107Articles
8Categories
2024-05-22Date
🐛
Critical Veeam Backup Enterprise Manager Flaw Allows Authentication Bypass
🐛
QNAP Patches New Flaws in QTS and QuTS hero Impacting NAS Appliances
🐛
Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code
⚠️
Rise of zero-day exploits reshape security recommendations
KEV
⚠️
Threat Actors Leverage Bitbucket Artifacts to Breach AWS Accounts
⚠️
MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks
⚠️
Veeam Warns of Critical Backup Enterprise Manager Auth Bypass Bug
⚠️
Authelia: Open-Source Authentication and Authorization Server
⚠️
GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack
⚠️
Breach Forums Plans Dark Web Return This Week Despite FBI Crackdown
⚠️
OmniVision Technologies Cyber Attack, Hackers Stolen Personal Data in Ransomware Attack
⚠️
Critical Vulnerability in Honeywell Virtual Controller Allows Remote Code Execution
⚠️
Critical Veeam Vulnerability Leads to Authentication Bypass
⚠️
Critical Authentication Bypass Resolved in GitHub Enterprise Server
⚠️
Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries
⚠️
Turla Hackers Leveraging Microsoft Build Engine To Deliver Malware Stealthily
⚠️
Ikaruz Red Team Leveraging LockBit Builder To Launch Ransomware Attacks
⚠️
Microsoft’s new Windows 11 Recall is a privacy nightmare
⚠️
Microsoft Azure’s Russinovich sheds light on key generative AI threats
⚠️
LockBit Demands $25M Ransom from Canadian Drug Store Chain
⚠️
US government could mandate quantum-resistant encryption from July
⚠️
On Fire Drills and Phishing Tests
⚠️
Building DDoS Botnets with TP-Link and Netgear Routers
⚠️
Building DDoS Botnets with TP-Link and Netgear Routers
📋
Ivanti Patches Critical Code Execution Vulnerabilities in Endpoint Manager
📢
Zoom Adopts NIST-Approved Post-Quantum End-to-End Encryption for Meetings
📢
Snapchat Revises AI Privacy Policy Following UK ICO Probe
📢
Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats
📢
Proof of Concept: Ensuring AI Compliance, Security Controls
📢
Ivanti security advisory (AV24-286)
📢
Google Chrome security advisory (AV24-285)
📢
VMware security advisory (AV24-287)
📢
UK Cybersecurity Org Offers Advice for Thwarting BEC Attacks
📢
Atlassian security advisory (AV24-289)
📢
Cisco security advisory (AV24-288)
📢
Rockwell Automation Urges Disconnection of ICS from the Internet
📢
Microsoft's Recall Stokes Security and Privacy Concerns
🔥
Hackers Breached Western Sydney University Microsoft 365 & Sharepoint Environments
🔥
100 Groups Urge Feds to Put UHG on Hook for Breach Notices
🔥
Cyber Security Today, May 22, 2024 - LockBit ransomware gang hits more victims, Fluent Bit servers need to be updated, and more
🔥
More Than 70% of Surveyed Water Systems Failed to Meet EPA Cyber Standards
🔥
Virtual Event Today: Threat Detection and Incident Response (TDIR) Summit
🔥
Hackers Claiming Access to Qatar National Bank Database
🔥
Chinese Cyber Espionage Groups Tied to ORB Network Attacks
🔥
LockBit Dethroned As Ransomware Leader Since Takedown
🔥
LastPass is now encrypting URLs in password vaults for better security
🔥
Intercontinental Exchange to pay $10M SEC penalty over VPN breach
🔥
State hackers turn to massive ORB proxy networks to evade detection
🔥
Russia's Turla APT Abuses MSBuild to Deliver TinyTurla Backdoor
🔥
Novel EDR-Killing 'GhostEngine' Malware Is Built for Stealth
🔥
Check Your Wallet? How Mobile Driver’s Licenses are Changing Online Transactions
🕵️
ISC Stormcast For Wednesday, May 22nd, 2024 https://isc.sans.edu/podcastdetail/8992, (Wed, May 22nd)
🕵️
Chrome 125 Update Patches High-Severity Vulnerabilities
🕵️
Beware – Your Customer Chatbot is Almost Certainly Insecure: Report
