125Articles
9Categories
2023-08-24Date
๐Ÿšจ
More than 3,000 Openfire servers exposed to attacks using a new exploitThe experts pointed out that the bug has been exploited for more than two months, but yet to be added to the CISA KEV catalog. The researchers discovered approximately 6,300 servers on Shodan and a bit more using the Censys search engine.
KEV
๐Ÿšจ
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023- 38831 RARLAB WinRAR Code Execution Vulnerability CVE-2023- 32315 Ignite Realtime Openfire Path Traversal Vulnerability These types of vulnerโ€ฆ
KEV
๐Ÿ›
GroundPeony Group Exploiting Zero-day Flaw to Attack Government Agencies
๐Ÿ›
Thousands of Unpatched Openfire XMPP Servers Still Exposed to High-Severity Flaw
๐Ÿ›
WinRAR Security Flaw Exploited in Zero-Day Attacks to Target Traders
๐Ÿ›
Hackers use public ManageEngine exploit to breach internet org
๐Ÿ›
FBI: Patches for Recent Barracuda ESG Zero-Day Ineffective
๐Ÿ›
CVE-2023-30943 - Playing Dominos with Moodle's Security (1/2)
๐Ÿ›
Ivanti Sentry Authentication Bypass CVE-2023-38035 Deep-Dive, IOCs, and Exploit POC
โš ๏ธ
Managing Bug Bounty Programs At Scale - Dr. Jared DeMott - PSW #796
โš ๏ธ
Webinar: The external attack surface & AIโ€™s role in proactive security
โš ๏ธ
Lack of visibility into cloud access policies leaves enterprises flying blind
โš ๏ธ
Threat Actors Leverage LLMs-related Facebook Ads to Steal Credentials
โš ๏ธ
Bitwarden launches E2EE Secrets Manager
โš ๏ธ
Specialized third-party solutions prove effective against malicious bots, ATO attacks, script risks
โš ๏ธ
NoFilter: Tool that Escalates Privilege Abusing Windows Filtering Platform
โš ๏ธ
UK court finds teenagers guilty of carrying out LAPSUS$ hacking spree
KEV
โš ๏ธ
Traders Targeted by Cybercriminals in Attack Exploiting WinRAR Zero-Day
โš ๏ธ
Bugs in NVIDIA Graphics Driver Leads to Memory Corruption
โš ๏ธ
Ermetic CNAPP available on Google Cloud Marketplace
โš ๏ธ
What are Brute Force Attacks, and How to Protect Your APIs Against them?
โš ๏ธ
Lessons learned from the Microsoft Cloud breach
โš ๏ธ
ImmuniWeb releases Mobile Neuron to scan for OWASP Mobile Top 10 vulnerabilities, iOS/Android weaknesses
โš ๏ธ
Lazarus Group Exploits ManageEngine Vulnerability to Deploy QuiteRAT
โš ๏ธ
Talon unveils digital experience capabilities, equipping IT teams with advanced metrics
โš ๏ธ
WinRAR 0-Day That Uses Poisoned JPG And TXT Files Under Exploit Since April
โš ๏ธ
FBI: Patches For Recent Barracuda ESG Zero-Day Ineffective
โš ๏ธ
Kingston IronKey Keypad 200C hardware-encrypted USB Type-C drive released
โš ๏ธ
Exploit released for Ivanti Sentry bug abused as zero-day in attacks
โš ๏ธ
Cyberattack disrupts major Mississippi health system
โš ๏ธ
Lazarus Group Exploits Critical Zoho ManageEngine Flaw to Deploy Stealthy QuiteRAT Malware
โš ๏ธ
CISA Releases Six Industrial Control Systems Advisories
โš ๏ธ
The delta between perception and preparedness
โš ๏ธ
Webshells: Why an old tactic is still relevant
KEV
โš ๏ธ
Jupiter X Core WordPress plugin could let hackers hijack sites
โš ๏ธ
Court finds autistic members of LAPSUS$ gang responsible for GTA 6 hack and other high profile breaches
โš ๏ธ
Mississippi Hospital System Still Struggling With Attack
โš ๏ธ
Flax Typhoon using legitimate software to quietly access Taiwanese organizations
โš ๏ธ
Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop
โš ๏ธ
Why Decentralization is the Only Way to Prevent Cybersecurity Breaches?
โš ๏ธ
Deep dive into the recent bugs in the NVMe protocol and the impact on cloud providers and on-premises servers.
