96Articles
9Categories
2024-08-21Date
🚨
CISA Adds Four Known Exploited Vulnerabilities to CatalogCISA has added four new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2021-33044 Dahua IP Camera Authentication Bypass Vulnerability CVE-2021-33045 Dahua IP Camera Authentication Bypass Vulnerability CVE-2022-…
KEV
πŸ›
GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk
πŸ›
Over 10,000 WordPress Sites at Risk: Critical File Deletion Flaw Found in InPost Plugins
πŸ›
Spring Security Flaw Leaves Applications Open to Unauthorized Access
πŸ›
GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk
πŸ›
Critical Heap Overflow Vulnerability Discovered in FFmpeg, PoC Published
πŸ›
Researcher Details Microsoft Outlook Zero-Click Vulnerability (CVE-2024-38021)
πŸ›
Critical Remote Code Execution Vulnerability Addressed in GiveWP Plugin
πŸ›
Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data
⚠️
Attackers increasingly using legitimate remote management tools to hack enterprises
⚠️
Ransomware hits record high amounts: Cyber Security Today for Tuesday, August 21, 2024
⚠️
Custodians looking to beat offenders in the GenAI cybersecurity battle
⚠️
Rising Abuse of URL Rewriting in Phishing
⚠️
Cyberattack Disrupts Microchip Technology Manufacturing Facilities
⚠️
8 cloud security gotchas most CISOs miss
⚠️
RCE Vulnerability in Atlassian Bamboo Data Center and Server
⚠️
Microchip suffers cyberattack, impacting manufacturing operations
⚠️
New Msupedge Backdoor Targeting Taiwan Employs Stealthy Communications
⚠️
Unlocking the Power of AI in Cybersecurity
⚠️
Azure Kubernetes Services Vulnerability Exposed Sensitive Information
⚠️
TLS Bootstrap Attack on Azure Kubernetes Services can Leak Sensitive Credentials
⚠️
CrowdStrike-Action1 deal collapses over user concerns
⚠️
Microsoft Copilot Studio Vulnerability Led to Information Disclosure
⚠️
Novel Phishing Method Used in Android and iOS Financial Fraud Campaigns
⚠️
GitHub Enterprise Server vulnerable to critical auth bypass flaw
⚠️
Why LinkedIn Developed Its Own AI-Powered Security Platform
⚠️
Ransomware Again on Track to Achieve Record-Breaking Profits
⚠️
Litespeed Cache bug exposes millions of WordPress sites to takeover attacks
⚠️
Australian data regulator backs off Clearview AI
⚠️
Threat Actors Abuse URL Rewriting to Mask Phishing Links
⚠️
Iranian cyberespionage group deploys new BlackSmith malware in sophisticated spear-phishing campaign
⚠️
Why Your Business Needs Email Encryption Now
⚠️
The Hidden Dangers of Email Attachments
⚠️
Phishing Scammers Leverage Microsoft Dynamics 365 to Target US Government Contractors
⚠️
Google fixes ninth Chrome zero-day exploited in attacks this year
⚠️
The Strategic Need for Employee Training and Education
⚠️
The Great Cloud Security Debate: CSP vs. Third-Party Security Tools
⚠️
ASD’s ACSC, CISA, FBI, and NSA, with the support of International Partners Release Best Practices for Event Logging and Threat Detection
⚠️
Google fixes ninth Chrome zero-day exploited in attacks this year
πŸ“’
Atlassian security advisory (AV24-469)
πŸ“’
Arden Claims Service Reports Data Breach, 139,000 Affected
πŸ“’
GitHub security advisory (AV24-470)
πŸ“’
Mitel security advisory (AV24-471)
πŸ“’
Are the New FAA Cyber Requirements for Future Planes Enough?
