H  January(103)  February(113)  March(175)  APRIL(74)  MAY(28)  JUNE(198)  July(423)  August(462)  September(389)  October(48)  November()  December()

DATE

NAME

CATEGORY

WEB

31.8.23IT threat evolution in Q2 2023. Mobile statisticsCyberSecurelist
31.8.23IT threat evolution in Q2 2023CyberSecurelist
31.8.23IT threat evolution in Q2 2023. Non-mobile statisticsCyberSecurelist
31.8.23Paramount discloses data breach following security incidentIncindentBleepingComputer
31.8.23Windows 11 browser change: Europe applauds, outrage everywhere elseOSBleepingComputer
31.8.23Apple opens 2024 applications to get ‘security research’ iPhonesAppleBleepingComputer
31.8.23WordPress migration add-on flaw could lead to data breachesIncindentBleepingComputer
31.8.23VMware Aria vulnerable to critical SSH authentication bypass flawVulnerebilityBleepingComputer
31.8.23Hacking campaign bruteforces Cisco VPNs to breach networksHackBleepingComputer
31.8.23Trojanized Signal and Telegram apps on Google Play delivered spywareAndroidBleepingComputer
31.8.23

Hackers Can Exploit Windows Container Isolation Framework to Bypass Endpoint Security

ExploitThe Hacker News
31.8.23

MMRat Android Trojan Executes Remote Financial Fraud Through Accessibility Feature

AndroidThe Hacker News
31.8.23

China-Linked BadBazaar Android Spyware Targeting Signal and Telegram Users

AndroidThe Hacker News
31.8.23

How to Prevent ChatGPT From Stealing Your Content & Traffic

AIThe Hacker News
30.8.23

Why are we seeing such a huge demand for AI at the moment?

AISecurityaffairs
30.8.23

Critical RCE flaw impacts VMware Aria Operations Networks

VulnerebilitySecurityaffairs
30.8.23FBI: Operation 'Duck Hunt' dismantled the Qakbot botnetBigBrothersSecurityaffairs
30.8.23UNC4841 threat actors hacked US government email servers exploiting Barracuda ESG flawVulnerebilitySecurityaffairs
30.8.23FIN8-linked actor targets Citrix NetScaler systemsHackSecurityaffairs
30.8.23Japan's JPCERT warns of new 'MalDoc in PDF' attack techniqueHackSecurityaffairs
30.8.23Attackers can discover IP address by sending a link over the Skype mobile appHackSecurityaffairs
30.8.23Researchers published PoC exploit code for Juniper SRX firewall flawsExploitSecurityaffairs
30.8.23How the FBI nuked Qakbot malware from infected Windows PCsVirusBleepingComputer
30.8.23DreamBus malware exploits RocketMQ flaw to infect serversVirusBleepingComputer
30.8.23New Android MMRat malware uses Protobuf protocol to steal your dataAndroidBleepingComputer
30.8.23Qakbot botnet dismantled after infecting over 700,000 computersBotNetBleepingComputer
30.8.23Microsoft adds HSTS support to Exchange Server 2016 and 2019SecurityBleepingComputer
30.8.23Hackers exploit critical Juniper RCE bug chain after PoC releaseExploitBleepingComputer
30.8.23University of Michigan shuts down network after cyberattackHackBleepingComputer
30.8.23Genshin Impact dev will sue Kaveh Hacks users and developersHackBleepingComputer
30.8.23US govt email servers hacked in Barracuda zero-day attacksBigBrothersBleepingComputer
30.8.23Malicious npm Packages Aim to Target Developers for Source Code TheftVirusThe Hacker News
30.8.23Alert: Juniper Firewalls, Openfire, and Apache RocketMQ Under Attack from New ExploitsExploitThe Hacker News
30.8.23Critical Vulnerability Alert: VMware Aria Operations Networks at Risk from Remote AttacksVulnerebilityThe Hacker News
30.8.23FBI Dismantles QakBot Malware, Frees 700,000 Computers, Seizes $8.6 MillionBigBrothersThe Hacker News
30.8.23Chinese Hacking Group Exploits Barracuda Zero-Day to Target Government, Military, and TelecomExploitThe Hacker News
30.8.23DarkGate Malware Activity Spikes as Developer Rents Out Malware to AffiliatesVirusThe Hacker News
29.8.23

Why LaZagne Makes D-Bus API Vigilance Crucial

Cyber blogPalo Alto
29.8.23

Crossing the Line: Unit 42 Wireshark Quiz for RedLine Stealer

Malware blogPalo Alto
29.8.23

28TH AUGUST – THREAT INTELLIGENCE REPORT

Cyber blogCheckpoint
29.8.23

TUNNEL WARFARE: EXPOSING DNS TUNNELING CAMPAIGNS USING GENERATIVE MODELS – COINLOADER CASE STUDY

Cyber blog

Checkpoint

29.8.23

2023 Mid-Year Cyber Security Report: Report Reveals 48 Ransomware Groups Have Breached Over 2,200 Victims

Ransom blog

Checkpoint

29.8.23

The Rhysida Ransomware: Activity Analysis and Ties to Vice Society

Ransom blog

Checkpoint

29.8.23

What is commercial spyware?

Malware blog

Cisco Blog

29.8.23

What Cisco Talos knows about the Rhysida ransomware

Ransom blog

Cisco Blog

29.8.23

Six critical vulnerabilities included in August’s Microsoft security update

Vulnerebility blog

Cisco Blog

29.8.23

Code leaks are causing an influx of new ransomware actors

Ransom blog

Cisco Blog

29.8.23

New threat actor targets Bulgaria, China, Vietnam and other countries with customized Yashma ransomware

BigBrother blog

Cisco Blog

29.8.23Previewing Talos at BlackHat 2023Cyber blogCisco Blog
29.8.23Attacks on Citrix NetScaler systems linked to ransomware actorRansomBleepingComputer
29.8.23MalDoc in PDFs: Hiding malicious Word docs in PDF filesVirusBleepingComputer
29.8.23Microsoft will enable Exchange Extended Protection by default this fallSecurityBleepingComputer
29.8.23Spain warns of LockBit Locker ransomware phishing attacksRansomBleepingComputer
29.8.23Microsoft blames ‘unsupported processor’ blue screens on OEM vendorsOSBleepingComputer
29.8.23Exploit released for Juniper firewall bugs allowing RCE attacksExploitBleepingComputer
29.8.23Mom’s Meals discloses data breach impacting 1.2 million peopleIncindentBleepingComputer
29.8.23Citrix NetScaler Alert: Ransomware Hackers Exploiting Critical VulnerabilityRansomThe Hacker News
29.8.23Phishing-as-a-Service Gets Smarter: Microsoft Sounds Alarm on AiTM AttacksPhishingThe Hacker News
28.8.23Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?Attack blog

