98Articles
8Categories
2023-12-11Date
🚨
CISA Adds Qlik Bugs to Exploited Vulnerabilities CatalogBoth bugs were found this summer in Qlik Sense — a data analytics tool used widely among government organizations and large businesses. The vulnerabilities provide hackers with an entry point into systems and allow them to elevate their privileges.
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-6448 Unitronics Vision PLC and HMI Insecure Default Password These types of vulnerabilities are frequent attack vectors for malicious cyber act…
KEV
🚨
#StopRansomware: Play RansomwareSUMMARY Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically …
KEV
🐛
Apache Fixed Critical RCE Flaw CVE-2023-50164 in Struts 2
🐛
Lazarus hackers drop new RAT malware using 2-year-old Log4j bug
⚠️
New PoolParty Process Injection Techniques Outsmart Top EDR Solutions
⚠️
Researchers Uncovered an Active Directory DNS spoofing exploit
⚠️
Mobile Password Managers Might Be Exposing Credentials Due to New ‘Autospill’ Vulnerability
⚠️
Accenture takes an industrialized approach to safeguarding its cloud controls
⚠️
ALPHV Ransomware Site Outage Rumored to be Caused by Law Enforcement
⚠️
Over 50% of the Insider Attacks Uses Privilege Escalation Vulnerability
⚠️
Log4j Vulnerability Still Haunts the Security Community
⚠️
Law Enforcement Reportedly Behind Takedown of BlackCat/Alphv Ransomware Website
⚠️
Water system attacks spark calls for cybersecurity regulation
KEV
⚠️
Researcher Discovered a New Lock Screen Bypass Bug for Android 14 and 13
⚠️
Apache Patches Critical RCE Vulnerability in Struts 2
⚠️
Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans
⚠️
How to hack Android, macOS, iOS, and Linux through a Bluetooth vulnerability | Kaspersky official blog
⚠️
CISA and ENISA Signed a Working Arrangement to Enhance Cooperation
⚠️
Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans
⚠️
Report: Privilege Elevation Exploits Used in Over 50% Of Insider Attacks
⚠️
Google Patches Chromecast Vulnerabilities Exploited at Hacking Contest
⚠️
Google Patches Chromecast Vulnerabilities Exploited At Hacking Contest
⚠️
BlackCat/Alphv Ransomware Website Taken Down By Law Enforcement
⚠️
Ransomware Group Offline: Have Police Seized Alphv/BlackCat?
⚠️
The The Impact of the New SEC Regulations on Cybersecurity with Nick Essner – BSW #331
⚠️
Apple emergency updates fix recent zero-days on older iPhones
KEV
⚠️
Open-Source Oversight: Security Gaps in IoT and OT Devices
⚠️
Apple Patches Everything, (Mon, Dec 11th)
⚠️
‘5Ghoul’ Vulnerabilities Haunt Qualcomm, MediaTek 5G Modems
⚠️
23andMe changes to terms of service are ‘cynical’ and ‘self-serving,’ lawyers say
⚠️
A Vulnerability in Apache Struts 2 Could Allow for Remote Code Execution
⚠️
50K WordPress sites exposed to RCE attacks by critical bug in backup plugin
⚠️
Europe Prepares for AI Act Enforcement
📢
How the White House sees the future of safeguarding AI
📢
The Impact of the New SEC Regulations on Cybersecurity | Leadership & Communications - BSW #331
📢
Ubuntu security advisory (AV23-750)
📢
IBM security advisory (AV23-751)
📢
Apple security advisory (AV23-753)
📢
Dell security advisory (AV23-752)
🔥
GUEST ESSAY: Adopting an ‘assume-breach mindset’ to defend company networks in 2024
🔥
Akira Ransomware Strikes Again: Compass Group Italia and Aqualectra Utility Hit by Data Breach
🔥
North Korea's Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks
🔥
Analyzing AsyncRAT's Code Injection into aspnet_compiler.exe Across Multiple Incident Response Cases
🔥
Data Breaches Fallout Reach New Heights as the Number of Exposed Records Soars
🔥
Cyber Security Today, Dec. 11, 2023 - Irish water treatment plant shut by cyber attack, WordPress issues a security patch, and more
