104Articles
9Categories
2024-02-06Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-4762 Google Chromium V8 Type Confusion Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and …
KEV
🐛
Recent SSRF Flaw in Ivanti VPN Products Undergoes Mass Exploitation
🐛
Fortinet FortiSIEM Hit by Two 10/10 Severity Vulnerabilities
⚠️
Newest Ivanti SSRF Zero-Day Now Under Mass Exploitation
⚠️
142: Axact
⚠️
Judge Allows Case Against Geolocation Data Broker Kochava To Proceed
⚠️
US announces visa ban on those linked to commercial spyware
⚠️
Hackers Exploit Job Boards in APAC, Steal Data of Millions of Job Seekers
⚠️
Google Links Over 60 Zero-Days to Commercial Spyware Vendors
⚠️
How a $10B Enterprise Customer Drastically Increased their SaaS Security Posture with 201% ROI by Using SSPM
⚠️
Critical Remote Code Execution Vulnerability Patched in Android
⚠️
Cisco’s identity and access security offerings to receive AI upgrades
⚠️
Government hackers targeted iPhones owners with zero-days, Google says
⚠️
MFA adoption peaks despite lower remote access authentications
⚠️
A Chicago Children’s Hospital Has Taken Its Networks Offline After a Cyberattack
⚠️
Canon Patches 7 Critical Vulnerabilities in Small Office Printers
⚠️
Airbus NAVBLUE Flysmart+ Manager Susceptible to Data Manipulation Attacks
⚠️
Experts Detail New Flaws in Azure HDInsight Spark, Kafka, and Hadoop Services
⚠️
Combat Phishing Attacks With AI-Powered Email Threat Protection: Packet Guide 2024
⚠️
Starting an OWASP Project (That's Not a List!) - Grant Ongers - ASW #272
⚠️
Britain, France Lead 35 Nation Agreement On Controlling Spyware, Mercenary Hackers
⚠️
Google Links Over 60 Zero Days To Spyware Vendors
⚠️
Ivanti Devices Hit By Wave Of Exploits For Latest Security Hole
⚠️
Verizon insider data breach hits over 63,000 employees
⚠️
Ov3r_Stealer Malware Spreads via Phishing and Facebook Advertising
⚠️
CISA Releases Two Industrial Control Systems Advisories
⚠️
Why and How to Extract Malware Configurations in a Sandbox
⚠️
JetBrains warns of new TeamCity auth bypass vulnerability
⚠️
Google says spyware vendors behind most zero-days it discovers
⚠️
Dutch Intelligence Finds Chinese Hackers Spying on Secret Defence Ministry Network
⚠️
CISA Announces Renewal of the Information and Communications Technology Supply Chain Risk Management Task Force
⚠️
Verizon Insider Data Breach Hits Over 63,000 Employees
⚠️
Ransomware victim numbers rose by 50% in 2023
⚠️
Confirmed: Entrust is buying AI-based ID verification startup Onfido, sources say for more than $400M
⚠️
New Banking Trojan Exploits Patched Windows SmartScreen Flaw
⚠️
Chinese Hackers Penetrated Unclassified Dutch Network
⚠️
MAR-10448362-1.v1 Volt Typhoon
⚠️
Piloting new ways of protecting Android users from financial fraud
📋
Cyber Trust Mark concept gains momentum with smart device and IoT manufacturers
📢
Update: Classified Japanese Diplomatic Documents Leaked in Chinese Cyberattacks
📢
Pennsylvania Courts’ Website Disrupted by DoS Attack
📢
HPE security advisory (AV24-069)
📢
Chinese hackers infect Dutch military network with malware
📢
VMWare security advisory (AV24-070)
📢
CISA's Flagship Cyber Collaborative Faces Growing Criticism
🔥
UK, France Host Conference to Tackle ‘Hackers for Hire’
🔥
Update: Clorox Says Cyberattack Caused $49 Million in Expenses
🔥
US Sanctions Iranian Officials Over Cyberattacks on Water Plants
🔥
Philippine Lawmakers Demand Briefing Following China-Linked Cyberattack
🔥
Report: Ethical Hackers Reported 835 Vulnerabilities, Earned $450K in 2023
🔥
Cyberattack Targets Maine Healthcare Provider’s Computer Servers
🔥
HPE Investigates New Breach After Data for Sale on Hacking Forum
