- IT Security News Daily Summary 2024-08-11
-
DevSecOps Teams Face Regular Outages, Cyberattacks, and Data Breaches
-
CrowdStrike accepts award for ‘most epic fail’ after global IT outage
-
‘0.0.0.0 Day’ Vulnerability Puts Chrome, Firefox, Mozilla Browsers at Risk
-
Researchers Demonstrate Windows Downgrade Attacks At Black Hat 2024
-
National Public Data Hacked: Personal Information of Millions at Risk
-
Unsolicited ‘Offensive’ Political Emails Stir Data Privacy Concerns in East London
-
QuickShell: Sharing Is Caring about an RCE Attack Chain on Quick Share
-
Rogue PyPI Library Solana Users, Steals Blockchain Wallet Keys
-
Security Affairs newsletter Round 484 by Pierluigi Paganini – INTERNATIONAL EDITION
-
ADT disclosed a data breach that impacted more than 30,000 customers
-
Week in review: Tips for starting your cybersecurity career, Patch Tuesday forecast
-
Cybersecurity Insiders Q&A: SonicWall President and Chief Executive Officer Robert VanKirk
-
Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All
-
Black Hat USA 2024 recap – Week in security with Tony Anscombe
-
Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look
-
Is the INC ransomware gang behind the attack on McLaren hospitals?
-
Researchers Uncover 10 Flaws in Google’s File Transfer Tool Quick Share
-
Illinois Amends Biometric Privacy Law to Limit Corporate Liability
-
Global Breach of Mobile Guardian Wipes Data from 13,000 Students’ Devices in Singapore
-
Need Intel’s Raptor Lake bug patch? You’ll have to download and install it yourself
-
New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions
-
Proton VPN Doubles Down on its Fight Against Online Censorship
-
South Korea on High Alert as North Korean Hackers Eye Construction Sector Data
-
Massive Email Address Exposure: SOCRadar.io Data Scraping Incident
-
How North Korean Attackers Deployed Malware Via VPN Bug Exploit
-
CSC ServiceWorks reveals 2023 data breach affecting thousands of people
-
The Undeniable but Often Overlooked Human Element of Cybersecurity
-
Russian Midnight Blizzard Breached UK Home Office via Microsoft
-
After global IT meltdown, CrowdStrike courts hackers with action figures and gratitude
-
Git-Syncing into Trouble: Exploring Command Injection Flaws in Kubernetes
-
Crooks took control of a cow milking robot causing the death of a cow
-
‘0.0.0.0 Day’ Flaw Puts Chrome, Firefox, Mozilla Browsers at RCE Risk
-
Cisco Warns of Critical RCE Zero-Days in End of Life IP Phones
-
Hazy Issue in Entra ID Allows Privileged Users to Become Global Admins
-
Russian Spies Hacked UK Government Systems Earlier This Year, Stole Data and Emails
-
Microsoft Warns of Unpatched Office Vulnerability Leading to Data Exposure
-
Microsoft Warns of Unpatched Office Vulnerability Leading to Data Breaches
-
Student raised security concerns in Mobile Guardian MDM weeks before cyberattack
-
Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs
-
Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers
-
Cyber attacks 2024: The biggest attacks of the first half of 2024
-
Intel has news – good, bad and ugly – about Raptor Lake bug patch. Here’s what to know
-
How to ask Google to remove deepfake porn results from Google Search
-
Australian Enterprises Coming 4th in 2024 Global Survey of Generative AI Usage
-
Ecovacs home robots can be hacked to spy on their owners, researchers say
-
USENIX Security ’23 – Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities
-
ATM Software Flaws Left Piles of Cash for Anyone Who Knew to Look
-
Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI
-
Raptor Lake microcode limits Intel chips to a mere 1.55 volts to prevent CPU destruction
-
Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines
-
Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE
-
Louvre and Top French Museums Fall Victim to Ransomware Attack, Including Olympic Sites
-
Five zero-days impacts EoL Cisco Small Business IP Phones. Replace them with newer models asap!
