110Articles
9Categories
2024-12-04Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-51378 CyberPanel Incorrect Default Permissions Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyb…
KEV
🐛
Veeam Issues Patch for Critical RCE Vulnerability in Service Provider Console
🐛
Critical SailPoint IdentityIQ Vulnerability Exposes Files to Unauthorized Access
🐛
MobSF XSS Vulnerability Let Attackers Inject Malicious Scripts
🐛
Veeam issues patch for critical RCE bug
⚠️
BreakingWAF: Widespread WAF Bypass Impacts Nearly 40% of Fortune 100 companies
⚠️
Security-KPIs und -KRIs: So messen Sie Cybersicherheit
⚠️
CISA Releases Advisory to Monitor Networks to Detect Malicious Cyber Actors
⚠️
Joint Advisory Warns of PRC-Backed Cyber Espionage Targeting Telecom Networks
⚠️
Talent overlooked: embracing neurodiversity in cybersecurity
⚠️
Hackers Move From Data Theft To Complete Destruction: Cyber Security Today For Wednesday, December 4, 2024
⚠️
Progress WhatsUp Gold RCE Vulnerability – PoC Exploit Released
⚠️
Google Chrome Security Update, Patch for High-severity Vulnerability
⚠️
63% of companies plan to pass data breach costs to customers
⚠️
Law Enforcement Read Criminals’ Messages After Hacking Matrix Service
⚠️
How to Plan a New (and Improved!) Password Policy for Real-World Security Challenges
⚠️
10/10 directory traversal bug hits SailPoint's IdentityIQ
⚠️
CISA Warns of Zyxel Firewall Vulnerability Exploited in Attacks
⚠️
Erstes Linux-UEFI-Bootkit ist Studentenprojekt
⚠️
Russland knöpft sich Exil-Wodka vor
⚠️
Linux Foundation report highlights the true state of open-source libraries in production apps
⚠️
Cloud threat report: Possible trend in cloud credential “oversaturation”
⚠️
Neue AWS-KI-Rezepte gegen Cloud-Bedrohungen
⚠️
Japan warns of IO-Data zero-day router flaws exploited in attacks
⚠️
Hackers Exploit Docker Remote API Servers To Inject Gafgyt Malware
⚠️
Cloudflare Developer Domains Abused For Cyber Attacks
⚠️
Security teams should act now to counter Chinese threat, says CISA
⚠️
Russia-Linked Turla Exploits Pakistani Hackers' Servers to Target Afghan and Indian Entities
⚠️
CISA Releases New Public Version of CDM Data Model Document
⚠️
Veeam Warns of Critical Vulnerability in Service Provider Console
⚠️
Deloitte UK Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data
⚠️
UK disrupts Russian money laundering networks used by ransomware
⚠️
Fortinet offers integrated cloud app security service
⚠️
European law enforcement breaks high-end encryption app used by suspects
📋
Android’s December 2024 Security Update Patches 14 Vulnerabilities
📢
“Crimenetwork” ausgehoben
📢
CISA Releases Advisory to Monitor Networks to Detect Malicious Cyber Actors
📢
Google Chrome security advisory (AV24-691)
📢
Veeam security advisory (AV24-692)
📢
Six password takeaways from the updated NIST cybersecurity framework
📢
Largest German Crime Marketplace Taken Down, Administrator Arrested
📢
Spy v Spy: Russian APT Turla Caught Stealing from Pakistani APT
📢
Police Shutter Largest German-Speaking Criminal Marketplace
📢
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
🔥
Welcoming the Armenian Government to Have I Been Pwned
🔥
Vodka maker Stoli files for bankruptcy in US after ransomware attack
🔥
Tuskira unifies and optimizes disparate cybersecurity tools
🔥
U.S. Offered $10M for Hacker Just Arrested by Russia
🔥
The Road to Agentic AI: Exposed Foundations
🔥
Ransomware hackers target NHS hospitals with new cyberattacks
🔥
Ransomware-hit vodka maker Stoli files for bankruptcy in the United States
🔥
Russian hackers hijack Pakistani hackers' servers for their own attacks
🔥
Sensitive Data at Risk – Here's How! ⚠️
🔥
Solana Web3.js library backdoored to steal secret, private keys
🔥
