Source: www.troyhunt.com – Author: Troy Hunt I fell waaay behind the normal video cadence this week, and I couldn’t care less 😊 I mean c’mon, would...
Day: December 25, 2024
WhatsApp Wins Lawsuit Against Israeli Spyware Maker NSO Group – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. SUMMARY NSO Group Held Accountable: A U.S. court ruled against NSO Group for hacking WhatsApp accounts, violating U.S. law and...
The Fintech Wild West: Why Preventive Cybersecurity Is Essential for Survival – Source:hackread.com
Source: hackread.com – Author: Owais Sultan. Fintech thrives on innovation, but cybersecurity requires a proactive approach. AI, predictive intelligence, and tailored strategies safeguard against risks, ensuring...
Multiple Cisco Products Snort Rate Filter Bypass Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Multiple Cisco Products Snort Rate Filter Bypass Vulnerability Medium CVE-2024-20342 CWE-1025 Download CSAF Email Summary Multiple Cisco products are affected by...
Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability Medium CVE-2024-20407 CWE-399 Download CSAF Email Summary A vulnerability...
Spyware Maker NSO Group Found Liable for Hacking WhatsApp – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Spyware Maker NSO Group Found Liable for Hacking WhatsApp A judge has found that NSO Group, maker of the...
Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have discovered several security flaws in the cloud management platform developed by Ruijie Networks that could permit an attacker...
Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now – Source:thehackernews.com
Source: thehackernews.com – Author: . The Apache Software Foundation (ASF) has shipped security updates to address a critical security flaw in Traffic Control that, if successfully...
Iran’s Charming Kitten Deploys BellaCPP: A New C++ Variant of BellaCiao Malware – Source:thehackernews.com
Source: thehackernews.com – Author: . The Iranian nation-state hacking group known as Charming Kitten has been observed deploying a C++ variant of a known malware called...
10 essenzielle Maßnahmen für physische Sicherheit – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die physische Sicherheit von Gebäudekomplexen und Geräten zu gewährleisten, kann ebenso herausfordernd sein wie Cyberbedrohungen abzuwehren. Wenn physische Security nur immer so...
The 2024 cyberwar playbook: Tricks used by nation-state actors – Source: www.csoonline.com
Source: www.csoonline.com – Author: Beyond the usual playbook, nation-state actors in 2024 relied on a mix of advanced tactics, including sophisticated backdoors and stealthy LOTL, to...
Adobe is aware that ColdFusion bug CVE-2024-53961 has a known PoC exploit code – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 24, 2024 Adobe released out-of-band security updates to address a critical ColdFusion vulnerability, experts warn of a PoC...
Apache Foundation fixed a severe Tomcat vulnerability – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 24, 2024 The Apache Software Foundation fixed a Tomcat server software flaw that could lead to remote...
The AI Fix #30: ChatGPT reveals the devastating truth about Santa (Merry Christmas!) – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content In episode 30 of The AI Fix, AIs are caught lying to avoid being turned off, Apple’s...
FBI Blames North Korea for $308M Cryptocurrency Hack as Losses Surge in 2024 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine The Federal Bureau of Investigation (FBI) is publicly blaming North Korean government hackers for a $308 million cryptocurrency heist from...
American Addiction Centers Data Breach Impacts 422,000 People – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire American Addiction Centers is notifying more than 422,000 people that their personal information was stolen in a recent data breach....
2025 NDAA Provides $3 Billion Funding for FCC’s Rip-and-Replace Program – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The 2025 National Defense Authorization Act (NDAA), signed into law by President Biden on Monday, authorizes several cyber-related initiatives, including...
Adobe Patches ColdFusion Flaw at High Risk of Exploitation – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Adobe on Monday warned that proof-of-concept (PoC) code exists for a fresh ColdFusion vulnerability. Tracked as CVE-2024-53961 (CVSS score of...
Postman Workspaces Leak 30000 API Keys and Sensitive Tokens – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. SUMMARY 30,000 Public Workspaces Exposed: CloudSEK identifies massive data leaks from Postman workspaces. Sensitive Data at Risk: Leaks include API...
How Androxgh0st rose from Mozi’s ashes to become ‘most prevalent malware’ – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons After the Mozi botnet mysteriously disappeared last year, a new and seemingly more powerful botnet, Androxgh0st, rose from its ashes...
What do ransomware and Jesus have in common? A birth month and an unwillingness to die – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Feature Your Christmas holidays looked quite different in the ’80s to how they do today. While some will remember what...
One third of adults can’t delete device data – Source: go.theregister.com
Source: go.theregister.com – Author: Richard Speed The UK’s Information Commissioner’s Office (ICO) has warned that many adults don’t know how to wipe their old devices, and...
Unmasking the Risks: Auditing Your Web Pixel Usage – Source: securityboulevard.com
Source: securityboulevard.com – Author: mykola myroniuk In our last post, we discussed the powerful, yet potentially risky nature of web pixels. Now, let’s dive into how...
Best of 2024: Gmail Error: Email Blocked Because Sender is Unauthenticated – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yunes Tarada Reading Time: 7 min Attention users! Gmail has officially started rolling out Google email sender policies for 2024, and users...
DEF CON 32 – What To Expect When You’re Exploiting: 0Days, Baby Monitors & Wi-Fi Cams – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Home » Security Bloggers Network » DEF CON 32 – What To Expect When You’re Exploiting: 0Days, Baby Monitors &...
Randall Munroe’s XKCD ‘D Roll’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers...
DEF CON 32 – Your Smartcard Is Dumb: A Brief History Of Hacking Access Control Systems – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Tuesday, December 24, 2024 Home » Security Bloggers Network » DEF CON 32 – Your Smartcard Is Dumb: A Brief...
Best of 2024: An Accidental Discovery of a Backdoor Likely Prevented Thousands of Infections – Source: securityboulevard.com
Source: securityboulevard.com – Author: Mike Larkin Yesterday’s discovery of the xz backdoor was an accident. But what a fortunate accident it was. The actor (or actors,...
PowerDMARC in 2024: A Year in Review – Source: securityboulevard.com
Source: securityboulevard.com – Author: Ahona Rudra As we close out 2024, PowerDMARC stands stronger than ever. This year marked a host of milestones that highlight our...
5 Common DNS Vulnerabilities and How to Protect Your Network – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yunes Tarada DNS vulnerabilities are often overlooked in cybersecurity strategies, despite DNS being a “phonebook” of the internet. DNS enables seamless interaction...