85Articles
8Categories
2024-04-08Date
πŸ›
Multiple Cisco Small Business Routers Vulnerable to XSS Attacks
πŸ›
Over 92,000 Internet-Facing D-Link NAS Devices can be Easily Hacked
πŸ›
Cisco IOS Vulnerability Allows DOS Attacks via Malicious Traffic
⚠️
Google Sues App Developers Over Fake Crypto Investment App Scam
⚠️
US federal agencies get first crack at expanded Microsoft 365 logging capabilities
⚠️
AI-As-A-Service Providers Vulnerability Let Attackers Perform Cross-Tenant Attacks
⚠️
Multiple CData Vulnerabilities Let Attackers Bypass Security Restrictions
⚠️
Vedalia APT Group Exploits Oversized LNK Files to Deliver Malware
⚠️
Security Vulnerability of HTML Emails
⚠️
US Chamber of Commerce, Industry Groups Call for 30-Day Delay in CIRCIA Rules
⚠️
Company Offering $30 Million for Android, iOS, Browser Zero-Day Exploits
⚠️
Company Offering $30 Million For Android, iOS, Browser Zero-Day Exploits
⚠️
Chinese Hackers Using AI Tools To Influence Upcoming Elections
⚠️
Thousands of Ivanti VPN Appliances Impacted by Recent Vulnerability
⚠️
Escalation of Fake E-Shop Campaign Threatens Banking Security in Multiple Regions
⚠️
Hackers stole 340,000 Social Security numbers from government consulting firm
⚠️
Open-Source Foundations Join Forces on Digital Supply Chain
⚠️
Critical RCE bug in 92,000 D-Link NAS devices now exploited in attacks
⚠️
US-CERT Vulnerability Summary for the Week of April 1, 2024 - RedPacket Security
⚠️
Targus discloses cyberattack after hackers detected on file servers
⚠️
Toward greater transparency: Adopting the CWE standard for Microsoft CVEs
⚠️
How we built the new Find My Device network with user security and privacy in mind
πŸ“’
Best Practices Q&A: Guidance about what directors need to hear from CISOs β€” from a board member
πŸ“’
US Lawmakers Strike Deal On Data Privacy Legislation
πŸ“’
[Control systems] CISA ICS security advisories (AV24-184)
πŸ“’
Ubuntu security advisory (AV24-183)
πŸ“’
IBM security advisory (AV24-182)
πŸ“’
Red Hat security advisory (AV24-185)
πŸ”₯
Weekly Update 394
πŸ”₯
Microsoft Two-Step Phishing Campaign Attack LinkedIn Users
πŸ”₯
boAt - 7,528,986 breached accounts
πŸ”₯
US Environmental Protection Agency hack exposes data of 8.5 million users
πŸ”₯
The Drop in Ransomware Attacks in 2024 and What it Means
πŸ”₯
Veterinary Giant IT System Attacked by Hackers
πŸ”₯
Confidential VMs Hacked via New Ahoi Attacks
πŸ”₯
Confidential VMs Hacked Via New Ahoi Attacks
πŸ”₯
Change Healthcare Faces Second Ransomware Dilemma
πŸ”₯
Cyberattack on CVS Group veterinary clinics disrupts operations
πŸ”₯
Indian audio giant BoAt says it’s investigating suspected customer data breach
πŸ”₯
Cyberattack on UK’s CVS Group disrupts veterinary operations
πŸ”₯
Hackers deploy crypto drainers on thousands of WordPress sites
πŸ”₯
US EPA Investigates Alleged Data Breach by Government Hacker
πŸ”₯
A Second Gang Shakes Down UnitedHealth Group for Ransom
πŸ”₯
Targus says cyberattack causing operational outage
πŸ”₯
Hugging Face Vulnerabilities Highlight AI-as-a-Service Risks
πŸ•΅οΈ
CoralRaider Hackers Steals Login Credentials, Financial Data & Social Media Logins
πŸ•΅οΈ
A Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary], (Sun, Apr 7th)
πŸ•΅οΈ
ISC Stormcast For Monday, April 8th, 2024 https://isc.sans.edu/podcastdetail/8928, (Mon, Apr 8th)
πŸ•΅οΈ
How malicious email campaigns continue to slip through the cracks - Help Net Security
πŸ•΅οΈ
Cloudflare Acquires Baselime to Enhance Serverless Performance
πŸ•΅οΈ
NSA Appoints Dave Luber as Cybersecurity Director
πŸ•΅οΈ
Google Adds V8 Sandbox to Chrome
πŸ•΅οΈ
Large-Scale StrelaStealer Campaign Impacts Over 100 Organizations Within the E.U. and U.S.
