117Articles
10Categories
2024-09-17Date
🚨
CISA Adds Four Known Exploited Vulnerabilities to CatalogCISA has added four new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2014-0497 Adobe Flash Player Integer Underflow Vulnerability CVE-2013-0643  Adobe Flash Player Incorrect Default Permissions Vulnerabi…
KEV
🐛
SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks
🐛
Spring Framework Path Traversal Vulnerability Threatens Millions
🐛
CISA Warns of Windows MSHTML & Progress WhatsUp Gold Flaw Exploited Widely
🐛
Microsoft re-categorizes fixed Trident bug as zero day
🐛
CVE backlog update: The NVD struggles as attackers change tactics
KEV
🐛
Zero-Click Calendar Invite: Critical macOS Vulnerability Chain Uncovered
🐛
Critical Vulnerability in AutoGPT Puts Over 166,000 Projects at Risk
🐛
CVE-2024-38183 GroupMe Elevation of Privilege Vulnerability
🐛
CVE-2024-43460 Dynamics 365 Business Central Elevation of Privilege Vulnerability
⚠️
Preparing for the next big cyber threat
KEV
⚠️
Entro Security Labs Releases Non-Human Identities Research Security Advisory
⚠️
AI-SPM buyer’s guide: 9 security posture management tools to protect your AI infrastructure
⚠️
Woo Skimmer Uses Style Tags and Image Extension to Steal Card Details
⚠️
'Void Banshee' Exploits Second Microsoft Zero-Day
⚠️
DoJ: Chinese Man Used Spear-Phishing to Obtain Software From NASA, Military
⚠️
Recent WhatsUp Gold Vulnerabilities Possibly Exploited in Ransomware Attacks
KEV
⚠️
Ransomware whistleblower: Columbus could have avoided its mistakes
⚠️
Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker
⚠️
Python Developers Targeted with Malware During Fake Job Interviews
⚠️
Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers
⚠️
Researchers Seize Part of Internet Infrastructure by Exploiting an Expired WHOIS Domain
⚠️
European digital identity: this is how the EU’s big bet is evolving
⚠️
D-Link Fixes Critical RCE, Hardcoded Credential Flaws in WiFi 6 Routers
⚠️
Trends and Dangers in Open-Source Software Dependencies
⚠️
Dependency Confusion Could Have Led to RCE in Google Cloud Platform
⚠️
PKfail Secure Boot bypass remains a significant risk two months later
⚠️
CISA and FBI Release Secure by Design Alert on Eliminating Cross-Site Scripting Vulnerabilities
⚠️
Navigating the future of OT security
⚠️
The vCISO’s role in Incident Response Accountability - William Klusovsky - CSP #192
⚠️
Supply Chain Attack on Google Cloud Composer Could Have Resulted in Remote Code Execution
⚠️
CISA Releases Three Industrial Control Systems Advisories
⚠️
Remotely Exploding Pagers
⚠️
Update: PoC Exploit Released for Windows Hyper-V Zero-Day Vulnerability
KEV
⚠️
Exploiting Chamilo during a Red Team engagement
⚠️
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
⚠️
VMware Patches Remote Code Execution Flaw Found in Chinese Hacking Contest
⚠️
Construction firms breached in brute force attacks on accounting software
⚠️
Exploding Hezbollah Pagers Not Likely a Cybersecurity Attack
⚠️
Broadcom fixes critical RCE bug in VMware vCenter Server
⚠️
Microsoft fixes Authenticator design flaw after eight years overwriting accounts
⚠️
Can CISA’s Federal Cybersecurity Alignment Plan Really Work?
⚠️
UK Orgs Tout Government Help in Ransomware Incidents
⚠️
Zero-Click RCE Bug in macOS Calendar Exposes iCloud Data
⚠️
ESET Research Podcast: EvilVideo
📋
Warning to ServiceNow admins: Block publicly available KB articles
📢
Chinese Hackers Charged for Multi-Year Spear-Phishing Attacks
📢
Scattered Spider Ensnares Cloud Admins Using Social Engineering Techniques
📢
Apple security advisory (AV24-525)
📢
Chrome Switching to NIST-Approved ML-KEM Quantum Encryption
📢
HPE security advisory (AV24-526)
📢
CISA urges software devs to weed out XSS vulnerabilities
🔥
Ticketmaster boss who repeatedly hacked rival firm sentenced
🔥
23:59, Time to Exfiltrate!, (Tue, Sep 17th)
🔥
Key Russian Hacker Group Attacking Users With .NET Built Ransomware
🔥
UK Labels Data Centers as Critical National Infrastructure
🔥
Kransom Ransomware Disguised as a Game Through DLL Side-Loading
🔥
Record $65m Settlement for Hacked Patient Photos
🔥
17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London
🔥
BlackCloak Raises $17 Million to Protect Executives, High-Profile Individuals
🔥
23andMe Pledges $30 Million to the 6.4 Million People Affected by Data Breach
🔥
Wait... Did Pagers Get Hacked To Blow People Up?
