134Articles
9Categories
2023-10-05Date
🚨
CISA Adds Three Known Exploited Vulnerabilities to CatalogCISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation: CVE-2023-40044 Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability CVE-2023-42824 Apple iOS and iPadOS Kernel Privilege Escalatio…
KEV
πŸ›
Make-me-root 'Looney Tunables' security hole on Linux needs your attention
πŸ›
Critical Atlassian Confluence bug under attack. Patch now
πŸ›
Apple Rolls Out Security Patches for Actively Exploited iOS Zero-Day Flaw
KEV
πŸ›
Atlassian Confluence Hit by Newly Actively Exploited Zero-Day – Patch Now
KEV
πŸ›
ShellTorch Flaw Exposes Thousands of AI Servers to RCE Attacks
πŸ›
Looney Tunables: Linux Vulnerability Lets Attackers Gain Root Privileges
πŸ›
Apple Warns of Newly Exploited iOS 17 Kernel Zero-Day
πŸ›
CISA Warns of Active Exploitation of JetBrains and Windows Vulnerabilities
KEV
πŸ›
Cisco Releases Urgent Patch to Fix Critical Flaw in Emergency Responder Systems
πŸ›
Atlassian Releases Security Advisory for Confluence Data Center and Server
πŸ›
Cisco warns of hard coded creds in Emergency Responder
πŸ›
Cisco fixes serious flaws in emergency responder and other products
⚠️
Malware Trends - Anuj Soni - PSW #801
⚠️
Fake Dead Grandma's, No Flipper Zero, Looney Tunables, & $20 Mil For Zero Days - PSW #801
⚠️
Exploitation of Critical WS_FTP Server Flaw Spotted in the Wild
⚠️
Hackers Hijacking Microsoft SQL Servers to Compromise Azure Environments
⚠️
Coming from inside the building: dark web recruitment of malicious insiders
⚠️
Cisco Fixes Hardcoded Root Credentials in Emergency Responder
⚠️
Wireshark 4.0.10 Released: What’s New!
⚠️
Why open-source software supply chain attacks have tripled in a year
⚠️
Qakbot Attackers Remain Alive and Quacking, Researchers Find
⚠️
RomHack 2023 - Kim Zetter - Sun Stroke: How the SolarWinds hackers pulled off their ingenious attack
⚠️
Google, Yahoo announce new email authentication requirements for 2024
⚠️
Linux Foundation Announces OpenPubkey Open Source Cryptographic Protocol
⚠️
Addressing the People Problem in Cybersecurity
⚠️
QakBot Threat Actors Still in Action, Using Ransom Knight and Remcos RAT in Latest Attacks
⚠️
Microsoft Warns of Cyberattacks Attempting to Breach Cloud via SQL Server Instance
⚠️
Cyber Mavens Slam Europe's Cyber Resilience Act
⚠️
Cisco Releases Security Advisories for Multiple Products
⚠️
[FREE RESOURCES] Celebrate Cybersecurity Awareness Month This October with our Cyber-Monsters!
⚠️
Zero-days for hacking WhatsApp are now worth millions of dollars
⚠️
Linux Foundation Announces OpenPubkey Open Source Cryptographic Protocol
⚠️
Apple Fixes Overheating And Zero Day Flaws With New iOS Update
⚠️
Microsoft Office XSS Flaw Let Attackers Execute Arbitrary Code
⚠️
How digital threats from East Asia are increasing in breadth and effectiveness
⚠️
CISA Releases Three Industrial Control Systems Advisories
⚠️
Hackers Exploit Atlassian Confluence Zero-day Flaw to Create Admin Account
KEV
⚠️
NSA and CISA Release Advisory on Top Ten Cybersecurity Misconfigurations
⚠️
New Gartner Forecast Shows Global Security and Risk Management Spending to Increase by 14% in 2024
⚠️
A Vulnerability in Atlassian Confluence Server and Data Center Could Allow for Privilege Escalation
⚠️
A Vulnerability in Cisco Emergency Responder Could Allow for Arbitrary Code Execution
⚠️
Exploit released for Linux flaw giving root on major distros
⚠️
Exploits released for Linux flaw giving root on major distros
⚠️
Breach Roundup: Still Too Much ICS Exposed on the Internet
⚠️
Qakbot malware’s creators ride again, despite FBI takedown
⚠️
Attackers Exploiting Atlassian Confluence Software Zero-Day
⚠️
Multiple Vulnerabilities in Progress WS_FTP Server Could Allow for Remote Command Execution.
