H  January(103)  February(113)  March(175)  APRIL(74)  MAY(28)  JUNE(198)  July(423)  August(462)  September(389)  October(406)  November(309)  December()

DATE

NAME

CATEGORY

WEB

30.11.23

This Free Solution Provides Essential Third-Party Risk Management for SaaSSecurity

The Hacker News

30.11.23

North Korea's Lazarus Group Rakes in $3 Billion from Cryptocurrency HacksCryptocurrency

The Hacker News

30.11.23

CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted AttacksRansom

The Hacker News

30.11.23

U.S. Treasury Sanctions Sinbad Cryptocurrency Mixer Used by North Korean HackersCryptocurrency

The Hacker News

29.11.23

Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S.Exploit

The Hacker News

29.11.23

200+ Malicious Android Apps Targeting Iranian Banks: Experts WarnAndroid

The Hacker News

29.11.23

Okta Discloses Broader Impact Linked to October 2023 Support System Breach

Incindent

The Hacker News

29.11.23

DJVU Ransomware's Latest Variant 'Xaro' Disguised as Cracked Software

Ransom

The Hacker News

29.11.23

GoTitan Botnet Spotted Exploiting Recent Apache ActiveMQ Vulnerability

BotNet

The Hacker News

29.11.23

Zero-Day Alert: Google Chrome Under Active Attack, Exploiting New Vulnerability

Vulnerebility

The Hacker News

29.11.23

Design Flaw in Google Workspace Could Let Attackers Gain Unauthorized Access

Vulnerebility

The Hacker News

28.11.23

Key Cybercriminals Behind Notorious Ransomware Families Arrested in Ukraine

Ransom

The Hacker News

28.11.23

Hackers Can Exploit 'Forced Authentication' to Steal Windows NTLM Tokens

Exploit

The Hacker News

28.11.23

N. Korean Hackers 'Mixing' macOS Malware Tactics to Evade Detection

Apple

The Hacker News

28.11.23

Microsoft deprecates Defender Application Guard for Office

Safety

BleepingComputer

28.11.23

Ransomware attack on indie game maker wiped all player accounts

Ransom

BleepingComputer

28.11.23

Healthcare giant Henry Schein hit twice by BlackCat ransomware

Ransom

BleepingComputer

28.11.23

Ukraine says it hacked Russian aviation agency, leaks data

Incindent

BleepingComputer

28.11.23

Ardent hospital ERs disrupted in 6 states after ransomware attack

Ransom

BleepingComputer

28.11.23

Slovenia's largest power provider HSE hit by ransomware attack

Ransom

BleepingComputer

28.11.23

New Rust-based SysJoker backdoor linked to Hamas hackers

Virus

BleepingComputer

28.11.23

General Electric investigates claims of cyber attack, data theft

Incindent

BleepingComputer

28.11.23

Atomic Stealer malware strikes macOS via fake browser updates

Virus

BleepingComputer

27.11.23

Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections

Safety

The Hacker News

27.11.23

U.S., U.K., and Global Partners Release Secure AI System Development GuidelinesAIThe Hacker News

26.11.23

Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat ActorsAPT blogPalo Alto

26.11.23

THE PLATFORM MATTERS: A COMPARATIVE STUDY ON LINUX AND WINDOWS RANSOMWARE ATTACKSRansom blogCheckpoint

26.11.23

ISRAEL-HAMAS WAR SPOTLIGHT: SHAKING THE RUST OFF SYSJOKERBigBrother blogCheckpoint

26.11.23

Telekopye's tricks of the trade – Week in security with Tony AnscombeBigBrother blog

Eset

26.11.23

Telekopye: Chamber of Neanderthals’ secretsBigBrother blog

Eset

26.11.23

Your voice is my passwordSafety blog

Eset

26.11.23

Fuel for thought: Can a driverless car get arrested?Cyber blog

Eset

25.11.23

Critical bug in ownCloud file sharing app exposes admin passwordsVulnerebility

BleepingComputer

25.11.23

UK and South Korea: Hackers use zero-day in supply-chain attackAttack

BleepingComputer

25.11.23

Cyberattack on IT provider CTS impacts dozens of UK law firmsHack

BleepingComputer

25.11.23

New 'HrServ.dll' Web Shell Detected in APT Attack Targeting Afghan GovernmentAPT

The Hacker News

25.11.23

Warning: 3 Critical Vulnerabilities Expose ownCloud Users to Data BreachesVulnerebilityThe Hacker News