-
Have you used Cash App in the last 6 years? You might be eligible for $2,500
-
How a cybersecurity researcher befriended, then doxed, the leader of LockBit ransomware gang
-
Security company ADT announces security breach of customer data
-
Microsoft Update Alert: 70% Of Windows Users Are Now At Risk
-
#BHUSA: CISA Encourages Organizations to Adopt a ‘Secure by Demand’ Strategy
-
Federal Watchdog Calls on EPA to Formulate Comprehensive Cybersecurity Plan for Water Systems
-
Evolving threat landscape influencing cyber insurance market
-
0.0.0.0 Day Vulnerability: An 18-Year-Old Flaw Actively Exploited by Threat Actors
-
Content Detection Technologies in Data Loss Prevention (DLP) Products
-
Partnership in Action: Creating Connection through Community Impact
-
Ransomware Attack on OneBlood Disrupts Florida Blood Supply Chain, Urgent Call for Donations
-
New Ransomware Threat: Hunters International Deploys SharpRhino RAT
-
Cryptojacking Attacks Soar 409% in India Amid a Global Shift in Cybersecurity Tactics
-
New Flaws in Sonos Smart Speakers Allow Hackers to Eavesdrop on Users
-
Applications are open: ENISA Cybersecurity Support Action Programme tender procedure
-
Threat Actors Exploiting Windows Systems To Deploy Multiple Malwares
-
How MSSPs Can Navigate the Regulatory Landscape: Ensuring Compliance
-
Pro-Iran groups lay groundwork for ‘chaos and violence’ as US election meddling intensifies
-
In Other News: KnowBe4 Product Flaws, SEC Ends MOVEit Probe, SOCRadar Responds to Hacking Claims
-
Cybersecurity Insights with Contrast CISO David Lindner | 8/9/24
-
Confusion Attacks Vulnerability In Apache HTTP Server Allow Attackers To Gain Root Access Remotely
-
0.0.0.0 Day – 18 Yr Old Vulnerability Allow Attackers to Bypass All Browser Security
-
Cisco Networking Academy honors International Day of the World’s Indigenous People
-
US Offers $10 Million for Information on Iranian Hackers Behind CyberAv3ngers Water Utility Attacks
-
Dell Begins Fresh Round Of Job Losses, Amid AI Move – Report
-
New APT Actor240524 Weaponizing Official Documents To Deliver Malware
-
Leaked MDM Credentials Exposes Commonly Laptops And Smartphones For Hacking
-
‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
-
Transparency in Cybersecurity: The Importance of Accurate Vulnerability Disclosures
-
Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
-
Critical Jenkins Vulnerabilities Expose Servers To RCE Attack
-
Number of Incidents Affecting GitHub, Bitbucket, GitLab, and Jira Continues to Rise
-
Warnings Issued Over Cisco Device Hacking, Unpatched Vulnerabilities
-
Elon Musk Shares Fake News Of UK Rioters Being Deported To Falklands
-
How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
-
Consumer Reports Study Finds Data Removal Services are Often Ineffective
-
#BHUSA: CoSAI, Combating AI Risks Through Industry Collaboration
-
CISA Warns of Cisco Smart Install Feature Actively Exploited by Hackers
-
Russia’s Kursk Region Suffers ‘Massive’ DDoS Attack Amid Ukraine Offensive
-
Entrust distrust: How to move to a new Certificate Authority
-
OpenAI Leadership Split Over In-House AI Watermarking Technology
-
August 2024 Patch Tuesday forecast: Looking for a calm August release
-
“0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
-
OpenWrt Dominates, but Vulnerabilities Persist in OT/IoT Router Firmware
-
Vulnerability Allowed Eavesdropping via Sonos Smart Speakers
-
PowerDMARC Integrates with SecLytics for Predictive Threat Intelligence Analysis
-
Threat Actors Favor Rclone, WinSCP and cURL as Data Exfiltration Tools
-
Windows Zero-day Flaw Let Hackers Downgrade Fully Updated Systems To Old Vulnerabilities
-
GhostWrite Vulnerability Let Hackers Read And Write Any Part Of The Computer’s Memory
-
Hackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked Devices
-
DOJ Charges Nashville Man for Helping North Koreans Get U.S. Tech Jobs
-
Russian cyber spies stole data and emails from UK government systems
-
CISA adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog
-
Next-Gen Vehicle Technologies Present New Challenges for Cybersecurity Professionals
-
One of the largest data breaches in history? Cyber Security Today for Friday, August 9th, 2024
-
Security vulnerability in IT infrastructure of Ransomware gang saves six victimized companies
-
Authorities Dismantled North Korean Remote IT Worker Laptop Farm
-
CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature
-
The Olympic Games have been protected from cyber-attacks so far
-
It’s 2024 and we’re just getting round to stopping browsers insecurely accessing 0.0.0.0
-
Passwordless Prescription: The Cure for Healthcare Cybersecurity
-
Overcoming the 5 Biggest Challenges to Implementing Just-in-Time, Just Enough Privilege
-
NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
-
