78Articles
8Categories
2024-09-20Date
πŸ›
Critical Ivanti Cloud Appliance Vulnerability Exploited in Active Cyberattacks
πŸ›
GitLab Urges Organization to Patch for Authentication Bypass Vulnerability
πŸ›
Ivanti Warns of Second CSA Vulnerability Exploited in Attacks
πŸ›
CVE-2023-48788 Exploited: Researcher Details Cyberattacks on Fortinet FortiClient EMS
πŸ›
Acronis Backup Plugins Hit by CVE-2024-8767: CVSS 9.9 Severity Alert
πŸ›
CISA Releases Six Advisories for Industrial Control Systems
πŸ›
Versa Networks Releases Advisory for a Vulnerability in Versa Director,Β CVE-2024-45229
⚠️
What is pretexting? Definition, examples, and attacks
⚠️
Want to know how the bad guys attack AI systems? MITRE’S ATLAS can show you
⚠️
Cybercriminals Exploit CAPTCHA to Deliver Malware: Experts Issue Warning
⚠️
Tor Responds to Reports of German Police Deanonymizing Users
⚠️
Law Enforcement Dismantles Phishing Platform Used for Unlocking Stolen Phones
⚠️
Hacker selling 7 TB of Star Health Insurance’s customer data using Telegram
⚠️
MFA adoption is catching up but is not quite there
⚠️
Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials
⚠️
Phishing Attacks Abuse Content Creation and Collaboration Platforms
⚠️
LLMjacking: How attackers use stolen AWS credentials to enable LLMs and rack up costs for victims
⚠️
Do phishing tests do more harm than good? - Wolfgang Goerlich - ESW #376
⚠️
Speed, Flexibility, and AI: The Case for Migrating from Legacy SOAR Systems - Whitney ... - ESW #376
⚠️
Exploiting Exploiting Exchange PowerShell After ProxyNotShell: Part 3 – DLL Loading Chain for RCE
⚠️
German police dismantles illegal crypto exchanges
πŸ“‹
Windows Server 2025 previews security updates without restarts
πŸ“’
Iranian APT UNC1860 Linked to MOIS Facilitates Cyber Intrusions in Middle East
πŸ“’
New cybersecurity advisory highlights defense-in-depth strategies
πŸ“’
Microsoft Edge security advisory (AV24-533)
πŸ“’
CISA Boss: Makers Of Insecure Software Are The Real Cyber Villains
πŸ“’
London Cybersecurity Summit: Building Cyber Resilience
πŸ“’
ENISA Warns About Hacktivist, Ransomware Crossover
πŸ“’
Who Will Take the Lead in Setting Healthcare AI Regulations?
πŸ“’
FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe
πŸ”₯
Supply chain targets 3,000 users. Cyber Security Today for Friday, September 20, 2024
πŸ”₯
Hertz Car Rental Platform Leaks 60,000 Insurance Claim Reports
πŸ”₯
Hackers Allegedly Claim Breach of Dell Employee Database
πŸ”₯
Hacker Claims "Minor" Data Breach at DELL; Leaks Over 10,000 Employee Details
πŸ”₯
How Ransomhub Ransomware Uses EDRKillShifter to Disable EDR and Antivirus Protections
πŸ”₯
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks
πŸ”₯
Hackers Deliver Popular Crypto-Miner Through Malicious Email Auto Replies, Researchers Say
πŸ”₯
Online Scams Are Shortening Their Cycles and Making More Money
πŸ”₯
Cybersecurity: is the talent gap a myth? Is the industry delusional? - ESW #376
πŸ”₯
Dell investigates data breach claims after hacker leaks employee info
πŸ”₯
ISMG Editors: How to Survive a Major Ransomware Attack
πŸ”₯
Disney ditching Slack after massive July data breach
πŸ”₯
Protecting Your Data and Company From Cyberthreats
πŸ•΅οΈ
ISC Stormcast For Friday, September 20th, 2024 https://isc.sans.edu/podcastdetail/9146, (Fri, Sep 20th)
πŸ•΅οΈ
Gleaming Pisces Poisoned Python Packages Campaign Delivers PondRAT Linux and MacOS Backdoors
πŸ•΅οΈ
Experts Warn of China-Linked APT's Raptor Train IoT Botnet
πŸ•΅οΈ
North Korean APT Bypasses DMARC for Cyber Espionage
πŸ•΅οΈ
fwd:cloudsec Europe 2024
πŸ•΅οΈ
Kubernetes Container Isolation Startup Edera Raises $5 Million
πŸ•΅οΈ
In Other News: Disney Ditches Slack, Binance Malware Warning, Defense Conference Targeted
πŸ•΅οΈ
Noise Storms: Massive Amounts of Spoofed Web Traffic Linked to China
πŸ•΅οΈ
Google Now Syncing Passkeys Across Desktop, Android Devices
πŸ•΅οΈ
UN Experts Urge United Nations to Lay Foundations for Global Governance of Artificial Intelligence
πŸ•΅οΈ
Clever Social Engineering Attack Using Captchas
πŸ•΅οΈ
Delay Upgrading to macOS Sequoia, Security Experts Recommend
πŸ•΅οΈ
Ukraine Bans Telegram Messenger App on State-Issued Devices Because of Russian Security Threat
πŸ•΅οΈ
Training AI on Social Media: What Could Go Wrong?
πŸ•΅οΈ
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More... - SWN #415
πŸ•΅οΈ
Quantum Risks Pose New Threats for US Federal Cybersecurity
🌐
Innovation or Risk: Where Would You Invest $1 Million?
🌐
Ukraine bans Telegram on military, govt devices over security risks
πŸ“‘
Chrome Users Can Now Sync Passkeys Across Devices with New Google PIN Feature
πŸ“‘
Passwordless AND Keyless: The Future of (Privileged) Access Management
πŸ“‘
Clickbaity or genius? 'BF cheated on you' QR codes pop up across UK
πŸ“‘
Building Your Own AI Assistant in Minutes! 😱
πŸ“‘
Life Imitates xkcd Comic As Florida Gang Beats Crypto Password From Retiree
πŸ“‘
1 In 10 Orgs Dumping Their Security Vendors After CrowdStrike Outage
πŸ“‘
Cyber Crooks Strut Away With Haute Couture Harvey Nichols Data
πŸ“‘
Noise Storms: Massive Amounts Of Spoofed Web Traffic Linked To China
πŸ“‘
Tor Network Denies Report That Anonymity Is Completely Canceled
πŸ“‘
Marko Polo Hackers Found To Be Running Dozens Of Scams
πŸ“‘
Re-Opened Three Mile Island Will Power AI Datacenters Under New Deal
πŸ“‘
Hacker Uses Telegram Chatbots To Leak Data
πŸ“‘
macOS Sequoia change breaks networking for VPN, antivirus software
πŸ“‘
Using YouTube To Steal Your Files
πŸ“‘
When Every Minute Counts: Recovering Active Directory During an Attack
πŸ“‘
Internet surveillance firm Sandvine says it’s leaving 56 β€œnon-democratic” countries
πŸ“‘
Microsoft ends development of Windows Server Update Services (WSUS)