99Articles
9Categories
2024-07-29Date
🚨
CISA Adds Three Known Exploited Vulnerabilities to CatalogCISA has added three new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-4879 ServiceNow Improper Input Validation Vulnerability CVE-2024-5217 ServiceNow Incomplete List of Disallowed Inputs Vulnerability C…
KEV
πŸ›
Cisco Patches the Products Impacted by RADIUS Protocol Vulnerability
πŸ›
RaspAP Flaw Let Hackers Escalate Privileges with Raspberry Pi Devices
πŸ›
Acronis Warns of Cyber Infrastructure Default Password Abused in Attacks
πŸ›
National Vulnerability Backlog Could Surge to 30,000 by 2025
πŸ›
Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild
KEV
πŸ›
Microsoft Says Ransomware Gangs Exploiting Just-Patched VMware ESXi Flaw
πŸ›
VMware ESXi hypervisor vulnerability grants full admin privileges
πŸ›
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption
⚠️
2024 Olympics put cybersecurity teams on high alert
⚠️
CrowdStrike debacle underscores importance of having a plan
⚠️
NIST releases new tool to check AI models’ security
⚠️
PKfail, Critical Firmware Supply-Chain Issue Let Attackers Bypass Secure Boot
⚠️
North Korean Onyx Sleet Using Group Of Malware And Exploits to Gain Intelligence
⚠️
Malicious Python Package Attacking macOS Developers To Steal Google Cloud Logins
⚠️
Selenium Grid Instances Exploited for Cryptomining
⚠️
AI-Generated Deepfake Attacks Force Companies To Reassess Cybersecurity
⚠️
Microsoft shifts focus to kernel-level security after CrowdStrike incident
⚠️
Acronis Product Vulnerability Exploited in the Wild
KEV
⚠️
QR Code Phishing is Still on the Rise
⚠️
WhatsApp for Windows Lets Python, PHP Scripts Execute with no Warning
⚠️
Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails
⚠️
Ukraine Hacked Russian Banks, Leading Major Disruption
⚠️
Proofpoint settings exploited to send millions of phishing emails daily
⚠️
USB Drive with Write-Protect Switch Recommendations
⚠️
With Open Source Artificial Intelligence, Don’t Forget the Lessons of Open Source Software
⚠️
HealthEquity says data breach impacts 4.3 million people
⚠️
Acronis Product Vulnerability Exploited In The Wild
KEV
⚠️
Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks
⚠️
Scammers Exploit Interest in Generative AI Tools
⚠️
Phishing Campaign Exploited Proofpoint Email Protections for Spoofing
⚠️
Identity Security Posture Management - Dor Fledel - BSW #358
⚠️
New Specula tool uses Outlook for remote code execution in Windows
πŸ“‹
CrowdStrike was not the only security vendor vulnerable to hasty testing
πŸ“‹
CrowdStrike Outage Could Cost Cyber Insurers $1.5 Billion
πŸ“’
PM names new cybersecurity minister
πŸ“’
White House, CISA Name Key Cybersecurity Officials as National Resilience Strategy Rollout Continues
πŸ“’
Most CISOs Feel Unprepared for New Compliance Regulations
πŸ“’
Dell security advisory (AV24-423)
πŸ“’
IBM security advisory (AV24-424)
πŸ“’
Ubuntu security advisory (AV24-425)
πŸ“’
[Control systems] CISA ICS security advisories (AV24-426)
πŸ“’
Red Hat security advisory (AV24-427)
πŸ“’
Health Benefits Administrator Hack Affects 4.3 Million
πŸ”₯
French Govt Investigating Recent Malware Attack that Compromised 3,000 Machines
πŸ”₯
Scam Attacks Taking Advantage of the Popularity of the Generative AI Wave
πŸ”₯
Targeted PyPI Package Steals Google Cloud Credentials from macOS Devs
πŸ”₯
4.3 Million Impacted by HealthEquity Data Breach
πŸ”₯
How Searchable Encryption Changes the Data Security Game
