101Articles
9Categories
2024-08-28Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-7965  Google Chromium V8 Inappropriate Implementation Vulnerability These types of vulnerabilities are frequent attack vectors for m…
KEV
🐛
Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem
🐛
Critical WPML Plugin Flaw Exposes WordPress Sites to Remote Code Execution
🐛
CISA Flags Critical Apache OFBiz Flaw Amid Active Exploitation Reports
KEV
🐛
Rockwell Automation ThinManager Flaw Let Attackers Execute Remote Code
🐛
Critical Apache OFBiz Vulnerability CVE-2024-38856 Identified and Actively Exploited
KEV
🐛
Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem
🐛
Critical plugin flaw opens over a million WordPress sites to RCE attacks
🐛
Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability
🐛
BlackByte ransomware gang exploits more orgs than previously known
🐛
Attackers Exploit Critical Atlassian Confluence Flaw for Cryptojacking
🐛
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
⚠️
What is OWASP? A standard bearer for better web application security
⚠️
Four Internet Service Providers are breached by sophisticated cyber attack. Cyber Security Today for Wednesday, August 28, 2024
⚠️
New QR Code Phishing Campaign Exploits Microsoft Sway to Steal Credentials
⚠️
Sport 2000 - 3,189,643 breached accounts
⚠️
Researchers Disclosed 20 Vulnerabilities Exploited To Attack ML Used In Orgs
⚠️
Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot
⚠️
How not to hire a North Korean IT spy
⚠️
Airtags Locator Device used to Grab the Stolen Parcel
⚠️
South Korean APT Group Exploits WPS Office Zero-Day for Espionage
⚠️
Second Apache OFBiz Vulnerability Exploited in Attacks
KEV
⚠️
BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave
⚠️
PSA: Github currently has spambot/ malware links problem.
⚠️
China's Volt Typhoon Exploits Zero-Day Flaw in Versa's SD-WAN Director Servers
⚠️
PoC Exploit for Zero-Click Vulnerability Made Available to the Masses
⚠️
Versa Director Zero-day Vulnerability Let Attackers Upload Malicious Files
⚠️
Pootry EDR Killer Malware Wipes Out Security Tools From Windows Machine
⚠️
Cisco snaps up AI security player Robust Intelligence
⚠️
CISA and Partners Release Advisory on Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations
⚠️
TDECU MOVEit Data Breach, 500,000+ members’ Personal Data Exposed
⚠️
Chinese Nation-State Attackers Tied to Versa Zero-Day Hit
⚠️
BlackByte Blends Known Tactics With New Encryptor Variant and Vulnerability Exploits to Support Ongoing Attacks
⚠️
APT-C-60 Group Exploit WPS Office Flaw to Deploy SpyGlace Backdoor
⚠️
WPS Office Zero-Day Exploited by South Korea-Linked Cyberspies
⚠️
WPS Office Zero Day Exploited By South Korea Linked Cyber Spies
⚠️
DICK’s Sporting Goods says confidential data exposed in cyberattack
⚠️
Censys Finds Hundreds of Exposed Servers as Volt Typhoon APT Targets ISPs, MSPs
⚠️
Google increases Chrome bug bounty rewards up to $250,000
⚠️
DICK’s shuts down email, locks employee accounts after cyberattack
⚠️
Google Now Offering Up to $250,000 for Chrome Vulnerabilities
⚠️
Tool used by ransomware groups now seen killing EDR: Report
⚠️
US Law Enforcement Cracks Down on AI-Led Child Abuse Content
⚠️
US offers $2.5 million reward for hacker linked to Angler Exploit Kit
⚠️
Telegram Founder Pavel Durov Charged by French Court
⚠️
Microsoft Copilot Fixes ASCII Smuggling Vulnerability
⚠️
Unpatchable 0-day in surveillance cam is being exploited to install Mirai
⚠️
South Korean hackers exploited WPS Office zero-day to deploy malware
⚠️
Hitachi Energy Vulnerabilities Plague SCADA Power Systems
📢
Rising Tides: Runa Sandvik on Creating Work that Makes a Difference
📢
Fortra fixes critical FileCatalyst Workflow hardcoded password issue
📢
Fortra security advisory (AV24-486)
📢
Google Chrome security advisory (AV24-487)
📢
Iranian Hackers Target US in Ransomware and Espionage Attacks
🔥
950,000 Impacted by Young Consulting Data Breach
🔥
Email Compromise Remains Top Threat Incident Type for the Third Quarter in a Row
🔥
Largest Healthcare Data Breaches of 2023
🔥
32 Million Sensitive Records Exposed From Service Management Provider
🔥
Hunters International Ransomware Gang Threatens To Leak US Marshals Data
🔥
Iranian hackers work with ransomware gangs to extort breached orgs
🔥
SeaTac Airport Cyber Attack: What You Need to Know Before Flying!
🔥
PoorTry Windows driver evolves into a full-featured EDR wiper
🔥
Nothing to Smile About: Hacks on Dental Practices Swell
🔥
The art and science behind Microsoft threat hunting: Part 3
🕵️
Vega-Lite with Kibana to Parse and Display IP Activity over Time, (Tue, Aug 27th)
🕵️
ISC Stormcast For Wednesday, August 28th, 2024 https://isc.sans.edu/podcastdetail/9116, (Wed, Aug 28th)
🕵️
Patchwork Actors Using Weaponized Encrypted Zip Files to Attack Orgs
🕵️
US Offering $2.5 Million Reward for Belarusian Malware Distributor
🕵️
How Lessons Learned From the 2016 Campaign Led US Officials to Be More Open About Iran Hack
🕵️
Matthew Green on Telegram’s Encryption
🕵️
Check Point Acquires Cybersecurity Startup Cyberint
🕵️
‘ASCII Smuggling’ attack exposes sensitive Microsoft Copilot data
🕵️
Phishing Attacks Are Increasingly Targeting Social Media and Smartphone Users
🕵️
Malware Delivered via Malicious Pidgin Plugin, Signal Fork
🕵️
Check Point to Acquire External Cyber Risk Management Firm Cyberint
🕵️
What are You Working on Wednesday
🕵️
Research Unveils Eight Android And iOS That Leaks Users Sensitive Data
🕵️
LinkedIn Hires Former Twitter Security Chief Lea Kissner as New CISO
🕵️
New LummaC2 Malware Variant Uses PowerShell, Obfuscation to Steal Data
🕵️
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations
🕵️
New Tickler malware used to backdoor US govt, defense orgs
🕵️
Telegram Founder Set to Appear Before French Court
🕵️
New Tickler malware used to backdoor US govt, defense orgs
🕵️
True Zero Trust Should Mean VPN Retirement
🕵️
Cisco Bolsters AI Security by Buying Robust Intelligence
🌐
New Phishing Campaign Steals VPN Credentials Using Social Engineering Methods
🌐
Malware Delivered Via Malicious Pidgin Plugin, Signal Fork
🌐
Stealing cash using NFC relay – Week in Security with Tony Anscombe
🎙️
Save 25% on InfoSec World 2024! 🎉 Cybersecurity Event of the Year!
📡
University criticised for using Ebola outbreak lure in phishing test
📡
CoinSwitch sues WazirX to recover trapped funds
📡
How to protect and preserve your data in Telegram in 2024 | Kaspersky official blog
📡
Microsoft's Sway Serves as Launchpad for 'Quishing' Campaign
📡
Seeking a Job in Cybersecurity? Protect Yourself From Scams
📡
How AI Is Deciphering Lost Scrolls From The Roman Empire
📡
From Copilot To Copirate: How Data Thieves Could Hijack Microsoft's Chatbot
📡
Cybercrime And Sabotage Cost German Firms $300 Billion In Past Year
📡
It's down to the wire—but you don’t have to miss mWISE
📡
Ex-Twitter CISO Lea Kissner appointed as LinkedIn security chief
📡
Employee arrested for locking Windows admins out of 254 servers in extortion plot
📡
When Get-Out-The-Vote Efforts Look Like Phishing