105Articles
8Categories
2024-05-21Date
🚨
CISA Warns of Attacks Exploiting NextGen Healthcare Mirth Connect FlawCISA has added CVE-2023-43208, an unauthenticated remote code execution vulnerability, to its KEV catalog. The post CISA Warns of Attacks Exploiting NextGen Healthcare Mirth Connect Flaw appeared first on SecurityWeek .
KEV
🐛
PoC Exploit Released for QNAP QTS zero-day RCE Flaw
🐛
"Linguistic Lumberjack" Vulnerability Discovered in Popular Logging Utility Fluent Bit
🐛
NextGen Healthcare Mirth Connect Under Attack - CISA Issues Urgent Warning
KEV
🐛
Fortinet FortiSIEM Command Injection Flaw (CVE-2023-34992) Deep-Dive
🐛
Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox
🐛
PoC exploit for Ivanti EPMM privilege escalation flaw released (CVE 2024-22026)
🐛
Exploiting CVE-2024-32002: RCE via git clone
🐛
Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack
🐛
GitHub warns of SAML auth bypass flaw in Enterprise Server
🐛
Critical GitHub Enterprise Server Flaw Allows Authentication Bypass
⚠️
Nikesh Arora on Why Palo Alto Networks Is Buying IBM QRadar
⚠️
Employee discontent: Insider threat No. 1
⚠️
RSAC Fireside Chat: IRONSCALES utilizes LLM, superior intel to stay a step ahead of Deep Fakes
⚠️
Grandoreiro Malware Hijacks Outlook Client to Send Phishing Emails
⚠️
Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack
⚠️
'Linguistic Lumberjack' Flaw in Logging Utility Fluent Bit Impacts Cloud Services
⚠️
CISA Warns of Actively Exploited NextGen Mirth Connect Pre-Auth RCE Vulnerability
KEV
⚠️
Detecting Malicious Trackers
⚠️
EPA Issues Alert After Finding Critical Vulnerabilities in Drinking Water Systems
⚠️
Critical Bug Allows DoS, RCE, Data Leaks in All Major Cloud Platforms
⚠️
QNAP QTS Zero-Day in Share Feature Gets Public RCE Exploit
⚠️
New ‘Siren’ Mailing List Aims to Share Threat Intelligence for Open Source Projects
⚠️
North Korean Hackers Hijacked Military Officials Personal Email
⚠️
SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure
⚠️
Unpacking XDR & Business Applications - Chris Thomas, Oliver Tavakoli - ASW #286
⚠️
Node.js Secure Coding - Liran Tal - ASW #286
⚠️
Malware Delivery via Cloud Services Exploits Unicode Trick to Deceive Users
⚠️
CISA Releases One Industrial Control Systems Advisory
⚠️
CISA Warns Of Attacks Exploiting NextGen Healthcare Mirth Connect Flaw
⚠️
Audit of Kuksa, the open-source shared building blocks for Software Defined Vehicles
⚠️
QNAP Rushes Patch for Code Execution Flaw in NAS Devices
⚠️
Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud
⚠️
Kevin Mandia Exits Mandiant CEO Role After Google Purchase
KEV
⚠️
Newly Updated Grandoreiro Banking Trojan Distributed Via Phishing Campaigns
⚠️
CISA: NextGen Healthcare Flaw Still Exploited After 7 Months
⚠️
Veeam warns of critical Backup Enterprise Manager auth bypass bug
⚠️
Back to Cooking: Detection Engineer vs Detection Consumer, Again?
📢
Streamlining IT Security Compliance Using the Wazuh FIM Capability
📢
Ubuntu security advisory (AV24-279)
📢
Rockwell Automation Encourages Customers to Assess and Secure Public-Internet-Exposed Assets
📢
Dell security advisory (AV24-281)
📢
IBM security advisory (AV24-280)
📢
Red Hat security advisory (AV24-282)
📢
GitHub security advisory (AV24-284)
📢
[Control systems] CISA ICS security advisories (AV24-283)
📢
Snapchat Revises AI Privacy Policy Following UK ICO Probe
📢
Achieve security compliance with Wazuh File Integrity Monitoring
🔥
Cybercriminals Shift Tactics to Pressure More Victims Into Paying Ransoms
🔥
OmniVision Says Personal Information Stolen in Ransomware Attack
🔥
Have I Been Pwned Employee 1.0: Stefán Jökull Sigurðarson
🔥
CyberheistNews Vol 14 #21 How Come Unknown Attack Vectors Are Surging in Ransomware Infections?
