83Articles
8Categories
2024-08-08Date
πŸ›
Critical Security Flaw in WhatsUp Gold Under Active Attack - Patch Now
πŸ›
Roundcube Flaws Allow Easy Email Account Compromise (CVE-2024-42009, CVE-2024-42008)
πŸ›
Windows Downgrade Attack Risks Exposing Patched Systems to Old Vulnerabilities
πŸ›
Back to the future: Windows Update is now a trojan horse for hackers
πŸ›
A Deep Dive Into CVE-2023-2163: How Google Found And Fixed An eBPF Linux Kernel Vulnerability
πŸ›
Critical Progress WhatsUp Gold RCE Flaw Now Under Active Exploitation
πŸ›
CVE-2024-38218 Microsoft Edge (HTML-based) Memory Corruption Vulnerability
πŸ›
Chromium: CVE-2024-7550 Type Confusion in V8
πŸ›
CVE-2024-38219 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
πŸ›
Chromium: CVE-2024-7536 Use after free in WebAudio
πŸ›
Chromium: CVE-2024-7533 Use after free in Sharing
πŸ›
Chromium: CVE-2024-7532 Out of bounds memory access in ANGLE
πŸ›
Chromium: CVE-2024-7535 Inappropriate implementation in V8
πŸ›
Chromium: CVE-2024-7534 Heap buffer overflow in Layout
πŸ›
CVE-2024-38200 Microsoft Office Spoofing Vulnerability
⚠️
EU’s DORA regulation explained: New risk management requirements for financial firms
⚠️
SEC Ends Probe Into MOVEit Attacks Impacting 95 Million People
⚠️
AWS Patches Vulnerabilities Potentially Allowing Account Takeovers
⚠️
Researcher Discovers Downgrade Attack Abusing Windows Update Process
⚠️
Ronin Network Hacked, $12 Million Returned by β€œWhite Hat” Hackers
⚠️
0.0.0.0 Day: Exploiting Localhost APIs From the Browser
⚠️
FBI and CISA Uncover Updated TTPs and Activity of the BlackSuit Ransomware Group
⚠️
2024 Phishing Insights: What 11.9 Million User Behaviors Reveal About Your Risk
⚠️
Nexera DeFi Protocol Hacked: $1.8M Stolen in Major Smart Contract Exploit
⚠️
Critical AWS Vulnerabilities Allow S3 Attack Bonanza
⚠️
Vulnerabilities Exposed Widely Used Solar Power Systems to Hacking, Disruption
⚠️
STAC6451 Hacker Hijacking Microsoft SQL Servers to Compromise Organizations
⚠️
ADT confirms data breach after customer info leaked on hacking forum
⚠️
Critical Vulnerabilities In 6 AWS Services Disclosed At Black Hat USA
⚠️
0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices
⚠️
CISA Releases One Industrial Control Systems Advisory
⚠️
18-year-old security flaw in Firefox and Chrome exploited in attacks
⚠️
Phishers have figured out that everyone is afraid of HR
⚠️
CrowdStrike Dismisses Claims of Exploitability in Falcon Sensor Bug
⚠️
Exploit released for Cisco SSM bug allowing admin password changes
⚠️
CISA warns about actively exploited Apache OFBiz RCE flaw
KEV
⚠️
New Phishing Campaign Targets Israeli Organizations To Deliver Malware
⚠️
S3 shadow buckets leave AWS accounts open to compromise
⚠️
Cisco warns of critical RCE zero-days in end of life IP phones
⚠️
Security bugs in ransomware leak sites helped save six companies from paying hefty ransoms
⚠️
Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE
πŸ“‹
Tor Browser 13.5.2 Released: What’s New!
πŸ“‹
Critical Cisco Small Business IP Phone Flaws Exposes Users to Remote Attacks
πŸ“’
FBI and CISA Warn of BlackSuit Ransomware That Demands Up to $500 Million
πŸ“’
US Elections Have Never Been More Secure, Says CISA Chief
πŸ“’
Jenkins security advisory (AV24-444)
πŸ“’
Best Practices for Cisco Device Configuration
πŸ“’
Drupal security advisory (AV24-445)
πŸ“’
CISA warns of hackers abusing Cisco Smart Install feature
πŸ”₯
2.9 billion hit in one of the largest data breaches ever β€” full names, addresses and SSNs exposed
πŸ”₯
Botnet 7777: Are You Betting on a Compromised Router?
πŸ”₯
Easterly: Potential Chinese cyberattack could unfold like CrowdStrike error
πŸ”₯
Home security giant ADT says it was hacked
πŸ”₯
After the Dust Settles: Post-Incident Actions
πŸ”₯
How to Weaponize Microsoft Copilot for Cyberattackers
πŸ”₯
SEC Report Provides Insight into Key Tronic Ransomware Costs Totaling Over $17 Million
πŸ•΅οΈ
Alibaba's T-Head C910 RISC-V chips blow away all security
πŸ•΅οΈ
Record Breaking DDoS Attack 419 TB of Malicious Traffic Within 24-Hours
πŸ•΅οΈ
Musk’s X under scrutiny in Europe for data privacy practices
πŸ•΅οΈ
ISC Stormcast For Thursday, August 8th, 2024 https://isc.sans.edu/podcastdetail/9088, (Thu, Aug 8th)
πŸ•΅οΈ
Phishing Attacks Can bypass Microsoft 365 Email Safety Warnings
πŸ•΅οΈ
US Offering $10 Million Reward for Iranian ICS Hackers
πŸ•΅οΈ
Cloud Storage From Microsoft, Google Used in Malware Attacks
πŸ•΅οΈ
Critical Solar Power Grid Vulnerabilities Risk Global Blackouts
πŸ•΅οΈ
Stolen Credentials Have Turned SaaS Apps Into Attackers’ Playgrounds
πŸ•΅οΈ
Immutability in Cybersecurity: A Layer of Security Amidst Complexity and Misconceptions
πŸ•΅οΈ
University Professors Targeted by North Korean Cyber Espionage Group
πŸ•΅οΈ
Things Not to Miss at BH/DC/Bsides - PSW #838
πŸ•΅οΈ
Downgrades and Attacking Security Things - PSW #838
πŸ•΅οΈ
US dismantles laptop farm used by undercover North Korean IT workers
🌐
US Offering $10 Million Reward For Iranian ICS Hackers
🌐
Over $40 million recovered and arrests made within days of firm realising it had fallen for Business Email Compromise scam
πŸ“‘
Unlock the Future of Cybersecurity: Exclusive, Next Era AI Insights and Cutting-Edge Training at SANS Network Security 2024
πŸ“‘
How to protect yourself from surveillance that uses AirTag beacons or similar devices (on either Android or iOS) | Kaspersky official blog
πŸ“‘
Microsoft 365 Anti-Phishing Feature can be Bypassed with CSS
πŸ“‘
New Phishing Scam Uses Google Drawings and WhatsApp Shortened Links
πŸ“‘
Automated Security Validation: One (Very Important) Part of a Complete CTEM Framework
πŸ“‘
Samsung Boosts Bug Bounty To A Cool Million For Cracks Of The Knox Vault Subsystem
πŸ“‘
Windows Update Flaws Allow Undetectable Downgrade Attacks
πŸ“‘
Black Hat USA: Wi-Fi Tracking Flaw Puts The BS In BSSID
πŸ“‘
Alibaba's T-Head C910 RISC-V Chips Found Vulnerable to GhostWrite Attack
πŸ“‘
Microsoft: Exchange 2016 reaches extended end of support in October
πŸ“‘
Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies