85Articles
8Categories
2024-06-20Date
๐Ÿ›
Fortinet, Ivanti zero-day victims face evolved persistence by the espionage actor
๐Ÿ›
Hundreds of PC, Server Models Possibly Affected by Serious Phoenix UEFI Vulnerability
๐Ÿ›
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
๐Ÿ›
Chromium: CVE-2024-6103: Use after free in Dawn
๐Ÿ›
Chromium: CVE-2024-6102: Out of bounds memory access in Dawn
๐Ÿ›
Chromium: CVE-2024-6101: Inappropriate implementation in WebAssembly
๐Ÿ›
Chromium: CVE-2024-6100 Type Confusion in V8
๐Ÿ›
CVE-2024-38093 Microsoft Edge (Chromium-based) Spoofing Vulnerability
๐Ÿ›
CVE-2024-38082 Microsoft Edge (Chromium-based) Spoofing Vulnerability
๐Ÿ›
Phoenix UEFI vulnerability impacts hundreds of Intel PC models
โš ๏ธ
How AWS secures its infrastructure with Sonaris
โš ๏ธ
Diamorphine Rootkit Exploiting Linux Systems In The Wild
โš ๏ธ
SELKS: Open-source Suricata IDS/IPS, network security monitoring, threat hunting - Help Net Security
โš ๏ธ
Semperis, a specialist in Active Directory security now worth more than $1B, raises $125M
โš ๏ธ
Critical UEFI Flaw in Phoenix Firmware Hits Major PC Brands
โš ๏ธ
CISA Releases Three Industrial Control Systems Advisories
โš ๏ธ
Biden to ban US sales of Kaspersky software over ties to Russia, source says
โš ๏ธ
Hackers Exploit Progressive Web Apps to Steal Passwords
โš ๏ธ
SolarWinds Serv-U path-traversal flaw actively exploited in attacks
KEV
โš ๏ธ
EU Member States remain divided on controversial CSAM-scanning plan โ€” but for how long?
โš ๏ธ
Dutch appellate court rules against Oracle and Salesforce in a GDPR-related cookie case
โš ๏ธ
UNC3886 hackers use Linux rootkits to hide on VMware ESXi VMs
โš ๏ธ
CISA Releases Guidance on Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: (SMBs)
โš ๏ธ
How to achieve multi-cloud security at the speed of DevOps
โš ๏ธ
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Ke... - ESW Vault
โš ๏ธ
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - T... - ESW Vault
โš ๏ธ
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
โš ๏ธ
Why the clean source principle is key to a successful zero trust strategy
โš ๏ธ
CosmicSting flaw impacts 75% of Adobe Commerce, Magento sites
โš ๏ธ
Biden Administration Bans Kaspersky Antivirus Software
โš ๏ธ
Cryptohack Roundup: Kraken, CertiK Feud Over Zero-Day, $3M
๐Ÿ“‹
Biden bans Kaspersky antivirus software in US over security concerns
๐Ÿ“ข
12 hottest IT security certs for higher pay today
๐Ÿ“ข
French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks
๐Ÿ“ข
Will Upcoming HHS Cyber Regs Move Needle in Health Sector?
๐Ÿ”ฅ
Threat Actors Claiming Breach of Accenture Employee Data
๐Ÿ”ฅ
RSAC Fireside Chat: Tightened budgets impose discipline on CISOs, resets security investments
๐Ÿ”ฅ
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
๐Ÿ”ฅ
Threat Actor Claims Breach of Jollibee Fast-Food Gaint
๐Ÿ”ฅ
LockBit Ransomware Again Most Active โ€“ Real Attack Surge or Smokescreen?
