228Articles
9Categories
2023-10-10Date
🚨
CISA Adds Five Known Vulnerabilities to CatalogCISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation: CVE-2023-21608 Adobe Acrobat and Reader Use-After-Free Vulnerability CVE-2023-20109 Cisco IOS and IOS XE Group Encrypted Transport VPN Out-of-Bounds …
KEV
🚨
#StopRansomware: AvosLocker Ransomware (Update)SUMMARY Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically …
KEV
πŸ›
Credential Harvesting Campaign Targets Unpatched NetScaler Instances
πŸ›
libcue Library Flaw Opens GNOME Linux Systems Vulnerable to RCE Attacks
πŸ›
libcue Library Flaw Opens GNOME Linux Systems Vulnerable to RCE Attacks
πŸ›
Citrix Devices Under Attack: NetScaler Flaw Exploited to Capture User Credentials
πŸ›
D-Link Wi-Fi Range Extender Vulnerability Let Attackers Inject Remote Code
πŸ›
HTTP/2 Rapid Reset Zero-Day Vulnerability Exploited to Launch Record DDoS Attacks
πŸ›
Microsoft Response to Distributed Denial of Service (DDoS) Attacks against HTTP/2
πŸ›
Previously Unseen Grayling APT Targets Multiple Organizations in Taiwan
πŸ›
CVE-2023-35349 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36902 Windows Runtime Remote Code Execution Vulnerability
πŸ›
CVE-2023-38171 Microsoft QUIC Denial of Service Vulnerability
πŸ›
CVE-2023-36737 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
πŸ›
CVE-2023-41763 Skype for Business Elevation of Privilege Vulnerability
πŸ›
CVE-2023-41765 Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
πŸ›
CVE-2023-41766 Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
πŸ›
CVE-2023-41767 Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
πŸ›
CVE-2023-41768 Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
πŸ›
CVE-2023-41769 Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
πŸ›
CVE-2023-41770 Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
πŸ›
CVE-2023-41771 Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
πŸ›
CVE-2023-41772 Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2023-41773 Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
πŸ›
CVE-2023-41774 Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
πŸ›
CVE-2023-36732 Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36731 Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36730 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
πŸ›
CVE-2023-36729 Named Pipe File System Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36728 Microsoft SQL Server Denial of Service Vulnerability
πŸ›
CVE-2023-36726 Windows Internet Key Exchange (IKE) Extension Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36725 Windows Kernel Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36724 Windows Power Management Service Information Disclosure Vulnerability
πŸ›
CVE-2023-36723 Windows Container Manager Service Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36722 Active Directory Domain Services Information Disclosure Vulnerability
πŸ›
CVE-2023-36721 Windows Error Reporting Service Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36720 Windows Mixed Reality Developer Tools Denial of Service Vulnerability
πŸ›
CVE-2023-36718 Microsoft Virtual Trusted Platform Module Remote Code Execution Vulnerability
πŸ›
CVE-2023-36717 Windows Virtual Trusted Platform Module Denial of Service Vulnerability
πŸ›
CVE-2023-36713 Windows Common Log File System Driver Information Disclosure Vulnerability
πŸ›
CVE-2023-36712 Windows Kernel Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36711 Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36710 Windows Media Foundation Core Remote Code Execution Vulnerability
πŸ›
CVE-2023-36709 Microsoft AllJoyn API Denial of Service Vulnerability
πŸ›
CVE-2023-36707 Windows Deployment Services Denial of Service Vulnerability
πŸ›
CVE-2023-36706 Windows Deployment Services Information Disclosure Vulnerability
πŸ›
CVE-2023-36704 Windows Setup Files Cleanup Remote Code Execution Vulnerability
πŸ›
CVE-2023-36703 DHCP Server Service Denial of Service Vulnerability
πŸ›
CVE-2023-36702 Microsoft DirectMusic Remote Code Execution Vulnerability
πŸ›
CVE-2023-36701 Microsoft Resilient File System (ReFS) Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36698 Windows Kernel Security Feature Bypass Vulnerability
πŸ›
CVE-2023-36697 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36606 Microsoft Message Queuing Denial of Service Vulnerability
πŸ›
CVE-2023-36605 Windows Named Pipe Filesystem Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36603 Windows TCP/IP Denial of Service Vulnerability
πŸ›
CVE-2023-36602 Windows TCP/IP Denial of Service Vulnerability
πŸ›
CVE-2023-36598 Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability
πŸ›
CVE-2023-36596 Remote Procedure Call Information Disclosure Vulnerability
πŸ›
CVE-2023-36594 Windows Graphics Component Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36593 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36592 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36591 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36590 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36589 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36585 Active Template Library Denial of Service Vulnerability