🔥
Conservative cell carrier Patriot Mobile hit by data breach
🔥
Atlassian Bitbucket artifacts can leak plaintext auth secrets
🔥
Western Sydney University data breach exposed student data
🔥
Cyber Insurance Claims Rise Due To Phishing and Social Engineering Cyber Attacks
🔥
Bitbucket artifact files can leak plaintext authentication secrets
🔥
Google Urges Feds to Ditch Microsoft Over Security Concerns
🔥
LockBit says they stole data in London Drugs ransomware attack
🔥
100 Groups Urge Feds to Put UHG on Hook for Breach Notices
🕵️
ISC Stormcast For Tuesday, May 21st, 2024 https://isc.sans.edu/podcastdetail/8990, (Tue, May 21st)
🕵️
North Korea-Linked Kimsuky APT Attack Targets Victims via Messenger
🕵️
Multiple Vulnerabilities in Honeywell VirtualUOC Let Attackers Execute Remote Code
🕵️
Insider Q&A: CIA’s Chief Technologist’s Cautious Embrace of Generative AI
🕵️
Hacktivist Groups Target Indian Elections, Leak Personal Data, Says Report
🕵️
Bad Karma, No Justice: Void Manticore Destructive Activities in Israel
🕵️
Microsoft Unveild New Windows 11 Features To Strengthen Security
🕵️
Working in the security clearance world: How security clearances impact jobs
🕵️
Scanning without Scanning with NMAP (APIs FTW), (Tue, May 21st)
🕵️
DoppelGänger Attack: Malware Routed Via News Websites And Social Media
🕵️
News alert: Memcyco report reveals only 6% of brands can stop digital impersonation fraud
🕵️
Zoom Adding Post-Quantum End-to-End Encryption to Products
🕵️
The Riddle of Data Governance - Steven Fox - CSP #175
🕵️
Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud
🕵️
Prowling the Wilds — Upgrade Your SOC and Hunt Down Threats
🕵️
Arrests made after North Koreans hired for remote tech jobs at US companies
🕵️
Iranian State Hackers Partner Up for Large-Scale Attacks, Report
🕵️
Big Tech, Fighting a Junta, Keylogger in Microsoft, APT Hackers, Free Laundry, Josh - SWN #388
🕵️
The Shadow War: Cognitive Warfare and the Politics of Disinformation
🕵️
AI Companies Make Fresh Safety Promise at Seoul Summit, Nations Agree to Align Work on Risks
🌐
GitCaught Campaign Leverages GitHub Repositories and Fake Profiles for Malicious Infrastructure
🌐
Navigating the Cyber Threat Landscape with a Human-Centric Approach
🌐
Five Core Tenets Of Highly Effective DevSecOps Practices
🌐
Rockwell Automation warns admins to take ICS devices offline
📡
CyberArk Snaps up Venafi for $1.54B to Ramp up in Machine-to-Machine Security
📡
The Mystery of the Targeted Ad and the Library Patron
📡
Consumers Continue to Overestimate Their Ability to Spot Deepfakes
📡
Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses
📡
Training LLMs: Questions Rise Over AI Auto Opt-In by Vendors
📡
Chinese Telco Gear May Get Banned in Germany
📡
Void Manticore Launches Destructive Attacks on Albania and Israel
📡
Zoom adds post-quantum end-to-end encryption to video meetings
📡
Live Webinar | Practical Strategies for Accelerating AI Adoption in Cybersecurity
📡
Google rolls out Chrome fix for empty pages when switching tabs
📡
Zoom Adding Post-Quantum End-to-End Encryption To All Products
📡
Why Your Wi-Fi Router Doubles as an Apple AirTag
📡
OpenSSF Sings A Siren Song To Steer Developers Away From Buggy FOSS
📡
Julian Assange Can Appeal Extradition To The US, London Court Rules
📡
You Can Now Buy A 4-Foot-Tall Humanoid Robot For $16k
📡
Did OpenAI Illegally Mimic Scarlett Johansson's Voice?
📡
Security tips for peripheral devices (ITSAP.70.015)
📡
Updating our SIEM system to version 3.0.3 | Kaspersky official blog
📡
How to Land Your Dream Job in Tech
📡
GhostEngine mining attacks kill EDR security using vulnerable drivers
📡
Untangling the hiring dilemma: How security solutions free up HR processes