94Articles
9Categories
2024-09-13Date
🚨
20 dollars exposes a huge flaw in Internet security: Cyber Security Today for Friday the 13th September, 2024Cyber Security Today: TfL Data Breach, Critical Vulnerabilities, and Insider Threats Join host Jim Love in 'Cyber Security Today' as we delve into the latest cyber security incidents and updates. Learn about Transport for London's data breach affecting thousands of customers, cri…
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-8190 Ivanti Cloud Services Appliance OS Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for ma…
KEV
🚨
Ivanti Releases Security Update for Cloud Services ApplianceIvanti has released a security update addressing an OS command injection vulnerability (CVE-2024-8190) affecting Ivanti Cloud Services Appliance (CSA) 4.6 (all versions before patch 519). A cyber threat actor could exploit this vulnerability to take control of an affected system.…
KEV
πŸ›
Chromium: CVE-2024-8636 Heap buffer overflow in Skia
πŸ›
Chromium: CVE-2024-8639 Use after free in Autofill
πŸ›
Chromium: CVE-2024-8638 Type Confusion in V8
πŸ›
Chromium: CVE-2024-8637 Use after free in Media Router
πŸ›
Docker Desktop Vulnerabilities Let Attackers Execute Remote Code
πŸ›
Hackers Exploiting Apache OFBiz RCE Vulnerability in the Wild
KEV
πŸ›
Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT
πŸ›
Citrix Workspace App Vulnerable to Privilege Escalation Attacks
πŸ›
Adobe Completes Fix for Reader Bug with Known PoC Exploit
πŸ›
Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw
πŸ›
Two Critical RCE Flaws Discovered in Docker Desktop
πŸ›
Update: Hackers Target Apache OFBiz RCE Flaw CVE-2024-45195 After PoC Exploit Released
πŸ›
SolarWinds Reveals RCE Flaw in Access Rights Manager
πŸ›
Critical Severity Flaw Exposes Siemens Industrial Systems
πŸ›
Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers
πŸ›
Newly patched Ivanti CSA flaw under active exploitation
KEV
⚠️
The US is Preparing Criminal Charges in Iran Hack Targeting Trump, AP Sources Say
⚠️
Too many companies use non-enterprise grade remote access tools in their OT networks, says Claroty
⚠️
Mastercard acquires Recorded Future: How will threat intelligence transform the payments industry?
⚠️
New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency
⚠️
GitLab Updates Resolve Critical Pipeline Execution Vulnerability
⚠️
Aflac’s shift to passkeys brings big business benefits
⚠️
Understanding and Mitigating the Risks of Email Forwarding
⚠️
TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud
⚠️
Fortinet confirms a breach that likely leaked 440 GB of customer data
⚠️
Chinese-speaking Hackers Linked to DragonRank SEO Manipulator Service
⚠️
In Other News: Possible Adobe Reader Zero-Day, Hijacking Mobi TLD, WhatsApp View Once Exploit
⚠️
Apple Patches Vision Pro Vulnerability to Prevent GAZEploit Attacks
⚠️
CISA Releases Analysis of FY23 Risk and Vulnerability Assessments
⚠️
Fake Recruiter Coding Tests Target Developers With Malicious Python Packages
⚠️
Fortinet confirms customer data breach
⚠️
New cryptomining campaign infects WebLogic servers with Hadooken malware
⚠️
Cybersecurity at the speed of Formula One - Darren Guccione, Harry Wilson - ESW #375
⚠️
Cybersecurity has too many distractions and can the White House fix BGP? - ESW #375
⚠️
New Office of the CISO Paper: Organizing Security for Digital Transformation
⚠️
Ivanti warns high severity CSA flaw is now exploited in attacks
KEV
⚠️
Remote Access Tool Sprawl Increases OT Risks
⚠️
Apple Suddenly Drops NSO Group Spyware Lawsuit
