86Articles
8Categories
2024-12-02Date
πŸ›
MediaTek Processor Vulnerabilities Let Attackers Escalate Privileges
πŸ›
Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild
KEV
πŸ›
HPE IceWall Flaw Let Attackers cause Unauthorized Data Modification
πŸ›
BootKitty UEFI malware exploits LogoFAIL to infect Linux systems
⚠️
Was ist ein Keylogger?
⚠️
Working in critical infrastructure? Boost your effectiveness with these cybersecurity certifications
⚠️
Windows Server 2012 0-day Vulnerability Exposes Critical Security Flaw
⚠️
INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million
⚠️
Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild
KEV
⚠️
New Windows Server 2012 zero-day gets free, unofficial patches
⚠️
AWS launches tools to tackle evolving cloud security threats
⚠️
Details about the iOS Inactivity Reboot Feature
⚠️
Critical Vulnerability Found in Zabbix Network Monitoring Tool
⚠️
Phishing mit Word-Dokumenten und QR-Code
⚠️
Prototype UEFI Bootkit is South Korean University Project; LogoFAIL Exploit Discovered
⚠️
Code Found Online Exploits LogoFAIL To Install Bootkitty Linux Backdoor
⚠️
Just Like Windows: Linux Targeted by First-Ever UEFI Bootkit - UPDATED
⚠️
Poland arrests former spy chief in Pegasus spyware probe
⚠️
The Cruel Twist: When Fake Firing Leads to Real Hacking
πŸ“’
Ubuntu security advisory (AV24-685)
πŸ“’
Ubuntu security advisory (AV24-685) - Canadian Centre for Cyber Security
πŸ“’
IBM security advisory (AV24-686)
πŸ“’
Trellix security advisory (AV24-688)
πŸ“’
[Control systems] CISA ICS security advisories (AV24–687)
πŸ“’
Zyxel security advisory (AV24-689)
πŸ“’
Android security advisory – December 2024 Monthly Rollup (AV24-690)
πŸ“’
Hundreds of UK Ministry of Defence passwords found circulating on the dark web
πŸ”₯
AWS launches an incident response service to combat cybersecurity threats
πŸ”₯
Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors
πŸ”₯
AI ChatBot Exposes 300,000 Records: Cyber Security Today for Monday, December 1, 2024
πŸ”₯
Russian Hacker With $10 Million Bounty on His Head Reportedly Arrested
πŸ”₯
Credential Guard and Kerberos delegation, (Mon, Dec 2nd)
πŸ”₯
Two UK Hospitals Hit by Cyberattacks, One Postponed Procedures
πŸ”₯
Retail outages drag into second week after Blue Yonder ransomware attack
πŸ”₯
Cybersecurity Secrets: Fragility of Ransomware Exposed!
πŸ”₯
Russian government confirms rare criminal charges against ransomware hacker
πŸ”₯
AWS Launches Incident Response Service
πŸ”₯
Indian online ID verification firm Signzy confirms security incident
πŸ”₯
Starbucks, Grocery Stores Hit By Blue Yonder Ransomware Attack
πŸ”₯
Russia Indicts Ransomware Hacker Wanted by the FBI
πŸ”₯
Cyber Incidents Hit 3 NHS Hospitals in U.K.
πŸ•΅οΈ
ISC Stormcast For Monday, December 2nd, 2024 https://isc.sans.edu/podcastdetail/9236, (Mon, Dec 2nd)
πŸ•΅οΈ
Linux 6.13-rc1 Released: What’s New!
πŸ•΅οΈ
Amazon GuardDuty Enhanced With AI/ML Threat Detection Capabilities for Cloud Security
πŸ•΅οΈ
Beware Of Malicious PyPI Packages That Inject infostealer Malware
πŸ•΅οΈ
8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play
πŸ•΅οΈ
Novel phising campaign uses corrupted Word documents to evade security
πŸ•΅οΈ
Microsoft Boosts Device Security With Windows Resiliency Initiative
πŸ•΅οΈ
[NEW PRODUCT]: KnowBe4’s AIDA: Revolutionizing Security Awareness Training with AI-Powered Automation and Personalization
πŸ•΅οΈ
Cybersecurity M&A Roundup: 49 Deals Announced in November 2024
πŸ•΅οΈ
New CleverSoar Malware Attacking Windows Users Bypassing Security Mechanisms
πŸ•΅οΈ
Russian Hacker With $10 Million Bounty On His Head Reportedly Arrested
πŸ•΅οΈ
​​Follow-up on Ignite with Ask Microsoft Anything: Microsoft Security edition​​
πŸ•΅οΈ
China Threat Actor Targets Individuals and Entities in Japan Via Spear Phishing Campaign
πŸ•΅οΈ
Mentorship Monday - Discussions for career and learning!
πŸ•΅οΈ
SmokeLoader Campaign Targets Taiwanese Companies
πŸ•΅οΈ
Security Money: Of Course Okta Should Be In The Index - BSW #374
πŸ•΅οΈ
Debate: Should the CISO Role Be Split or Establish Additional Leadership Roles? - BSW #374
πŸ•΅οΈ
The fascinating security model of dark web marketplaces
πŸ•΅οΈ
Upwind Raises $100M to Thwart Cloud Security Vulnerabilities
πŸ•΅οΈ
Feds Propose AI 'Guard Rails' for Medicare Advantage Plans
πŸ•΅οΈ
China Beating US in Critical Technology Research Investments
🌐
8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play
🌐
SmokeLoader Malware Resurfaces, Targeting Manufacturing and IT in Taiwan
🌐
What REALLY Happens After a Cyber Event?
🌐
World Tour Survey: IT Operations’ Hands-on Defense
πŸŽ™οΈ
From AI Expert to CEO: The Ultimate Multi-Hat Leader!
πŸ“‘
Industry Moves for the week of December 2, 2024 - SecurityWeek
πŸ“‘
Google Chrome’s AI feature lets you quickly check website trustworthiness
πŸ“‘
A Guide to Securing AI App Development: Join This Cybersecurity Webinar
πŸ“‘
THN Recap: Top Cybersecurity Threats, Tools and Tips (Nov 25 - Dec 1)
πŸ“‘
Attackers target sellers on message boards | Kaspersky official blog
πŸ“‘
Ex-NBA athlete Omri Casspi launches $60M fund targeting cybersecurity, cloud infra and AI
πŸ“‘
Confirmed: cloud security specialist Upwind raises $100M on a $900M valuation
πŸ“‘
Mozilla really wants you to easily set Firefox as default Windows browser
πŸ“‘
Download the Cloud Optimization Enterprise Spotlight
πŸ“‘
Updated TIC 3.0 Security Capabilities Catalog (SCC) to v3.2
πŸ“‘
Zabbix Urges Upgrades After Critical SQL Injection Bug Disclosure
πŸ“‘
Telco Security Is A Dumpster Fire And Everyone's Getting Burned
πŸ“‘
Chinese Lidar Sensors Pose Hacking Risk To US Defense Equipment
πŸ“‘
An Apple employee is suing the company over monitoring employee personal devices
πŸ“‘
Russia sentences Hydra dark web market leader to life in prison
πŸ“‘
Mozilla really wants you to set Firefox as default Windows browser
πŸ“‘
Korea arrests CEO for adding DDoS feature to satellite receivers
πŸ“‘
Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus Highlights
πŸ“‘
AI Configuration Best Practices to address AI Security Risks