63Articles
7Categories
2024-01-02Date
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-7024 Google Chromium WebRTC Heap Buffer Overflow Vulnerability CVE-2023-7101 Spreadsheet::ParseExcel Remote Code Execution Vulnerability Thes…
KEV
⚠️
650,000+ Malicious Domains Registered Resembling ChatGPT
⚠️
Essential skills for today’s threat analysts
⚠️
141: The Pig Butcher
⚠️
Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privilege Escalation Exploit Chain
⚠️
10 Most Common Types of Cyber Attacks in 2023
⚠️
Hospitals Ask Courts to Force Cloud Storage Firm to Return Stolen Data
⚠️
Google Settles $5 Billion Privacy Lawsuit Over Tracking Users in 'Incognito Mode'
⚠️
Malware Abuses Google OAuth Endpoint to ‘Revive’ Cookies, Hijack Accounts
⚠️
Zeppelin2 Ransomware Builder for Sale on Dark Web
⚠️
BPF Memory Forensics with Volatility 3
⚠️
New Black Basta Decryptor Exploits Ransomware Flaw to Recover Files
⚠️
Free Decryptor Released for Black Basta Ransomware
⚠️
Juniper Releases Security Advisory for Juniper Secure Analytics
⚠️
Online museum collections down after cyberattack on service provider
⚠️
European Central Bank to Put Banks Through Cyber Stress Test
📢
TikTok Editorial Analysis
📢
IBM security advisory (AV24-001)
🔥
Cybercriminals Launched ‘Leaksmas’ Event in the Dark Web Exposing Massive Volumes of Leaked PII and Compromised Data
🔥
Pro-Palestinian Operation Claims Dozens of Data Breaches Against Israeli Firms
🔥
Hackers Attack UK’s Nuclear Waste Services Through LinkedIn
🔥
Cactus Ransomware Gang Hit the Swedish Retail and Grocery Provider Coop
🔥
Multiple Orgs In Iran Were Breached By A Mysterious Hacker
🔥
New DLL Hijacking Technique Let Attackers Bypass Windows Security Mechanisms
🔥
Inc Ransom Ransomware Gang Claims to Have Breached Xerox Corp
🔥
Victoria court recordings exposed in reported ransomware attack
🔥
Xerox says subsidiary XBS U.S. breached after ransomware gang leaks data
🔥
Australian Court Service Hacked, Hearing Recordings at Risk
🔥
API Security Trends: Collaborative Strategies for Leaders
🔥
LockBit 3.0 Claims Attack on Australian Auto Dealer Eagers
🔥
Merry 'Leaksmas'! Hackers Give Away 50 Million Pieces of PII
🔥
Orbit Chain loses $86 million in the last fintech hack of 2023
🔥
States and Congress Wrestle With Cybersecurity After Iran Attacks Small Town Water Utilities
🕵️
Weaponization of AI: The New Ethics of Cyber War
🕵️
ISC Stormcast For Tuesday, January 2nd, 2024 https://isc.sans.edu/podcastdetail/8792, (Tue, Jan 2nd)
🕵️
Multiple Flaws in Google Kubernetes Engine Let Attackers Escalate Privileges
🕵️
Virginia’s Fairfax Schools Urged to Toughen Privacy Safeguards After Data Probe
🕵️
New DLL Search Order Hijacking Technique Targets WinSxS folder
🕵️
Why Don’t We Care About Identity Security? - Don Baham - CSP #155
🕵️
New Year's Resolution - SWN Vault
🕵️
USENIX Security '23 - 422 talks
🕵️
GUEST ESSAY: Leveraging DevSecOps to quell cyber risks in a teeming threat landscape
🕵️
Hacktivists Shut Down Top State-Owned Belarusian News Agency
🕵️
A Dream Team Security Awareness Training Program?
🕵️
[Security Masterminds] Beyond the Technical: Cultivating Empathy in Cybersecurity
🕵️
Are Security Appliances fit for Purpose in a Decentralized Workplace?
🕵️
Fingerprinting SSH Identification Strings, (Tue, Jan 2nd)
🕵️
State AG Hits Hospital With $300K Fine for Web Tracker Use
🌐
New JinxLoader Targeting Users with Formbook and XLoader Malware
📡
Clash of Clans Gamers at Risk While Using Third-Party App
📡
Palo Alto Networks Closes Talon Cyber Security Acquisition
📡
New Version of Meduza Stealer Released in Dark Web
📡
Google Settles Lawsuit Over Tracking People in ‘Incognito Mode'
📡
The Definitive Enterprise Browser Buyer's Guide
📡
Spotify Music Converter TuneFab Puts Users at Risk Due to Misconfigured MongoDB Instance
📡
Pentagon Reveals Updated Cost Estimates for CMMC Implementation
📡
Hackers Hit Australian State's Court Recording Database
📡
Bitcoin Climbs Above $45,000 For First Time Since April 2022
📡
Cybercrime, AI Supremacy And The Metaverse - The Tech Stories That Will Dominate 2024
📡
New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections
📡
Android Game Developer’s Google Drive Misconfiguration Leaks Information on Nearly One Million Users
📡
Google Groups is ending support for Usenet to combat spam
📡
Steam drops support for Windows 7 and 8.1 to boost security