How Situational Awareness Enhances the Security of Your Facility
-
Malware-as-a-Service and Ransomware-as-a-Service lower barriers for cybercriminals
-
Shorter TLS certificate lifespans expected to complicate management efforts
-
Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE
-
ISC Stormcast For Friday, August 9th, 2024 https://isc.sans.edu/podcastdetail/9090, (Fri, Aug 9th)
-
Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies
-
Hello? Are you talking on a Cisco SPA300 or SPA500 IP phone? Now’s the time to junk ’em
-
Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE
-
Delta: CrowdStrike’s offer to help in Falcon meltdown was too little, too late
-
Security bugs in ransomware leak sites helped save six companies from paying hefty ransoms
-
Sustainability 101: How Hybrid Work Can Advance Sustainability in the Workforce
-
Stolen data from scraping service National Public Data leaked online
-
Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse
-
Weak “Guardrails” on Police Face Recognition Use Make Things Worse
-
US ‘laptop farm’ man accused of outsourcing his IT jobs to North Korea to fund weapons programs
-
US ‘laptop farm’ man accused of outsourcing his IT jobs to North Koreans to raise funds for weapons
-
Introducing Secretless Identity and Access for Serverless with AWS Lambda
-
USENIX Security ’23 – TAP: Transparent and Privacy-Preserving Data Services
-
Black Hat and DEF CON Roundup 2024: AWS Patched a Vulnerability Affecting Six Cloud Services
-
0.0.0.0 Day flaw allows malicious websites to bypass security in major browsers
-
Wiz researchers hacked into leading AI infrastructure providers
-
Zenity CTO on dangers of Microsoft Copilot prompt injections
-
CrowdStrike Class Action Lawsuit for Massive Software Outage
-
Microsoft’s AI Can Be Turned Into an Automated Phishing Machine
-
The Need For A Vulnerability Operations Center (VOC) in Modern Cybersecurity
-
The top stories coming out of the Black Hat cybersecurity conference
-
Black Hat USA 2024: Chip Flaw ‘GhostWrite’ Steals Data from CPU Memory
-
CrowdStrike Dismisses Claims of Exploitability in Falcon Sensor Bug
-
How to Perform a Cloud Security Assessment: Checklist & Guide
-
How Microsoft and NIST are collaborating to advance the Zero Trust Implementation
-
UK To Investigate Amazon’s $4 Billion Investment In Anthropic
-
LG unleashes South Korea’s first open-source AI, challenging global tech giants
-
EFF and 12 Organizations Tell Bumble: Don’t Sell User Data Without Opt-In Consent
-
Cybercriminals Impersonate Law Enforcement in New ‘Digital Detention’ Scam
-
University Professors Targeted by North Korean Cyber Espionage Group
-
Wordfence Intelligence Weekly WordPress Vulnerability Report (July 29, 2024 to August 4, 2024)
-
Anthropic offers $15,000 bounties to hackers in push for AI safety
-
The Critical Role of Data Center Technology in Transforming the Manufacturing Industry
-
Black Hat USA 2024: AWS ‘Bucket Monopoly’ Flaw Led to Account Takeover
-
I tested 7 AI content detectors – they’re getting dramatically better at identifying plagiarism
-
The Windows 10 clock is ticking: 5 ways to save your old PC in 2025 (most are free)
-
Hackers Spreading Malicious Python Packages Through Popular Developer Q&A Platform
-
USPS Text Scammers Duped His Wife, So He Hacked Their Operation
-
Critical Progress WhatsUp Gold RCE Flaw Now Under Active Exploitation
-
Stolen Credentials Have Turned SaaS Apps Into Attackers’ Playgrounds
-
#BHUSA: Ransomware Drill Targets Healthcare in Operation 911
-
How East Carolina University Uses LoRaWAN to Drive Regional Innovation
-
0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices
-
Alibaba’s T-Head C910 RISC-V Chips Found Vulnerable to GhostWrite Attack
-
Using 1Password on Mac? Patch up if you don’t want your Vaults raided
-
SEC Investigation into Progress MOVEit Hack Ends Without Charges
-
Security researcher discovered attack to downgrade Windows permanently
-
What Is a Whaling Attack (Whale Phishing) + How Can You Prevent It?
-
STAC6451 Hacker Hijacking Microsoft SQL Servers to Compromise Organizations
-
NIS2 Compliance Unveiled: Operational Managers’ Roadmap to Actionable Security Measures
-
Cloud Storage From Microsoft, Google Used in Malware Attacks
-
Operational Technology (OT) Security a Top Priority for CIOs
-
Infinity Global Services and Cysurance Launch a Comprehensive Insurability Assessment Program
-
NIS2 Directive in the EU: An imminent deadline, insufficient preparation
-
FBI and CISA Uncover Updated TTPs and Activity of the BlackSuit Ransomware Group
-
Web-Connected Industrial Control Systems Vulnerable to Attack
-
Massive Data Breach Exposes Personal Information of 2.9 Billion People Worldwide
-
Microsoft 365 anti-phishing alert “erased” with one simple trick
-
Intel Sued By Shareholders After Dividend Suspension, Stock Price Crash
-
