96Articles
7Categories
2024-05-03Date
🐛
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
🐛
New “Goldoon” Botnet Hijacking D-Link Routers to Use for Other Attacks
🐛
CISA, FBI urge developers to patch path traversal bugs before shipping
KEV
⚠️
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360
⚠️
LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely from Any Browser, Anywhere
⚠️
ChatGPT Writes Exploits - PSW #827
⚠️
Cisco IP Phone Vulnerability Let Attackers Trigger DoS Attack
⚠️
Threat Actors Renting Out Compromised Routers To Other Criminals
⚠️
Why Cloud Vulnerabilities Need CVEs
⚠️
Cyber Security Today, May 3, 2024 - North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches
⚠️
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
⚠️
Malware explained: How to prevent, detect and recover from it
⚠️
Horizon3.ai Introduces AI-Assisted Service to Prioritize and Patch Vulnerabilities Faster
⚠️
Microsoft Warns of ‘Dirty Stream’ Vulnerability in Popular Android Apps
⚠️
Microsoft continues to add, shuffle security execs in the wake of security incidents
⚠️
68% of Data Breach Occurs Due to Social Engineering Attacks
⚠️
Hackers Exploit Microsoft Graph API For C&C Communications
⚠️
ApacheMQ Authentication Flaw Let Unauthorized Users Perform Multiple Actions
⚠️
Mal.Metrica Malware Hijacks 17,000+ WordPress Sites
⚠️
reNgine: Open-Source Automated Reconnaissance Framework for Web Applications
⚠️
US Says North Korean Hackers Exploiting Weak DMARC Settings
⚠️
Russian GRU Hackers Compromised German, Czech Targets
⚠️
North Korean Hackers Spoofing Journalist Emails to Spy on Experts
⚠️
Verizon: The Percentage of Users Clicking Phishing Emails is Still Rising
⚠️
Uncharmed: Untangling Iran's APT42 Operations
⚠️
“Dirty Stream” Attack Affects Popular Android Apps
⚠️
NSA warns of North Korean hackers exploiting weak DMARC email policies
⚠️
MY TAKE: Is Satya Nadella’s ‘Secure Future Initiative’ a deja vu of ‘Trustworthy Computing?’
⚠️
New Botnet 'Goldoon' Targets D-Link Devices
📢
U.S. Govt Warns of Massive Social Engineering Attack from North Korean Hackers
📢
CISA, FBI Urge Organizations to Eliminate Path Traversal Vulnerabilities
📢
Microsoft Edge security advisory (AV24-237)
📢
Regulating AI: 'It's Going to Be a Madhouse'
🔥
Weekly Update 398
🔥
Ransomware Rising Despite Takedowns, Says Corvus Report
🔥
Ukrainian REvil Ransomware Affiliate Gets 13 Years in US Prison
🔥
Lawsuits and Company Devaluations Await For Breached Firms
🔥
Cybercriminals and Nation-State Actors Found Sharing Compromised Networks
🔥
REvil Ransomware Affiliate Sentenced to Over 13 Years in Prison
🔥
UnitedHealth data breach should be a wakeup call for the UK and NHS
🔥
NATO and EU condemn Russia's cyberattacks against Germany, Czechia
🔥
Germany warns of consequences for alleged Russian cyber attack
🔥
ISMG Editors: RSA Conference 2024 Preview
🔥
Pay up, or else? – Week in security with Tony Anscombe
🕵️
Israeli private eye arrested in London over alleged hacking for US firm
🕵️
ISC Stormcast For Friday, May 3rd, 2024 https://isc.sans.edu/podcastdetail/8966, (Fri, May 3rd)
🕵️
How well can an employer be certain of a remote employee's geographical location?