Eset

28.8.23How a Telegram bot helps scammers target victims – Week in security with Tony AnscombeSocial blog

Eset

28.8.23Telekopye: Hunting Mammoths using Telegram botBotNet blog

Eset

28.8.23Scarabs colon-izing vulnerable serversVulnerebility blog

Eset

28.8.23A Bard’s Tale – how fake AI bots try to install malwareMalware blog

Eset

28.8.23Cyber blogCyber blog

Eset

28.8.23DEF CON 31: US DoD urges hackers to go and hack ‘AI’Cyber blog

Eset

28.8.23Mass-spreading campaign targeting Zimbra usersCyber blog

Eset

28.8.23DEF CON 31: Robot vacuums may be doing more than they claimCyber blog

Eset

28.8.23Black Hat 2023: Hacking the police (at least their radios)Cyber blog

Eset

28.8.23Black Hat 2023: How AI changes the monetization of searchCyber blog

Eset

28.8.23Black Hat 2023: AI gets big defender prize moneyCyber blog

Eset

28.8.23Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligenceCyber blog

Eset

28.8.2320k security folks in the desert – Week in security with Tony AnscombeCyber blog

Eset

28.8.23Black Hat 2023: Cyberwar fire-and-forget-me-notCyber blog

Eset

28.8.23MoustachedBouncer: Espionage against foreign diplomats in BelarusBigBrother blog

