99Articles
7Categories
2024-02-20Date
๐Ÿ›
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs - XXE
๐Ÿ›
WordPress Bricks Theme Under Active Attack: Critical Flaw Impacts 25,000+ Sites
KEV
๐Ÿ›
Hackers Exploit Critical RCE Flaw in Bricks WordPress Site Builder
๐Ÿ›
New Redis attack campaign weakens systems before deploying cryptominer
๐Ÿ›
Over 28,500 Exchange Servers Vulnerable to Actively Exploited Bug
KEV
โš ๏ธ
LockBit Infrastructure Seized By US, UK Police
โš ๏ธ
Hackers Arrested For Stealing Banking Credentials Using Novel Android Malware
โš ๏ธ
LockBit Ransomware's Darknet Domains Seized in Global Law Enforcement Raid
โš ๏ธ
Warning: Agniane Stealer Targeting Users to Steal Financial Data
โš ๏ธ
US, UK authorities claim seizure of LockBit ransomware gangโ€™s dark web leak site
โš ๏ธ
LockBit Ransomware Gang Disrupted by Global Law Enforcement Operation
โš ๏ธ
Google Open Sources Magika: AI-Powered File Identification Tool
โš ๏ธ
Learn How to Build an Incident Response Playbook Against Scattered Spider in Real-Time
โš ๏ธ
Critical Flaws Found in ConnectWise ScreenConnect Software - Patch Now
โš ๏ธ
Police arrests LockBit ransomware members, release decryptor in global crackdown
โš ๏ธ
Cactus Ransomware Gang Claims the Theft of 1.5TB of Data From Schneider Electric
โš ๏ธ
LockBit ransomware operations seized by law enforcement in โ€˜Operation Cronosโ€™
โš ๏ธ
Broken LockBit: Ransomware Group Takedown Will Have Impact
โš ๏ธ
Law Enforcement Hacks LockBit Ransomware, Delivers Major Blow to Operation
โš ๏ธ
Police arrest LockBit ransomware members, release decryptor in global crackdown
โš ๏ธ
Meta Unveils 8 Spyware Companies Targeting iOS, Android, & Windows Devices
โš ๏ธ
LockBit Ransomware Operation Shut Down; Criminals Arrested; Decryption Keys Released
โš ๏ธ
Websites Hacked via Vulnerability in Bricks Builder WordPress Plugin
โš ๏ธ
CyberheistNews Vol 14 #08 Browser-Based Phishing Attacks Increase 198%, With Evasive Attacks Increasing 206%
โš ๏ธ
1Password expands its endpoint security offerings with Kolide acquisition
โš ๏ธ
Critical infrastructure software maker confirms ransomware attack
โš ๏ธ
Critical Flaws Found in ConnectWise ScreenConnect Software
โš ๏ธ
New Malicious PyPI Packages Caught Using Covert Side-Loading Tactics
โš ๏ธ
Recent Zero-Day Could Impact Up to 97,000 Microsoft Exchange Servers
โš ๏ธ
Reddit Signed a $60,000,000 Content Licensing Deal with an AI company
โš ๏ธ
Recent Zero Day Could Impact Up To 97k Microsoft Exchange Servers
โš ๏ธ
Law Enforcement Hacks LockBit Ransomware, Delivers Major Blow To Operation
โš ๏ธ
LockBit Ransomware Members Charged by Authorities, Free Decryptor Released
โš ๏ธ
Knight ransomware source code for sale after leak site shuts down
โš ๏ธ
ConnectWise urges ScreenConnect admins to patch critical RCE flaw
โš ๏ธ
CISA Releases Three Industrial Control Systems Advisories
โš ๏ธ
Redefining Threat Modeling - Security Team Goes on Vacation - Jeevan Singh - ASW Vault
โš ๏ธ
Arrests and Indictments in LockBit Crackdown
โš ๏ธ
VMware urges admins to remove deprecated, vulnerable auth plug-in
โš ๏ธ
Chinese Hacking Contractor iSoon Leaks Internal Documents
โš ๏ธ
Joomla CMS Patches Critical XSS Vulnerabilities
๐Ÿ“ข
SaaS Compliance through the NIST Cybersecurity Framework
๐Ÿ“ข
New Report Reveals North Korean Hackers Targeting Defense Firms Worldwide
๐Ÿ“ข
North Korean Hackers Linked to Defense Sector Supply-Chain Attack
๐Ÿ“ข
Mozilla security advisory (AV24-099)
๐Ÿ“ข
ConnectWise security advisory (AV24-100)
๐Ÿ“ข
VMWare security advisory (AV24-101)
๐Ÿ”ฅ