NHS Ransomware Attack: Russian INC Ransom Gang Steals Patient Data
🔥
BT unit took servers offline after Black Basta ransomware breach
🔥
BT unit took servers offline after Black Basta ransomware breach
🔥
Deloitte UK Hacked - Brain Cipher Group Claim to Have Stolen 1 TB of Data
🔥
AI in Cybersecurity: Insights from Palo Alto Networks Unit 42®
🔥
Russian Money Laundering Services Busted in UK-Led Operation
🔥
White House: Salt Typhoon hacked telcos in dozens of countries
🔥
Russian hackers hijack Pakistani hackers' servers for their own attacks
🕵️
ISC Stormcast For Wednesday, December 4th, 2024 https://isc.sans.edu/podcastdetail/9240, (Wed, Dec 4th)
🕵️
Data Analysis: The Unsung Hero of Cybersecurity Expertise [Guest Diary], (Wed, Dec 4th)
🕵️
GUEST ESSAY: The key role static code analyzers play in detecting coding errors, eliminating flaws
🕵️
European Police Disrupt Matrix Encrypted Service
🕵️
Solana Web3.js Library Backdoored in Supply Chain Attack
🕵️
AI and the 2024 Elections
🕵️
Researchers Uncover Backdoor in Solana's Popular Web3.js npm Library
🕵️
Cloudflare’s developer domains increasingly abused by threat actors
🕵️
Spotting the Charlatans: Red Flags for Enterprise Security Teams
🕵️
Virtual Event Today: Cyber AI & Automation Summit
🕵️
Government Guidance on Chinese Telco Hacking Highlights Threat to Cisco Devices
🕵️
New TLDs Such as .shop, .top and .xyz Leveraged by Phishers
🕵️
Tuskira Scores $28.5M for AI-Powered Security Mesh
🕵️
What are You Working on Wednesday
🕵️
iVerify Mobile Threat Investigation Uncovers New Pegasus Samples
🕵️
New TLDs Such as .shop, .top and .xyz Leveraged by Phishers
🕵️
Regulator Accuses AI Video Firm of Deceptive Marketing
🕵️
Weaponized Word Documents Attacking Windows Users to Deliver NetSupport & BurnsRAT
🕵️
BSidesPDX 2024
🕵️
News alert: Green Raven study shows cybersecurity to be a black hole in more ways than just budget
🕵️
Snowblind: The Invisible Hand of Secret Blizzard
🕵️
Russian hackers hijack Pakistani hackers' servers for their own attacks
🕵️
Bug Bounties: Bringing Hackers and Manufacturers Together
🕵️
Nikesh Arora on Mad Money
🕵️
US FTC Cracks Down GeoLocation Data Brokers
🕵️
NetSupport RAT and RMS in malicious emails
🕵️
Experts Warn DHS Surveillance Tech Lacks Privacy Protections
🕵️
Explore new Microsoft Entra capabilities at Gartner Identity & Access Management Summit 2024
🕵️
Risky Business #773 -- Cybercriminals are dropping like flies in Russia
🌐
Researchers Uncover Backdoor in Solana's Popular Web3.js npm Library
🌐
Tech support scams leverage Google ads again and again, fleecing unsuspecting internet users
🌐
Business leaders among Pegasus spyware victims, says security firm
🌐
New DroidBot Android banking malware spreads across Europe
🌐
New DroidBot Android malware targets 77 banking, crypto apps
📡
Hackers Use Corrupted ZIPs and Office Docs to Evade Antivirus and Email Defenses
📡
Redefining IT Infrastructure with Secure, Scalable Hybrid Cloud Implementation
📡
Europol Dismantles Criminal Messaging Service MATRIX in Major Global Takedown
📡
7 PAM Best Practices to Secure Hybrid and Multi-Cloud Environments
📡
Upgrade your Sophos Firewall to v21 today
📡
UnitedHealthcare CEO Brian Thompson shot and killed in New York
📡
AI ‘Magic’? More Like a Disaster Waiting to Happen!
📡
Senators say U.S. military is failing to secure its phones from foreign spies
📡
FBI shares tips on how to tackle AI-powered fraud schemes
📡
How Hackers Can Manipulate AI to Affect Health App Accuracy
📡
World Wide Work: Landing a Cybersecurity Career Overseas
📡
OpenAI inks deal to upgrade Anduril’s anti-drone tech
📡
Microsoft says having a TPM is "non-negotiable" for Windows 11
📡
AI chatbot startup WotNot leaks 346,000 files, including passports and medical records