Source: www.securityweek.com – Author: Ionut Arghire Real Estate Wealth Network database containing real estate ownership data, including for celebrities and politicians, was found unprotected. The post...
Year: 2023
ESET Patches High-Severity Vulnerability in Secure Traffic Scanning Feature – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs ESET has patched CVE-2023-5594, a high-severity vulnerability that can cause a browser to trust websites that should not be trusted....
ESO Solutions Data Breach Impacts 2.7 Million Individuals – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire ESO Solutions is informing 2.7 million individuals of a data breach impacting their personal and health information. The post ESO...
Ivanti Patches Dozen Critical Vulnerabilities in Avalanche MDM Product – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Ivanti has patched 20 vulnerabilities in its Avalanche MDM product, including a dozen remote code execution flaws rated critical. The...
FTC Proposes Strengthening Children’s Online Privacy Rules to Address Tracking, Push Notifications – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press The FTC has proposed strengthening children’s online privacy rules to address tracking and push notifications. The post FTC Proposes Strengthening...
Google Rushes to Patch Eighth Chrome Zero-Day This Year – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Google warns of in-the-wild exploitation of CVE-2023-7024, a new Chrome vulnerability, the eighth documented this year. The post Google Rushes...
SimSpace Scores $45 Million Investment to Expand Cyber Range Tech Markets – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine The new round of financing was led by L2 Point Management and brings the total raised by Boston-based SimSpace to...
Cyberattack on Ukraine’s Kyivstar Seems to Be Russian Hacktivists – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier &ers • December 21, 2023 8:35 AM @ALL Just for the record – it isn’t yet all good with Kyivstar....
Fake F5 BIG-IP zero-day warning emails push data wipers – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams The Israel National Cyber Directorate warns of phishing emails pretending to be F5 BIG-IP zero-day security updates that deploy Windows...
Google fixes 8th Chrome zero-day exploited in attacks this year – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Google has released emergency updates to fix another Chrome zero-day vulnerability exploited in the wild, the eighth patched since the...
Crypto scammers abuse Twitter ‘feature’ to impersonate high-profile accounts – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Cryptocurrency scammers are abusing a legitimate Twitter “feature” to promote scams, fake giveaways, and fraudulent Telegram channels used to steal...
New phishing attack steals your Instagram backup codes to bypass 2FA – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A new phishing campaign pretending to be a ‘copyright infringement’ email attempts to steal the backup codes of Instagram users,...
Ivanti releases patches for 13 critical Avalanche RCE flaws – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Ivanti has released security updates to fix 13 critical security vulnerabilities in the company’s Avalanche enterprise mobile device management (MDM)...
BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Megan Crouse on December 20, 2023, 4:15 PM EST BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort The ransomware group, which has...
Top 7 Cybersecurity Threats for 2024 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Ray Fernandez The rise and rapid adoption of new innovative technologies, such as generative artificial intelligence, no-code apps, automation and the Internet...
Cost of a Data Breach Report 2023: Insights, Mitigators and Best Practices – Source:thehackernews.com
Source: thehackernews.com – Author: . John Hanley of IBM Security shares 4 key findings from the highly acclaimed annual Cost of a Data Breach Report 2023...
German Authorities Dismantle Dark Web Hub ‘Kingdom Market’ in Global Operation – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 21, 2023NewsroomDark Web / Cybercrime German law enforcement has announced the disruption of a dark web platform called Kingdom Market...
Hackers Exploiting Old MS Excel Vulnerability to Spread Agent Tesla Malware – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 21, 2023NewsroomVulnerability / Phishing Attack Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute...
Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild – Update ASAP – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 21, 2023NewsroomVulnerability / Zero-Day Google has rolled out security updates for the Chrome web browser to address a high-severity zero-day...
Windows CLFS and five exploits used by ransomware operators (Exploit #4 – CVE-2023-23376) – Source: securelist.com
Source: securelist.com – Author: Boris Larin This is part five of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows...
Windows CLFS and five exploits used by ransomware operators (Exploit #3 – October 2022) – Source: securelist.com
Source: securelist.com – Author: Boris Larin Reports In this report Kaspersky researchers provide an analysis of the previously unknown HrServ web shell, which exhibits both APT...
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022) – Source: securelist.com
Source: securelist.com – Author: Boris Larin Research Research 21 Dec 2023 minute read This is the third part of our study about the Common Log File...
Windows CLFS and five exploits used by ransomware operators – Source: securelist.com
Source: securelist.com – Author: Boris Larin In April 2023, we published a blog post about a zero-day exploit we discovered in ransomware attacks that was patched...
Windows CLFS and five exploits used by ransomware operators (Exploit #1 – CVE-2022-24521) – Source: securelist.com
Source: securelist.com – Author: Boris Larin This is the second part of our study about the Common Log File System (CLFS) and five vulnerabilities in this...
Windows CLFS and five exploits used by ransomware operators (Exploit #5 – CVE-2023-28252) – Source: securelist.com
Source: securelist.com – Author: Boris Larin This is part six of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows...
Smashing Security podcast #353: Phone hacking, Piers Morgan, and Carole’s Christmas cockup – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Piers Morgan is less than happy after a judgement that there is “no doubt” he knew phone hacking was going...
ALPHV/BlackCat ransomware operation disrupted, but criminals threaten more attacks – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The US Department of Justice has announced that it has disrupted the operations of the ALPHV ransomware group, and seized...
A roundup of 2024 predictions, CISO insights – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: The cyber security landscape is transforming at an exciting, yet sometimes unnerving pace. As the landscape becomes both broad...
ISAs and the Dawning Hardware Security Revolution – Source: www.darkreading.com
Source: www.darkreading.com – Author: Ed Maste Source: ChiccoDodiFC via Alamy Stock Photo The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually...
What’s the Best Way to Communicate After a Data Breach? – Source: www.darkreading.com
Source: www.darkreading.com – Author: Edge Editors Source: DPD ImageStock via Alamy Stock Photo Question: How can organizations effectively communicate with users and external stakeholders in a...






















