45Articles
7Categories
2024-11-14Date
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-9463 Palo Alto Networks Expedition OS Command Injection Vulnerability CVE-2024-9465  Palo Alto Networks Expedition SQL Injection V…
KEV
πŸ›
Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails
πŸ›
Chromium: CVE-2024-11110 Inappropriate implementation in Blink
πŸ›
Chromium: CVE-2024-11111 Inappropriate implementation in Autofill
πŸ›
CVE-2024-49040 Microsoft Exchange Server Spoofing Vulnerability
πŸ›
CVE-2024-49025 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
πŸ›
Chromium: CVE-2024-11116 Inappropriate implementation in Paint
πŸ›
Chromium: CVE-2024-11113 Use after free in Accessibility
πŸ›
Chromium: CVE-2024-11115 Insufficient policy enforcement in Navigation
πŸ›
Chromium: CVE-2024-11112 Use after free in Media
πŸ›
Chromium: CVE-2024-11117 Inappropriate implementation in FileSystem
πŸ›
Chromium: CVE-2024-11114 Inappropriate implementation in Views
πŸ›
CVE-2024-43598 LightGBM Remote Code Execution Vulnerability
πŸ›
Citrix admins advised to install hotfixes to block vulnerabilities
πŸ›
CVE-2024-43451 allows stealing NTLMv2 hash | Kaspersky official blog
⚠️
New iOS Security Feature Makes It Harder for Police to Unlock Seized Phones
⚠️
CISA’s Vulnerability Management goes β€œBig” on Interns and the Results are Staggering!
⚠️
CISA Releases Nineteen Industrial Control Systems Advisories
⚠️
Smashing Security podcast #393: Who needs a laptop to hack when you have a Firestick?
⚠️
Five Eyes Infosec Agencies List 2024's Most Exploited Software Flaws
⚠️
Overcome fragmented cloud security operations with unified XDR and SIEM
⚠️
Implementing zero trust in AI and LLM architectures: A practitioner’s guide to secure and responsible AI systems
⚠️
US says China conducted massive espionage through breached telcos
⚠️
How to defend Microsoft networks from adversary-in-the-middle attacks
πŸ“’
FBI confirms China-backed hackers breached US telecom giants to steal wiretap data
πŸ“’
CISA, FBI Confirm China Hacked Telecoms To Spy
πŸ“’
NIST publishes timeline for quantum-resistant cryptography, but enterprises must move faster
πŸ“’
Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future
πŸ”₯
5 BCDR Oversights That Leave You Exposed to Ransomware
πŸ”₯
ShrinkLocker ransomware: what you need to know
πŸ”₯
Hacker brΓΌsten sich mit gestohlenen Destatis-Daten
πŸ•΅οΈ
Experts Uncover 70,000 Hijacked Domains in Widespread 'Sitting Ducks' Attack Scheme
πŸ•΅οΈ
New RustyAttr Malware Targets macOS Through Extended Attribute Abuse
πŸ•΅οΈ
[World Premiere] KnowBe4 Debuts New Season 6 of Netflix-Style Security Awareness Video Series - β€œThe Inside Man”
πŸ•΅οΈ
The Intersection of Marketing and Technology
πŸ•΅οΈ
2025 Predictions β€” How One Year Will Redefine the Cybersecurity Industry
πŸ•΅οΈ
BlueHat 2024 - 33 talks
πŸ•΅οΈ
ESET APT Activity Report Q2 2024–Q3 2024: Key findings
πŸ“‘
Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes
πŸ“‘
TikTok Pixel Privacy Nightmare: A New Case Study
πŸ“‘
New Apple security feature reboots iPhones after 3 days, researchers confirm
πŸ“‘
Bitsight buys dark web security specialist Cybersixgill for $115M
πŸ“‘
IT specialist Jack Teixeira jailed for 15 years after leaking classified military documents on Discord
πŸ“‘
Two Men Charged For Hacking US Tax Preparation Firms
πŸ“‘
Iranian Threat Group Targets Aerospace Workers With Fake Job Lures