104Articles
9Categories
2023-08-17Date
🚨
CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild AttacksThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Citrix ShareFile storage zones controller to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active in-the-wild exploitation. Tracked as CVE-2023-24489 (…
KEV
🚨
Citrix ShareFile vulnerability actively exploited (CVE-2023-24489)CVE-2023-24489, a critical Citrix ShareFile vulnerability that the company has fixed in June 2023, is being exploited by attackers. GreyNoise has flagged on Tuesday a sudden spike in IP addresses from which exploitation attempts are coming, and the Cybersecurity and Infrastructur…
KEV
πŸ›
HPE Aruba Networking Product Vulnerabilities Allow File Overwrite
πŸ›
CISA Warns of Critical Citrix ShareFile Flaw Exploited in the Wild
KEV
πŸ›
Exploitation of Citrix ShareFile Vulnerability Spikes as CISA Issues Warning
πŸ›
CISA says hackers are exploiting a new file transfer bug in Citrix ShareFile
KEV
πŸ›
Play Ransomware Using MSPs and N-Days to Attack
πŸ›
Atlassian Releases Security Update for Confluence Server and Data Center
πŸ›
CVE-2023-38158 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
πŸ›
CVE-2023-36787 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
πŸ›
Proxyjacking campaign LABRAT targets vulnerable GitLab deployments
⚠️
Kubernetes clusters face widespread attacks across numerous organizations
KEV
⚠️
The road ahead for ecommerce fraud prevention
⚠️
6 best practices to defend against corporate account takeover attacks
⚠️
Cisco Unified Communications Manager Flaw Let Attacker Launch SQL Injection Attacks
⚠️
CISA Publishes Plan For Remote Monitoring Tools After Nation-State, Ransomware Exploitation
⚠️
NIST CSF, JTAG vs (OG) Xbox, Tricked Ya, Intel's Security, & Josh Debates Jeff - PSW #795
⚠️
Defending Public Infrastructure While At War - Antranig Vartanian - PSW #795
⚠️
Play Ransomware Found Using Security MSPs and N-Day Exploits to Attack
⚠️
New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode
⚠️
New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities
⚠️
CISA Releases Three Industrial Control Systems Advisories
⚠️
Exploitation Of Citrix ShareFile Vulnerability Spikes As CISA Issues Warning
⚠️
Rapid7 Says ROI for Ransomware Remains High; Zero-Day Usage Expands
⚠️
Cisco Patches High-Severity Vulnerabilities in Enterprise Applications
⚠️
ProjectDiscovery raises $25M to launch a cloud version of its threat-scanning platform
⚠️
NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security
⚠️
Cisco Releases Security Advisories for Multiple Products
⚠️
Google Brings AI Magic to Fuzz Testing With Eye-Opening Results
⚠️
Why HHS Regulators Are Heavily Scrutinizing Web Tracker Use
⚠️
Cryptohack Roundup: Argentina Investigates WorldCoin
⚠️
Managing Threats, Reduce your Attack Surface, MDR Evolved - Randy Watkins, Richard Yew... - ESW #328
⚠️
Animated Video on Buffer Overflow Attacks and DeGoogled Phones
πŸ“’
Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks
πŸ“’
CISA Releases Cyber Defense Plan to Reduce RMM Software Risks
πŸ“’
[Control systems] ICONICS security advisory (AV23-486)
πŸ“’
[Control systems] Walchem security advisory (AV23-487)
πŸ“’
CISA and Election Security Partners Hold Tabletop the Vote Election Security Exercise
πŸ”₯
Ransomware: To Pay or Not to Pay
πŸ”₯
Public Sector Hit in Sudden Surge, Reveals New Report
πŸ”₯
Ongoing Hijacking Campaign Targets LinkedIn Accounts
πŸ”₯
Malvertisers up Their Game Against Researchers
πŸ”₯
The link between home, family and company security
πŸ”₯
The Plan to Better Protect US Hospitals From Ransomware
πŸ”₯
Transatlantic Cable podcast, episode 312 | Kaspersky official blog
πŸ”₯
Triple Extortion Ransomware and the Cybercrime Supply Chain
πŸ”₯
Cyber Criminals Attacking Web Services to Breach Organisations
πŸ”₯