🔥
Webinar — Psychology of Social Engineering: Decoding the Mind of a Cyber Attacker
🔥
FBI Explains How Companies can Delay SEC Cyber Incident Disclosures
🔥
Top White House Cyber Aide Says Recent Iran Hack on Water System Is Call to Tighten Cybersecurity
🔥
WSJ: "A Hidden Risk in the Municipal Bond Market: Hackers"
🔥
US healthcare giant Norton says hackers stole millions of patients’ data during ransomware attack
🔥
Kelvin Security hacking group leader arrested in Spain
🔥
Norton Healthcare Ransomware Hack: 2.5 Million Personal Records Stolen
🔥
Australia: University of Wollongong Confirms Data Breach, Notifies Authorities
🔥
Cold storage giant Americold discloses data breach after April malware attack
🔥
Toyota warns customers of data breach exposing personal, financial info
🔥
Kentucky Hospital Chain Notifying 2.5 Million of Data Theft
🔥
New Microsoft Incident Response team guide shares best practices for security teams and leaders
🕵️
ISC Stormcast For Monday, December 11th, 2023 https://isc.sans.edu/podcastdetail/8772, (Mon, Dec 11th)
🕵️
How Smart Cars Are Spying You? Most important Privacy Concerns 2024
🕵️
Crypto Exchange Founder Pleads Guilty for Dark Web Transfer
🕵️
2024 IT Spending Surge: Surprising Insights from Piper Sandler's CIO Survey
🕵️
Facebook Enables Messenger End-to-End Encryption by Default
🕵️
Hackers Spy iPhone Users Using Malicious Keyboard Apps
🕵️
MrAnon Stealer Attacking Windows Users Via Weaponized PDF Files
🕵️
Outside the Comfort Zone: Why a Change in Mindset is Crucial for Better Network Security
🕵️
Flaws in Delta OT Monitoring Product Can Allow Hackers to Hide Destructive Activities
🕵️
Q* | Unitronics | SLAM | Bluetooth | Cold Fusion | Google Drive | Aaran Leyland & More! – SWN347
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
Researchers Unmask Sandman APT's Hidden Link to China-Based KEYPLUG Backdoor
🕵️
Hackers Trick Users With Data Leak Message to Deploy Malware
🕵️
North Korean Hackers Developing Malware in Dlang Programming Language
🕵️
North Korean Hackers Are Developing Malware In Dlang
🕵️
Russian Hackers Indicted for Phishing Attacks Against U.S. and Allies
🕵️
Deepfakes: The New Face of Fraud
🕵️
Researchers Unmask Sandman APT's Hidden Link to China-Based KEYPLUG Backdoor
🕵️
BlackBerry Cancels IPO, Separates Cybersec and IoT Units
🕵️
Payments Fraud: What to Expect in 2024
🕵️
Apple Ships iOS 17.2 With Urgent Security Patches
🕵️
Spain Arrests Alleged Kelvin Security Money Laundering Head
🕵️
UK Sanctions 9 Asians for Crypto Scams, Human Trafficking
🕵️
Cybertrucks | Viagra | Struts | Atlassian | Log4Shell | Pharmacies | Jason Wood & More! – SWN348
🕵️
Embracing AI | News - PSW810
🌐
Researchers Unveil GuLoader Malware's Latest Anti-Analysis Techniques
🌐
Playbook: Your First 100 Days as a vCISO - 5 Steps to Success
🌐
GULOADER Adds New Anti-Analysis Tactic to Arsenal
📡
HHS Announces Next Steps in Ongoing Work to Enhance Cybersecurity for Health Care and Public Health Sectors
📡
SpyLoan Scandal: 18 Malicious Loan Apps Defraud Millions of Android Users
📡
Love for Sports Could Lead to Poor Password Practices
📡
Aim for a Modern Data Security Approach
📡
UK Sanctions Nine Linked to Cyber Trafficking in Southeast Asia
📡
What is sitemap.xml, and Why a Pentester Should Care, (Mon, Dec 11th)
📡
Two Years On, 1 In 4 Apps Still Vulnerable To Log4Shell
📡
Opal Security, Which Helps Companies Manage Access and Identities, Raises $22M
📡
Kelvin Security Hacking Group Leader Arrested in Spain
📡
Counter-Strike 2 HTML injection bug exposes players’ IP addresses
📡
Black Hat Europe 2023: Should we regulate AI?
📡
Silent but deadly: The rise of zero-click attacks