25.11.23

Cybercriminals Using Telekopye Telegram Bot to Craft Phishing Scams on a Grand ScalePhishing

The Hacker News

25.11.23

Hamas-Linked Cyberattacks Using Rust-Powered SysJoker Backdoor Against IsraelBigBrothersThe Hacker News

24.11.23

Kubernetes Secrets of Fortune 500 Companies Exposed in Public RepositoriesIncindent

The Hacker News

24.11.23

Konni Group Using Russian-Language Malicious Word Docs in Latest AttacksVirusThe Hacker News

24.11.23

Alert: New WailingCrab Malware Loader Spreading via Shipping-Themed EmailsVirus

The Hacker News

24.11.23

Mirai-based Botnet Exploiting Zero-Day Bugs in Routers and NVRs for Massive DDoS AttacksBotNetThe Hacker News

23.11.23

Kansas courts confirm data theft, ransom demand after cyberattackRansom

BleepingComputer

23.11.23

Windows Hello auth bypassed on Microsoft, Dell, Lenovo laptopsVulnerebility

BleepingComputer

23.11.23

Welltok data breach exposes data of 8.5 million US patientsIncindent

BleepingComputer

23.11.23

Microsoft: Lazarus hackers breach CyberLink in supply chain attackIncindent

BleepingComputer

23.11.23

New botnet malware exploits two zero-days to infect NVRs and routersBotNet

BleepingComputer

23.11.23

Open-source Blender project battling DDoS attacks since SaturdayAttack

BleepingComputer

23.11.23

Hacktivists breach U.S. nuclear research lab, steal employee dataIncindent

BleepingComputer

23.11.23

Malware dev says they can revive expired Google auth cookiesVirus

BleepingComputer

23.11.23

Microsoft launches Defender Bounty Program with $20,000 rewardsSecurity

BleepingComputer

23.11.23

Auto parts giant AutoZone warns of MOVEit data breachIncindent

BleepingComputer

23.11.23

CISA orders federal agencies to patch Looney Tunables Linux bugBigBrothers

BleepingComputer

23.11.23

Citrix warns admins to kill NetScaler user sessions to block hackersVirus

BleepingComputer

23.11.23

DarkGate and Pikabot malware emerge as Qakbot’s successorsVirus

BleepingComputer

23.11.23

Criminal IP Becomes VirusTotal IP and URL Scan ContributorCyber

BleepingComputer

23.11.23

North Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain AttackHack

The Hacker News

23.11.23

New Flaws in Fingerprint Sensors Let Attackers Bypass Windows Hello LoginVulnerebilityThe Hacker News

23.11.23

North Korean Hackers Pose as Job Recruiters and Seekers in Malware CampaignsHack

The Hacker News

22.11.23

ClearFake Campaign Expands to Deliver Atomic Stealer on Macs SystemsVirusThe Hacker News

22.11.23

LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break InRansomThe Hacker News

22.11.23

Play Ransomware Goes Commercial - Now Offered as a Service to CybercriminalsRansom

The Hacker News

22.11.23

New Agent Tesla Malware Variant Using ZPAQ Compression in Email AttacksVirus

The Hacker News

22.11.23

How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and SteganographyPhishing

The Hacker News

22.11.23

Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux RootkitsVirus

The Hacker News

21.11.23

Tor Project removes relays because of for-profit, risky activitySecurity

BleepingComputer

21.11.23

Gamaredon's LittleDrifter USB malware spreads beyond UkraineVirus

BleepingComputer

21.11.23

Microsoft fixes ‘Something Went Wrong’ Office sign-in errorsOS

BleepingComputer

21.11.23

VX-Underground malware collective framed by Phobos ransomwareRansom

BleepingComputer

21.11.23

Cybersecurity firm executive pleads guilty to hacking hospitalsHack

BleepingComputer

21.11.23

Canadian government discloses data breach after contractor hacksIncindent

BleepingComputer

21.11.23

Kinsing malware exploits Apache ActiveMQ RCE to plant rootkitsExploit

BleepingComputer

21.11.23

Rhysida ransomware gang claims British Library cyberattackRansom

BleepingComputer

21.11.23

How to boost Security with Self-Service Password ResetsSecurity

BleepingComputer

21.11.23

Lumma Stealer malware now uses trigonometry to evade detectionVirus

BleepingComputer

21.11.23

Russian hackers use Ngrok feature and WinRAR exploit to attack embassiesExploit

BleepingComputer

21.11.23

Researchers extract RSA keys from SSH server signing errorsSafety

BleepingComputer

21.11.23

Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android UsersAndroid

The Hacker News

21.11.23

Mustang Panda Hackers Targets Philippines Government Amid South China Sea TensionsBigBrothers

