73Articles
7Categories
2024-11-06Date
🚨
Kicking dependency: Why cybersecurity needs a better model for handling OSS vulnerabilitiesMost cybersecurity professionals are accustomed by now to the widespread adoption of open-source software (OSS) and the ever-growing threat of software supply chain attacks that target the OSS ecosystem. What we don’t seem to be getting better at is the management of dependencies…
KEV
⚠️
Man arrested in Canada allegedly linked to Snowflake data thefts
⚠️
Microsoft Authenticator passkey support to be native in January
⚠️
Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users
⚠️
Security associations CISOs should know about
⚠️
AI Finds Zero Day Vulnerability For First Time: Cyber Security Today for Wednesday, November 6, 2024
⚠️
Nokia-Daten im Darknet aufgetaucht
⚠️
ToxicPanda Banking Malware Attacking Banking Users To Steal Logins
⚠️
Schneider Electric suffers data breach, exposing critical project and user data
⚠️
CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine
⚠️
22,000 IPs Taken Down in Global Cybercrime Crackdown
⚠️
VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware
⚠️
Cisco bug lets hackers run commands as root on UWRB access points
⚠️
Wie Hacker ML für Angriffe nutzen
⚠️
Hackers increasingly use Winos4.0 post-exploitation kit in attacks
⚠️
A Vulnerability in Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Could Allow for Remote Code Execution
⚠️
Trump's Return: Impact on Health Sector Cyber, HIPAA Regs
⚠️
Anton’s Alert Fatigue: The Study
⚠️
​​Zero Trust Workshop: Advance your knowledge with an online resource
⚠️
Risky Business #769 -- Sophos drops implants on Chinese exploit devs
📢
Teams, Slack & Co. absichern: So wird das Collaboration-Tool kein Security-Albtraum
📢
HPE security advisory (AV24-634)
📢
Germany drafts law to protect researchers who find security flaws
📢
Statement from CISA Director Easterly on the Security of the 2024 Elections
📢
New 2024 NIST requirements for password strength and storage
📢
How Trump's Victory May Spark Tech and Cyber Policy Shift
📢
Cisco security advisory (AV24-635)
📢
10 Key Cyber Policy Questions as Trump Preps for Presidency
📢
Drupal security advisory (AV24-636)
🔥
INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime
🔥
Ransomware Attack Disrupts Georgia Hospital’s Access to Health Records
🔥
Was your last DocuSign-ed bill legitimate? Check again
🔥
Cyberattack Blamed for Statewide Washington Courts Outage
🔥
IoT Devices in Password-Spraying Botnet
🔥
Microchip Technology Reports $21.4 Million Cost From Ransomware Attack
🔥
Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools
🔥
North Korean Hackers Employing New Tactic To Acruire Remote Jobs
🔥
Chinese Hackers Tied to US National Security Eavesdropping
🔥
Washington courts' systems offline following weekend cyberattack
🔥
China's Volt Typhoon Reportedly Breached Singtel In Test Run For US Attack
🕵️
ISC Stormcast For Wednesday, November 6th, 2024 https://isc.sans.edu/podcastdetail/9210, (Wed, Nov 6th)
🕵️
SAINTCON 2024 -
🕵️
Google Patches High-Severity Vulnerabilities in Chrome
🕵️
South Korea Fines Meta $15 Million for Illegally Collecting Information on Facebook Users
🕵️
PLCHound Aims to Improve Detection of Internet-Exposed ICS
🕵️
Azure API Management Vulnerabilities Let Attackers Escalate Privileges
🕵️
Bridging the Security Execution Gap: Strategies for Effective Data Security Posture Management (DSPM)
🕵️
Researcher Discloses 36 Vulnerabilities Found in IBM Security Verify Access
🕵️
Android Botnet ToxicPanda Bashes Banks Across Europe, LatAm
🕵️
HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data
🕵️
Researchers Detailed Credential Abuse Cycle
🕵️
CrowdStrike to Acquire Adaptive Shield in Reported $300 Million Deal
🕵️
What Telegram’s recent policy shift means for cyber crime
🕵️
Shaking Up Security — The Power of AI-Native SOCs
🕵️
Google Cloud Rolling Out Mandatory MFA for All Users
🕵️
What are You Working on Wednesday
🕵️
Tariffs, Pygmy Goat, Schneider, SQLite, Deepfakes, Military AI, Josh Marpet... - SWN #428
🕵️
Can Hackers Really Hide Attacks in Pictures? 🤔
🕵️
Keep Learning or Keep Losing: There's No Finish Line
🕵️
CrowdStrike Bolsters SaaS Security With Adaptive Shield Buy
🕵️
Meta Loosens AI Rules for US Military Use
🕵️
CyberEdBoard Profiles in Leadership: Martyn Booth
🌐
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
🌐
New Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps
🌐
New SteelFox malware hijacks Windows PCs using vulnerable driver
📡
[Guest Diary] Insights from August Web Traffic Surge, (Wed, Nov 6th)
📡
South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers
📡
9 Steps to Get CTEM on Your 2025 Budgetary Radar
📡
Attackers Stole Microlise Staff Data Following DHL, Serco Disruption
📡
Operation Synergia II Sees Interpol Swoop On Global Cyber Crims
📡
Google Cloud Rolling Out Mandatory MFA for All Users
📡
Microsoft Notepad to get AI-powered rewriting tool on Windows 11
📡
Jane Goodall: Reasons for hope | Starmus highlights