91Articles
8Categories
2024-08-12Date
๐Ÿšจ
CISA Adds Six Known Exploited Vulnerabilities to CatalogCISA has added six new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-38189  Microsoft Project Remote Code Execution Vulnerability CVE-2024-38178  Microsoft Windows Scripting Engine Memory Corrupโ€ฆ
KEV
๐Ÿ›
Update: Exploit Released for Cisco SSM Bug Allowing Admin Password Changes
๐Ÿ›
FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability
๐Ÿ›
Hackers Exploiting WinRAR Flaw To Attacks Windows & Linux(ESXi) Machines
๐Ÿ›
Critical 1Password Flaws May Allow Hackers to Snatch Users' Passwords
๐Ÿ›
Microsoft Warns of Unpatched Office Vulnerability Leading to Data Exposure
โš ๏ธ
The cyber assault on healthcare: What the Change Healthcare breach reveals
โš ๏ธ
Authorities Arrested Two Admins of WWH-Club Stolen Credit Card Marketplace
โš ๏ธ
Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks
โš ๏ธ
MY TAKE: Black Hat USA 2024โ€™s big takeaway โ€“ GenAI factors into the quest for digital resiliency
โš ๏ธ
Googleโ€™s Quick Share Vulnerabilities Let Attackers Execute Remote Code
โš ๏ธ
Taxonomy of Generative AI Misuse
โš ๏ธ
SSHamble: Open-Source Security Testing of SSH Services
โš ๏ธ
Bipartisan Bill to Tighten Vulnerability Disclosure Rules for Federal Contractors
โš ๏ธ
Researchers Uncover Vulnerabilities in Solarman and Deye Solar Systems
โš ๏ธ
Microsoft Found OpenVPN Bugs That can be Chained to Achieve RCE and LPE
โš ๏ธ
Microsoft found OpenVPN bugs that can be chained to achieve RCE and LPE
โš ๏ธ
AMD addresses Sinkclose vulnerability but older processors left unattended
โš ๏ธ
Sonos Speaker Flaws Could Have Let Remote Hackers Eavesdrop on Users
โš ๏ธ
How Phishing Attacks Adapt Quickly to Capitalize on Current Events
โš ๏ธ
Trump campaign suffers sensitive data breach in alleged Iranian hack
โš ๏ธ
Critical AWS Services Vulnerability Let Attackers Execute Remote Code
โš ๏ธ
Criminal IP and Maltego Join Forces for Enhanced Cyber Threat Search
โš ๏ธ
Several Vulnerabilities Found in Googleโ€™s Quick Share Data Transfer Utility
โš ๏ธ
Microsoft Warns of OpenVPN Vulnerabilities, Potential for Exploit Chains
โš ๏ธ
Russia Blocks Signal Messaging App as Authorities Tighten Control Over Information
โš ๏ธ
Justice Department Disrupts North Korean โ€˜Laptop Farmโ€™ Operation
โš ๏ธ
Why OT cybersecurity should be every CISOโ€™s concern
โš ๏ธ
Companies poorly prepared for TLS transition
KEV
โš ๏ธ
The cybersecurity kids arenโ€™t all right
โš ๏ธ
Cybersecurity Leadership Crisis, Is It Time to Pivot Your Strategy? - BSW #360
โš ๏ธ
Microsoft and NVIDIA: Partnering to protect AI workloads in Azure
๐Ÿ“ข
NCSC to Build Nation-Scale Evidence Base for Cyber Deception
๐Ÿ“ข
IBM security advisory (AV24-451)
๐Ÿ“ข
Ubuntu security advisory (AV24-449)
๐Ÿ“ข
Dell security advisory (AV24-450)
๐Ÿ“ข
Red Hat security advisory (AV24-452)
๐Ÿ“ข
[Control systems] CISA ICS security advisories (AV24-453)
๐Ÿ”ฅ
Over 15,000 hard coded secrets found by researcher at Defcon: Cyber Security Today for Monday, August 12, 2024
๐Ÿ”ฅ
New Malware Strains Pop Up in Threat Landscape
๐Ÿ”ฅ
Botnet 7777: Are You Betting on a Compromised Router?
