28Articles
7Categories
2024-12-31Date
🐛
CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild
KEV
🐛
TrueNAS CORE Vulnerability Let Attackers Execute Remote Code
🐛
Top 12 ways hackers broke into your systems in 2024
KEV
⚠️
Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents
⚠️
Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation
⚠️
US Treasury Department workstations breached in attack attributed to China
⚠️
Vielen CISOs droht der Burnout
⚠️
🎶 For Secured Times Gone By 🎶
📢
New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy
📢
US Treasury Department Breach, Hackers Accessed Workstations
📢
Cloud Security in Higher Education: Balancing Trust and Risk - Sheena Thomas - CSP #207
🔥
Massive healthcare breaches prompt US cybersecurity rules overhaul
🔥
Rhode Islanders’ Data Was Leaked From a Cyberattack on State Health Benefits Website
🔥
Chinese Hackers Accessed US Treasury Workstations in ‘Major’ Cybersecurity Incident
🕵️
Gift Card Fraud
🕵️
Cyberhaven Chrome Extension Hack Linked to Widening Supply Chain Campaign
🕵️
FTC Warns Immigrants About Rising Social Media Immigration Scams
🕵️
The 5 most impactful cybersecurity guidelines (and 3 that fell flat)
🕵️
The Future in the Age of AI - SWN Vault
🌐
Over 3.1 million fake "stars" on GitHub projects used to boost rankings
🌐
MITRE’s New AI Security Tool - Worth the Hype?
📡
New details reveal how hackers hijacked 35 Google Chrome extensions
📡
U.S. Army Soldier Arrested in AT&T, Verizon Extortions
📡
No Holiday Season for Attackers, (Tue, Dec 31st)
📡
US telco Lumen says its network is now clear of China’s Salt Typhoon hackers
📡
New Year’s cybersecurity resolutions that every startup should keep
📡
Tech Overhead: The Hidden Maintenance You Pay For!
📡
FBI Says STOP Texting? 😱 Here’s Why!