106Articles
9Categories
2024-01-31Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2022-48618 Apple Multiple Products Improper Authentication Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cy…
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-21893 Ivanti Connect Secure, Policy Secure, and Neurons Server-Side Request Forgery (SSRF) Vulnerability These types of vulnerabilities are fre…
KEV
🐛
New Glibc Flaw Grants Attackers Root Access on Major Linux Distros
🐛
“45K+ Exposed Jenkins Instances Vulnerable to RCE Attacks”
🐛
Chinese Hackers Exploiting VPN Flaws to Deploy KrustyLoader Malware
🐛
New Glibc Flaw Grants Attackers Root Access on Major Linux Distros
🐛
45,000 Exposed Jenkins Instances Found Amid Reports of In-the-Wild Exploitation
🐛
Alert: Ivanti Discloses 2 New Zero-Day Flaws, One Under Active Exploitation
🐛
AI Predictions for 2024: Moving forward with precise systems that combine power, security, intelligence, and ease of use.
🐛
Ivanti patches two zero-days under attack, but finds another
🐛
CISA and FBI Release Secure by Design Alert Urging Manufacturers to Eliminate Defects in SOHO Routers
🐛
CVE-2023-6246: Heap-based buffer overflow in the glibc's syslog()
🐛
Vulnerabilities in Docker, other container engines enable host OS access
⚠️
6 user experience mistakes made for security and how to fix them
⚠️
Israeli Government Says Smallest of SMBs Hit Hardest in Cyberattacks
⚠️
Pawn Storm Uses Brute Force and Stealth Against High-Value Targets
⚠️
Hitron DVR Zero-Day Vulnerabilities Exploited by InfectedSlurs Botnet
⚠️
Security Now podcast SN959: Stamos on "Microsoft Security" - HP Printer Bricking, Mercedes Benz Source Code - 2 hours
⚠️
Rust Payloads Exploiting Ivanti Zero-Days Linked to Sliver Toolkit
⚠️
Vulnerabilities in Lamassu Bitcoin ATMs
⚠️
Check Point’s new generative AI tool offers platform-wide intelligence and remediation
⚠️
Microsoft Teams Phishing Attack Pushes DarkGate Malware via Group Chats
⚠️
New Israeli startup to help organizations deal with GenAI-related risks
⚠️
Canada’s foreign affairs department investigates data breach
⚠️
Ivanti warns of new Connect Secure zero-day exploited in attacks
⚠️
Tor Code Audit Finds 17 Vulnerabilities
⚠️
Leaked GitHub Token Exposed Mercedes Source Code
⚠️
Safeguarding the healthcare sector with dynamic cybersecurity
⚠️
Hackers steal $112 million of XRP Ripple cryptocurrency
⚠️
Leaked GitHub Token Exposed Mercedes Source Code
⚠️
Security giant Proofpoint is laying off 280 employees, about 6% of its workforce
⚠️
Proofpoint Lays Off 6% of Workforce, Offshores Jobs
⚠️
GNU C Library Vulnerability Leads to Full Root Access
⚠️
After Delays, Ivanti Patches Zero-Days and Confirms New Exploit
⚠️
Pawn Storm Uses Brute Force and Stealth Against High-Value Targets
⚠️
CISA warns of patched iPhone kernel bug now exploited in attacks
KEV
⚠️
Scaling security with AI: from detection to solution
⚠️
Exploit released for Android local elevation flaw impacting 7 OEMs
⚠️
Apple fixes zero-day bug in Apple Vision Pro that ‘may have been exploited’
⚠️
Accelerate threat response and democratize SOC skill sets with generative AI
⚠️
Ivanti Discloses Additional Zero-Day That Is Being Exploited
⚠️
Water Sector Leaders Urge Congress to Fund Cyber Mandates
⚠️
Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution
📋
China-Linked Hackers Target Myanmar's Top Ministries with Backdoor Blitz
📢
[Live Demo] Customizing Your Compliance Training to Increase Effectiveness
📢
CISA: Vendors must secure SOHO routers against Volt Typhoon attacks
📢
Dutch Watchdog Fines Uber 10 Million Euros Over Privacy Regulations Infringement
📢
Ivanti security advisory (AV24-058)
📢
Here’s How the FBI Stopped a Major Chinese Hacking Campaign
📢
Opening Statement by CISA Director Jen Easterly
🔥
Author Q&A: The ongoing role of fortified structures in military clashes — and cybersecurity