Eset

28.8.23Time is money, and online game scammers have lots of itPhishing blog

Eset

28.8.23Experts Uncover How Cybercriminals Could Exploit Microsoft Entra ID for Elevated PrivilegeExploitThe Hacker News
28.8.23Developers Beware: Malicious Rust Libraries Caught Transmitting OS Info to Telegram ChannelVirusThe Hacker News
28.8.23Rhysida claims ransomware attack on Prospect Medical, threatens to sell dataRansomBleepingComputer
28.8.23Microsoft wants you to learn more about new features in Windows 11OSBleepingComputer
28.8.23Rhysida ransomware group claims the hack of Prospect MedicalRansomSecurityaffairs
28.8.23Updated Kmsdx botnet targets IoT devicesBotNetSecurityaffairs
28.8.23Massive MOVEit campaign already impacted at least 1,000 organizations and 60 million individualsHackSecurityaffairs
28.8.23Poland's authorities investigate a hacking attack on country's railwaysBigBrothersSecurityaffairs
28.8.23Leaked LockBit 3.0 ransomware builder used by multiple threat actorsRansomSecurityaffairs
28.8.23Cisco fixes 3 high-severity DoS flaws in NX-OS and FXOS softwareVulnerebilitySecurityaffairs
28.8.23KmsdBot Malware Gets an Upgrade: Now Targets IoT Devices with Enhanced CapabilitiesVirusThe Hacker News
27.8.23Cloud and hosting provider Leaseweb took down critical systems after a cyber attackHackSecurityaffairs
27.8.23LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New VariantsRansomThe Hacker News
26.8.23Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping AttackIncindentThe Hacker News
26.8.23Two LAPSUS$ Hackers Convicted in London Court for High-Profile Tech Firm HacksHackThe Hacker News
26.8.23Phishing with hacked sitesPhishingSecurelist
26.8.23Lockbit leak, research opportunities on tools leaked from TAsRansomSecurelist
26.8.23China-linked Flax Typhoon APT targets TaiwanAPTSecurityaffairs
26.8.23Whiffy Recon malware triangulates the position of infected systems via Wi-FiVirusSecurityaffairs
26.8.23FBI: Patches for Barracuda ESG Zero-Day CVE-2023-2868 are ineffectiveVulnerebilitySecurityaffairs
26.8.23Researchers released PoC exploit for Ivanti Sentry flaw CVE-2023-38035ExploitSecurityaffairs
26.8.23Lazarus APT exploits Zoho ManageEngine flaw to target an Internet backbone infrastructure providerAPTSecurityaffairs
26.8.23Lapsus$ member has been convicted of having hacked multiple high-profile companiesHackSecurityaffairs
26.8.23More than 3,000 Openfire servers exposed to attacks using a new exploitExploitSecurityaffairs
26.8.23DoJ charged Tornado Cash founders with laundering more than $1 billionBigBrothersSecurityaffairs
26.8.23FBI identifies wallets holding cryptocurrency funds stolen by North KoreaCryptocurrencySecurityaffairs
25.8.23Data breach at French govt agency exposes info of 10 million peopleIncindentBleepingComputer
25.8.23MSI: Recent wave of Windows blue screens linked to MSI motherboardsOSBleepingComputer
25.8.23ICO calls social media firms to protect people's data from scrapingSocialBleepingComputer
25.8.23Microsoft: Stealthy Flax Typhoon hackers use LOLBins to evade detectionHackBleepingComputer
25.8.23Leaseweb is restoring ‘critical’ systems after security breachIncindentBleepingComputer
25.8.23Kroll data breach exposes info of FTX, BlockFi, Genesis creditorsIncindentBleepingComputer
25.8.23FBI warns of patched Barracuda ESG appliances still being hackedVulnerebilityBleepingComputer
25.8.23Ransomware hackers dwell time drops to 5 days, RDP still widely usedRansomBleepingComputer
25.8.23Jupiter X Core WordPress plugin could let hackers hijack sitesHackBleepingComputer
25.8.23New Windows updates cause UNSUPPORTED_PROCESSOR blue screensOSBleepingComputer
25.8.23New Whiffy Recon malware uses WiFi to triangulate your locationVirusBleepingComputer
25.8.23Exploit released for Ivanti Sentry bug abused as zero-day in attacksExploitBleepingComputer
25.8.23Hackers use public ManageEngine exploit to breach internet orgExploitBleepingComputer
25.8.23Lapsus$ teen hackers convicted of high-profile cyberattacksAttackBleepingComputer
25.8.23Windows 10 KB5029331 update introduces a new Backup appOSBleepingComputer
25.8.23Over 3,000 Openfire servers vulnerable to takover attacksHackBleepingComputer
25.8.23Bitwarden releases free and open-source E2EE Secrets ManagerCyberBleepingComputer
25.8.23Discord starts notifying users affected by March data breachIncindentBleepingComputer
25.8.23New stealthy techniques let hackers gain Windows SYSTEM privilegesHackBleepingComputer
25.8.23US charges founders of Tornado Cash mixer used by Lazarus hackersHackBleepingComputer
25.8.23Kali Linux 2023.3 released with 9 new tools, internal changesOSBleepingComputer
25.8.23Google Workspace will require two admins to sign off on critical changesCyberBleepingComputer
25.8.23FBI: Lazarus hackers readying to cash out $41 million in stolen cryptoCryptocurrencyBleepingComputer
25.8.23Hosting firm says it lost all customer data after ransomware attackRansomBleepingComputer
25.8.23WinRAR zero-day exploited since April to hack trading accountsVulnerebilityBleepingComputer
25.8.23China-Linked Flax Typhoon Cyber Espionage Targets Taiwan's Key SectorsBigBrothersThe Hacker News
25.8.23Urgent FBI Warning: Barracuda Email Gateways Vulnerable Despite Recent PatchesBigBrothersThe Hacker News
25.8.23Lazarus Group Exploits Critical Zoho ManageEngine Flaw to Deploy Stealthy QuiteRATVirusThe Hacker News
24.8.23New Telegram Bot "Telekopye" Powering Large-scale Phishing Scams from RussiaBotNetThe Hacker News
24.8.23New "Whiffy Recon" Malware Triangulates Infected Device Location via Wi-Fi Every MinuteVirusThe Hacker News
24.8.23WinRAR Security Flaw Exploited in Zero-Day Attacks to Target TradersVulnerebilityThe Hacker News
24.8.23Thousands of Unpatched Openfire XMPP Servers Still Exposed to High-Severity FlawVulnerebilityThe Hacker News
24.8.23Tornado Cash Founders Charged in Billion-Dollar Crypto Laundering ScandalCryptocurrencyThe Hacker News
24.8.23North Korean Affiliates Suspected in $40M Cryptocurrency Heist, FBI WarnsBigBrothersThe Hacker News
24.8.23Meta Set to Enable Default End-to-End Encryption on Messenger by Year EndSecurityThe Hacker News
23.8.23Carderbee APT targets Hong Kong orgs via supply chain attacksAPTSecurityaffairs
23.8.23TP-Link Tapo L530E smart bulb flaws allow hackers to steal user passwordsVulnerebilitySecurityaffairs
23.8.23Defense contractor Belcan leaks admin password with a list of flawsIncindentSecurityaffairs
23.8.23Akira ransomware gang spotted targeting Cisco VPN products to hack organizationsRansomSecurityaffairs
23.8.23Scraped data of 2.6 million Duolingo users released on hacking forumIncindentBleepingComputer
23.8.23New Windows 11 policy lets admins control optional updates installationOSBleepingComputer
23.8.23Windows 11 KB5029351 preview update released with Search fixesOSBleepingComputer
23.8.23New HiatusRAT malware attacks target US Defense DepartmentVirusBleepingComputer
23.8.23Microsoft Excel to let you run Python scripts as formulasOSBleepingComputer
23.8.23Akira ransomware targets Cisco VPNs to breach organizationsRansomBleepingComputer
23.8.23Agile Approach to Mass Cloud Credential Harvesting and Crypto Mining Sprints AheadCryptocurrencyThe Hacker News
23.8.23Syrian Threat Actor EVLF Unmasked as Creator of CypherRAT and CraxsRAT Android MalwareVirusThe Hacker News
23.8.23Spacecolon Toolset Fuels Global Surge in Scarab Ransomware AttacksRansomThe Hacker News
23.8.23Over a Dozen Malicious npm Packages Target Roblox Game DevelopersVirusThe Hacker News
22.8.23Snatch gang claims the hack of the Department of Defence South AfricaCyberCrimeSecurityaffairs
22.8.23CISA adds critical Adobe ColdFusion flaw to its Known Exploited Vulnerabilities catalogVulnerebilitySecurityaffairs
22.8.23A cyber attack hit the Australian software provider Energy OneBigBrothersSecurityaffairs
22.8.23Ivanti fixed a new critical Sentry API authentication bypass flawVulnerebilitySecurityaffairs
