152Articles
8Categories
2024-11-19Date
πŸ›
Apache Kafka Vulnerability Let Attackers Escalate Privileges
πŸ›
CISA Alert: Active Exploitation of VMware vCenter and Kemp LoadMaster Flaws
KEV
πŸ›
From MFA mandates to locked-down devices, Microsoft posts a year of SFI milestones at Ignite
πŸ›
Oracle warns of Agile PLM file disclosure flaw exploited in attacks
KEV
πŸ›
Palo Alto Networks zero-day firewall flaws caused by basic dev mistakes
KEV
⚠️
Securing Palo Alto management interfaces from exploitation
⚠️
Joint advisory on the 2023 top routinely exploited vulnerabilities
⚠️
Entrust, Jumio, Sumsub Lead Identity Verification Gartner MQ
⚠️
WordPress Plugin Vulnerability Threatens 4 Million Sites
⚠️
Das gehΓΆrt in Ihr Security-Toolset
⚠️
Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
⚠️
WordPress Plug-In Vulnerability Threatens 4 Million Sites
⚠️
Palo Alto Patches Firewall Zero-Day Exploited in Operation Lunar Peek
⚠️
Why Italy Sells So Much Spyware
⚠️
Apache Kafka Vulnerability Let Attackers Escalate Privileges
⚠️
Recently disclosed VMware vCenter Server bugs are actively exploited in attacks
KEV
⚠️
A Study of Malware Prevention in Linux Distributions
⚠️
Securing AI and Cloud with the Zero Day Quest
⚠️
Microsoft shares more details on Windows 11 admin protection
⚠️
Microsoft launches Zero Day Quest hacking event with $4 million in rewards
⚠️
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices
⚠️
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts
⚠️
Identity Security: Navigating the New Normal with Dr. Sean Murphy - Sean Murphy - CSP #201
⚠️
Palo Alto Sounds Alarm Over PAN-OS Zero Day Attacks
⚠️
At Ignite, Microsoft looks to genAI, exposure managment, and new bug bounties to secure enterprise IT
⚠️
CISA Releases One Industrial Control Systems Advisory
⚠️
Finally, Liability Coverage for CISOs as the Cybersecurity Workforce Peaks - BSW #373
⚠️
Helldown ransomware exploits Zyxel VPN flaw to breach networks
⚠️
Empower Developers to Secure AI Applications Through Code
⚠️
Employee Data Compromised in Hacker Attack on Space Technology Firm Maxar
⚠️
GitHub launches $1.25M open source fund with a focus on security
⚠️
D-Link urges users to retire VPN routers impacted by unfixed RCE flaw
⚠️
The 'Bible' for Cybersecurity Experts? 🀯 Here's Why!
⚠️
A New Era In Human Risk Management:Introducing KnowBe4 HRM+
⚠️
Helldown Ransomware Group Tied to Zyxel's Firewall Exploits
⚠️
Apple Confirms Zero-Day Attacks Hitting Intel-based Macs
KEV
⚠️
CISA tags Progress Kemp LoadMaster flaw as exploited in attacks
KEV
⚠️
Apple fixes two zero-days used in attacks on Intel-based Macs
⚠️
Surface Transportation: TSA Is Taking Steps to Enhance Cybersecurity, but Additional Actions Are Needed
⚠️
Apple says Mac users targeted in zero-day cyberattacks
⚠️
Apple Fixes Two Exploited Vulnerabilities, (Tue, Nov 19th)
πŸ“’
Cyber [Control systems] CISA ICS security advisories (AV24–665)
πŸ“’
Red Hat security advisory (AV24-664)
πŸ“’
Ubuntu security advisory (AV24-663)
πŸ“’
IBM security advisory (AV24-662)
πŸ“’
Dell security advisory (AV24-661)
πŸ“’
HPE security advisory (AV24-660)
πŸ“’
Microsoft Edge security advisory (AV24-659)
πŸ“’
Jenkins security advisory (AV24-658)
πŸ“’
Palo Alto Networks security advisory (AV24-657)
πŸ“’