Thousands of Exposed Industrial Control Systems in US, UK Threaten Water Supplies
-
Ronin Network Hacked, $12 Million Returned by “White Hat” Hackers
-
Automated Security Validation: One (Very Important) Part of a Complete CTEM Framework
-
As use of IoT devices grows, so do the associated security risks
-
Proton Pass password manager adds identity data, biometric authentication
-
One year later: The Flipper Zero is still cool. Here are 7 useful things you can do
-
Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes
-
ISC Stormcast For Thursday, August 8th, 2024 https://isc.sans.edu/podcastdetail/9088, (Thu, Aug 8th)
-
Can AI detectors save us from ChatGPT? I tried 7 online tools to find out
-
Researcher Discovers Downgrade Attack Abusing Windows Update Process
-
Menlo Zero Trust Access enhancements boost enterprise browsing security
-
New Phishing Scam Uses Google Drawings and WhatsApp Shortened Links
-
Windows Downgrade Attack Risks Exposing Patched Systems to Old Vulnerabilities
-
Record Breaking DDoS Attack 419 TB of Malicious Traffic Within 24-Hours
-
Get a Lifetime of 1TB Cloud Storage for Only $70 With FolderFort
-
SEC Ends Probe Into MOVEit Attacks Impacting 95 Million People
-
AWS Patches Vulnerabilities Potentially Allowing Account Takeovers
-
Roundcube Flaws Allow Easy Email Account Compromise (CVE-2024-42009, CVE-2024-42008)
-
Securonix and Cribl partner to enhance threat detection with advanced data integration
-
“Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
-
Microsoft 365 Anti-Phishing Feature can be Bypassed with CSS
-
Endor Labs launches Upgrade Impact Analysis and Magic Patches for SCA market
-
FBI and CISA update a joint advisory on the BlackSuit Ransomware group
-
Entrust faces years of groveling to regain browsers’ trust, say rival chiefs
-
AI Remediation by ArmorCode reduces DevSecOps friction and accelerates security fixes
-
AppViewX and Utimaco team up to enhance cloud security with new lifecycle management solutions
-
Critical Cisco Small Business IP Phone Flaws Exposes Users to Remote Attacks
-
Provisional £6m Fine Imposed on Software Provider Following NHS Ransomware Attack
-
Police Recover Over USD 40 Million from International Email Scam
-
RAD Security Combines AI With Behavioral Analytics to Improve Cybersecurity
-
Critical Security Flaw in WhatsUp Gold Under Active Attack – Patch Now
-
FBI and CISA Warn of BlackSuit Ransomware That Demands Up to $500 Million
-
The three pillars of the next generation in data security: PostgreSQL, zero trust and web3
-
Rhysida Ransomware group claims to have breached Bayhealth Hospital in Delaware
-
New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel
-
Why tech-savvy leadership is key to cyber insurance readiness
-
How network segmentation can strengthen visibility in OT networks
-
Cloud storage lockers from Microsoft and Google used to store and spread state-sponsored malware
-
Samsung boosts bug bug bounty to a cool million for cracks of the Knox Vault subsystem
-
Critical XSS bug in Roundcube Webmail allows attackers to steal emails and sensitive data
-
Nexera DeFi Protocol Hacked: $1.8M Stolen in Major Smart Contract Exploit
-
From Cybersecurity Practitioner to Advocacy: My Journey Back to Cisco
-
Atari Asteroids Hack Sparks Debate on Blockchain Gaming Transparency
-
Over 40,000 Internet-Exposed ICS Devices Found in US: Censys
-
#BHUSA: CrowdStrike Outage Serves as Dress Rehearsal for China-Led Cyber-Attacks
-
AI PCs bring new security protections and risks. Here’s what users need to know
-
D3 Introduces Program to Help SOC Teams Migrate Successfully from Legacy SOAR
-
Living off the VPN ? Exploring VPN Post-Exploitation Techniques
-
Elon Musk Says “No Choice” But To Close X’s San Francisco HQ
-
Jumpstart Your Meraki Auto-VPN Journey in the Multi-Cloud Environment
-
Docker vs. Podman: Exploring Container Technologies for Modern Web Development
-
Researchers unveil AWS vulnerabilities, ‘shadow resource’ vector
-
EFF Tells Yet Another Court to Ensure Everyone Has Access to the Law and Reject Private Gatekeepers
-
Faulty instructions in Alibaba’s T-Head C910 RISC-V CPUs blow away all security
-
Increase in Magniber Ransomware Attacks Affects Home Users Globally
-
Ireland’s DPC Takes Twitter to Court Over AI User Data Concerns
-
Recent ProtonVPN Update Brings Discreet Icons, Stealth Protocol
-
Can Deaf and Hard of Hearing People Thrive in IT and Tech Careers?
-
How To Check and Update Newer Versions for Dependencies in Maven Projects
-
Hackers could spy on cell phone users by abusing 5G baseband flaws, researchers say
-
Tenable Adds Ability to Prioritize Vulnerabilities by Threat Level
-
Critical Solar Power Grid Vulnerabilities Risk Global Blackouts
-
Data Breaches Are Costing Australian Organisations, IBM Report Reveals
-
Black Hat and DEF CON Roundup 2024: What to Expect From This Week’s Security Events
