106Articles
7Categories
2024-05-09Date
🐛
Undetectable Threats Found in F5 BIG-IP Next Central Manager
🐛
Android Update Patches Critical Vulnerability
🐛
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
🐛
CISA Announces CVE Enrichment Project ‘Vulnrichment’
🐛
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Payload Delivery
🐛
New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation
⚠️
Evolving nature of ransomware attacks - Kris Lahiri - RSA24 #3
⚠️
SquareX is disrupting the browser security market - Vivek Ramachandran - RSA24 #3
⚠️
Creating Phishing-Resistant Users Helps Enterprises Achieve True Passwordless Auth - C... - RSA24 #3
⚠️
Empowering Today’s Security Teams With AI-Powered Analytics and Actioned Insights - An... - RSA24 #3
⚠️
AI in SecOps: Separating Fact from Fiction - Jason Keirstead - RSA24 #3
⚠️
Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover
⚠️
Veeam Fixes RCE Flaw in Backup Management Platform
⚠️
Ransomware Criminals SIM Swap Executives' Kids to Pressure Parents
⚠️
Alert! Hackers Running Thousands of Fake Webshops : 850,000+ Cards Stolen
⚠️
Palo Alto launches AI-powered solutions to fight AI-generated cyberthreats
⚠️
Pktstat: Open-Source Ethernet Interface Traffic Monitor
⚠️
Zscaler shuts down exposed system after rumors of a cyberattack
⚠️
Proton VPN TunnelVision support response.
⚠️
Six Austrians Arrested in Multi-Million Euro Crypto Scheme
⚠️
Fake E-commerce Network Scams $50M from American, European, Australian Shoppers
⚠️
Report: 97% of Organizations Hit by Ransomware Turn to Law Enforcement
⚠️
Latest NICE Framework Update Offers Improvements for the Cybersecurity Workforce
⚠️
Threat Actors Accessed Cancer patients’ Data left Open by Testing Lab
⚠️
Defending against AI and new deepfake technology threats & How an MSSP can help - Jim ... - RSA24 #3
⚠️
ASD’s ACSC, CISA, and Partners Release Secure by Design Guidance on Choosing Secure and Verifiable Technologies
⚠️
CISA Releases Four Industrial Control Systems Advisories
⚠️
UK Armed Forces' Personal Data Hacked In MoD Breach
⚠️
How Workforce Reductions Affect Cybersecurity Postures
⚠️
Next Gen Threats, CTEM Essentials, & Proactive MDR - Randy Watkins, Paul Reid, Zaira P... - ESW #361
⚠️
Breach Roundup: LockBit Claims Wichita Attack
⚠️
Citrix warns admins to manually mitigate PuTTY SSH client bug
⚠️
Protecting Data in the Cloud and GenAI Era - Pranava Adduri - RSA24 #4
⚠️
The Role of Security Validation to Reduce and Quantify Cyber Risk - Volkan Ertürk - RSA24 #4
⚠️
SailPoint’s Approach to Unified Identity Security for the Modern Enterprise - Wendy Wu - RSA24 #4
⚠️
Rising Stakes: Unpacking Sophos' 5th Annual State of Ransomware Report - John Shier - RSA24 #4
⚠️
A Vulnerability in F5 BIG-IP Next Central Manager Could Allow for Remote Code Execution
⚠️
Cloud Computing is Evolving - With a Little Help From AI
📢
F5’s Next Central Manager Vulnerabilities Let Hackers Take Full Device Control Remotely
📢
New Guide: How to Scale Your vCISO Services Profitably
📢
CISA Extends CIRCIA Rule Comment Period
📢
Security Tools Fail to Translate Risks for Executives
📢
With Nation-State Threats in Mind, Nearly 70 Software Firms Agree to Secure by Design Pledge
📢
Technology Giants Join CISA's Secure By Design Pledge
🔥
Tappware - 94,734 breached accounts
🔥
Polish Government Under Sophisticated Cyber Attack From APT28 Hacker Group
🔥
Bangladesh IT Provider Database Compromise: 95k Email Addresses Leaked
🔥
US Advances on Cyber Goals Amid Rapidly Changing Threat Environment, White House Says
🔥
SocGholish Attacks Enterprises Via Fake Browser Updates
🔥
Cancer patients’ sensitive information accessed by “unidentified parties” after being left exposed by screening lab for years
🔥
Cyber Attack On Data Center Cooling Systems Leads To Disruption
🔥
