98Articles
7Categories
2023-11-28Date
🐛
Pro Russian Attackers Scanning for Sharepoint Servers to Exploit CVE-2023-29357, (Tue, Nov 28th)
🐛
Hackers start exploiting critical ownCloud flaw, patch now
🐛
Critical Vulnerability Found in Ray AI Framework
🐛
Vulnerability CVE-2023-49103 impacting ownCloud file sharing application
⚠️
How a digital design firm navigated its SOC 2 audit
⚠️
Police dismantle ransomware group behind attacks in 71 countries
⚠️
Ardent Hospitals Diverting Patients Following Ransomware Attack
⚠️
Stop Identity Attacks: Discover the Key to Early Threat Detection
⚠️
Hackers Can Exploit 'Forced Authentication' to Steal Windows NTLM Tokens
⚠️
How Hackers Phish for Your Users' Credentials and Sell Them
⚠️
Key Cybercriminals Behind Notorious Ransomware Families Arrested in Ukraine
⚠️
Abusing Microsoft Access "Linked Table" Feature to Perform NTLM Forced Authentication Attacks
⚠️
North Korean hackers mix code from proven malware campaigns to avoid detection
⚠️
Design Flaw in Google Workspace Could Let Attackers Gain Unauthorized Access
⚠️
Critical Vulnerability Found in Ray AI Framework
⚠️
Chinese Hackers Stolen Chip Designs from Major Dutch Semiconductor Company
⚠️
Hackers Behind High-Profile Ransomware Attacks on 71 Countries Arrested
⚠️
Critical Vulnerability Found In Ray AI Framework
⚠️
Europol arrest hackers allegedly behind string of ransomware attacks
⚠️
Exploitation of Critical ownCloud Vulnerability Begins
⚠️
Palo Alto Networks Advises U.S. Government on AI and Cybersecurity
⚠️
DeleFriend: Severe Design Flaw in Domain-Wide Delegation Could Leave Google Workspace Vulnerable to Takeover
⚠️
CISA Releases Four Industrial Control Systems Advisories
⚠️
Design Flaw in Domain-Wide Delegation Could Leave Google Workspace Vulnerable to Takeover – Hunters
⚠️
News alert: Hunters’ Team Axon discloses severe privilege escalation flaw in Google Workspace
⚠️
Mapping Access - and Attack - Paths in Active Directory
⚠️
Fuzzer-V: New project for Fuzzing Hyper-V VSP's using Intel Processor Trace (IPT) for code coverage guided fuzzing, built upon WinAFL, winipt, HAFL1, and Microsoft’s IPT.sys.
⚠️
Critics of Serbia’s government targeted with ‘military-grade spyware’
⚠️
GoTitan Botnet - Ongoing Exploitation on Apache ActiveMQ
⚠️
Starting with Appsec -- Is It More of a Position or a Process? - ASW #264
⚠️
Google Chrome emergency update fixes 5th zero-day exploited in 2023
⚠️
Google Chrome emergency update fixes 6th zero-day exploited in 2023
⚠️
Thanksgiving Day Attack on Ardent Health Serving Leftovers
⚠️
Generative AI Technology Leads AWS Agenda at re:Invent 2023
⚠️
Exploitation of Unitronics PLCs used in Water and Wastewater Systems
⚠️
Forrester names Microsoft Intune a Leader in the 2023 Forrester Wave™ for Unified Endpoint Management
⚠️
News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance
📢
Transform Your Data Security Posture – Learn from SoFi's DSPM Success
📢
ownCloud security advisory (AV23-721)
📢
Amazon’s AWS Control Tower aims to help secure your data’s borders
📢
Iranian Hacking Group Attacks Pennsylvania Water Authority
🔥
What a Failed Attack Against ColdFusion Revealed About Ransomware Tools and Tactics
🔥
Police Bust Suspected Ransomware Group Ringleader in Ukraine
🔥
Slovenia's Largest Power Provider HSE Hit by Ransomware Attack
🔥
Ransomware Hackers Wreaking Havoc Arrested In Ukraine
🔥
Ethyrial: Echoes of Yore hacked! 17,000 game accounts "lost"
🔥