-
Hackers could spy on cellphone users by abusing 5G baseband flaws, researchers say
-
Researcher Sounds Alarm on Windows Update Flaws Allowing Undetectable Downgrade Attacks
-
Hackers are Employing Real Estate Fraud to Target North Dakota Citizens
-
Akamai Blocked 419 TB of Malicious Traffic in a 24-Hour DDoS Attack
-
Roundcube Webmail Flaws Allow Hackers to Steal Emails and Passwords
-
New Linux Kernel Exploit Technique ‘SLUBStick’ Discovered by Researchers
-
CISA Releases Guide to Enhance Software Security Evaluations
-
The Best MSSP Software You Should Consider Looking At in 2024
-
Federal Watchdog Urges EPA to Develop Comprehensive Cyber Strategy to Protect Water Systems
-
Sysdig Adds Ability to Correlate Identities to Cloud Computing Breaches
-
This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
-
Phishing Attacks Can Bypass Microsoft 365 Email Safety Warnings
-
Expert Insight: Cyber Security Resilience Act: A game-changer for industry standards
-
Women in CyberSecurity (WiCyS) Announces 5th Annual Security Training Scholarship
-
NHS Software Supplier Advanced Faces $7.6 Million Fine Over Ransomware Attack Failings
-
Unlock the Power of GenAI with Check Point Software Technologies
-
Black Hat Roundup 2024: What to Expect From This Week’s Security Events
-
Small CSS tweaks can help nasty emails slip through Outlook’s anti-phishing net
-
Rubrik Allies With Mandiant to Increase Cyber Resiliency Capability
-
Google Ads Glitch Exposes Sensitive Competitor Data, Causes Reporting Disruption
-
#BHUSA: DARPA’s AI Cyber Challenge Heats Up as Healthcare Sector Watches
-
Threat Actors Announced Doubleface Ransomware, Claims Fully Undetectable
-
Scamnetic Emerges From Stealth With AI-Based Scam Detection Solution
-
CrowdStrike engages external experts, details causes of massive outage
-
AWS Launches Mithra To Detect Malicious Domains Across Systems
-
Researchers Proposed MME Framework To Enhance API Sequence-Based Malware Detection
-
Cyber Training Organization Pledges $15 Million in Education Programs
-
The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter
-
Microsoft 365 Vulnerability Let Hackers Bypass Anti-phishing Feature
-
Abnormal Security Raises $250M on $5.1B Valuation to Enhance AI-Driven Cyber Protection
-
North Korean Hackers Leverage Malicious NPM Packages for Initial Access
-
Police take just 2 days to recover $40M stolen in business email scam
-
Hunters International RaaS Group Points SharpRhino at IT Workers
-
Chameleon Malware Now Targeting Employees Masquerading as a CRM app
-
Replacement for Action Fraud, UK’s Cybercrime Reporting Service, Delayed Again Until 2025
-
New Go-based Backdoor GoGra Targets South Asian Media Organization
-
Elon Musk’s X Sues Advertisers Over “Massive Advertiser Boycott”
-
Have You Heard About the New PCI 4.0 Section 1.2 Spec? Tripwire Makes Compliance Easy
-
Reliable Baseline Management with Fortra’s Tripwire Enterprise
-
StormCloud Hacks ISP to Spread Malware Posing as Software Updates
-
Join Us 08-23-24 for “Hacking the Future of Pentesting” – Super Cyber Friday
-
New Zola Ransomware Using Multiple Tools to Disable Windows Defender
-
New Android spyware LianSpy relies on Yandex Cloud to avoid detection
-
Cybersecurity Headlines: Google kernel zero-day, voter portal flaw, ransomware as terrorism
-
Microsoft’s Security Efforts Leave Much To Be Desired, Especially For Email Security
-
CISA Adds Microsoft COM for Windows Bug to its Known Exploited Vulnerabilities Catalog
-
Veza introduces Access AI to streamline risk management and access control
-
Masterclass in CIAM for Insurance: Balancing Security, Experience, and Consent
-
Attackers Use Multiple Techniques to Bypass Reputation-Based Security
-
Police Shield Communications from Public Scrutiny with Encryption
-
Elastic automates SIEM data onboarding with Automatic Import
-
Cequence Unified API Protection defends against attacks targeting AI applications
-
AppSOC launches new AI security capabilities for enhanced governance and protection
-
Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
-
UK health services call-handling vendor faces $7.7M fine over 2022 ransomware attack
-
Flashpoint Ignite and Echosec deliver threat intelligence for enhanced protection
-
EQT takes a majority stake in cybersecurity firm Acronis at $3.5B+ valuation
-
Cymulate AI Copilot validates security against real-time threats
-
Contrast Security ADR enables teams to identify vulnerabilities, detect threats, and stop attacks
-
EQT takes a majority stake in cybersecurity firm Acronis at a $3.5B+ valuation
-
Chameleon Android Banking Trojan Targets Users Through Fake CRM App
-
Britain NHS Software provider to face Ransomware penalty of £ 6 million
-
The C-Suite Conundrum: Are Senior Executives the Achilles’ Heel of Cybersecurity?