πŸ›
CVE-2023-36584 Windows Mark of the Web Security Feature Bypass Vulnerability
πŸ›
CVE-2023-36583 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36582 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36581 Microsoft Message Queuing Denial of Service Vulnerability
πŸ›
CVE-2023-36579 Microsoft Message Queuing Denial of Service Vulnerability
πŸ›
CVE-2023-36578 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36577 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
πŸ›
CVE-2023-36576 Windows Kernel Information Disclosure Vulnerability
πŸ›
CVE-2023-36575 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36574 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36573 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36572 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36571 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36570 Microsoft Message Queuing Remote Code Execution Vulnerability
πŸ›
CVE-2023-36569 Microsoft Office Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36568 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36567 Windows Deployment Services Information Disclosure Vulnerability
πŸ›
CVE-2023-36564 Windows Search Security Feature Bypass Vulnerability
πŸ›
CVE-2023-36563 Microsoft WordPad Information Disclosure Vulnerability
πŸ›
CVE-2023-36561 Azure DevOps Server Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36557 PrintHTML API Remote Code Execution Vulnerability
πŸ›
CVE-2023-36438 Windows TCP/IP Information Disclosure Vulnerability
πŸ›
CVE-2023-36435 Microsoft QUIC Denial of Service Vulnerability
πŸ›
CVE-2023-36434 Windows IIS Server Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36433 Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
πŸ›
CVE-2023-36431 Microsoft Message Queuing Denial of Service Vulnerability
πŸ›
CVE-2023-36429 Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
πŸ›
CVE-2023-36420 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
πŸ›
CVE-2023-36419 Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36417 Microsoft SQL ODBC Driver Remote Code Execution Vulnerability
πŸ›
CVE-2023-44487 MITRE: CVE-2023-44487 HTTP/2 Rapid Reset Attack
πŸ›
CVE-2023-29348 Windows Remote Desktop Gateway (RD Gateway) Information Disclosure Vulnerability
πŸ›
CVE-2023-38166 Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
πŸ›
CVE-2023-38159 Windows Graphics Component Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36790 Windows RDP Encoder Mirror Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36789 Skype for Business Remote Code Execution Vulnerability
πŸ›
CVE-2023-36786 Skype for Business Remote Code Execution Vulnerability
πŸ›
CVE-2023-36785 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
πŸ›
CVE-2023-36780 Skype for Business Remote Code Execution Vulnerability
πŸ›
CVE-2023-36778 Microsoft Exchange Server Remote Code Execution Vulnerability
πŸ›
CVE-2023-36776 Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36743 Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36566 Microsoft Common Data Model SDK Denial of Service Vulnerability
πŸ›
CVE-2023-36565 Microsoft Office Graphics Elevation of Privilege Vulnerability
πŸ›
CVE-2023-36436 Windows MSHTML Platform Remote Code Execution Vulnerability
πŸ›
CVE-2023-36418 Azure RTOS GUIX Studio Remote Code Execution Vulnerability
πŸ›
CVE-2023-36416 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
πŸ›
CVE-2023-36415 Azure Identity SDK Remote Code Execution Vulnerability
πŸ›
CVE-2023-36414 Azure Identity SDK Remote Code Execution Vulnerability
πŸ›
Critically Close to Zero(Day): Exploiting Microsoft Kernel Streaming Service
πŸ›
CVE-2023-44487 - HTTP/2 Rapid Reset Attack Impacting F5 NGINX Products
πŸ›
HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487
KEV
πŸ›
Built-in weakness in HTTP/2 protocol exploited for massive DDoS attacks
πŸ›
Citrix Releases Security Updates for Multiple Products
πŸ›
CVE-2022-41127 Microsoft Dynamics NAV and Microsoft Dynamics 365 Business Central (On Premises) Remote Code Execution Vulnerability
πŸ›
Microsoft Response to Distributed Denial of Service (DDoS) Attacks against HTTP/2
⚠️
Credentials Hard-Coded in Cisco Emergency Location Tracker
⚠️
Google Bug Bounty Program Expands to Chrome V8, Google Cloud
⚠️
Update: 23andMe Scraping Incident Leaked Data on 1.3 Million Users of Ashkenazi and Chinese Descent
⚠️
MacOS β€œDirtyNIB” Vulnerability: Let Attackers Execute Malicious Code
⚠️
5 practical recommendations implementing zero trust
⚠️
The undeniable benefits of making cyber resiliency the new standard
⚠️
New Magecart Campaign Alters 404 Error Pages to Steal Shoppers' Credit Cards
⚠️
Update: Caesars Entertainment Says Social-Engineering Attack Behind August Breach
⚠️
Mirai-based DDoS Attackers Aggressively Adopted New Router Exploits
⚠️
Cobalt Strike 4.9 Released: What’s New!
