80Articles
7Categories
2024-06-06Date
🐛
Whose Vulnerability Is It Anyway? - Josh Bressers - PSW #831
🐛
Hackers exploit 2018 ThinkPHP flaws to install ‘Dama’ web shells
⚠️
Kali Linux 2024.2 Released With New Hacking Tools
⚠️
What CISOs need to know about Microsoft’s Copilot+
KEV
⚠️
Apple Refused to Pay $1 Million Bounty to Kaspersky Lab for iOS Zero-days
⚠️
Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers
⚠️
Hackers Exploit Legitimate Packer Software to Spread Malware Undetected
⚠️
Vulnerability in Cisco Webex cloud service exposed government authorities, companies
⚠️
“Operation Endgame” Ends with the Arrest of 4 Cybercriminal Suspects and 100 Servers
⚠️
Complaints in EU challenge Meta’s plans to utilize personal data for AI
⚠️
Exploitation of Recent Check Point VPN Zero-Day Soars
⚠️
Muhstik Botnet Exploiting Apache RocketMQ Flaw to Expand DDoS Attacks
⚠️
CISA Releases Four Industrial Control Systems Advisories
⚠️
FBI offers to share 7,000 LockBit ransomware decryption keys with CISOs
⚠️
Routers, Breaches, and Vulnerabilities - PSW #831
⚠️
Chinese Hackers Exploit Old ThinkPHP Vulnerabilities in New Attacks
⚠️
Microsoft Says Azure Cloud Attack Scenario Isn't a Flaw
⚠️
7-Year-Old Oracle WebLogic Bug Under Active Exploitation
⚠️
Ukraine says hackers abuse SyncThing data sync tool to steal data
⚠️
Interest in Identity Security is Spiking - Will Lin - ESW #364
⚠️
Securing Health, Creating Phishing-Resistant Users & Rising Ransomware Stakes - Jim Br... - ESW #364
⚠️
The Cybersecurity Market Gets Some New Quirks and Features - ESW #364
⚠️
Weekly Update 403
⚠️
Ukraine says hackers abuse SyncThing tool to steal data
📢
Fog Ransomware Attacking Windows Servers Administrators To Steal RDP Logins
📢
AI-driven compliance: The key to cloud security
📢
[Control systems] ABB security advisory (AV24-316)
📢
SolarWinds security advisory (AV24-318)
📢
HPE security advisory (AV24-317)
📢
Senator Demands That HHS Ratchet Up Health Sector Cyber Regs
🔥
Buffalo Man Pleads Guilty To Buying Stolen Data From Genesis Market
🔥
FBI Says It Has 7,000 LockBit Ransomware Decryption Keys
🔥
Prevent Account Takeover with Better Password Security
🔥
Upleveling the State of SMB Cybersecurity
🔥
Third-Party Cyber Attacks: The Threat No One Sees Coming – Here's How to Stop Them
🔥
A Russian Cyber Gang Is Thought to Be Behind a Ransomware Attack That Hit London Hospitals
🔥
Live Webinar UK Ransomware Crisis in Finance: Cultivating Immunity Through Robust Security Practices
🔥
PandaBuy pays ransom to hacker only to get extorted again
🔥
Hit by LockBit? The FBI is waiting to help you with over 7,000 decryption keys
🔥
New Fog ransomware targets US education sector via breached VPNs
🔥
Breach Roundup: Microsoft Deprecates NTLM Authentication
🔥
Dutch political websites hit by cyber attacks as EU voting starts
🔥
Los Angeles Unified School District investigates data theft claims
🔥
Transatlantic Cable podcast episode 350 | Kaspersky official blog
🕵️
ISC Stormcast For Thursday, June 6th, 2024 https://isc.sans.edu/podcastdetail/9012, (Thu, Jun 6th)
🕵️
Parrot Security OS 6.1 Released – What’s New
🕵️
Python Developers Beware! Russian Hackers Targeting You With Malicious Packages
🕵️
Hackers Attacking Banking Customers Using Phishing-As-A-Service V3B Toolkit
🕵️
UNC1151 Hackers Weaponizing Excel Documents To Attack Windows Machine
🕵️
Interpol and FBI Break Up a Cyber Scheme in Moldova to Get Asylum for Wanted Criminals
🕵️
Multiple Chinese APTs Targeted Southeast Asian Government for Two Years
🕵️
Cisco addressed Webex flaws used to compromise German government meetings
🕵️
GitHub - xaitax/TotalRecall: This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots.
🕵️
Vulnerabilities Patched in Kiuwan Code Security Products After Long Disclosure Process
🕵️
Social Engineering Scams Can Come in the Mail, Too
🕵️
26% of Global Organizations Lack Security Training Programs
🕵️
Google, Microsoft: Russian Threat Actors Pose High Risk to 2024 Paris Olympics
🕵️
US Authorities Attempting to Recover $5.3 Million Stolen in BEC Scam
🕵️
Why Hackers Love Logs
🕵️
SHARED INTEL Q&A: Forrester report shows Identity and Access Management (IAM) in flux
🕵️
Espionage with a Drone
🕵️
SSTIC 2024 - FRENCH language conference
🕵️
Cryptohack Roundup: Robinhood to Acquire Bitstamp
🕵️
Renewed Info Stealer Campaign Targets Ukrainian Military
🕵️
Wiz Counters Orca Security's Patent Infringement Allegations
🕵️
US Regulators Intensify Antitrust Scrutiny of AI Developers
🕵️
Meta's AI Model Training Comes Under European Scrutiny
🎙️
Smashing Security podcast #375: Crashing robo-taxis, and name-dropping rappers
📡
Hackers Target Python Developers with Fake "Crytic-Compilers" Package on PyPI
📡
Google Maps Timeline Data to be Stored Locally on Your Device for Privacy
📡
Malicious Python Script with a "Best Before" Date, (Thu, Jun 6th)
📡
Download our password managers enterprise buyer’s guide
📡
Kaspersky SIEM: normalizers and correlation rules | Kaspersky official blog
📡
New Gitloker attacks wipe GitHub repos in extortion scheme
📡
US Proposes To Boost Internet Security, Citing Chinese Carrier Action
📡
Microsoft Shows Venerable And Vulnerable NTLM Security Protocol The Door
📡
Why Hackers Love Logs
📡
Security Industry Has RaaS Model Wrong, Says Expert
📡
Google To Start Permanently Deleting Users' Location History
📡
The job hunter’s guide: Separating genuine offers from scams