107Articles
9Categories
2024-12-12Date
🐛
AMD data center chips vulnerable to revealing data through ‘BadRAM’ attack
🐛
Splunk RCE Vulnerability Let Attackers Execute Remote Code
🐛
WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins
🐛
Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS
🐛
KeyTrap DNSSEC: The day the internet (almost) stood still
🐛
Microsoft Windows ‘Best Fit’ character conversion ‘ripe for exploitation’
🐛
CVE-2024-49147 Microsoft Update Catalog Elevation of Privilege Vulnerability
🐛
CVE-2024-49071 Windows Defender Information Disclosure Vulnerability
🐛
Security researchers find deep flaws in CVSS vulnerability scoring system
KEV
🐛
Chromium: CVE-2024-12381 Type Confusion in V8
🐛
Chromium: CVE-2024-12382 Use after free in Translate
⚠️
Attackers can abuse the Windows UI Automation framework to steal data from apps
⚠️
Europol Shutsdown 27 DDoS Service Provider Platforms
⚠️
Europol Dismantles 27 DDoS Attack Platforms Across 15 Nations; Admins Arrested
⚠️
BadRAM Attack Breaches AMD Secure VMs with $10 Device
⚠️
The 7 most in-demand cybersecurity skills today
⚠️
A security ‘hole’ in Krispy Kreme Doughnuts helped hackers take a bite
⚠️
Cleo Patches Exploited Flaw as Security Firms Detail Malware Pushed in Attacks
⚠️
ConvoC2 – A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams
⚠️
Cleo 0-day Vulnerability Exploited to Deploy Malichus Malware
⚠️
Splunk RCE Vulnerability Let Attackers Execute Remote Code
⚠️
27 DDoS Attack Services Taken Down by Law Enforcement
⚠️
Attack Exploiting Legitimate Service by APT-C-60
⚠️
Microsoft MFA Bypassed via AuthQuake Attack
⚠️
Malicious ESLint Package Let Attackers Steal Data And Inject Remote Code
⚠️
Mobile Surveillance Tool EagleMsgSpy Used by Chinese Law Enforcement
⚠️
Unauthorized access to iCloud: analyzing an iOS vulnerability that could expose sensitive data to attackers
⚠️
Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online
⚠️
Apache issues patches for critical Struts 2 RCE bug
⚠️
Fortinet Acquires Perception Point Reportedly for $100 Million
⚠️
CISA Releases Ten Industrial Control Systems Advisories
⚠️
Bitcoin ATM firm Byte Federal hacked via GitLab flaw, 58K users exposed
⚠️
Navigating Regulations in Supply Chain Security - Eric Greenwald - PSW #854
⚠️
Mobile Phishing Campaign Targets Job Seekers
⚠️
Apple Releases Security Updates for Multiple Products
⚠️
Cleo patches critical zero-day exploited in data theft attacks
⚠️
Europol shutters 27 DDoS sites in major crackdown
⚠️
Hackers Exploiting Cleo Software Zero-Day
⚠️
New Malware Framework Targets Cleo File Systems
⚠️
Experts Call for Overhaul of National Cyber Director Role
⚠️
NY Health Group Fined $550K in Unpatched Vulnerability Hack
⚠️
US Indicts 14 North Koreans in IT Scam Funding WMD Programs
⚠️
Police shuts down Rydox cybercrime market, arrests 3 admins
⚠️
New stealthy Pumakit Linux rootkit malware spotted in the wild
⚠️
A Vulnerability in Multiple Cleo Products Could Allow for Remote Code Execution
📋
GitLab Security Update, Patch for Critical Vulnerabilities
📢
Drupal security advisory (AV24-710)
📢
Apple security advisory (AV24-709)
📢
Ivanti security advisory (AV24-711)
📢
Rydox Cybercrime Marketplace Shut Down and Three Administrators Arrested
🔥
Bitcoin ATM giant Byte Federal says 58,000 users’ personal data compromised in breach
🔥
BadRAM: Breaching Processor Security via Rogue Memory Modules
🔥
Microsoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&CK® Evaluations: Enterprise​​
🔥
Triad Nexus, Chinese Hackers Using 200,000 Domains For Widespread Cyber Attack
🔥
Japanese publisher Kadokawa paid $3 million to Russia-linked hacker group after cyberattack
🔥
Security Operations in 2025 and Beyond
🔥
Die wichtigsten Cybersecurity-Prognosen für 2025
🔥
Doughnut orders disrupted! Krispy Kreme suffers hack attack
🔥
Triad Nexus, Chinese Hackers Using 200,000 Domains For Widespread Cyber Attack
🔥
Inline vs. Post Breach: How Cybersecurity Adapts in Real-Time!