The Hacker News

21.11.23

NetSupport RAT Infections on the Rise - Targeting Government and Business SectorsVirus

The Hacker News

21.11.23

DarkGate and PikaBot Malware Resurrect QakBot's Tactics in New Phishing AttacksVirus

The Hacker News

20.11.23

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox TechniqueVirus

The Hacker News

20.11.23

Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to HackingExploit

The Hacker News

20.11.23

Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 YearsBigBrothers

The Hacker News

19.11.23

Windows 10 to let admins control how optional updates are deployedOS

BleepingComputer

19.11.23

FCC adopts new rules to protect consumers from SIM-swapping attacksAttack

BleepingComputer

19.11.23

Exploit for CrushFTP RCE chain released, patch nowExploit

BleepingComputer

19.11.23

Google shares plans for blocking third-party cookies in ChromeSecurity

BleepingComputer

19.11.23

The Week in Ransomware - November 17th 2023 - Citrix in the CrosshairsRansom

BleepingComputer

19.11.23

Bloomberg Crypto X account snafu leads to Discord phishing attackPhishing

BleepingComputer

19.11.23

Yamaha Motor confirms ransomware attack on Philippines subsidiaryRansom

BleepingComputer

19.11.23

Google: Hackers exploited Zimbra zero-day in attacks on govt orgsExploit

BleepingComputer

19.11.23

CISA warns of actively exploited Windows, Sophos, and Oracle bugsExploit

BleepingComputer

19.11.23

British Library: Ongoing outage caused by ransomware attackRansom

BleepingComputer

19.11.23

Long Beach, California turns off IT systems after cyberattackIncindent

BleepingComputer

19.11.23

FBI shares tactics of notorious Scattered Spider hacker collectiveHack

BleepingComputer

19.11.23

MySQL servers targeted by 'Ddostf' DDoS-as-a-Service botnetBotNet

BleepingComputer

19.11.23

Toyota confirms breach after Medusa ransomware threatens to leak dataIncindent

BleepingComputer

19.11.23

Fortinet warns of critical command injection bug in FortiSIEMVulnerebility

BleepingComputer

19.11.23

How DDoS attacks are taking down even the largest tech companiesAttack

BleepingComputer

18.11.23

Stately Taurus Targets the Philippines As Tensions Flare in the South PacificAPT blog

Palo Alto

18.11.23

MALWARE SPOTLIGHT – INTO THE TRASH: ANALYZING LITTERDRIFTERMalware blogCheckpoint

18.11.23

A deep dive into Phobos ransomware, recently deployed by 8Base groupMalware blog

Cisco Blog

18.11.23

Understanding the Phobos affiliate structure and activityMalware blog

Cisco Blog

18.11.23

7 common mistakes companies make when creating an incident response plan and how to avoid themIncident blog

Cisco Blog

18.11.23

Attackers use JavaScript URLs, API forms and more to scam users in popular online game “Roblox”Spam blog

Cisco Blog

18.11.23

We all just need to agree that ad blockers are goodSecurity blog

Cisco Blog

18.11.23

Microsoft discloses only three critical vulnerabilities in November’s Patch Tuesday update, three other zero-daysOS Blog

Cisco Blog

18.11.23

A new video series, Google Forms spam and the various gray areas of cyber attacksSpam blog

Cisco Blog

18.11.23

Threat Roundup for November 3 to November 10Cyber blog

Cisco Blog

18.11.23

Spammers abuse Google Forms’ quiz to deliver scamsSpam blog

Cisco Blog

18.11.23

What is NIS2, and how can you best prepare for the new cybersecurity requirements in the EU?Safety blog