-
OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
-
Apple’s New macOS Sequoia Tightens Gatekeeper Controls to Block Unauthorized Software
-
SharpRhino malware targets IT admins – Hunters International gang suspected
-
Securing Data in the AI Era: Introducing Check Point Harmony Endpoint DLP
-
Georgia’s voter portal gets a crash course in client versus backend input validation
-
Microsoft punches back at Delta Air Lines and its legal threats
-
Hackers breached MDM firm Mobile Guardian and wiped thousands of devices
-
Number of incidents affecting GitHub, Bitbucket, GitLab, and Jira continues to rise
-
CrowdStrike hires outside security outfits to review troubled Falcon code
-
Microsoft Hits Back at Delta After the Airline Said Last Month’s Tech Outage Cost It $500 Million
-
How AHEAD Enhanced SecOps Efficiency with Low-code Security Automation
-
CrowdStrike hires outside security outfits to review Falcon code
-
CrowdStrike hires outside security firms to review Falcon code
-
UK data watchdog fines NHS vendor Advanced for security failures prior to LockBit ransomware attack
-
Lasso Security sets new standard in LLM safety with Context-Based Access Controls
-
What is torrenting? BitTorrent, legal issues, how it works, and more
-
Proton VPN rolls out anti-censorship protocol to Windows, plus other updates
-
OpenAI’s meltdown: Inside the summer that could redefine artificial intelligence
-
Spring 2024 SOC 2 report now available in Japanese, Korean, and Spanish
-
USENIX Security ’23 – Prime Match: A Privacy-Preserving Inventory Matching System
-
Google splats device-hijacking exploited-in-the-wild Android kernel bug among others
-
CrowdStrike Releases Root Cause Analysis of Falcon Sensor BSOD Crash
-
Massive Exposure of Illinois Voter Data Raises Security Concerns
-
Security framework to determine whether defenders are winning
-
Palo Alto Networks Zero Trust Platform Featured in New NIST Guidance
-
Breach Debrief Series: EchoSpoofing Phishing Campaign Exploiting Proofpoint’s Email Protection
-
The rise of RaaS; how Copilot can safeguard SMEs from the growing storm of AI-boosted cyberattacks
-
Data Breach: 3 Billion National Public Data Records with SSNs Dumped Online
-
A New Plan to Break the Cycle of Destructive Critical Infrastructure Hacks
-
Congratulations to the MSRC 2024 Most Valuable Security Researchers!
-
New Study Shows GenAI Apps Are Vulnerable To PromptWare Threats
-
Sonic Automotive says ransomware-linked CDK software outage cost it $30M
-
INTERPOL Recovers $41 Million in Largest Ever BEC Scam in Singapore
-
Cyberattack Wipes 13,000 School Devices in Mobile Guardian Breach
-
Cyberattack knocks Mobile Guardian MDM offline and wipes thousands of student devices
-
French Museum Network Hit by Ransomware Attack, but No Disruptions Are Reported at Olympic Events
-
#BHUSA: 17.8m Phishing Emails Detected in First Half of 2024
-
MSPs: Capitalize on the Expanding Opportunities in the Booming MDU Market
-
International Cyber Expo Announces Global Cyber Summit Theme: Resilience
-
Bloody Wolf Strikes Organizations in Kazakhstan with STRRAT Commercial Malware
-
Bad apps bypass Windows security alerts for six years using newly unveiled trick
-
Meet BIX: Your New AI Ally in Cyber Risk and Exposure Management
-
A Survey of Scans for GeoServer Vulnerabilities, (Tue, Aug 6th)
-
Android vulnerability used in targeted attacks patched by Google
-
China’s National Digital ID System Trials Begin Across 80 Internet Service Applications
-
NPCI Announces Full Recovery of Banking Services After Ransomware Incident
-
Cryptonator Seized for Laundering Ransom Payments and Stolen Cryptocurrency
-
North Korean Hackers Exploit VPN Update Flaw To Breach Networks
-
CISA adds Microsoft COM for Windows bug to its Known Exploited Vulnerabilities catalog
-
Salt Security Enhances API Platform with AI-Powered Insights
-
EDR Implementation: Essential Features, Considerations, And Best Practices
-
Fighting Back Against Multi-Staged Ransomware Attacks Crippling Businesses
-
Ransomware gang targets IT workers with new RAT masquerading as IP scanner
-
Men report more pressure and threats to share location and accounts with partners, research shows
-
Securing Data in the AI Era: Introducing Check Point Harmony DLP
-
Cyberattack Cost More Than $17 Million, Key Tronic Tells Regulators
-
North Korean Hackers Exploit VPN Update Flaw to Install Malware
-
Navigating the DORA Landscape with AttackIQ’s Automated Assessment
-
Ransomware gang targets IT workers with new RAT maquerading as IP scanner
-
#BHUSA: Ransom Payments Surge, Organizations Pay Average of $2.5m
-
KnowBe4 establishes 6th August as National Social Engineering Day to honour late Kevin Mitnick
-
Ransomware Gang Targets IT Workers With New SharpRhino Malware
-
Building a Resilient Network and Workload Security Architecture from the Ground Up
-
My Journey of Conservation and Fulfillment: Time2Give with Sea Turtles
-
Cyberattacks Still Ravage Schools, Defying White House Efforts Launched Last Year
-
Safeguarding The Backbone: The Critical Imperative to Protect Operational Technology (OT) Devices