Police Dismantle Major Ukrainian Ransomware Operation
🔥
ID Theft Service Resold Access to USInfoSearch Data
🔥
Hospital Chain Hit With Ransomware Attack
🔥
DP World confirms data stolen in cyberattack, no ransomware used
🔥
Hackers Spent Over Two Years Stealing Secrets of Chipmaker NXP
🔥
Healthcare Giant Henry Schein Hit Twice by BlackCat
🔥
Qilin ransomware claims attack on automotive giant Yanfeng
🔥
DP World Says Australian Employee Data Stolen in Attack
🔥
LockBit claims cyberattack on India’s national aerospace lab
🔥
Apparent GE Hack Raises National Security Concerns
🕵️
ISC Stormcast For Tuesday, November 28th, 2023 https://isc.sans.edu/podcastdetail/8754, (Tue, Nov 28th)
🕵️
N. Korean Hackers 'Mixing' macOS Malware Tactics to Evade Detection
🕵️
Large Language Models and The End of Programming - CS50 Tech Talk with Dr. Matt Welsh - 1 hour
🕵️
Google Drive Users Files Suddenly Disappeared, Tech Gaint Investigating
🕵️
Cybercriminals can’t agree on GPTs
🕵️
Broadcom Completes the $61 Billion Acquisition of VMware
🕵️
My Top 7 Cybersecurity Reflections for 2024
🕵️
Engineering your GRC program w/ Charles Nwatu from Netflix | S1E2 - 51 minutes
🕵️
Unified endpoint management for purpose-based devices
🕵️
Los Angeles SIM Swapper Sentenced to 8 Years in Prison
🕵️
Amazon One Enterprise Enables Palm-Based Access to Physical Locations, Digital Assets
🕵️
CyberheistNews Vol 13 #48 Bloomberg Crypto Channel Hack Exposes Discord Users to Phishing Attacks
🕵️
Do You Really Want to Be a CISO? - Spencer Mott - CSP #150
🕵️
Chimera, Aliquippa, FNF, Lazarus, DARPA, Namedrop, Google, Aaran Leyland, and More – SWN #344
🕵️
The Final Training Tuesday - Discussions for certs, training and learning-at-home
🕵️
Users Fall for Smishing Attacks 6-10 Times More Than Email-Based Attacks
🕵️
Who Knew Neanderthals were so High-Tech?
🕵️
Proofpoint Snags Former VMware President Sumit Dhawan as CEO
🕵️
Chimera, Aliquippa, FNF, Lazarus, DARPA, Namedrop, Google, Aaran Leyland, and More - SWN #344
🕵️
Randstorm, Nothing Chats, Platform Engineering, PyPI Security Audit - ASW #264
🕵️
Digital Car Keys Are Coming
🕵️
Second Front Raises $40M to Support More Classified Networks
🕵️
CrowdStrike SIEM Demand Rises Amid Cisco-Splunk, Legacy Woes
🌐
Securing the software supply chain webinar
🌐
RisePro Malware Analysis: New Version's C2 Communication
🌐
SMBs Face Surge in "Malware Free" Attacks
🌐
DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads
🌐
Critics Of Serbia's Government Targeted With Military-Grade Spyware
🌐
IMPERIAL KITTEN Deploys Novel Malware Families
📡
'Serial Cybercriminal and Scammer' Jailed for 8 Years
📡
AWS brings Amazon One palm-scanning authentication to the enterprise
📡
How Hackers Phish for Your Users' Credentials and Sell Them
📡
4 Key Takeaways From New Global AI Security Guidelines
📡
Los Angeles SIM Swapper Sentenced To 8 Years In Prison
📡
Hackers Spent 2+ Years Looting Secrets Of Chipmaker NXP Before Being Detected
📡
iOS 17 NameDrop privacy scare: What you need to know
📡
Update: Daixin Team Claimed the Hack of North Texas Municipal Water District
📡
Unlocking Tomorrow’s Cybersecurity: A Sneak Peek into ReadySetCyber
📡
Microsoft shares temp fix for Outlook crashes when sending emails
📡
How to protect corporate routers and firewalls against hacking | Kaspersky official blog
📡
New BLUFFS attack lets attackers hijack Bluetooth connections
📡
Retail at risk: Top threats facing retailers this holiday season