84Articles
8Categories
2024-06-03Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2017-3506 Oracle WebLogic Server OS Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malicious c…
KEV
🐛
Critical wpDataTables Vulnerability Let Attackers Perform SQL Injection
🐛
Chromium: CVE-2024-5498 Use after free in Presentation API
🐛
Chromium: CVE-2024-5497 Out of bounds memory access in Keyboard Inputs
🐛
Chromium: CVE-2024-5499 Out of bounds write in Streams API
🐛
Chromium: CVE-2024-5495 Use after free in Dawn
🐛
Chromium: CVE-2024-5496 Use after free in Media Session
🐛
Chromium: CVE-2024-5494 Use after free in Dawn
🐛
Chromium: CVE-2024-5493 Heap buffer overflow in WebRTC
⚠️
What are non-human identities and why do they matter?
⚠️
Microsoft: The brand attackers love to imitate
⚠️
8220 Gang Exploiting Oracle WebLogic Server Flaw To Deploy Cryptominer
⚠️
FlyingYeti targets Ukraine using WinRAR exploit to drop Malware
⚠️
After Snowflake, Hugging Face reports security breach
⚠️
PoC Published for Exploited Check Point VPN Vulnerability
⚠️
CarnavalHeist Weaponizing Word Documents To Steal Login Credentials
⚠️
Improved Guidance for Azure Network Service Tags
⚠️
Identities of Cybercriminals Linked to Malware Loaders Revealed
⚠️
Authorities Ramp Up Efforts to Capture the Mastermind Behind Emotet
⚠️
The growing dichotomy of AI-powered code in cloud-native security
⚠️
Exploit for critical Progress Telerik auth bypass released, patch now
⚠️
Azure Service Tags tagged as security risk, Microsoft disagrees
⚠️
Live Nation SEC filing confirms “unauthorized activity” in wake of alleged Ticketmaster hack
⚠️
Harnessing the Power of Data and AI & The Evolving Role of the CISO - James Doggett, S... - BSW #352
⚠️
Telegram Combolists and 361M Email Addresses
⚠️
Telegram Combolists - 361,468,099 breached accounts
⚠️
Cox fixed an API auth bypass exposing millions of modems to attacks
⚠️
Hope is Not a Security plan, & Neither is Ignoring the Risk—Invest in a Security Solution
⚠️
Telegram Combolists - 361,468,099 breached accounts
📢
Your KnowBe4 Compliance Plus Fresh Content Updates from May 2024
📢
IBM security advisory (AV24-309)
📢
Dell security advisory (AV24-308)
📢
[Control systems] CISA ICS security advisories (AV24-307)
📢
[Control systems] ABB security advisory (AV24-312)
📢
Red Hat security advisory (AV24-311)
📢
Ubuntu security advisory (AV24-310)
📢
Android security advisory – June 2024 Monthly Rollup (AV24-313)
📢
Snowflake Recommends Customers Take Steps to Prevent Unauthorized Access
📢
US Senate finance chair slams Change Healthcare for ‘negligence’ in ransomware attack
📢
Emotional Intelligence for Cyber Leaders - Jessica Hoffman - BSW #352
🔥
Threat Actors Claiming Breach Of Heineken Employees Data
🔥
Cyber Security Today, June 3, 2024 - Four cloud-related data breaches
🔥
Hugging Face Hack: Spaces Secrets Exposed
🔥
Researcher Uncovers Flaws in Cox Modems, Potentially Impacting Millions
🔥
Snowflake Data Breach Impacts Ticketmaster, Other Organizations
🔥
Ticketmaster Confirms Breach Potentially Impacting 560 Million Users
🔥
Snowflake Data Breach Impacts Ticketmaster, Other Organizations
🔥
Researchers Uncover RAT-Dropping npm Package Targeting Gulp Users
🔥
Russia’s Military Intelligence Service Launches Spear Phishing Attacks
🔥
361 million stolen accounts leaked on Telegram added to HIBP
🔥
Lawmakers Urge Pentagon to Diversify Cybersecurity Vendors
🔥
Feds Say Change Healthcare Can Handle Breach Notification
🔥
Collection agency FBCS ups data breach tally to 3.2 million people
🕵️
ISC Stormcast For Monday, June 3rd, 2024 https://isc.sans.edu/podcastdetail/9006, (Mon, Jun 3rd)
🕵️
Secrets Exposed in Hugging Face Hack
🕵️
Andariel Hackers Target South Korean Institutes with New Dora RAT Malware
🕵️
Seeing Like a Data Structure
🕵️
A Wireshark Lua Dissector for Fixed Field Length Protocols, (Mon, Jun 3rd)
🕵️
SASE Threat Report: 8 Key Findings for Enterprise Security
🕵️
Lack of skills and budget slow zero-trust implementation
🕵️
DDoS-as-a-Service: The Rebirth Botnet
🕵️
RSAC Fireside Chat: NightVision shines a light on software vulnerabilities, speeds up remediation
🕵️
OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
Forrester Names Palo Alto Networks a Leader in XDR
🕵️
New Transparent Phishing Attacks Leverage Cloudflare Worker Serverless Computing
🕵️
Snowflake Clients Targeted With Credential Attacks
🕵️
AI in Elections: Manipulating Voters With Easy Voice Cloning
🕵️
Scaling Threat Intel, Consulting: Mandiant's Way With Google
🕵️
Microsoft is again named the overall leader in the Forrester Wave for XDR
🕵️
Microsoft is named a leader in the Forrester Wave for XDR
🌐
Beware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware
🌐
Cyber threat bulletin: Cyber Centre urges Canadians to be aware of and protect against PRC cyber threat activity
📡
AI Will Increase the Quantity—and Quality—of Phishing Scams
📡
Live Webinar | The Machines Are Learning, But Are We?
📡
Baidu Robo-Cars Crashed With Tinfoil And Paint Daubed On Cardboard
📡
Secrets Exposed In Hugging Face Attack
📡
It's Time to Up-Level Your EDR Solution
📡
Verizon users report blurry photos in Android messaging apps
📡
Fake tech support scams: what they are and how to stay safe | Kaspersky official blog
📡
Data firm execs convicted for helping fraudsters target the elderly
📡
Microsoft India’s X account hijacked in Roaring Kitty crypto scam
📡
Guide to Better Extended Threat Detection and Response (XDR)
📡
The murky world of password leaks – and how to check if you’ve been hit