-
Users call on Microsoft to update Outlook’s friendly name feature
-
Abnormal Security Raises $250 Million at $5.1 Billion Valuation
-
North Korean Hackers Moonstone Sleet Push Malicious JS Packages to npm Registry
-
Stellar Cyber launches Multi-Layer AI platform to enhance threat detection
-
Researchers unearth MotW bypass technique used by threat actors for years
-
Hero AI by Swimlane enhances security with context-aware recommendations
-
More Developers are Learning to Code Using AI tools – But That Doesn’t Mean They Trust Them
-
Non-Profit Blood Center OneBlood Recovering from Cripping Ransomware Attack
-
#BHUSA: 99% of Global 2000 Firms Have Recently Breached Vendors
-
Around 20K Ubiquiti IoT Cameras & Routers are Sitting Ducks for Hackers
-
Microsoft Bug Bounty Payouts Increased to $16.6 Million in Past Year
-
SentinelOne unveils AI and cloud innovations on Singularity Platform
-
New Android Spyware LianSpy Evades Detection Using Yandex Cloud
-
Mobile Guardian Hack Leads to 13,000 Student Devices Wiped in Singapore
-
We Make Threat Actors Read Our Resiliency Policy Before Attacking Us
-
TikTok Asks Court To Reject Secret Court Filings In Ban Challenge
-
Google Fixes Android Kernel Zero-Day Exploited in Targeted Attacks
-
APIs, Web Applications Under Siege as Attack Surface Expands
-
Google Patches Android Zero-Day Exploited in Targeted Attacks
-
Billion-dollar bust as international op shutters Cryptonator wallet
-
Resecurity to introduce Context AI, a specialized generative AI framework
-
MDM vendor Mobile Guardian attacked, leading to remote wiping of 13,000 devices
-
Google Patches New Android Kernel Vulnerability Exploited in the Wild
-
Proficio Unveils ProBAS Breach and Attack Simulation Service
-
New Zero-Day Flaw in Apache OFBiz ERP Allows Remote Code Execution
-
Mobile Guardian attacked, leading to remote wiping of 13,000 devices
-
Illinois relaxes biometric privacy law so snafus won’t cost businesses billions
-
AI-fueled phishing scams raise alarm ahead of U.S. presidential election
-
ISC Stormcast For Tuesday, August 6th, 2024 https://isc.sans.edu/podcastdetail/9084, (Tue, Aug 6th)
-
Protecting Your Digital Footprint: A Guide to Data Protection and Privacy Consulting
-
NFL to begin using face scanning tech across all of its stadiums
-
Fake Google Authenticator Sites Exploit Google Ads To Deliver Malware
-
Elon Musk sues OpenAI again, alleging ‘Shakespearean’ betrayal of AI mission
-
Physicists develop new method to combine conventional internet with the quantum internet
-
MSN: Russia takes aim at Sitting Ducks domains, bags 30,000+
-
USENIX Security ’23 – Gradient Obfuscation Gives a False Sense of Security in Federated Learning
-
AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains
-
StormBamboo APT Targets ISPs, Spreads Malware via Software Updates
-
Schools will remove app from students’ Chromebooks and iPads following security breach
-
Vulnerability Recap 8/5/24 – Already-Fixed Flaws Are Still Targeted
-
Why Did Turkey Suddenly Ban Instagram? The Shocking Reason Revealed
-
More Legal Records Stolen in 2023 Than Previous 5 Years Combined
-
That cyber-heist of 2.9B personal records? There’s a class-action lawsuit looming for that
-
IBM Consulting Cybersecurity Assistant helps clients accelerate alert investigation
-
TryCloudflare Exploited In Malicious Campaigns Spreading Malware
-
Google Chrome 127 Stable Release Addressed Multiple Security Bugs
-
Google Chrome To Block Infostealers With App-Bound Encryption
-
Israeli Hacktivist Group Claims it Took Down Iran’s Internet
-
Organizations Fail to Log 44% of Cyberattacks, Major Exposure Gaps Remain
-
Cisco takes a quantum leap ahead to build a more inclusive future
-
US Sues TikTok for Violating Children Privacy Protection Laws
-
National Public Data Sued for Hack that Exposed Data of 2.9 Billion People
-
Black Hat Fireside Chat: Token’s wearable MFA solution combines PKI, biometrics — in a ring
-
SaaS authentication: Identity management with Amazon Cognito user pools
-
332 Million Email Addresses Scraped from SOCRadar.io Published Online
-
Surge in Magniber Ransomware Attacks Impact Home Users Worldwide
-
Hackers Exploit Bytecode Interpreters to Inject Malicious Code
-
Top Tech Conferences & Events to Add to Your Calendar in 2024
-
CrowdStrike Outage Renews Supply Chain Concerns, Federal Officials Say
-
Black Basta Unleashes Custom Malware Following Qakbot Takedown
-
Critical Vulnerability in Apache OFBiz Requires Immediate Patching
-
AWS unveils Mithra to identify and mitigate malicious domains across its massive system
-
White House Officials Meet with Allies, Industry on Connected Car Risks
-
Novel SLUBStick Linux Exploit Gives Attackers Full System Control
-
Sneaky SnakeKeylogger slithers into Windows inboxes to steal sensitive secrets
-
Cisco Umbrella for Government Achieves FedRAMP® “Authority to Operate”
-
Mozilla Follows Google in Distrusting Entrust’s TLS Certificates
-
AI in the Enterprise: Cutting Through the Hype and Assessing Real Risks
-
Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
-