πŸ”₯
Nearly All Ransomware Attacks Now Include Exfiltration of Data…But Not All Are Notified
πŸ”₯
Report: Russian Ransomware Gangs Account for 69% of all Ransom Proceeds
πŸ”₯
Threat Actots Leveraging ChatGPT To Craft Sophisticated Attacks
πŸ”₯
European Central Bank Concludes Banking Cyber Stress Test
πŸ”₯
Change Healthcare Begins to Notify Millions Affected by Hack
πŸ•΅οΈ
CrowdStrike Outage Themed Maldoc, (Mon, Jul 29th)
πŸ•΅οΈ
ISC Stormcast For Monday, July 29th, 2024 https://isc.sans.edu/podcastdetail/9072, (Mon, Jul 29th)
πŸ•΅οΈ
'Stargazer Goblin' Creates 3,000 Fake GitHub Accounts for Malware Spread
πŸ•΅οΈ
Hackers Attacking Users Searching For W2 Form
πŸ•΅οΈ
Pass the SALT conference 2024 - 37 videos
πŸ•΅οΈ
hardwear.io USA 2024
πŸ•΅οΈ
97% of CrowdStrike systems are back online; Microsoft suggests Windows changes
πŸ•΅οΈ
Microsoft 365 users targeted by phishers abusing Microsoft Forms
πŸ•΅οΈ
SecurityWeek Analysis: 178 Cybersecurity M&A Deals Announced in First Half of 2024
πŸ•΅οΈ
New Research in Detecting AI-Generated Videos
πŸ•΅οΈ
Gh0stGambit Dropper Used to Deploy Gh0st RAT Against Chinese Users
πŸ•΅οΈ
Millions of Websites Susceptible XSS Attack via OAuth Implementation Flaw
πŸ•΅οΈ
Roger’s Hacking Stories
πŸ•΅οΈ
Mentorship Monday - Discussions for career and learning!
πŸ•΅οΈ
Is Windows the Easiest to Patch? πŸ€” Paul’s Security Weekly Discusses!
πŸ•΅οΈ
IoT: Internet of Threats?
πŸ•΅οΈ
The 2024 Olympics Offers Plenty of Opportunity For Online Scammers
πŸ•΅οΈ
Agencies Warn of North Korean Hacks on Nuclear Installations
πŸ•΅οΈ
The Evolving Role of the CISO - Allan Alford - BSW #358
πŸ•΅οΈ
GitHub Network Fuels Malware Distribution Operation
πŸ•΅οΈ
Learning From CrowdStrike's Outage: Insights From Snyk's CEO
πŸ•΅οΈ
Tech Orgs Feel 'Abandoned' as UN Finalizes Cybercrime Treaty
🌐
Google's Password Bug Hits Millions: Cybersecurity Today for Monday, July 29, 2024
🌐
Gh0st RAT Trojan Targets Chinese Windows Users via Fake Chrome Site
🌐
Report: 95% of Organizations Face Severe Software Supply Chain Risk
🌐
French Police Push PlugX Malware Self-Destruct Payload to Clean PCs
🌐
US border agents must get warrant before cell phone searches, federal court rules
🌐
Android spyware 'Mandrake' hidden in apps on Google Play since 2022
🌐
Beware of fake AI tools masking very real malware threats
πŸ“‘
Industry Moves for the week of July 29, 2024 - SecurityWeek
πŸ“‘
NVIDIA Patches Flaw in Jetson Software Used in AI-Powered Systems
πŸ“‘
Dazz Snaps up $50M for AI-Based, Automated Cloud Security Remediation
πŸ“‘
Meta Nukes Massive Instagram Sextortion Network of 63,000 Accounts
πŸ“‘
How to Write a Generative AI Cybersecurity Policy
πŸ“‘
Data From Deleted Github Repositories May Not Actually be Deleted
πŸ“‘
Senators to FTC: Car Companies’ Data Privacy Practices Must be Investigated
πŸ“‘
Despite Bans, AI Code Generation Tools Widely Used in Organizations
πŸ“‘
Hacking gang leaks documents stolen from Pentagon IT provider
πŸ“‘
PKFail Bug Puts Firmware Security At Risk
πŸ“‘
Millions Of Websites Susceptible To XSS Attack Via OAuth Implementation Flaw
πŸ“‘
MS Admits 8.5M CrowdStruck Machines Estimate Was Lowballed
πŸ“‘
Yes, Americans can opt out of airport facial recognition. Here’s how
πŸ“‘
Comparing From and Reply-To headers | Kaspersky official blog
πŸ“‘
Former Avaya employee gets 4 years for $88M license piracy scheme
πŸ“‘
Apple iOS 18.1 Beta previews Apple Intelligence for the first time