101Articles
9Categories
2024-02-26Date
🚨
#StopRansomware: Phobos RansomwareSUMMARY Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware  effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and hi…
KEV
🐛
Hack me if you can: LockBit challenges authorities, promises to return
🐛
Linux Kernel TLS Vulnerability CVE-2024-26582 could lead to RCE or privilege escalation
⚠️
LockBit Ransomware Group Resurfaces After Law Enforcement Takedown
⚠️
Hackers Steal Nearly $10 Million From Axie Infinity Co-Founder’s Personal Accounts
⚠️
New DDoS malware Attacking Apache big-data stack, Hadoop, & Druid Servers
⚠️
Breaking down the language barrier: How to master the art of communication
⚠️
Cyber Security Today, Feb. 26, 2024 - Canadian online harms legislation to be revealed today, and more
⚠️
LockBit Ransomware Operation Relaunches Dark Web Leak Site
⚠️
CISA, NCSC-UK, and Partners Release Advisory on Russian SVR Actors Targeting Cloud Infrastructure
⚠️
Update: Authorities Uncover 30,000 Bitcoin Wallet Addresses Linked to LockBit
⚠️
LockBit Ransomware Gang Resurfaces With New Site
⚠️
Travel Update! The NIST CSF 2.0 is HERE…Along with Many Helpful Resources…
⚠️
Critical Flaw in Popular ‘Ultimate Member’ WordPress Plugin
⚠️
The LockBit ransomware gang rears its ugly head again, after law enforcement takedown
⚠️
Open Source Security Podcast Episode 417 - Linux Kernel security with Greg K-H - 42 minutes
⚠️
From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements
⚠️
Researchers say easy-to-exploit security bugs in ConnectWise remote access software now under mass-attack
⚠️
Zyxel Patches Remote Code Execution Bug in Firewall Products
⚠️
Hackers exploit 14-year-old CMS editor on govt, edu sites for SEO poisoning
⚠️
Feds hack LockBit, LockBit springs back. Now what?
⚠️
Hacker group hides malware in images to target Ukrainian organizations
⚠️
Groups Warn Health Sector of Change Healthcare Cyber Fallout
⚠️
NIST Unveils Second Iteration of Cybersecurity Framework
⚠️
UnitedHealth subsidiary Optum hack linked to BlackCat ransomware
📋
Mowing down demons: DOOM comes to Husqvarna smart lawnmowers
📢
Apple Announces Post-Quantum Encryption Algorithms for iMessage
📢
Joint cyber security advisory warns that Russian state actors are adapting their tactics to access cloud infrastructure
📢
Your KnowBe4 Compliance Plus Fresh Content Updates from February 2024
📢
CISA, EPA, FBI Publish Top Cyber Steps for Water System Operators
📢
[Control systems] CISA ICS security advisories (AV24-106)
📢
Ubuntu security advisory (AV23-107)
📢
Dell security advisory (AV24-108)
📢
Ubuntu security advisory (AV24-107)
📢
IBM security advisory (AV24-109)
📢
North Korean Group Seen Snooping on Russian Foreign Ministry
📢
The Unique Challenges of AI Risks - Padraic O'Reilly - BSW #339
🔥
FBI’s LockBit Takedown Postponed a Ticking Time Bomb in Fulton County, Ga.