⚠️
Source Code of the 2020 Variant of HelloKitty Ransomware Leaked on Cybercrime Forum
⚠️
74% of CEOs Concerned About Their Organization's Ability to Protect Against Cyber Attacks, Despite Seeing Cybersecurity as Critical
⚠️
Economic challenges tighten CISO compensation: IANS study
⚠️
Gutsy debuts with data-driven security governance tool
⚠️
Veza releases new IGA solution to enhance identity security
⚠️
R2R Stomping – New Method to Run the Hidden Code in Binaries
⚠️
β€˜HTTP/2 Rapid Reset’ Zero-Day Exploited to Launch Largest DDoS Attacks in History
⚠️
One-Click GNOME Exploit Could Pose Serious Threat to Linux Systems
⚠️
Rapid Reset Zero Day Exploited To Launch Largest DDoS Attacks In History
⚠️
New 'HTTP/2 Rapid Reset' zero-day attack breaks DDoS records
KEV
⚠️
Hacktivists send fake nuclear attack warning via Israeli Red Alert app
⚠️
Mirai Variant IZ1H9 Adds 13 Exploits to Arsenal
⚠️
CISA Releases One Industrial Control Systems Advisory
⚠️
CISA, FBI, NSA, and Treasury Release Guidance on OSS in IT/ICS Environments
⚠️
Shufflecake – Hidden Linux Filesystems to Store Sensitive Data
⚠️
Shifting Focus to Make DevSecOps Successful - Janet Worthington - ASW #258
⚠️
Patch Tuesday: Code Execution Flaws in Adobe Commerce, Photoshop
⚠️
CISA, Government, and Industry Partners Publish Fact Sheet for Organizations Using Open Source Software
⚠️
IZ1H9 Campaign Enhances Its Arsenal with Scores of Exploits
⚠️
Vanta bakes generative AI into core security and compliance product
⚠️
Microsoft October 2023 Patch Tuesday fixes 3 zero-days, 104 flaws
KEV
⚠️
Microsoft Fixes Exploited Zero-Days in WordPad, Skype for Business
KEV
⚠️
October 2023 Microsoft Patch Tuesday Summary, (Tue, Oct 10th)
⚠️
Microsoft Exchange gets β€˜better’ patch to mitigate critical bug
⚠️
Arctic Wolf acquires cybersecurity automation platform Revelstoke
⚠️
Mirai DDoS malware variant expands targets with 13 router exploits
⚠️
Microsoft Releases October 2023 Security Updates
⚠️
Critical Patches Issued for Microsoft Products, October 10, 2023
⚠️
Patch Tuesday, October 2023 Edition
⚠️
Microsoft Blames Nation-State Threat Actor for Confluence Zero-Day Attacks
πŸ“‹
Windows 11 KB5031354 cumulative update released with new features
πŸ“’
Cybersecurity Awareness Month 2023 Blog Series | Using Strong Passwords and a Password Manager
πŸ“’
IBM security advisory (AV23-610)
πŸ“’
Dell security advisory (AV23-609)
πŸ“’
Ubuntu security advisory (AV23-611)
πŸ“’
Ukraine Publishes Road Map for AI Regulation
πŸ“’
SAP security advisory – October 2023 monthly rollup (AV23-613)
πŸ“’
[Control systems] Schneider Electric security advisory (AV23-612)
πŸ“’
Microsoft security advisory – October 2023 monthly rollup (AV23-615)
πŸ“’
Citrix security advisory (AV23-614)
πŸ“’
Fortinet security advisory (AV23-616)
πŸ“’
Scaling BeyondCorp with AI-Assisted Access Control Policies
πŸ”₯
What to do if you’ve clicked on a phishing link or talked to scammers | Kaspersky official blog
πŸ”₯
New Magecart Campaign Alters 404 Error Pages to Steal Shoppers' Credit Cards
πŸ”₯
Cable Giant Volex Targeted in Cyberattack
πŸ”₯
Payment Gateway Provider Safexpay Technology Allegedly Hacked in a Nearly $2 Billion Scam
πŸ”₯
Thousands Of WordPress Sites Have Been Hacked Through tagDiv Vuln
πŸ”₯
23andMe resets user passwords after genetic data posted online
πŸ”₯
Air Europa Customers Urged to Cancel Cards Following Hack on Payment System
πŸ”₯
Air Europa data breach: Customers warned to cancel credit cards
