126Articles
9Categories
2023-10-26Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-5631 Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability These types of vulnerabilities are frequent attack vectors for malic…
KEV
🐛
VSCode Vulnerabilities - Thomas Chauchefoin, Paul Gerste - PSW #804
🐛
Critical Flaw in NextGen's Mirth Connect Could Expose Healthcare Data
🐛
Citrix Bleed: PoC Released for Citrix NetScaler Zero-Day Vulnerability
🐛
Critical Flaw in NextGen's Mirth Connect Could Expose Healthcare Data
🐛
Firefox Memory Corruption Flaw Let Attacker Execute Arbitrary Code
🐛
Adventures in Validating IPv4 Addresses, (Thu, Oct 26th)
🐛
VMware Releases Security Advisory for vCenter Server
🐛
Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data
🐛
CVE-2023-46747: Pre-Auth Remote Code Execution in F5-BIGIP via AJP Request Smuggling
🐛
CVE-2021-31192 Windows Media Foundation Core Remote Code Execution Vulnerability
🐛
CVE-2021-31205 Windows SMB Client Security Feature Bypass Vulnerability
🐛
CVE-2021-31207 Microsoft Exchange Server Security Feature Bypass Vulnerability
⚠️
Pro-Russia group exploits Roundcube zero-day in attacks on European government emails
⚠️
Businesses face “silent infiltration” of generative AI as use spirals out of control
⚠️
Copilot is ready for takeoff: Microsoft rolls out artificial intelligence for Windows
⚠️
Spain Arrests 34 Cybercriminals Who Stole Data of 4 Million People
⚠️
Indian National Arrested for Stealing $150,000 via Computer Hacking
⚠️
Teleport’s new offering to help reduce attack response times
⚠️
Google adds generative AI threats to its bug bounty program
⚠️
The Danger of Forgotten Pixels on Websites: A New Case Study
⚠️
Increasing transparency in AI security
⚠️
Google’s reward criteria for reporting bugs in AI products
⚠️
Winter Vivern APT Resurfaces to Target European Entities
⚠️
Microsoft Warns as Scattered Spider Expands from SIM Swaps to Ransomware
⚠️
Record-Breaking 100 Million RPS DDoS Attack Exploits HTTP/2 Rapid Reset Flaw
⚠️
CISA Releases Nine Industrial Control Systems Advisories
⚠️
Apple Ships Major iOS, macOS Security Updates
⚠️
Human-Crafted Phishing Emails Only Three Percent More Successful Than AI-Generated Ones, According To IBM
⚠️
Citrix Bleed Exploit Lets Hackers Hijack Netscaler Accounts
⚠️
Nine Vulnerabilities Found in VPN Software, Including One Critical RCE Issue
⚠️
CISA, HHS Release Cybersecurity Healthcare Toolkit
⚠️
iLeakage Attack Exploits Safari to Steal Sensitive Data From Macs, iPhones
⚠️
Celebrating Cybersecurity Awareness Month with KnowBe4: Insights from Our Valued Customers
⚠️
Apple Releases Security Advisories for Multiple Products
⚠️
Firefox, Chrome Updates Patch High-Severity Vulnerabilities
KEV
⚠️
UK Prime Minister announces world’s first AI Safety Institute
⚠️
CISA, HHS, and HSCC Jointly Release Cybersecurity Toolkit For Healthcare Sector
⚠️
iLeakage: New Safari Exploit Impacts Apple iPhones and Macs with A and M-Series CPUs
⚠️
The Evolving Role of the Browser in the Modern Enterprise World – ESW #337
⚠️
Breach Roundup: Winter Vivern Hunting For Emails
⚠️
Proof of Concept: Overcoming Open Source Code Security Risks
⚠️
The Evolving Role of the Browser in the Modern Enterprise World - Noriko Bouffard, Mar... - ESW #337
📢
CISA Issues Request for Comment on Software Identification Ecosystem Analysis White Paper
📢
Amazon Rolls Out Independent Cloud for Europe to Address Stricter Privacy Standards
📢
[Control systems] Sielco security advisory (AV23-655)
📢
[Control systems] Rockwell Automation security advisory (AV23-654)
📢
[Control systems] Dingtian security advisory (AV23-651)
📢
[Control systems] Centralite security advisory (AV23-652)
📢
[Control systems] Ashlar-Vellum security advisory (AV23-653)
📢
F5 security advisory (AV23-656)
📢
White House Teases New AI Executive Order
🔥
Update: Grammarly Says It Corrected Sign-in Vulnerabilities After Alert From Cyber Researchers
🔥
Cybercriminals Leak Patient Pictures in Low Blow Bid to Win Ransom
🔥
SEIKO Cyber Attack: Customers Personal Data Exposed
🔥
ASVEL basketball club slam dunked by NoEscape ransomware gang, data stolen
🔥
Meet Rhysida, a New Ransomware Strain That Deletes Itself
🔥
Ambulances diverted after New York hospitals hit by cyber attack
🔥
Chilean Telecom Giant GTD Suffers Disruptive Attacks Affecting its Infrastructure-as-a-Service Platform
🔥
Why cybersecurity training isn’t working (and how to fix it)
🔥
DUCKTAIL Malware Employs LinkedIn Messages to Execute Attacks
🔥
Redcliffe Labs Database with Over 12 Million Patient Records Exposed
🔥
BeyondTrust, Cloudflare And 1Password Targeted After Okta Breach
🔥
Seiko Discloses Data Breach Resulting From BlackCat Ransomware Attack
🔥
Japanese Watchmaking Giant Seiko Confirms Personal Data Stolen in Ransomware Attack
🔥
The Rise and Tactics of Octo Tempest: A Cyber Threat Analysis
🔥
Key Learnings from “Big Game” Ransomware Campaigns
🔥
Kansas Court System Down Nearly 2 Weeks in ‘Security Incident’ That Has Hallmarks of Ransomware
🔥
France says Russian state hackers breached numerous critical networks
🔥
Hackers Earn $350k on Second Day at Pwn2Own Toronto 2023
🔥
Cryptohack Roundup: Defense Calls Sam Bankman-Fried
🔥
What Is Operational Risk and Why Should You Care? Assessing SEC Rule Readiness for OT and IoT
🔥
Cyber Fail: Can You Trust Hallucinating Chatbots?
🔥
Known Ransomware Attack Volume Breaks Monthly Record, Again
🔥
Microsoft: Octo Tempest one of the most dangerous financial hacking groups
🔥
Cybersecurity Unicorns Are Back, the Okta Breach Is Bad, & Don’t Invest in Startups - ESW #337
🔥
Microsoft: Octo Tempest is one of the most dangerous financial hacking groups
🔥
An integrated incident response solution with Microsoft and PwC
🕵️
ISC Stormcast For Thursday, October 26th, 2023 https://isc.sans.edu/podcastdetail/8718, (Thu, Oct 26th)
🕵️
Shenanigans and more - PSW #804
🕵️
New Undetected Python-Based Info-stealer Offered Via Dedicated Website
🕵️
Iranian Group Tortoiseshell Launches New Wave of IMAPLoader Malware Attacks
🕵️
YoroTrooper: Researchers Warn of Kazakhstan's Stealthy Cyber Espionage Group
🕵️
Authorities Seize 17 North Korean Hacker Websites Used for Scamming
🕵️
New NSA Information from (and About) Snowden
🕵️
[Live Demo] Ridiculously Easy Security Awareness Training and Phishing
🕵️
Google AI Security Plan: Bug Bounty, Supply Chain Safety
🕵️
Cloudflare sees surge in hyper-volumetric HTTP DDoS attacks
🕵️
Monetization of Partner Led Managed Services Model
🕵️
Octo Tempest Attacking Organizations to Steal Financial Data
🕵️
Pro-Russian Hackers Target XSS In Roundcube
🕵️
Mandiant Intelligence Chief Raises Alarms Over China's Volt Typhoon Hackers In US Critical Infrastructure
🕵️
Google Announces Bug Bounty Program and Other Initiatives to Secure AI
🕵️
Weapons Systems Provide Valuable Lessons for ICS/OT Security
🕵️
Day 3 of SecurityWeek’s 2023 ICS Cybersecurity Conference — Challenges and Solutions
🕵️
The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team
🕵️
UK Parliament Probes Critical Infrastructure Cybersecurity
🕵️
AI Security Firm Cranium Raises $25 Million
🕵️
Threat Hunting: Detecting Browser Credential Stealing [T1555.003]
🕵️
US Senator Quizzes 23andMe Over Credential-Stuffing Hack
🕵️
Rockwell Forges Gen AI Pact With Microsoft, Buys Cyber Firm
🕵️
Alternative Approaches to Startup Funding - The Syndicate Group - Chad Cardenas - ESW #337
🕵️
ESET APT Activity Report Q2–Q3 2023
🌐
Unmasking Vacum Stealer: The Malware Plotting Cryptocurrency Plunder
🌐
FakeUpdateRU Chrome Update Infection Spreads Trojan Malware
🌐
Iranian Group Tortoiseshell Launches New Wave of IMAPLoader Malware Attacks
🌐
Octo Tempest aka 0ktapus has Become 'One of the Most Dangerous Financial' Hacker Groups
🌐
StripedFly malware framework infects 1 million Windows, Linux hosts
🌐
Phony Corsair job vacancy targets LinkedIn users with DarkGate malware
🎙️
Smashing Security podcast #345: Cyber sloppiness, and why does Google really want to hide your IP address?
📡
Strategic Tips to Optimize Cybersecurity Consolidation
📡
Servicenow Quietly Fixes Eight-Year-Old Data Exposure Flaw
📡
New iLeakage attack steals emails, passwords from Apple Safari
📡
Workflow of a zkSync Era transaction: from generation to finalization
📡
You Should Probably Buy A Flipper Zero Before It's Too Late
📡
ServiceNow Quietly Addresses Unauthenticated Data Exposure Flaw From 2015
📡
Google Announces Bug Bounty Program And Other Initiatives To Secure AI
📡
Can you use emojis in passwords? | Kaspersky official blog
📡
UK Parliament Opens Inquiry into Cyber-Resilience
📡
Australia Focuses on Threat of Chinese Attack on Solar Power
📡
New iLeakage Attack Steals Emails, Passwords From Apple Safari
📡
Opinion | Can we Afford the Risk? Measuring the cost of the Expiration of the Chemical Facilities Anti-Terrorism Standards Program
📡
Nigerian Police dismantle cybercrime recruitment, mentoring hub
📡
UK: Purchase Scams Surge as Fraud Losses Hit $703m
📡
Android adware apps on Google Play amass two million installs
📡
Windows 10 KB5031445 preview update fixes ctfmon.exe memory leak, 9 issues