🔥
Update: Sony Subsidiary Insomniac Games Alerts Employees Hit by Ransomware Data Breach
🔥
Businesses Increase Cybersecurity as Budgets Surge in 2024
🔥
Dormant PyPI Package Compromised to Spread Nova Sentinel Malware
🔥
Malawi Immigration Department Halts Services Amid Cyberattack
🔥
Ransomware Operation LockBit Relaunches Dark Web Leak Site
🔥
HHS Reaches Second-Ever Ransomware Settlement
🔥
Hackers Leak 2.5 Million Private Plane Owners’ Data Linked to LA International Airport Breach
🔥
Canada: RCMP Investigating Cyberattack as its Website Remains Down
🔥
230k Individuals Impacted By Data Breach At Australian Telco Tangerine
🔥
Lockbit Cybercrime Gang Says It Is Back Online Following Bust
🔥
Scattered Spider: Advanced Techniques for Launching High-Profile Attacks
🔥
HHS OCR Tells Congress it Needs More Funding for HIPAA Work
🔥
State-Sponsored Group Blamed for Change Healthcare Breach
🔥
LoanDepot Ransomware Attack Exposed 16.9 Million Individuals
🔥
Steel giant ThyssenKrupp confirms cyberattack on automotive division
🔥
Ransomware attack blamed for Change Healthcare outage stalling US prescriptions
🕵️
Utilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary], (Sun, Feb 25th)
🕵️
ISC Stormcast For Monday, February 26th, 2024 https://isc.sans.edu/podcastdetail/8868, (Mon, Feb 26th)
🕵️
HackerGPT – A ChatGPT-Powered AI Tool for Ethical Hackers & Cyber Security Community
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
SEO Poisoning to Domain Control: The Gootloader Saga Continues
🕵️
Accelerate 5G with AI-Powered Cybersecurity
🕵️
8220 Hacker Group Attacking Linux & Windows Users to Mine Crypto
🕵️
North Korean Hackers Targeting Developers with Malicious npm Packages
🕵️
Swiss Government Identified 10,000 Phishing Websites Impersonating 260 Brands
🕵️
North Korean Hackers Targeting Developers with Malicious npm Packages
🕵️
Beware That Anonymous Sudan Is Promoting A New DDoS Botnet
🕵️
New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT
🕵️
“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions of Malicious Emails
🕵️
Russian Cyberspies Targeting Cloud Infrastructure via Dormant Accounts
🕵️
Cyber Insights 2024: Artificial Intelligence
🕵️
Russian hackers shift to cloud attacks, US and allies warn
🕵️
It's now possible to find the AWS Account ID for any S3 Bucket (private or public)
🕵️
Privacy Watchdog Cracks Down on Biometric Employee Tracking
🕵️
Russian Threat Actor APT29 Pivots to the Cloud for Espionage
🕵️
From Indiana Jones to Cybersecurity: The Inspiring Journey of Devin
🕵️
How Application Performance Transformed into Application Security - Shibu George - BSW #339
🕵️
Microsoft Copilot for Security: The great equalizer for government security
🕵️
SSH Exec Rami Raulas Named Interim CEO in Finnish Shakeup
🕵️
Managing Supply Chain Risk - Saša Zdjelar - BTS #24
🌐
Cybersecurity Fears Drive a Return to On-Premise Infrastructure From Cloud Computing
🌐
Russian-Aligned Network Doppelgänger Targets German Elections
🌐
Banking Trojans Target Latin America and Europe Through Google Cloud Run
🌐
California AG Settles with DoorDash Over Selling Consumer Data Without Notice
🌐
Booking.com refund request? It might be an Agent Tesla malware attack
🌐
New IDAT loader version uses steganography to push Remcos RAT
📡
Earth Lusca Uses Geopolitical Lure to Target Taiwan Before Elections
📡
A New Age of Hacktivism
📡
Apple Unveils PQ3 Protocol - Post-Quantum Encryption for iMessage
📡
FTC to Ban Avast From Selling Browsing Data for Advertising Purposes
📡
Three Tips to Protect Your Secrets from AI Accidents
📡
Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers
📡
Hackers For Sale: What We Learned From China's Massive Cyber Leak
📡
US Leading Global Alliance To Counter Foreign Government Disinformation
📡
8,000+ Subdomains of Trusted Brands Hijacked for Massive Spam Operation
📡
Microsoft Releases PyRIT - A Red Teaming Tool for Generative AI
📡
Cybersecurity Training Not Sticking? How to Fix Risky Password Habits
📡
SubdoMailing campaign spams 5 million emails daily via 8k hijacked domains
📡
Hijacked subdomains of major brands used in massive spam campaign
📡
White House urges devs to switch to memory-safe programming languages
📡
10 things to avoid posting on social media – and why
📡
Looking Forward, Looking Back: A Quarter Century as a CISO
📡
Looking Forward, Looking Back: A Quarter Century as a CISO