23Articles
8Categories
2024-11-08Date
🐛
CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability
KEV
🐛
CISA Warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks
🐛
2023 Top Routinely Exploited Vulnerabilities
KEV
🐛
VEEAM exploit seen used again with a new ransomware: “Frag”
⚠️
Choosing AI: the 7 categories cybersecurity decision-makers need to understand
⚠️
The US Department of Defense has finalized cyber rules for its suppliers
⚠️
Canada Orders TikTok To Close Operations: Cyber Security Today for Friday, November 8th, 2024
⚠️
AI Industry is Trying to Subvert the Definition of “Open Source AI”
⚠️
AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services
⚠️
The vCISO Academy: Transforming MSPs and MSSPs into Cybersecurity Powerhouses
⚠️
Malicious NPM Packages Target Roblox Users with Data-Stealing Malware
📋
Webinar: Learn How Storytelling Can Make Cybersecurity Training Fun and Effective
📢
US consumer protection agency bans employee mobile calls amid Chinese hack fears
🔥
New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus
🔥
DarkNet Diaries Ep 151: Chris Rock
🕵️
ISC Stormcast For Friday, November 8th, 2024 https://isc.sans.edu/podcastdetail/9214, (Fri, Nov 8th)
🕵️
Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations
🕵️
Friday Squid Blogging: Squid-A-Rama in Des Moines
🕵️
IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools
🕵️
SpyAgent malware targets crypto wallets by stealing screenshots
🕵️
Kaspersky uncovers a crypto game created by Lazarus APT | Kaspersky official blog
🌐
Life on a crooked RedLine: Analyzing the infamous infostealer’s backend
📡
FBI says hackers are sending fraudulent police data requests to tech giants to steal people’s private information