🔥
Ransomware gangs now abuse Microsoft Azure tool for data theft
🔥
AT&T pays $13 million FCC settlement over 2023 data breach
🔥
Temu denies breach after hacker claims theft of 87 million data records
🕵️
ISC Stormcast For Tuesday, September 17th, 2024 https://isc.sans.edu/podcastdetail/9140, (Tue, Sep 17th)
🕵️
Will potential security gaps derail Microsoft’s Copilot?
🕵️
Creating An AI Honeypot To Engage With Attackers Sophisticatedly
🕵️
North Korean Hackers Attacking LinkedIn Users to Deliver RustDoor Malware
🕵️
Ipset Hash is full, cannot add more elements
🕵️
[Cybersecurity Awareness Month] Prepare for All Manner of Cyber Threats Like the Heroes of ‘The Inside Man’
🕵️
Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure
🕵️
Hydden Raises $4.4M in Seed Funding for Identity Security Platform
🕵️
Element Security Emerges From Stealth With CTEM Solution, $5M in Funding
🕵️
CyberheistNews Vol 14 #38 [CODE RED] A Must-See New Webinar: How To Block North Korean Infiltrators
🕵️
Over 1,000 ServiceNow instances found leaking corporate KB data
🕵️
Cost of Cybercrime Estimated 15.6 Trillion in 2029
🕵️
Software Security Firm RunSafe Raises $12 Million in Series B Funding
🕵️
The AI Threat: Deepfake or Deep Fake? Unraveling the True Security Risks
🕵️
D-Link Patches Critical Router Vulnerabilities
🕵️
North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware
🕵️
C/side Raises $6 Million to Secure the Browser Supply Chain
🕵️
Hezbollah Members Among Hundreds Wounded after Pagers Explode in Lebanon and Syria, Officials Say
🕵️
Intezer Raises $33M to Extend AI-Powered SOC Platform
🕵️
Back to the office, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland... - SWN #414
🕵️
A TLD Takeover, An LLM CTF, A Firmware Flaw, 6 Truths of Cyber Risk - ASW #299
🕵️
BlackCloak Raises $17M to Boost Cybersecurity for Executives
🕵️
Hundreds of Pagers Exploded in Lebanon and Syria in a Deadly Attack. Here’s What We Know.
🕵️
Apple Moves to Dismiss Suit Against Spyware Firm NSO Group
🕵️
Remote attack on pagers used by Hezbollah caused 9 deaths and thousands of injuries
🌐
Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users
🌐
Malware Campaign Locks Browser in Kiosk Mode to Steal Google Credentials
🌐
U.S. Treasury Sanctions Executives Linked to Intellexa Predator Spyware Operation
🌐
Rising Clipper Malware Attacks Target Cryptocurrency Users
🌐
Predator Spyware Kingpins Added To US Sanctions List
🌐
Malware Attack Targets US-Taiwan Defense Conference
🌐
US Hits Intellexa Spyware Maker With More Sanctions
🎙️
The AI Fix #16: GPT-4o1, AI time travelers, and where’s my driverless car?
📡
How Google and Yahoo’s shift to stricter email standards proved a windfall for this Armenian startup
📡
Stealthy Fileless Attack Targets Attendees Of Upcoming US-Taiwan Defense Industry Event
📡
How to Investigate ChatGPT activity in Google Workspace
📡
Metabase Q Raises $11M in Series A Extension Funding
📡
The Dark Nexus Between Harm Groups and ‘The Com’ – Krebs on Security
📡
Strider Secures $55M to Fuel AI Growth and Global Expansion
📡
Russia’s RT News Agency Has ‘Cyber Operational Capabilities,’ Assists in Military Procurement, State Department Says
📡
Hacker Tricked ChatGPT Into Providing Detailed Instructions to Make a Homemade Bomb
📡
Google Chrome Switches to ML-KEM for Post-Quantum Cryptography Defense
📡
Meta to Train AI Models Using Public U.K. Facebook and Instagram Posts
📡
The cybersecurity labor gap now stands at 4M+ open jobs. Intezer has raised $33M for AI tools to plug it
📡
Cisco’s second layoff of 2024 affects thousands of employees
📡
D-Link Patches Critical Router Vulnerabilities
📡
France Uses Tough, Untested Cybercrime Law To Target Durov
📡
EchoStrike: Generate Undetectable Reverse Shells, Perform Process Injection
📡
riverside darren guccione on f1 and brand alignment with wi enterprise security
📡
Securing Data Growth in the Cloud Era: Strategies for Cyber Resilience
📡
Cloudflare outage cuts off access to websites in some regions
📡
Discord launches end-to-end encrypted voice and video chats