92Articles
8Categories
2023-12-04Date
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-42917 Apple Multiple Products WebKit Memory Corruption Vulnerability CVE-2023-42916 Apple Multiple Products WebKit Out-of-Bounds Read Vulnera…
KEV
🚨
Threat Actors Exploit Adobe ColdFusion CVE-2023-26360 for Initial Access to Government ServersSUMMARY The Cybersecurity and Infrastructure Security Agency (CISA) is releasing a Cybersecurity Advisory (CSA) in response to confirmed exploitation of CVE-2023-26360 by unidentified threat actors at a Federal Civilian Executive Branch (FCEB) agency. This vulnerability presents …
KEV
πŸ›
PSA: Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
πŸ›
New BLUFFS Bluetooth Attack Expose Devices to Adversary-in-the-Middle Attacks
πŸ›
Fake WordPress security advisory pushes backdoor plugin
πŸ›
Russian hackers exploiting Outlook bug to hijack Exchange accounts
πŸ›
P2Pinfect Redis worm targets IoT with version for MIPS devices
⚠️
Over 20,000 Vulnerable Microsoft Exchange Servers Exposed to Attacks
⚠️
GUEST ESSAY: Taking proactive steps to heal the planet β€” by reducing the impact of video streaming
⚠️
A Decade of Have I Been Pwned
⚠️
US Health Department Urges Hospitals to Patch Critical Citrix Bleed Bug
KEV
⚠️
4 budget-savvy strategies for building an effective purple team
⚠️
Cyber Security Today, Dec. 4, 2023 - A warning to water treatment utilities, a boot vulnerability could affect millions of PCs, and more
⚠️
Update: New Relic Admits Attack on Staging Systems, User Accounts
⚠️
Hackers book profit by scamming Booking.com customers
⚠️
ArmorCode raises $40M to consolidate security data in one place
⚠️
Guarding Against the Rise of QR Code Phishing Attacks: How to Protect Yourself and Your Organization
⚠️
Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100
⚠️
President Biden signs Executive Order 14111
⚠️
Zarya Hacktivists: More than just Sharepoint., (Mon, Dec 4th)
⚠️
Previewing Black Hat Europe 2023 in London: 16 Hot Sessions
⚠️
December Android updates fix critical zero-click RCE flaw
⚠️
Democrat Blocks Biden's NSA Nominee Over Data Controversy
⚠️
Russian GRU Hackers Target Polish Outlook Inboxes
πŸ“’
Proactive, not reactive: the path to ensuring operational resilience in cybersecurity
πŸ“’
Cyber Resilience Act agreement reached as EU legislation edges closer
πŸ“’
Sexual Harassment Prevention Training from…KnowBe4?
πŸ“’
Dell security advisory (AV23-735)
πŸ“’
IBM security advisory (AV23-736)
πŸ“’
Ubuntu security advisory (AV23-737)
πŸ“’
Android security advisory – December 2023 Monthly Rollup (AV23-738)
πŸ“’
US CISA: Secure Israeli-Made Technology From Iranian Hackers
πŸ”₯
Microsoft Warns of Malvertising Scheme Spreading CACTUS Ransomware
πŸ”₯
DJvu ransomware Latest Variant Xaro Emerges in the Threat Landscape
πŸ”₯
TrickBot Developer Pleads Guilty in US Court
πŸ”₯
Linux Version of Qilin Ransomware Focuses on VMware ESXi
πŸ”₯
The European Space Agency Explores Cybersecurity for Space Industry
πŸ”₯
Rhysida ransomware gang threatens to leak royal family medical data
πŸ”₯
Depauw University Warns of Data Breach as Ransomware Attacks on Colleges Surge
πŸ”₯
BlackCat Ransomware Strikes Ho Chi Minh City Power Corporation
πŸ”₯
New AeroBlade Hackers Target Aerospace Sector in the U.S.
