76Articles
8Categories
2024-11-18Date
🚨
CISA Adds Three Known Exploited Vulnerabilities to CatalogCISA has added three new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-1212 Progress Kemp LoadMaster OS Command Injection Vulnerability CVE-2024-0012 Palo Alto Networks PAN-OS Management Interface Authent…
KEV
🐛
VMware Discloses Exploitation of Hard-to-Fix vCenter Server Flaw
🐛
Urgent: Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites
🐛
CVE-2024-43639 Windows KDC Proxy Remote Code Execution Vulnerability
🐛
Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability
🐛
Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability
🐛
GeoVision 0-Day Vulnerability Exploited in the Wild
KEV
⚠️
Most of 2023’s Top Exploited Vulnerabilities Were Zero-Days
⚠️
Unknown Attacker Tries To Frame Security Researcher: Cyber Security Today for Monday, November 18th, 2024
⚠️
Multiple Vulnerabilities in Palo Alto PAN-OS Could Allow for Authentication Bypass
⚠️
Chinese hackers exploit Fortinet VPN zero-day to steal credentials
⚠️
Palo Alto Networks patches two firewall zero-days used in attacks
KEV
⚠️
Critical RCE bug in VMware vCenter Server now exploited in attacks
⚠️
Discontinued GeoVision Products Targeted in Botnet Attacks via Zero-Day
⚠️
Palo Alto Networks Releases IoCs for New Firewall Zero-Day
⚠️
Fortinet VPN Zero-Day Exploited in Malware Attacks Remains Unpatched: Report
⚠️
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 - Nov 17)
⚠️
Fake Discount Sites Exploit Black Friday to Hijack Shopper Information
⚠️
NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta's Lawsuit
⚠️
Exploit attempts for unpatched Citrix vulnerability, (Mon, Nov 18th)
⚠️
Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild
KEV
⚠️
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
⚠️
Musk’s anticipated cost-cutting hacks could weaken American cybersecurity
⚠️
Warum Ursachen für Security Breaches unbekannt bleiben
⚠️
So, you don’t have a chief information security officer? 9 signs your company needs one
⚠️
10 Kennzahlen, die CISOs weiterbringen
⚠️
Security Update - Release 1.32.5 · dani-garcia/vaultwarden
⚠️
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
⚠️
Security Update - Release 1.32.5 · dani-garcia/vaultwarden
⚠️
NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta's Lawsuit
⚠️
Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
⚠️
Zero-Day Exploitation Targeting Palo Alto Networks Firewall
⚠️
Exploit attempts for unpatched Citrix vulnerability
📢
CISA Launches New Learning Platform to Enhance Training and Education U.S. Veterans and Other Stakeholders
📢
US charges Phobos ransomware admin after South Korea extradition
📢
Beyond Compliance: The Advantage of Year-Round Network Pen Testing
📢
CISA Director Jen Easterly to depart agency on January 20
📢
Phobos Ransomware Administrator Extradited from South Korea to Face Cybercrime Charges
🔥
US space tech giant Maxar discloses employee data breach
🔥
Ransomware Attack on Oklahoma Medical Center Impacts 133,000
🔥
AnnieMac Data Breach Impacts 171,000 People
🔥
Library of Congress Says an Adversary Hacked Some Emails
🔥
AI training software firm iLearningEngines says it lost $250,000 in recent cyberattack
🔥
Ransomware Attack On Oklahoma Medical Center Impacts 133,000
🔥
APT32 Attack Chain: Simple Hack, MASSIVE Threat!
🔥
Why Your Password Can’t Save You From THIS Hack 🔒😱
🔥
AI company tells SEC that $250,000 stolen in cyberattack
🔥
Babble Babble Babble Babble Babble Babble BabbleLoader
🔥
British software company Microlise confirms hackers compromised corporate data
🕵️
Why Custom IOCs Are Necessary for Advanced Threat Hunting and Detection
🕵️
300 Drinking Water Systems in US Exposed to Disruptive, Damaging Hacker Attacks
🕵️
T-Mobile Also Targeted in Chinese Telecom Hacking Campaign
🕵️
ISC Stormcast For Monday, November 18th, 2024 https://isc.sans.edu/podcastdetail/9222, (Mon, Nov 18th)
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
Simultaneously resettable zero knowledge protocol in Public Key model
🕵️
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape
🕵️
Let's Encrypt is 10 years old today !
🕵️
Fortra Reports Alarming Increase In Abuse Of Cloudflare Services
🕵️
QuickBooks popup scam still being delivered via Google ads
🕵️
Inside Bitdefender Labs’ Investigation of a Malicious Facebook Ad Campaign Targeting Bitwarden Users
🌐
New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers
🌐
Discontinued GeoVision Products Targeted In Botnet Attacks
🌐
NSO Operates Its Spyware, Legal Documents Reveal
🌐
Swiss Cheesed Off As Postal Service Used To Spread Malware
📡
Brave on iOS adds new "Shred" button to wipe site-specific data
📡
Fake Bitwarden ads on Facebook push info-stealing Chrome extension
📡
Microsoft 365 Admin portal abused to send sextortion emails
📡
Industry Moves for the week of November 18, 2024 - SecurityWeek
📡
The Problem of Permissions and Non-Human Identities - Why Remediating Credentials Takes Longer Than You Think
📡
Gmail's New Shielded Email Feature Lets Users Create Aliases for Email Privacy
📡
Unlocking Cybersecurity Talent: The Power of Apprenticeships
📡
Space tech giant Maxar confirms hacker accessed employees’ personal data
📡
300 Drinking Systems In US Exposed To Disruptive, Damaging Hacker Attacks
📡
Will Passkeys Ever Replace Passwords? Can They?
📡
Simple tips for a safer digital life | Kaspersky official blog
📡
What is “Scam Likely”? Putting the phone down on unwanted calls