106Articles
9Categories
2024-08-27Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-38856   Apache OFBiz Incorrect Authorization Vulnerability These types of vulnerabilities are frequent attack vectors for malic…
KEV
🚨
Versa Networks Releases Advisory for a Vulnerability in Versa Director, CVE-2024-39717Versa Networks has released an advisory for a vulnerability ( CVE-2024-39717 ) in Versa Director, a key component in managing SD-WAN networks, used by some Internet Service Providers (ISPs) and Managed Service Providers (MSPs). A cyber threat actor could exploit this vulnerabilit…
KEV
🐛
Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation
🐛
Vesra File Type Upload Vulnerability Lets Attackers Gain Sys-Admin Access from MSP
🐛
Centreon Issues Critical Security Update to Fix SQL Injection Vulnerabilities That Threaten IT Monitoring
🐛
News Chrome 0-Day Vulnerability (CVE-2024-7965) Actively Exploited in the Wild
KEV
🐛
Update: Researcher Publishes PoC Exploit for Zero-Click Windows RCE Threat
🐛
Google says a critical Chrome bug was exploited after a patch was released
KEV
🐛
Audit of Airswift's Supply Chain Financing
🐛
SonicWall Patches Critical Flaw Affecting its Firewalls (CVE-2024-40766)
🐛
Google Tags a Tenth Chrome Zero-Day as Exploited This Year
🐛
China’s Volt Typhoon exploits Versa zero-day to hack US ISPs and IT firms
KEV
⚠️
Researcher discovers exposed ServiceBridge database
⚠️
Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot
⚠️
10 top anti-phishing tools and services
KEV
⚠️
Critical SSTI Flaw in WPML Plugin Exposes Millions of WordPress Sites to RCE Attacks
⚠️
Researchers Discover Several Potential Attack Vectors in Bicycles With Shimano Di2 Wireless Gear-Shifting System
⚠️
Bug bounty programs take root in Russia — with possible far-reaching implications
⚠️
Google Warns of Exploited Chrome Vulnerability
KEV
⚠️
Researchers Discover Over 20 Supply Chain Vulnerabilities in MLOps Platforms
⚠️
The Changing Dynamics of Ransomware as Law Enforcement Strikes
⚠️
Ransomware Recovery Costs Have Doubled for State and Local Governments
⚠️
Microsoft Copilot Prompt Injection Vulnerability Let Hackers Exfiltrate Sensitive Data
⚠️
Nuclei: Open-Source Vulnerability Scanner
⚠️
Changing the Course of IoT's Future from Its Insecure Past - Paddy Harrington - ASW #297
⚠️
Chinese Volt Typhoon hackers exploited Versa zero-day to breach ISPs, MSPs
⚠️
Chinese Volt Typhoon Exploits Versa Director Flaw, Targets U.S. and Global IT Sectors
⚠️
Chinese government hackers targeted U.S. internet providers with zero-day exploit, researchers say
⚠️
Vulnerability Management: Tips and Techniques - John Kellerhals - CSP #189
⚠️
New 0-Day Attacks Linked to China’s ‘Volt Typhoon’
⚠️
WPML Multilingual CMS Authenticated Contributor+ Remote Code Execution Via SSTI
⚠️
Code Execution Vulnerability Found in WPML Plugin Installed on 1M WordPress Sites
⚠️
The Role of AI in Email Security: Beyond Phishing Detection
⚠️
MGs, Free Speech, sedexp, Cthulhu, SeaTac, GrimResource, ServiceBridge, Josh Marpet.. - SWN #410
⚠️
China's Volt Typhoon Exploits 0-day in Versa's SD-WAN Director Servers
⚠️
Not a SOC FAQ! This is SOC FMD!