22.8.23BlackCat ransomware group claims the hack of Seiko networkRansomSecurityaffairs
22.8.23New HiatusRAT campaign targets Taiwan and U.S. military procurement systemVirusSecurityaffairs
22.8.23Spoofing an Apple device and tricking users into sharing sensitive dataAppleSecurityaffairs
22.8.23Israel and US to Invest $3.85 Million in projects for critical infrastructure protection through the BIRD Cyber ProgramBigBrothersSecurityaffairs
22.8.23N. Korean Kimsuky APT targets S. Korea-US military exercisesAPTSecurityaffairs
22.8.23Carderbee hacking group hits Hong Kong orgs in supply chain attackCyberCrimeBleepingComputer
22.8.23TP-Link smart bulbs can let hackers steal your WiFi passwordIncindentBleepingComputer
22.8.23Sneaky Amazon Google ad leads to Microsoft support scamSpamBleepingComputer
22.8.23Ongoing Duo outage causes Azure Auth authentication errorsVulnerebilityBleepingComputer
22.8.23Ivanti warns of new actively exploited MobileIron zero-day bugVulnerebilityBleepingComputer
22.8.23Japanese watchmaker Seiko breached by BlackCat ransomware gangRansomBleepingComputer
22.8.23Hands on with Windows 11's 'never combine' taskbar featureOSBleepingComputer
22.8.23Google Chrome to warn when installed extensions are malwareVirusBleepingComputer
22.8.23Cuba ransomware uses Veeam exploit against critical U.S. organizationsRansomBleepingComputer
22.8.23Carderbee Attacks: Hong Kong Organizations Targeted via Malicious Software UpdatesVirusThe Hacker News
22.8.23New Variant of XLoader macOS Malware Disguised as 'OfficeNote' Productivity AppVirusThe Hacker News
22.8.23Ivanti Warns of Critical Zero-Day Flaw Being Actively Exploited in Sentry SoftwareVulnerebilityThe Hacker News
22.8.23Critical Adobe ColdFusion Flaw Added to CISA's Exploited Vulnerability CatalogVulnerebilityThe Hacker News
21.8.23New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PCVulnerebilityThe Hacker News
21.8.23This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy ServersAppleThe Hacker News
21.8.23HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under AttackVirusThe Hacker News
20.8.23Four Juniper Junos OS flaws can be chained to remotely hack devicesVulnerebilitySecurityaffairs
20.8.23Cybersecurity: CASB vs SASECyberSecurityaffairs
20.8.23Over 3,000 Android Malware spotted using unsupported/unknown compression methods to avoid detectionAndroidSecurityaffairs
20.8.23WinRAR flaw enables remote code execution of arbitrary codeVulnerebilitySecurityaffairs
20.8.23#OpFukushima: Anonymous group protests against the plan to dump Fukushima RADIOACTIVE wastewater into PacificHackSecurityaffairs
20.8.23Massive phishing campaign targets users of the Zimbra Collaboration email serverPhishingSecurityaffairs
20.8.23Africa Cyber Surge II law enforcement operation has led to the arrest of 14 suspectsCyberCrimeSecurityaffairs
20.8.23Bronze Starlight targets the Southeast Asian gambling sectorAPTSecurityaffairs
20.8.23APT29 is targeting Ministries of Foreign Affairs of NATO-aligned countriesAPTSecurityaffairs
20.8.23A massive campaign delivered a proxy server application to 400,000 Windows systemsCyberSecurityaffairs
20.8.23Alarming lack of cybersecurity practices on world’s most popular websitesCyberSecurityaffairs
20.8.23Experts devise an exploit for Apple iOS 16 that relies on fake Airplane ModeAppleSecurityaffairs
20.8.23Cleaning Products manufacturer Clorox Company took some systems offline after a cyberattackCyberSecurityaffairs
20.8.23CISA adds flaw in Citrix ShareFile to its Known Exploited Vulnerabilities catalogVulnerebilitySecurityaffairs
20.8.23A massive phishing campaign using QR codes targets the energy sectorPhishingSecurityaffairs
20.8.23Two unauthenticated stack buffer overflows found in Ivanti Avalanche EMMVulnerebilitySecurityaffairs
20.8.23Approximately 2000 Citrix NetScaler servers were backdoored in a massive campaignVirusSecurityaffairs
20.8.23Credentials for cybercrime forums found on roughly 120K computers infected with info stealersVirusSecurityaffairs
20.8.23Monti Ransomware gang launched a new Linux encryptorRansomSecurityaffairs
20.8.23Hacking ATMs by exploiting flaws in ScrutisWeb ATM fleet softwareExploitSecurityaffairs
20.8.23QwixxRAT, a new Windows RAT appears in the threat landscapeVirusSecurityaffairs
20.8.23Ongoing Xurum attacks target Magento 2 e-storesAttackSecurityaffairs
20.8.23Colorado HCPF Department notifies 4 million individuals after IBM MOVEit breachIncindentSecurityaffairs
20.8.23Experts found multiple flaws in AudioCodes desk phones and Zoom’s Zero Touch Provisioning (ZTP)VulnerebilitySecurityaffairs
20.8.23Hackers use VPN provider's code certificate to sign malwareVirusBleepingComputer
20.8.23Rust devs push back as Serde project ships precompiled binariesVirusBleepingComputer
19.8.23WoofLocker Toolkit Hides Malicious Codes in Images to Run Tech Support ScamsSpamThe Hacker News
19.8.23New Juniper Junos OS Flaws Expose Devices to Remote Attacks - Patch NowVulnerebilityThe Hacker News
19.8.23Thousands of Android Malware Apps Using Stealthy APK Compression to Evade DetectionAndroidThe Hacker News
19.8.23The Week in Ransomware - August 18th 2023 - LockBit on Thin IceRansomBleepingComputer
19.8.23WinRAR flaw lets hackers run programs when you open RAR archivesVulnerebilityBleepingComputer
19.8.23Hotmail email delivery fails after Microsoft misconfigures DNSSecurityBleepingComputer
19.8.23Interpol arrests 14 suspected cybercriminals for stealing $40 millionCyberCrimeBleepingComputer
19.8.23Microsoft: BlackCat's Sphynx ransomware embeds Impacket, RemComRansomBleepingComputer
19.8.23Hackers ask $120,000 for access to multi-billion auction houseIncindentBleepingComputer
19.8.23Microsoft PowerShell Gallery vulnerable to spoofing, supply chain attacksAttackBleepingComputer
19.8.23Phishing campaign steals accounts for Zimbra email servers worlwidePhishingBleepingComputer
19.8.23Windows Task Manager refresh can be paused using CTRL keyOSBleepingComputer
19.8.23Thousands of Android APKs use compression trick to thwart analysisAndroidBleepingComputer
19.8.23File sharing site Anonfiles shuts down due to overwhelming abuseCyberBleepingComputer
19.8.23CISA warns of critical Citrix ShareFile flaw exploited in the wildVulnerebilityBleepingComputer
19.8.23Google released first quantum-resilient FIDO2 key implementationSafetyBleepingComputer
19.8.23Massive 400,000 proxy botnet built with stealthy malware infectionsBotNetBleepingComputer
19.8.23Major U.S. energy org targeted in QR code phishing attackAttackBleepingComputer
19.8.2314 Suspected Cybercriminals Arrested Across Africa in Coordinated CrackdownCyberCrimeThe Hacker News
19.8.23New Wave of Attack Campaign Targeting Zimbra Email Users for Credential TheftPhishingThe Hacker News
19.8.23New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom ToolsRansomThe Hacker News
19.8.23Google Chrome's New Feature Alerts Users About Auto-Removal of Malicious ExtensionsSafetyThe Hacker News
18.8.23NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows SecurityVulnerebilityThe Hacker News
18.8.23China-Linked Bronze Starlight Group Targeting Gambling Sector with Cobalt Strike BeaconsAPTThe Hacker News
18.8.23New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking ActivitiesCryptocurrencyThe Hacker News
18.8.23New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane ModeAppleThe Hacker News
18.8.23Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing AttacksPhishingThe Hacker News
18.8.23CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild AttacksVulnerebilityThe Hacker News
18.8.23Experts Uncover Weaknesses in PowerShell Gallery Enabling Supply Chain AttacksAttackThe Hacker News
18.8.23Google Introduces First Quantum Resilient FIDO2 Security Key ImplementationSecurityThe Hacker News
18.8.23Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 OrganizationsVulnerebilityThe Hacker News
16.8.23Ivanti Avalanche impacted by critical pre-auth stack buffer overflowsVulnerebilityBleepingComputer
