94Articles
10Categories
2024-09-05Date
๐Ÿšจ
DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global CampaignTwo DrayTek vulnerabilities added by CISA to its KEV catalog have been exploited by multiple threat groups to steal data from organizations worldwide. The post DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign appeared first on SecurityWeek .
KEV
๐Ÿ›
Cisco Fixes Two Critical Flaws in Smart Licensing Utility to Prevent Remote Attacks
๐Ÿ›
CISA Warns of Three Actively Exploited Vulnerabilities That Demand Immediate Attention
KEV
๐Ÿ›
Google Fixed Actively Exploited Android Privilege Escalation Flaw (CVE-2024-32896)
KEV
๐Ÿ›
Cisco Warns of Backdoor Admin Account in Smart Licensing Utility
๐Ÿ›
Veeam Releases Security Updates to Fix 18 Flaws, Including 5 Critical Issues
โš ๏ธ
Hackers are cloning YubiKeys via new side-channel exploit
โš ๏ธ
"Active Listening" software reportedly used to listen in on smart phone conversations. Cyber Security Today for Thursday, September 5, 2024
โš ๏ธ
No evidence that TP-Link routers are a Chinese security threat
โš ๏ธ
Cisco Smart Licensing Utility Vulnerability Let Attackers Gain Admin Control
โš ๏ธ
Veeam Backup & Replication Vulnerabilities Let Attackers Execute Remote Code
โš ๏ธ
RomCom Groupโ€™s Underground Ransomware Exploits Microsoft Zero-Day Flaw
โš ๏ธ
New report shows ongoing gender pay gap in cybersecurity
โš ๏ธ
CISO budget survey: Modest increases in 2024
โš ๏ธ
Veeam warns of critical RCE flaw in Backup & Replication software
โš ๏ธ
Phishing is Still the Top Initial Access Vector
โš ๏ธ
CISA Releases Four Industrial Control Systems Advisories
โš ๏ธ
Cisco Fixes Root Escalation Vulnerability With Public Exploit Code
KEV
โš ๏ธ
GitHub Actions typosquatting: A high-impact supply chain attack-in-waiting
โš ๏ธ
Russian military hackers linked to critical infrastructure attacks
โš ๏ธ
LiteSpeed Cache bug exposes 6 million WordPress sites to takeover attacks
โš ๏ธ
How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault
โš ๏ธ
Breach Roundup: YubiKey 5 Is Vulnerable to Cloning
โš ๏ธ
Multiple Vulnerabilities in Veeam Products Could Allow for Remote Code Execution
โš ๏ธ
Boost security and control at every stage of the cloud application lifecycle
โš ๏ธ
Apache fixes critical OFBiz remote code execution vulnerability
โš ๏ธ
Kaspersky US Customers Migrate to Pango's UltraAV After Ban
โš ๏ธ
US charges 5 Russian spies for Ukraine, NATO cyberattacks
โš ๏ธ
Enrichment Data: Keeping it Fresh, (Fri, Sep 6th)
๐Ÿ“‹
Tor Browser 13.5.3 Released, Whatโ€™s New?
๐Ÿ“ข
NIST Cybersecurity Framework (CSF) and CTEM โ€“ Better Together
๐Ÿ“ข
Abusix Launches Guardian: Cutting-Edge Security Platform for Email and Network Providers
๐Ÿ“ข
Veeam security advisory (AV24-499)
๐Ÿ“ข
Litespeed Cache Flaw Exposes Millions of WordPress Sites to Takeover Attacks
๐Ÿ“ข
FBI, CISA, NSA, and US and International Partners Release Advisory on Russian Military Cyber Actors Targeting US and Global Critical Infrastructure
๐Ÿ”ฅ
Planned Parenthood confirms cyberattack as RansomHub claims breach
๐Ÿ”ฅ
New Cross-Platform Malware KTLVdoor Discovered in Attack on Chinese Trading Firm
๐Ÿ”ฅ
The SECโ€™s 2023 final rules on cybersecurity disclosures
๐Ÿ”ฅ
Microchip Technology Confirms Personal Information Stolen in Ransomware Attack
๐Ÿ”ฅ
Lazarus Hackers Attacking Job-Seekers to Deliver Javascript Malware
๐Ÿ”ฅ
Notorious Mallox Ransomware Evolved From Private Ransomware to RaaS
๐Ÿ”ฅ
Colorado Tops List Of Cyberattacks Per Capita In The US
๐Ÿ”ฅ
Cicada ransomware โ€“ what you need to know
๐Ÿ”ฅ
Banks Brace for DORA Cybersecurity Deadline on Jan. 17
๐Ÿ”ฅ
Ransomware Gang Claims Cyberattack on Planned Parenthood
๐Ÿ•ต๏ธ
Attack Surface [Guest Diary], (Wed, Sep 4th)
๐Ÿ•ต๏ธ
ISC Stormcast For Thursday, September 5th, 2024 https://isc.sans.edu/podcastdetail/9126, (Thu, Sep 5th)
๐Ÿ•ต๏ธ
Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore
๐Ÿ•ต๏ธ
Threat Actors Using MacroPack to Deploy Brute Ratel, Havoc, and PhantomCore Payloads
๐Ÿ•ต๏ธ
FBI Warns Crypto Firms of Aggressive Social Engineering Attacks
๐Ÿ•ต๏ธ
Where's a good place to look for entry-level GRC jobs?
