86Articles
8Categories
2024-05-20Date
๐Ÿšจ
CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog - RedPacket Securitysubmitted by Lanky_Pomegranate530 to cybersecurity 1 points | 0 comments https://www.redpacketsecurity.com/cisa-cisa-adds-three-known-exploited-vulnerabilities-to-catalog-20-05-2024/ CISA Adds Three Known Exploited Vulnerabilities to Catalog
KEV
๐Ÿšจ
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-4947 Google Chromium V8 Type Confusion Vulnerability CVE-2023-43208 NextGen Healthcare Mirth Connect Deserialization of Untrusted Data โ€ฆ
KEV
๐Ÿ›
CISA Warns of Hackers Exploiting Chrome, EoL D-Link Bugs
KEV
๐Ÿ›
PoC Exploit Published for 0-day Vulnerability in Google Chrome
๐Ÿ›
Critical Git Vulnerability Let Attackers Execute Remote Code : PoC Published
๐Ÿ›
Vulnerability Found in Fluent Bit Utility Used by Major Cloud, Tech Companies
๐Ÿ›
Vulnerability Summary for the Week of May 13, 2024
KEV
โš ๏ธ
The inside story of Cyber Commandโ€™s creation
โš ๏ธ
Sonicwall SSL-VPN exploit Advertised on the Dark web
โš ๏ธ
RSAC Fireside Chat: SquareX introduces security-infused browser extension to stop threats in real time
โš ๏ธ
Kinsing Malware Attacking Apache Tomcat Servers To Deploy Cryptominers
โš ๏ธ
Researchers Report High-Impact Cat-Phishing Targeting Users
โš ๏ธ
Global stability issues alter cyber threat landscape, ESET reports
โš ๏ธ
Cyber Criminals Exploit GitHub and FileZilla to Deliver Cocktail Malware
โš ๏ธ
IBM Sells Cybersecurity Group
โš ๏ธ
Two Students Uncover Security Bug That Could Let Millions Do Their Laundry for Free
โš ๏ธ
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks
โš ๏ธ
Intel Discloses Max Severity Bug in Its AI Model Compression Software
โš ๏ธ
Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal
โš ๏ธ
Kinsing Hacker Group Expands its Cryptoming Botnet Network with More Vulnerability Exploits
โš ๏ธ
Akira Ransomware Escalates Privilege To Exfiltrate Domain Controller Files
โš ๏ธ
Financial Organizations Need To Disclose Data Breach Within 30-Days
โš ๏ธ
6k-plus AI Models May Be Affected By Critical RCE Vulnerability
โš ๏ธ
QNAP QTS zero-day in Share feature gets public RCE exploit
โš ๏ธ
AI Python Package Flaw โ€˜Llama Dramaโ€™ Threatens Software Supply Chain
โš ๏ธ
Cybersecurity workforce development: A Public/Private Partnership that enhances cybersecurity while giving hands-on SOC experience to students
โš ๏ธ
2024 Cyber Resilience Trends & Leveling the Cybersecurity Playing Field - BSW #351
โš ๏ธ
HHS Funds $50M to Spot, Patch Hospital Vulnerabilities
โš ๏ธ
Critical Fluent Bit flaw impacts all major cloud providers
๐Ÿ“ข
Weekly Update 400
๐Ÿ“ข
Norway Recommends Replacing SSL VPN to Prevent Breaches
KEV
๐Ÿ“ข
CISA Issues Guidance to Help Federal Agencies Better Encrypt DNS Traffic
๐Ÿ“ข
CISA Senior Official Goldstein to Leave Agency in June
๐Ÿ“ข
Eric Goldstein Leaving CISA for Private Sector Role
๐Ÿ“ข
Judge Denies Class Certification in Blackbaud Hack Lawsuit
๐Ÿ“ข
US SEC Approves Wall Street Data Breach Reporting Regs
๐Ÿ“ข
Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel
๐Ÿ“ข
CISA and ONCD Award the Winners of the Fifth Annual Presidentโ€™s Cup Cybersecurity Competition
๐Ÿ“ข
FCC Targets BGP Vulnerabilities with New Security Mandates
๐Ÿ”ฅ
Kyrgyzstan Unrest Escalates: Hackers Target Nation Amidst Mob Violence
