49Articles
8Categories
2024-09-02Date
🐛
North Korean hackers actively exploited a critical Chromium zero-day
KEV
⚠️
Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers’ Systems
⚠️
Ransomware recovery: 8 steps to successfully restore from backup
⚠️
State-Backed Attackers and Commercial Surveillance Vendors Repeatedly Use the Same Exploits
⚠️
Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management
⚠️
SQL Injection Attack on Airport Security
⚠️
Sinon: Open-Source Automatic Generative Burn-in for Windows Deception Hosts
⚠️
Close the Security Theater: Enter Resilience - Kelly Shortridge - ASW Vault
⚠️
Inside CISA's Unprecedented Election Security Mission
⚠️
Business services giant CBIZ discloses customer data breach
⚠️
Microsoft Says North Korean Crypto Thieves Behind Chrome Zero Day
⚠️
North Korean Hackers Tied to Exploits of Chromium Zero-Day
⚠️
Owners of 1-Time Passcode Theft Service Plead Guilty
📋
CrowdStrike faces onslaught of legal action from faulty software update
📢
Next-Generation Attacks, Same Targets - How to Protect Your Users' Identities
📢
CISA Launches Cyber Incident Reporting Portal To Streamline Breach Disclosure
📢
NIST Releases New Draft of Digital Identity Proofing Guidelines
🔥
OceanLotus APT Group Targeting Vietnamese Human Rights Defenders
🔥
Cyber Threats That Shaped the First Half of 2024
🔥
North Korean Cyberattacks Persist: Developers Targeted via npm Packages
🔥
A New Variant of Cicada Ransomware Targets VMware ESXi Systems
🔥
Durex India data breach leaks sensitive details of customers
🔥
A Macro Look at the Most Pressing Cybersecurity Risks
🔥
RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors
🔥
Verkada to pay $2.95M for security failures leading to breaches
🔥
Transport for London discloses ongoing “cyber security incident”
🔥
Transport for London cyberattack?
🕵️
Fake Palo Alto GlobalProtect Tool Used as Lure to Backdoor Enterprises
🕵️
SafeTech Labs Takes Aim at $52B Digital Legacy Industry with World’s First Fully Comprehensive Digital Legacy Solution
🕵️
Brazil Suspends Access to Elon Musk's X, Including via VPNs
🕵️
BSides Budapest 2024
🕵️
TROOPERS IT Security Conference 2024
🕵️
Leadership Lessons from the First 100 Episodes of CISO Stories - Todd Fitzgerald - BSW Vault
🕵️
.NET-based Snake Keylogger Attack Windows Using Weaponized Excel Documents
🕵️
If you had to access an unfamiliar flash drive (or other data storage), what safety precautions would you take?
🕵️
Protected OOXML Text Documents, (Mon, Sep 2nd)
🕵️
SafeTech Labs Takes Aim at $52B Digital Legacy Industry with World’s First Fully Comprehensive Digital Legacy Solution
🌐
GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware
📡
IT worker charged over $750,000 cyber extortion plot against former employer
📡
Myths and superstitions in the digital world | Kaspersky official blog
📡
Uniqkey Raises $5.92M in Funding
📡
Intel Claps Back At Report Of SGX Key Theft
📡
Novel Attack On Windows Spotted In Phishing Campaign
📡
Sweden Warns Of Heightened Risk Of Russian Sabotage
📡
RansomHub Claims 210 Victims In Just 6 Months
📡
Admins of MFA bypass service plead guilty to fraud
📡
Admins of MFA bypass service plead guilty to fraud
📡
Industry Moves for the week of September 2, 2024 - SecurityWeek
📡
Verkada to pay $2.95 million for alleged CAN-SPAM Act violations