82Articles
8Categories
2024-03-15Date
๐Ÿ›
Hackers Exploit Windows SmartScreen Vulnerability to Install DarkGate Malware
๐Ÿ›
Researchers Disclose Proof of Concept for New GhostRace Attack
๐Ÿ›
PoC for Critical Arcserve UDP Vulnerabilities Published
๐Ÿ›
DarkGate Campaign Leverages Windows SmartScreen Bypass Flaw
๐Ÿ›
GhostRace โ€“ New Data Leak Vulnerability Affects Modern CPUs
โš ๏ธ
5Ghoul Revisited: Three Months Later, (Fri, Mar 15th)
โš ๏ธ
Redefining multifactor authentication: Why we need passkeys
โš ๏ธ
SIM Swappers Hijacking Phone Numbers in eSIM Attacks
โš ๏ธ
Critical ChatGPT Plugins Flaw Let Attackers Gain Control Over Organizationโ€™s Account
โš ๏ธ
WEF Effort to Disrupt Cybercrime Moves Into Operations Phase
โš ๏ธ
Cisco Fixed High-Severity Elevation of Privilege and DoS Bugs
โš ๏ธ
New DOD Cyber Policy Office Opening Soon, Sources Say
โš ๏ธ
Improving C++
โš ๏ธ
Discontinued Security Plugins Expose Many WordPress Sites to Takeover
โš ๏ธ
Multistage RA World Ransomware Exploits Group Policy Infrastructure
โš ๏ธ
How Wi-Fi WPA2 is hacked using PMKID interception | Kaspersky official blog
โš ๏ธ
Alabama Suffered DDoS Cyberattack by Pro-Russian Hacker Group
โš ๏ธ
Change Healthcare Locates Ransomware Attack Vector
โš ๏ธ
Sophos: Over 75% of Cyber Incidents Target Small Businesses
โš ๏ธ
Addressing Identity-Related Threats in 2024 - Rod Simmons - ESW #353
โš ๏ธ
MobSF: Open-Source Security Research Platform for Mobile Apps
โš ๏ธ
Ransomware Groups' Data Leak Blogs Lie: Stop Trusting Them
โš ๏ธ
McDonald's: Global outage was caused by "configuration change"
โš ๏ธ
IMF probing cyber security incident, source says no top managers affected
โš ๏ธ
International Monetary Fund email accounts hacked in cyberattack
โš ๏ธ
New knowledge base compiles Microsoft Configuration Manager attack techniques
โš ๏ธ
Illicit Credentials Marketplace Admin Gets 42-Month Sentence
โš ๏ธ
Healthcare still a prime target for cybercrime gangs โ€“ Week in security with Tony Anscombe
๐Ÿ“ข
In Other News: CISA Hacked, Chinese Lock Backdoors, Exposed Secrets
๐Ÿ“ข
HPE security advisory (AV24-144)
๐Ÿ“ข
Microsoft Edge security advisory (AV24-145)
๐Ÿ“ข
ISMG Editors: Inside the Politics of US Cybersecurity
๐Ÿ“ข
Pressure Mounts on Meta to Scrap 'Pay or OK' Model in EU
๐Ÿ”ฅ
Hackers Claim 740GB of Data Stolen from Viber VOIP Platform
๐Ÿ”ฅ
43 Million Possibly Impacted by French Government Agency Data Breach
๐Ÿ”ฅ
Most Widely Distributed Ransomware Now Evades Detection
๐Ÿ”ฅ
Third-Party ChatGPT Plugins Could Lead to Account Takeovers
๐Ÿ”ฅ
Scottish Health Service Says โ€˜Focused and Ongoing Cyber Attackโ€™ May Disrupt Services
๐Ÿ”ฅ
Member Of LockBit Ransomware Group Sentenced To 4 Years In Prison
๐Ÿ”ฅ
Threat Actors are Turning to Novel Malware as Malicious Attacks Rise
๐Ÿ”ฅ
Admin of major stolen account marketplace gets 42 months in prison
๐Ÿ”ฅ
How to verify a data breach
๐Ÿ”ฅ
