130Articles
9Categories
2023-09-06Date
🚨
CISA Adds One Known Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-33246 Apache RocketMQ Command Execution Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and…
KEV
🚨
Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475SUMMARY The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and Cyber National Mission Force (CNMF) identified the presence of indicators of compromise (IOCs) at an Aeronautical Sector organization as early as January 2023. Analysts…
KEV
🐛
9 Alarming Vulnerabilities Uncovered in SEL's Power Management Products
🐛
ASUS Routers are Affected by Three Critical Remote Code Execution Flaws
🐛
New Agent Tesla Variant Being Spread by Specially Crafted Excel Document
🐛
Researchers Discover Critical Vulnerability in PHPFusion CMS
🐛
Old vulnerabilities are still a big problem
🐛
Zero-Day Alert: Latest Android Patch Update Includes Fix for Newly Actively Exploited Flaw
KEV
🐛
CISA Releases Update to Threat Actors Exploiting Citrix CVE-2023-3519 to Implant Webshells
KEV
🐛
MAR-10430311-1.v1 Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475
⚠️
Evil MinIO Exploits: A New Attack Vector to Breach Corporate Networks
⚠️
Ransomware Attacks Soar by 87% in U.K, Reveals JUMPSEC
⚠️
Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach
⚠️
Nascent Malware Attacking npm, PyPI, and RubyGems Developers
⚠️
MITRE Caldera for OT now available as extension to open-source platform
⚠️
Cyber talent gap solutions you need to know
⚠️
Compliance budgets under strain as inflation and workload grow
⚠️
Interview with Dr. Gene Spafford - Eugene Spafford - PSW Vault
⚠️
Caldera: A New Security Tool to Emulate Attacks in Critical Infrastructure
⚠️
Mend.io SAML Vulnerability Exposed
⚠️
Proofpoint unveils new features to break cyberattack chain
⚠️
AtlasVPN to Patch IP Leak Vulnerability After Public Disclosure
⚠️
Atlas VPN Zero-Day Vulnerability Leaks Users’ Real IP Address
⚠️
CXOs and directors are growing wary of generative AI: Report
⚠️
GhostSec Leaks Source Code of Alleged Iranian Surveillance Tool
⚠️
XSS vulnerability in Proton Mail allowed to leak unencrypted emails
⚠️
Android Zero-Day Patched With September 2023 Security Updates
⚠️
See Tickets says hackers accessed customers’ payment data — again
⚠️
Meet the AI, fintech, SaaS and security industry chairs at TC Disrupt 2023
⚠️
CISA Says to Exercise Caution For Disaster-Related Malicious Scams
⚠️
View to a Phish: W3LL Specializes in Microsoft 365 Hacking
⚠️
CISA Releases Capacity Enhancement Guide to Strengthen Agency Resilience to DDoS Attack
⚠️
CyberSaint launches Remediation Suite to optimize resource allocation and decision-making
⚠️
Dozens of Unpatched Flaws Expose Security Cameras Made by Defunct Company Zavio
⚠️
September Android updates fix zero-day exploited in attacks
⚠️
How SMEs can use Wazuh to improve cybersecurity
⚠️
Android Zero Day Patched With September 2023 Security Updates
⚠️
Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Mistakes
⚠️
A Vulnerability in Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Could Allow for Arbitrary Code Execution
⚠️
Check Point Buys Startup Atmosec to Secure SaaS Applications
⚠️
Generative AI Warnings Contain Their Own Dangers
⚠️
“Threat-informed Defense Is Hard …” Cross-post for Safekeeping
📢
EU Artificial Intelligence Act Not a Panacea for AI Risk
📢
Fasoo collaborates with Egnyte to simplify data governance
📢
Cisco security advisory (AV23-529)
🔥
Official Slams Aussie Firms for Data Breach Reporting Delays
🔥
Nascent Malware Campaign Targets npm, PyPI, and RubyGems Developers
🔥
Freecycle data breach impacts 7 million members
🔥
W3LL Store: How a Secret Phishing Syndicate Targets 8,000+ Microsoft 365 Accounts
🔥
Ukraine's CERT Thwarts APT28's Cyberattack on Critical Energy Infrastructure
🔥
Holiday Season Cyber Alert: Reflectiz Declares War on Magecart
🔥
Avoidable digital certificate issues fuel data breaches
🔥
W3LL phishing kit hijacks thousands of Microsoft 365 accounts, bypasses MFA
🔥
TXOne Networks Edge V2 isolates security breaches
🔥
Cybercriminals target MS SQL servers to deliver ransomware
🔥
Threat Actors Target NPM, PyPI, and RubyGems Developers
🔥
Russian APT28 Hacking Group Attacking Critical Power Infrastructure
🔥
Ransomware gang claims credit for Sabre data breach
🔥
Hackers stole Microsoft signing key from Windows crash dump
🔥
Just Kids Dental Says Nearly 130K People Affected by Attack
🔥
University of Michigan requires password resets after cyberattack
🔥
Ransomware Infection Vectors | News - PSW798
🕵️
Zscaler Data Security Platform Takes on Symantec, CASB Tools
🕵️
APT28 Spear-Phishes Ukrainian Critical Energy Facility
🕵️
United Airlines Says the Outage That Held Up Departing Flights Was Not a Cybersecurity Issue
🕵️
ISC Stormcast For Wednesday, September 6th, 2023 https://isc.sans.edu/podcastdetail/8646, (Wed, Sep 6th)
🕵️
Hackers Using BlueShell Malware to Attack Windows, Linux, and Mac Systems
🕵️
Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide
🕵️
GUEST ESSAY: Securing your cryptocurrency — best practices for Bitcoin wallet security
🕵️
Cloudera partners with AWS to help organizations accelerate their modernization to the cloud
🕵️
Emerging threat: AI-powered social engineering
🕵️
From unsuspecting click to data compromise
🕵️
CIS Benchmarks Communities: Where configurations meet consensus
🕵️
[Request]Computer security related audiobooks
🕵️
Getting off the hook: 10 steps to take after clicking on a phishing link
🕵️
[Request] Computer Security related audiobooks
🕵️
Cryptocurrency Startup Loses Encryption Key for Electronic Wallet
🕵️
Hacker Conversations: Alex Ionescu
🕵️
Chrome 116 Update Patches High-Severity Vulnerabilities
🕵️
What are You Working on Wednesday
🕵️
NTT launches Samurai XDR SaaS to strengthen detection and response capabilities across the network
🕵️
Weekly Update 363
🕵️
How Secure Is Your Authentication Method?
