75Articles
8Categories
2023-11-13Date
🚨
CISA Adds Six Known Exploited Vulnerabilities to CatalogCISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-47246 SysAid Server Path Traversal Vulnerability CVE-2023-36844 Juniper Junos OS EX Series PHP External Variable Modification Vulnerability C…
KEV
πŸ›
China, Ukraine, and Israel in the cyberwar spotlight as tensions rise
⚠️
Major Phishing-as-a-Service Syndicate 'BulletProofLink' Dismantled by Malaysian Authorities
⚠️
Deception technology use to grow in 2024 and proliferate in 2025
⚠️
8 reasons your cybersecurity training program sucks and how to fix it
KEV
⚠️
Yellen Says Ransomware Attack on China’s Biggest Bank Minimally Disrupted Treasury Market Trades
⚠️
Top 5 Marketing Tech SaaS Security Challenges
⚠️
New Ransomware Group Emerges with Hive's Source Code and Infrastructure
⚠️
ACSC and CISA Release Business Continuity in a Box
⚠️
Intel is Being Sued Over the β€˜Downfall’ CPU Vulnerability for $10K per Plaintiff
⚠️
One shot, Triple kill: Pwning all three Google kernelCTF instances with a single 1-day Linux vulnerability
⚠️
CISA warns of actively exploited Juniper pre-auth RCE exploit chain
KEV
⚠️
Embed security from code to cloud with unified CNAPPs
⚠️
Intel Sued Over Downfall CPU Vulnerability
⚠️
Denmark Hit With Largest Cyberattack on Record
πŸ“’
Empowering cybersecurity leadership: Strategies for effective Board engagement
πŸ“’
CISA Releases Update to Royal Ransomware Advisory
πŸ“’
FBI: Royal ransomware asked 350 victims to pay $275 million
πŸ“’
Cohesity taps Amazon for generative AI, cloud-based security
πŸ”₯
Major Australian ports shut down following cyber incident
πŸ”₯
New BiBi-Windows Wiper Targets Windows Systems in Pro-Hamas Attacks
πŸ”₯
Personal Information Impacted in Breach of Computer Network, Butler County Says
πŸ”₯
Cyber Security Today, Nov. 13, 2023 - Booking.com attack may be widespread, ransomware operator calls it quits, and more
πŸ”₯
Personal Information Impacted in Breach of Computer Network, Butler County Says
πŸ”₯
Mr. Cooper Says Customer Data Compromised in Cyberattack
πŸ”₯
Operations at Major Australian Ports Significantly Disrupted by Cyberattack
πŸ”₯
Ransomware Group Leaks Files Allegedly Stolen From Boeing
πŸ”₯
2.2 Million Impacted by Data Breach at McLaren Health Care
πŸ”₯
Update: Lockbit Ransomware Leaks Gigabytes of Boeing Data
πŸ”₯
Chess.com Faces Second Data Leak; 476,000 Scraped User Records Leaked
πŸ”₯
Ransomware Group RansomedVC Closes Shop
πŸ”₯
Lorenz Ransomware Gang Hit Texas-Based Cogdell Memorial Hospital
πŸ”₯
Dragos Says No Evidence of Breach After Ransomware Gang Claims Hack via Third Party
πŸ”₯
Healthcare giant McLaren reveals data on 2.2 million patients stolen during ransomware attack
πŸ”₯
Australian Ports Recover From Cyber Incident
πŸ”₯
DP World cyberattack blocks thousands of containers in ports
πŸ”₯
Joe Sullivan on What CISOs Need to Know About the Uber Trial
πŸ”₯
Inside Denmark's Hell Week As Critical Infrastructure Orgs Faced Cyberattacks
πŸ”₯
LockBit Takes Credit For Ransomware Attack On US Subsidiary Of Chinese Bank
πŸ”₯
Ransomware Group RansomedVC Closes Shop
πŸ”₯
Major Australian Ports Significantly Disrupted By Cyberattack
πŸ”₯
Info Stealers Thrive in Hot Market for Stolen Data
πŸ”₯
McLaren Health Care Hack Affected Millions; Lawsuits Pile Up
πŸ•΅οΈ
ISC Stormcast For Monday, November 13th, 2023 https://isc.sans.edu/podcastdetail/8742, (Mon, Nov 13th)
πŸ•΅οΈ
10 Best Unified Endpoint Management Tools – 2024
πŸ•΅οΈ
Imperial Kitten Attacking Tech Firms with SQLi & Scanning Tools
πŸ•΅οΈ
Chinese Hackers Launch Covert Espionage Attacks on 24 Cambodian Organizations
πŸ•΅οΈ
MY TAKE: New tech standards, like β€˜Matter’ and β€˜BIMI,’ point the way to secure interoperability
πŸ•΅οΈ
Authorities Took Down Massive Phishing-as-a-service Provider BulletProftLink
πŸ•΅οΈ
Signature Techniques of Asian APT Groups Revealed
πŸ•΅οΈ
Modern Security Podcast: John Steven and Security as Engineering Accelerant -95 minutes
πŸ•΅οΈ
North Korea-Linked APT Sapphire Sleet Targets IT Job Seekers
πŸ•΅οΈ
XSIAM 2.0: Continuing to Drive SOC Transformation
πŸ•΅οΈ
Criminal IP & Cisco SecureX/XDR: Enhanced Cyber Threat Analysis
πŸ•΅οΈ
Say Easy, Do Hard - Cyber Risk Management, Part 2 - BSW #328
πŸ•΅οΈ
Say Easy, Do Hard - Cyber Risk Management - BSW #328
πŸ•΅οΈ
Say Easy, Do Hard – Cyber Risk Management - Padraic O'Reilly and Robert Fitzgerald – BSW #328
πŸ•΅οΈ
Say Easy, Do Hard - Cyber Risk Management, Part 1 - BSW #328
πŸ•΅οΈ
Mentorship Monday - Discussions for career and learning!
πŸ•΅οΈ
Cybertruck | Solarwinds | Bitcoin | Docker | Ducktail | Experian | Jason Wood & More! – SWN342
πŸ•΅οΈ
Capture The Flag: 5 websites to sharpen your hacking skills
πŸ•΅οΈ
2FA _ Your Secret Weapon for Digital Defense
πŸ•΅οΈ
Defending Against Supply Chain Attacks - BTS #18
πŸ•΅οΈ
3 Layers of App Security to Keep Hackers Out, Let Customers In | News - PSW807
🌐
CherryBlos Malware Steals Cryptocurrency via Your Photos
🌐
Ten Ways AI Will Change Democracy
🌐
Israel warns of BiBi wiper attacks targeting Linux and Windows
πŸ“‘
Major Phishing-as-a-Service Syndicate 'BulletProofLink' Dismantled by Malaysian Authorities
πŸ“‘
Kaspersky multi-layered protection for your online finances | Kaspersky official blog
πŸ“‘
In a first, cryptographic keys protecting SSH connections stolen in new attack
πŸ“‘
More Than $100 Million Stolen From Poloniex Crypto Platform
πŸ“‘
Expansion of the Secure Tomorrow Series Toolkit Now Available
πŸ“‘
Ethereum feature abused to steal $60 million from 99K victims
πŸ“‘
In A First, Cryptographic Keys Protecting SSH Connections Stolen In New Attack
πŸ“‘
DDoS Attack On ChatGPT Sparks Concerns Over Coding, Productivity Disruptions