๐Ÿ”ฅ
Ransomware attacks skyrocket, with LockBit 3.0 at the forefront
๐Ÿ”ฅ
US car dealerships face ongoing outage after CDK cyberattacks
๐Ÿ”ฅ
CDK Global hacked again while recovering from first cyberattack
๐Ÿ”ฅ
The Indispensable World of Red Teaming
๐Ÿ”ฅ
Hacker Leaks Data of 33,000 Accenture Employees in Third-Party Breach
๐Ÿ”ฅ
Victims of Snowflake Data Breach Receive Ransom Demands
๐Ÿ”ฅ
Qilin ransomware: What you need to know
๐Ÿ”ฅ
Cyber attack hits thousands of US car dealers
๐Ÿ”ฅ
Breach Roundup: Phishing Platform ONNX Targets Microsoft 365
๐Ÿ”ฅ
Microsoft 365's Security Gaps: Logging and Beyond
๐Ÿ”ฅ
Linux version of RansomHub ransomware targets VMware ESXi VMs
๐Ÿ”ฅ
Transatlantic Cable podcast episode 352 | Kaspersky official blog
๐Ÿ”ฅ
My health information has been stolen. Now what?
๐Ÿ•ต๏ธ
No Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary], (Thu, Jun 20th)
๐Ÿ•ต๏ธ
OffensiveCon24 - 20 videos
๐Ÿ•ต๏ธ
Atlassian Patches High-Severity Vulnerabilities in Confluence, Crucible, Jira
๐Ÿ•ต๏ธ
Post-Quantum Cryptography Firm PQShield Raises $37 Million
๐Ÿ•ต๏ธ
Recovering Public Keys from Signatures
๐Ÿ•ต๏ธ
Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
๐Ÿ•ต๏ธ
Portuguese bank exposes client data, raising fears of account hijacking
๐Ÿ•ต๏ธ
Russian State Hackers Target French Government for Espionage
๐Ÿ•ต๏ธ
AI Weights: Securing the Heart and Soft Underbelly of Artificial Intelligence
๐Ÿ•ต๏ธ
Semperis Eyes IPO With $125 Million in Growth Financing
๐Ÿ•ต๏ธ
Highly Evasive SquidLoader Malware Targets China
๐Ÿ•ต๏ธ
INE Security: Optimizing Teams for AI and Cybersecurity
๐Ÿ•ต๏ธ
What are You Working on Wednesday (Thursday Edition)
๐Ÿ•ต๏ธ
Access Management Startup Pomerium Raises $13.75 Million
๐Ÿ•ต๏ธ
OpenAI Co-Founder Sutskever Sets up New AI Company Devoted to โ€˜Safe Superintelligenceโ€™
KEV
๐Ÿ•ต๏ธ
1inch partners with Blockaid to enhance Web3 security through the 1inch Shield
๐Ÿ•ต๏ธ
Vacation-Themed Scams Are Spiking
๐Ÿ•ต๏ธ
Long-Running Chinese Espionage Campaign Targets Telecom Firms in Asian Country
๐Ÿ•ต๏ธ
Water facilities warned to improve cybersecurity
๐Ÿ•ต๏ธ
Staying Safe with Chrome Extensions
๐Ÿ•ต๏ธ
European CSAM Scanning Proposal Runs Into Opposition
๐Ÿ•ต๏ธ
DHS Unveils Critical Infrastructure Cybersecurity Guidance
๐ŸŒ
Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
๐ŸŒ
Worldwide 2023 Email Phishing Statistics and Examples
๐ŸŒ
Worldwide 2023 Email Phishing Statistics and Examples
๐Ÿ“ก
PQShield secures $37M more for โ€˜quantum resistantโ€™ cryptography
๐Ÿ“ก
Tool Overload: Why MSPs Are Still Drowning with Countless Cybersecurity Tools in 2024
๐Ÿ“ก
Amtrak Confirms Crooks Are Breaking Into User Accounts, Derailing Email Addresses
๐Ÿ“ก
Virtual private networks (ITSAP.80.101)
๐Ÿ“ก
Download our cloud security posture management (CSPM) buyerโ€™s guide
๐Ÿ“ก
KrebsOnSecurity Threatened with Defamation Lawsuit Over Fake Radaris CEO
๐Ÿ“ก
US bans sale of Kaspersky software citing security risk from Russia