121Articles
9Categories
2024-12-03Date
🚨
CISA Adds Three Known Exploited Vulnerabilities to CatalogCISA has added three new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-45727  North Grid Proself Improper Restriction of XML External Entity (XEE) Reference Vulnerability CVE-2024-11680  Project…
KEV
🐛
TP-Link HomeShield Function Vulnerability Let Attackers Inject Malicious Commands
🐛
Cisco Warns of Attacks Exploiting Decade-Old ASA Vulnerability
KEV
🐛
SmokeLoader picks up ancient MS Office bugs to pack fresh credential stealer
🐛
Cisco Warns of Exploitation of Decade-Old ASA WebVPN Vulnerability
⚠️
Why identity security is your best companion for uncharted compliance challenges
⚠️
Intelligent Privilege Controls™: A quick guide to secure every identity
⚠️
CIO POV: Building trust in cyberspace
KEV
⚠️
Der Weg zum nachhaltigen Cyberschutz
⚠️
Want to be a cybersecurity pro? Use generative AI to get some simulated training
⚠️
152: Stacc Attack
⚠️
Gafgyt Malware Targeting Docker Remote API Servers
⚠️
Salesforce Applications Vulnerability Could Allow Full Account Takeover
⚠️
No guarantees of payday for ransomware gang that claims to have hacked children’s hospital
⚠️
EU enacts new laws to strengthen cybersecurity defenses and coordination
⚠️
NachoVPN Tool Exploits Flaws in Popular VPN Clients for System Compromise
⚠️
Salesforce Applications Vulnerability Could Allow Full Account Takeover
⚠️
Cisco Confirms Active Exploitation of Decade-Old WebVPN Vulnerability in ASA Software
⚠️
The shocking speed of AWS key exploitation - Help Net Security
⚠️
Why Phishers Love New TLDs Like .shop, .top and .xyz
⚠️
Inside Akira Ransomware's Rust Experiment
⚠️
Möglicher Cyberangriff: IT-Ausfall bei Medion
⚠️
Police seize Matrix encrypted chat service after spying on criminals
⚠️
CISA Releases Eight Industrial Control Systems Advisories
⚠️
US Expands List of Chinese Technology Companies Under Export Controls
⚠️
CISA and Partners Release Joint Guidance on PRC-Affiliated Threat Actor Compromising Networks of Global Telecommunications Providers
⚠️
Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms
⚠️
Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration
⚠️
PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts
⚠️
Adding Observability with OpenTelemetry - Adriana Villela - ASW #309
⚠️
Police seize Matrix encrypted chat service after spying on criminals
⚠️
Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration
⚠️
Veeam warns of critical RCE bug in Service Provider Console
⚠️
Exploit released for critical WhatsUp Gold RCE flaw, patch now
⚠️
Celebrating 200 Episodes of Cloud Security Podcast by Google and Thanks for all the Listens!
⚠️
Phishing Attacks Impersonating Big Brands Starts to Zero in on Just One Brand
⚠️
US says Chinese hackers are still lurking in American phone networks
⚠️
Privilege Escalation Nightmare in Zabbix!
⚠️
16 Zero-Days Uncovered in Fuji Electric Monitoring Software
⚠️
First-ever Linux UEFI bootkit turns out to be research project
⚠️
New era of slop security reports for open source
⚠️
BlackBerry Highlights Rising Software Supply Chain Risks in Malaysia
📢
Algorithms Are Coming for Democracy—but It’s Not All Bad
📢
UK Ministry of Defense MoD passwords leaked on Dark Web - Cybersecurity Insiders
📢
CISA, NSA, FBI and International Partners Publish Guide for Protecting Communications Infrastructure
📢
CISA and Partners Release Joint Guidance on PRC-Affiliated Threat Actor Compromising Networks of Global Telecommunications Providers
📢
No more punched tape and CDs? NCSC promises progress on £2.6 billion cryptographic key overhaul
📢
Police seizes largest German online crime marketplace, arrests admin
📢
Hardware Security Failure Scenarios
📢
New EU Regulation Establishes European ‘Cybersecurity Shield’
📢
US shares tips to block hackers behind recent telecom breaches
📢
FBI Tells Telecom Firms to Boost Security Following Wide-Ranging Chinese Hacking Campaign
📢
Achieving cybersecurity compliance in 5 steps
🔥
US government contractor ENGlobal says operations are ‘limited’ following cyberattack
🔥
Energy Sector Contractor ENGlobal Targeted in Ransomware Attack
🔥
Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform
🔥
Third-party access: The overlooked risk to your data protection plan
🔥
International operation takes down another encrypted messaging service used by criminals | Europol
🔥
Vodka maker Stoli files for bankruptcy in US after ransomware attack
🕵️
