131Articles
8Categories
2023-08-21Date
๐Ÿšจ
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-26359 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability These types of vulnerabilities are frequent attack vectors for maliciousโ€ฆ
KEV
๐Ÿ›
WinRAR vulnerable to remote code execution, patch now! (CVE-2023-40477)
๐Ÿ›
Cuba Ransomware Expands Horizons: New Industries, New Tools
๐Ÿ›
New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC
๐Ÿ›
Chromium: CVE-2023-2312 Use after free in Offline
๐Ÿ›
Chromium: CVE-2023-4349 Use after free in Device Trust Connectors
๐Ÿ›
Chromium: CVE-2023-4350 Inappropriate implementation in Fullscreen
๐Ÿ›
Chromium: CVE-2023-4351 Use after free in Network
๐Ÿ›
Chromium: CVE-2023-4352 Type Confusion in V8
๐Ÿ›
Chromium: CVE-2023-4353 Heap buffer overflow in ANGLE
๐Ÿ›
Chromium: CVE-2023-4354 Heap buffer overflow in Skia
๐Ÿ›
Chromium: CVE-2023-4355 Out of bounds memory access in V8
๐Ÿ›
Chromium: CVE-2023-4356 Use after free in Audio
๐Ÿ›
Chromium: CVE-2023-4357 Insufficient validation of untrusted input in XML
๐Ÿ›
Chromium: CVE-2023-4358 Use after free in DNS
๐Ÿ›
Chromium: CVE-2023-4359 Inappropriate implementation in App Launcher
๐Ÿ›
Chromium: CVE-2023-4360 Inappropriate implementation in Color
๐Ÿ›
Chromium: CVE-2023-4361 Inappropriate implementation in Autofill
๐Ÿ›
Chromium: CVE-2023-4362 Heap buffer overflow in Mojom IDL
๐Ÿ›
Chromium: CVE-2023-4363 Inappropriate implementation in WebShare
๐Ÿ›
Chromium: CVE-2023-4364 Inappropriate implementation in Permission Prompts
๐Ÿ›
Chromium: CVE-2023-4365 Inappropriate implementation in Fullscreen
๐Ÿ›
Chromium: CVE-2023-4366 Use after free in Extensions
๐Ÿ›
Chromium: CVE-2023-4367 Insufficient policy enforcement in Extensions API
๐Ÿ›
Chromium: CVE-2023-4368 Insufficient policy enforcement in Extensions API
๐Ÿ›
WinRAR users urged to upgrade to fix critical vulnerabilities
๐Ÿ›
CVE Report for Damn Vulnerable Web Application (DVWA)
โš ๏ธ
How EU lawmakers can make mandatory vulnerability disclosure responsible
โš ๏ธ
Cisco Patches High-Severity Vulnerabilities in Enterprise Applications
โš ๏ธ
Four Juniper Junos OS Flaws can be Chained to Remotely Hack Devices
โš ๏ธ
Tasks that bog down security teams (and what to do about them)
โš ๏ธ
Are you prepared for the rise of the artificial intelligence CISO?
โš ๏ธ
Tesla Discloses Data Breach Related to Whistleblower Leak
โš ๏ธ
Fighting API Bots with Cloudflare's Invisible Turnstile
โš ๏ธ
How EU Lawmakers Can Make Mandatory Vulnerability Disclosure Responsible
โš ๏ธ
Cybersecurity Study Reveals Web App Vulnerability Crisis
โš ๏ธ
Flaws in Juniper Switches and Firewalls Can Be Chained for Remote Code Execution
โš ๏ธ
Google Brings AI Magic to Fuzz Testing With Eye-Opening Results
โš ๏ธ
US Gov Warns of Foreign Intelligence Cyberattacks Against US Space Industry
โš ๏ธ
Japanese watchmaker Seiko breached by BlackCat ransomware gang
โš ๏ธ
Why Managed File Transfer Products Are a Hacker's Paradise
โš ๏ธ
Ivanti warns of new actively exploited MobileIron zero-day bug
KEV
โš ๏ธ
CISA, NSA, and NIST Publish Factsheet on Quantum Readiness
โš ๏ธ
CISA, NSA and NIST Publish New Resource for Migrating to Post-Quantum Cryptography
โš ๏ธ
Ransomware Attacks Trends/Impacts & Using Generative AI to Up Your Cyberdefenses - BSW #317
โš ๏ธ
Ivanti Ships Urgent Patch for API Authentication Bypass Vulnerability
โš ๏ธ
News Alert: airSlate partners with Forthright to launch automated business-efficiency, workflow tool
โš ๏ธ
mTLS: When certificate authentication is done wrong
โš ๏ธ
Vulnerability Summary for the Week of August 14, 2023
โš ๏ธ
Ford SYNC 3 infotainment vulnerable to Wi-Fi hijacking
โš ๏ธ
Breaking Secure Boot on the Silicon Labs Gecko platform
๐Ÿ“ข
The future of SIEM: Embracing predictive analytics
๐Ÿ“ข
Australiaโ€™s .AU Domain Administrator Denies Data Breach After Ransomware Posting
๐Ÿ“ข
Federally Insured Credit Unions Required to Report Cyber Incidents Within 72 Hours
๐Ÿ“ข
CISA Hiring Hits High Score, and We're Not Done!!
