94Articles
10Categories
2024-09-12Date
🚨
Application detection and response is the gap-bridging technology we needThe concept of detection and response is far from new in cybersecurity β€” in fact, it’s a core part of the NIST Cybersecurity Framework (CSF) and a fundamental part of any sound cybersecurity program. You must be able to both detect threats and malicious activity and respond to th…
KEV
πŸ›
Protecting Against RCE Attacks Abusing WhatsUp Gold Vulnerabilities
πŸ›
Microsoft Fixes Windows Smart App Control Zero-Day Exploited Since 2018
πŸ›
Hackers Exploiting Progress WhatsUp RCE Vulnerability In The Wild
πŸ›
GitLab warns of critical pipeline execution vulnerability
πŸ›
Urgent: GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Execution
⚠️
Oracle adds Zero Trust Packet Routing capability to its cloud platform
⚠️
WordPress Mandates Two-Factor Authentication for Plugin and Theme Developers
⚠️
5G and SASE: Reimagining WAN Infrastructure
⚠️
The 18 biggest data breaches of the 21st century
⚠️
Exploiting CI/CD Pipelines for Fun and Profit
⚠️
Microsoft Discloses Four Zero-Days in September Update
⚠️
Inc Ransom Attack Analysis: Extortion Methodologies
⚠️
CosmicBeetle Exploiting Old Vulnerabilities To Attacks SMBs All Over The World
⚠️
New Loki Backdoor Attacking macOS Systems
⚠️
Global Cybersecurity Workforce Growth Flatlines, Stalling at 5.5 Million Pros
⚠️
Transport for London continues to struggle with cyber attack
⚠️
Critical Vulnerabilities in JPEG 2000 Library Let Attackers Execute Remote Code
⚠️
Cisco Releases Security Updates for IOS XR Software
⚠️
CISA Releases Twenty-Five Industrial Control Systems Advisories
⚠️
Adobe Releases Security Updates for Multiple Products
⚠️
corp I did not know had my data was breached; then they offer to have a privacy abuser (Cloudflare) MitM credit monitoring txns. WTF?!
⚠️
Hackers targeting WhatsUp Gold with public exploit since August
⚠️
Fake recruitment campaign targets developers using trojanized Python packages
⚠️
New Android Malware 'Ajina.Banker' Steals Financial Data and Bypasses 2FA via Telegram
⚠️
Breach Roundup: Mexico in Hacker Spotlight
⚠️
GPS Modernization Stalls as Pentagon Faces Chip Shortages
πŸ“‹
As quantum computing threats loom, Microsoft updates its core crypto library
πŸ“‹
September Patch Tuesday addresses 79 CVEs
πŸ“‹
Cisco Patches High-Severity Vulnerabilities in Network Operating System
πŸ“’
Iranian Cyber Group OilRig Targets Iraqi Government in Sophisticated Malware Attack
πŸ“’
Ireland's Watchdog Launches Inquiry into Google's AI Data Practices in Europe
πŸ“’
DockerSpy: Search for Images on Docker Hub, Extract Sensitive Information
πŸ“’
GitLab security advisory (AV24-517)
πŸ“’
HPE security advisory (AV24-518)
πŸ“’
Microsoft Is Adding New Cryptography Algorithms
πŸ“’
Recent Cyber Security Laws & Regulations - Lee Kim - PSW #842
πŸ“’
Cryptohack Roundup: $20.5M Indodax Theft
πŸ“’
FBI and CISA Release Joint PSA, Just So You Know: False Claims of Hacked Voter Information Likely Intended to Sow Distrust of U.S. Elections
πŸ”₯
New Developer-As-A-Service In Hacking Forums Empowering Phishing And Cyberattacks
πŸ”₯
New PIXHELL Acoustic Attack Leaks Secrets From LCD Screen Noise
πŸ”₯
Healthcare Provider to Pay $65M Settlement Following Ransomware Attack
πŸ”₯
Amateurish 'CosmicBeetle' Ransomware Stings Turkish SMBs
πŸ”₯
New RansomHub Attack Uses TDSSKiller and LaZagne, Disables EDR
πŸ”₯
Transport for London confirms customer data stolen in cyberattack
πŸ”₯
UK arrests teen linked to Transport for London cyber attack
πŸ”₯
