Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Google has released emergency updates to fix another Chrome zero-day vulnerability exploited in the wild, the eighth patched since the...
Day: December 21, 2023
Crypto scammers abuse Twitter ‘feature’ to impersonate high-profile accounts – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Cryptocurrency scammers are abusing a legitimate Twitter “feature” to promote scams, fake giveaways, and fraudulent Telegram channels used to steal...
New phishing attack steals your Instagram backup codes to bypass 2FA – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A new phishing campaign pretending to be a ‘copyright infringement’ email attempts to steal the backup codes of Instagram users,...
Ivanti releases patches for 13 critical Avalanche RCE flaws – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Ivanti has released security updates to fix 13 critical security vulnerabilities in the company’s Avalanche enterprise mobile device management (MDM)...
BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Megan Crouse on December 20, 2023, 4:15 PM EST BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort The ransomware group, which has...
Top 7 Cybersecurity Threats for 2024 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Ray Fernandez The rise and rapid adoption of new innovative technologies, such as generative artificial intelligence, no-code apps, automation and the Internet...
Cost of a Data Breach Report 2023: Insights, Mitigators and Best Practices – Source:thehackernews.com
Source: thehackernews.com – Author: . John Hanley of IBM Security shares 4 key findings from the highly acclaimed annual Cost of a Data Breach Report 2023...
German Authorities Dismantle Dark Web Hub ‘Kingdom Market’ in Global Operation – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 21, 2023NewsroomDark Web / Cybercrime German law enforcement has announced the disruption of a dark web platform called Kingdom Market...
Hackers Exploiting Old MS Excel Vulnerability to Spread Agent Tesla Malware – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 21, 2023NewsroomVulnerability / Phishing Attack Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute...
Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild – Update ASAP – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 21, 2023NewsroomVulnerability / Zero-Day Google has rolled out security updates for the Chrome web browser to address a high-severity zero-day...
Windows CLFS and five exploits used by ransomware operators (Exploit #4 – CVE-2023-23376) – Source: securelist.com
Source: securelist.com – Author: Boris Larin This is part five of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows...
Windows CLFS and five exploits used by ransomware operators (Exploit #3 – October 2022) – Source: securelist.com
Source: securelist.com – Author: Boris Larin Reports In this report Kaspersky researchers provide an analysis of the previously unknown HrServ web shell, which exhibits both APT...
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022) – Source: securelist.com
Source: securelist.com – Author: Boris Larin Research Research 21 Dec 2023 minute read This is the third part of our study about the Common Log File...
Windows CLFS and five exploits used by ransomware operators – Source: securelist.com
Source: securelist.com – Author: Boris Larin In April 2023, we published a blog post about a zero-day exploit we discovered in ransomware attacks that was patched...
Windows CLFS and five exploits used by ransomware operators (Exploit #1 – CVE-2022-24521) – Source: securelist.com
Source: securelist.com – Author: Boris Larin This is the second part of our study about the Common Log File System (CLFS) and five vulnerabilities in this...
Windows CLFS and five exploits used by ransomware operators (Exploit #5 – CVE-2023-28252) – Source: securelist.com
Source: securelist.com – Author: Boris Larin This is part six of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows...
Smashing Security podcast #353: Phone hacking, Piers Morgan, and Carole’s Christmas cockup – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Piers Morgan is less than happy after a judgement that there is “no doubt” he knew phone hacking was going...
ALPHV/BlackCat ransomware operation disrupted, but criminals threaten more attacks – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The US Department of Justice has announced that it has disrupted the operations of the ALPHV ransomware group, and seized...
A roundup of 2024 predictions, CISO insights – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: The cyber security landscape is transforming at an exciting, yet sometimes unnerving pace. As the landscape becomes both broad...
ISAs and the Dawning Hardware Security Revolution – Source: www.darkreading.com
Source: www.darkreading.com – Author: Ed Maste Source: ChiccoDodiFC via Alamy Stock Photo The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually...
What’s the Best Way to Communicate After a Data Breach? – Source: www.darkreading.com
Source: www.darkreading.com – Author: Edge Editors Source: DPD ImageStock via Alamy Stock Photo Question: How can organizations effectively communicate with users and external stakeholders in a...
Console & Associates, P.C.: ESO Solutions Notifies 2.7M People of Data Breach That Leaked Their SSNs – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE MARLTON, N.J., Dec. 20, 2023 /PRNewswire/ — Approximately 2.7 million patients are being notified that their Social Security numbers and other confidential information were compromised...
Black Hat Europe 2023 Closes on Record-Breaking Event in London – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE LONDON, Dec. 20, 2023 — Black Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the...
Defiant BlackCat Gang Stands Up New Site, Calls for Revenge Attacks – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Editor, Dark Reading 2 Min Read Source: Sari O’Neal via Alamy Stock Photo BlackCat/ALPHV ransomware leaders claim they have restarted...
Physical Access Systems Open Cyber Door to IT Networks – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading 2 Min Read Source: Stephen Barnes Technology via Alamy Stock Photo Cyberattackers can exploit access...
Iranian ‘Seedworm’ Cyber Spies Target African Telcos & ISPs – Source: www.darkreading.com
Source: www.darkreading.com – Author: John Leyden Source: Denis Crawford via Alamy Stock Photo An Iran-backed cyberespionage group is actively targeting telcos in North and East Africa....
Attackers Exploit 6-Year-Old Microsoft Office Bug to Spread Spyware – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Source: Robert Brown via Alamy Stock Photo Attackers are exploiting a 6-year-old Microsoft Office remote code execution (RCE)...
Targeted F5 Vulnerability ‘Update’ Delivers Wiper to Israeli Victims – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff Source: Ragma Images via Alamy Stock Photo Israel’s National Cyber Directorate (NCD) has issued an “urgent warning” about a targeted email...
3 Ways to Use Real-Time Intelligence to Defeat Bots – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nick Rieniets Source: Brain light via Alamy Stock Photo In the classic sci-fi film Blade Runner, bounty hunter Rick Deckard is tasked...
Google addressed a new actively exploited Chrome zero-day – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Google addressed a new actively exploited Chrome zero-day Pierluigi Paganini December 20, 2023 Google has released emergency updates to address...