91Articles
9Categories
2024-03-04Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-21338 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability These types of vulnerabilities are frequent a…
KEV
πŸ›
Malicious email campaign steals NTLM hashes
πŸ›
Exploit available for new critical TeamCity auth bypass bug, patch now
πŸ›
ScreenConnect flaws exploited to drop new ToddleShark malware
πŸ›
ScreenConnect flaws exploited to drop new ToddlerShark malware
⚠️
New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID
⚠️
30 years of the CISO role – how things have changed since Steve Katz
⚠️
Multistage RA World Ransomware Uses Anti-AV Tactics, Exploits GPO
⚠️
Multistage RA World Ransomware Uses Anti-AV Tactics, Exploits GPO
⚠️
Meet Silver SAML: Golden SAML in the Cloud | Semperis
⚠️
US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp
⚠️
Hikvision Patches High-Severity Vulnerability in Security Management System
⚠️
Linux Foundation Tackles Financial Fraud With Open Source Platform
⚠️
CISO Tradecraft #171 - Navigating Software Supply Chain Security (with Cassie Crossley) - 47 minutes
⚠️
Cloudflare adds new WAF features to prevent hackers from exploiting LLMs
⚠️
How Cybercriminals are Exploiting India's UPI for Money Laundering Operations
⚠️
Secure by Design: Google’s Perspective on Memory Safety
KEV
⚠️
Microsoft: Look to Supply Chains, Zero Trust for AI Security
⚠️
How attackers leverage social engineering for greater scamming success
πŸ“’
Malicious Meeting Invite Fix Targets Mac Users
πŸ“’
[Control systems] CISA ICS security advisories (AV24-115)
πŸ“’
Mitel security advisory (AV24-114)
πŸ“’
Ukraine claims it hacked Russian Ministry of Defense servers
πŸ“’
Ubuntu security advisory (AV24-116)
πŸ“’
Update: Ivanti Disputes CISA Findings of Post-Factory Reset Hacking
πŸ“’
CISA Updates Toolkit to Promote Public Safety Communications and Cyber Resiliency
πŸ“’
Dell security advisory (AV24-117)
πŸ“’
Red Hat security advisory (AV24-118)
πŸ“’
Android security advisory – March 2024 Monthly Rollup (AV24-119)
πŸ“’
CISA and Partners Coordinate on Security and Resilience for Super Tuesday
πŸ“’
Security Starts At The Top as CISOs Struggle and NIST Updates the CSF - BSW #340
πŸ“’
The Convergence of Security, Compliance, and Risk - Igor Volovich - BSW #340
πŸ”₯
Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure
πŸ”₯
Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa
πŸ”₯
U.S. Charged Iranian Hacker, Rewards up to $10 Million
πŸ”₯
Report: Info-Stealers Target Stored Browser Credentials
πŸ”₯
New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials
πŸ”₯
Over 100 Malicious AI/ML Models Found on Hugging Face Platform
πŸ”₯
Cybercriminals Harness AI for New Era of Malware Development
πŸ”₯
Update: ALPHV Website Goes Down Amid Growing Fallout From Change Healthcare Attack
πŸ”₯
American Express credit cards exposed in vendor data breach
πŸ”₯
Ransomware Ban Backers Insist Thugs Must Be Cut Off From Payday
πŸ”₯
American Express Credit Cards Exposed in Vendor Data Breach
πŸ”₯
BlackCat ransomware turns off servers amid claim they stole $22 million ransom
πŸ”₯
American Express credit cards exposed in third-party data breach
πŸ”₯
Optum Offering Financial Aid to Some Providers Hit by Outage
πŸ”₯
Defend against human-operated ransomware attacks with Microsoft Copilot for Security​​
πŸ•΅οΈ
Capturing DShield Packets with a LAN Tap [Guest Diary], (Sun, Mar 3rd)
πŸ•΅οΈ
LoanDepot finally reveals what data was exposed in Jan hack
πŸ•΅οΈ
ISC Stormcast For Monday, March 4th, 2024 https://isc.sans.edu/podcastdetail/8878, (Mon, Mar 4th)
πŸ•΅οΈ
Eken Camera Doorbells Allow Ill-Intentioned Individuals to Spy on You
πŸ•΅οΈ
It’ll be back: Attackers still abusing Terminator tool and variants
πŸ•΅οΈ
LLM Prompt Injection Worm
πŸ•΅οΈ
FCC Employees Targeted in Sophisticated Phishing Attacks
πŸ•΅οΈ
Remote Stuxnet-Style Attack Possible With Web-Based PLC Malware: Researchers
πŸ•΅οΈ
Mentorship Monday - Discussions for career and learning!