Fortinet confirms data breach after hacker claims to steal 440GB of files
πŸ”₯
UK Labels Data Centers as Critical National Infrastructure
πŸ•΅οΈ
Hygiene, Hygiene, Hygiene! [Guest Diary], (Wed, Sep 11th)
πŸ•΅οΈ
Google’s AI Model Faces European Union Scrutiny From Privacy Watchdog
πŸ•΅οΈ
Criminal IP Teams Up with IPLocation.io to Deliver Unmatched IP Solutions to Global Audiences
πŸ•΅οΈ
News alert: Opus Security’s new β€˜Advanced Multi-Layered Prioritization Engine’ elevates VM
πŸ•΅οΈ
News alert: Criminal IP partners with IPLocation.io to deliver new tech to mitigate IP address evasion
πŸ•΅οΈ
Hackers Mimic Google, Microsoft & Amazon Domains for Phishing Attacks
πŸ•΅οΈ
ToneShell Backdoor Targets IISS Defence Summit Attendees in Latest Espionage Campaign
πŸ•΅οΈ
Apple Vision Pro’s Eye Tracking Exposed What People Type
πŸ•΅οΈ
Iranian Hackers Targeting Iraqi Government: Security Firm
πŸ•΅οΈ
Threat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS Tunneling
πŸ•΅οΈ
How I got started: AI security executive
πŸ•΅οΈ
Evasion Tactics Used By Cybercriminals To Fly Under The Radar
πŸ•΅οΈ
Palo Alto Networks Patches Dozens of Vulnerabilities
πŸ•΅οΈ
Non-Human IAM Provider Aembit Raises $25 Million
πŸ•΅οΈ
Mastercard to Acquire Threat Intelligence Firm Recorded Future for $2.6 Billion
πŸ•΅οΈ
Realm.Security Emerges From Stealth With $5 Million in Seed Funding
πŸ•΅οΈ
Aembit Raises $25 Million in Series A Funding for Non-Human Identity and Access Management
πŸ•΅οΈ
Mastercard to Acquire Threat Intel Firm Recorded Future for $2.65 Billion
πŸ•΅οΈ
Mastercard Buys Threat Intel Firm Recorded Future for $2.65B
πŸ•΅οΈ
News alert: Aembit raises $25M Series A funding for non-human Identity and Access Management
πŸ•΅οΈ
Wifi Vulns, Yubikeys, and Firmware - PSW #842
πŸ•΅οΈ
New Chrome Features Protect Users Against Threats, Provide More Control Over Personal Data
πŸ•΅οΈ
Operant AI Lands $10M Investment to Boost Runtime Protection for Cloud and AI
πŸ•΅οΈ
Kernel Mode Under the Microscope at Windows Security Summit
πŸ•΅οΈ
New Vo1d malware infects 1.3 million Android streaming boxes
🌐
Top 3 Threat Report Insights for Q2 2024
🌐
Evasion Tactics Used By Cybercriminals To Fly Under The Radar
🌐
Beware: New Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwide
🌐
WordPress plugin and theme developers told they must use 2FA
🌐
New Vo1d malware infects 1.3 million Android TV streaming boxes
πŸŽ™οΈ
Smashing Security podcast #384: A room with a view, AI music shenanigans, and a cocaine bear
πŸ“‘
Kali Linux 2024.3 Released: 11 New Tools, Qualcomm Snapdragon SDM845 SoC Support
πŸ“‘
Cyber Staffing Shortages Remain CISOs' Biggest Challenge
πŸ“‘
Cybersecurity is a Fundamental Component of Patient Care and Safety
πŸ“‘
Offer tailored cyber security training to your employees - ITSAP.10.093
πŸ“‘
India Needs Better Cybersecurity for Space Systems
πŸ“‘
Exposed Selenium Grid Servers Targeted for Crypto Mining and Proxyjacking
πŸ“‘
Hacker tricks ChatGPT into giving out detailed instructions for making homemade bombs
πŸ“‘
Palo Alto Networks Patches Dozens Of Vulnerabilities
πŸ“‘
Hackers Use Cloud Services To Target Financial And Insurance Firms
πŸ“‘
BT Spots 2,000 Potential Attacks On Its Network A Second
πŸ“‘
Gallup Cross Site Scripting Error Could Have Led To Data Theft
πŸ“‘
Protect Your Amazon S3 Data: Why Versioning, Replication, and AWS Backup are Not Enough
πŸ“‘
Standing on the Windows platform, waiting for change
πŸ“‘
This hardware router VPN bypasses geo-restrictions, now an extra $10 off
πŸ“‘
FBI: Reported cryptocurrency losses reached $5.6 billion in 2023