[Control systems] Siemens security advisory (AV24-656)
πŸ“’
Intel security advisory (AV24-655)
πŸ“’
Drupal security advisory (AV24-654)
πŸ“’
GitLab security advisory (AV24-653)
πŸ“’
Mozilla security advisory (AV24-652)
πŸ“’
Google Chrome security advisory (AV24-651)
πŸ“’
Ivanti security advisory (AV24-650)
πŸ“’
Microsoft security advisory – November 2024 monthly rollup (AV24–649)
πŸ“’
Adobe security advisory (AV24–648)
πŸ“’
HPE security advisory (AV24-647)
πŸ“’
[Control systems] Schneider Electric security advisory (AV24-646)
πŸ“’
SAP security advisory – November 2024 monthly rollup (AV24-645)
πŸ“’
Citrix security advisory (AV24-644)
πŸ“’
[Control systems] Siemens security advisory (AV24-643)
πŸ“’
Red Hat security advisory (AV24-642)
πŸ“’
Ubuntu security advisory (AV24-641)
πŸ“’
[Control systems] CISA ICS security advisories (AV24-640)
πŸ“’
IBM security advisory (AV24-639)
πŸ“’
Microsoft Edge security advisory (AV24-638)
πŸ“’
Veeam security advisory (AV24-637)
πŸ“’
OnDemand: EU Sustainable Data Reporting Regulatory Compliance Overview
πŸ“’
OnDemand | C-SCRM: CIS Benchmarking & Impending Regulation Changes
πŸ“’
Cyberstarts Program Sparks Debate Over Ethical Boundaries
πŸ“’
[Control systems] Siemens security advisory (AV24-666)
πŸ“’
[Control systems] CISA ICS security advisories (AV24–665)
πŸ“’
Verteidigungsminister Pistorius vermutet Sabotage
πŸ“’
T-Mobile US von China gehackt
πŸ“’
New Windows 11 recovery tool to let admins remotely fix unbootable devices
πŸ“’
Russian Phobos Ransomware Operator Extradited to US
πŸ“’
CISA Releases Venue Guide for Security Considerations
πŸ“’
CISA Director Jen Easterly to Step Down
πŸ“’
China Privacy Law: Data Management Audits Are Coming in 2025
πŸ“’
Google Chrome security advisory (AV24-667)
πŸ“’
Biometric Frontiers: Unlocking The Future Of Engagement - Andras Cser, Enza Iannopollo - ASW #308
πŸ“’
Apple security advisory (AV24-668)
πŸ“’
Atlassian security advisory (AV24-669)
πŸ”₯
Finsure - 296,124 breached accounts
πŸ”₯
Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System
πŸ”₯
New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems
πŸ”₯
Phobos Ransomware Admin as Part of International Hacking Operation
πŸ”₯
Helldown Ransomware: an overview of this emerging threat
πŸ”₯
Ford Investigating Potential Breach After Hackers Claim Data Theft
πŸ”₯
Ransomware Attack on Oklahoma Medical Center Impacts 133,000
πŸ”₯
Akira Ransomware Racks Up 30+ Victims in a Single Day
πŸ”₯
Akira Ransomware Drops 30 Victims on Leak Site in One Day
πŸ”₯
New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems
πŸ”₯
Ford 'actively investigating' breach claims
πŸ”₯
Hackers Redirect $250,000 Payment in iLearningEngines Cyberattack
πŸ”₯
Ford untersucht Hinweise auf Hackerangriff
πŸ”₯
Library of Congress' Email System Compromised for Nine Months by Unknown Hackers
πŸ”₯
Threat Actor Turns Thousands of IoT Devices Into Residential Proxies
πŸ”₯
Communication platforms play a major role in data breach risks
πŸ”₯
US extradites Russian accused of extorting millions in Phobos ransomware payments
πŸ”₯
US Senate To Hold Panel Hearing On Suspected Chinese Hacking Incidents
πŸ”₯
Similarities Between SOX And SEC's Cyber Rule - Padraic O'Reilly - BSW #373
πŸ”₯
Gaetz Sexual Misconduct Testimony Hacked After Trump AG Pick
