117Articles
9Categories
2024-03-13Date
πŸ›
Magnet-Goblin Hackers AttackΒ Public Services Using 1-Day Exploits
πŸ›
ChatGPT-Next-Web SSRF Bug Let Hackers Gain Full Access to HTTP Endpoints
πŸ›
CVE-2024-21412: DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign
πŸ›
Attackers abuse cloud accounts to spawn thousands of crypto CDN nodes
⚠️
Microsoft's March Updates Fix 61 Vulnerabilities, Including Critical Hyper-V Flaws
⚠️
Google’s Gemini AI Vulnerability Lets Attackers Gain Control Over Users’ Queries
⚠️
What is SIEM? How to choose the right one for your business
⚠️
Microsoft March 2024 Patch Tuesday Fixes 60 Flaws, 18 RCE Bugs
⚠️
Anti-Fraud Project Boosts Security of African, Asian Financial Systems
⚠️
Researchers Highlight Google's Gemini AI Susceptibility to LLM Threats
⚠️
Never-before-seen Linux malware gets installed using 1-day exploits
⚠️
New Fortinet FortiOS Flaw Lets Attacker Execute Arbitrary Code
⚠️
BSides Calgary 2023 - 51 videos
⚠️
Ransomware Talent Surges to Akira After LockBit's Demise
⚠️
Microsoft reveals general availability of Copilot for Security
⚠️
Fortinet warns of critical RCE bug in endpoint management software
⚠️
SAFECOM and NCSWIC Develop 911 Cybersecurity Resource Hub
⚠️
Patch Now: Kubernetes RCE Flaw Allows Full Takeover of Windows Nodes
⚠️
Hackers abuse Windows SmartScreen flaw to drop DarkGate malware
⚠️
Hackers Hiding Keylogger, RAT Malware in SVG Image Files
⚠️
Hackers exploit Windows SmartScreen flaw to drop DarkGate malware
⚠️
How AI-Driven Hyperautomation Can Ease Alert Fatigue
⚠️
Enabling security defense at the speed of AI
πŸ“‹
March Patch Tuesday: Microsoft Fixes Two Critical Hyper-V Flaws
πŸ“‹
Chipmaker Patch Tuesday: Intel, AMD Address New Microarchitectural Vulnerabilities
πŸ“’
A Necessary Digital Odyssey of RPA and AI/ML at HUD
πŸ“’
A Necessary Digital Odyssey of RPA and AI/ML at HUD
πŸ“’
Google Chrome security advisory (AV24-141)
πŸ“’
White House Budget Proposal Seeks Cybersecurity Funding Boost
πŸ“’
Mitel security advisory (AV24-142)
πŸ“’
Europe’s World-First AI Rules Get Final Approval From Lawmakers. Here’s What Happens Next
πŸ“’
Cisco security advisory (AV24-143)
πŸ“’
Supply Chain Threats and Regulations - BTS #25
πŸ“’
EU Parliament Approves the Artificial Intelligence Act
πŸ“’
Experts Say CISA's Software Attestation Form Lacks Key Parts
πŸ“’
Feds Launch Investigation into Change Healthcare Attack
πŸ”₯
ClickASnap - 3,262,980 breached accounts
πŸ”₯
Update: Stanford Says Data From 27,000 People Leaked in September Ransomware Attack
πŸ”₯
Sharp Increase in Akira Ransomware Attack Following LockBit Takedown
πŸ”₯
Stanford University Hack Exposes Over 27K People’s Data
πŸ”₯
Update: LockBit Takes Credit for February Shutdown of South African Pension Fund
πŸ”₯
Hackers target Roku: 15,000 accounts compromised in data breach
πŸ”₯
Beware Of New Malicious PyPI Packages That Steal Wallet Passwords
πŸ”₯
LockBit ransomware affiliate gets four years in jail, to pay $860k
πŸ”₯
Acer Confirms Philippines Employee Data Leaked on Hacking Forum
πŸ”₯
Stanford University Data Breach Impacts 27,000 Individuals
πŸ”₯
Image-Based Phishing Tactics Evolve
πŸ”₯
Compromised Credentials Postings on the Dark Web Increase 20% in Just One Year
πŸ”₯
PixPirate Android Banking Trojan Using New Evasion Tactic to Target Brazilian Users
πŸ”₯
Healthcare’s Ransomware Epidemic: Why Cyberattacks Hit the Medical Sector With Alarming Frequency
πŸ”₯
Danchev's EXIF Analysis Of Conti Ransomware Gang Marketing Material
πŸ”₯
Stanford University Data Breach Impacts 27,000 Individuals
πŸ”₯
LockBit Ransomware Affiliate Sentenced to Prison in Canada
πŸ”₯
Billion-Dollar Boat Seller MarineMax Reports Cyberattack to SEC
πŸ”₯
Leak of Acer Philippines employee database appears on hacking forum
πŸ”₯
Canada Sentences LockBit Hacker Mikhail Vasiliev to 4 Years
πŸ”₯
Nominate your organization for the CSO50 Awards: Celebrating innovation in security
πŸ”₯
US govt probes if ransomware gang stole Change Healthcare data
πŸ”₯
The Concentrated Cyber Risk Posed by Enormous Vendors
πŸ•΅οΈ
Beware Of Disguised Adobe Reader Installer That Install Infostealer Malware
