68Articles
9Categories
2023-11-16Date
๐Ÿšจ
CISA Adds Three Known Exploited Vulnerabilities to CatalogCISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-36584 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability CVE-2023-1671 Sophos Web Appliance Command Injection Vโ€ฆ
KEV
๐Ÿ›
Leaving Authentication Credentials in Public Code
๐Ÿ›
Zero-Day Flaw in Zimbra Email Software Exploited by Four Hacker Groups
๐Ÿ›
Citrix Releases Security Updates for Citrix Hypervisor
๐Ÿ›
Chromium: CVE-2023-5997 Use after free in Garbage Collection
๐Ÿ›
Chromium: CVE-2023-6112 Use after free in Navigation
๐Ÿ›
CVE-2023-36026 Microsoft Edge (Chromium-based) Spoofing Vulnerability
๐Ÿ›
CVE-2023-36008 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
๐Ÿ›
ManageEngine Information Disclosure Flaw Exposes Encryption Keys
๐Ÿ›
CrushFTP - CVE-2023-43177 - Unauthenticated Root-Level RCE Chain
โš ๏ธ
Veterans play a crucial role in filling the cybersecurity skills gap
โš ๏ธ
3 Layers of App Security to Keep Hackers Out, Let Customers In - Aviad Mizrachi - PSW #807
โš ๏ธ
SSH Under Attack, IoT Routers, BLE Spam, & Patching a House of Cards - PSW #807
โš ๏ธ
Russian Hackers Launch 'Largest Ever Cyber Attack' on Danish Critical Infrastructure
โš ๏ธ
How US SEC legal actions put CISOs at risk and what to do about it
โš ๏ธ
Fortinet warns of critical command injection bug in FortiSIEM
โš ๏ธ
Experts Uncover DarkCasino: New Emerging APT Threat Exploiting WinRAR Flaw
โš ๏ธ
How to Automate the Hardest Parts of Employee Offboarding
โš ๏ธ
Hackers Could Exploit Google Workspace and Cloud Platform for Ransomware Attacks
โš ๏ธ
CISA Requests Comment on Draft Secure Software Development Attestation Form
โš ๏ธ
CISA Releases Fourteen Industrial Control Systems Advisories
โš ๏ธ
Beware! Hackers Can Now Exploit a Security Flaw in Zoom Client
โš ๏ธ
Palestine-aligned cyberespionage actor shifts infection chain tactics
โš ๏ธ
Top cybersecurity product news of the week
โš ๏ธ
Five Lessons Learned From Oktaโ€™s Customer Support System Breach - ESW #340
โš ๏ธ
Exploring the Intersection of Security for Edge Computing and Endpoint - Theresa Lanow... - ESW #340
๐Ÿ“ข
FBI shares tactics of notorious Scattered Spider hacker collective
๐Ÿ“ข
CISA and FBI Issue Warning About Rhysida Ransomware Double Extortion Attacks
๐Ÿ“ข
FBI and CISA Release Advisory on Scattered Spider Group
๐Ÿ“ข
BlackCat Ransomware's New SEC Reporting Tactic:ย Turn Regulations Against Victims
๐Ÿ“ข
Wireshark 4.2.0 Released: Whatโ€™s New!
๐Ÿ“ข
Administrator Of Darkode Hacking Forum Sentenced To Prison
๐Ÿ“ข
New security startups, Stamos and Krebs go to SentinelOne, NY takes cyber seriously - ESW #340
๐Ÿ”ฅ
Ransomware group breaches company, reports them to SEC for failure to disclose
๐Ÿ”ฅ
Long Beach, California turns off IT systems after cyberattack
๐Ÿ”ฅ
Toyota confirms breach after Medusa ransomware threatens to leak data
๐Ÿ”ฅ
Alleged Extortioner of Psychotherapy Patients Faces Trial
๐Ÿ”ฅ
Samsung Hacked: Customers Personal Information Exposed
๐Ÿ”ฅ
Samsung says hackers accessed customer data during year-long breach
๐Ÿ”ฅ
Clorox CISO Flushes Self After Expensive Cyberattack
๐Ÿ”ฅ
Royal Mail's Recovery From Ransomware Attack Will Cost Business At Least $12M
๐Ÿ”ฅ
Google Search Ads Abused To Spread Ransomware
๐Ÿ”ฅ
CrowdStrikeโ€™s new Falcon Go delivers AI security to SMBs
๐Ÿ”ฅ
Transatlantic Cable podcast, episode 324 | Kaspersky official blog
๐Ÿ”ฅ
Exploring the Intersection of Security & Endpoint | 5 Lessons From Oktaโ€™s CSS Breach| News - ESW340
๐Ÿ”ฅ
Exploring the Intersection of Security for Edge Computing & Endpoint โ€“ ESW #340
๐Ÿ•ต๏ธ
ISC Stormcast For Thursday, November 16th, 2023 https://isc.sans.edu/podcastdetail/8748, (Thu, Nov 16th)
๐Ÿ•ต๏ธ
TA402 Group using Weaponized XLL and RAR Files to Deliver Malware
๐Ÿ•ต๏ธ
FTCโ€™s Voice Cloning Challenge
๐Ÿ•ต๏ธ
How to Help "Frequent Clickers" Become More Mindful
๐Ÿ•ต๏ธ
Simply Cyber Con 2023 - 29 videos
๐Ÿ•ต๏ธ
Quantum and Post-Quantum Crypto. Lecture by Les Bell of mq.edu.au - 1 hour
๐Ÿ•ต๏ธ
News alert: Bridewell sees democratized cybercrime, regulatory lag, smart malware coming in 2024
๐ŸŒ
UK Webinar | Supply Chain Cipher: Decoding the Formula for Third-Party Risk Management
๐ŸŒ
MySQL servers targeted by 'Ddostf' DDoS-as-a-Service botnet
๐ŸŒ
How DDoS attacks are taking down even the largest tech companies
๐ŸŒ
Childrenโ€™s tablet has malware and exposes kidsโ€™ data, researcher finds
๐ŸŒ
WhatsApp spyware modifications in Telegram | Kaspersky official blog
๐ŸŽ™๏ธ
Smashing Security podcast #348: Hacking for chimp change, and AI chatbot birthday
๐Ÿ“ก
Applying โ€œSecure By Designโ€ Thinking to Events in the News
๐Ÿ“ก
A November rain of patches from Microsoft
๐Ÿ“ก
Microsoft confirms Copilot AI assistant coming to Windows 10
๐Ÿ“ก
Beyond -n: Optimizing tcpdump performance, (Thu, Nov 16th)
๐Ÿ“ก
Cybersecurity investor Ballistic Ventures seeks $300M for new fund
๐Ÿ“ก
FBI Director: FISA 702 Warrant Requirement A De Facto Ban
๐Ÿ“ก
Developers Can't Seem To Stop Exposing Credentials In Code
๐Ÿ“ก
Is your LinkedIn profile revealing too much?
๐Ÿ“ก
Is your LinkedIn profile revealing too much?