80Articles
8Categories
2024-08-02Date
πŸ›
Hackers Actively Exploiting WordPress Plugin Arbitrary File Upload Vulnerability
πŸ›
Security Bypass Vulnerability Found in Rockwell Automation Logix Controllers
⚠️
Weekly Update 411
⚠️
Eight-year-old β€œSitting Ducks” DNS weakness exploited to hijack web domains with impunity
⚠️
12 wide-impact firmware vulnerabilities and threats
⚠️
CISA Warns of Avtech Camera Vulnerability Exploited in Wild
KEV
⚠️
Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal
⚠️
New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication
⚠️
Bitdefender Vulnerability Let Attackers Trigger SSRF Attacks
⚠️
Webinar: Discover the All-in-One Cybersecurity Solution for SMBs
⚠️
Who are the two Russian convicts released in the US-Russia prisoner swap?
⚠️
7 network security startups to watch
⚠️
Cryptonator seized for laundering ransom payments, stolen crypto
⚠️
Phishing Attacks Continue to Leverage URL Shorteners to Obfuscate Malicious Links
⚠️
Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization
πŸ“‹
Microsoft confirms cyber attack cause outage and it's own defences may have made the impact worse: Cybersecurity Today for Friday, August 2, 2024
πŸ“‹
CrowdStrike sued by investors over massive global IT outage
πŸ“’
Russia, Moldova Targeted by Obscure Hacking Group in New Cyberespionage Campaign
πŸ“’
Leaked GitHub Python Token
πŸ“’
Microsoft Edge security advisory (AV24-432)
πŸ”₯
LuLu - 190,506 breached accounts
πŸ”₯
APT41 Likely Compromised Taiwanese Government-Affiliated Research Institute with ShadowPad and Cobalt Strike
πŸ”₯
Google Chrome Adds App-Bound Encryption to Block Infostealer Malware
πŸ”₯
New BlankBot Android Trojan Can Steal User Data
πŸ”₯
Global Cyber Attacks See Highest Increases in the Last Two Years
πŸ”₯
Pharma giant Cencora is alerting millions about its data breach
πŸ”₯
How Generative AI Revolutionizes SOC: Insights from Greg Notch
πŸ”₯
APT41 Hackers Use ShadowPad, Cobalt Strike in Taiwanese Institute Cyber Attack
πŸ”₯
Cybersecurity Compass: An Integrated Cyber Defense Strategy
πŸ”₯
Attackers leverage Cloudflare tunnels to obscure malware distribution
πŸ”₯
AI and automation reducing breach costs – Week in security with Tony Anscombe
πŸ•΅οΈ
Over 35k Domains Hijacked in β€˜Sitting Ducks’ Attacks
πŸ•΅οΈ
Cybersecurity M&A Roundup: 25 Deals Announced in July 2024
πŸ•΅οΈ
U.S. Releases High-Profile Russian Hackers in Diplomatic Prisoner Exchange
πŸ•΅οΈ
ISC Stormcast For Friday, August 2nd, 2024 https://isc.sans.edu/podcastdetail/9080, (Fri, Aug 2nd)
πŸ•΅οΈ
NCA Shuts Down Major Fraud Platform that Triggers 1.8 Million Scam Calls
πŸ•΅οΈ
BSides Joburg 2024
πŸ•΅οΈ
Threat Intelligence: A Blessing and a Curse?
πŸ•΅οΈ
Microsoft Patched a Critical Edge Flaw that Led to Arbitrary Code Execution
πŸ•΅οΈ
Cloudflare Tunnels Abused for Malware Delivery
πŸ•΅οΈ
t2/2024 - Hacking a Satellite for Fun and Profit (Mario Polino)
πŸ•΅οΈ
Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft
πŸ•΅οΈ
StackExchange Abused to Spread Malicious PyPI Packages as Answers
πŸ•΅οΈ
Protect AI Raises $60 Million in Series B Funding
πŸ•΅οΈ
Off-Topic Friday
πŸ•΅οΈ
News alert: Security Risk Advisors launchs VECTR Enterprise Edition for β€˜purple team’ benchmarking
πŸ•΅οΈ
New Research: Smaller Companies Receiving Higher Rates Of Phishing Emails
πŸ•΅οΈ
The European Union’s World-First Artificial Intelligence Rules Are Officially Taking Effect
πŸ•΅οΈ
In Other News: European Banks Put to Test, Voting DDoS Attacks, Tenable Exploring Sale
πŸ•΅οΈ
10 Security Researcher Qualities Marketers Should Adopt - Dani Woolf - ESW #370
πŸ•΅οΈ
Cybersecurity's Love Affair with Distractions - Fred Wilmot - ESW #370
πŸ•΅οΈ
Funding, Cato, Code42, DoS Robots, and Blackhat Prep - ESW #370
πŸ•΅οΈ
APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure
πŸ•΅οΈ
Prisoner Swap Includes Russian Hackers and KGB Assassin
πŸ•΅οΈ
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, Aaran Leyland, and More... - SWN #403
πŸ•΅οΈ
Friday Squid Blogging: Treating Squid Parasites
πŸ•΅οΈ
The Promise and Perils of Building AI Into Your Business Applications
🌐
Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware
🌐
Fake Google Authenticator Used To Deliver Malware On GitHub
🌐
Fake AI editor ads on Facebook push password-stealing malware
πŸ“‘
Credo AI Raises $21M to Help Enterprises Deploy AI Safely and Responsibly
πŸ“‘
Malicious Package Hidden in PyPI Discovered
πŸ“‘
U.S. Trades Cybercriminals to Russia in Prisoner Swap
πŸ“‘
Homebrew Security Audit Finds 25 Vulnerabilities
πŸ“‘
Suspects in 'Russian Coms' Spoofing Service Arrested in London, as NCA Announces Takedown
πŸ“‘
CrowdStrike Investors File Class Action Suit Following Global IT Outage
πŸ“‘
Who Are The Two Major Hackers Russia Just Received In A Prisoner Swap?
πŸ“‘
DigiCert Revoking 83,000 Certificates Of 6,800 Customers
πŸ“‘
UK Cops Shut Down Global Call Spoofing Outlet That Scammed 170k-Plus Victims
πŸ“‘
Bypass Found In Rockwell Automation Logix Controllers
πŸ“‘
TechCrunch Minute: Why did Wiz walk away from $23 billion?
πŸ“‘
DuckDuckGo blocked in Indonesia over porn, gambling search results
πŸ“‘
Even Linux users should take a look at this Microsoft KB article., (Fri, Aug 2nd)
πŸ“‘
What is an adversary-in-the-middle attack, and how is it used in phishing?
πŸ“‘
Google Chrome warns uBlock Origin may soon be disabled
πŸ“‘
US sues TikTok for violating children privacy protection laws
πŸ“‘
Google Chrome bug breaks drag and drop from Downloads bubble
πŸ“‘
What Are Scrapers and Why Should You Care?
πŸ“‘
What Are Scrapers and Why Should You Care?
πŸ“‘
What Are Scrapers and Why Should You Care?