116Articles
9Categories
2023-10-12Date
🚨
Adobe, Cisco IOS, Skype, WordPad, and HTTP/2 Rapid Reset Flaws Actively Exploited: CISA WarnsThe US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are currently being actively exploited. This means that attackers are using these vulnerabilities to gain unauthorized access to computer systems…
KEV
🚨
CISA Releases New Resources Identifying Known Exploited Vulnerabilities and Misconfigurations Linked to RansomwareToday, as part of the Ransomware Vulnerability Warning Pilot (RVWP) , CISA launched two new resources for combating ransomware campaigns: A “Known to be Used in Ransomware Campaigns” column in the KEV Catalog that identifies KEVs associated with ransomware campaigns. A “Misconfig…
KEV
🐛
Two High-Risk Security Flaws Discovered in Curl Library - New Patches Released
🐛
SEC to investigate Progress Software over mass MOVEit hack
🐛
Hyped up curl vulnerability falls short of expectations
🐛
Apple Releases iOS 16 Update to Patch Exploited Vulnerability
🐛
High severity flaw patched in widely used curl tool
KEV
🐛
CVE-2022-41113 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
⚠️
Google Chrome Use-after-free in Site Isolation Let Remote Attackers Exploit Heap Corruption
⚠️
The source code of the 2020 variant of HelloKitty ransomware was leaked on cybercrime forum
⚠️
Microsoft Defender Thwarts Large-Scale Akira Ransomware Attack
⚠️
Unpatched Vulnerabilities Expose Yifan Industrial Routers to Attacks
⚠️
Critical SOCKS5 Vulnerability in cURL Puts Enterprise Systems at Risk
⚠️
Lakera launches to protect large language models from malicious prompts
⚠️
How scammers are exploiting X Premium (Twitter Blue) | Kaspersky official blog
⚠️
Microsoft Patches 2 Actively Exploited Bugs
KEV
⚠️
Apple Releases iOS 16 Update To Patch Exploited Vulnerability
⚠️
1-Click RCE On GNOME Via libcue
⚠️
CISA Releases Nineteen Industrial Control Systems Advisories
⚠️
Getting Started With Reverse Engineering Hardware - PSW #802
⚠️
Zero-Day Attacks Exploit 'Rapid Reset' Weakness in HTTP/2
⚠️
Beware of Bogus Roborock Retailers: The Perils of Misleading URLs in E-Commerce
⚠️
Android TVs (Malware Included), Patch Netscaler, Fixing Legacy Auth, & GNOME Bugs! - PSW #802
⚠️
Apple fixes iOS Kernel zero-day vulnerability on older iPhones
⚠️
SEC Investigating Progress Software Over MOVEit Hack
⚠️
Ransomware Vulnerability Warning Pilot updates: Now a One-stop Resource for Known Exploited Vulnerabilities and Misconfigurations Linked to Ransomware
KEV
⚠️
How to Banish Heroes from Your SOC?
⚠️
Ransomware attacks now target unpatched WS_FTP servers
⚠️
What does it mean for AI to be trustworthy? - Pamela Gupta - ESW #335
⚠️
ISMG Editors: How Crypto Helped Finance Hamas' Attacks
⚠️
FBI shares AvosLocker ransomware technical details, defense tips
⚠️
US SEC Probes MOVEit Hack
📢
Researchers Uncover Malware Posing as WordPress Caching Plugin
📢
Bounty to Recover NIST’s Elliptic Curve Seeds
📢
'Stayin’ Alive' Campaign Targets Telecom Companies and Government Ministries in Asia
📢
Stayin’ Alive Hacking Teleco & Government Organizations to Deploy Backdoor
📢
[Control systems] Weintek security advisory (AV23-623)
📢
Juniper Networks security advisory (AV23-622)
📢
[Control systems] Mitsubishi Electric security advisory (AV23-624)
📢
[Control systems] Santesoft Electric security advisory (AV23-627)
📢
[Control systems] Hikvision security advisory (AV23-625)
📢
[Control systems] Advantech security advisory (AV23-626)
📢
HPE security advisory (AV23-628)
📢
Generative AI is scaring CISOs – but adoption isn’t slowing down
📢
CISA Exec: 'We've Been Lucky In the Cyber Realm' With Israel
🔥
How to Prevent Ransomware as a Service (RaaS) Attacks
🔥
Simpson Manufacturing Shuts Down IT Systems After Cyberattack
🔥
Threat Actor Deploys Athena Agent in Advanced Spear Phishing Attack
🔥
Knight Ransomware Group Takes Responsibility for Cyberattack on India's National Health Mission
🔥
Simpson Manufacturing Takes Systems Offline Following Cyberattack
🔥
Shadow PC warns of data breach as hacker tries to sell gamers' info
🔥
“Human-Operated” Ransomware Attacks Double in the Last Year
🔥
New Cyber Attack Techniques Will Not Replace Old-School Social Engineering
🔥
Multiple Cybercrime Groups Join in on the Israel-Hamas Conflict
