80Articles
8Categories
2023-09-22Date
🚨
CISA Adds Owl Labs, Samsung, Realtek Bugs to Exploited Vulnerability ListThe CISA added eight bugs on Monday and another on Tuesday to its list of known exploited vulnerabilities, giving FCEB agencies three weeks to patch the issues that affect products from MinIO, Samsung, Realtek, Zyxel, Laravel, and Owl Labs.
KEV
🚨
Faster Patching Pace Validates CISA’s KEV Catalog InitiativeCISA says Known Exploited Vulnerabilities Catalog has helped federal agencies significantly accelerate their vulnerability remediation pace. The post Faster Patching Pace Validates CISA’s KEV Catalog Initiative appeared first on SecurityWeek .
KEV
πŸ›
The WebP 0day
πŸ›
Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
KEV
πŸ›
Atlassian Security Updates Patch High-Severity Vulnerabilities
πŸ›
High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
πŸ›
CVE-2022-35825 Visual Studio Remote Code Execution Vulnerability
πŸ›
0-days exploited by commercial surveillance vendor in Egypt
πŸ›
PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions - The Citizen Lab
⚠️
Gold Melody Attacking Organizations With Burp Extension, Mimikatz, and Other Tools
⚠️
Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones
⚠️
How to Interpret the 2023 MITRE ATT&CK Evaluation Results
⚠️
Apple Emergency Updates Fix Three New Zero-Days Exploited in Attacks
⚠️
BIND Updates Patch Two High-Severity DoS Vulnerabilities
⚠️
Sandman APT Infiltrates Telecommunications Companies Using LuaDream Backdoor
⚠️
Attacker Unleashes Stealthy Crypto Mining via Malicious Python Package
⚠️
Apple issues emergency security updates for iPhone, iPad, and Apple Watch
KEV
⚠️
Apple Patches 3 Zero Days Likely Exploited By Spyware Vendor To Hack iPhones
⚠️
Incomplete Disclosures By Apple And Google Create Huge Blindspot For 0-Day Hunters
⚠️
Yes, you have to update your Apple devices again, because spyware is bad
KEV
⚠️
Open Source Software Must Start with Secure Code
⚠️
Recently patched Apple, Chrome zero-days exploited in spyware attacks
⚠️
Apple Releases Security Updates for Multiple Products
⚠️
Dallas says Royal ransomware breached its network using stolen account
⚠️
Egyptian opposition politician hacked with Predator spyware, researchers confirm
⚠️
Google CISO Phil Venables on Building Strong CIO-CISO Bonds
⚠️
Apple Fixes Bugs That Infected Egyptian Politician's iPhone
KEV
πŸ“’
Apple security advisory (AV23-574)
πŸ”₯
Mysterious 'Sandman' Threat Actor Targets Telecom Providers Across Three Continents
πŸ”₯
Update: MGM Resorts Computers Back Up After 10 Days as Analysts Eye Effects of Casino Cyberattacks
πŸ”₯
Cyber Security Today, Sept. 23, 2023 - Nova Scotia details MOVEit victims, a new ransomware strain found and more
πŸ”₯
Air Canada Says Hackers Accessed Limited Employee Records During Cyberattack
πŸ”₯
Hotel hackers redirect guest to fake Booking.com to steal cards
πŸ”₯
Rising OT/ICS Cybersecurity Incidents Reveal Alarming Trend
πŸ”₯
Hotel hackers redirect guests to fake Booking.com to steal cards
πŸ”₯
Air Canada Says Employee Information Accessed in Cyberattack
πŸ”₯
Weekly Update 366
πŸ”₯
Ohio Community College Data Theft Breach Affects Nearly 300K
πŸ”₯
T-Mobile denies new data breach rumors, points to authorized retailer
πŸ”₯
MGM Resorts Says Hotels 'Operating Normally' After Attack
πŸ”₯
Google’s Parisa Tabriz on how the company stays ahead of hackers
πŸ”₯
Crypto firm Nansen asks users to reset passwords after vendor breach
πŸ”₯
Government of Bermuda links cyberattack to Russian hackers
πŸ”₯
Cyber Security Today, Week in Review for the week ending Friday, Sept. 22, 2023
πŸ”₯
Chinese, North Korean Nation-State Groups Target Health Data
πŸ”₯
LastPass: β€˜Horse Gone Barn Bolted’ is Strong Password
πŸ•΅οΈ
ISC Stormcast For Friday, September 22nd, 2023 https://isc.sans.edu/podcastdetail/8670, (Fri, Sep 22nd)
πŸ•΅οΈ
Signal Adds Quantum-Resistant Encryption to its E2EE Messaging Protocol
πŸ•΅οΈ
Examining the Activities of the Turla APT Group
πŸ•΅οΈ
Iranian Nation-State Actor OilRig Targets Israeli Organizations
πŸ•΅οΈ
SANS Survey Shows Drop in 2023 ICS/OT Security Budgets
πŸ•΅οΈ
China’s Offensive Cyber Operations in Africa Support Soft Power Efforts
πŸ•΅οΈ
Cryptojacking Campaign Infected Online Thesaurus With Over 5 Million Visitors
πŸ•΅οΈ
In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking
πŸ•΅οΈ
Cryptomining malware detected on a Russian thesaurus with 5 Million+ monthly visits
πŸ•΅οΈ
New Sandman APT Group Hitting Telcos With Rare LuaJIT Malware
πŸ•΅οΈ
Iranian Nation-State Actor OilRig Targets Israeli Organizations
πŸ•΅οΈ
Passkeys, bots, hotels, conning the con, TrendMicro, Pizza & Aaran Leyland - SWN #327
πŸ•΅οΈ
UK Approves Commercial Data Transfer Deal With US
πŸ•΅οΈ
Nation-State Actors Unleash Stealthy, LuaJIT-Based Malware
πŸ•΅οΈ
Friday Squid Blogging: New Squid Species
πŸ•΅οΈ
Cato Networks Raises $238M on $3B Valuation to Move Upmarket
πŸ•΅οΈ
ESET's cutting-edge threat research at LABScon – Week in security with Tony Anscombe
πŸ•΅οΈ
Stealth Falcon preying over Middle Eastern skies with Deadglyph
πŸ•΅οΈ
Unlocking Your Data: How to Convert OST to PST Files Successfully
πŸ•΅οΈ
InfoSec World 2023 - Day 2
πŸ•΅οΈ
News alert: SSH announces another US financial institution selects PrivX as its PAM solution
🌐
BBTok Banking Trojan Impersonates Over 40 Banks to Hijack Victim Accounts
🌐
New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
πŸ“‘
Space and Defense Tech Maker Exail Technologies Exposes Database Access
πŸ“‘
High-Severity Flaws Uncovered in ISC BIND Server
πŸ“‘
Legit Security Lands $40M to Lock Down Apps and Dev Environments
πŸ“‘
Chinese-speaking Users Targeted with ValleyRAT and Sainbox RAT
πŸ“‘
Security Concerns and Outages Elevate Observability From IT Niche to Business Essential
πŸ“‘
Hotel Hackers Redirect Guests to Fake booking.com to Steal Cards
πŸ“‘
How to deal with your brand's doppelgangers | Kaspersky official blog
πŸ“‘
TransUnion Thinks Dump Of Stolen Customer Data Came From Someone Else
πŸ“‘
US Govt IT Help Desk Techie Leaked Top Secrets To Foreign Nation
πŸ“‘
Nigerian man pleads guilty to attempted $6 million BEC email heist
πŸ“‘
Webinar | Zero Trust Fundamentals: Start Your Journey Here