🕵️
Machine learning operations can revolutionize cybersecurity
🕵️
CyberheistNews Vol 13 #36 [Must Know] Top 10 Trends in Business Email Compromise for 2023
🕵️
25 Major Car Brands Get Failing Marks From Mozilla for Security and Privacy
🕵️
Netskope acquires Kadiska for enhanced network and app performance monitoring
🕵️
Alert: Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant
🕵️
D2iQ DKP 2.6 improves Kubernetes management capabilities
🕵️
Hackers Steal Over $5,700 from ATMs Using Raspberry Pi
🕵️
Hackers Use Flipper Zero Device to Attack Nearby iPhones with Notification Pop-ups
🕵️
Thousands of Popular Websites Leaking Secrets
🕵️
Password-Stealing Chrome Extension Demonstrates New Vulnerabilities
🕵️
Insight Managed Cloud Services streamline cloud management
🕵️
Investors Betting Big on Upwind for CNAPP Tech
🕵️
Webinar Tomorrow: Unpacking the Secure Supply Chain Consumption Framework (S2C2F)
🕵️
Results of Major Technical Investigations for Storm-0558 Key Acquisition
🕵️
Netskope Buys Digital Experience Management Startup Kadiska
🕵️
Cash-Strapped IronNet Faces Bankruptcy Options
🕵️
UK Government Seeks to Dispel Encryption Concerns
🕵️
Identity is the Perimeter | Leadership & Communications - BSW #319
🕵️
From Cybersecurity Webmaster to CISO
🕵️
Mopria | Cisco | Seimens | Word | DarkGate | AP Stylebook | Jason Wood & more – SWN324
🕵️
MDR and Self Sabotage | Detection Difficulty | Enterprise News - ESW331
🕵️
Cyberdog | Pegasus | Webex | Peach Sandstorm | SAP | Caesar | Penn | Aaran Leyland & more – SWN325
🌐
New BLISTER Malware Update Fuelling Stealthy Network Infiltration
🌐
New Chae$ 4 Strain Targets Financial and Logistics Customers
🌐
Mirai variant infects low-cost Android TV boxes for DDoS attacks
🎙️
Cyber Security Today, Sept. 6, 2023 - Advice on cyber insurance
🎙️
Smashing Security podcast #338: Catfishing services, bad sports, and another cockup
📡
Nine Vulnerabilities Patched in SEL Power System Management Products
📡
Yes, There's an npm Package Called @(-.-)/env and Some Others Like it
📡
Three CISOs Share How to Run an Effective SOC
📡
Introducing Sophos ZTNA on Sophos Firewall
📡
Bogus URL Shorteners Go Mobile-Only in AdSense Fraud Campaign
📡
API security startup Pynt raises $6M
📡
Security Relevant DNS Records, (Wed, Sep 6th)
📡
Toyota says filled disk storage halted Japan-based factories
📡
Crypto Gambling Platform Stake.com Back Online After $40 Million Heist
📡
Pizza Hut Australia leaks one million customers’ details, claims ShinyHunters hacking group
📡
How to customize privacy and security in Mastodon | Kaspersky official blog
📡
What Businesses Need To Know To Comply With SEC's New Cyber Disclosure Rules
📡
Government Denies U-Turn On Encrypted Messaging Row
📡
Big Tech Has Failed To Police Russian Disinformation
📡
MSI BIOS updates fix Windows unsupported processor BSOD bug
📡
Live Webinar | Human Risk Factors in Cybersecurity
📡
Flipper Zero can be used to launch iOS Bluetooth spam attacks
📡
Rockstar Games reportedly sold games with Razor 1911 cracks on Steam
📡
Introducing the Sophos AP6 Series of Cloud-Managed Wireless Access Points
📡
Staying ahead of threats: 5 cybercrime trends to watch