136Articles
8Categories
2023-08-29Date
🚨
Identification and Disruption of QakBot InfrastructureSUMMARY The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory (CSA) to disseminate QakBot infrastructure indicators of compromise (IOCs) identified through FBI investigations as of Aug…
KEV
🐛
Multiple Vulnerabilities Found in Techview LA-5570 Wireless Gateway Home Automation Controller
🐛
11 search engines for cybersecurity research you can use right now
🐛
Microsoft Edge Privilege Escalation Flaw – Update Now!
🐛
Attacks on Citrix NetScaler Systems Linked to Ransomware Actor
🐛
Citrix NetScaler Alert: Ransomware Hackers Exploiting Critical Vulnerability
🐛
Ransomware group exploits Citrix NetScaler systems for initial access
KEV
🐛
Android Goes All-in on Fuzzing
🐛
CISA Releases IOCs Associated with Malicious Barracuda Activity
🐛
Recently patched Juniper firewall flaws allow remote code execution
⚠️
Security Plan Templates
⚠️
Vulnerability Summary for the Week of August 21, 2023 | CISA
⚠️
[Career] The state of entry level cybersecurity jobs.
⚠️
Cybercriminals Used Just Three Malware Loaders to Launch 80% of Attacks, Deets Inside
⚠️
Ransomware Attack Cleanup Costs: $10M So Far for Rackspace
⚠️
How financial institutions can reduce security and other risks from MRAs
⚠️
Easy-to-exploit Skype vulnerability reveals users’ IP address
⚠️
Suspected London’s Met Police data breach potentially exposes sensitive officer, staff information
⚠️
Identity Theft from 1965 Uncovered through Face Recognition
⚠️
Survey Provides Takeaways for Security Pros to Operationalize their Remediation Life Cycle
⚠️
Android Banking Trojan MMRat Carries Out Bank Fraud via Fake App Stores
⚠️
US govt email servers hacked in Barracuda zero-day attacks
⚠️
SAP and Google Cloud join forces to provide customers with generative AI capabilities
⚠️
Time and effort to obtain cyber insurance increasing for US businesses
⚠️
Fortinet enhances its SASE solution to help organizations prevent data leaks
⚠️
LogRhythm and Cimcor collaborate to enhance cyberattack protection for organizations
⚠️
Chinese APT Was Prepared for Remediation Efforts in Barracuda ESG Zero-Day Attack
⚠️
Hackers exploit critical Juniper RCE bug chain after PoC release
⚠️
Chinese Hacking Group Exploits Barracuda Zero-Day to Target Government, Military, and Telecom
⚠️
Okta for Global 2000 gives CEOs flexibility to centralize or decentralize their business strategy
⚠️
CISA Releases One Industrial Control Systems Advisory
⚠️
Tanium Vulnerability Risk and Compliance for ServiceNow accelerates security investigations
⚠️
US Government Email Servers Hacked in Barracuda Zero-Day Attacks
⚠️
Generative AI policy enforcement with Sophos Firewall
⚠️
Qakbot botnet dismantled after infecting over 700,000 computers
⚠️
Operation 'Duck Hunt' Dismantles QakBot
⚠️
Go Crypto in Practice, Excel Executes Python, Protecting Users, DARPA Distills - ASW #253
⚠️
How Can Security Be Smart About Using AI? - Jeff Pollard - ASW #253
⚠️
U.S. Hacks QakBot, Quietly Removes Botnet Infections
⚠️
Google Cloud announces Duet AI enhancements for Mandiant, Chronicle
⚠️
How the FBI nuked Qakbot malware from infected Windows PCs
⚠️
DreamBus malware exploits RocketMQ flaw to infect servers
⚠️
Operation ‘Duck Hunt’: Qakbot Malware Disrupted, $8.6 Million in Cryptocurrency Seized
⚠️
Chinese Hackers Anticipated Barracuda ESG Patch
📢
Is the cybersecurity community’s obsession with compliance counter-productive?
📢
Security Team Huddle: Using the Full NIST Cybersecurity Framework for the Win
📢
Case Study: LoanLogics Combined Compliance & Security Awareness Training to Improve Security Culture
📢
Is the Cybersecurity Community’s Obsession With Compliance Counter-Productive?
📢
Mozilla security advisory (AV23-508)
📢
[Control systems] PTC security advisory (AV23-509)
📢
VMware security advisory (AV23-510)
📢
Google Chrome security advisory (AV23-511)
📢
Midwest Hospital Group Experiencing Systemwide IT Outage
🔥
Cybersecurity incident at NSF NOIRLab
🔥
A story about cyber defense
🔥
Cybersecurity Newsletter
🔥
Ransomware Attack Cleanup Costs: $11M So Far for Rackspace
🔥
Attacks on Citrix NetScaler systems linked to ransomware actor
🔥
Two Men Arrested Following Poland’s Railway System Signals Hack
🔥
New TZW Ransomware Unlocked; Belongs to Adhubllka Family
🔥
Survival time for web sites, (Tue, Aug 29th)
🔥
Spainish Police Warns of LockBit Locker Ransomware Phishing Attacks
🔥
Personal, Health Information of 1.2 Million Stolen in PurFoods Ransomware Attack
🔥
Compromised OpenCart Payment Module Steals Credit Card Information
🔥
Mom’s Meals Breached: Over 1.2 Million Consumers Data Exposed
🔥
University of Michigan shuts down network after cyberattack
🔥
Mom’s Meals says data breach affects 1.2 million customers
🔥
More UK Cops' Names And Photos Exposed In Supplier Breach
🔥
Japan’s Cybersecurity Agency Breached by Suspected Chinese Hackers: Report
🔥
New Android MMRat malware uses Protobuf protocol to steal your data
🔥
University of Michigan Shuts Down Network After Cyberattack
🔥
Ransomware Attack Specialist Tied to Citrix NetScaler Hacks
🕵️
Amazon Sec Engineer Interview
🕵️
Microsoft or google certificate
🕵️
What tools would you recommend a startup to have good disaster recovery plan? Is there any automation tool for the same?
