82Articles
7Categories
2024-08-19Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-23897 Jenkins Command Line Interface (CLI) Path Traversal Vulnerability These types of vulnerabilities are frequent attack vectors for ma…
KEV
🐛
Microsoft Patches Zero-Day Flaw Exploited by North Korea’s Lazarus Group
🐛
Update: Windows Zero-Day Flaw was Exploited by North Korea-linked Lazarus APT
🐛
Linux Kernal Vulnerability Let Attackers Bypass CPU & Gain Read/Write Access
🐛
Lazarus Hacker Group Exploited Microsoft Windows Zero-day
🐛
Windows Critical Vulnerability: CVE-2024-38063
🐛
Windows Zero-Day Attack Linked to North Korea’s Lazarus APT
KEV
⚠️
AWS environments compromised through exposed .env files
⚠️
Who writes the code in your security software? You need to know
⚠️
Researchers Found a New Technique to Defend Cache Side Channel Attacks
⚠️
Thousands of Oracle NetSuite E-Commerce Sites Expose Sensitive Customer Data
⚠️
CrowdStrike questions could give CISOs pause — with options available
⚠️
Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks
⚠️
Unfixed Microsoft Entra ID Authentication Bypass Threatens Hybrid IDs
⚠️
Is Disabling Clickable URL Links Enough?
⚠️
Azure Domains and Google Abused to Spread Disinformation and Malware
⚠️
Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware
⚠️
US Lawmakers Want Investigation Into TP-Link Over Chinese Hacking Fears
⚠️
Microsoft Announces Mandatory MFA for Azure
⚠️
AI SPERA and Hackers Central Partner to Expand Mexico’s Security Market with ‘Criminal IP ASM’
⚠️
The Long Road to Recovery Following a Ransomware Attack
⚠️
U.K. Management Almost Twice as Likely to Fall for Phishing Attacks Versus Entry-Level Employees
⚠️
CISA warns of Jenkins RCE bug exploited in ransomware attacks
KEV
⚠️
Why Cyber Resilience Matters - Theresa Lanowitz - BSW #361
⚠️
Navigating Innovation and Risk & Any Browser Can Be A Secure Enterprise Browser - Ther... - BSW #361
⚠️
Windows driver zero-day exploited by Lazarus hackers to install rootkit
⚠️
Was ist Social Engineering?
KEV
📢
F5 security advisory (AV24-463)
📢
Ubuntu security advisory (AV24-464)
📢
Dell security advisory (AV24-465)
📢
IBM security advisory (AV24-466)
📢
Red Hat security advisory (AV24-467)
📢
[Control systems] CISA ICS security advisories (AV24-468)
📢
Building Timely and Truthful LLMs for Security Operations
📢
Joint ODNI, FBI, and CISA Statement on Iranian Election Influence Efforts
🔥
Explore Talent (August 2024) - 8,929,384 breached accounts
🔥
Tracki - 372,557 breached accounts
🔥
100,000 Impacted by Jewish Home Lifecare Data Breach
🔥
The State of Ransomware
🔥
Mad Liberator Gang Uses Fake Windows Update Screen to Hide Data Theft
🔥
Crypto Firm Says Hacker Locked All Employees Out of Google Products for Four Days
🔥
Ransomware Group Known as ‘Royal’ Rebrands as BlackSuit and Is Leveraging New Attack Methods
🔥
National Public Data Says Breach Impacts 1.3 Million People
🔥
City of Flint Scrambling to Restore Services Following Ransomware Attack
🔥
National Public Data Says Breach Impacts 1.3 Million People
🔥
Bicycles Can Be Hacked Now
🔥
FlightAware configuration error leaked user data for years
🔥
Carespring Data Breach Exposes Personal and Medical Information of Nearly 77,000 Patients
🔥
National Public Data Published Its Own Passwords
🔥
Florida-Based Drug Testing Lab Says 300,000 Affected in Hack
🔥
Background Check Firm National Public Data Confirms Breach
🔥
How the Paris Olympics Survived Unprecedented Cyberthreats
🔥
Chinese Hacking Firm iSoon Targeted European Networks
🔥
The Upside-Down, Topsy-Turvy World of Ransomware
🔥
Ransomware rakes in record-breaking $450 million in first half of 2024
🔥
Toyota confirms breach after stolen data leaks on hacking forum
🔥
FBI Confirms Iranian Hack Targeting Trump Campaign
🔥
Toyota confirms third-party data breach impacting customers
🕵️
ISC Stormcast For Monday, August 19th, 2024 https://isc.sans.edu/podcastdetail/9102, (Mon, Aug 19th)
🕵️
BeaverTail Malware Attacking Windows Users Via Weaponized Games
🕵️
Researchers Uncover New Infrastructure Tied to FIN7 Cybercrime Group
🕵️
OpenAI takes action against Iranian disinformation campaigns using ChatGPT: Cyber Security Today for Monday, August 19th, 2024
🕵️
Do you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python, (Mon, Aug 19th)
🕵️
Researchers Uncover New Infrastructure Tied to FIN7 Cybercrime Group
🕵️
Oregon Zoo Ticketing Service Hack Impacts 118,000
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia
🕵️
Black Hat Fireside Chat: Why grasping the context of code is a recipe for keeping software secure
🕵️
RansomHub-linked EDR-killing malware spotted in the wild
📡
Industry Moves for the week of August 19, 2024 - SecurityWeek
📡
Unicoin Hints At Potential Data Meddling After G-Suite Compromise
📡
Privacy-Preserving Attribution by Mozilla: what is it and what’s it for? | Kaspersky official blog
📡
Hackers linked to $14M Holograph crypto heist arrested in Italy
📡
FlightAware warns that some customers’ info has been ‘exposed,’ including Social Security numbers
📡
SAFECOM and NCSWIC Develop Global Positioning System (GPS) for Public Safety Location Services: Use Cases and Best Practices
📡
Why Zero Trust is Still Important: Insights, Challenges, and Recommendations
📡
Live Webinar | Evolving Beyond Legacy: Fast-Tracking Innovation with Modern Identity Security
📡
Webinar | 2024 Phishing Insights: What 11.9 Million User Behaviors Reveal About Your Risk
📡
Live Webinar | Anatomy of a Successful DevSecOps Program
📡
Why MDR Stalwart eSentire Is Looking to Sell Itself for $1B
📡
Cybersecurity Consulting: Is It the Right Career for You?
📡
Why SEC, SolarWinds Eye Settlement Talks in Cyber Fraud Case