🔥
ResumeLooters Gang Steals User Information from Retail and Job Sites
🔥
Researchers Unvield the Sophisticated Ransomware Used by Black Hunt
🔥
Third-party breaches hit 90% of top global energy companies
🔥
Cloudflare Server Compromised Due to Leaked Access Token in Okta Breach
🔥
Synthetic Data: The New Frontier in Cyber Extortion
🔥
Generative AI Used to Launch Phishing Attacks
🔥
Data breach at French healthcare services firm puts millions at risk
🔥
Medical Center Fined $4.75M in Insider ID Theft Incident
🕵️
ISC Stormcast For Tuesday, February 6th, 2024 https://isc.sans.edu/podcastdetail/8840, (Tue, Feb 6th)
🕵️
What is SaaS Sprawl? Guide to Combating SaaS Security Risks
🕵️
Computer viruses are celebrating their 40th birthday (well, 54th, really), (Tue, Feb 6th)
🕵️
Multiple Container Flaws Allow Attackers to Access the Host OS
🕵️
Darknet Diaries 142: Axact
🕵️
Hacker Conversations: Rob Dyke on Legal Bullying of Good Faith Researchers
🕵️
Beware: Fake Facebook Job Ads Spreading 'Ov3r_Stealer' to Steal Crypto and Credentials
🕵️
CyberheistNews Vol 14 #06 [New Threat] Attackers Are Now Using MS Teams to Phish Your Users
🕵️
Sorting Out Glibc Vulns, Apple's Security Research Device, BoringSSL, Old C Vulns - ASW #272
🕵️
Criminal IP ASM: A new cybersecurity listing on Microsoft Azure
🕵️
Generative AI and Corporate Security – Getting it Right - Bill Franks - CSP #160
🕵️
ZeroFox to be Taken Private in $350 Million Deal
🕵️
Tech Giants Form Post-Quantum Cryptography Alliance
🕵️
Millions of User Records Stolen From 65 Websites via SQL Injection Attacks
🕵️
Ionix Adds $15M to Series A Funding Round
🕵️
Documents about the NSA’s Banning of Furby Toys in the 1990s
🕵️
Python Info-stealer Distributed by Malicious Excel Document
🕵️
Teens Gone Wild, Nintendo, Anydesk, RUST, Google, Deepfakes, Jason Wood, and more – SWN #360
🕵️
Robust Governance, Standards Needed for AI Adoption at Scale
🕵️
Trends in Phishing, Fraud, 'Dark AI Models', and how to better protect yourself.
🕵️
US, UK and France Pressure Commercial Spyware Industry
🕵️
Teens Gone Wild, Nintendo, Anydesk, RUST, Google, Deepfakes, Jason Wood, and more - SWN #360
🕵️
Court: FTC Privacy Suit Against Data Broker Can Move Ahead
🕵️
Gil Shwed to Step Down as Check Point CEO
🕵️
Microsoft Entra Verified ID introduces Face Check in preview
🌐
U.S. Imposes Visa Restrictions on those Involved in Illegal Spyware Surveillance
🌐
Attack surface management platform Ionix adds another $15M to its $27M Series A round
🌐
Crypto wallet drainer: what it is and how to defend against it | Kaspersky official blog
📡
Safer Internet Day is as important as ever
📡
EU Adopts First Cybersecurity Certification Scheme for Safer Tech
📡
Researchers Discover Exposed API Secrets, Impacting Major Tech Tokens
📡
Latio Application Security Tester Uses AI to Scan Your Code
📡
DJI - The ART of obfuscation
📡
Hackers steal data of 2 million in SQL injection, XSS attacks
📡
Mozilla Monitor’s new service removes your personal info from data broker sites automatically
📡
Millions Of Records Stolen From 65 Websites Via SQL Injection Attacks
📡
Double Trouble For Fortinet Customers As Pair Of Critical Vulns Found in FortiSIEM
📡
Deepfake Video Conference Convinces Employee To Send $25 Million To Scammers
📡
Tech Giants Form Post Quantum Cryptography Alliance
📡
Unifying Cloud Security Beyond Siloes
📡
Unifying Cloud Security Beyond Siloes
📡
How to Win a Cyberwar: Use a Combined Intelligence Strategy
📡
Update: Equilend Back in Action as Ransom Payment Rumors Swirl
📡
Left to their own devices: Security for employees using personal devices for work