πŸ•΅οΈ
The Cyber Achilles' Heel: Why World Leaders and High-Profile Individuals Must Prioritise Cybersecurity
πŸ•΅οΈ
Mentorship Monday - Discussions for career and learning!
πŸ•΅οΈ
Unleash Platform Power with Strata Cloud Manager’s Command Center
πŸ•΅οΈ
Healthcare IT Help Desk Employees Targeted in Payment-Hijacking Attacks
πŸ•΅οΈ
Key Lawmakers Float New Rules for Personal Data Protection; Bill Would Make Privacy a Consumer Right
πŸ•΅οΈ
Australian Government Commits to Become a World-Leader in Cybersecurity by 2030
πŸ•΅οΈ
Tokyo Police Department Warns of Phishing Scam That Uses Phony Arrest Warrants
πŸ•΅οΈ
Police Probe Honeytrap Sexting Scam Targeting British MPs
πŸ•΅οΈ
Threat Actors Deliver Malware via YouTube Video Game Cracks
πŸ•΅οΈ
AGENT TESLA Malware Steals login Credentials From Chrome & Firefox
πŸ•΅οΈ
RSA Conference 2024 Preview: 'The Art of Possible'
πŸ•΅οΈ
Understanding the Cybersecurity Ecosystem, Part 2 - Ross Haleliuk - BSW #345
πŸ•΅οΈ
Understanding the Cybersecurity Ecosystem, Part 1 - Ross Haleliuk - BSW #345
πŸ•΅οΈ
Meta Will Label AI-Generated Content Starting In May
πŸ•΅οΈ
XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor
🌐
Persistent Magento Backdoor Hidden in XML
🌐
Watch Out for 'Latrodectus' - This Malware Could Be In Your Inbox
🌐
Hackers can Use AI Hallucinations to Spread Malware
🌐
Bing Ad Posing As NordVPN Aims To Spread SecTopRAT Malware
🌐
Fake Facebook MidJourney AI Page Promoted Malware to 1.2 Million People
πŸŽ™οΈ
Cyber Security Today, April 8, 2024 - Crooks are hijacking Facebook pages to spread phoney AI applications
πŸ“‘
Cybercriminals Targeting Latin America with Sophisticated Phishing Scheme
πŸ“‘
Notepad++ needs your help in "parasite website" shutdown
πŸ“‘
Wiz Discovers Flaws in GenAI Models Enabling Customer Data Theft
πŸ“‘
UK: Police Launch Inquiry After MPs Targeted in Apparent β€˜Spear-Phishing’ Attack
πŸ“‘
Permiso Secures $18.5 Million in Series A Funding to Fortify Cloud Identity Security Landscape
πŸ“‘
Notepad++ wants your help in "parasite website" shutdown
πŸ“‘
Google Sues Crypto Investment App Makers Over Alleged Massive β€œPig Butchering” Scam
πŸ“‘
Google Chrome Adds V8 Sandbox - A New Defense Against Browser Attacks
πŸ“‘
Hotel Check-In Terminal Leaks Rafts of Guests' Room Codes
πŸ“‘
Google rolls out new Find My Device network to Android devices
πŸ“‘
7 reasons why cybercriminals want your personal data