Source: www.securityweek.com – Author: Ionut Arghire Google has pushed a major Chrome browser update to patch three vulnerabilities, including two high-severity memory safety bugs reported by...
Author: CISO2CISO Editor 2
Now on Demand: Inside a Hacker’s Playbook – How Cybercriminals Use Deepfakes – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News Ever wonder how cybercriminals infiltrate payment systems and steal funds? Join SecurityWeek and Rachel Tobac, ethical hacker and CEO of...
Atlassian, Splunk Patch High-Severity Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Atlassian and Splunk on Tuesday announced patches for more than two dozen vulnerabilities across their product portfolios, including multiple high-severity...
Cleo Vulnerability Exploitation Linked to Termite Ransomware Group – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A recently emerged ransomware group named Termite may be behind the recent attacks exploiting a vulnerability in file transfer tools...
Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography Migration – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend Forget the 10 septillion years needed for a classical computer to solve this problem, and focus instead on the falling...
Cardiac surgery device manufacturer falls prey to ransomware – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 11 Dec 20242 mins CyberattacksHealthcare IndustryRansomware Ransomware attack hits administrative processes at Artivion and hinders delivery of important medical equipment. The...
Microsoft secretly stopped actors from snooping on your MFA codes – Source: www.csoonline.com
Source: www.csoonline.com – Author: The issue could allow threat actors to brute force MFA authentication codes for Outlook, Teams, and Azure access with 50% accuracy. Microsoft...
Hersteller von Geräten für die Herzchirurgie angegriffen – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 11 Dezember 20243 Minuten Ransomware-Angriff trifft Verwaltungsabläufe bei Artivion und behindert die Auslieferung wichtiger medizinischer Ausrüstung. Cyberkriminelle üben immer häufiger Druck...
Rumänien kommt digital weiterhin nicht zur Ruhe – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 11 Dezember 20242 Minuten Rumänischer Energieversorger Electrica von Ransomware-Angriff betroffen. Nehmen die Russen Rache an Rumänien für die gescheiterte Wahl „ihres“...
Salt Typhoon poses a serious supply chain risk to most organizations – Source: www.csoonline.com
Source: www.csoonline.com – Author: The Salt Typhoon intrusion gives China a chance to exfiltrate massive amounts of data from most organizations, especially voice calls that can...
Bug bounty programs can deliver significant benefits, but only if you’re ready – Source: www.csoonline.com
Source: www.csoonline.com – Author: Bug bounty programs can be a big boon to software security and provide expanded vulnerability visibility, but they’re not for all organizations...
ISO und ISMS: Darum gehen Security-Zertifizierungen schief – Source: www.csoonline.com
Source: www.csoonline.com – Author: Bei der ISO-Zertifizierung von Unternehmen können vielfältige Probleme auftreten. Welche das sind und wie Lösungen dazu aussehen können, erfahren Sie in diesem...
US sanctions Chinese cybersecurity firm over global malware campaign – Source: www.csoonline.com
Source: www.csoonline.com – Author: Sichuan Silence and employee accused of exploiting firewall vulnerabilities in 2020. The US government has imposed sanctions on Chinese cybersecurity firm Sichuan...
Attackers exploit zero-day RCE flaw in Cleo managed file transfer – Source: www.csoonline.com
Source: www.csoonline.com – Author: The exploit takes advantage of a known file upload vulnerability that was not efficiently patched and can still be exploited in up-to-date...
Secret Blizzard Targets Ukrainian Military with Custom Malware – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Russian state threat actor Secret Blizzard has leveraged resources and tools used by other cyber groups to support the Kremlin’s military efforts...
Sophisticated Scam Targets UAE Residents with Fake Police Fines – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A large-scale scam campaign impersonating UAE law enforcement and exploiting citizen trust has been uncovered by security researchers. The fraudulent scheme, which...
Cyber Incident Disrupting Krispy Kreme Online Orders – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Krispy Kreme has been hit by a cyber-incident which is disrupting operations including online orders, the firm has reported in a filing...
South Korea Takes Down Fraudulent Online Trading Network Used to Extort $6.3M – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A South Korean law enforcement operation has taken down a large-scale fraud network that extorted $6.3m from victims with fake online trading...
Microsoft Azure MFA Flaw Allowed Easy Access Bypass – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A vulnerability in Microsoft’s Multi-Factor Authentication (MFA) system has left millions of accounts susceptible to unauthorized access. Exploited successfully, the flaw could...
Operation PowerOFF Takes Down DDoS Boosters – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by Global law enforcement agencies have seized 27 popular platforms used to launch Distributed Denial-of-Service (DDoS) attacks to take websites offline....
US Sanctions Chinese Firm at Center of Global Firewall Hack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The US government has sanctioned a Chinese cybersecurity company and one of its employees for their involvement in the large-scale compromise of...
Microsoft Fixes 71 CVEs Including Actively Exploited Zero-Day – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Microsoft issued patches for scores of vulnerabilities in its December Patch Tuesday yesterday, including one that is currently being exploited by threat...
Hackers Exploit Misconfigurations in Public Websites With Improperly Exposed AWS Credentials – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A significant cyber operation exploiting vulnerabilities in improperly configured public websites has been linked to the Nemesis and ShinyHunters hacking groups, exposing sensitive data,...
OpenAI’s Sora: Everything You Need to Know – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Megan Crouse OpenAI released its video generator Sora to select tiers of ChatGPT users on Dec. 9 as part of the cascade...
A Cloud Reality Check for Federal Agencies – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team The move to cloud is not slowing down – spending by Federal civilian agencies on cloud computing could reach $8.3 billion in...
Financial Sector Turning to Multi-Cloud Strategies – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Cloud Security , Finance & Banking , Industry Specific Report: Financial Orgs Shift to Multi-Cloud to Address Cyberthreats and Regulation Chris Riotta...
Citrix Acquisitions Boost Zero Trust Defense for Hybrid Work – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Governance & Risk Management , Remote Workforce , Zero Trust deviceTRUST, Strong Network Acquisitions Improve Zero Trust, Developer Protections Michael Novinson (MichaelNovinson)...
OpenWrt Update Flaw Exposed Devices to Malicious Firmware – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Endpoint Security , Internet of Things Security Flaw in Embedded Device Operating System Allowed Hackers to Bypass Integrity Check Anviksha More (AnvikshaMore)...
Hospital Notifies 316,000 of Breach in Christmas 2023 Hack – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Breach Notification , Fraud Management & Cybercrime , Healthcare Cybercriminal Gang ‘Money Message’ Claims Credit, Publishes Stolen Records Marianne Kolbasuk McGee (HealthInfoSec)...
More Than Bounty: Beating Burnout with Hacker-Powered Security – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. A career in security is hardly dull or static. Nor would those attracted to the industry want it to be. On...




