📢
Foxit security advisory (AV24-483)
📢
Telegram founder’s arrest raises anxiety about future of end-to-end encryption
📢
[Control systems] B&R security advisory (AV24-484)
📢
McLaren Health: IT Operations Fully Back Online Post-Attack
📢
Wipro, AWS Team up to Address Compliance in the Cloud Era
🔥
Top-5 leaks of all time | Kaspersky official blog
🔥
Seattle Airport Blames Outages on Possible Cyberattack
🔥
McDonald’s Instagram Hacked by Crypto Scammers to Steal $700,000
🔥
Cost of data breaches: The business case for security AI and automation
🔥
Microsoft 365 Flags Emails with Images as Malware: A Growing Concern for Users
🔥
Microsoft Convenes Endpoint Security Firms Following CrowdStrike Incident
🔥
Seattle Airport Blames Outages On Possible Cyberattack
🔥
EDR Killer Ransomware: What It Is, How To Repel
🔥
PythonAnywhere Cloud Platform Abused for Hosting Ransomware
🔥
Complete Guide to Protecting Seven Attack Vectors
🔥
Ransomware Hackers Steal Medical Insurance Data of 1M People
🔥
Park’N Fly notifies 1 million customers of data breach
🔥
Attack tool update impairs Windows computers
🔥
India's Critical Infrastructure Suffers Spike in Cyberattacks
🔥
Patelco Breach Affected 726,000 Customers, Employees
🔥
Windows Downdate tool lets you 'unpatch' Windows systems
🔥
Lateral Movement: Clearest Sign of Unfolding Ransomware Attack
🔥
Report: A Third of Organizations Suffer SaaS Data Breaches Last Year
🔥
US Marshals Service disputes ransomware gang's breach claims
🔥
BlackSuit ransomware stole data of 950,000 from software vendor
🕵️
ISC Stormcast For Tuesday, August 27th, 2024 https://isc.sans.edu/podcastdetail/9114, (Tue, Aug 27th)
🕵️
Is wpa3 reccomended on a home network?
🕵️
Hackers Claim to Have Stolen Top Secret Documents From the U.S. Marshals Service
🕵️
Pidgin Users Beware! Malicious Plugin Discovered with Keylogger
🕵️
Identity of Notorious Hacker USDoD Revealed
🕵️
The Present and Future of TV Surveillance
🕵️
More Carrots and Fewer Sticks
🕵️
Cisco to Acquire AI Security Firm Robust Intelligence
🕵️
Why Is Python so Popular to Infect Windows Hosts?, (Tue, Aug 27th)
🕵️
NTLM Credential Theft Risk in Python Apps Threaten Windows Security
🕵️
Hackers Use Rare Stealth Techniques to Down Asian Military, Gov't Orgs
🕵️
Group Offers CAPTCHA-Solving Services to Cybercriminals
🕵️
CyberheistNews Vol 14 #35 [PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing
🕵️
When Convenience Costs: CISOs Struggle With SaaS Security Oversight
🕵️
Join SASE Converge — Where the Future of SASE Comes Together
🕵️
Apache HTTPD Vulns, Hacking IoT Speakers, Use Cases for WASM, Slack AI Leak - ASW #297
🕵️
Cribl Raises $319 Million at $3.5 Billion Valuation
🕵️
Can You Trust AI in Cybersecurity? 🤔 Edward Wu Breaks It Down!
🕵️
Cribl Gets $319M on $3.5B Valuation to Boost Data Management
🕵️
Check Point to Buy External Risk Management Vendor Cyberint
🕵️
Tech Orgs: UN Cybercrime Treaty Will Worsen Global Security
🌐
Hackers Infect ISPs With Malware That Steals Customer Credentials
🌐
macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users
🌐
Malware infiltrates Pidgin messenger’s official plugin repository
🎙️
The AI Fix #13: ChatGPT runs for mayor, and should we stop killer robots?
📡
Tech Support Scam Found Hijacking Microsoft Search Queries Through Google Ads
📡
Zimbabwe Government Places Priority on Cybersecurity Training for Public Servants
📡
Researchers Warn of Text Scams That Send Drivers Fake Bills for Highway Tolls
📡
Uber Hit With $324m GDPR Fine
📡
CTEM in the Spotlight: How Gartner's New Categories Help to Manage Exposures
📡
Microsoft Sway abused in massive QR code phishing campaign
📡
NASA IV&V Facility Expands Cybersecurity Work and Educational Outreach
📡
How to identify unknown assets while pen testing
📡
AMD Internal Data Reportedly Offered For Sale
📡
In a Kyiv Hangar, Ukraine Launches a Cyber Range for Everyone
📡
Watchdog Warns FBI Is Sloppy On Secure Data Storage And Destruction
📡
Microsoft Security Tools Questioned For Treating Employees As Threats
📡
Two Strategies to Protect Your Business From the Next Large-Scale Tech Failure
📡
Top Universities to Battle in Cybersecurity at UNSW’s Upcoming Australian Cybersecurity Games
📡
The U.S. military’s latest psyop? Advertising on Tinder
📡
New Cheana Stealer Threat Targets VPN Users Across Multiple Operating Systems
📡
Notion exits Russia and will terminate accounts in September
📡
Windows 11 KB5041587 update adds sharing to Android devices
📡
Election Security Partners Host 7th Annual Tabletop the Vote Exercise for 2024
📡
Old devices, new dangers: The risks of unsupported IoT tech