108Articles
9Categories
2024-08-22Date
🚨
How do we patch the right things? - PSW #840Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such …
KEV
πŸ›
Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild
KEV
πŸ›
GitHub Patches Critical Security Flaw in Enterprise Server Granting Admin Privileges
πŸ›
Critical Flaw in LiteSpeed Cache Plugin Actively Exploited: Over 30,000 Attacks Blocked in 24 Hours
KEV
πŸ›
Google Fixes Ninth Chrome Zero-Day Exploited in Attacks This Year
πŸ›
Ingress-NGINX Annotation Validation Bypass Flaw (CVE-2024-7646) Allows Command Injection
πŸ›
CVE-2024-7272: Critical Heap Overflow Vulnerability Discovered in FFmpeg, PoC Published
πŸ›
Chinese Hackers Exploit Zero-Day Cisco Switch Flaw to Gain System Control
πŸ›
Chromium: CVE-2024-7967 Heap buffer overflow in Fonts
πŸ›
Chromium: CVE-2024-7969 Type Confusion in V8
πŸ›
Chromium: CVE-2024-7966 Out of bounds memory access in Skia
πŸ›
Chromium: CVE-2024-7971 Type confusion in V8
πŸ›
Chromium: CVE-2024-7965 Inappropriate implementation in V8
πŸ›
Chromium: CVE-2024-7968 Use after free in Autofill
πŸ›
Chromium: CVE-2024-7964 Use after free in Passwords
πŸ›
Chromium: CVE-2024-7980 Insufficient data validation in Installer
πŸ›
Chromium: CVE-2024-8034 Inappropriate implementation in Custom Tabs
πŸ›
Chromium: CVE-2024-8033 Inappropriate implementation in WebApp Installs
πŸ›
Chromium: CVE-2024-7981 Inappropriate implementation in Views
πŸ›
Chromium: CVE-2024-8035 Inappropriate implementation in Extensions
πŸ›
CVE-2024-41879 Adobe: CVE-2024-41879 Adobe PDF Viewer Remote Code Execution Vulnerability
πŸ›
CVE-2024-38209 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
πŸ›
CVE-2024-43477 Entra ID Elevation of Privilege Vulnerability
πŸ›
CVE-2024-38208 Microsoft Edge for Android Spoofing Vulnerability
πŸ›
CVE-2024-38210 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
πŸ›
Chromium: CVE-2024-7975 Inappropriate implementation in Permissions
πŸ›
Chromium: CVE-2024-7976 Inappropriate implementation in FedCM
πŸ›
Chromium: CVE-2024-7973 Heap buffer overflow in PDFium
πŸ›
Chromium: CVE-2024-7979 Insufficient data validation in Installer
πŸ›
Chromium: CVE-2024-7972 Inappropriate implementation in V8
πŸ›
Chromium: CVE-2024-7978 Insufficient policy enforcement in Data Transfer
πŸ›
Chromium: CVE-2024-7977 Insufficient data validation in Installer
πŸ›
Chromium: CVE-2024-7974 Insufficient data validation in V8 API
πŸ›
Critical Flaw in LiteSpeed Cache WordPress Plugin Exposes Millions of Websites to Attack
πŸ›
Scanning for CVE-2017-9841 Drops Precipitously
πŸ›
Scanning for CVE-2017-9841 Drops Precipitously
⚠️
New Malware PG_MEM Targets PostgreSQL Databases for Crypto Mining
⚠️
Critical Flaw in WordPress LiteSpeed Cache Plugin Allows Hackers Admin Access
⚠️
3 key strategies for mitigating non-human identity risks
⚠️
How MFA gets hacked β€” and strategies to prevent it
⚠️
Exploitation Expected for Flaw in Caching Plugin Installed on 5M WordPress Sites
⚠️
Google Patches Sixth Exploited Chrome Zero-Day of 2024
KEV
⚠️
CISA Warns of Exploited Vulnerabilities Impacting Dahua Products
⚠️
Cisco Patches High-Severity Vulnerability Reported by NSA
⚠️
Experts disclosed a critical information-disclosure flaw in Microsoft Copilot Studio
⚠️
Man who hacked Hawaii state registry to forge his own death certificate sentenced to 81 months
⚠️
Top US oilfield firm Halliburton hit by cyberattack, source says
⚠️
Background-check giant confirms security incident leaked millions of SSNs
⚠️
CISA Releases Five Industrial Control Systems Advisories
⚠️
SolarWinds fixes hardcoded credentials flaw in Web Help Desk
⚠️
New 'ALBeast' Vulnerability Exposes Weakness in AWS Application Load Balancer
⚠️
Roast the security of my app
⚠️
Oil Services Giant Halliburton Disrupted by Hack Attack
⚠️