πŸ”₯
Supply-chain ransomware attack causes outages at over 60 credit unions
πŸ”₯
Tipalti investigates claims of data stolen by ransomware gang
πŸ”₯
Tipalti investigates claims of data stolen in ransomware attack
πŸ”₯
advice needed
πŸ”₯
Protecting credentials against social engineering: Cyberattack Series
πŸ•΅οΈ
ISC Stormcast For Monday, December 4th, 2023 https://isc.sans.edu/podcastdetail/8762, (Mon, Dec 4th)
πŸ•΅οΈ
LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks
πŸ•΅οΈ
DDoS attack-for-hire services thriving on Dark Web and cyber criminal forums
πŸ•΅οΈ
New Proxy Malware Targets Mac Users Through Pirated Software
πŸ•΅οΈ
ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government
πŸ•΅οΈ
New Relic Says Hackers Accessed Internal Environment Using Stolen Credentials
πŸ•΅οΈ
Combatting Rogue URL Tricks: Quickly Identify and Investigate the Latest Phishing Attacks
πŸ•΅οΈ
Mentorship Monday - Discussions for career and learning!
πŸ•΅οΈ
Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry
πŸ•΅οΈ
New AeroBlade hackers target aerospace sector in the U.S.
πŸ•΅οΈ
Russian Pleads Guilty to Role in Developing TrickBot Malware
πŸ•΅οΈ
North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report
πŸ•΅οΈ
Phishing Kits Undergo an Evolution in Feature Set, Demand, and Branding
πŸ•΅οΈ
All Quiet On The Western Front: Your First 100 Days As A CISO - Jim Djoka - Bsides Tirana 2023
πŸ•΅οΈ
BSides Tirana 2023 - 11 talks
πŸ•΅οΈ
Top Guns: Defending Corporate Clouds from Malicious Mavericks
πŸ•΅οΈ
Live Webinar | Threat Actor Mapping: Finding the Achilles Heel in Sophisticated Attackers
πŸ•΅οΈ
LogoFAIL Bootup Flaw Puts Hundreds of Devices at Risk
πŸ•΅οΈ
Real Edge Computing Use Cases | Leadership & Communications - BSW #330
πŸ•΅οΈ
Real Edge Computing Use Cases from the AT&T Cybersecurity Insights Report - Theresa La... - BSW #330
πŸ•΅οΈ
Uber CISO Speaks Out as CISOs Draft Letters to the CEO, CMO, and CCO - BSW #330
πŸ•΅οΈ
Steve Katz, World's First CISO, Dies in Hospice Care
πŸ•΅οΈ
Surprise Cam Nudes | Staples | Turtle | Apple | 23andme | P2Pinfect | Jason Wood & More! – SWN346
🌐
Account Takeover Attacks Use ScrubCrypt to Deploy RedLine Stealer Malware
🌐
New P2PInfect Botnet MIPS Variant Targeting Routers and IoT Devices
🌐
AI and Trust
🌐
The Rising Complexities of Software Supply Chain: A Proactive Approach to Security
🌐
New Variant of P2Pinfect Targets MIPS Devices Including Routers and IoT Devices
🌐
NCCoE 5G Cybersecurity: Connecting the Dots Between IT and Teleco Cybersecurity Capabilities in 5G Systems
🌐
Stealthier version of P2Pinfect malware targets MIPS devices
πŸ“‘
US Man Jailed Eight Years for SIM Swapping and Apple Support Impersonation
πŸ“‘
The Current State of Open RAN Security
πŸ“‘
Sophos DNS Protection – Join the EAP
πŸ“‘
Bridging the Gap Between Cloud vs On-Premise Security
πŸ“‘
Astrology Website WeMystic Exposes Over 13 Million User Records
πŸ“‘
Make a Fresh Start for 2024: Clean Out Your User Inventory to Reduce SaaS Risk
πŸ“‘
Amazon, Google and Microsoft sign β€œworld first” agreement with UK government to...
πŸ“‘
SugarGh0st RAT Use Targets South Korea And Uzbekistan
πŸ“‘
EU Lawmakers Finalize Cyber Security Rules That Panicked Devs
πŸ“‘
New Relic Says Hackers Accessed Internal Environment Using Stolen Credentials
πŸ“‘
UEFI Flaws Allow Bootkits To Pwn Devices Using Images
πŸ“‘
More Than 1,500 Hugging Face API Tokens Exposed, Major Projects Vulnerable
πŸ“‘
Establishing New Rules for Cyber Warfare
πŸ“‘
23andMe confirms hackers stole ancestry data on 6.9 million users
πŸ“‘
Microsoft fixes Outlook Desktop crashes when sending emails
πŸ“‘
Windows 11 KB5032288 update improves Copilot, fixes 11 bugs