86Articles
9Categories
2024-04-10Date
🐛
Critical 'BatBadBut' Rust Vulnerability Exposes Windows Systems to Attacks
🐛
New Critical Rust Vulnerability Allows Attackers to Inject Commands on Windows Systems
🐛
Microsoft Patches Two Zero-Days Exploited for Malware Delivery
🐛
Flaws in 90,000+ LG WebOS TVs Let Attacker’s Completely take Over Devices
⚠️
Fortinet Releases Security Updates for Multiple Products
⚠️
Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included
⚠️
Why global warnings about China’s cyber-espionage matter to CISOs
⚠️
Vedalia APT Group Exploits Oversized LNK Files in Malware Campaign
⚠️
RUBYCARP the SSH Brute Botnet Resurfaces With New Tools
⚠️
Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses
⚠️
Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel
⚠️
Microsoft Patch Tuesday: 149 Security Vulnerabilities & Zero-days
⚠️
Sidestepping SharePoint Security: Two New Techniques to Evade Exfiltration Detection
⚠️
Hands-on Review: Cynomi AI-powered vCISO Platform
⚠️
Fortinet Patches Critical RCE Vulnerability in FortiClientLinux
⚠️
Beware: GitHub's Fake Popularity Scam Tricking Developers into Downloading Malware
⚠️
AT&T now says data breach impacted 51 million customers
⚠️
AT&T now says data breach impacted 51 million customers
⚠️
Microsoft Patches 2 Zero Days Exploited For Malware Delivery
⚠️
Real-World Law Enforcement Hack of Hackers End-to-Encrypted Chat Messenger
⚠️
New Spectre v2 attack impacts Linux systems on Intel CPUs
⚠️
Boys’ club mentality still a barrier to women’s success in cybersecurity careers
⚠️
Alert! Brute-Force SSH Attacks Rampant in the Wild: New Study From 427 Million Failed SSH Login Attempts
⚠️
AI tools likely wrote malicious script for threat group targeting German organizations
⚠️
Microsoft-blasting CSRB report offers roadmap for better cloud security
⚠️
Silent Surge: The Sudden Rise in Synthetic Business Fraud
⚠️
Governance, Compliance, and The Digital Supply Chain - Josh Marpet - BTS #27
⚠️
What “next-gen” identity security actually means – and why it’s increasingly essential
📋
Cyber Security Today, April 10, 2024 - RansomHub gang trying to extort Change Healthcare, large number of Microsoft security updates are released, and more
📋
A tumultuous, titanic Patch Tuesday as Microsoft makes some changes
📢
Sprinto Raises $20 Million for Automated Risk and Compliance Platform
📢
Gathid’s new access mapping tech promises affordable and streamlined IAM
📢
CISA Announces Malware Next-Gen Analysis
📢
Microsoft security advisory – April 2024 monthly rollup (AV24-192)
📢
Cypago Announces New Automation Support for AI Security & Governance
📢
Palo Alto Networks security advisory (AV24-193)
📢
Google Chrome security advisory (AV24-194)
📢
CISA Releases Malware Next-Gen Analysis System for Public Use
📢
US CISA Aims to Expand Automated Malware Analysis Support
🔥
New SharePoint Technique Lets Hackers Bypass Security Measures
🔥
Targus business operations disrupted following cyber attack
🔥
Researchers Discover New Ransomware Gang ‘Muliaka’ Attacking Russian Businesses
🔥
GHC-SCW Hack: Ransomware Actors Stolen User’s Personal Information
🔥
530k Impacted by Data Breach at Wisconsin Healthcare Organization
🔥
AT&T notifies regulators after customer data breach
🔥
AT&T Data Breach Update: 51 Million Customers Impacted
🔥
Nearly 534,000 Affected in Data Theft at Managed Care Org
🔥
Half of UK Firms, Charities Failed to Report Cyber Incidents
🔥
Wiz Buys Startup Gem Security for $350M to Spot Cloud Issues
🔥
Salvadoran Citizens - 946,989 breached accounts
🕵️
ISC Stormcast For Wednesday, April 10th, 2024 https://isc.sans.edu/podcastdetail/8932, (Wed, Apr 10th)
🕵️
Microsoft Cybersecurity Disaster Triggers Customer Doubt, Competitor Opportunity
🕵️
In Memoriam: Ross Anderson, 1956-2024
🕵️
What are You Working on Wednesday
🕵️
New Threat Actor Starry Addax Targets Human Rights Defenders in North Africa
🕵️
Thousands of LG TVs Possibly Exposed to Remote Hacking
🕵️
What should an AI ethics governance framework look like?
🕵️
Beware of Encrypted Phishing Attack With Weaponized SVG Files
🕵️
Malicious Visual Studio projects on GitHub push Keyzetsu malware
🕵️
Researchers Resurrect Spectre v2 Attack Against Intel CPUs
🕵️
'eXotic Visit' Spyware Campaign Targets Android Users in India and Pakistan
🕵️
BatBadBut: You can't securely execute commands on Windows
🕵️
Malicious PowerShell script pushing malware looks AI-written
🕵️
Match Systems publishes report on the consequences of CBDC implementation
🕵️
Should We Just Accept the Lies We Get From AI Chatbots?
🕵️
Russia Tops Global Cybercrime Index, New Study Reveals
🕵️
How to protect yourself from online harassment
🕵️
Cybercrime Group Uses Likely AI Script to Load Info Stealer
🕵️
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
🌐
91,000 Smart LG TV Devices Vulnerable to Remote Takeover
🌐
Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files
🌐
Transatlantic Cable podcast episode 342 | Kaspersky official blog
🎙️
Smashing Security podcast #367: WhatsApp at Westminster, unhealthy AI, and Drew Barrymore
📡
Novel Ahoi Attacks Could Compromise Confidential VMs
📡
Proton picks up Standard Notes to deepen its pro-privacy portfolio
📡
Kaspersky Next: our new portfolio | Kaspersky official blog
📡
Research Unearths RUBYCARP’s Multi-Miner Assault on Crypto
📡
Reusing passwords: The hidden cost of convenience
📡
Twitter’s Clumsy Pivot to X.com Is a Gift to Phishers
📡
Speed Of AI Development Is Outpacing Risk Assessment
📡
Peter Higgs, Father Of The God Particle, Dies At 94
📡
DOJ Data On 340,000 Individuals Stolen
📡
Researchers Resurrect Spectre v2 Attack Against Intel CPUs
📡
Rust Rustles Up Fix For 10/10 Critical Command Injection Bug On Windows
📡
Google Workspace rolls out multi-admin approval feature for risky changes
📡
Chrome Enterprise gets Premium security but you have to pay for it