⚠️
TfL requires in-person password resets for 30,000 employees after hack
⚠️
CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe
⚠️
A new path for Kyber on the web
πŸ“’
Microsoft Edge security advisory (AV24-519)
πŸ“’
SolarWinds security advisory (AV24-520)
πŸ“’
US Sanctions Russian Media for Secretly Funding Ukraine War
πŸ“’
Irish Data Protection Commission Probes Google's AI Model
πŸ”₯
Fortinet Confirms Data Breach Following Hacker’s Claim of 440GB Data Theft
πŸ”₯
Fortinet Data Breach Impacts Customer Information
πŸ”₯
New Linux Malware "Hadooken' Targets Oracle WebLogic Applications
πŸ”₯
New β€˜Hadooken’ Linux Malware Targets WebLogic Servers
πŸ”₯
UK Teen Arrested Over Transport for London Hack
πŸ”₯
Hacker Tricks ChatGPT to Get Details for Making Homemade Bombs
πŸ”₯
Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft
πŸ”₯
The Dark Nexus Between Harm Groups and β€˜The Com’
πŸ”₯
17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London
πŸ”₯
Is Paying Hackers Funding Terrorism?πŸ”₯
πŸ”₯
RansomHub claims Kawasaki cyberattack, threatens to leak stolen data
πŸ”₯
Chinese-Speaking Hackers Manipulate SEO Rankings Globally
πŸ”₯
23andMe to pay $30 million in genetics data breach settlement
πŸ”₯
Port of Seattle hit by Rhysida ransomware in August attack
πŸ•΅οΈ
ISC Stormcast For Friday, September 13th, 2024 https://isc.sans.edu/podcastdetail/9136, (Fri, Sep 13th)
πŸ•΅οΈ
SquareX, Awarded Rising Star Category in CybersecAsia Readers’ Choice Awards 2024
πŸ•΅οΈ
1.3 Million Android TV Boxes Infected by Vo1d Malware
πŸ•΅οΈ
House Report Shows Chinese Cranes a Security Risk to US Ports
πŸ•΅οΈ
UK Data Centers Gain Critical Infrastructure Status, Raising Green Belt Controversy
πŸ•΅οΈ
Iranian APT Hackers Target Iraqi Government in New Espionage Campaign
πŸ•΅οΈ
What can businesses learn from the rise of cyber espionage?
πŸ•΅οΈ
Attackers Using HTTP Response Headers to Redirect Victims to Phishing Pages
πŸ•΅οΈ
Kali Linux 2024.3 Released With New Hacking Tools
πŸ•΅οΈ
Off-Topic Friday
πŸ•΅οΈ
North Korean hackers target Python devs with malware disguised as coding tests β€” hack has been underway for a year
πŸ•΅οΈ
Black Hat/DEF CON 2024: Latest Insights on Security and AI
πŸ•΅οΈ
Oktane 2024 and the Current State of Identity Security - Harish Peri - ESW #375
πŸ•΅οΈ
My TedXBillings Talk
πŸ•΅οΈ
Li-On, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland... - SWN #413
πŸ•΅οΈ
Post-CrowdStrike Fallout: Microsoft Redesigning EDR Vendor Access to Windows Kernel
πŸ•΅οΈ
ISMG Editors: Will Microsoft Rethink Windows Security?
πŸ•΅οΈ
Friday Squid Blogging: Squid as a Legislative Negotiating Tactic
πŸ•΅οΈ
Strider Secures $55M to Fuel AI Growth and Global Expansion
πŸ•΅οΈ
1.3 million Android-based TV boxes backdoored; researchers still don’t know how
🌐
New Hadooken Linux Malware Targets WebLogic Servers
🌐
New Linux malware Hadooken targets Oracle WebLogic servers
πŸŽ™οΈ
Transatlantic Cable podcast episode 363 | Kaspersky official blog
πŸ“‘
Finding Honeypot Data Clusters Using DBSCAN: Part 2, (Fri, Sep 13th)
πŸ“‘
Old WHOIS Domain Could Have Issued Fraudulent TLS/SSL Certs
πŸ“‘
20 Gigs Of Data Supposedly Stolen From Capgemini
πŸ“‘
Fortinet Admits Miscreant Got Hold Of Customer Data In The Cloud
πŸ“‘
Cambodian Senator Sanctioned By US Over Cyber Scam Camps
πŸ“‘
Apple Patches Vision Pro Vuln To Prevent GAZEploit Attacks
πŸ“‘
Live Webinar | All the Ways the Internet is Surveilling You
πŸ“‘
The Secrets to Safeguarding Your Digital Identity!
πŸ“‘
Eliminating the Need for Stored Credentials in Healthcare