⚠️
News alert: Massachusetts pumps $1.1 million into state college cybersecurity training programs
πŸ“’
CISA, NSA Publish Guidance on IAM Challenges for Developers, Vendors
πŸ“’
Atlassian security advisory (AV23-602)
πŸ“’
Joint Advisory on Top Cyber Misconfigurations Highlights Urgency for Software Manufacturers to Incorporate Secure by Design Principles
πŸ“’
NSA and CISA reveal top 10 cybersecurity misconfigurations
πŸ“’
[Control systems] Mitsubishi Electric security advisory (AV23-605)
πŸ“’
SonicWall security advisory (AV23-604)
πŸ“’
Microsoft Edge security advisory (AV23-603)
πŸ“’
[Control systems] Qognify security advisory (AV23-607)
πŸ“’
[Control systems] Hitachi security advisory (AV23-606)
πŸ”₯
'Gay furry hackers' claim second NATO cyber-break-in
πŸ”₯
Massive Surge in Cyber Attacks Targeting Real Estate and Utilities Organizations
πŸ”₯
Critical Atlassian Confluence Bug Under Attack; Patch Now
πŸ”₯
Cyberattacks in Arizona, Missouri Limit Access to Community Services
πŸ”₯
Sony Confirms Data Stolen in Two Recent Hacker Attacks
πŸ”₯
Organizations grapple with detection and response despite rising security budgets
πŸ”₯
Red Cross Releases Wartime Hacktivist Rules
πŸ”₯
Lyca Mobile investigates customer data leak after cyberattack
πŸ”₯
PLAY Ransomware Group Added Six New Organizations to its Victim List
πŸ”₯
Amazon to make MFA mandatory for 'root' AWS accounts by mid-2024
πŸ”₯
Joe Sullivan: What's a Breach? 'It's a Complicated Question'
πŸ”₯
New tool: le-hex-to-ip.py, (Thu, Oct 5th)
πŸ”₯
Blackbaud Pays $49.5M to Settle With State AGs in Breach
πŸ”₯
Hacked phone spyware shuts down… again
πŸ”₯
Clorox Expects Double-Digit Sales Drop Following Cyberattack
πŸ”₯
Lessons Learned from a Year of Cybersecurity Breaches - ESW #334
πŸ•΅οΈ
ISC Stormcast For Thursday, October 5th, 2023 https://isc.sans.edu/podcastdetail/8688, (Thu, Oct 5th)
πŸ•΅οΈ
Hackers are Abusing Dropbox to Steal Microsoft SharePoint Credentials
πŸ•΅οΈ
On Demand | Health Sector and Evolution of Complex Threats & What That Means for your SOC
πŸ•΅οΈ
Exposing Infection Techniques Across Supply Chains and Codebases
πŸ•΅οΈ
Hundreds Download Malicious NPM Package Capable of Delivering Rootkit
πŸ•΅οΈ
Guyana Governmental Entity Hit by DinodasRAT in Cyber Espionage Attack
πŸ•΅οΈ
Does your security program suffer from piecemeal detection and response?
