47Articles
8Categories
2024-12-30Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-3393 Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability These types of vulnerabilities are frequent attack vectors for maliciou…
KEV
πŸ›
Hackers exploit Four-Faith router flaw to open reverse shells
πŸ›
Palo Alto Networks Patches Firewall Zero-Day Exploited for DoS Attacks
πŸ›
PoC Exploited Released for Oracle Weblogic Server Vulnerability
πŸ›
Severe Vulnerability in Palo Alto Networks PAN-OS Exposes Firewalls to Denial of Service (CVE-2024-3393)
⚠️
Four-Faith Industrial Router Vulnerability Exploited in Attacks
⚠️
US Issues Final Rule for Protecting Personal Data Against Foreign Adversaries
⚠️
Cisco Confirms Authenticity of Data After Second Leak
⚠️
New Botnet Exploiting D-Link Routers To Gain Control Remotely
⚠️
SquareX Researchers Uncover OAuth Vulnerability in Chrome Extensions Days Before Major Breach
⚠️
New 7-Zip 0-Day Exploit Allegedly Leaked Online Via β€˜X’
⚠️
Blown the cybersecurity budget? Here are 7 ways cyber pros can save money
⚠️
Third Party Risk Management: So vermeiden Sie Compliance-Unheil
⚠️
Brauchen Sie einen vCISO?
⚠️
7-Zip Zero-Day Exploit Allegedly Leaked Online
⚠️
FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks
⚠️
16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft
πŸ“‹
Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates
πŸ“’
New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits
πŸ“’
Cyber attack on Italy's Foreign Ministry, airports claimed by pro-Russian hacker group
πŸ”₯
Salt Typhoon’s Reach Continues to Grow
πŸ”₯
US Treasury Department breached through remote support platform
πŸ”₯
AT&T and Verizon say networks secure after Salt Typhoon breach
πŸ”₯
Several Chrome Extensions Compromised in Supply Chain Attack
πŸ”₯
Weekly Update 432
πŸ”₯
⚑ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips
πŸ”₯
When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions
πŸ”₯
Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File
πŸ”₯
US Treasury says China accessed government documents in β€˜major’ cyberattack
πŸ”₯
AT&T and Verizon say networks are secure after being breached by China-linked Salt Typhoon hackers
πŸ”₯
News alert: SquareX exposes OAuth attack on Chrome extensions β€” days before a major breach
πŸ”₯
Hackers hijack a wide range of companies' Chrome extensions, experts say
πŸ”₯
Japan Airlines systems back to normal after cyberattack delayed flights
πŸ•΅οΈ
NFS Protocol Security Bypassed To Access Files From Remote Server
πŸ•΅οΈ
CISO vs. CEO: Making a case for cybersecurity investments
πŸ•΅οΈ
Say Easy, Do Hard, Minimum Viable Security - Part 2 - Jon Fredrickson - BSW Vault
πŸ•΅οΈ
Learn This Early to Succeed in Cybersecurity πŸ’‘
πŸ•΅οΈ
GDPR Hindi/Urdu Video Lectures
πŸ•΅οΈ
SAINTCON 2024 - Keynote - Jack Rhysider
πŸ•΅οΈ
North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign
πŸ“‘
Prioritizing patching: A deep dive into frameworks and tools – Part 2: Alternative frameworks
πŸ“‘
Microsoft issues urgent dev warning to update .NET installer link
πŸ“‘
Changes in SSL and TLS support in 2024, (Mon, Dec 30th)
πŸ“‘
Volkswagen leak exposed precise location data on thousands of vehicles across Europe for months
πŸ“‘
The Fastest Way to Flash M5 Firmware! πŸš€
πŸ“‘
The $170 Billion Closet: Cybersecurity's Dirty Secret!
πŸ“‘
Industry Moves for the week of December 30, 2024 - SecurityWeek