🕵️
GUEST ESSAY: A primer on how, why ‘dynamic baselining’ fosters accurate DDoS protection
🕵️
RSAC Fireside Chat: The necessary care and feeding of DDoS detection and protection systems
🕵️
White House Issues National Security Memorandum for Critical Infrastructure
🕵️
Rare Interviews with Enigma Cryptanalyst Marian Rejewski
🕵️
Microsoft Graph API Emerges as a Top Attacker Tool to Plot Data Theft
🕵️
Hackers Target New NATO Member Sweden with Surge of DDoS Attacks
🕵️
DPRK's Kimsuky APT Abuses Weak DMARC Policies, Feds Warn
🕵️
AI-Driven Phishing Attacks Deceive Even the Most Aware Users
🕵️
What we can learn from the best collegiate cyber defenders
🕵️
Botnet Disrupted by FBI Still Used by Russian Spies, Cybercriminals
🕵️
ArcaneDoor Espionage Campaign Targeting Cisco Firewalls Linked to China
🕵️
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
🕵️
In Other News: Locked Shields 2024, Data Exposure Bugs, NVIDIA Patches
🕵️
LayerX Raises $26 Million for Browser Security Platform
🕵️
RSA Conference, Verizon DBIR, funding, reports, partnerships and more - ESW #360
🕵️
Google rolls back reCaptcha update to fix Firefox issues
🕵️
My TED Talks
🕵️
Microsoft Overhauls Cybersecurity Strategy After Scathing CSRB Report
🕵️
Protecting Your Digital Footprint: The Dangers of Sharing Too Much on Social Media
🕵️
Weird Al, Docker, OT, Gitlab, Credit Monitoring, Dropbox, Cisco, AI, Aaran Leyland... - SWN #383
🕵️
Friday Squid Blogging: Squid Purses
🕵️
How Intel 471's Buy of Cyborg Is Reshaping Threat Hunting
🕵️
New Report Exposes Iranian Hacking Group's Media Masquerade
🕵️
Security above all else—expanding Microsoft’s Secure Future Initiative
🌐
Mal.Metrica Redirects Users to Scam Sites
🌐
Investigation Uncovers Substantial Spyware Exports to Indonesia
🌐
Expert-Led Webinar - Uncovering Latest DDoS Tactics and Learn How to Fight Back
🌐
Botnet Disrupted By FBI Still Used By Russian Spies, Cybercriminals
🌐
Indonesia Sneakily Buys Spyware, Claims Amnesty International
🌐
Live Webinar | Protecting Your Pipeline: Strategies to Thwart Supply Chain Attacks
📡
Google Announces Passkeys Adopted by Over 400 Million Accounts
📡
NASA Doesn’t Know if Its Spacecraft Have Adequate Cyber Defenses, GAO Warns
📡
Watch Out for Tech Support Scams Lurking in Sponsored Search Results
📡
Attack Report: Custom QR Code Phishing Templates
📡
Essential Steps for Zero-Trust Strategy Implementation
📡
US Charges 16 Over ‘Depraved’ Grandparent Scams
📡
New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data
📡
Cybersecurity Consultant Arrested After Allegedly Extorting IT Firm
📡
Lessons From LOCKED SHIELDS 2024 Cyber Exercise
📡
Microsoft, Google Do A Victory Lap Around Passkeys
📡
Europol Op Shutters 12 Scam Call Centers And Cuffs 21 Suspected Fraudsters
📡
DeepKeep Secures $10M in Seed Funding to Boost GenAI Protection Endeavors
📡
Microsoft rolls out passkey auth for personal Microsoft accounts
📡
More Than Two Dozen Android Vulnerabilities Fixed
📡
RSAC 2024 Monday Live Stream Schedule
📡
The Intelligent SOC: Fusion Methodology at the Intersection of Intelligence, Context, and Action in Modern Enterprises
📡
Web Trackers Persist in Healthcare Despite Privacy Risks
📡
Android bug can leak DNS traffic with VPN kill switch enabled
📡
Android bug leaks DNS queries even when VPN kill switch is enabled