🔥
Most CISOs Confront Ransomware — and Pay Ransoms
🔥
New WordPress Backdoor Creates Rogue Admin Account to Hijack Websites
🔥
Backdoor Malware Found on WordPress Website Disguised as Legitimate Plugin
🔥
Cloud gaming firm Shadow says hackers stole customers’ personal data
🔥
Shadow PC Warns of Data Breach as Hacker Tries to Sell Gamers’ Information
🔥
Update: BianLian Extortion Group Claims Recent Air Canada Breach
🔥
Breach Roundup: Google Phases out Passwords
🔥
13 Most Dangerous Cyber Attacks and How to Avoid Them
🕵️
Malicious Nuget Packages Found Delivering SeroXen RAT
🕵️
ISC Stormcast For Thursday, October 12th, 2023 https://isc.sans.edu/podcastdetail/8698, (Thu, Oct 12th)
🕵️
Why Zero Trust Delivers Even More Resilience Than You Think
🕵️
Microsoft to Kill off VBScript in Windows to Block Malware Delivery
🕵️
SYN Ventures Announces $75 Million Seed Fund for US Cybersecurity Firms
🕵️
Junos OS Flaw Allows Attackers to Flood System and Expose Sensitive Data
🕵️
Hackers on WordPress Websites Hacking Spree with Balada Malware
🕵️
CISO Pay Increases Are Slowing – a Look Behind the Figures
🕵️
ShellBot Uses Hex IPs to Evade Detection in Attacks on Linux SSH Servers
🕵️
Harvested Credentials Are Put Up for Sale Monthly on the Dark Web at a Rate of 10,000 a Month
🕵️
Business Email Compromise Attempts Skyrocket in the Last Year
🕵️
[INFOGRAPHIC] KnowBe4’s SecurityCoach: Top 10 Integrations
🕵️
ShellBot DDoS Malware Attacking Poorly Managed Linux SSH Servers
🕵️
How I got started: Attack surface management
🕵️
A Leader in the IDC MarketScape: Worldwide SD-WAN Infrastructure
🕵️
A place to share vulnerable docker containers
🕵️
LinkedIn Smart Links Abused in Phishing Campaign Targeting Microsoft Accounts
🕵️
Smashing security podcast 343: Four-legged girlfriends, LoveGPT, and a military intelligence failure - 44 minutes
🕵️
How to detect Wi-Fi deauthentication attack and even receive notification on your smartphone
🕵️
QBinDiff: A modular diffing toolkit
🕵️
GRCon23 - Streamed live on 5 Sept 2023 - 7 hours
🕵️
New Research: Phishing Remains the Most Popular Technique for Bad Actors
🕵️
News alert: Nerds On Site develops ‘SME Edge’ solution for small- and mid-sized enterprises
🕵️
How this year’s Black Hat NOC leveraged AI to defend the event
🕵️
Cryptohack Roundup: Crackdown on Hamas Crypto
🕵️
Getting Real with AI, Ending Point Solutions, InfoSec Burnout - Mike Campfield, Nathan... - ESW #335
🕵️
Weaponizing Asset Intelligence, App Sec at ISW - Kevin Johnson, Brian Contos, Stacy Ko... - ESW #335
KEV
🌐
Researchers Uncover Ongoing Attacks Targeting Asian Governments and Telecom Giants
🌐
Cyber Investments Aim to Paint Broader View of Digital Threats, Official Says
🌐
DarkGate Opens Organizations for Attack via Skype, Teams
🌐
Endpoint Malware Attacks Decline as Campaigns Spread Wider
🌐
Malicious NuGet Package Targeting .NET Developers with SeroXen RAT
🌐
ToddyCat hackers use 'disposable' malware to target Asian telecoms
🌐
Malicious Solana, Kucoin packages infect NuGet devs with SeroXen RAT
🎙️
Transatlantic Cable podcast, episode 319 | Kaspersky official blog
📡
Half of CISOs Now Report to CEO as Influence Grows
📡
AnonGhost Hackers Send Fake Nuclear Attack Warning via Israeli Red Alert App
📡
D-Link WiFi Range Extender Vulnerable to Command Injection Attacks
📡
Savvy Israel-Linked Hacking Group Reemerges Amid Gaza Fighting
📡
LinkedIn Smart Links Fuel Credential Phishing Campaign
📡
How to Guard Your Data from Exposure in ChatGPT
📡
R2R Stomping – Are You Ready to Run?
📡
FTX Thief Cashes Out Millions During Bankman-Fried Trial
📡
Californians Can Scrub Personal Info Sold To Advertisers With First-In-US Law
📡
European Police Hackathon Hunts Down Traffickers
📡
Researchers Discover SeroXen RAT in Typosquatted NuGet Package
📡
SYN Ventures Announces $75 Million Seed Fund for US Cybersecurity Firms
📡
Introducing the Microsoft AI Bug Bounty Program featuring the AI-powered Bing experience
📡
New Microsoft bug bounty program focuses on AI-powered Bing
📡
Phishing Campaigns Affecting Italy Witness a Surge
📡
Could Middle Eastern Cyberwarfare Spill Into Health Sector?
📡
Fake Account Creation Bots – Part 2
📡
Fake Account Creation Bots – Part 2
📡
Fake Account Creation Bots – Part 2