73Articles
8Categories
2024-11-07Date
🚨
CISA Adds Four Known Exploited Vulnerabilities to CatalogCISA has added four new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-43093  Android Framework Privilege Escalation Vulnerability CVE-2024-51567 CyberPanel Incorrect Default Permissions Vulnerability…
KEV
🐛
Cisco Flaw Let Attackers Run Command as Root User
🐛
Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems
🐛
Infostealers are using BYOVD to steal critical system data
🐛
Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information
🐛
Chromium: CVE-2024-10827 Use after free in Serial
🐛
Chromium: CVE-2024-10826 Use after free in Family Experiences
🐛
Cisco IoT wireless access points hit by severe command injection flaw
⚠️
Five-country attack on cybercrooks welcomed by security expert
⚠️
Top 5 security mistakes software developers make
⚠️
SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims
⚠️
Subverting LLM Coders
⚠️
Cisco Patches Critical Vulnerability in Industrial Networking Solution
⚠️
HPE warns of critical RCE flaws in Aruba Networking access points
⚠️
Prompt Injection Defenses Against LLM Cyberattacks
⚠️
We're Not Saying "I told you so" - PSW #850
⚠️
Cryptohack Roundup: M2, Metawin Exploits
⚠️
CISA Releases Three Industrial Control Systems Advisories
⚠️
Hacker says they banned ‘thousands’ of Call of Duty gamers by abusing anti-cheat flaw
⚠️
German Law Could Protect Researchers Reporting Vulns
⚠️
Nokia says hackers leaked third-party app source code
⚠️
Hackers increasingly use Winos4.0 post-exploitation kit in attacks
⚠️
CISA warns of critical Palo Alto Networks bug exploited in attacks
⚠️
Phishing Campaign Impersonates OpenAI To Collect Financial Data
⚠️
Combating Cybercrime: What to Expect From Trump Presidency?
⚠️
Why AI is the final missing piece of the CNAPP puzzle
⚠️
Breach Roundup: Chinese Cyberespionage Using Open Source VPN
⚠️
A Vulnerability in Android OS Could Allow for Remote Code Execution
⚠️
Hacker Claims to Leak Nokia Source Code
📢
Canada orders shutdown of TikTok offices over security risks (but won’t block app)
📢
EU Sustainable Data Reporting Regulatory Compliance Overview
📢
CISA Kicks Off Critical Infrastructure Security and Resilience Month 2024
🔥
Earth 2 - 420,961 breached accounts
🔥
Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers
🔥
Cyberattack on Microlise Disables Tracking in Prison Vans, Courier Vehicles
🔥
Interpol nimmt 22.000 IP-Adressen vom Netz
🔥
A Hacker's Guide to Password Cracking
🔥
Exploring DORA: How to manage ICT incidents and minimize cyber threat risks
🔥
Microsoft Reports 600 Million Cyberattacks per Day
🔥
Law Firm Hack Compromises Health System's Patient Data
🕵️
ISC Stormcast For Thursday, November 7th, 2024 https://isc.sans.edu/podcastdetail/9212, (Thu, Nov 7th)
🕵️
Android Banking Trojan ToxicPanda Targets Europe
🕵️
Steam Account Checker Poisoned with Infostealer, (Thu, Nov 7th)
🕵️
5 Most Common Malware Techniques in 2024
🕵️
Canada Orders TikTok’s Canadian Business to Be Dissolved but Won’t Block App
🕵️
China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait
🕵️
North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS
🕵️
‘SteelFox’ Miner and Information Stealer Bundle Emerges
🕵️
The Deceptive Media Era: Moving Beyond "Real vs. Fake"
🕵️
Attackers Abuse DocuSign to Send Phony Invoices
🕵️
CISSP Practice Question
🕵️
Embed Security Raises $6 Million to Help Overworked Analysts
🕵️
Strata Cloud Manager: One Interface, Complete Network Security Control
🕵️
The Biggest Inhibitor of Cybersecurity: The Human Element
🕵️
Beware malicious NPM packages, Checkmarx warns
🕵️
Cybersecurity For Schools - Kayne McGladrey - PSW #850
🕵️
An encrypted and anti-forensic public web chat server
🕵️
Overcoming the Top Five Challenges in Operationalizing Threat Intelligence
🕵️
Assessing Banking Product Risks to Improve KYC Programs
🕵️
North Korean Hackers Target macOS Users with Fake Crypto PDFs
🕵️
North Korean hackers use new macOS malware against crypto firms
🕵️
More value, less risk: How to implement generative AI across the organization securely and responsibly
🕵️
ESET APT Activity Report Q2 2024–Q3 2024
🎙️
Smashing Security podcast #392: Pasta spies and private eyes, and are you applying for a ghost job?
📡
Canada Orders TikTok to Shut Down Canadian Operations Over Security Concerns
📡
Tor Browser and anonymity: what you need to know | Kaspersky official blog
📡
How Unsustainable Data Affects Manufacturers Bottom Line
📡
Cisco Patches Critical Vuln In Industrial Networking Solution
📡
Facebook Asks U.S. Supreme Court To Dismiss Fraud Suit Over Cambridge Analytica Scandal
📡
Trump Plans To Dismantle AI Safeguards After Victory
📡
Cybercrooks Are Targeting Bengal Cat Lovers In Australia
📡
Canada orders TikTok to shut down over national risk concerns
📡
How Encryption Keeps Bombs from Being Defused 😱