16.8.23LinkedIn accounts hacked in widespread hijacking campaignSocialBleepingComputer
16.8.23Almost 2,000 Citrix NetScaler servers backdoored in hacking campaignVulnerebilityBleepingComputer
16.8.23Raccoon Stealer malware returns with new stealthier versionVirusBleepingComputer
16.8.23New CVE-2023-3519 scanner detects hacked Citrix ADC, Gateway devicesVulnerebilityBleepingComputer
16.8.23Threat actors use beta apps to bypass mobile app store securityMobilBleepingComputer
16.8.23Discord.io confirms breach after hacker steals data of 760K usersIncindentBleepingComputer
16.8.23Over 100K hacking forums accounts exposed by info-stealing malwareVirusBleepingComputer
16.8.23Microsoft enables Windows Kernel CVE-2023-32019 fix for everyoneVulnerebilityBleepingComputer
16.8.23FBI warns of increasing cryptocurrency recovery scamsSpamBleepingComputer
16.8.23Nearly 2,000 Citrix NetScaler Instances Hacked via Critical VulnerabilityVulnerebilityThe Hacker News
16.8.23Cybercriminals Abusing Cloudflare R2 for Hosting Phishing Pages, Experts WarnPhishingThe Hacker News
16.8.23Multiple Flaws Found in ScrutisWeb Software Exposes ATMs to Remote HackingVulnerebilityThe Hacker News
16.8.23Monti Ransomware Returns with New Linux Variant and Enhanced Evasion TacticsRansomThe Hacker News
16.8.23Malware Unleashed: Public Sector Hit in Sudden Surge, Reveals New ReportVirusThe Hacker News
16.8.23Gigabud RAT Android Banking Malware Targets Institutions Across CountriesAndroidThe Hacker News
15.8.23Over 120,000 Computers Compromised by Info Stealers Linked to Users of Cybercrime ForumsCyberCrimeThe Hacker News
15.8.23North Korean Hackers Suspected in New Wave of Malicious npm PackagesBigBrothersThe Hacker News
14.8.23Experts found multiple flaws in AudioCodes desk phones and Zoom’s Zero Touch Provisioning (ZTP)VulnerebilitySecurityaffairs
14.8.23Nine flaws in CyberPower and Dataprobe solutions expose data centers to hackingVulnerebilitySecurityaffairs
14.8.23Multiple flaws in CODESYS V3 SDK could lead to RCE or DoSVulnerebilitySecurityaffairs
14.8.23The DHS’s CSRB to review cloud security practices following the hack of Microsoft Exchange govt email accountsBigBrothersSecurityaffairs
14.8.23Police dismantled bulletproof hosting service provider Lolek HostedCyberCrimeSecurityaffairs
14.8.23Python URL parsing function flaw can enable command executionVulnerebilitySecurityaffairs
14.8.23Phishing with hacked sitesPhishingSecurelist
14.8.23Focus on DroxiDat/SystemBCVirusSecurelist
14.8.23Monti ransomware targets VMware ESXi servers with new Linux lockerRansomBleepingComputer
14.8.23Colorado warns 4 million of data stolen in IBM MOVEit breachIncindentBleepingComputer
14.8.23MaginotDNS attacks exploit weak checks for DNS cache poisoningAttackBleepingComputer
14.8.23UK gov keeps repeating its voter registration website is NOT a scamBigBrothersBleepingComputer
14.8.23Knight ransomware distributed in fake Tripadvisor complaint emailsRansomBleepingComputer
14.8.23Ford says cars with WiFi vulnerability still safe to driveVulnerebilityBleepingComputer
14.8.23QwixxRAT: New Remote Access Trojan Emerges via Telegram and DiscordVirusThe Hacker News
14.8.23Ongoing Xurum Attacks on E-commerce Sites Exploiting Critical Magento 2 VulnerabilityVulnerebilityThe Hacker News
14.8.23Identity Threat Detection and Response: Rips in Your Identity FabricSecurityThe Hacker News
14.8.23Charming Kitten Targets Iranian Dissidents with Advanced Cyber AttacksAPTThe Hacker News
14.8.23New Financial Malware 'JanelaRAT' Targets Latin American UsersVirusThe Hacker News
14.8.23India Passes New Digital Personal Data Protection Bill (DPDPB), Putting Users' Privacy FirstBigBrothersThe Hacker News
12.8.23Multiple Flaws in CyberPower and Dataprobe Products Put Data Centers at RiskVulnerebilityThe Hacker News
12.8.23Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to EavesdroppingVulnerebilityThe Hacker News
12.8.23UK govt contractor MPD FM leaks employee passport dataBigBrothersSecurityaffairs
12.8.23Power Generator in South Africa hit with DroxiDat and Cobalt StrikeVirusSecurityaffairs
12.8.23The Evolution of API: From Commerce to CloudSecuritySecurityaffairs
12.8.23Gafgyt botnet is targeting EoL Zyxel routersBotNetSecurityaffairs
12.8.23Charming Kitten APT is targeting Iranian dissidents in GermanyAPTSecurityaffairs
12.8.23Statc Stealer, a new sophisticated info-stealing malwareVirusSecurityaffairs
12.8.23CISA discovered a new backdoor, named Whirlpool, used in Barracuda ESG attacksBigBrothersSecurityaffairs
12.8.23CISA adds actively exploited flaw in .NET, Visual Studio to its Known Exploited Vulnerabilities catalogBigBrothersSecurityaffairs
12.8.23US Govt launches Artificial Intelligence Cyber ChallengeBigBrothersSecurityaffairs
12.8.23Data of all serving police officers Police Service of Northern Ireland (PSNI) mistakenly published onlineIncindentSecurityaffairs
12.8.23Balada Injector still at large – new domains discoveredVirusSecurityaffairs
12.8.23EvilProxy used in massive cloud account takeover schemeVirusSecurityaffairs
12.8.23The Week in Ransomware - August 11th 2023 - Targeting HealthcareRansomBleepingComputer
12.8.23US cyber safety board to analyze Microsoft Exchange hack of govt emailsBigBrothersBleepingComputer
12.8.23Xiaomi's MIUI now flags Telegram as dangerous in ChinaBigBrothersBleepingComputer
12.8.23LOLEKHosted admin arrested for aiding Netwalker ransomware gangCyberCrimeBleepingComputer
12.8.23Lolek Bulletproof Hosting Servers Seized, 5 Key Operators ArrestedCyberCrimeThe Hacker News
12.8.23New Python URL Parsing Flaw Enables Command Injection AttacksAttackThe Hacker News
12.8.23Researchers Uncover Years-Long Cyber Espionage on Foreign Embassies in BelarusBigBrothersThe Hacker News
12.8.23Enhancing TLS Security: Google Adds Quantum-Resistant Encryption in Chrome 116SecurityThe Hacker News
11.8.23Police seize LOLEK bulletproof service for hosting malwareVirusBleepingComputer
11.8.23Industrial PLCs worldwide impacted by CODESYS V3 RCE flawsVulnerebilityBleepingComputer
11.8.23Amazon AWS distances itself from Moq amid data collection controversySecurityBleepingComputer
11.8.23Lapsus$ hackers took SIM-swapping attacks to the next levelMobilBleepingComputer
11.8.23Gafgyt malware exploits five-years-old flaw in EoL Zyxel routerVirusBleepingComputer
11.8.23Microsoft Exchange updates pulled after breaking non-English installsOSBleepingComputer
11.8.23MoustachedBouncer hackers use AiTM attacks to spy on diplomatsAttackBleepingComputer
11.8.23CISA: New Whirlpool backdoor used in Barracuda ESG hacksVirusBleepingComputer
11.8.23Dell Compellent hardcoded key exposes VMware vCenter admin credsIncindentBleepingComputer
11.8.23Hackers use open source Merlin post-exploitation toolkit in attacksExploitBleepingComputer
11.8.23New BitForge cryptocurrency wallet flaws lets hackers steal cryptoCryptocurrencyBleepingComputer
11.8.23Missouri warns that health info was stolen in IBM MOVEit data breachIncindentBleepingComputer
11.8.23Rhysida ransomware behind recent attacks on healthcareRansomBleepingComputer
11.8.23Popular open source project Moq criticized for quietly collecting dataIncindentBleepingComputer
11.8.23Google to fight hackers with weekly Chrome security updatesSecurityBleepingComputer
11.8.23Researchers Shed Light on APT31's Advanced Backdoors and Data Exfiltration TacticsAPTThe Hacker News
11.8.23New SystemBC Malware Variant Targets Southern African Power CompanyVirusThe Hacker News
11.8.2316 New CODESYS SDK Flaws Expose OT Environments to Remote AttacksVulnerebilityThe Hacker News
11.8.23CISA Adds Microsoft .NET Vulnerability to KEV Catalog Due to Active ExploitationBigBrothersThe Hacker News
11.8.23New Attack Alert: Freeze[.]rs Injector Weaponized for XWorm Malware AttacksAttackThe Hacker News
11.8.23New Statc Stealer Malware Emerges: Your Sensitive Data at RiskVirusThe Hacker News
10.8.23

