106Articles
10Categories
2024-05-23Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2020-17519 Apache Flink Improper Access Control Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber a…
KEV
πŸ›
Hijack of monitoring devices highlights cyber threat to solar power infrastructure
πŸ›
Critical SAML Auth Bypass Vulnerability Found in GitHub Enterprise Server
πŸ›
Critical flaw found in Fluent Bit cloud services monitoring component
πŸ›
Ivanti Patches Critical Remote Code Execution Flaws in Endpoint Manager
πŸ›
CISA Warns of Actively Exploited Apache Flink Security Vulnerability
KEV
πŸ›
Exploits Make You More Secure - PSW #830
⚠️
Personal AI Assistants and Privacy
⚠️
Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report
⚠️
Apple’s Wi-Fi Positioning Can Be System Abused To Track Users
⚠️
UserPro Plugin Vulnerability Allows Account Takeover
⚠️
Bugcrowd, the crowdsourced white-hat hacker platform, acquires Informer to ramp up its security chops
⚠️
Creating a Security Program with Less Complexity and More Visibility
⚠️
Ransomware Fallout: 94% Experience Downtime, 40% Face Work Stoppage
⚠️
Fake Pegasus spyware source code floods dark web: report
⚠️
Keylogger Malware Campaign Exploits Microsoft Exchange Server Flaws to Hit Over 30 Victims
⚠️
EU resilience regulation DORA has financial CISOs waiting for answers
⚠️
CISA Releases One Industrial Control Systems Advisory
⚠️
Northern Ireland police faces Β£750k fine after exposing staff info
⚠️
High-severity GitLab flaw lets attackers take over accounts
⚠️
Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern
⚠️
LockBit no longer world’s No. 1 ransomware gang
⚠️
Microsoft amps up focus on Windows 11 security to address evolving cyberthreats
⚠️
Tracking manual attacks may deliver zero-day previews
⚠️
Unified Identity Security, Identity is Under Attack & Identity is Security - Andre Dur... - ESW #363
⚠️
Secure Code From the Start, Security Validation & Platformization - Maxime Lamothe-Bra... - ESW #363
⚠️
A Vulnerability in GitHub Enterprise Server (GHES) Could Allow for Authentication Bypass
⚠️
Cryptohack Roundup: $206M Gala Games Exploit
⚠️
Stark Industries Solutions: An Iron Hammer in the Cloud
πŸ“‹
Microsoft pushes emergency fix for Windows Server 2019 update errors
πŸ“’
Former White House Cyber Official Jeff Greene to Join CISA
πŸ“’
55,000 Impacted by Cyberattack on California School Association
πŸ“’
Microsoft's Recall Stokes Security and Privacy Concerns
πŸ“’
HPE security advisory (AV24-290)
πŸ“’
Rockwell Automation Says to Disconnect ICS From the Internet
πŸ“’
GitLab security advisory (AV24-292)
πŸ“’
Mitel security advisory (AV24-291)
πŸ“’
The Aspen Institute's Jeff Greene Is Headed to CISA
πŸ”₯
Pen Testing As A Service - Seemant Sehgal - PSW #830
πŸ”₯
Dota2 - 1,907,205 breached accounts
πŸ”₯
OnDemand | Key Cyber Attack Vectors in EU 2023: Discussing AI, Strategies and Goals for 2024
πŸ”₯
SEC Fines NYSE Owner ICE for Delay in Reporting VPN Breach
πŸ”₯
Using AI, Mastercard Expects to Find Compromised Cards Quicker, Before They Get Used by Criminals
πŸ”₯
400,000 Impacted by CentroMed Data Breach
πŸ”₯
Cybersecurity Labeling for Smart Devices Aims to Help People Choose Items Less Likely to be Hacked
πŸ”₯
70% Of CISOs Worry Their Org Is At Risk Of A Material Cyber Attack
πŸ”₯
55,000 Impacted By Cyberattack On California School Association
πŸ”₯
Breach Forums Plans Dark Web Return This Week Despite FBI Crackdown
πŸ”₯
Air-Ground Ambulance Firm Tells 858,000 of Hack 1 Year Ago
πŸ”₯
Breach Roundup: Fluent Bit Flaw Is Risky for Cloud Providers
πŸ”₯
JAVS courtroom recording software backdoored in supply chain attack
πŸ”₯
Building an AI strategy for the modern SOC
πŸ”₯
UK Government ponders major changes to ransomware response – what you need to know