China-Linked Bronze Starlight Group Targeting Gambling Sector with Cobalt Strike Beacons
πŸ”₯
5 Types of Cyber Crime Groups
πŸ”₯
Breach Roundup: Raccoon Stealer Makes a Comeback
πŸ”₯
Malware Is Turning Windows Machines Into Proxies
πŸ”₯
Hackers ask $120,000 for access to multi-billion auction house
πŸ”₯
CheckPoint buys Perimeter81, SecureWorks Cuts 300 Jobs, and News from BlackHat - ESW #328
πŸ”₯
Microsoft: BlackCat's Sphynx ransomware embeds Impacket, RemCom
πŸ”₯
iMenu360 - 3,425,860 breached accounts
πŸ•΅οΈ
Findlargedir: Find all β€œblackhole” directories with a huge amount of filesystem entries
πŸ•΅οΈ
ISC Stormcast For Thursday, August 17th, 2023 https://isc.sans.edu/podcastdetail/8620, (Thu, Aug 17th)
πŸ•΅οΈ
Heavy workloads driving IT professionals to resign
πŸ•΅οΈ
PDF Lures Aimed at NATO Countries Contain a Russian Clue
πŸ•΅οΈ
How Disjoined Threat Intelligence Limits Companies β€” And What to do About it
πŸ•΅οΈ
Hackers Selling SMS Bomber Attack Tools on Underground Forums
πŸ•΅οΈ
Phishers use QR codes to target companies in various industries
πŸ•΅οΈ
Gozi strikes again, targeting banks, cryptocurrency and more
πŸ•΅οΈ
Detecting β€œViolations of Social Norms” in Text with AI
πŸ•΅οΈ
Cybersecurity M&A Roundup for August 1-15, 2023
πŸ•΅οΈ
Fake Out: Disinformation Campaigns Get Generative AI Boost
πŸ•΅οΈ
Thousands of Systems Turned Into Proxy Exit Nodes via Malware
πŸ•΅οΈ
News Alert: Cynomi study shows MSPs offering virtual CISO services to rise fivefold next year
πŸ•΅οΈ
Defending Public Infrastructure While At War | News - PSW795
πŸ•΅οΈ
Thousands of Android APKs use compression trick to thwart analysis
πŸ•΅οΈ
Malicious QR Codes Used in Phishing Attack Targeting US Energy Company
πŸ•΅οΈ
Defending Public Infrastructure While At War | News - PSW795
πŸ•΅οΈ
Microsoft PowerShell Gallery vulnerable to spoofing, supply chain attacks
πŸ•΅οΈ
Palo Alto, Versa, Fortinet, Cato Command SASE Forrester Wave
πŸ•΅οΈ
SEC Rule Sparks Reimagining of Cybersecurity Operations
πŸ•΅οΈ
ProjectDiscovery Lands $25M Investment for Cloud Security Tech
πŸ•΅οΈ
AnonFiles shut down...
🌐
Unveiling the Sophisticated Statc Stealer
🌐
Global IoT Trust Survey Reveals Security Concerns
🌐
Raccoon Stealer Returns with New Evasion Capabilities
🌐
Large-Scale Campaign Delivers Proxy Server App to Make Systems Serve as Residential Exit Nodes
🌐
FBI warns cryptocurrency app beta-testers of malware menace
🌐
Hackers are Increasingly Hiding Within Services Such as Slack and Trello to Deploy Malware
🌐
Thousands Of Systems Turned Into Proxy Exit Nodes Via Malware
🌐
Flaws In PowerShell Gallery May Cause Supply Chain Attacks
🌐
LinkedIn under attack, hackers seize accounts
πŸŽ™οΈ
Smashing Security podcast #335: AI chat wars, and hacker passwords exposed
πŸ“‘
Command Line Parsing - Are These Really Unique Strings?, (Thu, Aug 17th)
πŸ“‘
Google Introduces First Quantum Resilient FIDO2 Security Key Implementation
πŸ“‘
A Third of UK University Students Targeted By Fraud
πŸ“‘
AWS Customers’ Most Common Security Mistake
πŸ“‘
Why You Need Continuous Network Monitoring?
πŸ“‘
Cybercriminals Selling SMS Bomber Attack Tools on Underground Forums
πŸ“‘
S3 Ep148: Remembering crypto heroes
πŸ“‘
Man Arrested In Northern Ireland Police Data Leak
πŸ“‘
Malicious QR Codes Used In Phishing Attack Targeting US Energy Company
πŸ“‘
Discord.io Shuts Down After Crooks Steal 760k Users' Info
πŸ“‘
Inside the Rise of 'Dark' AI Tools - Scary, But Effective?
πŸ“‘
NYC Finance Department Sent Every Employee Their Colleagues’ Personal Info
πŸ“‘
Windows Task Manager refresh can be paused using CTRL key
πŸ“‘
Stealthy LABRAT Operation Runs Cryptojacking and Proxyjacking Campaign Targeting GitLab
πŸ“‘
Phishing campaign steals accounts for Zimbra email servers worlwide
πŸ“‘
Karma Catches Up to Global Phishing Service 16Shop
πŸ“‘
Mass-spreading campaign targeting Zimbra users