116Articles
10Categories
2023-08-09Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-38180 Microsoft .NET Core and Visual Studio Denial of Service Vulnerability These types of vulnerabilities are frequent attack vectors for mali…
KEV
🐛
New Inception Attack Leaks Sensitive Data From All AMD Zen CPUs
🐛
Microsoft Office Update Breaks Actively Exploited RCE Attack Chain
KEV
🐛
Collide+Power, Downfall, and Inception: New Side-Channel Attacks Affecting Modern CPUs
🐛
MAR-10454006.r4.v2 SEASPY and WHIRPOOL Backdoors
⚠️
Microsoft Patch Tuesday, August 2023 Edition
KEV
⚠️
Rubrik Buys Startup Laminar to Unify Cyber Posture, Recovery
⚠️
New SkidMap Malware Variant Targets Linux Distributions
⚠️
Downfall: New Intel CPU Attack Exposing Sensitive Information
⚠️
New ‘Inception’ Side-Channel Attack Targets AMD Processors
⚠️
Patch Tuesday: Microsoft Fixes 2 Office Zero-Days, Critical Team Flaw
KEV
⚠️
Malicious Campaigns Exploit Weak Kubernetes Clusters for Crypto Mining
⚠️
SAP Patches Critical Vulnerability in PowerDesigner Product
⚠️
U.K. Electoral Commission Breach Exposes Voter Data of 40 Million Britons
⚠️
‘Downfall’ Vulnerability Leaves Billions of Intel CPUs at Risk
⚠️
As Cars Hoover up More and More Drivers’ Data, is it Time to Regulate the Industry?
⚠️
Intel Addresses 80 Firmware, Software Vulnerabilities
⚠️
Rapid7 Lays Off 18% of Employees Amid Shift to MDR Services
⚠️
Rubrik Buys Startup Laminar to Unify Cyber Posture, Recovery
⚠️
Google to fight hackers with weekly Chrome security updates
⚠️
16 Zero-Day Vulnerabilities Discovered in CODESYS Affect Millions of Industrial Devices
⚠️
Data Exfiltration is Now the Go-to Cyber Extortion Strategy
⚠️
Popular open source project Moq criticized for quietly collecting data
⚠️
White House Debuts $20M Contest to Exterminate Bugs With AI
⚠️
Scammers Exploit Twitter’s Transition to “X”
⚠️
Rhysida ransomware behind recent attacks on healthcare
⚠️
“Downfall” bug affects years of Intel CPUs, can leak encryption keys and more
⚠️
Hackers use open source Merlin post-exploitation toolkit in attacks
⚠️
New BitForge cryptocurrency wallet flaws lets hackers steal crypto
⚠️
Anton’s Security Blog Quarterly Q3 2023
⚠️
Law Enforcement Takes Down Phishing As A Service Site
⚠️
Symmetry raises $18M to bolster organizations’ data security programs
⚠️
Cybersecurity giant Rapid7 announces sweeping layoffs as losses mount
⚠️
Back to School Month: Let’s Step Towards a Stronger and More Secure future for Our Nation’s Schools
⚠️
News alert: Fireblocks uncovers vulnerabilities impacting dozens of major wallet providers
⚠️
Microsoft Patch Tuesday: 74 CVEs plus 2 “Exploit Detected” advisories
⚠️
X-Force releases detection & response framework for managed file transfer software
⚠️
“Downfall” bug affects years of Intel CPUs, can leak encryption keys and more
📋
Microsoft Releases Patches for 74 New Vulnerabilities in August Update
📋
Cyber Security Today, August 9, 2023 - The latest ransomware news, and more
📋
40 Vulnerabilities Patched in Android With August 2023 Security Updates
📢
New Android 14 Security Feature: IT Admins Can Now Disable 2G Networks
📢
Microsoft security advisory – August 2023 monthly rollup (AV23-470)
📢
SAP security advisory – August 2023 monthly rollup (AV23-469)
📢
China-Linked Hackers Strike Worldwide: 17 Nations Hit in 3-Year Cyber Campaign
📢
[Control systems] Siemens security advisory (AV23-472)
📢
Intel security advisory (AV23-471)
📢
Microsoft Edge security advisory (AV23-473)
📢
Red Hat security advisory (AV23-474)
📢
HPE security advisory (AV23-475)
📢
US Restricts Investment in Chinese AI, Other Technologies
📢
The Journey to Zero Trust with Industry Frameworks
📢
The Journey to Zero Trust with Industry Frameworks
🔥
Threat Actors English-Speaking Countries with Customized Yashma Ransomware
🔥
UK Electoral Commission suffers years-long cyber attack
🔥
Morgan & Morgan Sues Tampa General Hospital Over Data Breach
🔥
Yashma Ransomware Evolves with Multilingual Attack
🔥
New Report Exposes Vice Society's Collaboration with Rhysida Ransomware
🔥
UK Voters’ Data Exposed in Electoral Commission Cyberattack