Apple Unveils Homomorphic Encryption Package for Secure Cloud Computing
-
Cryptonator Seized for Laundering Ransom Payments, Stolen Crypto
-
Salt Security Provides Free Scans for XXS Vulnerabilities Involving OAuth Protocol
-
Kazakh Organizations Targeted by ‘Bloody Wolf’ Cyber Attacks
-
Researchers Uncover Flaws in Windows Smart App Control and SmartScreen
-
How AWS tracks the cloud’s biggest security threats and helps shut them down
-
Threat Actor Claiming Breach of Gregory’s Foods 400Gb Database
-
AWS launches Mithra to identify and mitigate malicious domains across its massive system
-
Keytronic incurred approximately $17 million of expenses following ransomware attack
-
CrowdStrike unhappy about Delta’s ‘litigation threat,’ claims airline refused ‘free on-site help’
-
Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) released
-
CrowdStrike trying to use legal threats to suppress criticism and parody of global IT outage
-
Beware Of Fake AI Editor Website That Steals Your Login Credentials
-
Abuse of Cloudflare Tunnel Service for Malware Campaigns Delivering RATs
-
Rapid7 releases Command Platform, unified attack defense and response
-
Ryan Pentney reflects on 10 years of Talos and his many roles from the Sourcefire days
-
Australian Companies Will Soon Need to Report Ransom Payments
-
Apache OFBiz Users Warned of New and Exploited Vulnerabilities
-
TikTok Withdraws Lite Rewards Program from EU Over Child Safety Fears
-
Hackers Abused StackExchange Platform To Deliuver Malicious Python Package
-
Mirai Botnet Attacking Apache OFBiz Directory Traversal Vulnerability
-
Hackers Infect Windows With Backdoor Malware Via “Car For Sale” Ad
-
Exodus Underground Market Place Emerging As A Heaven For Cybercriminals
-
Mint-stealer Targeting web browsers, VPN clients & messaging apps to Steal Logins
-
US Releases Russian Hackers and Spies as Part of Prisoner Swap
-
Chinese hackers compromised an ISP to deliver malicious software updates
-
Newly Identified BITSLOTH Backdoor Uses Novel C2 Communication Channel
-
Tech Support Scam Ring Leader Gets Seven Years in Prison, $6M Fine
-
Security Bypass Vulnerability Exposed in Rockwell Automation Logix Controllers
-
White House and EC-Council Launch $15m Cybersecurity Scholarship Program
-
Hackers Hijacked ISP Service Provider To Poison Software Updates
-
Justice Department Sues TikTok, Accusing the Company of Illegally Collecting Children’s Data
-
Beware Of New BingoMod Android Malware Steals Money & Formats Device
-
5 Amazon Alexa privacy settings you should change right away
-
Researchers Details How Hackers Can Steal Passwords via HDMI Cables
-
New Discord DDoS Campaign Called Panamorfi Targets Vulnerable Jupyter Notebooks
-
US Senate Panel Advances Cyber Regulatory Harmonization Bill
-
Germany Summons Chinese Ambassador Over Cyberattack on Cartography Agency
-
APT Group StormBamboo Attacks ISP Customers Via DNS Poisoning
-
Google Project Astra: The AI Assistant We Have Been Waiting for?
-
Is Australia’s Public Sector Ready for a Major Cyber Security Incident?
-
Leaked Wallpaper Vulnerability Exposes Windows Users to Privilege Escalation Attacks
-
HP Wolf: Not just software attacks; hackers are coming for enterprise hardware, too
-
Industry Moves for the week of August 5, 2024 – SecurityWeek
-
Wristband Releases Public Beta of its B2B Authentication Platform
-
Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access
-
Script obfuscation using multiple instances of the same function, (Mon, Aug 5th)
-
Evasive Panda Compromises ISP to Distribute Malicious Software Updates
-
China starts testing national cyber-ID before consultation on the idea closes
-
China-Linked Hackers Compromise ISP to Deploy Malicious Software Updates
-
New Android Trojan “BlankBot” Targets Turkish Users’ Financial Data
-
How to start your cybersecurity career: Expert tips and guidance
-
How life sciences companies use AI to fill the cybersecurity skills gap
-
Google gamed into advertising a malicious version of Authenticator
-
ISC Stormcast For Monday, August 5th, 2024 https://isc.sans.edu/podcastdetail/9082, (Mon, Aug 5th)
-
Google Delays Plan to Replace Cookies, Leaving Users and Industry in Limbo
-
Generative AI is Closing The Tech Gap Between Security Teams And Threat Actors
-
New Android Malware BingoMod Targets Financial Data and Wipes Devices
-
Basta Ransomware Culprits Revealed by Mandiant Investigation
-
DoJ and FTC Sue TikTok for Violating Children’s Privacy Laws
-
The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth
-
Hackers attempt to sell the personal data of 3 billion people resulting from an April data breach
-
Security Affairs newsletter Round 483 by Pierluigi Paganini – INTERNATIONAL EDITION
-
New Veeam Data Cloud release delivers Microsoft 365 backup and recovery
-
Votiro introduces enhanced data privacy features and integrations
-
OOXML Spreadsheets Protected By Verifier Hashes, (Sat, Aug 3rd)
-
Week in review: VMware ESXi zero-day exploited, SMS Stealer malware targeting Android users
-
Top 10 Mimecast DMARC Analyzer Alternatives and Competitors in 2024
Generated on 2024-08-11 23:58:24.483089