108Articles
8Categories
2024-02-28Date
🐛
WordPress LiteSpeed Plugin Vulnerability Puts Five Million Sites at Risk
🐛
Ads for Zero-Day Exploit Sales Surge 70% Annually
🐛
Update: Black Basta, Bl00dy Ransomware Gangs Join ScreenConnect Attacks
🐛
CVE-2024-21626 GitHub: CVE-2024-21626 Container breakout through process.cwd trickery and leaked fds
⚠️
Russia’s use of malware to enhance election influence operations sign of things to come
⚠️
Cybersecurity Agencies Warn Ubiquiti EdgeRouter Users of APT28's MooBot Threat
⚠️
Beware of Typos that May lead to malicious PyPI Package Installation
⚠️
Hacking Terraform state to gain code execution and privilege escalation
⚠️
US healthcare alerted against BlackCat amid targeted attacks
KEV
⚠️
Pharmaceutical Giant Cencora Says Data was Stolen in a Cyberattack
⚠️
US Agencies Warn of ALPHV/Blackcat Ransomware Threat to Healthcare Providers
⚠️
The death of the CIO
⚠️
Hackers Using Weaponized PDF Files To Kickstart Infection Chain
⚠️
Exploit Attempts for Unknown Password Reset Vulnerability, (Wed, Feb 28th)
⚠️
Cyber Insights 2024: APIs – A Clear, Present, and Future Danger
⚠️
Lazarus hackers exploited Windows zero-day to gain Kernel privileges
⚠️
Credential Theft Is Mostly Due To Phishing
⚠️
LockBit ransomware returns to attacks with new encryptors, servers
⚠️
CISA Releases Resource Guide for University Cybersecurity Clinics
⚠️
How to interpret the MITRE Engenuity ATT&CK® Evaluations: Enterprise
⚠️
Biden order bars data broker sale of Americans’ sensitive data to adversaries
⚠️
Three new advanced threat groups targeted industrial organizations last year
⚠️
Chinese Group Runs Highly Persistent Ivanti 0-Day Exploits
⚠️
Vulnerabilities in business VPNs under the spotlight
📢
NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure - Help Net Security
📢
Building Your Privacy-Compliant Customer Data Platform (CDP) with First-Party Data
📢
Biden Executive Order Targets Bulk Data Transfers to China
📢
Updates on NIST’s Interagency International Cybersecurity Standardization Working Group
📢
NIST Releases Version 2.0 of Landmark Cybersecurity Framework
📢
FBI Warns U.S. Healthcare Sector of Targeted BlackCat Ransomware Attacks
📢
FBI, CISA warns Of ALPHV Blackcat Ransomware Attacking Hospitals
📢
Japan warns of malicious PyPi packages created by North Korean hackers
📢
Top 3 NIST Cybersecurity Framework 2.0 Takeaways
📢
White House to Issue Executive Order on Personal Information Protection
📢
Google Chrome security advisory (AV24-110)
📢
CISA Publishes Guide to Support University Cybersecurity Clinics
📢
Cisco security advisory (AV24-111)
📢
New executive order bans mass sale of personal data to China, Russia
🔥
Tangerine - 243,462 breached accounts
🔥
UAC-0184 Targets Ukrainian Entity in Finland with Remcos RAT
🔥
67K Customers Impacted by Data Breach, According to U-Haul
🔥
Cathy Ullman: The Power of Active Defense. Interview by Phillip Wylie
🔥
medQ Confirms Data Breach After Software Encryption Incident
🔥
CFOs Take Backseat to CISOs on SEC Cyber Rules
🔥
Akira Ransomware Group Threatens to Leak Stolen Data from Swedish Municipality
🔥
LoanDepot January Hack: 16.9M Individuals Data Exposed
🔥
Germany's Hessen Consumer Center Says Systems Encrypted by Ransomware
🔥
A Cyber Insurance Backstop
🔥
Russia and Belarus Targeted by at Least 14 Nation-State Hacker Groups, Researchers Say
🔥
US Government Urges Cleanup of Routers Infected by Russia’s APT28
🔥
Cyber Security Today, Feb. 28, 2024 - Thousands of subdomains abused for phishing, the latest ransomware news and more
🔥
Hackers Steal Personal Information From Pharma Giant Cencora
🔥
Researchers Uncover Tools And Tactics Used By Chinese Hackers
🔥
Today’s Attack Trends — Unit 42 Incident Response Report