Cisco Blog

18.11.23

Threat Roundup for October 27 to November 3Cyber blog

Cisco Blog

18.11.23

You’d be surprised to know what devices are still using Windows CEOS Blog

Cisco Blog

18.11.23

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony AnscombeSafety blog

Eset

18.11.23

Is your LinkedIn profile revealing too much?Social blog

Eset

18.11.23

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoaderVirus

The Hacker News

18.11.23

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted AttacksVirus

The Hacker News

17.11.23

Beware: Malicious Google Ads Trick WinSCP Users into Installing MalwareVirus

The Hacker News

17.11.23

FCC Enforces Stronger Rules to Protect Customers Against SIM Swapping AttacksAttack

The Hacker News

17.11.23

27 Malicious PyPI Packages with Thousands of Downloads Found Targeting IT ExpertsVirus

The Hacker News

17.11.23

U.S. Cybersecurity Agencies Warn of Scattered Spider's Gen Z Cybercrime EcosystemBigBrothers

The Hacker News

17.11.23

CISA Adds Three Security Flaws with Active Exploitation to KEV CatalogVulnerebility

The Hacker News

17.11.23

Zero-Day Flaw in Zimbra Email Software Exploited by Four Hacker GroupsVulnerebility

The Hacker News

17.11.23

Experts Uncover DarkCasino: New Emerging APT Threat Exploiting WinRAR FlawAPT

The Hacker News

16.11.23

Ransomware gang files SEC complaint over victim’s undisclosed breachRansom

BleepingComputer

16.11.23

Samsung hit by new data breach impacting UK store customersIncindent

BleepingComputer

16.11.23

Microsoft fixes Windows Server VMs broken by October updatesVulnerebility

BleepingComputer

16.11.23

Citrix Hypervisor gets hotfix for new Reptar Intel CPU flawVulnerebility

BleepingComputer

16.11.23

Toronto Public Library confirms data stolen in ransomware attackRansom

BleepingComputer

16.11.23

FBI and CISA warn of opportunistic Rhysida ransomware attacksRansom

BleepingComputer

16.11.23

PJ&A says cyberattack exposed data of nearly 9 million patientsIncindent

BleepingComputer

16.11.23

Fraudsters make $50,000 a day by spoofing crypto researchersCryptocurrency

BleepingComputer

16.11.23

IPStorm botnet with 23,000 proxies for malicious traffic dismantledBotNet

BleepingComputer

16.11.23

WP Fastest Cache plugin bug exposes 600K WordPress sites to attacksHack

BleepingComputer

16.11.23

New Reptar CPU flaw impacts Intel desktop and server systemsVulnerebility

BleepingComputer

16.11.23

VMware discloses critical VCD Appliance auth bypass with no patchVulnerebility

BleepingComputer

16.11.23

New CacheWarp AMD CPU attack lets hackers gain root in Linux VMsAttack

BleepingComputer

16.11.23

LockBit ransomware exploits Citrix Bleed in attacks, 10K servers exposedRansom

BleepingComputer

16.11.23

Microsoft November 2023 Patch Tuesday fixes 5 zero-days, 58 flawsOS

BleepingComputer

16.11.23

Microsoft fixes critical Azure CLI flaw that leaked credentials in logsOS

BleepingComputer

16.11.23

Windows 11 KB5032190 update enables Moment 4 features for everyoneOS

BleepingComputer

16.11.23

Windows 10 KB5032189 update released with 11 improvementsOS

BleepingComputer

16.11.23

Pharmacy provider Truepill data breach hits 2.3 million customersIncindent

BleepingComputer

16.11.23

Meet the Unique New "Hacking" Group: AlphaLockHack

BleepingComputer

16.11.23

CISA and FBI Issue Warning About Rhysida Ransomware Double Extortion AttacksRansom

The Hacker News

16.11.23

Hackers Could Exploit Google Workspace and Cloud Platform for Ransomware AttacksRansom

The Hacker News

16.11.23

Russian Hackers Linked to 'Largest Ever Cyber Attack' on Danish Critical InfrastructureBigBrothers

The Hacker News

16.11.23

U.S. Takes Down IPStorm Botnet, Russian-Moldovan Mastermind Pleads GuiltyBigBrothers

The Hacker News

16.11.23

New PoC Exploit for Apache ActiveMQ Flaw Could Let Attackers Fly Under the RadarVulnerebility

The Hacker News

16.11.23

The Importance of Continuous Security Monitoring for a Robust Cybersecurity StrategyCyber

