109Articles
8Categories
2024-02-21Date
🚨
Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure GatewaysSUMMARY The Cybersecurity and Infrastructure Security Agency (CISA) and the following partners (hereafter referred to as the authoring organizations) are releasing this joint Cybersecurity Advisory to warn that cyber threat actors are exploiting previously identified vulnerabilit…
KEV
🐛
VMware Alert: Uninstall EAP Now - Critical Flaw Puts Active Directory at Risk
🐛
Removing the deprecated VMware Enhanced Authentication Plugin (EAP) to address CVE-2024-22245 and CVE-2024-22250
🐛
Code Injection Or Backdoor: A New Look At Ivanti's CVE-2021-44529
🐛
New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers
🐛
Critical ConnectWise ScreenConnect flaw exploited in the wild
KEV
⚠️
Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force
⚠️
Is hybrid encryption the answer to post-quantum security?
⚠️
LockBit Ransomware's Darknet Domains Seized in Global Law Enforcement Raid
⚠️
VMware Urges to Remove Enhanced EAP Plugin to Stop Auth & Session Hijack Attacks
⚠️
Trend Micro and INTERPOL Join Forces Again for Operation Synergia
⚠️
Cyber Security Today, Feb. 21, 2024 - A patch warning from ConnectWise, the latest ransomware news, and more
⚠️
Six things we learned from the LockBit takedown
⚠️
New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack
⚠️
Hackers using stolen credentials to launch attacks as info-stealing peaks
⚠️
UScellular and Palo Alto Networks Join Forces to Secure 5G
⚠️
Mozilla Releases Security Updates for Firefox and Thunderbird
⚠️
Astaroth, Mekotio, and Ousaban Abusing Google Cloud Run in LATAM-Focused Malware Campaigns
⚠️
CISA, EPA, and FBI Release Top Cyber Actions for Securing Water Systems
⚠️
ConnectWise Confirms ScreenConnect Flaw Under Active Exploitation
⚠️
ScreenConnect critical bug now under attack as exploit code emerges
⚠️
Fake Tokens Exploit BRICS Investment Hype
⚠️
Knight Ransomware Source Code for Sale After Leak Site Shuts Down
⚠️
Researchers warn high-risk ConnectWise flaw under attack is ’embarrassingly easy’ to exploit
⚠️
Ongoing Malware Laced Developer Job Interviews
⚠️
New Malicious PyPI Packages Caught Using Covert Side-Loading Tactics
⚠️
LockBit: Lessons learned on winning the war on cybercrime
⚠️
New SSH-Snake malware steals SSH keys to spread across the network
⚠️
Exposed: Global Espionage Unleashed by China's Police in Groundbreaking Leak
⚠️
Joomla fixes XSS flaws that could expose sites to RCE attacks
⚠️
Illuminating Cybersecurity Wisdom: Insights from a Thought Leader - Wendy Nather - PSW Vault
⚠️
Experts Praise White House Port Cybersecurity Initiatives
📢
Biden to Issue Executive Order Raising Maritime Cybersecurity
📢
Chinese Hacking Contractor iSoon Leaks Internal Documents
📢
[INFOGRAPHIC] KnowBe4’s Learner App by the Numbers
📢
Biden to Sign Executive Order Raising Maritime Cybersecurity
📢
Executive Order on Port Cybersecurity Points to IT/OT Threat Posed by Chinese Cranes
📢
Google Chrome security advisory (AV24-102)
📢
US govt shares cyberattack defense tips for water utilities
📢
GitLab security advisory (AV24-103)
📢
CISA, OMB, ONCD and Microsoft Efforts Bring New Logging Capabilities to Federal Agencies
📢
Atlassian security advisory (AV24-104)
📢
PAM Provider Delinea Buys Fastpath
📢
Hack at Services Firm Hits 2.4 Million Eye Doctor Patients
🔥
Lockbit Ransomeware global taketown
🔥
Israeli El Al Alleges Hackers Targeted Flights in Mid-Air Hijack Attempt
🔥
New 'VietCredCare' Stealer Targeting Facebook Advertisers in Vietnam
🔥
Iran and Hezbollah Hackers Launch Attacks to Influence Israel-Hamas Narrative
🔥
Hacker Arrested for Selling Bank Accounts of US, Canadian Users
🔥
Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery
🔥
DC-Area School System Says Data of 100,000 People Affected in Ransomware Attack
🔥
