94Articles
8Categories
2024-10-17Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-40711 Veeam Backup and Replication Deserialization Vulnerability These types of vulnerabilities are frequent attack vectors for malicious…
KEV
πŸ›
Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk
πŸ›
VMware HCX Platform Vulnerable to SQL Injection Attacks
πŸ›
Critical SolarWinds flaw finds exploitations in the wild despite available fixes
KEV
πŸ›
Chromium: CVE-2024-9964 Inappropriate implementation in Payments
πŸ›
Chromium: CVE-2024-9963 Insufficient data validation in Downloads
πŸ›
CVE-2024-43566 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
πŸ›
CVE-2024-43595 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
πŸ›
CVE-2024-43580 Microsoft Edge (Chromium-based) Spoofing Vulnerability
πŸ›
CVE-2024-43587 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
πŸ›
CVE-2024-43578 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
πŸ›
CVE-2024-43596 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
πŸ›
CVE-2024-43579 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
πŸ›
Chromium: CVE-2024-9966 Inappropriate implementation in Navigations
πŸ›
Chromium: CVE-2024-9965 Insufficient data validation in DevTools
πŸ›
Chromium: CVE-2024-9962 Inappropriate implementation in Permissions
πŸ›
Chromium: CVE-2024-9961 Use after free in Parcel Tracking
πŸ›
Chromium: CVE-2024-9959 Use after free in DevTools
πŸ›
Chromium: CVE-2024-9960 Use after free in Dawn
πŸ›
Chromium: CVE-2024-9958 Inappropriate implementation in PictureInPicture
πŸ›
Chromium: CVE-2024-9957 Use after free in UI
πŸ›
Chromium: CVE-2024-9956 Inappropriate implementation in Web Authentication
πŸ›
Chromium: CVE-2024-9955 Use after free in Web Authentication
πŸ›
Chromium: CVE-2024-9954 Use after free in AI
πŸ›
CVE-2024-49023 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
⚠️
How AI is becoming a powerful tool for offensive cybersecurity practitioners
⚠️
Iranian Hackers Use Brute Force in Critical Infrastructure Attacks
⚠️
F5 BIG-IP Updates Patch High-Severity Elevation of Privilege Vulnerability
⚠️
F5 BIG-IP Updates Patch High Severity Privilege Escalation
⚠️
Oracle Releases Quarterly Critical Patch Update Advisory for October 2024
⚠️
CISA Releases Seven Industrial Control Systems Advisories
⚠️
Effective Operational Outcomes - Ken Dunham - PSW #847
⚠️
Everything is Overrated - PSW #847
⚠️
CSO30 Australia 2024 winners unveiled at gala ceremony
⚠️
New macOS vulnerability, β€œHM Surf”, could lead to unauthorized data access
πŸ“’
Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024
πŸ“’
Die 6 grâßten Cyberbedrohungen im Gesundheitswesen
πŸ“’
CISA, FBI Seek Public Comment on Software Security Bad Practices Guidance
πŸ“’
CISA Unveils 'Exceptionally Risky' Software Bad Practices
πŸ“’
Ex-NCSC Chief: UK Cyber Incident Reporting a 'Good Step'
πŸ”₯
AlpineReplay - 898,681 breached accounts
πŸ”₯
Organization Hacked Following Accidental Hiring of North Korean Remote IT Worker
πŸ”₯
53% would switch banks if their institution had a data breach: Cyber Security Today for Thursday, October 17, 2024
πŸ”₯
Authorities Indicted Two Anonymous Sudan Hackers Over Cyberattacks
πŸ”₯
Casio says β€˜no prospect of recovery yet’ after ransomware attack
πŸ”₯
Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program
πŸ”₯