πŸ”₯
Chipmaker Microchip reveals cyber attack
πŸ”₯
Styx Stealer Creator's OPSEC Fail Leaks Client List and Profit Details
πŸ”₯
Cyberattack Disrupts Microchip Manufacturing Facilities
πŸ”₯
Ransomware Gangs Are in Decline But Still Make Lots of Noise
πŸ”₯
QNAP adds NAS ransomware protection to latest QTS version
πŸ”₯
$2.25M Settlement Reached in Atlantic General Hack Lawsuit
πŸ”₯
How regulatory standards and cyber insurance inform each other
πŸ•΅οΈ
Mapping Threats with DNSTwist and the Internet Storm Center [Guest Diary], (Tue, Aug 20th)
πŸ•΅οΈ
ISC Stormcast For Wednesday, August 21st, 2024 https://isc.sans.edu/podcastdetail/9106, (Wed, Aug 21st)
πŸ•΅οΈ
Black Hat Fireside Chat: User feedback, AI-infused email security are both required to deter phishing
πŸ•΅οΈ
New macOS Malware TodoSwift Linked to North Korean Hacking Groups
πŸ•΅οΈ
Hackers target bank clients in Czechia, Hungary and Georgia in novel phishing campaign
πŸ•΅οΈ
Pro-Russia group Vermin targets Ukraine with a new malware family
πŸ•΅οΈ
Google Cloud Unveils New Security Services and Capabilities
πŸ•΅οΈ
Average DDoS attack costs $6,000 per minute (to the victim)
πŸ•΅οΈ
Thousands of Apps Using AWS ALB Exposed to Attacks Due to Configuration Issue
πŸ•΅οΈ
Story of an Undercover CIA Agent who Penetrated Al Qaeda
πŸ•΅οΈ
Google Play Bug Bounty Program Shutting Down
πŸ•΅οΈ
Phrack hacker zine publishes new edition after three years
πŸ•΅οΈ
AI in OT Security β€” Balancing Industrial Innovation and Cyber Risk
πŸ•΅οΈ
North Korean Hackers Deploy New MoonPeak Trojan in Cyber Campaign
πŸ•΅οΈ
Critical Authentication Flaw Haunts GitHub Enterprise Server
πŸ•΅οΈ
New Phishing Technique Bypasses Security on iOS and Android to Steal Bank Credentials
πŸ•΅οΈ
Russia tells citizens to switch off home surveillance because the Ukrainians are coming
πŸ•΅οΈ
Cybersecurity in 2024: Reflecting on the Past, Preparing for the Future
πŸ•΅οΈ
How to Account for Disinformation Risks in Election Security
πŸ•΅οΈ
Slack AI can leak private data via prompt injection
πŸ•΅οΈ
US Political Campaigns Targeted by Iranian Spear Phishing Attacks
πŸ•΅οΈ
Hackers steal banking creds from iOS, Android users via PWA apps
πŸ•΅οΈ
Novel technique allows malicious apps to escape iOS and Android guardrails
πŸ•΅οΈ
Researchers Thrust a Virtual Stick Into the Bike Spokes
πŸ•΅οΈ
How Cybercrime Fuels Human Trafficking and Gambling Scams
πŸ•΅οΈ
CrowdStrike denies merger talks with Action1
πŸ•΅οΈ
Microsoft again ranked number one in modern endpoint security market share
πŸ•΅οΈ
Auswirkungen auf IT-FachkrΓ€fte: 10 Anzeichen fΓΌr einen schlechten CSO
🌐
CERT-UA Warns of New Vermin-Linked Phishing Attacks with PoW Bait
🌐
TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset
πŸŽ™οΈ
The AI Fix #12: AI made from human brain cells, and is there life after death?
πŸ“‘
Detecting AWS Account Compromise: Key Indicators in CloudTrail Logs for Stolen API Keys
πŸ“‘
Czech Mobile Users Targeted in New Banking Credential Theft Scheme
πŸ“‘
Unmasking Styx Stealer: How a Hacker's Slip Led to an Intelligence Treasure Trove
πŸ“‘
It's Time To Untangle the SaaS Ball of Yarn
πŸ“‘
Deadbeat Dad Faked His Own Death By Hacking Government Databases
πŸ“‘
FlightAware Admits Passwords, SSNs Exposed For Years
πŸ“‘
Microsoft Copilot Studio Vuln Led To Information Disclosure
πŸ“‘
Sophos UK Volunteers Transform Outdoor Learning Space for Autistic Youth
πŸ“‘
Perspectives and Trends on Transforming in the World of SASE
πŸ“‘
Ubuntu Addresses Multiple OpenJDK 8 Vulnerabilities
πŸ“‘
Typing these four characters could crash your iPhone
πŸ“‘
Microsoft to rollout Windows Recall to Insiders in October
πŸ“‘
Microsoft to roll out Windows Recall to Insiders in October
πŸ“‘
Man sentenced for hacking state registry to fake his own death