๐Ÿ“ข
Ex-USSS CISO Explains Agencies' Struggle with Biden EO
๐Ÿ“ข
Dell security advisory (AV23-490)
๐Ÿ“ข
IBM security advisory (AV23-491)
๐Ÿ“ข
Ubuntu security advisory (AV23-492)
๐Ÿ“ข
Ivanti security advisory (AV23-493)
๐Ÿ“ข
US CISA Urges Security by Design for AI
๐Ÿ”ฅ
Network detection and response in the modern era
๐Ÿ”ฅ
Cyber Security Today, August 21, 2023 - The latest ransomware news, and security patches issued by Cisco, Juniper and Jenkins
๐Ÿ”ฅ
This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers
๐Ÿ”ฅ
US Agencies Warn of Cyberattacks on Space Industry by Foreign Intelligence Entities
๐Ÿ”ฅ
Telsa data breach caused by โ€˜insider wrongdoingโ€™
๐Ÿ”ฅ
Tesla says data breach impacting 75,000 employees was an insider job
๐Ÿ”ฅ
[Eye-Opening] Increase of Phishing Attacks in Australia Should Alarm Organizations
๐Ÿ”ฅ
Australian Lender Latitude Financial Reports AU$76 Million Cyberattack Costs
๐Ÿ”ฅ
Tesla Discloses Data Breach Impacting 75,000 People's Personal Information
๐Ÿ”ฅ
The Hidden Benefits of Negotiating With Ransomware Attackers
๐Ÿ”ฅ
Japanese Watchmaker Seiko Breached by BlackCat Ransomware Gang
๐Ÿ”ฅ
Donald's Patriot Legal Defense Fund Site Got Hacked
๐Ÿ”ฅ
Entering the 3rd week of real estate software provider Rapattoni's supposed ransomware attack
๐Ÿ”ฅ
Leak of 75k staff records was insiders' fault, Tesla claims
๐Ÿ”ฅ
Largest switching and terminal railroad in US investigating ransomware data theft
๐Ÿ•ต๏ธ
The complex world of CISO responsibilities
๐Ÿ•ต๏ธ
ISC Stormcast For Monday, August 21st, 2023 https://isc.sans.edu/podcastdetail/8624, (Mon, Aug 21st)
๐Ÿ•ต๏ธ
Organizations invest in AI tools to elevate email security
๐Ÿ•ต๏ธ
HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under Attack
๐Ÿ•ต๏ธ
Quick Malware Triage With Inotify Tools, (Mon, Aug 21st)
๐Ÿ•ต๏ธ
Chrome will tell users when extensions they use are removed from Chrome Web Store
๐Ÿ•ต๏ธ
White House Announces AI Cybersecurity Challenge
๐Ÿ•ต๏ธ
Brazilian Hacker Claims Bolsonaro Asked Him to Hack Into the Voting System Ahead of 2022 Vote
๐Ÿ•ต๏ธ
Suspected North Korean Hackers Target Joint Military Exercise Between South Korea and the US
๐Ÿ•ต๏ธ
Webinar Tomorrow: ย ZTNA Superpowers CISOs Should Know
๐Ÿ•ต๏ธ
Brazen Malware Operation Targets Taiwanese Firms and U.S. Military Procurement System
๐Ÿ•ต๏ธ
Overcoming the Inertia of Assessing and Securing APIs
๐Ÿ•ต๏ธ
3,000+ Android Malware Using Unique Compression Methods to Avoid Detection
๐Ÿ•ต๏ธ
Interpol Arrested 14 cybercriminals and uncovered 20,674 suspicious cyber networks
๐Ÿ•ต๏ธ
VersaAI delivers AI-assisted enhancements across the Versa Networks portfolio
๐Ÿ•ต๏ธ
Researchers Uncover Real Identity of CypherRAT and CraxsRAT Malware Developer
๐Ÿ•ต๏ธ
The Only Leader in Single-Vendor SASE. Period.
