94Articles
9Categories
2024-10-16Date
πŸ›
GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access
πŸ›
CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability
KEV
πŸ›
North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware
πŸ›
Verseuchte Open-Source-Pakete explodieren
πŸ›
VMware Patches High-Severity SQL Injection Flaw in HCX Platform
⚠️
What is the cost of a data breach?
⚠️
CISOs grapple with a growing concern: Stress-related substance abuse
⚠️
CISA Releases ICS Advisories to Mitigate Cyber Attacks
⚠️
CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability
⚠️
Organizations Warned of Exploited SolarWinds Web Help Desk Vulnerability
⚠️
Google Pays Out $36,000 for Severe Chrome Vulnerability
⚠️
From Misuse to Abuse: AI Risks and Attacks
⚠️
Okta’s new security standard to be adopted by Google, Microsoft
⚠️
Microsoft Patches Vulnerabilities in Power Platform, Imagine Cup Site
⚠️
Varsity Brands Data Breach Impacts 65,000 People
⚠️
Navigating the ethics of AI in cybersecurity
⚠️
Malicious ads exploited Internet Explorer zero day to drop malware
⚠️
CISA, FBI, NSA, and International Partners Release Advisory on Iranian Cyber Actors Targeting Critical Infrastructure Organizations Using Brute Force
⚠️
Joint cyber security advisory: Iranian cyber actors using brute force to compromise critical infrastructure organizations
⚠️
Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
⚠️
CISA and FBI Release Joint Guidance on Product Security Bad Practices for Public Comment
⚠️
Critical Kubernetes Image Builder flaw gives SSH root access to VMs
⚠️
TrickMo Trojan Variants Target Device Unlock Codes
⚠️
Helping Your Team Cope With the Stress of a Cyber Incident
⚠️
SolarWinds Web Help Desk flaw is now exploited in attacks
KEV
⚠️
Chinese Threat Actor Targets OpenAI With Spear-Phishing Attacks
⚠️
Google: 70% of exploited flaws disclosed in 2023 were zero-days
⚠️
Attackers repurpose EDRSilencer to evade detection
⚠️
Fortinet Edge Devices Under Attack - Again
⚠️
Iranian Hackers Using Brute Force on Critical Infrastructure
⚠️
Hackers breach PokΓ©mon game developer, source code and personal information leaks online
⚠️
Risky Business #766 – China hacks America's lawful intercept systems
πŸ“‹
Chrome Security Update, 17 Vulnerabilities Patched
πŸ“’
Live Webinar | Outpacing Cyber Threats in Financial Services: An Adversary-Focused Strategy Beyond Compliance
πŸ“’
CISA Flags Critical SolarWinds Web Help Desk Bug
πŸ“’
Oracle security advisory – October 2024 quarterly rollup (AV24-591)
πŸ“’
[Control systems] ABB security advisory (AV24-592)
πŸ“’
Atlassian security advisory (AV24-593)
πŸ“’
CISA and FBI Release Product Security Bad Practices for Public Comment
πŸ“’
Cisco security advisory (AV24-595)
πŸ“’
F5 security advisory (AV24-594)
πŸ“’
SolarWinds security advisory (AV24-596)
πŸ“’
VMware security advisory (AV24-597)
πŸ“’
UK Reports 50% Spike in 'Nationally Significant' Incidents
πŸ“’
Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)
πŸ”₯
Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data
πŸ”₯
Volkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theft
πŸ”₯
Pennsylvania food bank claimed as latest ransomware victim
πŸ”₯
Microsoft Customers Facing 600 Million Cyber Attack Launched Every Day
πŸ”₯
Varsity Brands Data Breach Impacts 65,000 People
πŸ”₯
Cisco Investigating Breach And Sale Of Data
πŸ”₯
Firm Hacked After Accidentally Hiring North Korean Cyber Criminal
πŸ”₯
Change Healthcare Attack Cost Estimate Reaches Nearly $2.9B
πŸ”₯
USDoD hacker behind National Public Data breach arrested in Brazil
πŸ”₯
Iranian hackers act as brokers selling critical infrastructure access
πŸ•΅οΈ
ISC Stormcast For Wednesday, October 16th, 2024 https://isc.sans.edu/podcastdetail/9182, (Wed, Oct 16th)
πŸ•΅οΈ
Passkey News: FIDO Unveils New Specifications, Amazon Announces 175 Million Users
πŸ•΅οΈ
Oracle Patches Over 200 Vulnerabilities With October 2024 CPU
πŸ•΅οΈ
GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access
πŸ•΅οΈ
5 Techniques for Collecting Cyber Threat Intelligence
πŸ•΅οΈ
AI Models in Cybersecurity: From Misuse to Abuse
πŸ•΅οΈ
Cheating at Conkers
πŸ•΅οΈ
North Korea Hackers Get Cash Fast in Linux Cyber Heists
πŸ•΅οΈ
Dane Stuckey Joins OpenAI as CISO
πŸ•΅οΈ
KnowBe4 Named a Leader in the Fall 2024 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) Software
πŸ•΅οΈ
What are You Working on Wednesday
πŸ•΅οΈ
Hackers Abuse EDRSilencer Red Team Tool To Evade Detection
πŸ•΅οΈ
OT Risk Management Firm DeNexus Raises $17.5 Million
πŸ•΅οΈ
North Korean Hackers Continue to Target Job Seekers
πŸ•΅οΈ
Netskope extends data security with Dasera acquisition
πŸ•΅οΈ
North Korean Hackers Use Newly Discovered Linux Malware To Raid ATMs
πŸ•΅οΈ
GenAI in Cybersecurity β€” Threats and Defenses
πŸ•΅οΈ
New Fido standard for passkeys will make it easier to change services
πŸ•΅οΈ
Android 15 Rolling Out With New Theft, Application Protection Features
πŸ•΅οΈ
Critical Kubernetes Image Builder flaw gives SSH root access to VMs
πŸ•΅οΈ
US Indicts Sudanese Brothers for Anonymous Sudan Attacks
πŸ•΅οΈ
Sonar Adds Code Architecture Insights With Structure101 Buy
πŸ•΅οΈ
The Number of Malicious Emails Reaching Inboxes Is Declining
πŸ•΅οΈ
Code Execution, Data Tampering Flaw in Nvidia NeMo Gen-AI Framework
πŸ•΅οΈ
Essential Tools for Building Successful Security Analytics
🌐
Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack
🌐
Live Webinar | A Practical Guide To Achieving Continuous Software Supply Chain GRC
🌐
Live Webinar | A Practical Guide To Achieving Continuous Software Supply Chain GRC
πŸŽ™οΈ
Smashing Security podcast #389: WordPress vs WP Engine, and the Internet Archive is down
πŸ“‘
Security and privacy settings in Nike Run Club | Kaspersky official blog
πŸ“‘
Cato Networks extends SASE platform with digital experience monitoring
πŸ“‘
From QR to compromise: The growing β€œquishing” threat
πŸ“‘
FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms
πŸ“‘
The Crusade To Replace Passwords With Passkeys Just Intensified
πŸ“‘
Jetpack Patches Critical Bug That Exposed Data On 27 Million WordPress Sites
πŸ“‘
Internet Archive Wobbles Back Online, With Limited Functionality
πŸ“‘
Understand these seven password attacks and how to stop them
πŸ“‘
US disrupts Anonymous Sudan DDoS operation, indicts 2 Sudanese brothers
πŸ“‘
The Top 10 Not So Common SSH Usernames and Passwords, (Wed, Oct 16th)