โš ๏ธ
Changes to UK Surveillance Regime May Violate International Law
โš ๏ธ
Learn how to protect your data and systems from upstream and Side Channel attacks with the Clean Source principle and Azure solutions. Discover the power of PAW and Confidential Compute
๐Ÿ“ข
How digital identity protects connected cars
๐Ÿ“ข
ImmuniWeb introduces ImmuniWeb Neuron Mobile, an automated mobile app security testing solution
๐Ÿ“ข
DarkGate Reloaded via Malvertising and SEO Poisoning Campaigns
๐Ÿ“ข
Cypago, which aims to automate compliance and governance for companies, raises $13M
๐Ÿ“ข
Cisco security advisory (AV23-500)
๐Ÿ“ข
Trulioo enhances identity verification with โ€œperson matchโ€ intelligent routing
๐Ÿ“ข
NIST publishes draft post-quantum cryptography standards, calls for industry feedback
๐Ÿ“ข
[Control systems] Opto 22 security advisory (AV23-502)
๐Ÿ“ข
[Control systems] KNX Association security advisory (AV23-501)
๐Ÿ“ข
[Control systems] Rockwell Automation security advisory (AV23-504)
๐Ÿ“ข
[Control systems] CODESYS security advisory (AV23-503)
๐Ÿ“ข
Record startup funding, identity and context, and the Hot Ones format comes to Cyber! - ESW #329
๐Ÿ“ข
Insights from a CISO Survival Guide
๐Ÿ”ฅ
How to spot phishing on a hacked WordPress website | Kaspersky official blog
๐Ÿ”ฅ
SpyCloud raises $110 million to accelerate identity threat protection
๐Ÿ”ฅ
Hosting Provider CloudNordic Loses All Customer Data in Ransomware Attack
๐Ÿ”ฅ
UK Court Concludes Teenager Behind Huge Hacking Campaign
๐Ÿ”ฅ
Transatlantic Cable podcast, episode 313 | Kaspersky official blog
๐Ÿ”ฅ
New "Whiffy Recon" Malware Triangulates Infected Device Location via Wi-Fi Every Minute
๐Ÿ”ฅ
St Helens Council Warns of Phishing After Ransomware Breach
๐Ÿ”ฅ
Cloud hosting firms hit by devastating ransomware attack
๐Ÿ”ฅ
Title Lender TMX Now Says Payment Card Data Stolen in Breach
๐Ÿ”ฅ
6 Ransomware Trends & Evolutions to Watch For
๐Ÿ”ฅ
Millions stolen from crypto platforms Exactly Protocol and Harbor Protocol
๐Ÿ”ฅ
Sensitive Data of 10m at Risk After French Employment Agency Breach
๐Ÿ”ฅ
Cryptohack Roundup: Tornado Cash in the Eye of the Storm
๐Ÿ”ฅ
Ransomware hackers dwell time drops to 5 days, RDP still widely used
๐Ÿ”ฅ
University of Minnesota Confirms Data Breach, Says Ransomware Not Involved
๐Ÿ”ฅ
FBI warns of patched Barracuda ESG appliances still being hacked
๐Ÿ”ฅ
Breach Roundup: Rhysida Ransom Gang Cops to Hospital Hacks
๐Ÿ”ฅ
Ransomware Economy Players, Pentest War Stories, & Ransomware Groups Working Together - ESW #329
๐Ÿ”ฅ
SevenRooms - 1,205,385 breached accounts
๐Ÿ”ฅ
Scarab Ransomware Deployed Using SpaceColon Toolkit
๐Ÿ•ต๏ธ
How I made a qwerty ?keyboard walk? password generator with ChatGPT [Guest Diary], (Wed, Aug 23rd)
๐Ÿ•ต๏ธ
ISC Stormcast For Thursday, August 24th, 2023 https://isc.sans.edu/podcastdetail/8630, (Thu, Aug 24th)
๐Ÿ•ต๏ธ
AI and the evolution of surveillance systems
๐Ÿ•ต๏ธ
Does a secure coding training platform really work?
๐Ÿ•ต๏ธ
Kali Linux 2023.3 released: Major overhaul of Kali Autopilot, 9 new tools, and more!
๐Ÿ•ต๏ธ
FBI Urges Immediate Removal of Patched Barracuda ESG Devices
๐Ÿ•ต๏ธ
Kali Linux 2023.3 Released: Whatโ€™s New!