🔥
MITRE ATT&CK Evaluation Results 2024 – Cynet Became a Leader With 100% Detection & Protection
🔥
Phishing: The Silent Precursor to Data Breaches
🔥
Crypto Roundup: Crypto Pros Targeted with Fake Meeting Apps
🕵️
Russia takes unusual route to hack Starlink-connected devices in Ukraine
🕵️
INTERPOL & Trend's Fight Against Cybercrime
🕵️
ISC Stormcast For Thursday, December 12th, 2024 https://isc.sans.edu/podcastdetail/9252, (Thu, Dec 12th)
🕵️
Google Gemini 2.0 Introduced With Advanced AI for Developers
🕵️
8 Trends Reshaping Network Security in 2025
🕵️
Messenger Group Call DoS for iOS
🕵️
Hunk Companion, WP Query Console Vulnerabilities Chained to Hack WordPress Sites
🕵️
French internet operator fined $53 million for unsolicited ads and tracking users without consent
🕵️
Inside Zloader’s Latest Trick: DNS Tunneling
🕵️
Careto APT’s recent attacks discovered
🕵️
Hacktivist Alliances Target France Amidst Political Crisis
🕵️
New Chinese Surveillance Tool Attack Android Users Since 2017
🕵️
Antidot Malware Attacking Employees Android Devices To Inject Malicious Payloads
🕵️
Security roundup: Top AI stories in 2024
🕵️
The Ghost of Christmas Past – AI’s Past, Present and Future
🕵️
Gamaredon Deploys Android Spyware "BoneSpy" and "PlainGnome" in Former Soviet States
🕵️
Sublime Snags $60M Series B for Email Security Tech
🕵️
Silent Push Raises $10 Million for Preemptive Threat Intelligence Platform
🕵️
This Trick Makes Raspberry Pi Projects EASY 🔧
🕵️
Be Careful of Malicious Ads
🕵️
Lookout Discovers PlainGnome and Bonespy Russian Android spyware
🕵️
Declawing PUMAKIT
🕵️
The Stealthy Stalker: Remcos RAT
🕵️
No Paul? We got this! - PSW #854
🕵️
Checkmarx CEO: Evolving Supply Chain Threats Demand Action
🕵️
Fake IT Workers Funneled Millions to North Korea, DOJ Says
🕵️
US offers $5 million for info on North Korean IT worker farms
🕵️
New IOCONTROL malware used in critical infrastructure attacks
🕵️
Russia Used Borrowed Spyware to Target Ukrainian Troops
🕵️
Inside a New OT/IoT Cyberweapon: IOCONTROL
🕵️
New IT Support in Town
🕵️
Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security
🌐
27 DDoS-for-hire services disrupted in run-up to holiday season
🌐
How Repo Swatting Can Destroy Your GitHub Account!
🎙️
Smashing Security podcast #397: Snowflake hackers, and under the influence
📡
Which encrypted file storage to choose? | Kaspersky official blog
📡
Researchers find security flaws in Skoda cars that may let hackers remotely track them
📡
SaaS Budget Planning Guide for IT Professionals
📡
OnDemand: Redefining IT Infrastructure with Secure, Scalable Hybrid Cloud Implementation
📡
The Bite from Inside: The Sophos Active Adversary Report
📡
Spain busts voice phishing ring for defrauding 10,000 bank customers
📡
Yahoo cybersecurity team sees layoffs, outsourcing of ‘red team,’ under new CTO
📡
Black Hat Europe 2024: Can AI systems be socially engineered?
📡
Black Hat Europe 2024: Can AI systems be socially engineered?