14Articles
8Categories
2024-03-09Date
🚨
CISA Adds Apple iOS and iPadOS Memory Corruption Bugs to its Known Exploited Vulnerabilities CatalogThese memory corruption vulnerabilities, tracked as CVE-2024-23225 and CVE-2024-23296, were exploited in attacks against iPhone devices. Apple released emergency security updates to address these zero-day vulnerabilities.
KEV
🐛
Canva Warns of Three Security Vulnerabilities in Fonts
⚠️
Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets
⚠️
New Malware Campaign Found Exploiting Stored XSS in Popup Builder
⚠️
Getting Started with Industrial (ICS/OT) Cyber Security - 20+ Hours - Full Course by Mike Holcomb
⚠️
NSA Releases Top Ten Best Practices For Cloud Environments
⚠️
Russian state-sponsored hackers compromised Microsoft source code repositories
🔥
APK.TW - 2,451,197 breached accounts
🔥
As the Change Healthcare outage drags on, fears grow that patient data could spill online
🔥
Magnet Goblin hackers use 1-day flaws to drop custom Linux malware
🕵️
A technical analysis of the APT28's backdoor called OCEANMAP
🌐
Tycoon and Storm-1575 Linked to Phishing Attacks on US Schools
🎙️
Adam Evans, CISO at RBC: Cybersecurity Today Weekend Show
📡
Flaws in Public Records Management Tool Could Let Hackers Nab Sensitive Data Linked to Requests