๐Ÿ”ฅ
Analysis of Data Exfiltration Tools Used by Threat Actors
๐Ÿ”ฅ
Latrodectus and ACR Stealer Observed Spreading via Google Authenticator Phishing Site
๐Ÿ”ฅ
The BlackSuit ransomware gang has demanded over $500 million since 2022
๐Ÿ”ฅ
200k Impacted by East Valley Institute of Technology Data Breach
๐Ÿ”ฅ
Australian Gold Mining Company Reports Ransomware Attack
๐Ÿ”ฅ
Malware-as-a-Service and Ransomware-as-a-Service Lower Barriers for Cybercriminals
๐Ÿ”ฅ
200k Impacted By East Valley Institute Of Technology Data Breach
๐Ÿ”ฅ
Trump Campaign Says It Has Been Hacked
๐Ÿ”ฅ
Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts
๐Ÿ”ฅ
Australian gold producer Evolution Mining hit by ransomware
๐Ÿ”ฅ
FBI takes down ransomware gang that hacked dozens of companies
๐Ÿ”ฅ
FBI disrupts the Dispossessor ransomware operation, seizes servers
๐Ÿ•ต๏ธ
ISC Stormcast For Monday, August 12th, 2024 https://isc.sans.edu/podcastdetail/9092, (Mon, Aug 12th)
๐Ÿ•ต๏ธ
The UN Is Moving to Fight Cybercrime but Privacy Groups Say Human Rights Will Be Violated
๐Ÿ•ต๏ธ
The Missing Piece of SASE โ€” Prisma Access Browser โ€” Now Available
๐Ÿ•ต๏ธ
Mentorship Monday - Discussions for career and learning!
๐Ÿ•ต๏ธ
Black Hat USA 2024 โ€“ Summary of Vendor Announcements
๐Ÿ•ต๏ธ
Criminal IP and Maltego Collaborate to Broaden Threat Intelligence Data Search
๐Ÿ•ต๏ธ
News alert: Criminal IP and Maltego team up to broaden threat intelligence data search
๐Ÿ•ต๏ธ
South Korea says DPRK hackers stole spy plane technical data
๐Ÿ•ต๏ธ
Hacker Stories:ย A Facebook Physical Threat
๐Ÿ•ต๏ธ
Security Money: Crowdstrike Crashes the Index - BSW #360
๐ŸŒ
EastWind Attack Deploys PlugY and GrewApacha Backdoors Using Booby-Trapped LNK Files
๐ŸŒ
Fake WinRar Websites Distributing Malware Payloads Hosted on GitHub
๐ŸŒ
New Widespread Extension Trojan Malware Campaign
๐ŸŒ
Microsoft is killing the Windows Paint 3D app after 8 years
๐Ÿ“ก
Video: Same Origin, CORS, DNS Rebinding and Localhost, (Mon, Aug 12th)
๐Ÿ“ก
Vulnerabilities in Solar Power Management Platform can Lead to Blackouts
๐Ÿ“ก
Nearly 200 Firms Have Signed Pledge to Build More Secure Software, Top Cyber Official Says
๐Ÿ“ก
How Network Segmentation can Strengthen Visibility in OT Networks
๐Ÿ“ก
Industry Moves for the week of August 12, 2024 - SecurityWeek
๐Ÿ“ก
Earth Bakuโ€™s Latest Campaign Expands its Reach to Europe, the Middle East, and Africa
๐Ÿ“ก
SaaS Apps Present an Abbreviated Kill Chain for Attackers
๐Ÿ“ก
The AI Hangover is Here โ€“ The End of the Beginning
๐Ÿ“ก
The best hacks and security research from Black Hat and Def Con 2024
๐Ÿ“ก
CrowdStrike Pursuing Deal to Buy Patch Management Specialist Action1
๐Ÿ“ก
Shorter TLS Certificate Lifespans Expected to Complicate Management Efforts
๐Ÿ“ก
UN Cybercrime Treaty Passes in Unanimous Vote
๐Ÿ“ก
20-Year-Ol Hardware Flaw Found In AMD Chips
๐Ÿ“ก
Russia Blocks Signal Messaging App
๐Ÿ“ก
GPS Spoofers Hack Time On Commercial Airlines
๐Ÿ“ก
Google deactivates Russian AdSense accounts, sends final payments
๐Ÿ“ก
Microsoft shares Outlook workaround for Gmail sign-in issues
๐Ÿ“ก
Hackers posing as Ukraineโ€™s Security Service infect 100 govt PCs
๐Ÿ“ก
Which IT, and IoT devices are most vulnerable | Kaspersky official blog
๐Ÿ“ก
SAFECOM Membership Spotlight ft. Red Grasso, North Carolina Department of Information Technology
๐Ÿ“ก
X faces GDPR complaints for unauthorized use of data for AI training
๐Ÿ“ก
20-Year-Old Hardware Flaw Found In AMD Chips
๐Ÿ“ก
The great location leak: Privacy risks in dating apps
๐Ÿ“ก
Top 6 Craigslist scams: Donโ€™t fall for these tricks