91Articles
7Categories
2024-09-23Date
🐛
FreeBSD RCE Vulnerability Let Attackers Execute Malicious Code
🐛
Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk
🐛
Critical Grafana Plugin SDK Flaw Exposes Sensitive Information
🐛
Critical Dragonfly2 Flaw Due to Hardcoded Key Threatens Admin Access
🐛
FreeBSD Issues Critical Security Advisory for CVE-2024-41721 (CVSS 9.8)
⚠️
Tor browser anonymity cracked by German police: Cyber Security Today for Monday, September 23, 2024
⚠️
Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware
⚠️
10 things CISOs wished they knew from the start
⚠️
Police Dismantles Phone Unlocking Ring Linked to 483,000 Victims
⚠️
Lumma Stealer Malware Campaign Exploits Fake CAPTCHA Pages
⚠️
Hacker selling Dell employees’ data after a second alleged data breach
⚠️
Keycloak Vulnerability Puts SAML Authentication at Risk
⚠️
Versa Networks Patches Vulnerability Exposing Authentication Tokens
⚠️
Hackers Mimic as Company’s HR to Trick Employees
⚠️
CERT/CC Warns of Unpatched Critical Vulnerability in Microchip ASF
⚠️
ESET Patches Privilege Escalation Vulnerabilities in Windows, macOS Products
⚠️
Move Over, Cobalt Strike. Splinter's The New Post Exploit Menace In Town
⚠️
Hacking the “Bike Angels” System for Moving Bikeshares
⚠️
Fake Paystubs Are Draining Billions From Lenders
⚠️
US Pushes Ban on Chinese, Russian Tech in Connected Vehicles
⚠️
Some Kaspersky customers receive surprise forced-update to new antivirus software
⚠️
Half of all Financial Services Cyber Attacks Start with a Very Costly Phish
⚠️
Telegram now shares users’ IP and phone number on legal requests
⚠️
Authentication and Authorization in the AI Era - Shiven Ramji - BSW #365
⚠️
Rockwell Automation PLC Software Contains RCE Flaw
⚠️
Unauthenticated RCE vs all GNU/Linux systems to be fully disclosed in 2 weeks with no working fix yet
⚠️
Telegram Pledges Closer Cooperation With Police
📢
CISA Plan Aligns Cybersecurity Across Federal Agencies
📢
Clear as mud: global rules around AI are starting to take shape but remain a little fuzzy
📢
Dell security advisory (AV24-534)
📢
Ubuntu security advisory (AV24-536)
📢
Red Hat security advisory (AV24-535)
📢
Why Compliance Matters for Healthcare Industries
📢
Answering the Board's Questions While UnitedHealth Group 'Starts Over' - BSW #365
📢
[Control systems] CISA ICS security advisories (AV24-537)
📢
IBM security advisory (AV24-538)
📢
US proposes ban on connected vehicle tech from China, Russia
📢
Cybersecurity and compliance: The dynamic duo of 2024
🔥
GameVN - 1,369,485 breached accounts
🔥
Germany Seizes Leak Site of ‘Vanir’ Ransomware Operation
🔥
AT&T Pays $13 Million FCC Settlement Over 2023 Data Breach
🔥
Hackers Claim Second Dell Data Breach in One Week
🔥
More Than $44 Million in Cryptocurrency Stolen From Singaporean Platform Bingx
🔥
DOJ, FBI Need Better Metrics for Tracking Ransomware Disruption Efforts, Audit Finds
🔥
Educate Your Users About Malicious SEO Poisoning Attacks
🔥
China Urges Vigilance Against Taiwanese Cyberattacks
🔥
How Microsoft Is Beefing Up Security With 34,000 Engineers
🔥
New Mallox ransomware Linux variant based on leaked Kryptina code
🔥
Ransomware Intelligence Briefing: Key Insights for the C-Level
🔥
Pennsylvania Firm to Pay $65M for Cancer Patient Photo Hack
🔥
Crypto scammers hack OpenAI’s press account on X
🕵️
Global infostealer malware operation targets crypto users, gamers
🕵️
ISC Stormcast For Monday, September 23rd, 2024 https://isc.sans.edu/podcastdetail/9148, (Mon, Sep 23rd)
🕵️
New PondRAT Malware Hidden in Python Packages Targets Software Developers
🕵️
macOS Sequoia Update Breaks Multiple Security Tools
🕵️
Hacktivist group Twelve is back and targets Russian entities
🕵️
New PondRAT Malware Hidden in Python Packages Targets Software Developers
🕵️
Cybersecurity Products Conking Out After macOS Sequoia Update
🕵️
THN Cybersecurity Recap: Last Week's Top Threats and Trends (September 16-22)
🕵️
Zscaler: There are 200 Malicious Lookalike Domains for Every 1 Impersonated Brand
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
Ban Sought for Chinese, Russian Software and Hardware Used in Autonomous Vehicles on US Roads
🕵️
Necro Trojan Infects Google Play Apps With Millions of Downloads
🕵️
​​Securing our future: September 2024 progress update on Microsoft’s Secure Future Initiative (SFI)
🕵️
Mandiant Offers Clues to Spotting and Stopping North Korean Fake IT Workers
🕵️
Scammers Abuse Virtual Shopping Lists to Trick Walmart Customers
🕵️
North Korea Targets Software Supply Chain Via PyPI
🕵️
11 million devices infected with botnet malware hosted in Google Play
🕵️
4 More EU Nations Join US-Led Initiative to Counter Spyware
🕵️
News alert: DigiCert acquires Vercara to enhance cloud-based DNS management, DDoS protection
🌐
SambaSpy RAT Targets Italian Users in a Unique Malware Campaign
🌐
Necro Trojan infects 11 million Android devices | Kaspersky official blog
🌐
Android malware 'Necro' infects 11 million devices via Google Play
🌐
Kaspersky deletes itself, installs UltraAV antivirus without warning
📡
Phishing links with @ sign and the need for effective security awareness building, (Mon, Sep 23rd)
📡
GSMA Plans End-to-End Encryption for Cross-Platform RCS Messaging
📡
Industry Moves for the week of September 23, 2024 - SecurityWeek
📡
Picus Security Raises $45M in Funding
📡
US DoJ Charged Two Men With Stealing and Laundering $230 Million Worth of Cryptocurrency
📡
Discord Introduces DAVE Protocol for End-to-End Encryption in Audio and Video Calls
📡
Why 'Never Expire' Passwords Can Be a Risky Decision
📡
How to manage shadow IT and reduce your attack surface
📡
Apple's Latest macOS Release Is Breaking Security Software, Network Connections
📡
US Indicts Two Over Socially Engineered $230M+ Crypto Heist
📡
Will The US Presidential Election Define The Future Of Crypto?
📡
Secret Calculator Hack Brings ChatGPT To The TI-84, Enabling Easy Cheating
📡
Wait... Did My AI Just Rickroll Our Customers?!
📡
Sophos named a Leader in the 2024 Gartner®️ Magic Quadrant™️ for Endpoint Protection Platforms
📡
First TikTok, now smart cars: How Biden’s new proposed ban will affect U.S. automakers
📡
Bridging the Security Execution Gap: Strategies for Effective Data Security Posture Management (DSPM)
📡
Sophos Firewall v21: VPN and routing enhancements