๐Ÿ”ฅ
Cyber Security Today, May 20, 2024 - A ransomware gang claims it hit a Canadian internet provider
๐Ÿ”ฅ
MediSecure Data Breach Impacts Patient and Healthcare Provider Information
๐Ÿ”ฅ
American Radio Relay League Hit by Cyberattack
๐Ÿ”ฅ
SEC Adds New Incident Response Rules for Financial Sector
๐Ÿ”ฅ
2.4 Million Impacted by WebTPA Data Breach
๐Ÿ”ฅ
Australia Investigates Data Breach at National Electronic Prescriptions Provider; Health Data Potentially Compromised
๐Ÿ”ฅ
Addressing the Cybersecurity Vendor Ecosystem Disconnect
๐Ÿ”ฅ
2.4 Million Affected By WebTPA Data Breach
๐Ÿ”ฅ
The Importance of Access Controls in Incident Response
๐Ÿ”ฅ
Live Webinar | Key Cyber Attack Vectors in EU 2023: Discussing AI, Strategies and Goals for 2024
๐Ÿ”ฅ
OmniVision discloses data breach after 2023 ransomware attack
๐Ÿ•ต๏ธ
ISC Stormcast For Monday, May 20th, 2024 https://isc.sans.edu/podcastdetail/8988, (Mon, May 20th)
๐Ÿ•ต๏ธ
Start-Ups: 10 Tips for Navigating the Headwinds Against High-Growth
๐Ÿ•ต๏ธ
Two Chinese Nationals Arrested for Stealing $73M+ Via Cryptocurrency Scams
๐Ÿ•ต๏ธ
Cybersecurity M&A Roundup for First Half of May 2024
๐Ÿ•ต๏ธ
Analyzing MSG Files, (Mon, May 20th)
๐Ÿ•ต๏ธ
Mentorship Monday - Discussions for career and learning!
๐Ÿ•ต๏ธ
CyberArk to Acquire Machine Identity Firm Venafi for $1.54 Billion
๐Ÿ•ต๏ธ
SWARM โ€“ Switchable Backdoor Attack Against Pre-trained Models
๐Ÿ•ต๏ธ
CyberArk to Secure Machine Identities with $1.54B Venafi Buy
๐Ÿ•ต๏ธ
Google Cites โ€˜Monocultureโ€™ Risks in Response to CSRB Report on Microsoft
๐Ÿ•ต๏ธ
New Threat Report Finds Nearly 90% of Cyber Threats Involve Social Engineering
๐Ÿ•ต๏ธ
Security Money: Rubrick Saves The Index As It Continues To Climb - BSW #351
๐Ÿ•ต๏ธ
HHS Warns Health Sector of Business Email Compromise Scams
๐Ÿ•ต๏ธ
APT Hacks and AI-Altered Leaks Pose Biggest Election Threats
๐Ÿ•ต๏ธ
Intel's Max Severity Flaw Affects AI Model Compressor Users
๐Ÿ•ต๏ธ
$100M Dark Web Drug Market Kingpin Arrested at JFK Airport
๐Ÿ•ต๏ธ
New Windows 11 features strengthen security to address evolving cyberthreat landscape
๐ŸŒ
Latrodectus Malware Loader Emerges as IcedID's Successor in Phishing Campaigns
๐ŸŒ
Grandoreiro Banking Trojan is Back With Major Updates
๐ŸŒ
Latrodectus Malware Loader Emerges as Potential Replacement for IcedID
๐ŸŒ
New BiBi Wiper version also destroys the disk partition table
๐ŸŒ
Too Many ICS Assets are Exposed to the Public Internet
๐ŸŒ
Owner of Incognito dark web drugs market arrested in New York
๐Ÿ“ก
UK Government Publishes AI Cybersecurity Guidance
๐Ÿ“ก
CyberArk snaps up Venafi for $1.54B to ramp up in machine-to-machine security
๐Ÿ“ก
Are All Linux Vendor Kernels Insecure? A New Study Says Yes, but Thereโ€™s a Fix
๐Ÿ“ก
White House Unveils AI Safety Framework for US Workers
๐Ÿ“ก
User Outcry As Slack Scrapes Customer Data For AI Model Training
๐Ÿ“ก
How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be
๐Ÿ“ก
Researchers Call Out QNAP For Dragging Its Heels On Patch Development
๐Ÿ“ก
Sustaining Institutional Knowledge as ICT Landscapes Evolve
๐Ÿ“ก
Download the hybrid cloud data protection enterprise buyerโ€™s guide
๐Ÿ“ก
Sophos NDR support for certified hardware deployments
๐Ÿ“ก
Chinese Duo Indicted for Laundering $73m in Pig Butchering Case
๐Ÿ“ก
Windows 11 Recall AI feature will record everything you do on your PC