Humble Tech Book Bundle: Hacking 2024 by No Starch
🕵️
Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform
🕵️
ISC Stormcast For Tuesday, December 3rd, 2024 https://isc.sans.edu/podcastdetail/9238, (Tue, Dec 3rd)
🕵️
Palo Alto Networks — the 2024 AWS Global Technology Partner of the Year
🕵️
Russia Sentenced Hydra Dark Web Market Developer for Life Time
🕵️
Feds Propose AI 'Guardrails' for Medicare Advantage Plans
🕵️
ElizaRAT: Enhancing C2 Communication Through Google, Telegram, & Slack Services
🕵️
Extracting Files Embedded Inside Word Documents, (Tue, Dec 3rd)
🕵️
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
🕵️
"Oh, sh*t! I actually opened the document!": An Empirical Study of the Experiences with Suspicious Emails in Virtual Reality Headsets
🕵️
Protect Your Secrets: Understanding and Measuring Data Exposure in VSCode Extensions
🕵️
Exposing LLM Vulnerabilities: Adversarial Scam Detection and Performance
🕵️
North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks
🕵️
Darknet Diaries: Ep 152: Stacc Attack
🕵️
China Is Outpacing US in Critical Tech Research Investments
🕵️
North Korean hackers masquerade as remote IT workers and venture capitalists to steal crypto and secrets
🕵️
Hackers Stole $1.49 Billion in Cryptocurrency to Date in 2024
🕵️
Korea arrests CEO for adding DDoS feature to satellite receivers
🕵️
760,000 Employee Records From Several Major Firms Leaked Online
🕵️
Windows Sockets: From Registered I/O to SYSTEM Privileges
🕵️
SmokeLoader Attack Targets Companies in Taiwan
🕵️
CyberheistNews Vol 14 #49 [Heads Up] Bad Actor Uses Deepnude AI Image Generator to Lure And Infect Users
🕵️
Hacker Conversations: Dan McInerney and Puzzle-Driven Hacking
🕵️
Ad fraud on large online platforms
🕵️
Cloud Security: Lessons Learned and Applied to Emerging Tech - Bertrum Carroll - CSP #203
🕵️
Apple espionage on its employees iPhones and iCloud accounts
🕵️
Vendors Unveil New Cloud Security Products, Features at AWS re:Invent 2024
🕵️
Fuzzing Barcodes, Fuzzing with AI, AI vs. Scammers, CWEs, Repo Swatting - ASW #309
🕵️
News alert: Sweet Security releases its evolutionary Cloud Native Detection and Response platform
🕵️
Detailing the Attack Surfaces of the WolfBox E40 EV Charger
🕵️
North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks
🕵️
And the Winner of The Inside Man Biggest Fan Contest 2024 is…
🕵️
AWS Unveils Future of Enterprise AI and Cloud at re:Invent
🕵️
The Duality of AI: Enhancing and Securing Gen AI Models
🕵️
No Timeline for Evicting Chinese Hackers from US Networks
🕵️
Malicious Google Ads Target Users Seeking Solutions to Printer Problems
🕵️
ISIS, Enron, Tor, Scams, Wintermute, Zabbix, Josh Marpet and more... - SWN #434
🕵️
Repeat offenders drive bulk of tech support scams via Google Ads
🕵️
Hunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scam
🕵️
Korean Firm Sold Satellite Receivers With DDoS Feature
🕵️
Hello, this is your chatbot leaking: WotNot exposes 346K sensitive customer files
🕵️
Cloudflare’s developer domains increasingly abused by threat actors
🕵️
European Police Disrupts Matrix Encrypted Service
🕵️
GoodRx Agrees to Pay $25M to Settle Web Tracker Lawsuit
🕵️
'Horns&Hooves' Malware Campaign Hits Over 1,000 Victims
🕵️
Sixgen's Kyrus Acquisition Boosts National Cybersecurity
🌐
Horns&Hooves Campaign Delivers RATs via Fake Emails and JavaScript Payloads
🌐
FTC bans two data brokers from collecting and selling Americans’ sensitive location data
🌐
FTC bans data brokers from selling Americans’ sensitive location data
🌐
The Unseen Obstacle That Almost Broke My Startup
🎙️
The AI Fix #27: Why is AI full of real-life Bond villains?
📡
US agency proposes new rule blocking data brokers from selling Americans’ sensitive personal data
📡
Corrupted Microsoft Office Documents Used In Phishing Campaign
📡
Meta Says It Has Taken Down 20 Covert Influence Ops In 2024
📡
Russia Gives Life Sentence To Hydra Dark Web Kingpin After Seizing A Ton Of Drugs
📡
Apple Illegally Surveilled and Censored Workers, Employee Lawsuit Says
📡
Severity Of Risk Facing The UK Is Widely Underestimated
📡
Hackers Stole $1.49 Billion In Cryptocurrency To Date In 2024
📡
760k Employee Records From Major Firms Leaked Online
📡
Sophos named a Gartner® Peer Insights™ Customers’ Choice for Managed Detection and Response (MDR) Services for the 2nd time
📡
Joint guidance on enhanced visibility and hardening for communications infrastructure
📡
Undeclared functionality in machine learning systems