96Articles
9Categories
2023-08-16Date
๐Ÿšจ
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-24489 Citrix Content Collaboration ShareFile Improper Access Control Vulnerability These types of vulnerabilities are frequent attack vectors fโ€ฆ
KEV
๐Ÿ›
Nearly 2,000 Citrix NetScaler Instances Hacked via Critical Vulnerability
๐Ÿ›
2,000 Citrix NetScaler Instances Backdoored via Recent Vulnerability
๐Ÿ›
Ivanti Avalanche Impacted by Critical Pre-Auth Stack Buffer Overflows
๐Ÿ›
Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations
๐Ÿ›
AI-Powered Fuzzing: Breaking the Bug Hunting Barrier
๐Ÿ›
(Re)check your patched NetScaler ADC and Gateway appliances for signs of compromise
๐Ÿ›
Ivanti Avalanche vulnerable to attack by unauthenticated, remote attackers (CVE-2023-32560)
๐Ÿ›
CISA warns of critical Citrix ShareFile flaw exploited in attacks
KEV
๐Ÿ›
CISA warns of critical Citrix ShareFile flaw exploited in the wild
KEV
โš ๏ธ
Clorox Cleans up Security Breach That Disrupted Operations
โš ๏ธ
Google Introduces First Quantum Resilient FIDO2 Security Key
โš ๏ธ
Chamber of Commerce Urges SEC to Delay Cyber Rule Implementation
โš ๏ธ
Ivanti Patches Critical Vulnerability in Avalanche Enterprise MDM Solution
โš ๏ธ
Monti Ransomwareโ€™s Linux Variant Attacks the Financial & Healthcare Industries
โš ๏ธ
Web App Warning: 74% Of Apps With PII Are Vulnerable To A Major Exploit
โš ๏ธ
Google released first quantum-resilient FIDO2 key implementation
โš ๏ธ
CISA Releases JCDC Remote Monitoring and Management (RMM) Cyber Defense Plan
โš ๏ธ
LinkedIn users targeted in account hijacking campaign
โš ๏ธ
SentinelOne Singularity App for Netskope secures remote work from endpoint to cloud
โš ๏ธ
Semperis aims to ensure security in Active Directory migrations, consolidation
โš ๏ธ
Report: PowerShell Gallery susceptible to typosquatting and other package-management attacks
โš ๏ธ
Incident response lessons learned from the Russian attack on Viasat
โš ๏ธ
3 strategies that can help stop ransomware before it becomes a crisis
โš ๏ธ
Patched Citrix NetScaler Devices Still Contain Backdoors
โš ๏ธ
Federal Judge Inclined To Grant Claims in Meta Pixel Case
๐Ÿ“‹
Chrome 116 Patches 26 Vulnerabilities
๐Ÿ“ข
HPE security advisory (AV23-484)
๐Ÿ“ข
Atlassian security advisory (AV23-483)
๐Ÿ“ข
Cisco security advisory (AV23-485)
๐Ÿ“ข
CISA Publishes JCDC Remote Monitoring and Management Systems Cyber Defense Plan
๐Ÿ“ข
CISA Releases Infrastructure Resilience Planning Framework Launchpoint
๐Ÿ“ข
ISF Podcast - Seรกn Doyle - Cyber and the World Economy - 30 minutes
๐Ÿ”ฅ
Law Firm Facing Lawsuit in Aftermath of Its Own Big Breach
๐Ÿ”ฅ
TIAA Hit With Class-Action Lawsuit Over MOVEit Data Breach
๐Ÿ”ฅ
LinkedIn Accounts Hacked in Widespread Hijacking Campaign
๐Ÿ”ฅ
Knight Ransomware Used in a Spam Campaign Impersonating TripAdvisor
๐Ÿ”ฅ
A Gentle Reminder: The Evolving Nature of Digital Scams, (Wed, Aug 16th)
๐Ÿ”ฅ
Norfolk and Suffolk police admit to data breach impacting 1,230 people
๐Ÿ”ฅ
Prince George's County Public Schools Responds Suffers Network Outage Owing to Cyberattack
๐Ÿ”ฅ
UK Electoral Commission Hacked
๐Ÿ”ฅ
What's the State of Credential theft in 2023?
๐Ÿ”ฅ
Ransomware Attack on Rapattoni Disrupts US Real Estate Property Listings
๐Ÿ”ฅ
Cleaning Products Giant Clorox Takes Systems Offline Following Cyberattack
๐Ÿ”ฅ
How Generative AI Will Improve Incident Response
๐Ÿ”ฅ
Ransomware's Paradox: Why Falling Monetization Rates Are Accompanied by Soaring Ransom Payments - A Must-Read Analysis.