Emerging Attacker Exploit: Microsoft Cross-Tenant Synchronization

ExploitThe Hacker News
10.8.23

Encryption Flaws in Popular Chinese Language App Put Users' Typed Data at Risk

BigBrothersThe Hacker News
10.8.23

Cybercriminals Increasingly Using EvilProxy Phishing Kit to Target Executives

PhishingThe Hacker News
10.8.23

Interpol Busts Phishing-as-a-Service Platform '16Shop,' Leading to 3 Arrests

CyberCrimeThe Hacker News
10.8.23

Collide+Power, Downfall, and Inception: New Side-Channel Attacks Affecting Modern CPUs

AttackThe Hacker News
10.8.23

China-Linked Hackers Strike Worldwide: 17 Nations Hit in 3-Year Cyber Campaign

BigBrothersThe Hacker News
9.8.23Downfall Intel CPU side-channel attack exposes sensitive dataAttackSecurityaffairs
9.8.23LockBit threatens to leak medical data of cancer patients stolen from Varian Medical SystemsRansomSecurityaffairs
9.8.23Microsoft Patch Tuesday for August 2023 fixed 2 actively exploited flawsOSSecurityaffairs
9.8.23UK Electoral Commission discloses a data breachIncindentSecurityaffairs
9.8.23EvilProxy phishing campaign targets 120,000 Microsoft 365 usersPhishingBleepingComputer
9.8.23Microsoft Visual Studio Code flaw lets extensions steal passwordsVulnerebilityBleepingComputer
9.8.23Microsoft Office update breaks actively exploited RCE attack chainOSBleepingComputer
9.8.23Windows 11 KB5029263 cumulative update released with 27 fixesOSBleepingComputer
9.8.23Microsoft August 2023 Patch Tuesday warns of 2 zero-days, 87 flawsOSBleepingComputer
9.8.23Windows 10 KB5029244 and KB5029247 updates releasedOSBleepingComputer
9.8.23Interpol takes down 16shop phishing-as-a-service platformCyberCrimeBleepingComputer
9.8.23New Downfall attacks on Intel CPUs steal encryption keys, dataAttackBleepingComputer
9.8.23Android 14 to let you block connections to unencrypted cellular networksAndroidBleepingComputer
9.8.23New Inception attack leaks sensitive data from all AMD Zen CPUsAttackBleepingComputer
9.8.23New Android 14 Security Feature: IT Admins Can Now Disable 2G NetworksAndroidThe Hacker News
9.8.23U.K. Electoral Commission Breach Exposes Voter Data of 40 Million BritonsIncindentThe Hacker News
9.8.23Microsoft Releases Patches for 74 New Vulnerabilities in August UpdateVulnerebilityThe Hacker News
9.8.23Malicious Campaigns Exploit Weak Kubernetes Clusters for Crypto MiningCryptocurrencyThe Hacker News
9.8.23New Report Exposes Vice Society's Collaboration with Rhysida RansomwareRansomThe Hacker News
8.8.23QakBot Malware Operators Expand C2 Network with 15 New ServersVirusThe Hacker News
8.8.23Hackers Abusing Cloudflare Tunnels for Covert Communications

Hack

The Hacker News
8.8.23

43 Android apps in Google Play with 2.5M installs loaded ads when a phone screen was off

AndroidSecurityaffairs
8.8.23

Zoom trains its AI model with some user data, without giving them an opt-out option

AISecurityaffairs
8.8.23

North Korea compromised Russian missile engineering firm NPO Mashinostroyeniya

BigBrothersSecurityaffairs
8.8.23

A new sophisticated SkidMap variant targets unsecured Redis servers

VirusSecurityaffairs
8.8.23

UK Electoral Commission data breach exposes 8 years of voter data

IncindentBleepingComputer
8.8.23

Hackers increasingly abuse Cloudflare Tunnels for stealthy connections

Hack

BleepingComputer
8.8.23

Hands on with Windows 11's new modern File Explorer

OSBleepingComputer
8.8.23

Google Play apps with 2.5M installs load ads when screen's off

AndroidBleepingComputer
8.8.23

North Korean hackers 'ScarCruft' breached Russian missile maker

BigBrothersBleepingComputer
8.8.23

Understanding Active Directory Attack Paths to Improve Security

AttackThe Hacker News
8.8.23

New Yashma Ransomware Variant Targets Multiple English-Speaking Countries

RansomThe Hacker News
8.8.23

LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes

VirusThe Hacker News
8.8.23

New Malware Campaign Targets Inexperienced Cyber Criminals with OpenBullet Configs