🔥
SESARAM Confirms Cyberattack and Suspends Non-Urgent Activity
🔥
Lockbit Threatens to Leak Medical Data of Cancer Patients Stolen From Varian Medical Systems
🔥
Big Cyberespionage Attack Against Japan Attributed to China
🔥
Northern Ireland Police at Risk After Serious Data Breach
🔥
The Ransomware Rollercoaster Continues as Criminals Advance Their Business Models
🔥
Rhysida Ransomware Has Added New Techniques, Tactics, And Tools to Its Arsenal
🔥
Missouri warns that health info was stolen in IBM MOVEit data breach
🔥
Lawsuits Mounting Against Florida Hospital in Wake of Breach
🔥
Parsing the UK electoral register cyberattack
🔥
CySecurity News - Latest Information Security and Hacking Incidents: Dark Web Grows Stronger. And So Does the Value of Monitoring
🔥
An Overview of the New Rhysida Ransomware Targeting the Healthcare Sector
🕵️
ISC Stormcast For Wednesday, August 9th, 2023 https://isc.sans.edu/podcastdetail/8608, (Wed, Aug 9th)
🕵️
Rapid7 Announces Layoffs, Office Closings Under Restructuring Plan
🕵️
Using Machine Learning to Detect Keystrokes
🕵️
Continuous Security Validation with Penetration Testing as a Service (PTaaS)
🕵️
Beware of New Malware Attack Disguised As Google Bard Ads On Facebook
🕵️
Cloud Security Firm Kivera Raises $3.5 Million in Seed Funding
🕵️
Automated Security Control Assessment: When Self-Awareness Matters
🕵️
Downfall Attack Enables Extraction of Passwords and Encryption Key From Intel Microprocessor
🕵️
Why Do Cybersecurity Awareness Programs Often Fail?
🕵️
Sweet Security Emerges From Stealth With $12 Million Seed Funding and a Cloud Runtime Solution
🕵️
Microsoft Paid Out $13 Million via Bug Bounty Programs for Fourth Consecutive Year
🕵️
Preventative medicine for securing IoT tech in healthcare organizations
🕵️
RedHotel Chinese APT Hackers Attack Government Entities & Intelligence Organizations
🕵️
Finland and Norway Ban Yango's Data Transfer to Russia
🕵️
White House Offers Prize Money for Hacker-Thwarting AI
🕵️
Western Digital, Synology NAS Vulnerabilities Exposed Millions of Users’ Files
🕵️
Wordfence Becomes the Latest Brand to be Impersonated Putting 800 Million Sites at Risk
🕵️
New PCI Password Requirements Could Be the Impetus for Credential Harvesting Scams
🕵️
Record ¥3 bil stolen via phishing in Japan in 1st half of 2023
🕵️
Australians Reporting Alarming Number of Losses to Vishing and Smishing Scams
🕵️
Ukraine Fends Off Sandworm Battlefield Espionage Ploy
🕵️
New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection
🌐
QakBot Malware Operators Expand C2 Network with 15 New Servers
🎙️
Defending Against Real-Time Financial Fraud
📡
Microsoft Visual Studio Code Flaw Lets Extensions Steal Passwords
📡
Norway Threatens Meta With Fines for Ad Violations
📡
Microsoft Releases Patches for 74 New Vulnerabilities in August Update
📡
Seasoned Cyber Pros are More Complacent in Their Skills Than Junior Staff
📡
Interpol Takes Down 16shop Phishing-as-a-Service Platform
📡
Managing Human Cyber Risks Matters Now More Than Ever
📡
Tesla Infotainment Jailbreak Unlocks Paid Features, Extracts Secrets
📡
Lawmaker Quizzes Google on 'Guardrails' for AI in Healthcare
📡
For TSA’s Updated Pipeline Security Directive, Consistency and Collaboration are Key
📡
Android 14 Introduces First-Of-Its-Kind Cellular Connectivity Security Features
📡
EvilProxy phishing campaign targets 120,000 Microsoft 365 users
📡
Hackers Prepare to Take on a Satellite at DEF CON
📡
Horizon3 AI Raises $40 Million to Expand Automated Pentesting Platform
📡
The Power of Resilience
📡
A piñata of patches for Microsoft in August
📡
A Model for Leveraging the Complexity of Identities
📡
Researchers watched 100 hours of hackers hacking honeypot computers
📡
DARPA launches two-year competition to build AI-powered cyber defenses
📡
Risk Fact #2: External-Facing Vulnerabilities Are Low-Hanging Fruit for Attackers
📡
Wi-Fi hacking in recycled printers, computers and smart-home equipment | Kaspersky official blog
📡
A Model for Leveraging the Complexity of Identities
📡
A Model for Leveraging the Complexity of Identities