Transforming a Cyber Program in the Aftermath of an Attack
๐Ÿ•ต๏ธ
ISC Stormcast For Friday, March 15th, 2024 https://isc.sans.edu/podcastdetail/8896, (Fri, Mar 15th)
๐Ÿ•ต๏ธ
RedCurl Group Leverages Windows Component for Cyber Espionage
๐Ÿ•ต๏ธ
Google Chrome to Roll Out Real-time Phishing Protection
๐Ÿ•ต๏ธ
teissPodcast: Is your organisation cyber resilient? - 44 minutes
๐Ÿ•ต๏ธ
Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate
๐Ÿ•ต๏ธ
RedLine Malware Tops Charts by Hijacking 170M+ Passwords in the Last 6 Months
๐Ÿ•ต๏ธ
Tech Support Firms Agree to $26M FTC Settlement Over Fake Services
๐Ÿ•ต๏ธ
Fortinet FortiWLM Deep-Dive, IOCs, and the Almost Story of the "Forti Forty"
๐Ÿ•ต๏ธ
Cisco fixed high-severity elevation of privilege and DoS bugs
๐Ÿ•ต๏ธ
Increase in the number of phishing messages pointing to IPFS and to R2 buckets - SANS Internet Storm Center
๐Ÿ•ต๏ธ
If Social Engineering Accounts for up to 90% of Attacks, Why Is It Ignored?
๐Ÿ•ต๏ธ
Will AI allow us to finally scale vuln mgmt and threat detection? - ESW #353
๐Ÿ•ต๏ธ
Codezero Raises $3.5 Million for DevOps Security Solution
๐Ÿ•ต๏ธ
Cynicism, TikTok, Redline, Securam, Ghostrace, eSim Swaps, Aaran Leyland, and More - SWN #369
๐Ÿ•ต๏ธ
Why DDoS Threat Actors Are Shifting Their Tactics
๐Ÿ•ต๏ธ
Friday Squid Blogging: Operation Squid
๐Ÿ•ต๏ธ
AI-Led Edge Computing Spends to Reach $350B Soon
๐Ÿ•ต๏ธ
Pentagon Appoints New Chief Artificial Intelligence Officer
๐ŸŒ
Malicious Ads Targeting Chinese Users with Fake Notepad++ and VNote Installers
๐ŸŒ
FTC Investigation Shuts Down Suspected Antivirus Scam
๐ŸŒ
Scareware scam: Restoro and Reimage fined $26 million by FTC
๐ŸŽ™๏ธ
Kubernetes bug allows remote execution in Windows nodes: Cyber Security Today for Friday, March 15, 2024
๐Ÿ“ก
Google Introduces Enhanced Real-Time URL Protection for Chrome Users
๐Ÿ“ก
New Report Suggests Surge in SaaS Assets, Employee Data Sharing
๐Ÿ“ก
TikTok Faces US Ban as House Votes to Compel ByteDance to Sell
๐Ÿ“ก
FCC Adopts Voluntary โ€˜Cyber Trust Markโ€™ Labeling Rule for IoT Devices
๐Ÿ“ก
Google Safe Browsing Makes Real-Time Protection Private
๐Ÿ“ก
McDonald's IT systems outage impacts restaurants worldwide
๐Ÿ“ก
Why Does The US Want To ban TikTok, And When Could It Happen?
๐Ÿ“ก
Discontinued Security Plugins Expose Many WordPress Sites To Takeover
๐Ÿ“ก
Banish OEM Self-Signed Certs And Roll Your Own LetsEncrypt
๐Ÿ“ก
Cop Shop Rapped For Completely Avoidable Web Form Blunder
๐Ÿ“ก
Former telecom manager admits to doing SIM swaps for $1,000
๐Ÿ“ก
Why Are There Fewer Women Than Men in Cybersecurity?
๐Ÿ“ก
Microsoft announces Office LTSC 2024 preview starting next month
๐Ÿ“ก
PornHub now also blocks Texas over age verification laws
๐Ÿ“ก
US moves to recover $2.3 million from "pig butchers" on Binance
๐Ÿ“ก
Protecting Medical Devices Against Future Cyberthreats
๐Ÿ“ก
Why Wiz Wants to Buy Cloud Startup Gem Security for $350M