Hackers are extorting Globe Life with stolen customer data
πŸ”₯
BianLian ransomware claims attack on Boston Children's Health Physicians
πŸ”₯
The cybersecurity skills gap contributed to a $1.76 million increase in average breach costs
πŸ”₯
Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant
πŸ”₯
AI-Enhanced Cyber Attacks Top the List of Potential Threats Facing Data Security
πŸ”₯
A glimmer of good news on the ransomware front, as encryption rates plummet
πŸ”₯
Microsoft said it lost weeks of security logs for its customers’ cloud products
πŸ”₯
Breach Roundup: Brazilian Police Arrest USDoD
πŸ”₯
3 Longtime Health Centers Report Hacks Affecting 740,000
πŸ•΅οΈ
Scanning Activity from Subnet 15.184.0.0/16, (Thu, Oct 17th)
πŸ•΅οΈ
ISC Stormcast For Thursday, October 17th, 2024 https://isc.sans.edu/podcastdetail/9184, (Thu, Oct 17th)
πŸ•΅οΈ
Anonymous Sudan DDoS Service Disrupted, Members Charged by US
πŸ•΅οΈ
SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack
πŸ•΅οΈ
Cloud SecurityMicrosoft Patches Vulnerabilities in Power Platform, Imagine Cup Site
πŸ•΅οΈ
Brazilian Police Arrest Notorious Hacker USDoD
πŸ•΅οΈ
Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters
πŸ•΅οΈ
VMware HCX Platform Vulnerable to SQL Injection Attacks
πŸ•΅οΈ
AI Powers Cyera’s $162M Buy of Data Security Startup Trail
πŸ•΅οΈ
Hackers blackmail Globe Life after stealing customer data
πŸ•΅οΈ
Live Webinar | How EMEA is Leveraging Threat Intelligence to Reduce Risk Amid Rising Cyber Threats
πŸ•΅οΈ
Sudanese Brothers Arrested in β€˜AnonSudan’ Takedown – Krebs on Security
πŸ•΅οΈ
New York Financial Regulator Publishes AI Safety Guidance
πŸ•΅οΈ
Why Cybersecurity’s Core Focus Should Be Defending Data
πŸ•΅οΈ
Undercover North Korean IT workers now steal data, extort employers
πŸ•΅οΈ
Cryptohack Roundup: Feds Arrest Alleged SEC X Account Hacker
πŸ•΅οΈ
Be Aware of These Eight Underrated Phishing Techniques
πŸ•΅οΈ
CyberArk, Delinea, BeyondTrust Again Lead Gartner MQ for PAM
🌐
U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks
🌐
Linux kernel instrumentation from Qemu and Gdb
🌐
Fake Google Meet conference errors push infostealing malware
πŸ“‘
Cyera acquires Trail Security for $162M; Cyera is now raising at a $3B valuation
πŸ“‘
Chinese cybersecurity association urges review of Intel products
πŸ“‘
Web browser security: An overview (ITSAP.40.017)
πŸ“‘
Deepfake Lovers Swindle Victims Out Of $46M In Hong Kong AI Scam
πŸ“‘
Anonymous Sudan DDoS Service Disrupted, Members Charged By US
πŸ“‘
Critical Bug In Kubernetes Image Builder Allows SSH Root Access
πŸ“‘
WeChat Devs Introduced Security Flaws When They Modded TLS
πŸ“‘
Sudanese Brothers Arrested in β€˜AnonSudan’ Takedown
πŸ“‘
Top 5 Cloud Security Automations for SecOps Teams
πŸ“‘
Sophos Firewall v21 is now available
πŸ“‘
Android 15’s security and privacy features are the update’s highlight
πŸ“‘
Feds arrest man who allegedly participated in hack of the SEC’s X account, boosting Bitcoin’s price
πŸ“‘
FBI arrest Alabama man suspected of hacking SEC's X account
πŸ“‘
How to Mitigate the Impact of Rogue AI Risks
πŸ“‘
Which cybersecurity processes can be automated with AI? | Kaspersky official blog
πŸ“‘
5 AI Security Takeaways featuring Forrester
πŸ“‘
Panel Discussion | Unsolved Problems in Application Security
πŸ“‘
Microsoft warns it lost some customer's security logs for a month