Two Years On, Log4Shell Vulnerability Still Being Exploited to Deploy Malware
⚠️
Incident Response by the Numbers
⚠️
China-Linked β€˜Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on Cisco Nexus Switches
⚠️
Vulnerabilities, Vulnerabilities Everywhere - PSW #840
⚠️
Hardcoded Credential Vulnerability Found in SolarWinds Web Help Desk
⚠️
Oil Giant Halliburton Confirms Cyber Incident, Details Scarce
⚠️
News alert: INE Security launches initiatives in support of aspiring cybersecurity professionals
⚠️
Hackers are exploiting critical bug in LiteSpeed Cache plugin
⚠️
PG_MEM – A Malware Hide in Postgres Processes to Steal Data
⚠️
Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware
⚠️
Developers Beware! Fake Job Offers from Legitimate Github Address
πŸ“‹
Microsoft confirms August updates break Linux boot in dual-boot systems
πŸ“‹
Microsoft: August updates cause Windows Server boot issues, freezes
πŸ“’
Cisco security advisory (AV24-472)
πŸ“’
Drupal security advisory (AV24-473)
πŸ“’
Google Chrome security advisory (AV24-474)
πŸ“’
SolarWinds security advisory (AV24-475)
πŸ”₯
How Trend Micro Managed Detection and Response Pressed Pause on a Play Ransomware Attack
πŸ”₯
Qilin ransomware caught stealing credentials stored in Google Chrome
πŸ”₯
Over 100,000 Oregon Zoo visitors warned that their payment card details were stolen in security breach
πŸ”₯
Hacker leaks upcoming episodes of Netflix shows online following security breach
πŸ”₯
U.S. charges Karakurt extortion gang’s β€œcold case” negotiator
πŸ”₯
β€˜Styx Stealer’ malware developer accidentally exposes personal info to researchers in β€˜critical opsec error’
πŸ”₯
FlightAware admits passwords, SSNs exposed for over 3 years
πŸ”₯
Understanding the β€˜Morphology’ of Ransomware:Β A Deeper Dive
πŸ”₯
Cryptohack Roundup: Investors Sue Binance
πŸ”₯
Breach Roundup: Microsoft Fixed Copilot Studio Flaw
πŸ”₯
US Authorities Warn Health Sector of Everest Gang Threats
πŸ”₯
ISMG Editors: Social Engineering, Election Defense in AI Era
πŸ”₯
Qilin ransomware now steals credentials from Chrome browsers
πŸ•΅οΈ
ISC Stormcast For Thursday, August 22nd, 2024 https://isc.sans.edu/podcastdetail/9108, (Thu, Aug 22nd)
πŸ•΅οΈ
Atlassian Patches Vulnerabilities in Bamboo, Confluence, Crowd, Jira
πŸ•΅οΈ
CrowdStrike Hits Back at Action1 Following $1 Billion Acquisition Rumors
πŸ•΅οΈ
Global Cyber Agencies Unveil New Logging Standards
πŸ•΅οΈ
North Korean Hackers Pivot Away From Public Cloud
πŸ•΅οΈ
Microsoft AI Tour: Hear the latest product innovations to elevate your security strategy
πŸ•΅οΈ
INE Security Launches Initiatives to Invest in the Education of Aspiring Cybersecurity Professionals
πŸ•΅οΈ
INE Security Alert: The Steep Cost of Neglecting Cybersecurity Training
🌐
New NGate Android malware uses NFC chip to steal credit card data
🌐
Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide
🌐
NGate Android malware relays NFC traffic to steal cash
πŸ“‘
MegaMedusa, RipperSec’s Public Web DDoS Attack Tool
πŸ“‘
The Facts About Continuous Penetration Testing and Why It’s Important
πŸ“‘
Best practices for event logging and threat detection
πŸ“‘
Atlassian Patches Vulnerabilities In Bamboo, Confluence, Crowd, Jira
πŸ“‘
UCSC Does Phishing Exercise With Fake Ebola Scare
πŸ“‘
Hackers Leak Their Own Operations Through Exposed Telegram Bot API Tokens
πŸ“‘
Google To Help Build Cyber Protection For Australian Infrastructure
πŸ“‘
Novel Technique Allows Malicious Apps To Escape Walled Gardens
πŸ“‘
Cisco Calls For UN To Revisit Cybercrime Convention
πŸ“‘
Improvements to our SIEM in Q2 2024 | Kaspersky official blog
πŸ“‘
Ecovacs says it will fix bugs that can be abused to spy on robot owners
πŸ“‘
OpenAI Scans for Honeypots. Artificially Malicious? Action Abuse?, (Thu, Aug 22nd)
πŸ“‘
Confidence in GenAI: The Zero Trust Approach
πŸ“‘
Securing the Power of AI, Wherever You Need It