89Articles
9Categories
2024-08-07Date
🚨
CISA Adds Microsoft COM for Windows Bug to its Known Exploited Vulnerabilities CatalogThe vulnerability, tracked as CVE-2018-0824, arises from the deserialization of untrusted data. Microsoft warns that this flaw could lead to remote code execution if exploited by a specially crafted file or script.
KEV
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-36971 Android Kernel Remote Code Execution Vulnerability CVE-2024-32113 Apache OFBiz Path Traversal Vulnerability These types of vulner…
KEV
🐛
CVE-2024-21302 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
🐛
CVE-2024-38202 Windows Update Stack Elevation of Privilege Vulnerability
⚠️
Better metrics can show how cybersecurity drives business success
⚠️
How cyber insurance shapes risk: Ascension and the limits of lessons learned
⚠️
Chrome Security Update: Patch for Multiple Vulnerabilities
⚠️
Microsoft 365 Vulnerability Let Hackers Bypass Anti-phishing Feature
⚠️
AWS Launches Mithra To Detect Malicious Domains Across Systems
⚠️
Researchers Proposed MME Framework To Enhance API Sequence-Based Malware Detection
⚠️
CrowdStrike backs Microsoft’s demand for reducing kernel-level access
⚠️
Generative AI takes center stage at Black Hat USA 2024
⚠️
Attack Vectors at a Glance
⚠️
Google Patches 46 Android Bugs, Including Exploited Kernel Flaw
⚠️
APT groups increasingly attacking cloud services to gain command and control
⚠️
New Linux Kernel Exploit Technique 'SLUBStick' Discovered by Researchers
⚠️
Roundcube Webmail Flaws Allow Hackers to Steal Emails and Passwords
⚠️
Researcher Sounds Alarm on Windows Update Flaws Allowing Undetectable Downgrade Attacks
⚠️
Critical Progress WhatsUp RCE flaw now under active exploitation
⚠️
Royal Ransomware Actors Rebrand as “BlackSuit,” FBI and CISA Release Update to Advisory
⚠️
GhostWrite Vulnerability Facilitates Attacks on Devices With RISC-V CPU
⚠️
Cybercrime Rapper Sues Bank over Fraud Investigation
⚠️
62% of Phishing Emails Bypassed DMARC Checks in 1H of 2024
⚠️
“Pastejacking” Attacks Are Becoming a Thing (Because Users are Falling for Them)
⚠️
SEC ends probe into MOVEit attacks impacting 95 million people
⚠️
Ronin Network hacked, $12 million returned by "white hat" hackers
📋
CrowdStrike Reveals Root Cause of Global System Outages
📢
HPE security advisory (AV24-442)
📢
Implement MFA or Risk Non-Compliance With GDPR
📢
Cisco security advisory (AV24-443)
📢
FBI: BlackSuit ransomware made over $500 million in ransom demands
📢
FBI: BlackSuit ransomware behind over $500 million in ransom demands
🔥
Is shadow IT being brought in to organizations by security professionals? Cyber Security Today for Wednesday, August 7th, 2024
🔥
You’re not doing enough to educate insiders about data protection
🔥
New Zola Ransomware Using Multiple Tools to Disable Windows Defender
🔥
Ransomware Attack Cost LoanDepot $27 Million
🔥
Threat Actors Announced Doubleface Ransomware, Claims Fully Undetectable
🔥
Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication
🔥
Ransomware Swells Despite Collective Push to Curb Attacks
🔥
NHS Software Supplier Advanced Faces $7.6 Million Fine Over Ransomware Attack Failings
🔥
Ransomware Attack Cost LoanDepot $27 Million
🔥
Report: Email Attacks Skyrocket 293%
🔥
Sophos MDR hunt tracks Mimic ransomware campaign against organizations in India
🔥
McLaren hospitals disruption linked to INC ransomware attack
🔥
UK IT provider faces $7.7 million fine for 2022 ransomware breach
🔥
Windows Update downgrade attack "unpatches" fully-updated systems
🔥
Ransomware attack paralyzes milking robots — cow dead
🔥
New CMoon USB worm targets Russians in data theft attacks
🕵️
Microsoft Hits Back at Delta After the Airline Said Last Month’s Tech Outage Cost It $500 Million
🕵️
Same Scripts, Different Day: What My DShield Honeypot Taught Me About the Importance of Security Fundamentals [Guest Diary], (Wed, Aug 7th)
🕵️
ISC Stormcast For Wednesday, August 7th, 2024 https://isc.sans.edu/podcastdetail/9086, (Wed, Aug 7th)
🕵️
Chameleon Android Banking Trojan Targets Users Through Fake CRM App
🕵️
XDSpy Hackers Attacking Users to Steal Sensitive Data
🕵️
Chrome, Firefox Updates Patch Serious Vulnerabilities
🕵️
Attackers Use Multiple Techniques to Bypass Reputation-Based Security
🕵️
The Prevalence of DarkComet in Dynamic DNS
🕵️
Apple Tightens macOS Gatekeeper Controls in macOS Sequoia
🕵️
Problems with Georgia’s Voter Registration Portal
🕵️
Chameleon Malware Now Targeting Employees Masquerading as a CRM app
🕵️
North Korean Hackers Leverage Malicious NPM Packages for Initial Access
🕵️
Scamnetic Emerges From Stealth With AI-Based Scam Detection Solution
🕵️
Secure by Default: What It Means for the Modern Enterprise
🕵️
How CIRCIA is changing crisis communication
🕵️
What are You Working on Wednesday
🕵️
Cybercriminals target Canadian restaurant chain with Chameleon malware
🕵️
Over 40,000 Internet-Exposed ICS Devices Found in US: Censys
🌐
New Go-based Backdoor GoGra Targets South Asian Media Organization
🌐
Federal Watchdog Urges EPA to Develop Comprehensive Cyber Strategy to Protect Water Systems
📡
Apple’s New macOS Sequoia Tightens Gatekeeper Controls to Block Unauthorized Software
📡
EQT takes a majority stake in cybersecurity firm Acronis at a $3.5B+ valuation
📡
Attackers Use Multiple Techniques to Bypass Reputation-Based Security
📡
Florida Firm Sued Over Theft of 2.9B Personal Records
📡
Best security practices for ESXi environments
📡
Police Recover Over $40m Headed to BEC Scammers
📡
The Role of AI in Cybersecurity Operations
📡
Replacement for Action Fraud, UK’s Cybercrime Reporting Service, Delayed Again Until 2025
📡
Pig-butchering scammer targets BBC journalist
📡
Abnormal Security Raises $250M on $5.1B Valuation to Enhance AI-Driven Cyber Protection
📡
Cyber Training Organization Pledges $15 Million in Education Programs
📡
CrowdStrike Releases Root Cause Analysis Of BSOD Crash
📡
Inherent Disadvantage: Why Hackers Have The Upper Hand In The Cloud
📡
Police Recover $40 Million Stolen In Business Email Scam
📡
CSS Tweaks Help Emails Slip Through Outlook's Anti-Phishing Net
📡
Hackers could spy on cellphone users by abusing 5G baseband flaws, researchers say
📡
How MSPs and MSSPs offer vCISO services with skilled CISOs in short supply
📡
Microsoft 365 anti-phishing feature can be bypassed with CSS
📡
macOS Sequoia brings better Gatekeeper, stalkerware protections
📡
Announcing BlueHat 2024: Call for Papers now open
📡
Why tech-savvy leadership is key to cyber insurance readiness