πŸ•΅οΈ
RomHack Conference 2023 - 6 talks
πŸ•΅οΈ
RomHack Conference 2022 - 6 talks
πŸ•΅οΈ
Qakbot Hackers Continue to Push Malware After Takedown Attempt
πŸ•΅οΈ
Senior Executives Beware: The Rise of EvilProxy Phishing Campaigns
πŸ•΅οΈ
Malicious URLs In Phishing Emails: Hover, Click and Inspect Again
πŸ•΅οΈ
North Korean Hackers Target South Korean Naval Shipyards
πŸ•΅οΈ
Red Cross Publishes Rules of Engagement for Hacktivists During War
πŸ•΅οΈ
BlackBerry to Separate Cybersecurity, IoT Businesses In 2024
πŸ•΅οΈ
Top 7 REST API Security Strategies to Secure Your Endpoints
πŸ•΅οΈ
SHARED INTEL Q&A: My thoughts and opinions about cyber threats β€” as discussed with OneRep
πŸ•΅οΈ
The Time Is Now to Secure the Future
πŸ•΅οΈ
Operation Jacana Targets Governmental Entity in Guyana with DinodasRAT
πŸ•΅οΈ
GitHub Improves Secret Scanning Feature With Expanded Token Validity Checks
πŸ•΅οΈ
BlackBerry to Split Cybersecurity, IoT Business Units
πŸ•΅οΈ
Cryptohack Roundup: FTX Hacker Moves Funds, SBF Trial Begins
πŸ•΅οΈ
β€˜War has no rules’: Hacktivists scorn Red Cross’ new guidelines
πŸ•΅οΈ
Cisco Plugs Gaping Hole in Emergency Responder Software
πŸ•΅οΈ
China-linked cyberspies backdoor semiconductor firms with Cobalt Strike
πŸ•΅οΈ
[New Report] Over Half of Phishing Emails Use Obfuscation
πŸ•΅οΈ
Hospital Lobbyists Press Senator on Online Tracking Limits
πŸ•΅οΈ
Operation Jacana: Foundling hobbits in Guyana
πŸ•΅οΈ
News alert: Kovrr report reveals exposure and cost of material cyber threats β€” across industries
🌐
Analysis and Config Extraction of Lu0Bot, a Node.js Malware with Considerable Capabilities
🌐
GoldDigger Android Trojan Targets Banking Apps in Asia Pacific Countries
🌐
Qakbot hackers are still spamming victims despite FBI takedown
🌐
Banned Applications Used as a Lure to Target Russian Users
🌐
AWS Kicks off Cloud Race to Mandate MFA by Default
🌐
New GoldDigger Android Trojan Drains Victim Bank Accounts
🌐
Transatlantic Cable podcast, episode 318 | Kaspersky official blog
πŸŽ™οΈ
Smashing Security podcast #342: Royal family attacked, keyless car theft, and a deepfake Tom Hanks
πŸ“‘
Okta Buys Personal Password Manager Uno to Service Consumers
πŸ“‘
New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks
πŸ“‘
Google and Yahoo Say They Will Crack Down on Spam With New Measures
πŸ“‘
Live Webinar | Guide to Implementing SASE/SSE: 5 Things for Every CIO & CISO to Know
πŸ“‘
Political Disinformation and AI
πŸ“‘
Live Webinar | Demystifying SASE: Do's, Don'ts and Key Insights from Early Adopters
πŸ“‘
Coalition to give NGOs free access to cybersecurity services to protect against attacks
πŸ“‘
Attacker Deployed Hundreds of Rogue Python Packages with 75,000 Downloads to Steal Sensitive Data
πŸ“‘
Advancing generative AI exploration safely and securely
πŸ“‘
Live Webinar | Innovating for the Future of Cloud Security
πŸ“‘
Scammers Impersonate Companies to Steal Cryptocurrency From Job Seekers
πŸ“‘
Sony Confirms Data Stolen In Two Recent Hacker Attacks
πŸ“‘
School Surveillance Tech Does More Harm Than Good
πŸ“‘
South Korea Accuses North Of Phish And Ships Attack
πŸ“‘
A Cybersecurity Risk Assessment Guide for Leaders
πŸ“‘
Stream-Jacking Attacks on YouTube Steal From Victims via Cryptocurrency Scams
πŸ“‘
Threats in Cloud Top List of Executive Cyber Concerns, Pwc Finds
πŸ“‘
Global CRM Provider Exposed Millions of Clients’ Files Online
πŸ“‘
Why Stream-Jacking is Taking Over YouTube: A Comprehensive Analysis
πŸ“‘
Is iOS really more secure than Android? | Kaspersky official blog
πŸ“‘
Microsoft releases new, faster Teams app for Windows and Mac PCs
πŸ“‘
Microsoft officially removes Cortana for Windows 11 Insiders
πŸ“‘
Cybersecurity Awareness Month 2023: Elevating Security Together