77Articles
8Categories
2024-03-27Date
๐Ÿ›
CISA Warns: Hackers Actively Attacking Microsoft SharePoint Vulnerability
KEV
๐Ÿ›
Apple Released Security Updates for Safari and macOS
๐Ÿ›
Chromium: CVE-2024-2883 Use after free in ANGLE
๐Ÿ›
Chromium: CVE-2024-2885 Use after free in Dawn
๐Ÿ›
Chromium: CVE-2024-2886 Use after free in WebCodecs
๐Ÿ›
Chromium: CVE-2024-2887 Type Confusion in WebAssembly
๐Ÿ›
Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers
๐Ÿ›
CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability
โš ๏ธ
Security Vulnerability in Saflokโ€™s RFID-Based Keycard Locks
โš ๏ธ
Cyber Security Today, March 27, 2024 - A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from open source repositories
โš ๏ธ
Google fixes Chrome zero-days exploited at Pwn2Own 2024
โš ๏ธ
CISA tags Microsoft SharePoint RCE bug as actively exploited
KEV
โš ๏ธ
Google: Spyware vendors behind 50% of zero-days exploited in 2023
โš ๏ธ
Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own
โš ๏ธ
Google Report: Despite Surge in Zero-Day Attacks, Exploit Mitigations Are Working
โš ๏ธ
Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters
โš ๏ธ
Hackers Hit Indian Defense, Energy Sectors with Malware Posing as Air Force Invite
โš ๏ธ
Microsoft Edge Bug Could Have Allowed Attackers to Silently Install Malicious Extensions
โš ๏ธ
Critical Unpatched Ray AI Platform Vulnerability Exploited for Cryptocurrency Mining
โš ๏ธ
Fortinet FortiClient EMS SQL Injection Flaw Exploited In The Wild
KEV
โš ๏ธ
Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year
โš ๏ธ
Ray AI Framework Vulnerability Exploited To Hack Hundreds Of Clusters
โš ๏ธ
Software supply chain attack impacts repo of large Discord bot community
โš ๏ธ
Donโ€™t let microbranch security be your networkโ€™s weak link
โš ๏ธ
For the hybrid workforce, SASE-delivered zero trust is a must
โš ๏ธ
Telesign launches integrated API to combine traditional identity verification channels
โš ๏ธ
Who owns your data? SaaS contract security, privacy red flags
โš ๏ธ
Risky business: 6 steps to assessing cyber risk for the enterprise
โš ๏ธ
knowing when to trust a login page on a Cloudflare site
โš ๏ธ
TA577 Assault: New Attack Exploiting NTLM Vulnerability | Proofpoint US
โš ๏ธ
Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques
๐Ÿ“ข
CISA Marks Important Milestone in Addressing Cyber Incidents; Seeks Input on CIRCIA Notice of Proposed Rulemaking
๐Ÿ“ข
Leaked Documents Reveal Australia Targeted by Chinese APT31 Hackers
๐Ÿ“ข
BBC R4 Analysis - How real is the existential threat from AI? - 30 minutes
๐Ÿ”ฅ
INC Ransom threatens to leak 3TB of NHS Scotland stolen data
๐Ÿ”ฅ
Ransomware as a Service and the Strange Economics of the Dark Web
๐Ÿ”ฅ
Two Chinese APT Groups Ramp Up Cyber Espionage Against ASEAN Countries
๐Ÿ”ฅ
Ransomware hits The Big Issue. Qilin group leaks confidential data
๐Ÿ”ฅ
Trezorโ€™s Twitter account hijacked by cryptocurrency scammers via bogus Calendly invite
๐Ÿ”ฅ
GSM Hosting - 2,607,440 breached accounts
๐Ÿ•ต๏ธ
KuCoin charged with AML violations that let cybercriminals launder billions
๐Ÿ•ต๏ธ
Finnish Police Linked APT31 to the 2021 Parliament Attack
๐Ÿ•ต๏ธ
Two Chinese APT Groups Found Targeting ASEAN Entities
๐Ÿ•ต๏ธ
Code Execution Flaws Haunt NVIDIA ChatRTX for Windows
๐Ÿ•ต๏ธ
VPN Apps on Google Play Turn Android Devices Into Proxies
๐Ÿ•ต๏ธ
ISC Stormcast For Wednesday, March 27th, 2024 https://isc.sans.edu/podcastdetail/8912, (Wed, Mar 27th)
๐Ÿ•ต๏ธ
The Number of New Pieces of Malware Per Minute Has Quadrupled in Just One Year
๐Ÿ•ต๏ธ
A Simple 'Payment is Underway' Phishing Email Downloads RATs from AWS, GitHub
๐Ÿ•ต๏ธ
[SCARY] Research Shows Weaponized GenAI Worm That Gets Distributed Via A Zero Click Phishing Email
๐Ÿ•ต๏ธ
Chinese Hackers Attacking Southeast Asian Nations With Malware Packages
๐Ÿ•ต๏ธ
Microsoft Expands Edge Bounty Program to Include WebView2!