πŸ•΅οΈ
Webinar Tomorrow: OT Cybersecurity Risk Mitigation Strategies
πŸ•΅οΈ
How Traffic, State, and Organizational Data Help Fortify Your Network
πŸ•΅οΈ
North Korea hacks two South Korean chip firms to steal engineering data
πŸ•΅οΈ
German Authorities Take Down β€˜Crimemarket’ Cybercrime Website
πŸ•΅οΈ
GUEST ESSAY: Essential cyber hygiene practices all charities must embrace to protect their donors
πŸ•΅οΈ
Pentagon Leaker Jack Teixeira Pleads Guilty Under a Deal That Calls for at Least 11 Years in Prison
πŸ•΅οΈ
Experts Warn of Risks in Memory-Safe Programming Overhauls
πŸ•΅οΈ
Mobile-Driven Phishing Spoofs FCC, Cryptocurrency Giants
πŸ•΅οΈ
Defending Operational Technology Environments: Basics Matter
πŸ•΅οΈ
German Police Shut Underground Crimemarket Forum
πŸ•΅οΈ
Rights Groups Call Out Shortcomings in EU Convention on AI
πŸ•΅οΈ
Microsoft Secure: Learn expert AI strategy at our online event
🌐
Researchers Spot New Infrastructure Likely Used for Predator Spyware
🌐
New Wave of SocGholish Infections Impersonates WordPress Plugins
🌐
U.S. Judge Ordered NSO Group to Hand Over the Pegasus Spyware Code to WhatsApp
🌐
Remote Stuxnet Style Attack Possible With Web Based PLC Malware
🌐
GTPDOOR - A Novel Backdoor Tailored For Covert Access Over The Roaming Exchange
🌐
AppSec Survey Reveals Troubling Trends
🌐
Hackers steal Windows NTLM authentication hashes in phishing attacks
πŸŽ™οΈ
Cyber Security Today, March 4, 2024 - A hacker is trying to trick the U.S. telecom regulator, WhatsApp gets to see Pegasus code and more
πŸ“‘
US Coast Guard Expands Cyber Command to Combat New Threats
πŸ“‘
U.S. Authorities Charged an Iranian National for Long-Running Hacking Campaign
πŸ“‘
From 500 to 5000 Employees - Securing 3rd Party App-Usage in Mid-Market Companies
πŸ“‘
NTT Boss Takes Early Retirement to Atone for Data Leak
πŸ“‘
German Authorities Take Down Crimemarket Cybercrime Website
πŸ“‘
Researchers Create AI Worms That Can Spread From One System To Another
πŸ“‘
Hikvision Patches Vuln In Security Management System
πŸ“‘
Should we ban ransom payments?
πŸ“‘
Silence Laboratories, a Cryptographic Security Startup, Secures Funding
πŸ“‘
Apple blames Spotify for $1.95 billion fine over "abusive" App store rules
πŸ“‘
Are You as Competent as You Think You Are?
πŸ“‘
2024 State of Digital Trust: Unlocking Cybersecurity Insights from Global Leaders
πŸ“‘
Cyber security tips for remote work - ITSAP.10.116
πŸ“‘
Why Signal β€˜turned our architecture inside out’ for its latest privacy feature
πŸ“‘
Elon Musk switched on X calling by default: Here’s how to switch it off