72Articles
7Categories
2024-06-19Date
⚠️
Is it time to split the CISO role?
⚠️
Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
⚠️
Beware of Nevermore Actor Promoting Ransomware Builder
⚠️
Threat Actors Claiming Breach of AMD Source Code on Hacking Forums
⚠️
CISA Warns of PoC Exploit for Vulnerability in RAD SecFlow-2 Industrial Switch
⚠️
Chrome 126 Update Patches Vulnerability Exploited at Hacking Competition
⚠️
Stuxnet, The Malware That Propagates To Air-Gapped Networks
⚠️
F5 Big-IP Appliances Exploited For 3 Years By China Linked Group
⚠️
Hackers are selling stolen AMD data on the dark web in exchange for crypto
⚠️
Hackers Using VPNs To Exploit Restrictions & Steal Mobile Data
⚠️
"Researchers" exploit Kraken exchange bug, steal $3 million in crypto
⚠️
Amtrak Data Breach: Hackers Accessed User’s Email Address
⚠️
Chinese Cyber Espionage Group Exploits Fortinet, Ivanti and VMware Zero-Days
⚠️
Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
⚠️
Chat apps’ end-to-end encryption threatened by EU legislation
⚠️
Pegasus can target government and military officials
⚠️
Popular Chatbots Spout Russian Misinformation, Finds Study
⚠️
Pentagon Cybersecurity, Workforce Woes Threaten Tech Rollout
⚠️
New Blog Moderation Policy
⚠️
Smashing Security podcast #377: An unhealthy data dump, railway surveillance, and a cheater sues Apple
⚠️
Chinese Hackers Used Open-Source Rootkits for Espionage
⚠️
T-Mobile denies it was hacked, links leaked data to vendor breach
📋
Cyber Security Today, June 19, 2024 - How an attacker hid on an IT network for three years
📋
Chrome Security Update – Patch for 6 Vulnerabilities
📢
Google Chrome security advisory (AV24-342)
📢
Juniper Networks security advisory (AV24-344)
📢
Atlassian security advisory (AV24-343)
📢
VMware security advisory (AV24-345)
📢
Russian State Hackers Target French Government for Espionage
🔥
AMD Investigating Breach Claims After Hacker Offers to Sell Data
🔥
Void Arachne Uses Deepfakes and AI to Deliver Malicious VPNs to Chinese Users
🔥
AMD Investigating Breach Claims After Hacker Offers To Sell Data
🔥
UK Pathology Lab Ransomware Attackers Demanded $50 Million
🔥
Hackers Weaponize Windows Installer (MSI) Files to Deliver Malware
🔥
Amtrak Says Guest Rewards Accounts Hacked in Credential Stuffing Attacks
🔥
CDK Global cyberattack shuts down most auto dealership systems nationwide
🔥
CDK Global cyberattack impacts thousands of US car dealerships
🔥
Advance Auto Parts confirms data breach exposed employee information
🔥
Crown Equipment confirms a cyberattack disrupted manufacturing
🔥
Radiology Practice Hack Affects Sensitive Data of 512,000
🕵️
Behind the Great Wall: Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 C&C Framework
🕵️
Beware Of Fake Microsoft Teams Website That Installs Oyster Malware
🕵️
Handling BOM MIME Files, (Wed, Jun 19th)
🕵️
Warning: Markopolo's Scam Targeting Crypto Users via Fake Meeting Software
🕵️
The Perilous Role of the CISO: Navigating Modern Minefields
🕵️
t2/2024 - Systems Alchemy: The Transmutation of Hacking (Thaddeus grugq)
🕵️
HackSpaceCon 2024 - 8 hour livestream
🕵️
Happy 1st Birthday to Our KnowBe4 Community!
🕵️
New PhaaS Platform Lets Attackers Bypass Two-Factor Authentication
🕵️
Info Stealing Campaign Uses DLL Sideloading Through Legitimate Cisco Webex’s Binaries for Initial Execution and Defense Evasion
🕵️
SonicWall environment left open, exposing some data – customers safe
🕵️
US, Allies Publish Guidance on Securing Network Access
🕵️
NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out
🕵️
Cybersecurity M&A Roundup for First Half of June 2024
🕵️
SimpleX Chat Group about Privacy & Security
🕵️
3 Tactics to Combat Threat Actors That Work Beyond the 9 to 5 | Live Webinar
🕵️
Massachusetts 911 Outage Caused by Errant Firewall
🕵️
ISC2/CIISec Tips on Recruitment, Retention in Cybersecurity
🕵️
Mitre ATT&CK - Adam Pennington - BTS #32
🕵️
Hacker Heroes - Dave Aitel - PSW Vault
🌐
Sophos Email awarded VBSpam+ certification
🌐
The Hacking of Culture and the Creation of Socio-Technical Debt
📡
New Case Study: Unmanaged GTM Tags Become a Security Nightmare
📡
VMware Fixes 2 Critical Bugs
📡
AI Makes Nvidia The World's Most Valuable Company
📡
Webinar | 2023 OT Cybersecurity Year in Review: Lessons Learned from the Frontlines
📡
How phishing using progressive web apps (PWAs) works | Kaspersky official blog
📡
Live Webinar | Executive Insights: Transforming Threats into Opportunities with Cyber Resilience
📡
Webinar | Strengthening Security Defenses using AI-Powered Secrets Management
📡
Ever Tried to Report a Scam on Facebook? Good Luck!
📡
Making the Move From Tech Expert to Cybersecurity Leader
📡
Hacktivism is evolving – and that could be bad news for organizations everywhere