๐Ÿ•ต๏ธ
US Targets Russian Election Influence Operation With Charges, Sanctions, Domain Seizures
๐Ÿ•ต๏ธ
Growth of Web3 Fuled New Opportunities for Threat Actors to Attack Finance Sectors
๐Ÿ•ต๏ธ
Fake OnlyFans cybercrime tool infects hackers with malware
๐Ÿ•ต๏ธ
Long Analysis of the M-209
๐Ÿ•ต๏ธ
Two Nigerians Sentenced to Prison in US for BEC Fraud
๐Ÿ•ต๏ธ
How Do You Know When AI is Powerful Enough to be Dangerous? Regulators Try to Do the Math
๐Ÿ•ต๏ธ
Iran pays millions to stop data leak related to banks
๐Ÿ•ต๏ธ
Palo Alto closes IBM QRadar SaaS buy, extends security partnership
๐Ÿ•ต๏ธ
White House brands BGP routing a โ€˜national security concernโ€™ as it unveils reform roadmap
๐Ÿ•ต๏ธ
Cisco Patches Critical Vulnerabilities in Smart Licensing Utility
๐Ÿ•ต๏ธ
Earth Lusca Using Multiplatform Backdoor to Attack Windows & Linux Machines
๐Ÿ•ต๏ธ
The AI Wild West: Unraveling the Security and Privacy Risks of GenAI Apps
๐Ÿ•ต๏ธ
Acuvity Raises $9 Million Seed Funding for Gen-AI Governance and In-house Development
๐Ÿ•ต๏ธ
North Korean Hackers Target Job Seekers With Fake App
๐Ÿ•ต๏ธ
Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwords
๐Ÿ•ต๏ธ
Manufacturing Sector Is the Latest Target of Advanced Credential Harvesting Attacks
๐Ÿ•ต๏ธ
Zyxel warns of vulnerabilities in a wide range of its products
๐Ÿ•ต๏ธ
Cryptohack Roundup: Focus on Pig Butchering
๐Ÿ•ต๏ธ
Chinese-Speaking Hacker Group Targets Human Rights Studies in Middle East
๐Ÿ•ต๏ธ
Russian GRU Unit Tied to Assassinations Linked to Global Cyber Sabotage and Espionage
๐Ÿ•ต๏ธ
Russian GRU Unit Tied to Assassinations Now Linked to Global Cyber Sabotage and Espionage
๐Ÿ•ต๏ธ
Former OpenAI Scientist's Startup Raises $1B Seed Funding
KEV
๐Ÿ•ต๏ธ
US Broadens Indictments Against Russian Intelligence Hackers
๐Ÿ•ต๏ธ
RansomHub Claims Theft of Montana Planned Parenthood Data
๐Ÿ•ต๏ธ
FEMA Has Begun Deploying Cyber Advisers to Disaster Zones
๐ŸŒ
Banking Trojans: Mekotio Looks to Expand Targets, BBTok Abuses Utility Command
๐ŸŒ
Russian military cyber actors target U.S. and global critical infrastructure
๐ŸŒ
US charges five Russian military hackers with targeting Ukraineโ€™s government with destructive malware
๐ŸŽ™๏ธ
Transatlantic Cable podcast episode 362 | Kaspersky official blog
๐ŸŽ™๏ธ
ESET Research Podcast: HotPage
๐Ÿ“ก
How to Identify and Stop Scrapers
๐Ÿ“ก
Revival Hijack Attack Puts 22,000 PyPI Packages at Risk of Hijack
๐Ÿ“ก
U.S. Seizes 32 Pro-Russian Propaganda Domains in Major Disinformation Crackdown
๐Ÿ“ก
EUCLEAK Attack Allows Yubico Security Keys to be Cloned
๐Ÿ“ก
Cisco Patches Critical Vulns In Smart Licensing Utility
๐Ÿ“ก
US Targets Election Influence Operation With Charges, Sanctions, Domain Seizures
๐Ÿ“ก
Ukrainian Drones Now Spray Thermite Streams Right Into Russian Trenches
๐Ÿ“ก
Security Boom Is Over, With Over 1/3 Of CISOs Reporting Flat Or Falling Budgets
๐Ÿ“ก
Musician charged with $10M streaming royalties fraud using AI and bots
๐Ÿ“ก
Intricate Babylon RAT Campaign Targets Malaysian Politicians, Government
๐Ÿ“ก
Microsoft removes revenge porn from Bing search using new tool
๐Ÿ“ก
How to Identify and Stop Scrapers
๐Ÿ“ก
How to Identify and Stop Scrapers