🕵️
Unredacting Pixelated Text
🕵️
Cloud-Based Malware Attack Abusing Google Drive & Dropbox
🕵️
Holes in Your Bitbucket: Why Your CI/CD Pipeline Is Leaking Secrets
🕵️
Announcing KnowBe4 Student Edition: Cybersecurity Education Tailored for the Next Generation
🕵️
AI in Cyber Is Here to Stay — How to Weather This Sea Change
🕵️
What are You Working on Wednesday
🕵️
DHS establishes Artificial Intelligence Safety and Security Board
🕵️
NMAP Scanning without Scanning (Part 2) - The ipinfo API, (Wed, May 22nd)
🕵️
Stealerium Malware Targeting Wi-Fi Networks, Outlook to Steal Login Credentials
🕵️
Unfading Sea Haze APT Targeting South China Sea Governments
🕵️
Chinese hackers hide on military and govt networks for 6 years
🕵️
US to Invest $50 Million in Securing Hospitals Against Cyber Threats
🕵️
Rockwell Automation Urges Customers to Disconnect ICS From Internet
🕵️
Criminal IP: Enhancing Security Solutions through AWS Marketplace Integration
🕵️
News alert: AI SPERA integrates its ‘Criminal IP’ threat intelligence tool into AWS Marketplace
🕵️
News analysis Q&A: Shake up of the SIEM, UEBA markets continues as LogRhythm-Exabeam merge
🕵️
Pakistani-Aligned APT36 Targets Indian Defense Organizations
🕵️
Don't Let Criminals Steal Your Summer Fun
🕵️
Malicious Use of Generative AI Large Language Models Now Comes in Multiple Flavors
🕵️
SOCRadar Raises $25M Series B for Threat Intel Tech
🕵️
Systems Of Trust - Robert Martin - BTS #30
🕵️
OpenText Boosts MDR Offering for MSPs With Pillr Acquisition
🕵️
Anyone Can Trick AI Bots into Spilling Passwords
🌐
23-year-old alleged founder of dark web Incognito Market arrested after FBI tracks cryptocurrency payments
🌐
Congo Lawyers Say They Have New Evidence On Apple's Minerals Supply Chain
🌐
Rockwell Automation Urges Customers To Disconnect ICS From Internet
🌐
Spyware found on US hotel check-in computers
🌐
Smashing Security podcast #373: iPhone undeleted photos, and stealing Scarlett Johansson’s voice
📡
Reducing CSO-CIO tension requires recognizing the signs
📡
Live Webinar Today | Practical Strategies for Accelerating AI Adoption in Cybersecurity
📡
AI Chatbots Highly Vulnerable to Jailbreaks, UK Researchers Find
📡
Zoom Adds ‘Post-Quantum’ Encryption for Video Conferencing
📡
Is it possible to spy on keystrokes from an Android on-screen keyboard? | Kaspersky official blog
📡
Exploring the Depths of SolarMarker's Multi-tiered Infrastructure
📡
Set of Bugs Puts Software Company and IoT Device Makers Into Motion
📡
The Ultimate SaaS Security Posture Management Checklist, 2025 Edition
📡
ARPA-H Pledges $50M for Hospital IT Security Auto-Patching
📡
GhostEngine Mining Attacks Kill EDR Security Using Vulnerable Drivers
📡
Preventative security tools (ITSAP.00.058)
📡
Researchers Spot Cryptojacking Attack That Disables Endpoint Protections
📡
Microsoft's AI Recall Feature Raises Security, Privacy Concerns
📡
Uncle Sam To Inject $50M Into Auto-Patcher For Hospital IT
📡
GitHub Enterprise Server Patches 10-outta-10 Critical Hole
📡
We May Know A Whole Lot More About UFOs Soon
📡
Bolster, creator of the CheckPhish phishing tracker, raises $14M led by Microsoft’s M12
📡
OnDemand | Practical Strategies for Accelerating AI Adoption in Cybersecurity
📡
OnDemand | Practical Strategies for Accelerating AI Adoption in Cybersecurity
📡
Webinar | Mythbusting MDR
📡
Microsoft to start killing off VBScript in second half of 2024
📡
Windows 11 24H2 now rolling out to Release Preview Insiders
📡
ISPM & ITDR Synergize for AI-Based Identity Security
📡
Webinar | Level Up Your Security Stack: EDR vs Endpoint Privilege Management
📡
What happens when AI goes rogue (and how to stop it)