๐Ÿ•ต๏ธ
Russian Toolkit Aims to Make Online Scamming Easy for Anyone
๐Ÿ•ต๏ธ
Digital Identity Protection Firm SpyCloud Raises $110 Million
๐Ÿ•ต๏ธ
Simplify Secure Enterprise Device Management With QR Codes
๐Ÿ•ต๏ธ
Parmesan Anti-Forgery Protection
๐Ÿ•ต๏ธ
nao-sec.org
๐Ÿ•ต๏ธ
Rockwell ThinManager Vulnerabilities Could Expose Industrial HMIs to Attacks
๐Ÿ•ต๏ธ
New Telegram Bot "Telekopye" Powering Large-scale Phishing Scams from Russia
๐Ÿ•ต๏ธ
Duolingo Users Should Be on the Lookout for Targeted Phishing Attacks
๐Ÿ•ต๏ธ
New Relic enhances its AIOps capabilities with recommended alerts
๐Ÿ•ต๏ธ
Lora Projects, WinRAR, Kali Mobile, Benchmarks Vs. IRL, & VPN HYPE! - PSW #796
๐Ÿ•ต๏ธ
Telekopye: Hunting Mammoths using Telegram bot
๐Ÿ•ต๏ธ
Cisco Patches Vulnerabilities Exposing Switches, Firewalls to DoS Attacks
๐Ÿ•ต๏ธ
Mysterious Malware Uses Wi-Fi Scanning to Get Location of Infected Device
๐Ÿ•ต๏ธ
Wireshark 4.0.8 Release: Whatโ€™s New!
๐Ÿ•ต๏ธ
NETGEAR launches PR60X Pro Router
๐Ÿ•ต๏ธ
North Korea ready to cash out more than $40 million in Bitcoin after summer of hacks, warns FBI
๐Ÿ•ต๏ธ
Tackling the Perennial Problem | Enterprise News | Black Hat Executive Interviews - ESW329
๐Ÿ•ต๏ธ
Chinese-backed APT โ€˜Flax Typhoonโ€™ Hacks Taiwan with Minimal Malware Footprint
๐Ÿ•ต๏ธ
Tackling the Perennial Problem of Device Management - Jason Meller - ESW #329
๐Ÿ•ต๏ธ
BSides Perth 2023 - 17 videos
๐Ÿ•ต๏ธ
Devoxx Greece 2023 - 71 videos - ENGLISH language
๐Ÿ•ต๏ธ
Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop
๐Ÿ•ต๏ธ
Frosty Trails: Threat-Hunting For Identity Threats In Snowflake Snowflake
๐Ÿ•ต๏ธ
News alert: Cypago unveils Cyber GRC Automation (CGA) platform to simplify GRC processes
๐ŸŒ
Safe Online Surfing Launching for 2023-2024 School Year | Federal Bureau of Investigation
๐ŸŒ
HP Report Details Tactics Used to Evade Detection Tools
๐ŸŒ
National intelligence office issues cyber warning for government and commercial satellites
๐ŸŒ
Smoke Loader Drops Whiffy Recon Wi-Fi Scanning and Geolocation Malware
๐ŸŒ
New Whiffy Recon malware uses WiFi to triangulate your location
๐ŸŽ™๏ธ
S3 Ep149: How many cryptographers does it take to change a light bulb?
๐Ÿ“ก
OT and IT Visibility and Efficiency Barriers
๐Ÿ“ก
Tornado Cash Founders Charged in Billion-Dollar Crypto Laundering Scandal
๐Ÿ“ก
Brazilโ€™s Top Escort Service Exposes Millions of Escort and Client Data
๐Ÿ“ก
Redline Stealer Demonstrates a Low-Barrier-to-Entry Threat
๐Ÿ“ก
The Hidden Dangers of Public Wi-Fi
๐Ÿ“ก
Rockwell ThinManager Vulns Could Expose Industrial HMIs To Attacks
๐Ÿ“ก
Tornado Cash Crypto Mixer Devs Charged With Money Laundering
๐Ÿ“ก
Last call for mWISE, the security conference for frontline practitioners.
๐Ÿ“ก
New Windows updates cause UNSUPPORTED_PROCESSOR blue screens
๐Ÿ“ก
Telekopye: Hunting Mammoths using Telegram bot
๐Ÿ“ก
Sensor Intel Series: Top CVEs in July 2023
๐Ÿ“ก
Sensor Intel Series: Top CVEs in July 2023