
πŸ“‘
Hands on with Windows 11's new modern File Explorer
πŸ“‘
Update: Researchers scanning the Internet, (Mon, Aug 7th)
πŸ“‘
Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards
πŸ“‘
Scam websites offering jobs | Kaspersky official blog
πŸ“‘
Time is money, and online game scammers have lots of it
πŸ“‘
Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards