100Articles
8Categories
2023-10-30Date
πŸ›
Urgent: New Security Flaws Discovered in NGINX Ingress Controller for Kubernetes
πŸ›
Three New Security Flaws Discovered in NGINX Ingress Controller for Kubernetes
πŸ›
North Korea’s state hacking program is varied, fluid, and nimble
πŸ›
Flying under the Radar: The Privacy Impact of multicast DNS, (Mon, Oct 30th)
πŸ›
VMware Releases Advisory for VMware Tools Vulnerabilities
πŸ›
Exploit released for critical Cisco IOS XE flaw, many hosts still hacked
⚠️
Raven: Open-source CI/CD Pipeline Vulnerability Scanner Tool
⚠️
New Hunters International Ransomware Possible Rebrand of Hive
⚠️
How to choose the best cloud security posture management tools
⚠️
Cyber Security Today, Oct. 30, 2023 - Hackers warn Las Vegas-area parents they have their children's data
⚠️
Raven: Open-source CI/CD pipeline security scanner
⚠️
EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub
⚠️
Report: 587% Surge in QR Code Quishing Attacks
⚠️
Hackers Abusing OAuth Token to Take Over Millions of Accounts
⚠️
F5 Hurriedly Squashes BIG-IP Remote Code Execution Bug
⚠️
CISA Launches Logging Tool for Resource-Poor Organizations
⚠️
New Webinar: 5 Must-Know Trends Impacting AppSec
⚠️
F-Secure Eyes $9.5M in Cost Savings With Layoffs
⚠️
EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub
⚠️
Hackers Earn Over $1 Million at Pwn2Own Toronto 2023
⚠️
Mobile security solutions should balance experience and protection
⚠️
Attackers Can Use Modified Wikipedia Pages to Mount Redirection Attacks on Slack
⚠️
Ransomware Groups Exploiting Unpatched NetScaler Devices
⚠️
The Enterprise Browser for the Modern Workforce | Leadership & Communications - BSW #326
⚠️
The Enterprise Browser for the Modern Workforce – BSW #326
⚠️
The Enterprise Browser for the Modern Workforce - Robert Shield - BSW #326
⚠️
RCE exploit for Wyze Cam v3 publicly released, patch now
⚠️
Snyk Buys Reviewpad to Help Developers Contribute Code Fast
⚠️
SEC Alleges SolarWinds, CISO Tim Brown Defrauded Investors
πŸ“‹
QR Code-based Phishing Attains 587% Hike, Reports Check Point
πŸ“’
CISA Targets Software Identification in Push to Boost Supply Chain Security
πŸ“’
White House Issues Sweeping Executive Order to Secure AI
πŸ“’
Hacking Scandinavian Alcohol Tax
πŸ“’
White House Issuing Sweeping Executive Order to Secure AI
πŸ“’
Whistleblowers: Should CISOs Consider Them a Friend or Foe?
πŸ“’
Biden Wants to Move Fast on AI Safeguards and Will Sign an Executive Order to Address His Concerns
πŸ“’
White House Issues Sweeping Executive Order to Secure AI
πŸ“’
Ubuntu security advisory (AV23-661)
πŸ“’
IBM security advisory (AV23-660)
πŸ“’
[Control systems] ABB security advisory (AV23-662)
πŸ“’
Russia to launch its own version of VirusTotal due to US snooping fears
πŸ“’
Biden Urges Congress to Take Action Following AI Order
πŸ”₯
GameSprite - 6,164,643 breached accounts
πŸ”₯
Hackers Using MSIX App Packages to Infect Windows PCs with GHOSTPULSE Maware
πŸ”₯
XWorm Sold Malware-as-a-service Opens Vast Hacking Opportunities
πŸ”₯
OT Cyberattacks Proliferating Despite Growing Cybersecurity Spend
πŸ”₯
Ransomware Groups Continue to Increase Their Operational Tempo
πŸ”₯
FTC Expands Financial Data Breach Reporting Requirements
πŸ”₯
Boeing Looking Into Hacking Gang's Ransomware Threat
πŸ”₯
New malware campaign uses MSIX packages to infect Windows PCs
πŸ”₯
Malvertising via Dynamic Search Ads Delivers Malware Bonanza
πŸ”₯
Proofpoint to Buy Tessian to Infuse Email Protection With AI
πŸ”₯
Toronto Public Library Facing Disruptions Due to Cyberattack
πŸ”₯
Boeing Investigating Ransomware Attack Claims
πŸ”₯
Toronto Public Library services down following weekend cyberattack
πŸ”₯
FTC orders non-bank financial firms to report breaches in 30 days
πŸ”₯
LastPass breach linked to theft of $4.4 million in crypto
πŸ•΅οΈ
IT Army of Ukraine disrupted internet providers in territories occupied by Russia
πŸ•΅οΈ
ISC Stormcast For Monday, October 30th, 2023 https://isc.sans.edu/podcastdetail/8722, (Mon, Oct 30th)
πŸ•΅οΈ
How to Fix the Internet talks to James Mickens. The Philosopher King - 32 minutes
πŸ•΅οΈ
BruCON 0x0F - BruCON Security Conference -14 videos
πŸ•΅οΈ
Hackers Email Stolen Student Data to Parents of Nevada School District
πŸ•΅οΈ
Mentorship Monday - Discussions for career and learning!
πŸ•΅οΈ
Attackers Can Use Modified Wikipedia Pages to Mount Redirection Attacks on Slack
πŸ•΅οΈ
Detecting and annoying Burp users
πŸ•΅οΈ
Hackers Deliver Remcos RAT as Weaponized PDF Payslip Document
πŸ•΅οΈ
Florida SIM Swapper Sentenced to Prison for Cryptocurrency Theft
πŸ•΅οΈ
Proofpoint to Acquire Tessian for AI-Powered Email Security Tech
πŸ•΅οΈ
Apple Improves iMessage Security With Contact Key Verification
πŸ•΅οΈ
Virtual credit card fraud: An old scam reinvented
πŸ•΅οΈ
The Risk of RBAC Vulnerabilities – A Prevention Guide
πŸ•΅οΈ
Google Chrome now auto-upgrades to secure connections for all users
πŸ•΅οΈ
Exposed: Scam Artists Mimicking PepsiCo in Phishing Schemes
πŸ•΅οΈ
Canada Bans WeChat and Kaspersky on Government Phones
πŸ•΅οΈ
Author Q&A: Here’s why the good guys must continually test the limitations of β€˜EDR’
πŸ•΅οΈ
Remcos RAT Disguises as Payslip to Infect Users
πŸ•΅οΈ
Proactive Boards Lead to Flexible CISOs as Companies Prepare for What's to Come - BSW #326
πŸ•΅οΈ
Costco Pharmacy Sends Sensitive Health Data to 3rd Parties
πŸ•΅οΈ
SEC sues SolarWinds for misleading investors before 2020 hack
πŸ•΅οΈ
Dr. Who | iLeakage | Canada | AI | Killnet | NuGet | Jason Wood & More! – SWN338
πŸ•΅οΈ
Trustworthy AI for National Security | News - PSW805
πŸ•΅οΈ
Quarterly Market Review with a VC | Data Chaos MUST be Curbed, but how? | News - ESW338
πŸ•΅οΈ
Bots | Citrix | Mitre | Solarwinds | Naked Nudes | Scarlett | | Aaran Leyland & More! – SWN339
🌐
Hackers Using MSIX App Packages to Infect Windows PCs with GHOSTPULSE Malware
🌐
Huawei, Vivo phones tag Google app as TrojanSMS-PA malware
🌐
IoT Security Threats Highlight the Need for Zero Trust Principles
🌐
Huawei, Vivo Phones Tag Google App as TrojanSMS-PA Malware
🌐
New BiBi-Linux wiper malware targets Israeli orgs in destructive attacks
🌐
Pro-Hamas Hacktivists Targeting Israeli Entities with Wiper Malware
πŸ“‘
Webinar | Empowering Endpoint Security: Best Practices for Defense-in-Depth
πŸ“‘
How to increase VPN speed β€” and why you need a fast VPN | Kaspersky official blog
πŸ“‘
CISOs Struggling to Understand Value of Security Controls Data
πŸ“‘
ServiceNow Data Exposure: A Wake-Up Call for Companies
πŸ“‘
IT Army of Ukraine Claims to Disrupt Internet Providers in Russia-Occupied Territories
πŸ“‘
Britain To Push Ahead With Rules For Cryptoassets
πŸ“‘
HackerOne Paid Ethical Hackers Over $300 Million In Bug Bounties
πŸ“‘
Internet access in Gaza partially restored after blackout
πŸ“‘
Protecting Business-Critical Web Applications: 4 Challenges
πŸ“‘
20 scary cybersecurity facts and figures for a haunting Halloween
πŸ“‘
Trend Micro Recognized as a Customer Favorite