🔥
Epic Games: "Zero evidence" we were hacked by Mogilevich gang
🔥
Update: Ransomware Gang Seeks $3.4 Million After Attacking Children’s Hospital
🔥
Anycubic users say their 3D printers were hacked to warn of a security flaw
🔥
Matthew Perry’s Twitter account hacked by cryptocurrency scammers
🔥
New Research: Ransomware Incidents Spike 84% in 2023
🔥
Ransomware gang claims they stole 6TB of Change Healthcare data
🔥
Rhysida ransomware wants $3.6 million for children’s stolen data
🔥
Anycubic 3D printers hacked worldwide to expose security flaw
🔥
Cutout.Pro - 19,972,829 breached accounts
🔥
BlackCat Pounces on Health Sector After Federal Takedown
🕵️
ISC Stormcast For Wednesday, February 28th, 2024 https://isc.sans.edu/podcastdetail/8872, (Wed, Feb 28th)
🕵️
Russian Hackers Hijack Ubiquiti Routers To Launch Stealthy Attacks - RedPacket Security
🕵️
TimbreStealer Malware Spreading via Tax-themed Phishing Scam Targets IT Users
🕵️
Hackers Advertising New Version Of WarZone RAT On Hacking Forums
🕵️
Is XDR Enough? The Hidden Gaps in Your Security Net
🕵️
Chinese Cyberspies Use New Malware in Ivanti VPN Attacks
🕵️
Intel Core Ultra vPro Platform Brings New Security Features
🕵️
What are You Working on Wednesday
🕵️
Cybersecurity Agencies Warn Ubiquiti EdgeRouter Users of APT28's MooBot Threat
🕵️
AMOS macOS Stealer Steals Particular Files on the System & Browser Data
🕵️
Researchers Exposed Predator Spyware Infrastructure & Domains Associated
🕵️
Savvy Seahorse gang uses DNS CNAME records to power investor scams
🕵️
US Bans Trading With Canadian Network Intelligence Firm Sandvine
🕵️
Iran-Linked UNC1549 Hackers Target Middle East Aerospace & Defense Sectors
🕵️
Russian Cyberespionage Group APT29 Targeting Cloud Vulnerabilities
🕵️
When Threat Actors Don’t Have a Viable Email Platform to Phish From, They Just Steal Yours
🕵️
Mitigating attacks based on knowing the length of a Windows Hello PIN - The Old New Thing
🕵️
Phishing Campaign Targets Mexican Taxpayers With Tax-Themed Lures
🕵️
Game-Changer: Biometric-Stealing Malware
🕵️
Down, Not Out: Russian Hacktivists Claiming DDoS Disruptions
🕵️
Banks Use Behavioral Analytics to Tackle First-Party Fraud
🌐
Online Travelers at Risk: Agent Tesla Malware Attacks Travel Industry
🌐
TimbreStealer Campaign Targets Mexican Users with Financial Lures
🌐
Calendar Meeting Links Used to Spread Mac Malware
🌐
Malicious AI models on Hugging Face backdoor users’ machines
🎙️
Transatlantic Cable podcast episode 335 | Kaspersky official blog
📡
Using AI to Reduce False Positives in Secrets Scanners
📡
Unmanaged Third-Party Access Threatens OT Environments
📡
Superusers Need Super Protection: How to Bridge Privileged Access Management and Identity Management
📡
Registrars can now block all domains that resemble brand names
📡
Meta to Assign Special Teams in Europe to Fight Election Disinformation, AI Abuse
📡
Enterprises’ Progress in Digital Trust Implementation is Far From Great
📡
VoltSchemer: attacks on wireless chargers through the power supply | Kaspersky official blog
📡
Malicious Code in Tornado Cash Governance Proposal Puts User Funds at Risk
📡
LabHost Cybercrime Service Lets Anyone Phish Canadian Bank Users
📡
Need to Know: Key Takeaways from the Latest Phishing Attacks
📡
HSCC Issues Cyber 'Call to Action' Plan for Health Sector
📡
Intel Core Ultra vPro Platform Brings New Security Features
📡
Hackers Steal Personal Information From Pharma Giant Cencora
📡
US Bans Trading With Canadian Network Intelligence Firm Sandvine
📡
OpenAI Accuses NYT Of Hacking ChatGPT To Set Up Copyright Suit
📡
Kali Linux 2024.1 released with 4 new tools, UI refresh
📡
Has the US Created the Wrong War Machine?
📡
What EU Antitrust Probe Around Entra ID Means for Microsoft