44Articles
8Categories
2023-12-09Date
πŸ›
ISMG Editors: Ugly Health Data Breach Trends in 2023
πŸ›
CVE-2023-45866: Unauthenticated Bluetooth keystroke-injection in Android, Linux, macOS and iOS
⚠️
Cyber threats to elections
⚠️
Researchers Automated Jailbreaking of LLMs With Other LLMs
⚠️
Hackers Hit Erris Water in Stance Over Israel
⚠️
SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs
⚠️
Researchers Unveal GuLoader Malware's Latest Anti-Analysis Techniques
⚠️
Maximizing Your Purchasing Power: A Source For ValidatedΒ  KnowBe4 Reviews
⚠️
WordPress POP Chain Flaw Exposes Over 800M+ Websites to Attack
πŸ“’
Microsoft Edge security advisory (AV23-749)
πŸ“’
Apache security advisory (AV23-748)
πŸ“’
[Control systems] Sierra Wireless security advisory (AV23-747)
πŸ“’
[Control systems] Schweitzer Engineering Laboratories security advisory (AV23-746)
πŸ“’
[Control systems] Mitsubishi Electric security advisory (AV23-745)
πŸ“’
[Control systems] Johnson Controls security advisory (AV23-744)
πŸ“’
[Control systems] ControlbyWeb security advisory (AV23-743)
πŸ“’
Atlassian security advisory (AV23-742)
πŸ“’
Google Chrome security advisory (AV23-741)
πŸ“’
Europe Reaches Deal on AI Act, Marking a Regulatory First
πŸ“’
Supporting CISA - The 'Focal Point of Our Defensive Efforts'
πŸ”₯
FBI to Evaluate Bids to Delay Reporting Cybersecurity Events
πŸ”₯
Central Virginia Transit System Affected by Cyber Incident
πŸ”₯
Russian Star Blizzard New Evasion Techniques to Hijack Email Accounts
πŸ”₯
Kaneva - 3,901,179 breached accounts
πŸ”₯
Gemplex - 4,563,166 breached accounts
πŸ”₯
Europe Reaches a Deal on the World’s First Comprehensive AI Rules
πŸ•΅οΈ
ISMG Editors: Call for Cooperation at Black Hat Europe 2023
πŸ•΅οΈ
OnDemand | Threat Actor Mapping: Finding the Achilles Heel in Sophisticated Attackers
🌐
CSE and the Cyber release Cyber Threats to Canada’s Democratic Process: 2023 Update
🌐
Cyber Threats to Canada’s Democratic Process: 2023 update
πŸŽ™οΈ
Israel-Hamas War: 'We All Know Someone That Lost Someone'
πŸ“‘
The case for memory safety roadmaps
πŸ“‘
Cyber security advice for political candidates
πŸ“‘
Campaign teams: Identify and handle malicious messages
πŸ“‘
Parliamentarians: Know how to manage an account compromise
πŸ“‘
Parliamentarians: Report social media account impersonation
πŸ“‘
Fact sheet for Canadian political campaigns: Protect yourself online
πŸ“‘
Fact sheet for Canadian voters: Online influence activities
πŸ“‘
On Demand | GenAI: Building a Cybersecurity Wall Before the Storm
πŸ“‘
How a CEO Runs a Company in Wartime
πŸ“‘
AutoSpill attack steals credentials from Android password managers
πŸ“‘
Bypassing Major EDRs Using Pool Party Process Injection Techniques
πŸ“‘
New 5G Modem Flaws Affect iOS Devices and Android Models from Major Brands
πŸ“‘
Android Barcode Scanner App Exposes User Passwords