The Hacker News

15.11.23

In-Depth Analysis of July 2023 Exploit Chain Featuring CVE-2023-36884 and CVE-2023-36584Exploit blogPalo Alto

15.11.23

High Traffic + High Vulnerability = an Attractive Target for Criminals: The Dangers of Viewing Clickbait SitesVulnerebility blog

Palo Alto

15.11.23

Chinese APT Targeting Cambodian GovernmentAPT blog

Palo Alto

15.11.23

Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech SectorsBigBrother blog

Palo Alto

15.11.23

GPT VS MALWARE ANALYSIS: CHALLENGES AND MITIGATIONSMalware blogCheckpoint

15.11.23

ABUSING MICROSOFT ACCESS “LINKED TABLE” FEATURE TO PERFORM NTLM FORCED AUTHENTICATION ATTACKSAttack blogCheckpoint

15.11.23

Level up! These games will make learning about cybersecurity funCyber blog

Eset

15.11.23

Capture The Flag: 5 websites to sharpen your hacking skillsHacking blog

Eset

15.11.23

Spyware disguised as a news app – Week in security with Tony AnscombeMalware blog

Eset

15.11.23

Cyber threat intelligence: Getting on the front foot against adversariesCyber blog

Eset

15.11.23

Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-BaltistanOS Blog

Eset

15.11.23

Navigating the security and privacy challenges of large language modelsSecurity blog

Eset

14.11.23

Ethereum feature abused to steal $60 million from 99K victimsCryptocurrency

BleepingComputer

14.11.23

FBI: Royal ransomware asked 350 victims to pay $275 millionRansom

BleepingComputer

14.11.23

DP World cyberattack blocks thousands of containers in portsCyber

BleepingComputer

14.11.23

CISA warns of actively exploited Juniper pre-auth RCE exploit chainExploit

BleepingComputer

14.11.23

Israel warns of BiBi wiper attacks targeting Linux and WindowsVirus

BleepingComputer

14.11.23

Criminal IP & Cisco SecureX/XDR: Enhanced Cyber Threat AnalysisCyber

BleepingComputer

14.11.23

LockBit ransomware leaks gigabytes of Boeing dataRansom

BleepingComputer

14.11.23

Windows 11 will soon let you uninstall more inbox appsOS

BleepingComputer

14.11.23

Iranian hackers launch malware attacks on Israel’s tech sectorVirusBleepingComputer

14.11.23

The Importance of Continuous Security Monitoring for a Robust Cybersecurity StrategyCyber

The Hacker News

14.11.23

Alert: OracleIV DDoS Botnet Targets Public Docker Engine APIs to Hijack ContainersBotNet

The Hacker News

14.11.23

New Campaign Targets Middle East Governments with IronWind MalwareVirus

The Hacker News

14.11.23

Vietnamese Hackers Using New Delphi-Powered Malware to Target Indian MarketersVirus

The Hacker News

14.11.23

CISA Sets a Deadline - Patch Juniper Junos OS Flaws Before November 17OS

The Hacker News

14.11.23

New Ransomware Group Emerges with Hive's Source Code and InfrastructureRansom

The Hacker News

13.11.23

Chinese Hackers Launch Covert Espionage Attacks on 24 Cambodian OrganizationsBigBrothers

The Hacker News

13.11.23

Major Phishing-as-a-Service Syndicate 'BulletProofLink' Dismantled by Malaysian AuthoritiesPhishing

