71Articles
10Categories
2023-12-07Date
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-41265 Qlik Sense HTTP Tunneling Vulnerability CVE-2023-41266 Qlik Sense Path Traversal Vulnerability These types of vulnerabilities are frequ…
KEV
πŸ›
New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices
πŸ›
Chromium: CVE-2023-6508 Use after free in Media Stream
πŸ›
Chromium: CVE-2023-6509 Use after free in Side Panel Search
πŸ›
Chromium: CVE-2023-6510 Use after free in Media Capture
πŸ›
Chromium: CVE-2023-6511 Inappropriate implementation in Autofill
πŸ›
Chromium: CVE-2023-6512 Inappropriate implementation in Web Browser UI
πŸ›
CVE-2023-35618 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
πŸ›
CVE-2023-38174 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
πŸ›
CVE-2023-36880 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
πŸ›
CVE-2021-43890 Windows AppX Installer Spoofing Vulnerability
πŸ›
Atlassian Patches RCE Flaw that Affected Multiple Products
πŸ›
Threat Thursday - CTI, vulnerabilities & discussions
πŸ›
Cueing up a calculator: an introduction to exploit development on Linux
πŸ›
Federal agency breached through Adobe ColdFusion vulnerability
KEV
πŸ›
Researchers discover dozens of new bugs affecting Sierra Wireless routers
KEV
πŸ›
Remote code execution vulnerabilities found in Buildroot, Foxit PDF Reader
⚠️
Russian military hackers target NATO fast reaction corps
⚠️
WordPress fixes POP chain exposing websites to RCE attacks
⚠️
Hacking the Human Mind: Exploiting Vulnerabilities in the 'First Line of Cyber Defense'
⚠️
CISA and International Partners Release Advisory on Russia-based Threat Actor Group, Star Blizzard
⚠️
CISA Releases Five Industrial Control Systems Advisories
⚠️
Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices
⚠️
SLAM Attack Gets Root Password Hash in 30 Seconds
⚠️
Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access
⚠️
Lessons from 10 years running the first cyber-exclusive investment firm – Bob Ackerman – ESW #342
⚠️
North Korean hackers stole anti-aircraft system data from South Korean firm
πŸ“‹
Meta Launches Default End-to-End Encryption for Chats and Calls on Messenger
πŸ“’
CISA Issues Warning for Russian β€˜Star Blizzard’ APT Spear-Phishing Operation
πŸ“’
The UK-US Blog Series on Privacy-Preserving Federated Learning: Introduction
πŸ”₯
Sophos Endpoint: Industry-leading protection against remote ransomware attacks
πŸ”₯
23andMe updates user agreement to prevent data breach lawsuits
πŸ”₯
Apple says it is not aware anyone using Lockdown Mode got hacked
πŸ”₯
BlackSuit ransomware – what you need to know
πŸ”₯
See me talking about β€œFuture-proofing enterprise cybersecurity for AI, vulnerabilities, and business risks”
πŸ”₯
Nissan Restoring Systems After Cyberattack
πŸ”₯
Integrated DFIR Tool Can Simplify and Accelerate Cyber Forensics
πŸ”₯
JoyGames - 4,461,787 breached accounts
πŸ•΅οΈ
Spying through Push Notifications
πŸ•΅οΈ
Microsoft Warns of COLDRIVER's Evolving Evasion and Credential-Stealing Tactics
πŸ•΅οΈ
Building a Robust Threat Intelligence with Wazuh
πŸ•΅οΈ
New Stealthy 'Krasue' Linux Trojan Targeting Telecom Firms in Thailand
πŸ•΅οΈ
ISC Stormcast For Thursday, December 7th, 2023 https://isc.sans.edu/podcastdetail/8768, (Thu, Dec 7th)
πŸ•΅οΈ
Revealing the Hidden Risks of QR Codes [Guest Diary], (Wed, Dec 6th)
πŸ•΅οΈ
New Microsoft Purview features use AI to help secure and govern all your data
πŸ•΅οΈ
Star Blizzard increases sophistication and evasion in ongoing attacks
πŸ•΅οΈ
Phishing-Resistant MFA Will Not Stop Phishing Attacks
πŸ•΅οΈ
Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System
πŸ•΅οΈ
Hackers Deliver AsyncRAT Through Weaponized WSF Script Files
πŸ•΅οΈ
US indicts alleged Russian hackers for years-long cyber espionage campaign against Western countries
πŸ•΅οΈ
News alert: Reflectiz adds AI-powered capabilities to its Smart Alerting web threat management system
πŸ•΅οΈ
Master Cloud Computing Risks with a Proactive, End-to-End Approach
πŸ•΅οΈ
Pwnagotchi display not working
πŸ•΅οΈ
Ohio Information Security Forum Conference 2023 - 7 talks
πŸ•΅οΈ
Web API testing techniques & labs
🌐
Software supply chain security a β€œgreater concern” than generative AI
🌐
Opal Security, which helps companies manage access and identities, raises $22M
🌐
2023 Review: Reflecting on Cybersecurity Trends
🌐
2023 Review: Reflecting on Cybersecurity Trends
πŸŽ™οΈ
Smashing Security podcast #351: Nuclear cybersecurity, Marketplace scams, and face up to porn
πŸ“‘
Windows 11 Notepad gets a built-in character counter, finally
πŸ“‘
BEC attacks on law firms spike as cyber criminals bypass MFA
πŸ“‘
Cyber criminals attack businesses in Adobe-themed phishing surge
πŸ“‘
Governments May Spy on You by Requesting Push Notifications from Apple and Google
πŸ“‘
WhatsApp adds support for disappearing voice messages
πŸ“‘
Meta finally starts rolling out default end-to-end encryption for Messenger
πŸ“‘
Finally! Facebook and Messenger are getting default end-to-end encryption. And not everyone is happy…
πŸ“‘
Just About Every Windows And Linux Device Vulnerable To New LogoFAIL Firmware Attack
πŸ“‘
Future CPUs Vulnerable To New SLAM Attack
πŸ“‘
Meta Begins Rolling Out End-To-End Encryption
πŸ“‘
To tap or not to tap: Are NFC payments safer?