๐Ÿ”ฅ
More UK Police Suffer Freedom of Information Data Breach
๐Ÿ”ฅ
Beware of New Hacking Attack Targeting LinkedIn Accounts Worldwide
๐Ÿ”ฅ
Hacked electronic sign declares โ€œPutin is a dickheadโ€ as Russian ruble slumps
๐Ÿ”ฅ
LockBitโ€™s dirty little secret: ransomware gang is failing to publish victimsโ€™ data
๐Ÿ”ฅ
Clorox Cleans Up IT Security Breach That Soaked Its Biz Ops
๐Ÿ”ฅ
Cybercriminals May Already Have Hacked Your LinkedIn Account
๐Ÿ”ฅ
Ransomware Attacks Surge as Generative AI Becomes a Commodity Tool in the Threat Actorโ€™s Arsenal
๐Ÿ”ฅ
SEC cybersecurity rules shape the future of incident management
๐Ÿ”ฅ
Cost of a data breach 2023: Healthcare industry impacts
๐Ÿ”ฅ
German Police Warn of Increased Foreign Cybercrime Threat
๐Ÿ”ฅ
DEFCON Talk: Using ML Models for Red Teaming and Bug Bounty
๐Ÿ•ต๏ธ
ISC Stormcast For Wednesday, August 16th, 2023 https://isc.sans.edu/podcastdetail/8618, (Wed, Aug 16th)
๐Ÿ•ต๏ธ
Cybercriminals Abusing Cloudflare R2 for Hosting Phishing Pages, Experts Warn
๐Ÿ•ต๏ธ
Gigabud RAT Attacking Android Users to Steal Banking Credentials
๐Ÿ•ต๏ธ
GitHub Paid Out $1.5 Million in Bug Bounties in 2022
๐Ÿ•ต๏ธ
Experts Uncover Weaknesses in PowerShell Gallery Enabling Supply Chain Attacks
๐Ÿ•ต๏ธ
How AI Can Help Mitigate BEC Scams
๐Ÿ•ต๏ธ
Google Releases Security Key Implementation Resilient to Quantum Attacks
๐Ÿ•ต๏ธ
Not Another Voter Registration Scam (But It Looks Like One)
๐Ÿ•ต๏ธ
Online Scams Targeting Individuals Double in a Single Quarter as Global Risk Rises
๐Ÿ•ต๏ธ
Social Media Platforms Become Half of all Phishing Attack Targets
๐Ÿ•ต๏ธ
Beyond Identity unveils The Passkey Journey to aid enterprise passkey deployment decisions
๐Ÿ•ต๏ธ
Stellar Cyber and OCI partner to offer expanded cybersecurity capabilities
๐Ÿ•ต๏ธ
Bitdefender enhances security for iOS devices with Scam Alert
๐Ÿ•ต๏ธ
Why the โ€œvoluntary AI commitmentsโ€ extracted by the White House are nowhere near enough
๐Ÿ•ต๏ธ
How CISOs break down complex security challenges
KEV
๐Ÿ•ต๏ธ
Zero Trust Edge โ€” Forrester Names Palo Alto Networks a Leader
๐Ÿ•ต๏ธ
Advocate Aurora to Settle Web Tracker Claims for $12.25M
๐Ÿ•ต๏ธ
RiskLens, Axio Lead Cyber Risk Quantification Forrester Wave
๐Ÿ•ต๏ธ
What are You Working on Wednesday
๐Ÿ•ต๏ธ
How Browser Sync Can Unknowingly Risk Your Business
๐ŸŒ
Raccoon Stealer Malware Returns With New Stealthier Version
๐ŸŒ
Experts Uncover Weaknesses in PowerShell Gallery Enabling Supply Chain Attacks
๐ŸŒ
Massive 400,000 proxy botnet built with stealthy malware infections
๐Ÿ“ก
Guide: How Google Workspace-based Organizations can leverage Chrome to improve Security
๐Ÿ“ก
Automotive data privacy under scrutiny in California
๐Ÿ“ก
Major U.S. energy org targeted in QR code phishing attack
๐Ÿ“ก
Just announced: AI and security standards keynotes at mWISE
๐Ÿ“ก
This $70 device can spoof an Apple device and trick you into sharing your password
๐Ÿ“ก
Chrome 116 Patches 26 Vulnerabilities
๐Ÿ“ก
Major U.S. Energy Organization Targeted in QR Code Phishing Attack
๐Ÿ“ก
Google Releases Security Key Implementation Resilient To Quantum Attacks
๐Ÿ“ก
Bank Of Ireland ATM Glitch Hands Out Free Money
๐Ÿ“ก
Ivanti Patches Critical Vuln In Avalanche Enterprise MDM Solution
๐Ÿ“ก
Researchers Find Sensitive Personal Data In Over 30% Of Cloud Assets
๐Ÿ“ก
Useful gadgets for information security | Kaspersky official blog
๐Ÿ“ก
FBI warns about scams that lure you in as a mobile beta-tester
๐Ÿ“ก
SAFECOM Publishes Spring 2023 SAFECOM Bi-Annual Meeting Executive Summary
๐Ÿ“ก
File sharing site Anonfiles shuts down due to overwhelming abuse
๐Ÿ“ก
DEF CON 31: Robot vacuums may be doing more than they claim