72Articles
8Categories
2024-04-05Date
πŸ›
Multiple Ivanti Connect Secure Flaw Let Attackers Execute Remote Code
πŸ›
Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws
πŸ›
Critical Progress Flowmon Vulnerability Let Attackers Inject Malicious Code
πŸ›
An onslaught of security flaws pushes Ivanti into security re-design
⚠️
Feds Patching Years-Old SS7 Vulnerability in Phone Networks
⚠️
Bing Ads Exploited by Hackers to Spread SecTopRAT Through NordVPN Mimic
⚠️
Maybe the Phone System Surveillance Vulnerabilities Will Be Fixed
⚠️
Magento Vulnerability Exploited to Deploy Persistent Backdoor
⚠️
NIST Grants $3.6 Million to Boost US Cybersecurity Workforce
⚠️
YubiKey Manager Privilege Escalation Let Attacker Perform Admin Functions
⚠️
A Vulnerability in Broadcom Brocade Fabric OS Could Allow for Arbitrary Code Execution
⚠️
Cisco Warns of Vulnerability in Discontinued Small Business Routers
⚠️
New Ivanti RCE flaw may impact 16,000 exposed VPN gateways
⚠️
Cisco Warns Of Vulnerability In Discontinued Small Business Routers
⚠️
Cyber Security Today, Week in Review for the week ending Friday, April 5, 2024
⚠️
Google Chrome aims to solve account hijacking with device-bound cookies
⚠️
Chinese Groups Deploy New TTPs to Exploit Ivanti Vulnerabilities - Infosecurity Magazine
πŸ“‹
Critical Flaw in LayerSlider WordPress Plugin Impacts One Million Sites
πŸ“’
CISO Perspectives on Complying with Cybersecurity Regulations
πŸ“’
In Other News: 100,000 Affected by CISA Breach, Microsoft AI Copilot Ban, Nuclear Site Prosecution
πŸ“’
Microsoft Edge security advisory (AV24-181)
πŸ“’
Israel's Justice Ministry Reviewing Cyber Incident After Hacktivists Claim Breach
πŸ”₯
AT&T Tried To Deny This Massive Data Breach
πŸ”₯
Winnti Hackers’ New UNAPIMON Tool Hijacks DLL And Unhook API Calls
πŸ”₯
Lens Maker Hoya Scrambling to Restore Systems Following Cyberattack
πŸ”₯
Cyber Security Today, April 5, 2024 - New ransomware gang claims 11 victims, Ivanti promises to overhaul product security, and more.
πŸ”₯
Panera Bread week-long IT outage caused by ransomware attack
πŸ”₯
Acuity confirms hackers stole non-sensitive govt data from GitHub repos
πŸ”₯
ISMG Editors: Breaking Down OT Cybersecurity Challenges
πŸ”₯
Omni Hotels Blames Cyberattack For Widespread Tech Outage
πŸ”₯
Filipino Hacktivists Destroy Technology Agency Servers
πŸ”₯
Change Healthcare Attack: Recovery Woes; Lawsuits Pile Up
πŸ”₯
The Week in Ransomware - April 5th 2024 - Virtual Machines under Attack
πŸ•΅οΈ
USB HID And Run Exposes Yet Another BadUSB Surface
πŸ•΅οΈ
Fidelity and passwords via T9
πŸ•΅οΈ
ISC Stormcast For Friday, April 5th, 2024 https://isc.sans.edu/podcastdetail/8926, (Fri, Apr 5th)
πŸ•΅οΈ
AI Package Hallucination – Hackers Abusing ChatGPT, Gemini to Spread Malware
πŸ•΅οΈ
Cybercriminal adoption of browser fingerprinting - Help Net Security
πŸ•΅οΈ
Bing Ad for NordVPN Leads to SecTopRAT
πŸ•΅οΈ
Impact of IoT Security for 5G Technology - Security Boulevard
πŸ•΅οΈ
Cybersecurity Firms Raised $2.3 Billion in Q1 2024: Report
πŸ•΅οΈ
Acuity Responds to US Government Data Theft Claims, Says Hackers Obtained Old Info
πŸ•΅οΈ
Hackers Hijack Facebook Pages to Mimic AI Brands & Inject Malware
πŸ•΅οΈ
Oxycorat Android RAT Spotted on Dark Web Stealing Wi-Fi Passwords
πŸ•΅οΈ
10M+ Downloaded Dating App Discloses User’s Exact Location
πŸ•΅οΈ
Tech Companies Want to Build Artificial General Intelligence. But Who Decides When AGI is Attained?
πŸ•΅οΈ
AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks
πŸ•΅οΈ
China Is Using AI to Influence Elections, Microsoft Warns
πŸ•΅οΈ
SEXi, Powerhost, Acuity, Layerslider, JSOutProx, Byakugan, Josh Marpet, and More - SWN #375
πŸ•΅οΈ
What Lies Ahead for Cybersecurity in the Era of Generative AI? - IT Security Guru
πŸ•΅οΈ
Friday Squid Blogging: SqUID Bots
πŸ•΅οΈ
Vietnamese Threat Actor Targeting Financial Data Across Asia
πŸ•΅οΈ
Sophisticated Latrodectus Malware Linked to 2017 Strain
πŸ•΅οΈ
Hackers Can Use AI Hallucinations to Spread Malware
πŸ•΅οΈ
Cloudflare Enters Observability Space With Baselime Purchase
πŸ•΅οΈ
Don't trust the cache :Exposing Web cache vulnerabilities
🌐
Byakugan – The Malware Behind a Phishing Attack
🌐
New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA
🌐
From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware
🌐
Fake Facebook MidJourney AI page promoted malware to 1.2 million people
🌐
Academics Probe Apple's Privacy Settings And Get Lost And Confused
πŸ“‘
Fake Lawsuit Threat Exposes Privnote Phishing Sites
πŸ“‘
Note-taking apps and to-do lists with end-to-end encryption | Kaspersky official blog
πŸ“‘
Microsoft fixes Windows Sysprep issue behind 0x80073cf2 errors
πŸ“‘
Acuity Responds To US Government Data Theft Claims
πŸ“‘
Ivanti CEO Pledges To Fundamentally Transform Its Hard-Hit Security Model
πŸ“‘
Latrodectus Uses Sandbox Evasion Techniques To Launch Malicious Payloads
πŸ“‘
Microsoft's Security Chickens Have Come Home To Roost
πŸ“‘
Google sues crypto investment app makers over alleged massive β€œpig butchering” scam
πŸ“‘
Medical Device Cyberthreat Modeling: Top Considerations
πŸ“‘
Recent Windows updates break Microsoft Connected Cache delivery
πŸ“‘
The devil is in the fine print – Week in security with Tony Anscombe