Iran and Hezbollah Hackers Launch Attacks to Influence Israel-Hamas Narrative
๐Ÿ”ฅ
โ€˜M.O.R.Eโ€™ Ransomware Emerges on the Dark Web; Threatens Windows, Mac, Linux Users
๐Ÿ”ฅ
Newly Discovered RustDoor Malware Impersonates Visual Studio Update
๐Ÿ”ฅ
Alpha Ransomware Uses Living-Off-The-Land Tools To Attack Windows Computers
๐Ÿ”ฅ
Making The Return on Investment (ROI) Case For Security Awareness Training
๐Ÿ”ฅ
The biggest ransomware attacks of 2023 | Kaspersky official blog
๐Ÿ”ฅ
Wyze Camera Breach Let 13,000 Strangers Look into Other Peopleโ€™s Homes
๐Ÿ”ฅ
Volt Typhoon Seen Exfiltrating Sensitive OT Data
๐Ÿ”ฅ
Cactus Ransomware Group Confirms Hacking Schneider Electric
๐Ÿ”ฅ
Websites Hacked Via Vuln In Bricks Builder WordPress Plugin
๐Ÿ”ฅ
Ransomware Groups, Targeting Preferences, and the Access Economy
๐Ÿ”ฅ
US sanctions LockBit members after ransomware takedown
๐Ÿ”ฅ
New Migo Malware Targeting Redis Servers for Cryptocurrency Mining
๐Ÿ”ฅ
Feds Seize LockBit Ransomware Websites, Offer Decryption Tools, Troll Affiliates
๐Ÿ”ฅ
Bill Proposes Measuring the Accuracy of Patient Matching
๐Ÿ•ต๏ธ
Top 10 web hacking techniques of 2023
๐Ÿ•ต๏ธ
ISC Stormcast For Tuesday, February 20th, 2024 https://isc.sans.edu/podcastdetail/8860, (Tue, Feb 20th)
๐Ÿ•ต๏ธ
Possible leak of sensitive Chinese cyber security documents
๐Ÿ•ต๏ธ
Alleged Chinese-Contract-Company's Dump of the "Chinese Government Spyware" I-S00N
๐Ÿ•ต๏ธ
Anatsa Banking Trojan Resurfaces, Targets European Banks (Android)
๐Ÿ•ต๏ธ
Microsoft Is Spying on Users of Its AI Tools
๐Ÿ•ต๏ธ
Anatsa Android Banking Trojan Continues to Spread via Google Play
๐Ÿ•ต๏ธ
How does Safe Browsing block websites?
๐Ÿ•ต๏ธ
Several Ukrainian Media Outlets Attacked by Russian Hackers
๐Ÿ•ต๏ธ
Cyber Insights 2024: Supply Chain
๐Ÿ•ต๏ธ
How I got started: Cyber AI/ML engineer
๐Ÿ•ต๏ธ
Responsible Use and Vetting of AI Solutions - Jon Washburn - CSP #162
๐Ÿ•ต๏ธ
Back to School: Networking 101 - SWN Vault
๐Ÿ•ต๏ธ
ConnectWise Rushes to Patch Critical Vulns in Remote Access Tool
๐Ÿ•ต๏ธ
GUEST ESSAY: Everything you should know about the cybersecurity vulnerabilities of AI chatbots
๐Ÿ•ต๏ธ
Moving First-Party Fraud Out of the Bank's Blind Spot
๐Ÿ•ต๏ธ
The Unsettling Leap of AI in Video Creation: A Glimpse Into Sora
๐Ÿ•ต๏ธ
IBM Tests Audio-Based Large Language Model to Hijack Live Conversations
๐Ÿ•ต๏ธ
Malvertising Campaign Spreads Phony Utility Bills
๐Ÿ•ต๏ธ
GitHub - mlcsec/FormThief: Spoofing desktop login applications with WinForms and WPF
๐Ÿ•ต๏ธ
1Password Acquires Kolide, Aiming to Enhance Device Security
๐Ÿ•ต๏ธ
Navigating NIS2 requirements with Microsoft Security solutions
๐Ÿ•ต๏ธ
Vastaamo Hacker Disappears Amid Ongoing Trial
๐ŸŒ
Python InfoStealer With Dynamic Sandbox Detection, (Tue, Feb 20th)
๐ŸŒ
New 'MMS Fingerprinting' Zero-Click Attack Used to Deploy Spyware
๐ŸŒ
Earth Preta Campaign Uses DOPLUGS to Target Asia
๐ŸŒ
Meta Warns of 8 Spyware Firms Targeting iOS, Android, and Windows Devices
๐ŸŒ
Vietnam To Collect Biometrics - Even DNA - For New ID Cards
๐ŸŒ
New Migo malware disables protection features on Redis servers
๐Ÿ“ก
Insider Steals 79,000 Email Addresses At Work To Promote Own Business
๐Ÿ“ก
FBI Most Wanted Cybergang Boss Pleads Guilty
๐Ÿ“ก
An Obsession With Impact: The Inspiring Journey of a Dreamer That Led to a Career at Microsoft
๐Ÿ“ก
Signal rolls out usernames that let you hide your phone number
๐Ÿ“ก
VoltSchemer attacks use wireless chargers to inject voice commands, fry phones
๐Ÿ“ก
Watching out for the fakes: How to spot online disinformation
๐Ÿ“ก
Sensor Intel Series: Top CVEs in January 2024
๐Ÿ“ก
Sensor Intel Series: Top CVEs in January 2024