89Articles
9Categories
2024-04-03Date
🐛
Critical Security Flaw Found in Popular LayerSlider WordPress Plugin
🐛
New XZ Utils Backdoor Free Scanner to Detect Malicious Executables
🐛
CVE and NVD – A Weak and Fractured Source of Vulnerability Truth
🐛
Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies
KEV
⚠️
Vulnerability Exposed Ibis Budget Guest Room Codes to Hackers
⚠️
What is identity fabric immunity? Abstracting identity for better security
⚠️
CISA Sounds Alarm on Deep-Seated Vulnerability in Linux Tool
⚠️
PCI DSS explained: Requirements, fines, and steps to compliance
⚠️
Cyber Security Today, April 3, 2024 - New Linux vulnerability is found, and a must-read ransomware case study
⚠️
Google Patches Exploited Pixel Vulnerabilities
KEV
⚠️
Podcast: How to Read Leaked Datasets Like a Journalist - Micah Lee - 55 minutes
⚠️
Google Patches Chrome Flaw That Earned Hackers $42,500 at Pwn2Own
⚠️
Attack Surface Management vs. Vulnerability Management
⚠️
Unpatched Vulnerabilities: The Most Brutal Ransomware Attack Vector
⚠️
Pixel Update Bulletin—April 2024 | Android Open Source Project
⚠️
Introducing Sophos Managed Risk, Powered by Tenable
⚠️
Security concerns could be holding back AI projects: Report
⚠️
GenAI: The next frontier in AI security threats
⚠️
Critical Vulnerability Found in LayerSlider Plugin Installed on a Million WordPress Sites
⚠️
Google fixes two Pixel zero-day flaws exploited by forensics firms
⚠️
Google fixes one more Chrome zero-day exploited at Pwn2Own
⚠️
Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks
⚠️
Aembit Selected as Finalist for RSA Conference 2024 Innovation Sandbox Contest
⚠️
US and UK Partner to Align on AI Safety and Share Resources
⚠️
US government blames 2023 Exchange breach on ‘preventable’ security failures by Microsoft
⚠️
Strengthening cyber resiliency through collaboration
⚠️
Veracode Promotes Brian Roche to CEO, Buys Longbow Security
📋
Critical flaw in LayerSlider WordPress plugin impacts 1 million sites
📢
Google Chrome security advisory (AV24-176)
📢
Ivanti security advisory (AV24-177)
📢
Cisco security advisory (AV24-178)
📢
HPE security advisory (AV24-179)
🔥
DarkGate Malware Abusing Cloud Storage & SEO Following Delivery Over Teams
🔥
Update: INC Ransom Claims 'Cyber Incident' at UK City Council
🔥
Jackson County Missouri Ransomware Attack Impacts IT Systems
🔥
Mispadu Trojan Targets Europe, Thousands of Credentials Compromised
🔥
Unveiling the Fallout: Operation Cronos' Impact on LockBit Following Landmark Disruption
🔥
XZ Utils Backdoor Attack Brings Another Similar Incident to Light
🔥
Hackers disrupt Apex Legends esports tournament | Kaspersky official blog
🔥
Missouri County Hit by Ransomware
🔥
Microsoft’s Exchange Server Hack: Key Rotation Flaw Triggers Breach
🔥
Missouri County Declares State of Emergency Amid Suspected Ransomware Attack
🔥
U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers
🔥
AT&T faces lawsuits over data breach affecting 73 million customers
🔥
New Report Shows Phishing Links and Malicious Attachments Are The Top Entry Points of Cyber Attacks
🔥
After Ransomware Hits, County Declares State of Emergency
🔥
US State Department investigates alleged theft of government data
🔥
Microsoft Blamed For A Cascade Of Security Failures In Exchange Breach Report
🔥
Feds Hit 2 Nursing Home Firms With 'Right of Access' Fines
🔥
Jackson County in state of emergency after ransomware attack
🔥
Chilean hosting firm's VMware ESXi servers hit by new SEXi ransomware
🔥
SurveyLama data breach exposes info of 4.4 million users
🔥
Omni Hotels confirms cyberattack behind ongoing IT outage
🔥
Hosting firm's VMware ESXi servers hit by new SEXi ransomware
🔥
US State Department Investigating Hacking Claims
🕵️
ISC Stormcast For Wednesday, April 3rd, 2024 https://isc.sans.edu/podcastdetail/8922, (Wed, Apr 3rd)
🕵️
Beware of New Mighty Stealer That Takes Webcam Pictures & Capture Cookies
🕵️
Podcast: The Cybersecurity Vault - episode #30, with guest Lisa Forte - 1 hour
🕵️
Class-Action Lawsuit against Google’s Incognito Mode
🕵️
Threat Actors Deliver Malware via YouTube Video Game Cracks
🕵️
What are You Working on Wednesday
🕵️
Scathing Federal Report Rips Microsoft for Shoddy Security, Insincerity in Response to Chinese Hack
🕵️
Know Your Audience When Speaking to Security Practitioners
🕵️
Palo Alto Networks 2023 ESG Report — Securing Our Digital Future
🕵️
Number of Chinese Devices in US Networks Growing Despite Bans
🕵️
Malicious App Impersonates McAfee to Distribute Malware Via Text and Phone Calls
🕵️
More Than Half of Organizations Plan to Adopt AI Solutions in Coming Year, Reports Cloud Security Alliance and Google Cloud
🕵️
Google Proposes Method for Stopping Multifactor Runaround
🕵️
Microsoft still unsure how hackers stole MSA key in 2023 Exchange attack
🕵️
Get end-to-end protection with Microsoft’s unified security operations platform, now in public preview
🌐
Earth Freybug Uses UNAPIMON for Unhooking Critical APIs
🌐
Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks
🌐
Some things you can learn from SSH traffic, (Wed, Apr 3rd)
🎙️
Smashing Security podcast #366: Money-making bots, and Incognito isn’t private
📡
Indian government’s cloud spilled citizens’ personal data online for years
📡
Live Webinar Tomorrow | Navigating the SEC Rules for Enhanced Cybersecurity in IT and OT Environments
📡
Veracode Acquires Longbow Security to Help Organizations Reduce Application Risk
📡
Agent Tesla Targeting United States and Australia
📡
It’s Oh So Quiet (?): The Sophos Active Adversary Report for 1H 2024
📡
Google to Delete Billions of Browser Records to Settle ‘Incognito’ Lawsuit
📡
‘The Manipulaters’ Improve Phishing, Still Fail at Opsec
📡
Highly sensitive files mysteriously disappeared from EUROPOL headquarters
📡
6 Prompts You Don't Want Employees Putting in Microsoft Copilot
📡
EU Drops Sovereignty Reqs In Cybersecurity Cert Scheme
📡
ChatGPT Jailbreak Prompts Proliferate On Hacker Forums
📡
Security Pioneer Ross Anderson Dies At 67
📡
Why a Cloud Security Platform Approach is Critical
📡
The US or the UK: Where Should You Get a Cybersecurity Job?
📡
How often should you change your passwords?