🕵️
Detecting Deepfakes, building a tool and community
🕵️
Analysis Tools
🕵️
Sept 2023: Insider Threat Awareness Month - Unveiling Hidden Risks
🕵️
IT leaders alarmed by generative AI’s SaaS security implications
🕵️
ISC Stormcast For Tuesday, August 29th, 2023 https://isc.sans.edu/podcastdetail/8636, (Tue, Aug 29th)
🕵️
What makes a good ASM solution stand out
🕵️
Working at Sophos
🕵️
Leaking File Contents with a Blind File Oracle in Flarum
🕵️
GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners
🕵️
For the win? Offensive research contests on criminal forums
🕵️
Cisco partners with Nutanix to accelerate hybrid multicloud deployments
🕵️
Mobile App Security Using No-Code Cyber Defense Automation
🕵️
Swissbit introduces D1200 data center SSD
🕵️
Ciphertex strengthens data security with SecureNAS CX-160KSSD-X
🕵️
Training Tuesday - Discussions for certs, training and learning-at-home
🕵️
Can a private internet co-exist with the internet we know?
🕵️
Meta Fights Sprawling Chinese ‘Spamouflage’ Operation
🕵️
CyberheistNews Vol 13 #35 New KnowBe4 Callback Phishing Feature Boosts Your Users' Security Awareness
🕵️
Championship Results: No Bank Breaking or Boat Rocking! - Steve Hunt - CSP 137
🕵️
The Reality of Cyberinsurance in 2023
🕵️
Did Microsoft Just Upend the Enterprise Browser Market?
🕵️
UN Warns Hundreds of Thousands in Southeast Asia Roped Into Online Scams
🕵️
Grave flaws in BGP Error handling
🕵️
Descope unveils third-party connectors for no-code app journey personalization
🕵️
Mystery, Qakbot, Crates.io, VDP, NetScaler, Entra ID, SynthID, FreeBSD, Jason Wood - SWN #322
🕵️
New ‘MMRat’ Android Trojan Targeting Users in Southeast Asia
🕵️
OpenAI Turns to Security to Sell ChatGPT Enterprise
🕵️
Qakbot botnet disrupted, malware removed from 700,000+ victim computers
🕵️
Recorded Future podcast 82 (crosspost)
🕵️
VMware Patches Major Security Flaws in Network Monitoring Product
🕵️
Data From The Qakbot Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI
🌐
Stealthy Android Malware MMRat Carries Out Bank Fraud Via Fake App Stores
🌐
DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates
🌐
Meta Fights Sprawling Chinese ‘Spamouflage’ Operation
🌐
FBI operation tricked thousands of computers infected by Qakbot into uninstalling the malware
🌐
DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates
📡
How to Protect Your CI/CD Pipeline
📡
4 Popular Cybersecurity Myths vs. Facts
📡
Phishing-as-a-Service Gets Smarter: Microsoft Sounds Alarm on AiTM Attacks
📡
Cyber Info-Sharing Guide for Healthcare Sector Updated
📡
Update: Two Men Arrested Following Poland Railway Hacking
📡
Attackers can Discover IP Addresses by Sending Links Over the Skype Mobile App
📡
Corporate Boards Expand Cybersecurity Risk Oversight, Report Finds
📡
Live Webinar | Mitigating Organizational Risks of Using Generative AI: The Good, the Bad, and the Ugly
📡
Japan's JPCERT Warns of New 'MalDoc in PDF' Attack Technique
📡
Privacy Regulators Tell Social Media Companies to Fear the Scrapers
📡
Phishing-as-a-Service Gets Smarter: Microsoft Sounds Alarm on AiTM Attacks
📡
Global Cybercrime Treaty Could be ‘Disastrous for Human Rights,’ NGOs Warn
📡
IT Leaders Alarmed by Generative Ai’s SAAS Security Implications
📡
Google is bringing generative AI to its security tooling
📡
Web Control, Crime Patrol or Real Pawns in Cybercrime
📡
Are QR codes dangerous? | Kaspersky official blog
📡
Genshin Impact dev will sue Kaveh Hacks users and developers
📡
US Spy Satellite Agency Isn't So Silent About New Silent Barker Mission
📡
Google Tests Watermark To Identify AI Images
📡
Cybersecurity Experts Say The West Has Failed To Learn Lessons From Ukraine
📡
Meta Fights Sprawling Chinese Spamouflage Operation
📡
Microsoft adds HSTS support to Exchange Server 2016 and 2019
📡
Mom’s Meals issues “Notice of Data Event”: What to know and what to do
📡
TechCrunch Disrupt 2023 Startup Battlefield 200: AI and Security edition
📡
Diving into Starlink's User Terminal Firmware