The Hacker News

13.11.23

New BiBi-Windows Wiper Targets Windows Systems in Pro-Hamas AttacksVirus

The Hacker News

12.11.23

Police takes down BulletProftLink large-scale phishing providerPhishing

BleepingComputer

12.11.23

Microsoft fixes Outlook bug causing attachment saving issuesOS

BleepingComputer

12.11.23

Mortgage giant Mr. Cooper says customer data exposed in breachIncindent

BleepingComputer

12.11.23

Microsoft: BlueNoroff hackers plan new crypto-theft attacksAttack

BleepingComputer

12.11.23

Hackers breach healthcare orgs via ScreenConnect remote accessIncindent

BleepingComputer

12.11.23

Microsoft extends Windows Server 2012 ESUs to October 2026OS

BleepingComputer

12.11.23

Maine govt notifies 1.3 million people of MOVEit data breachIncindent

BleepingComputer

12.11.23

McLaren Health Care says data breach impacted 2.2 million peopleIncindent

BleepingComputer

12.11.23

Kyocera AVX says ransomware attack impacted 39,000 individualsRansom

BleepingComputer

12.11.23

Cloudflare website downed by DDoS attack claimed by Anonymous SudanAttack

BleepingComputer

12.11.23

World’s largest commercial bank ICBC confirms ransomware attackRansom

BleepingComputer

12.11.23

Microsoft shares temp fix for broken Windows Server 2022 VMsOS

BleepingComputer

12.11.23

Google ads push malicious CPU-Z app from fake Windows news siteVirus

BleepingComputer

12.11.23

Microsoft: SysAid zero-day flaw exploited in Clop ransomware attacksRansom

BleepingComputer

12.11.23

Russian hackers switch to LOTL technique to cause power outageBigBrothers

BleepingComputer

12.11.23

OpenAI confirms DDoS attacks behind ongoing ChatGPT outagesAI

BleepingComputer

12.11.23

Microsoft drops SMB1 firewall rules in new Windows 11 buildOS

BleepingComputer

12.11.23

Sumo Logic discloses security breach, advises API key resetsIncindent

BleepingComputer

12.11.23

Russian state-owned Sberbank hit by 1 million RPS DDoS attackAttack

BleepingComputer

12.11.23

FBI: Ransomware gangs hack casinos via 3rd party gaming vendorsRansom

BleepingComputer

12.11.23

Microsoft Warns of Fake Skills Assessment Portals Targeting IT Job SeekersApple

The Hacker News

11.11.23

Russian Hackers Sandworm Cause Power Outage in Ukraine Amidst Missile StrikesAPT

The Hacker News

11.11.23

Alert: 'Effluence' Backdoor Persists Despite Patching Atlassian Confluence ServersVirus

The Hacker News

11.11.23

Iran-Linked Imperial Kitten Cyber Group Targeting Middle East's Tech SectorsAPT

The Hacker News

10.11.23

ChatGPT down after major outage impacting OpenAI systems

AI

BleepingComputer

10.11.23

WhatsApp now lets users hide their location during calls

Social

BleepingComputer

10.11.23

Russian-speaking threat actor "farnetwork" linked to 5 ransomware gangs

Ransom

BleepingComputer

10.11.23

TransForm says ransomware data breach affects 267,000 patients

Ransom

BleepingComputer

10.11.23

Fake Ledger Live app in Microsoft Store steals $768,000 in crypto

Incindent

BleepingComputer

10.11.23

BlueNoroff hackers backdoor Macs with new ObjCShellz malware

Virus

BleepingComputer

10.11.23

Microsoft: Some Outlook.com users can't send emails with attachments

Security

BleepingComputer

10.11.23

Microsoft Authenticator now blocks suspicious MFA alerts by default

Security

BleepingComputer

10.11.23

Marina Bay Sands discloses data breach impacting 665,000 customers

Incindent

BleepingComputer

10.11.23

Veeam warns of critical bugs in Veeam ONE monitoring platform

Vulnerebility

BleepingComputer

10.11.23

Hackers exploit Looney Tunables Linux bug, steal cloud creds

Exploit

BleepingComputer

10.11.23

Microsoft will roll out MFA-enforcing policies for admin portal access

Security

BleepingComputer

10.11.23

Critical Atlassian Confluence bug exploited in Cerber ransomware attacks

Ransom

BleepingComputer

10.11.23

US sanctions Russian who laundered money for Ryuk ransomware affiliate

Ransom

BleepingComputer

10.11.23

TellYouThePass ransomware joins Apache ActiveMQ RCE attacks

Ransom

BleepingComputer

10.11.23

Stealthy Kamran Spyware Targeting Urdu-speaking Users in Gilgit-Baltistan

Virus

The Hacker News

10.11.23

Zero-Day Alert: Lace Tempest Exploits SysAid IT Support Software Vulnerability

Exploit

The Hacker News

10.11.23

New Malvertising Campaign Uses Fake Windows News Portal to Distribute Malicious Installers