🔥
Canada’s ‘most prolific hacker’ jailed for two years
🔥
Alpha Ransomware Group Launches Data Leak Site on the Dark Web
🔥
Online Ransomware Decryptor Helps Recover Partially Encrypted Files
🔥
Cyber Security Today, Jan. 31, 2024 -A new ransomware strain found, and questions about the level of ransomware payments
🔥
Fulton County Cyberattack Brings Down Phones, Court Site and Tax Systems
🔥
The SEC Won't Let CISOs Be: Understanding New SaaS Cybersecurity Rules
🔥
How to Align Your Incident Response Practices With the New SEC Disclosure Rules
🔥
U.S. Officials Detained a 19-year-old SIM-Swap Hacker
🔥
Hackers Hijacking MS-SQL Servers to Install Mimic Ransomware
🔥
What IT Leaders should appreciate about SOAR in 2024
🔥
Data security posture management vs cloud security posture management
🔥
Johnson Controls says ransomware attack cost $27 million, data stolen
🔥
Timex Breach Leaks Employee Social Security Numbers
🔥
Ransomware Payments On The Decline As Cyber Attackers Focus on The Smallest, And Largest, Organizations
🔥
What is Email Hijacking? – Email Account Takeover Protection Guide – 2024
🔥
ISACs Slam US Federal Cyber Incident Reporting Proposals
🔥
Europcar denies data breach of 50 million users, says data is fake
🔥
Europcar says someone likely used ChatGPT to promote a fake data breach
🔥
Identifying Bad By Defining Good with Danny Jenkins, CEO & Co-Founder at ThreatLocker – PSW #815
🔥
ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora
🕵️
ISC Stormcast For Wednesday, January 31st, 2024 https://isc.sans.edu/podcastdetail/8832, (Wed, Jan 31st)
🕵️
Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking Malware
🕵️
CFPB’s Proposed Data Rules
🕵️
Two More Individuals Charged for DraftKings Hacking
🕵️
Aim Security Raises $10M to Tackle Shadow AI
🕵️
US Sanctions Two ISIS-Affiliated ‘Cybersecurity Experts’
🕵️
Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware
🕵️
Reken Emerges From Stealth With $10 Million Seed Funding
🕵️
FBI Sting Targeted Dangerous Volt Typhoon Botnet, Report Claims
🕵️
FBI disrupts Chinese botnet by wiping malware from infected routers
🕵️
Italian Businesses Hit by Weaponized USB Devices Spreading Cryptojacking Malware
🕵️
Podcast: Palo Alto Networks Talks IT/OT Convergence
🕵️
News alert: Reken raises $10M from Greycroft to protect against generative AI-enabled fraud
🕵️
Proof of Concept: How Do We Ensure Ethical AI Systems?
🕵️
FBI Cyber Alert: Tech Support Scams Steal Cash or Precious Metals
🕵️
US Gov Disrupts SOHO Router Botnet Used by Chinese APT Volt Typhoon
🕵️
Hackers push USB malware payloads via news, media hosting sites
🕵️
News alert: Oasis Security raises $40M funding to automate the lifecycle of non-human identities
🌐
Crypto theft from Exodus and Bitcoin wallets through cracked macOS apps | Kaspersky official blog
🌐
Ars Technica Used In Malware Campaign With Never-Before-Seen Obfuscation
🌐
US disrupts China-backed hacking operation amid warning of threat to American infrastructure
🌐
Smarter, Meaner, Sneakier: Security Trends for 2024
📡
OpenAI Says Mysterious Chat Histories Resulted From Account Takeover
📡
Critical Workspace Creation Flaw in GitLab Allows File Overwrite
📡
Great Security or Great UX? Both, Please
📡
Oasis Security leaves stealth with $40M to lock down the wild west of non-human identity management
📡
Tor Code Audit Finds 17 Vulnerabilities
📡
Two More Individuals Charged For DraftKings Hacking
📡
Data Leak at Fintech Giant Direct Trading Technologies
📡
New Evasive Large-Scale Scareware and PUP Delivery Campaign Spotted
📡
The Fun and Dangers of Top Level Domains (TLDs), (Wed, Jan 31st)
📡
Top Tips to Avoid Corporate Social Media Account Hijacking
📡
Pushing the Healthcare Sector into Stronger Cybersecurity
📡
Pushing the Healthcare Sector to Improve Cybersecurity
📡
Police seize record 50,000 Bitcoin from now-defunct piracy site