LockBit Takes Credit for City of Wichita Ransomware Attack
🔥
Generative AI is a Looming Cybersecurity Threat
🔥
Ascension warns of suspected cyberattack; clinical operations disrupted
🔥
Dell discloses data breach of customers’ physical addresses
🔥
Dell warns of data breach, 49 million customers allegedly affected
🔥
Update: Boeing Confirms Attempted $200 Million Ransomware Extortion Attempt
🔥
LockBit Takes Credit For City Of Wichita Ransomware Attack
🔥
British Columbia investigating cyberattacks on government networks
🔥
Dell Says Customer Names, Addresses Stolen in Database Breach
🔥
Ascension Responding to Cyberattack Affecting Clinical Care
🔥
Cryptohack Roundup: BTC-e's Alex Vinnik Pleads Guilty
🔥
$10 million reward offer for apprehension of unmasked LockBit ransomware leader
🔥
RSA Conference 2024: AI hype overload
🕵️
News alert: Security Risk Advisors offers free workshop to help select optimal OT security tools
🕵️
ISC Stormcast For Thursday, May 9th, 2024 https://isc.sans.edu/podcastdetail/8974, (Thu, May 9th)
🕵️
Transatlantic Cable podcast episode 346 | Kaspersky official blog
🕵️
Zscaler Investigates Hacking Claims After Data Offered for Sale
🕵️
RSA Conference 2024 – Announcements Summary (Day 3)
🕵️
F5 Patches Dangerous Vulnerabilities in BIG-IP Next Central Manager
🕵️
Poland says Russian cyberspies targeted government networks
🕵️
BetterHelp Customers Begin Receiving Refund Notices From $7.8M Data Privacy Settlement, FTC Says
🕵️
Social engineering in the era of generative AI: Predictions for 2024
🕵️
Poland Says it was Targeted by Russian Military Intelligence Hackers
🕵️
Keyfactor & Devo RSAC CISO Panel Discussion
🕵️
Criminal Use of AI Growing, But Lags Behind Defenders
🕵️
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
🕵️
How Criminals Are Using Generative AI
🕵️
Analyzing PDF Streams, (Thu, May 9th)
🕵️
Request: Guidance from Staff+ Security Engineers
🕵️
[Breaking] The News Is Increasingly Broken. Surge Of Inaccurate AI News Stories
🕵️
Phishing Attacks Increase, Network Transformation, & Unified SASE as a Service - Deepe... - ESW #361
🕵️
Accenture Lands $789 Million Contract to Bolster U.S. Navy Cybersecurity
🕵️
Apps Gone Wild: Re-thinking App and Identity Security for SaaS - Guy Guzner - RSA24 #4
🕵️
Tech Giants Cater to Government With AI Tools
🕵️
Monday.com removes "Share Update" feature abused for phishing attacks
🕵️
Automated Pentesting, AI in SecOps, & AI-Powered Analytics - Jason Keirstead, Jay Mar-... - ESW #361
🕵️
ISMG Editors: Day 3 Highlights at RSA Conference 2024
🌐
Live Webinar Today | Protecting Your Pipeline: Strategies to Thwart Supply Chain Attacks
🌐
FBI warns US retailers that hackers are targeting their gift card systems
🌐
OnDemand | Protecting Your Pipeline: Strategies to Thwart Supply Chain Attacks
📡
The Top Four Things Tech Manufacturers can do to Bolster the Cybersecurity of Target-Rich, Cyber-Poor Organizations
📡
Two-Thirds of Organizations Failing to Address AI Risks, ISACA Finds
📡
Report Shows AI Fraud, Deepfakes are Top Challenges for Banks
📡
FBI Warns of Gift Card Fraud Ring Targeting Retail Companies
📡
Findings Show MFA Bypass in Microsoft Azure Entra ID Using Seamless SSO
📡
Strong CIO-CISO relations fuel success at Ally
📡
Live Webinar | Digital Doppelgängers: The Dual Faces of Deepfake Technology
📡
AWS CloudQuarry: Digging For Secrets In Public AMIs
📡
TunnelVision DHCP Flaw Lets Attackers Bypass VPNs, Redirect Traffic
📡
Zscaler Investigates Hacking Claims After Data Offered For Sale
📡
Critical Vulnerabilities In BIG-IP Appliances Leave Big Networks Open To Intrusion
📡
One Year On, Universities Org Admits MOVEit Attack Hit Data Of 800k People
📡
AT&T delays Microsoft 365 email delivery due to spam wave
📡
Joint guidance on choosing secure and verifiable technologies
📡
Poland says Russian military hackers target its govt networks