75Articles
7Categories
2025-01-17Date
🐛
AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV
🐛
PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability
🐛
CISA Warns of Aviatrix Controllers OS Command Injection Vulnerability Exploited in Wild
KEV
🐛
Poor patching regime is opening businesses to serious problems
⚠️
Hackers Target Microsoft 365 With Hight Speed Attack: Cyber Security Today for January 17, 2025
⚠️
Microsoft starts force upgrading Windows 11 22H2, 23H3 devices
⚠️
Google Releases Open Source Library for Software Composition Analysis
⚠️
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
⚠️
Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation
⚠️
U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs
⚠️
CISA and FBI Release Updated Guidance on Product Security Bad Practices
KEV
⚠️
A Brief Guide for Dealing with ‘Humanless SOC’ Idiots
⚠️
Effective Security Awareness Training Really Does Reduce Data Breaches
⚠️
Brad Pitt Romance Scams Pushed By AI-Enabled Deepfakes
⚠️
Bug Bounty Bonanza: $40,000 Reward for Escalating Limited Path Traversal to RCE
⚠️
IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
⚠️
US hits back against China’s Salt Typhoon group
⚠️
DORA-Umsetzung hält Banken-CISOs auf Trab
⚠️
EU’s DORA could further strain cybersecurity skills gap
⚠️
Was ist ein Payload?
⚠️
Millions of tunneling hosts are vulnerable to spoofing, DDoS attacks, say researchers
⚠️
Open Telemetry for Beginners: Start Here!
⚠️
Stopping The Bad Things - PSW #857
⚠️
MSSqlPwner: Open-source tool for pentesting MSSQL servers
📢
US Government Agencies Call for Closing the Software Understanding Gap
📢
Industry Reactions to Biden’s Cybersecurity Executive Order: Feedback Friday
📢
European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China
📢
Your KnowBe4 Compliance Plus Fresh Content Updates from December 2024
📢
CISA Releases Guidelines For Closing Software Understanding Gap
📢
GUEST ESSAY: President Biden’s cybersecurity executive order is an issue of national security
🔥
Otelier data breach exposes info, hotel reservations of millions
🔥
US sanctions Chinese firm, hacker behind telecom and Treasury hacks
🔥
FCC orders telecoms to secure their networks after Salt Tyhpoon hacks
🔥
Wolf Haldenstein Data Breach Impacts 3.4 Million People
🔥
How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?
🔥
Ransomware Gangs Claimed More Than 5,000 Attacks in 2024
🔥
Treasury sanctions Salt Typhoon hacking group behind breaches of major US telecom firms
🔥
Malware stole internal PowerSchool passwords from engineer’s hacked computer
🔥
MSI - 249,990 breached accounts
🔥
Malware stole internal PowerSchool passwords from engineer's hacked computer
🔥
Wolf Haldenstein law firm says 3.5 million impacted by data breach
🔥
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
🔥
Chinese hackers accessed Yellen's computer in US Treasury breach, Bloomberg News reports
🕵️
Friday Squid Blogging: Opioid Alternatives from Squid Research
🕵️
Defending Democracy: The #PROTECT2024 Chapter in Election Infrastructure Security
🕵️
In Other News: Lawsuits and Settlements, CrowdStrike Phish, MITRE’s D3FEND 1.0
🕵️
US Announces Sanctions Against North Korean Fake IT Worker Network
🕵️
Vulnerabilities in SimpleHelp Remote Access Software May Lead to System Compromise
🕵️
Leveraging Honeypot Data for Offensive Security Operations [Guest Diary], (Fri, Jan 17th)
🕵️
ISC Stormcast For Friday, January 17th, 2025 https://isc.sans.edu/podcastdetail/9284, (Fri, Jan 17th)
🕵️
FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages
🕵️
New Tool Unveiled to Scan Hacking Content on Telegram
🕵️
Let’s Encrypt Unveils Six-Day Certificate and IP Address Options for 2025
🕵️
BitMEX Fined $100 Million for Violating Bank Secrecy Act
🕵️
How to calculate your AI-powered cybersecurity’s ROI
🕵️
Securing DOT Infrastructure
🕵️
AIs in Love, UEFI, Fortinet, Godaddy, Juggalos, Aaran Leyland, and More. - SWN #443
🕵️
Cybernotes
🕵️
iPhone USB-C is hackable, but users don't need to worry yet
🕵️
AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV
🕵️
FCC Adopts Cybersecurity Rules in Wake of Salt Typhoon
🕵️
Top 10 web hacking techniques of 2024: nominations open
🕵️
Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service
🕵️
NSA Warns iPhone And Android Users—Disable Location Tracking
🕵️
FBI warns agents of call log thefts by hackers, Bloomberg News reports
🕵️
Bypassing disk encryption on systems with automatic TPM2unlock
🌐
Malicious PyPi package steals Discord auth tokens from devs
📡
Social Engineering to Disable iMessage Protections
📡
FTC cracks down on Genshin Impact gacha loot box practices
📡
Microsoft fixes Office 365 apps crashing on Windows Server systems
📡
New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass
📡
No, Brad Pitt isn’t in love with you
📡
Hype and confusion surrounding quantum computers in cryptography
📡
Martial Arts Lesson: Pain = Motivation! 💥
📡
From Fortran to GCC: A Coder's First Love!