πŸ•΅οΈ
US Spearheads First UN Resolution on Artificial Intelligence
πŸ•΅οΈ
ISC Stormcast For Wednesday, March 13th, 2024 https://isc.sans.edu/podcastdetail/8892, (Wed, Mar 13th)
πŸ•΅οΈ
Google's Post-Quantum Upgrade Doesn't Mean We're All Protected Yet
πŸ•΅οΈ
Andariel Hackers Attacking Asset Management Companies to Inject Malicious Code
πŸ•΅οΈ
Using ChatGPT to Deobfuscate Malicious Scripts, (Wed, Mar 13th)
πŸ•΅οΈ
Major CPU, Software Vendors Impacted by New GhostRace Attack
πŸ•΅οΈ
Fortinet Patches Critical Vulnerabilities Leading to Code Execution
πŸ•΅οΈ
Burglars Using Wi-Fi Jammers to Disable Security Cameras
πŸ•΅οΈ
First-Ever South Korean National Detained for Espionage in Russia
πŸ•΅οΈ
US Seizes $1.4 Million in Cryptocurrency From Tech Scammers
πŸ•΅οΈ
Webinar Today: CISO Strategies for Boardroom Success
πŸ•΅οΈ
Rockwell Automation Hires Stephen Ford as Chief Information Security Officer
πŸ•΅οΈ
SAP Security: Code Injection & Other Vulnerabilities Patched
πŸ•΅οΈ
Let AI Handle the Heavy Lifting in the Modern SOC
πŸ•΅οΈ
ChatGPT Plugin Vulnerabilities Exposed Data, Accounts
πŸ•΅οΈ
Nozomi Networks Raises $100 Million to Expand Industrial Cybersecurity Business
πŸ•΅οΈ
AI-Driven Voice Cloning Tech Used in Vishing Campaigns
πŸ•΅οΈ
[Security Masterminds]Β The Art of Defending Against Social Engineering in the Age of AI: Insights from Rachel Tobac
πŸ•΅οΈ
What are You Working on Wednesday
πŸ•΅οΈ
US Intelligence Predicts Upcoming Cyber Threats for 2024
πŸ•΅οΈ
Tor’s New WebTunnel Bridges Mimic HTTPS Traffic to Evade Censorship
πŸ•΅οΈ
Report: Cloud Account Attacks Surged 16-Fold in 2023
πŸ•΅οΈ
ChatGPT vs. Gemini: Which Is Better for 10 Common Infosec Tasks?
πŸ•΅οΈ
Chinese Cybercrime: Discretion Is the Better Part of Valor
πŸ•΅οΈ
Schneider Electric and Mitsubishi Give Nozomi Networks $100M
πŸ•΅οΈ
Cloud Network Security with Agility and Scale on a Platform
πŸ•΅οΈ
Microsoft Copilot for Security is generally available on April 1, 2024, with new capabilities
🌐
Incognito Market: The not-so-secure dark web drug marketplace
🌐
Alert: Cybercriminals Deploying VCURMS and STRRAT Trojans via AWS and GitHub
🌐
Nozomi Networks Raises $100 Million to Help Secure Critical Infrastructure
🌐
Demystifying a Common Cybersecurity Myth
🌐
PixPirate Android malware uses new tactic to hide on phones
🌐
Cybercriminals Deploying VCURMS and STRRAT Trojans via AWS and GitHub
πŸŽ™οΈ
New phishing scam uses car insurance savings to lure victims: Cyber Security Today for Wednesday, March 13, 2024
πŸ“‘
Report: Over 12 Million Auth Secrets and Keys Leaked on GitHub in 2023
πŸ“‘
Italian Data Regulator Launches Probe Into OpenAI's Sora
πŸ“‘
Sophos named a Leader in the 2024 IDC MarketScape for Worldwide Modern Endpoint Security for Small Businesses
πŸ“‘
Join Our Webinar on Protecting Human and Non-Human Identities in SaaS Platforms
πŸ“‘
New Cloud Attack Targets Crypto CDN Meson Ahead of Launch
πŸ“‘
Third-party app stores are coming to iOS: should we brace for new threats? | Kaspersky official blog
πŸ“‘
Bitcoin Fog mixer operator convicted for laundering $400 million
πŸ“‘
DARPA Picks Seven Small Businesses for AI Cyber Challenge
πŸ“‘
New Attack Reveals the Inner Workings of OpenAI's and Google's Closed Models
πŸ“‘
Eye Security Raises $39 Million in Series B Funding
πŸ“‘
Over 2.3 Million Records of Family Entertainment Business Exposed in Data Leak
πŸ“‘
New Google Gemini Content Manipulation Vulns Found
πŸ“‘
Major CPU, Software Vendors Impacted By New GhostRace Attack
πŸ“‘
Researchers Jimmy OpenAI's And Google's Closed Models
πŸ“‘
FakeBat Delivered via Several Active Malvertising Campaigns
πŸ“‘
Spanish High Court Upholds Temporary Worldcoin Ban
πŸ“‘
Pen test vendor rotation: do you need to change annually?
πŸ“‘
Tweaks Stealer Targets Roblox Users Through YouTube and Discord
πŸ“‘
New Research Exposes Security Risks in ChatGPT Plugins
πŸ“‘
Will Cybersecurity Get Its 1st New Unicorn Since June 2022?
πŸ“‘
The Critical Role of Effective Onboarding
πŸ“‘
Windows 11 gets single Teams app for work and personal accounts
πŸ“‘
How to share sensitive files securely online