๐Ÿ•ต๏ธ
Researchers Uncover Real Identity of CypherRAT and CraxsRAT Malware Developer
๐Ÿ•ต๏ธ
Zero Authority: Future of Security and Business Enablement
๐Ÿ•ต๏ธ
HiatusRAT Returns after a Hiatus in a Fresh Wave of Attacks
๐Ÿ•ต๏ธ
Security Money: The Index is Still Trying to Recover | Black Hat Executive Interviews - BSW #317
๐Ÿ•ต๏ธ
Researchers Spoof an Apple Device and Trick Users Into Sharing Sensitive Data
๐Ÿ•ต๏ธ
GUEST ESSAY: Lessons to be learned from the waves of BofA phone number spoofing scams
๐Ÿ•ต๏ธ
Security Money: The Index is Still Trying to Recover - BSW #317
๐Ÿ•ต๏ธ
UK Competition Regulator Clears Broadcom, VMware Merger
๐Ÿ•ต๏ธ
SIEM and SOAR in 2023: Key trends and new changes
๐Ÿ•ต๏ธ
ColdFusion | EncroChat | Ivanti | Sneaky Amazon | Spoofing Apple | Jason Wood & more โ€“ SWN320
๐Ÿ•ต๏ธ
Managing Bug Bounty Programs At Scale | News - PSW796
๐Ÿ•ต๏ธ
Tackling the Perennial Problem | Enterprise News | Black Hat Executive Interviews - ESW329
๐Ÿ•ต๏ธ
Openfire | Firepower | Barracuda | CosmicBeetle | Encryption | Aaran Leyland & more โ€“ SWN321
๐Ÿ•ต๏ธ
Mentorship Monday - Discussions for career and learning!
๐Ÿ•ต๏ธ
Threat Hunting Newsletter
๐Ÿ•ต๏ธ
WinRAR vuln could allow code to run when files are opened
๐Ÿ•ต๏ธ
Alarm raised over broken authorization in Mozilla VPN client
๐Ÿ•ต๏ธ
โ€œPlease do not make it publicโ€: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping
๐Ÿ•ต๏ธ
Hackers Rig Casino Card-Shuffling Machines for โ€˜Full Controlโ€™ Cheating
๐Ÿ•ต๏ธ
TunnelCrack attack may cause vulnerable VPNs to leak traffic
๐Ÿ•ต๏ธ
An Apple Malware-Flagging Tool Is โ€˜Triviallyโ€™ Easy to Bypass
๐Ÿ•ต๏ธ
Google paves way for FIDO2 security keys that can resist quantum computer attacks
๐ŸŒ
Israel, US to Invest $4 Million in Critical Infrastructure Security Projects
๐ŸŒ
Turns Out AI Probably Isnโ€™t Very Good at Writing Malware
๐ŸŒ
Google Chrome's New Feature Alerts Users About Auto-Removal of Malicious Extensions
๐ŸŒ
CypherRAT And CraxsRAT Malware Developer Identified
๐ŸŒ
A Bardโ€™s Tale โ€“ how fake AI bots try to install malware
๐Ÿ“ก
Jenkins Patches High-Severity Vulnerabilities in Multiple Plugins
๐Ÿ“ก
ProjectDiscovery Raises $25M to Launch a Cloud Version of Its Threat-Scanning Platform
๐Ÿ“ก
How to Investigate an OAuth Grant for Suspicious Activity or Overly Permissive Scopes
๐Ÿ“ก
Interpol Arrests 14 Who Scammed $40m From Victims In Cyber Surge
๐Ÿ“ก
WinRAR Hit With High Severity Code Execution Flaw
๐Ÿ“ก
Ongoing Duo outage causes Azure Auth authentication errors
๐Ÿ“ก
Built-in authenticator in Kaspersky Password Manager | Kaspersky official blog
๐Ÿ“ก
โ€œSnakes in airplane modeโ€ โ€“ what if your phone says itโ€™s offline but isnโ€™t?
๐Ÿ“ก
Sneaky Amazon Google ad leads to Microsoft support scam
๐Ÿ“ก
Sneaky Amazon Google Ad Leads to Microsoft Support Scam
๐Ÿ“ก
TP-Link smart bulbs can let hackers steal your WiFi password