πŸ”₯
Ford investgates alleged breach following customer data leak
πŸ”₯
Oklahoma Hospital Says Ransomware Hack Hits 133,000 People
πŸ”₯
Ford investigates alleged breach following customer data leak
πŸ”₯
Ford rejects breach allegations, says customer data not impacted
πŸ•΅οΈ
Report: Over 100M Americans Rely on Vulnerable Water Systems
πŸ•΅οΈ
Suspected Russian Hackers Infect 20,000 IoT Devices
πŸ•΅οΈ
ISC Stormcast For Tuesday, November 19th, 2024 https://isc.sans.edu/podcastdetail/9224, (Tue, Nov 19th)
πŸ•΅οΈ
Detecting the Presence of a Debugger in Linux, (Tue, Nov 19th)
πŸ•΅οΈ
Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella
πŸ•΅οΈ
Kaspersky online shopping threat report 2024
πŸ•΅οΈ
Spotify abused to promote pirated software and game cheats
πŸ•΅οΈ
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
πŸ•΅οΈ
Cybersecurity Aphorisms: A Humorous and Insightful Look at Industry’s Truths
πŸ•΅οΈ
Space tech giant Maxar confirms hacker accessed employees' personal data
πŸ•΅οΈ
Purina’s Champions Program Is the Best I Have Seen
πŸ•΅οΈ
The World Premiere of The Inside Man - Season 6 in St. Petersburg, Florida
πŸ•΅οΈ
CyberheistNews Vol 14 #47 Step-by-Step To Creating Your First Realistic Deepfake Video in a Few Minutes
πŸ•΅οΈ
The Urgent And Critical Need To Prioritize Mobile Security
πŸ•΅οΈ
Vulnerable Jupyter Servers Targeted for Sports Piracy
πŸ•΅οΈ
Gen Q3/2024 Threat Report
πŸ•΅οΈ
Free AI editor lures in victims, installs information stealer instead on Windows and Mac
πŸ•΅οΈ
Empowering Gemini for Malware Analysis with Code Interpreter and Google Threat Intelligence
πŸ•΅οΈ
AI fixes everything, C++ the actual worst, IAM is hard - ASW #308
πŸ•΅οΈ
Google DeGoogled, Hammerbarn, Blofeld, VMWare, DeepData, SafePay, Josh Marpet and... - SWN #432
πŸ•΅οΈ
UK CMA Clears Alphabet, Anthropic Partnership
πŸ•΅οΈ
CyberEdBoard Profiles in Leadership: David Anderson
πŸ•΅οΈ
US Agencies Urged to Combat Growing Chinese Cyberthreat
πŸ•΅οΈ
India Fines WhatsApp $25M, Bans Data Sharing for 5 Years
πŸ•΅οΈ
AI innovations for a more secure future unveiled at Microsoft Ignite
🌐
Malware delivered via malicious QR codes sent in the post
🌐
Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority
🌐
Botnet fueling residential proxies disrupted in cybercrime crackdown
πŸŽ™οΈ
The AI Fix #25: Beware of the superintelligence, and a spam-eating AI super gran
πŸ“‘
Protecting your organization while using Wi-Fi (ITSAP.80.009)
πŸ“‘
Webinar | Navigating the Evolving SIEM Landscape: Key Insights and Strategic Integrations
πŸ“‘
Cybersecurity Education Needs a Team: Better Partner Up!
πŸ“‘
Kaspersky Password Manager Update | Kaspersky official blog
πŸ“‘
Microsoft to launch new custom chips for data processing, security
πŸ“‘
Microsoft beefs up Windows security with new recovery and patching features
πŸ“‘
Crooks Snag $250k Wire Payment From AI Biz
πŸ“‘
Thousands Of IoT Devices Turned Into Residential Proxies
πŸ“‘
YC-backed Formal brings a clever security reverse-proxy out of stealth
πŸ“‘
Microsoft now testing hotpatch on Windows 11 24H2 and Windows 365
πŸ“‘
PSA: You shouldn’t upload your medical images to AI chatbots
πŸ“‘
My information was stolen. Now what?
πŸ“‘
USDA Stops Credential Phishing with FIDO Authentication