πŸ•΅οΈ
Analysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary], (Wed, May 22nd)
πŸ•΅οΈ
ISC Stormcast For Thursday, May 23rd, 2024 https://isc.sans.edu/podcastdetail/8994, (Thu, May 23rd)
πŸ•΅οΈ
Microsoft Replacing VBScript With JavaScript & PowerShell
πŸ•΅οΈ
RSAC Fireside Chat: Qwiet AI leverages graph-database technology to reduce AppSec noise
πŸ•΅οΈ
OpenText Acquires Cybersecurity MDR Platform for MSPs
πŸ•΅οΈ
Spyware App Found Running on Multiple US Hotel Check-In Computers
πŸ•΅οΈ
Why We Need to Get a Handle on AI
πŸ•΅οΈ
Newly Detected Chinese Group Targeting Military, Government Entities
πŸ•΅οΈ
NYSE Operator Intercontinental Exchange Gets $10M SEC Fine Over 2021 Hack
πŸ•΅οΈ
Inside Operation Diplomatic Specter: Chinese APT Group's Stealthy Tactics Exposed
πŸ•΅οΈ
Insomni'hack 2024 - 28 talks
πŸ•΅οΈ
Bolster Raises $14 Million for AI-Powered Phishing Protection
πŸ•΅οΈ
U.S. House Panel Takes on AI Security and Misuse
πŸ•΅οΈ
Some Microsoft services, DuckDuckGo hit by global outage
πŸ•΅οΈ
VMware Abused in Recent MITRE Hack for Persistence, Evasion
πŸ•΅οΈ
Chinese Hackers Hide on Military and Government Networks for Six Years
πŸ•΅οΈ
New Frontiers, Old Tactics: Chinese Espionage Group Targets Africa & Caribbean Govts
πŸ•΅οΈ
How I got started: AI security researcher
πŸ•΅οΈ
Criminal record database of millions of Americans dumped online
πŸ•΅οΈ
GitHub Fixes Maximum Severity Flaw in Enterprise Server
πŸ•΅οΈ
Over 200K Likely Vulnerable Confluence Data Center Instances Exposed
πŸ•΅οΈ
Active Chinese Cyberespionage Campaign Rifling Email Servers
πŸ•΅οΈ
US Intelligence Agencies’ Embrace of Generative AI Is at Once Wary and Urgent
πŸ•΅οΈ
New Research Finds Phishing Scams Targeting Popular PDF Viewer
πŸ•΅οΈ
From Boredom to Engagement: Gamification in Cybersecurity Awareness
πŸ•΅οΈ
Microsoft spots gift card thieves using cyber-espionage tactics
πŸ•΅οΈ
Secure Your Site: Learn from the Top 10 Cybersecurity Experts of 2024
πŸ•΅οΈ
DNSBomb Pulsing DoS Attack
πŸ•΅οΈ
Bugcrowd Buys Informer to Enhance Attack Surface Management
πŸ•΅οΈ
This Week: short on funding, long on research and analysis - ESW #363
πŸ•΅οΈ
Cyber Signals: Inside the growing risk of gift card fraud
🌐
Scammers are Selling Fake NSO Pegasus Spyware
🌐
Rockwell Automation Urges Disconnection of ICS from the Internet
🌐
Consumer-Grade Spyware App Found on US Hotel Check-in Computers
🌐
CLOUD#REVERSER Campaign Leverages Cloud Storage for Malware Delivery
🌐
10 years in prison for $4.5 million BEC scammer who bought Ferrari to launder money
πŸŽ™οΈ
Transatlantic Cable podcast episode 348 | Kaspersky official blog
πŸ“‘
Secure Your Applications: Learn How to Prevent AI Generated Code Risks
πŸ“‘
The End of an Era: Microsoft Phases Out VBScript for JavaScript and PowerShell
πŸ“‘
Server-Side Credit Card Skimmer Lodged in Obscure Plugin
πŸ“‘
Microsoft outage affects Bing, Copilot, DuckDuckGo and ChatGPT internet search
πŸ“‘
OpenText Boosts MDR Offering for MSPs With Pillr Acquisition
πŸ“‘
Apple Wi-Fi Positioning System Open to Global Tracking Abuse
πŸ“‘
Are Your SaaS Backups as Secure as Your Production Data?
πŸ“‘
Snowflake's Anvilogic Investment Signals Changes in SIEM Market
πŸ“‘
How Apple Wi-Fi Positioning System Can Be Abused To Track People Around The Globe
πŸ“‘
VMware Abused In Recent MITRE Hack For Persistence, Evasion
πŸ“‘
Veeam Patches Critical Flaw That Puts Enterprise Backups At Risk
πŸ“‘
Transitioning to a cyber resilience approach (ITSAP.10.190)
πŸ“‘
Cybercriminals are Targeting Elections in India With Influence Campaigns
πŸ“‘
Apple wasn’t storing deleted iOS photos in iCloud after all
πŸ“‘
Unsaflok: how to forge keycards for Saflok locks | Kaspersky official blog
πŸ“‘
Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries