117Articles
8Categories
2024-03-21Date
🐛
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
🐛
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
🐛
UDP-based network communications face critical denial-of-service attacks
🐛
Microsoft Patches Xbox Vulnerability Following Public Disclosure
🐛
Ivanti Releases Security Updates for Neurons for ITSM and Standalone Sentry
🐛
Exploiting GLPI during a Red Team engagement
🐛
A Dive into Vulnerabilities and Compliance - PSW #821
KEV
🐛
NIST's Vuln Database Downshifts, Prompting Questions About Its Future
⚠️
Windows 11, Tesla, and Ubuntu Linux hacked at Pwn2Own Vancouver
⚠️
Surviving the “Quantum Apocalypse” With Fully Homomorphic Encryption
⚠️
White House and EPA Warn of Hackers Breaching Water Systems
⚠️
Study: Cybersecurity burnout impacts 88% of cybersecurity and IT roles in Singapore. What can you do as an MSP to help?
⚠️
Recent Windows Server Updates Trigger Domain Controller Reboots & Crash
⚠️
Authorities Dismantle Grandoreiro Banking Malware Operation
⚠️
Why more women aren’t CISOs and how to change that
⚠️
Using MITRE ATT&CK Framework to Thwart Active Adversaries
⚠️
OPM Pitches Congress on a Federal Cyber Workforce Revamp
⚠️
Androxgh0st Exploits SMTP Services to Extract Critical Data
⚠️
Ukrainian Police Arrest Suspected Brute Force Account Hijackers
⚠️
New Application-Layer Loop DoS Attack – 300,000 Online Systems At Risk
⚠️
North Korea’s Kimsuky Group Equipped to Exploit Windows Help files
⚠️
Spa Grand Prix Email Account Hacked to Phish Banking Information From Fans
⚠️
Ivanti Urges Customers to Fix Critical RCE Flaw in Standalone Sentry
⚠️
CISA, FBI, and MS-ISAC Release Update to Joint Guidance on Distributed Denial-of-Service Techniques
⚠️
Vulnerability Allowed One-Click Takeover of AWS Service Accounts
⚠️
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
⚠️
Microsoft Patches Xbox Vulnerability Following Public Disclosure
⚠️
It's 2024 And North Korea's Kimsuky Gang Is Exploiting Windows Help Files
⚠️
Vulnerability Allowed One-Click Takeover Of AWS Service Accounts
⚠️
CISA Releases One Industrial Control Systems Advisory
⚠️
Critical Flaw in Atlassian Bamboo Data Center and Server Must Be Fixed Immediately
⚠️
Over 800 npm Packages Found with Discrepancies, 18 Exploitable to 'Manifest Confusion'
⚠️
Exploit released for Fortinet RCE bug used in attacks, patch now
KEV
⚠️
Securing All The Things - Josh Corman - PSW #821
⚠️
Water Sector Lacks Support to Meet White House Cyber Demands
⚠️
New phishing campaign targets US organizations with NetSupport RAT
⚠️
Ivanti Keeps Security Teams Scrambling With 2 More Vulns
⚠️
Denial-of-Service Attack Could Put Servers in Perpetual Loop
⚠️
UK Official: AI in Defense Sector Is Not About Killer Robots
📋
Microsoft confirms Windows Server issue behind domain controller crashes
📢
CISA Recommends Continuous Cybersecurity Training
📢
Risk and Regulation: Preparing for the Era of Cybersecurity Compliance
📢
Tax Hackers Blitz Small Business With Phishing Emails
📢
New Bipartisan Bill Would Require Online Identification, Labeling of AI-Generated Videos and Audio
🔥
Smashing Security podcast #364: Bing pop-up wars, and the British Library ransomware scandal
🔥
Vans warns customers of fraud risk after data breach
🔥
Hackers Claimed to have Breached the Israeli Nuclear Facility’s Networks
🔥
'Fluffy Wolf' Spreads Meta Stealer in Corporate Phishing Campaign
🔥
Hackers Claim to Have Breached Israeli Nuclear Facility’s Computer Network
🔥
Hackers Posing as Law Firms Phish Global Orgs
🔥
How I got started: Ransomware negotiator
🔥
Hacker Pleads Guilty For Stealing 132,000+ Users Data
🔥
Nemesis Market: Leading Darknet Market Seized
🔥
What the Latest Ransomware Attacks Teach About Defending Networks
🔥
Ransomware, RATs, And More Deployed On Compromised TeamCity Servers
🔥
Ransomware Group “RA World” Changes Its’ Name and Begins Targeting Countries Around the Globe
🔥
OnDemand | Identity Under Siege in the EU: How to Combat Data Breaches with Proactive Measures
🔥
Russia Hackers Using TinyTurla-NG to Breach European NGO's Systems
🔥
International Freight Tech Firm Isolates Canada Operations After Cyberattack
🔥
Breach Roundup: Flipper Pushes Back on Proposed Canada Ban
🔥
Revenue Cycle Firm Settles GitHub PHI Breach Lawsuit for $7M
🔥
Cryptohack Roundup: Ray Eviscerates Bankman-Fried
🔥
How Microsoft Incident Response and Microsoft Defender for Identity work together to detect and respond to cyberthreats
🕵️
ISC Stormcast For Thursday, March 21st, 2024 https://isc.sans.edu/podcastdetail/8904, (Thu, Mar 21st)
🕵️
GitHub’s New AI Tool that Fixes Your Code Automatically
🕵️
$200,000 Awarded at Pwn2Own 2024 for Tesla Hack
🕵️
Public AI as an Alternative to Corporate AI
🕵️
GitHub Rolls Out ‘Code Scanning Autofix’ in Public Beta
🕵️
The most prevalent malware behaviors and techniques - Help Net Security
🕵️
[Heads-Up] Phishing Campaign Delivers VCURMS RAT
🕵️
A Decade of Trust — Meeting the Needs of the DoD
🕵️
Ivanti Patches Critical Vulnerabilities in Standalone Sentry, Neurons for ITSM
🕵️
A Recognized Leader in SSE
🕵️
House Passes Bill Barring Sale of Personal Information to Foreign Adversaries
🕵️
Tarsal Raises $6 Million for Security Data Movement Platform
🕵️
Social Engineering The #1 Root Cause Behind Most Cyber Crimes In FBI Report
🕵️
Dymium Snags $7M to Build Data Security Platform with Secure AI Chat
🕵️
Microsoft Warns of New Tax Returns Phishing Scams Targeting You
🕵️
Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention
🕵️
Sign1 Malware: Analysis, Campaign History & Indicators of Compromise
🕵️
Synopsys Greenlights Sale of $525M Application Security Unit
🕵️
Proof of Concept: Opening Up the AI 'Black Box'
🕵️
Lost Crypto Wallet? New Firm Promises Ethical, Transparent and Inexpensive Recovery
🕵️
AI Is Making Payment Fraud Better, Faster and Easier
🕵️
UN Adopts US-Led International AI Safety Resolution
🕵️
Apple Sued for Prioritizing Market Dominance Over Security
🌐
Russia-Linked Hackers Use Smokeloader Malware to Steal Funds From Ukrainian Enterprises
🌐
Hackers Posing as Law Firms Phish Global Organizations
🌐
How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl
🌐
The Most Prevalent Malware Behaviors and Techniques
🌐
Evasive Sign1 malware campaign infects 39,000 WordPress sites
🌐
India's Android Users Hit by Malware-as-a-Service Campaign
🌐
What commercial spyware is, and what different types there are | Kaspersky official blog
📡
The Not-so-True People-Search Network from China
📡
Tracker Backtrack? Feds Revise HIPAA Guidance on Web Tools
📡
U.S. Sanctions Russians Behind 'Doppelganger' Cyber Influence Campaign
📡
Making Sense of Operational Technology Attacks: The Past, Present, and Future
📡
Regulatory Measures Boost Cybersecurity Industry
📡
Serial Data Thief Pleads Guilty to Cybercrime Charges
📡
GitHub Launches AI-Powered Autofix Tool to Assist Devs in Patching Security Flaws
📡
The best free Syslog servers
📡
The best network monitoring tools
📡
The best RMM software
📡
Report: Growing AceCryptor Attacks in Europe
📡
Australian Techie Jailed for Stealing From Museum
📡
DOT to investigate data security and privacy practices of top US airlines
📡
Protecting Model Updates in Privacy-Preserving Federated Learning
📡
New ‘Loop DoS’ Attack May Impact up to 300,000 Online Systems
📡
$200,000 Awarded At Pwn2Own 2024 For Tesla Hack
📡
Exposed: Chinese Smartphone Farms That Run Thousands Of Barebone Mobes To Do Crime
📡
Sports Day Scores a Hit
📡
Fake Obituary Sites Send Grievers to Adult Sites and Scareware Pages
📡
Whois "geofeed" Data, (Thu, Mar 21st)
📡
Unsaflok flaw can let hackers unlock millions of hotel doors
📡
KDE advises extreme caution after theme wipes Linux user's files
📡
Windows 11 Notepad finally gets spellcheck and autocorrect
📡
Nothing Scares the PRC More Than a Russian Defeat in Ukraine