๐Ÿ•ต๏ธ
Beware of Free Android VPN Apps that Turn Your Device into Proxies
๐Ÿ•ต๏ธ
ZENHAMMER โ€“ First Rowhammer Attack Impacting Zen-based AMD Platforms
๐Ÿ•ต๏ธ
Airbus to Acquire INFODAS to Strengthen its Cybersecurity Portfolio
๐Ÿ•ต๏ธ
17,000+ Microsoft Exchange Servers Vulnerable to Multiple Critical Vulnerabilities
๐Ÿ•ต๏ธ
3 Strategies to overcome data security challenges in 2024
๐Ÿ•ต๏ธ
Witnessing a Revolution in Cybersecurity with AI
๐Ÿ•ต๏ธ
What We Donโ€™t Know Will Hurt Us - Cheryl Biswas - BTS #26
๐Ÿ•ต๏ธ
Germany Warns Of 17k Vulnerable Microsoft Exchange Servers Exposed Online - RedPacket Security
๐Ÿ•ต๏ธ
What are You Working on Wednesday
๐Ÿ•ต๏ธ
New ShadowRay Campaign Targets Ray AI Framework in Global Attack
๐Ÿ•ต๏ธ
Free Vpn Apps On Google Play Turned Android Phones Into Proxies - RedPacket Security
๐ŸŒ
Breaking Boundaries: Mispadu's Infiltration Beyond LATAM
๐ŸŒ
TheMoon Malware Infects 6,000 ASUS Routers in 72 Hours for Proxy Service
๐ŸŒ
Alert: New Phishing Attack Delivers Keylogger Disguised as Bank Payment Notice
๐ŸŒ
Analyse, Hunt, And Classify Malware Using .NET Metadata
๐ŸŽ™๏ธ
Transatlantic Cable podcast episode 340 | Kaspersky official blog
๐Ÿ“ก
New Darcula phishing service targets iPhone users via iMessage
๐Ÿ“ก
Windows 11 22H2 Home and Pro get preview updates until June 26
๐Ÿ“ก
US State Department Warns Employees of Fraud Scheme Targeting Payroll Systems
๐Ÿ“ก
Airbus Enhances Cybersecurity Offerings with INFODAS Acquisition
๐Ÿ“ก
Feds Wave Sticks & Carrots at Health Sector to Bolster Cyber
๐Ÿ“ก
Tech Industryโ€™s Focus on Innovation Leaves Security Behind
๐Ÿ“ก
SASE Solutions Fall Short Without Enterprise Browser Extensions, New Report Reveals
๐Ÿ“ก
Scans for Apache OfBiz, (Wed, Mar 27th)
๐Ÿ“ก
VPN Apps On Google Play Turn Android Devices Into Proxies
๐Ÿ“ก
Eavesdropping on keyboard keystrokes | Kaspersky official blog