Control Systems Firm PSI Struggles to Recover From Ransomware Attack
🔥
Critical Infrastructure Vendor PSI Software Hit by Ransomware Attack
🔥
Russia Announces Arrest of Medibank Hacker Tied to REvil
🔥
Cactus Ransomware Claims 1.5TB Of Schneider Electric Data
🔥
LockBit Leaks Expose Almost 200 Affiliates And Custom Malware
🔥
Breach at Aussie Telecom Tangerine Affects 232,000 Customers
🔥
US offers $15 million bounty for info on LockBit ransomware gang
🔥
Beware of VietCredCare Malware that Steals businesses’ Facebook Accounts
🔥
Top UK Universities Recovering Following Targeted DDoS Attack
🔥
Cyber Insights 2024: Ransomware
🔥
Microsoft finally expands free logging—but only for govt agencies
🔥
US health tech giant Change Healthcare hit by cyberattack
🔥
Wyze Security Incident Exposes Private Cameras
🔥
Microsoft expands free logging capabilities after May breach
🕵️
ISC Stormcast For Wednesday, February 21st, 2024 https://isc.sans.edu/podcastdetail/8862, (Wed, Feb 21st)
🕵️
ISC Stormcast For Wednesday, February 21st, 2024 https://isc.sans.edu/podcastdetail/8864, (Wed, Feb 21st)
🕵️
Exploring Changing SOC Landscapes
🕵️
Russian Hackers Target Ukraine with Disinformation and Credential-Harvesting Attacks
🕵️
What are You Working on Wednesday
🕵️
Phishing pages hosted on archive.org, (Wed, Feb 21st)
🕵️
Charming Kitten Uses BASICSTAR Against Middle East Policy Experts
🕵️
Security Onion 2.4.50 Released for Defenders With New Features
🕵️
New Mingo Malware Attacking Linux Redis Servers To Mine Cryptocurrency
🕵️
Chrome 122, Firefox 123 Patch High-Severity Vulnerabilities
🕵️
NSA Announces Retirement of Cybersecurity Director Rob Joyce
🕵️
Google Chrome 122 Update Addresses Critical Security Vulnerabilities
🕵️
Details of a Phone Scam
🕵️
Redis Servers Targeted With New ‘Migo’ Malware
🕵️
Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS
🕵️
Apple Adds Post-Quantum Encryption to iMessage
🕵️
Diversifying Defenses: FjordPhantom Malware Shows Importance of a Multi-Pronged Approach
🕵️
SHARED INTEL: Poll shows companies pursuing ‘Digital Trust’ reap benefits as laggards fall behind
🕵️
Webinar Tomorrow: The Active Threat Landscape in the Cloud
🕵️
Researchers Devise ‘VoltSchemer’ Attacks Targeting Wireless Chargers
🕵️
QR-Code Attacks Target the C-Suite 42 Times More than Standard Employees
🕵️
Anyone Can Be Scammed and Phished, With Examples
🕵️
Malware Delivered Through Phishing Surges 276%
🕵️
Managing Supply Chain Risk - Saša Zdjelar - BTS #24
🕵️
Get the most out of Microsoft Copilot for Security with good prompt engineering
🕵️
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
🌐
New Migo Malware Targeting Redis Servers for Cryptocurrency Mining
🌐
New 'VietCredCare' Stealer Targeting Facebook Advertisers in Vietnam
🌐
Hackers abuse Google Cloud Run in massive banking trojan campaign
📡
Decoding Digital Transformation: AI, ML, and RPA in the Modern Era
📡
Decoding Digital Transformation: AI, ML, and RPA in the Modern Era
📡
Signal Introduces Usernames, Allowing Users to Keep Their Phone Numbers Private
📡
Permit.io Secures $8m in Series A for Revolutionary Authorization Service
📡
Clean Links and Sophisticated Scams Mark New Era in Email Attacks
📡
6 Ways to Simplify SaaS Identity Governance
📡
Sophos NDR is now available on AWS
📡
Insider Steals 80,000 Email Addresses From UK District Councils
📡
Apple readies iMessage for when quantum computers could break encryption
📡
VoltSchemer Attacks Use Wireless Chargers to Inject Voice Commands, Fry Phones
📡
Apple Adds Post-Quantum Encryption To iMessage
📡
VMware Urges Admins to Remove Deprecated, Vulnerable Enhanced Authentication Plug-in
📡
Fraudsters tried to scam Apple out of 5,000 iPhones worth over $3 million
📡
ConnectWise sounds the alarm on two vulnerabilities
📡
Discord took no action against server that coordinated costly Mastodon spam attacks