VirusThe Hacker News
8.8.23

North Korean Hackers Targets Russian Missile Engineering Firm

BigBrothersThe Hacker News
7.8.23FBI warns of crooks posing as NFT developers in fraudulent schemaBigBrothersSecurityaffairs
7.8.23The number of ransomware attacks targeting Finland increased fourfold since it started the process to join NATORansomSecurityaffairs
7.8.23Microsoft fixed a flaw in Power Platform after being criticizedVulnerebilitySecurityaffairs
7.8.23Colorado Department of Higher Education (CDHE) discloses data breach after ransomware attackRansomSecurityaffairs
7.8.23BlueCharlie changes attack infrastructure in response to reports on its activityAttackSecurityaffairs
7.8.23Reptile Rootkit employed in attacks against Linux systems in South KoreaVirusSecurityaffairs
7.8.23New PaperCut flaw in print management software exposes servers to RCE attacksVulnerebilitySecurityaffairs
7.8.23Google News, Discover links showing 404 Not Found? Here's how to fixSecurityBleepingComputer
7.8.23Google Gmail continuously nagging to enable Enhanced Safe BrowsingSecurityBleepingComputer
7.8.23Tesla infotainment jailbreak unlocks paid features, extracts secretsHackBleepingComputer
7.8.23How to enable hidden Windows 11 features with Microsoft StagingToolOSBleepingComputer
7.8.23Colorado Department of Higher Education warns of massive data breachIncindentBleepingComputer
7.8.23Clop ransomware now uses torrents to leak data and evade takedownsRansomBleepingComputer
7.8.23New acoustic attack steals data from keystrokes with 95% accuracyAttackBleepingComputer
7.8.23

New 'Deep Learning Attack' Deciphers Laptop Keystrokes with 95% Accuracy

AttackThe Hacker News
7.8.23

New SkidMap Redis Malware Variant Targeting Vulnerable Redis Servers

VirusThe Hacker News
7.8.23

FBI Alert: Crypto Scammers are Masquerading as NFT Developers

BigBrothersThe Hacker News
6.8.23

NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts

Malware blogPalo Alto
6.8.23

Ransomware Delivery URLs: Top Campaigns and Trends

Ransom blogPalo Alto
6.8.23

Half-Year in Review: Recapping the top threats and security trends so far in 2023

Security blog

Cisco Blog

6.8.23

The many vulnerabilities Talos discovered in SOHO and industrial wireless routers post-VPNFilter

Vulnerebility blog

Cisco Blog

6.8.23Incident Response trends Q2 2023: Data theft extortion rises, while healthcare is still most-targeted verticalIncident blog

Cisco Blog

6.8.23What might authentication attacks look like in a phishing-resistant future?Attack blog

Cisco Blog

6.8.23Threat Source newsletter (Aug. 3, 2023) — Previewing Talos at BlackHat 2023Cyber blog

Cisco Blog

6.8.23Every company has its own version of ChatGPT nowCyber blog

Cisco Blog

6.8.23The federal government’s cybersecurity policies are falling into place just in time to be stalled againBigBrother blog

Cisco Blog

6.8.23Memory corruption vulnerability in Microsoft Edge; MilesightVPN and router could be taken overVulnerebility blog

Cisco Blog

6.8.23Why are there so many malware-as-a-service offerings?Malware blog

Cisco Blog

6.8.23Implementing an ISO-compliant threat intelligence programSecurity blog

Cisco Blog

6.8.23QR codes are relevant again for everyone from diners to threat actorsSecurity blog

Cisco Blog

6.8.23Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementationVulnerebility blog

Cisco Blog

6.8.23Check cybersecurity pre-invest – Week in security with Tony AnscombeCyber blog

Eset

6.8.23Fingerprints all over: Can browser fingerprinting increase website security?Security blog

Eset

6.8.23The grand theft of Jake Moore’s voice: The concept of a virtual kidnapMalware blog

Eset

6.8.23Is backdoor access oppressive? – Week in security with Tony AnscombeMalware blog

Eset

6.8.23Gathering dust and data: How robotic vacuums can spy on youMalware blog

Eset

6.8.23Dear all, What are some common subject lines in phishing emails?Phishing blog

