92Articles
8Categories
2024-07-03Date
🐛
Critical WordPress Plugin Flaw Exposes 90,000+ WordPress Sites
🐛
Google Patches 25 Android Flaws, Including Critical Privilege Escalation Bug
🐛
regreSSHion OpenSSH Flaw: Potential Exploitation Attempts Seen, but Mass Attacks Unlikely
🐛
PTC Releases Patch for Critical Flaw in Creo Elements/Direct License Server
⚠️
South Korean ERP Vendor's Server Hacked to Spread Xctdoor Malware
⚠️
Hackers Claiming of Sandbox Escape RCE in 0-DAY Google Chrome
⚠️
Darnet Diaries podcast EP 147: TORNADO
⚠️
Microsoft MSHTML Flaw Exploited to Deliver MerkSpy Spyware Tool
⚠️
Intel Says No New Mitigations Required for Indirector CPU Attack
⚠️
Proton launches free, privacy-focused Google Docs alternative
⚠️
Supposed Grasshopper Operators Impersonate Israeli Government and Private Companies to Deploy Open-Source Malware
⚠️
Passkeys aren’t attack-proof, not until properly implemented
⚠️
The Emerging Role of AI in Open-Source Intelligence
⚠️
Juniper SRX Vulnerability Allows Attackers Trigger DoS Condition
⚠️
Gogs Vulnerabilities Let Attackers Hack Instances And Steal Source Code
⚠️
Odaseva Raises $54 Million for Salesforce Enterprise Data Security Platform
⚠️
Europol takes down 593 Cobalt Strike servers used by cybercriminals
⚠️
Vulnerabilities in CocoaPods: The Achilles' Heel of the Apple App Ecosystem
⚠️
Secator: Open-Source Pentesting Swiss Army Knife
⚠️
Cisco Patches Zero-Day In NX-OS Nexus Switch Software
⚠️
Intel Dismisses Reported Side-Channel Vulnerability In CPU Cores
⚠️
New Open SSH Vulnerability
⚠️
RCE, DoS Exploits Found in Rockwell PanelView Plus: Patch Now
⚠️
Infostealer malware logs used to identify child abuse website members
⚠️
Europol Announces Crackdown on Cobalt Strike Servers Used by Cybercriminals
⚠️
Patched: RCE Flaw That Affects Critical Manufacturing
⚠️
On Day 4 of Ransomware Attack, Service Still Down at Patelco
⚠️
Hacker Heroes - Joe Grand - PSW Vault
📢
How CISOs can protect their personal liability
📢
US Supreme Court Ruling on Chevron Doctrine May Upend Future Cybersecurity Regulation
📢
Red Hat security advisory (AV24-367)
📢
Managing and controlling administrative privileges (ITSAP.10.094)
📢
Roll20, an online tabletop role-playing game platform, discloses data breach
📢
HPE security advisory (AV24-368)
🔥
Rafel RAT Attacking Android Devices To Gain Unauthorized Access
🔥
Israeli Entities Targeted by Cyberattack Using Donut and Sliver Frameworks
🔥
Polyglot Files Enable Cyber Attack Chains and Methods for Detection & Disarmament
🔥
Cybersecurity is Now a Top Concern for Auto Industry, Report Finds
🔥
Industry Groups Ask HHS for Guidance on Massive Change Breach Reports
🔥
Hiap Seng Industries Servers Attacked by Ransomware
🔥
300k Affected by Year-Old Data Breach at Florida Community Health Centers
🔥
Patelco Credit Union Scrambling to Restore Systems Following Ransomware Attack
🔥
Feds Hit Health Entity With $950K Fine in Ransomware Attack
🔥
TotalEnergies Cyber Attack: Data of 210,715 Customers Exposed
🔥
New Ransomware Group Uses Phone Calls to Pressure Victims, Researchers Say
🔥
Evolve Bank Ransomware Raid May Mean Customer Info Stolen
🔥
Formula 1 governing body discloses data breach after email hacks
🔥
New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action
🔥
The Not-So-Secret Network Access Broker x999xx
🔥
Polish government investigates Russia-linked cyberattack on state news agency
🔥
Auto Dealers Plan July Fourth Comeback After CDK Cyberattack
🔥
HealthEquity data breach exposes protected health information
🔥
HealthEquity says data breach is an ‘isolated incident’
🔥
Children's Hospital Notifies 800,000 of Data Theft in Attack
🕵️
Cyber Security Today, July 3, 3034 - Beware of advanced attack tactics
🕵️
What are You Working on Wednesday
🕵️
BSides Cheltenham 2024 - 20 videos
🕵️
Cybersecurity M&A Roundup: 29 Deals Announced in June 2024
🕵️
Brazil Data Regulator Bans Meta From Mining Data to Train AI Models
🕵️
Does your business have an AI blind spot? Navigating the risks of shadow AI
🕵️
The Growing Dichotomy of AI-Powered Code in Cloud-Native Security
🕵️
Over 380k Hosts Still Referencing Malicious Polyfill Domain: Censys
🕵️
Twilio says hackers identified cell phone numbers of two-factor app Authy users
🕵️
Hackers abused API to verify millions of Authy MFA phone numbers
🕵️
Splunk Named a 10-Time Leader in Gartner® Magic Quadrant™ for SIEM
🕵️
Embracing Resilience, Grit and Adaptability in the Workplace
🕵️
Scaling Zero Trust: How ThreatLocker Uses Series D Funds
🕵️
Securing OT Environments - Dr. Ed Harris - BTS #33
🕵️
FedRAMP Launches New Framework for Emerging Technologies
🌐
FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks
🌐
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape
🌐
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape
🌐
APP Fraud Singled Out as Biggest Financial Crime Threat
🌐
Understanding the FakeBat Loader: Distribution Tactics and Cybercriminal Infrastructure
🌐
Securing Healthcare: Minimising Risk in an Ever-Changing Threat Landscape
🌐
OVHcloud blames record-breaking DDoS attack on MikroTik botnet
🌐
What’s new in the MSRC Report Abuse Portal and API
🎙️
Transatlantic Cable podcast episode 354 | Kaspersky official blog
🎙️
Smashing Security podcast #379: Private nights, evil twins, and crypto home invasions
📡
FCC Drafts Rules to Strengthen Cyber of Emergency Systems
📡
The Impossibility of “Getting Ahead” in Cyber Defense
📡
How Top Cybersecurity Leaders Predict Threats and Navigate Risk​
📡
How Top Cybersecurity Leaders Predict Threats and Navigate Risk​
📡
In a major update, Proton adds privacy-safe document collaboration to Drive, its freemium E2EE cloud storage service
📡
Chrome Update Will Block Entrust Certificates by November 2024
📡
Dozens of Arrests Disrupt $2.7m Vishing Gang
📡
Download the UEM vendor comparison chart, 2024 edition
📡
Over 380k Hosts Still Referencing Malicious Polyfill Domain
📡
German Military's New Spy Satellites Appear To Have Failed In Orbit
📡
Inside the workings of fraud-as-a-service | Kaspersky official blog
📡
The Cost of Underpreparedness to Your Business
📡
No room for error: Don’t get stung by these common Booking.com scams