πŸ”₯
McLaren Health Care Facing 3 Lawsuits in Ransomware Hack
πŸ”₯
Hackers advertised 23andMe stolen data two months ago
πŸ•΅οΈ
North Korea-Linked Lazarus APT Laundered Over $900 Million Through Cross-Chain Crime
πŸ•΅οΈ
ISC Stormcast For Tuesday, October 10th, 2023 https://isc.sans.edu/podcastdetail/8694, (Tue, Oct 10th)
πŸ•΅οΈ
GUEST ESSAY: How tech tricks used by Amazon, Netflix aid Ukraine in repelling Russia’s invasion
πŸ•΅οΈ
C-suite weighs in on generative AI and security
πŸ•΅οΈ
BSides CT 2023 - BSIDES CONNECTICUT - 8 videos
πŸ•΅οΈ
Microsoft is finally deprecating vbscript
πŸ•΅οΈ
Researchers Uncover Grayling APT's Ongoing Attack Campaign Across Industries
πŸ•΅οΈ
Model Extraction Attack on Neural Networks
πŸ•΅οΈ
Magecart Web Skimmer Hides in 404 Error Pages
πŸ•΅οΈ
Researcher Conversations: Natalie Silvanovich From Google’s Project Zero
πŸ•΅οΈ
Training Tuesday - Discussions for certs, training and learning-at-home
πŸ•΅οΈ
Unknown Cyberespionage Group Targeted Taiwan
πŸ•΅οΈ
CyberheistNews Vol 13 #41 [Risky New Data] More Than Half of Phishing Scams Now Use Obfuscation
πŸ•΅οΈ
SecurityWeek to Host 2023 ICS Cybersecurity Conference October 23-26 in Atlanta
πŸ•΅οΈ
Twistlock Founders Score Whopping $51M Seed Funding for Gutsy
πŸ•΅οΈ
New β€˜Grayling’ APT Targeting Organizations in Taiwan, US
πŸ•΅οΈ
New Grayling APT Targeting Organizations In Taiwan, US
πŸ•΅οΈ
Terminology Matters: Changing 'Cybersecurity' to Data Care - Ron Gula, Cyndi Gula - CSP #143
πŸ•΅οΈ
SAP Releases 7 New Notes on October 2023 Patch Day
πŸ•΅οΈ
Researchers: North Korean Hackers Gain Speed, Flexibility
πŸ•΅οΈ
Curl's Impending Patch, Glibc's Looney Tunables, ShellTorch, Another Top 10 List - ASW #258
πŸ•΅οΈ
23andMe, Facebook, GitHub's Secret Scanning, MGM Resorts, Grindr, & Jason Wood - SWN #332
πŸ•΅οΈ
Lua-Resty-JWT Authentication Bypass
πŸ•΅οΈ
Beyond the Front Lines: How the Israel-Hamas War Impacts the Cybersecurity Industry
πŸ•΅οΈ
War in Israel: Cyber, Kinetic Implications for the World
πŸ•΅οΈ
Smishing Triad Threat Actor Sets Its Sights on the UAE
πŸ•΅οΈ
Red Pandas Unleashed: How Webhooks, Bad USB, and WiFi Collide in Cyberspace
πŸ•΅οΈ
TikTok Chief Summoned by EU Lawmakers For Privacy Probe
🌐
New Report: Child Sexual Abuse Content and Online Risks to Children on the Rise
🌐
Google makes passkeys the default sign-in method for all users
🌐
Predator Files Report Prompts Call For Worldwide Ban On Spyware
🌐
Microsoft to kill off VBScript in Windows to block malware delivery
πŸ“‘
Poor Cybersecurity Habits are Common Among Younger Employees
πŸ“‘
Live Webinar | Backup Data Security Strategy: Reduce Downtime & Ensure Business Continuity
πŸ“‘
Live Webinar | The Rise of the Cloud Conscious Adversary: Defense Recommendation Playbook
πŸ“‘
Google Adopts Passkeys as Default Sign-in Method for All Users
πŸ“‘
Gutsy launches with huge $51M seed to bring process mining to security
πŸ“‘
Google makes passkeys the default sign-in for personal accounts
πŸ“‘
Ex-Soldier Tried To Pass Secrets To China After Seeking A Subreddit About Spy Stuff
πŸ“‘
A Primer on Cyber Risk Acceptance and What it Means to Your Business
πŸ“‘
Gutsy Launches With Huge $51M Seed to Bring Process Mining to Security
πŸ“‘
New critical Citrix NetScaler flaw exposes 'sensitive' data
πŸ“‘
Windows 10 KB5031356 update released with 25 improvements
πŸ“‘
Microsoft warns of incorrect BitLocker encryption errors
πŸ“‘
Virus Bulletin PUA – a love letter