Eset

5.8.23Genesis Market No Longer Feeds The Evil Cookie MonsterHacking blogTrellix
5.8.23Microsoft mitigates Power Platform Custom Code information disclosure vulnerabilityVulnerebility blogMicrosoft Blog
5.8.23Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found under development in the wildMalware blogAvast blog
5.8.23Reptile Malware Targeting Linux SystemsMalware blogASEC
5.8.23Reptile Rootkit: Advanced Linux Malware Targeting South Korean SystemsVirusThe Hacker News
5.8.23Microsoft Addresses Critical Power Platform Flaw After Delays and CriticismVulnerebilityThe Hacker News
5.8.23A cyberattack impacted operations of multiple hospitals in several US statesBigBrothersSecurityaffairs
5.8.23Married couple pleaded guilty to laundering billions in cryptocurrency stolen from Bitfinex in 2016CryptocurrencySecurityaffairs
5.8.23Malicious packages in the NPM designed for highly-targeted attacksVirusSecurityaffairs
5.8.23Attackers use dynamic code loading to bypass Google Play store’s malware detectionsAndroidSecurityaffairs
5.8.23The Week in Ransomware - August 4th 2023 - Targeting VMware ESXiRansomBleepingComputer
5.8.23Microsoft fixes flaw after being called irresponsible by Tenable CEOOSBleepingComputer
5.8.23Microsoft kills Cortana in Windows 11 preview, long live AI!OSBleepingComputer
5.8.23Google explains how Android malware slips onto Google Play StoreAndroidBleepingComputer
5.8.23Extended warranty robocallers fined $300 million after 5 billion scam callsSpamBleepingComputer
5.8.23Fake VMware vConnector package on PyPI targets IT prosHackBleepingComputer
5.8.23Researchers Uncover New High-Severity Vulnerability in PaperCut SoftwareVulnerebilityThe Hacker News
4.8.23NYC Couple Pleads Guilty to Money Laundering in $3.6 Billion Bitfinex HackCyberCrimeThe Hacker News
4.8.23Malicious npm Packages Found Exfiltrating Sensitive Data from DevelopersVirusThe Hacker News
4.8.23CISA, FBI, and NSA published the list of 12 most exploited vulnerabilities of 2022BigBrothersSecurityaffairs
4.8.23Decommissioned medical infusion pumps sold on secondary market could reveal Wi-Fi configuration settingsSecuritySecurityaffairs
4.8.23OWASP Top 10 for LLM (Large Language Model) applications is out!BigBrothersSecurityaffairs
4.8.23Rapid7 found a bypass for the recently patched actively exploited Ivanti EPMM bugExploitSecurityaffairs
4.8.23New Microsoft Azure AD CTS feature can be abused for lateral movementOSBleepingComputer
4.8.23Hacktivists fund their operations using common cybercrime tacticsCyberCrimeBleepingComputer
4.8.23Microsoft shares fix for Outlook asking to reopen closed windowsOSBleepingComputer
4.8.23US govt contractor Serco discloses data breach after MoveIT attacksIncindentBleepingComputer
4.8.23Brave Search adds private image and video search capabilitySecurityBleepingComputer
4.8.23Hackers can abuse Microsoft Office executables to download malwareVirusBleepingComputer
4.8.23FBI, CISA, and NSA reveal top exploited vulnerabilities of 2022ExploitBleepingComputer
4.8.23Chrome malware Rilide targets enterprise users via PowerPoint guidesVirusBleepingComputer
4.8.23What’s happening in the world of crimeware: Emotet, DarkGate and LokiBotVirusSecurelist
4.8.23Major Cybersecurity Agencies Collaborate to Unveil 2022's Most Exploited VulnerabilitiesExploitThe Hacker News
3.8.23Cyberthreats increasingly target the world’s biggest event stagesCyber blogMicrosoft Blog
3.8.23Unraveling Russian Multi-Sector DDoS Attacks Across SpainBigBrother blogRadware
3.8.23Demystifying Mysterious Team BangladeshBigBrother blogGroup-IB
3.8.23GUARDING THE BRIDGE: NEW ATTACK VECTORS IN AZURE AD CONNECTAttack blogSygnia
3.8.23BlueCharlie, Previously Tracked as TAG-53, Continues to Deploy New Infrastructure in 2023Cyber blogRecordedfuture
3.8.23One Year After: The Cyber Implications of the Russo-Ukrainian WarBigBrother blogSekoia
3.8.23Malicious Apps Use Sneaky Versioning Technique to Bypass Google Play Store ScannersAndroidThe Hacker News
3.8.23New Version of Rilide Data Theft Malware Adapts to Chrome Extension Manifest V3VirusThe Hacker News
3.8.23Hundreds of Citrix NetScaler ADC and Gateway Servers Hacked in Major Cyber AttackHackThe Hacker News
3.8.23Microsoft Flags Growing Cybersecurity Concerns for Major Sporting EventsSecurityThe Hacker News
3.8.23"Mysterious Team Bangladesh" Targeting India with DDoS Attacks and Data BreachesIncindentThe Hacker News
3.8.23Russian APT29 conducts phishing attacks through Microsoft TeamsAPTSecurityaffairs
3.8.23Hackers already installed web shells on 581 Citrix servers in CVE-2023-3519 attacksVulnerebilitySecurityaffairs
3.8.23Zero-day in Salesforce email services exploited in targeted Facebook phishing campaignSocialSecurityaffairs
3.8.23Burger King forgets to put a password on their systems, againIncindentSecurityaffairs
3.8.23Fake FlipperZero sites promise free devices after completing offerSecurityBleepingComputer
3.8.23Ivanti discloses new critical auth bypass bug in MobileIron CoreVulnerebilityBleepingComputer
3.8.23Russian hackers target govt orgs in Microsoft Teams phishing attacksBigBrothersBleepingComputer
3.8.23Over 640 Citrix servers backdoored with web shells in ongoing attacksVulnerebilityBleepingComputer
3.8.23New Collide+Power side-channel attack impacts almost all CPUsAttackBleepingComputer
3.8.23Amazon's AWS SSM agent can be used as post-exploitation RAT malwareVirusBleepingComputer
3.8.23Hackers exploited Salesforce zero-day in Facebook phishing attackPhishingBleepingComputer
3.8.23Microsoft Exposes Russian Hackers' Sneaky Phishing Tactics via Microsoft Teams ChatsBigBrothersThe Hacker News
3.8.23Researchers Discover Bypass for Recently Patched Critical Ivanti EPMM VulnerabilityVulnerebilityThe Hacker News
3.8.23Russian Cyber Adversary BlueCharlie Alters Infrastructure in Response to DisclosuresBigBrothersThe Hacker News
2.8.23Phishers Exploit Salesforce's Email Services Zero-Day in Targeted Facebook CampaignPhishingThe Hacker News
2.8.23Industrial Control Systems Vulnerabilities Soar: Over One-Third Unpatched in 2023ICSThe Hacker News
2.8.23Top Industries Significantly Impacted by Illicit Telegram NetworksSocialThe Hacker News
2.8.23Researchers Uncover AWS SSM Agent Misuse as a Covert Remote Access TrojanVirusThe Hacker News
2.8.23CISA adds second Ivanti EPMM flaw to its Known Exploited Vulnerabilities catalogBigBrothersSecurityaffairs
2.8.23NodeStealer 2.0 takes over Facebook Business accounts and targets crypto walletsVirusSecurityaffairs
2.8.23US govt is hunting a Chinese malware that can interfere with its military operationsBigBrothersSecurityaffairs
2.8.23WikiLoader malware-as-a-service targets Italian organizationsVirusSecurityaffairs
2.8.23Be aware of exposure of sensitive data on Wi-Fi settings for Canon inkjet printersHackSecurityaffairs
2.8.23Experts discovered a previously undocumented initial access vector used by P2PInfect wormVirusSecurityaffairs
2.8.23Iranian Company Cloudzy Accused of Aiding Cybercriminals and Nation-State HackersBigBrothersThe Hacker News
2.8.23Hackers use new malware to breach air-gapped devices in Eastern EuropeHackBleepingComputer
2.8.23Threat actors abuse Google AMP for evasive phishing attacksPhishingBleepingComputer
2.8.23CISA issues new warning on actively exploited Ivanti MobileIron bugsBigBrothersBleepingComputer
2.8.23Retail chain Hot Topic discloses wave of credential-stuffing attacksCyberCrimeBleepingComputer
2.8.23Cybercriminals train AI chatbots for phishing, malware attacksAIBleepingComputer
2.8.23Norwegian Entities Targeted in Ongoing Attacks Exploiting Ivanti EPMM VulnerabilityVulnerebilityThe Hacker News
2.8.23New NodeStealer Variant Targeting Facebook Business Accounts and Crypto WalletsVirusThe Hacker News
1.8.23European Bank Customers Targeted in SpyNote Android Trojan CampaignAndroidThe Hacker News
1.8.23Researchers Expose Space Pirates' Cyber Campaign Across Russia and SerbiaBigBrothersThe Hacker News
1.8.23China's APT31 Suspected in Attacks on Air-Gapped Systems in Eastern EuropeAPTThe Hacker News
1.8.23Hackers steal Signal, WhatsApp user data with fake Android chat appAndroidBleepingComputer
1.8.23Google warns again it will start deleting inactive accounts in DecemberSecurityBleepingComputer
1.8.23Canon warns of Wi-Fi security risks when discarding inkjet printersSecurityBleepingComputer
1.8.23P2PInfect server botnet spreads using Redis replication featureBotNetBleepingComputer
1.8.23Hackers exploit BleedingPipe RCE to target Minecraft servers, playersExploitBleepingComputer
1.8.23Cybercriminals Renting WikiLoader to Target Italian Organizations with Banking TrojanVirusThe Hacker News