Virus

The Hacker News

10.11.23

MuddyC2Go: New C2 Framework Iranian Hackers Using Against Israel

APT

The Hacker News

9.11.23

CISA Alerts: High-Severity SLP Vulnerability Now Under Active Exploitation

Exploit

The Hacker News

9.11.23

Researchers Uncover Undetectable Crypto Mining Technique on Azure Automation

Cryptocurrency

The Hacker News

9.11.23

WhatsApp Introduces New Privacy Feature to Protect IP Address in Calls

Social

The Hacker News

9.11.23

Beware, Developers: BlazeStealer Malware Discovered in Python Packages on PyPI

Virus

The Hacker News

9.11.23

Experts Expose Farnetwork's Ransomware-as-a-Service Business Model

Ransom

The Hacker News

8.11.23

N. Korea's BlueNoroff Blamed for Hacking macOS Machines with ObjCShellz Malware

Virus

The Hacker News

8.11.23

New GootLoader Malware Variant Evades Detection and Spreads Rapidly

Virus

The Hacker News

8.11.23

Offensive and Defensive AI: Let's Chat(GPT) About It

AI

The Hacker News

8.11.23

SideCopy Exploiting WinRAR Flaw in Attacks Targeting Indian Government Entities

Virus

The Hacker News

7.11.23

Experts Warn of Ransomware Hackers Exploiting Atlassian and Apache Flaws

Ransom

The Hacker News

7.11.23

Critical Flaws Discovered in Veeam ONE IT Monitoring Software – Patch Now

Vulnerebility

The Hacker News

7.11.23

New Jupyter Infostealer Version Emerges with Sophisticated Stealth Tactics

Virus

The Hacker News

7.11.23

QNAP Releases Patch for 2 Critical Flaws Threatening Your NAS Devices

Vulnerebility

The Hacker News

6.11.23

SecuriDropper: New Android Dropper-as-a-Service Bypasses Google's Defenses

Android

The Hacker News

6.11.23

QNAP warns of critical command injection flaws in QTS OS, apps

Vulnerebility

BleepingComputer

6.11.23

Cybercrime service bypasses Android security to install malware

Android

BleepingComputer

6.11.23

Socks5Systemz proxy service infects 10,000 systems worldwide

BotNet

BleepingComputer

6.11.23

Discord will switch to temporary file links to block malware delivery

Virus

BleepingComputer

6.11.23

Apple 'Find My' network can be abused to steal keylogged passwords

Apple

BleepingComputer

6.11.23

Iranian Hackers Launches Destructive Cyberattacks on Israeli Tech and Education Sectors

BigBrothers

The Hacker News

6.11.23

Google Warns How Hackers Could Abuse Calendar Service as a Covert C2 Channel

Hack

The Hacker News

6.11.23

U.S. Treasury Sanctions Russian Money Launderer in Cybercrime Crackdown

BigBrothers

The Hacker News

4.11.23

Threat Brief: Citrix Bleed CVE-2023-4966

Vulnerebility blog

Palo Alto

4.11.23

Conducting Robust Learning for Empire Command and Control Detection

Safety blog

Palo Alto

4.11.23

Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla)

Malware blog

Palo Alto

4.11.23

CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys

Malware blog

Palo Alto

4.11.23

BlackCat Climbs the Summit With a New Tactic

Ransom blog

Palo Alto

4.11.23

FROM ALBANIA TO THE MIDDLE EAST: THE SCARRED MANTICORE IS LISTENING

BigBrother blog

Checkpoint

4.11.23

Arid Viper disguising mobile spyware as updates for non-malicious Android applications

OS Blog

Cisco Blog

4.11.23

Attackers use JavaScript URLs, API forms and more to scam users in popular online game “Roblox”

Spam blog

Cisco Blog

4.11.23

Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan

BigBrother blog

Cisco Blog

4.11.23

The mysterious demise of the Mozi botnet – Week in security with Tony Anscombe

BotNet blog

Eset

4.11.23

Who killed Mozi? Finally putting the IoT zombie botnet in its grave

BotNet blog

Eset

4.11.23

Closing the gender gap: 7 ways to attract more women into cybersecurity

Cyber blog

Eset

4.11.23

20 scary cybersecurity facts and figures for a haunting Halloween

Security blog

Eset

4.11.23

Roundcube Webmail servers under attack – Week in security with Tony Anscombe

Attack blog

Eset

4.11.23

ESET APT Activity Report Q2–Q3 2023

APT blog

Eset

4.11.23

Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers

Exploit blog

Eset

4.11.23

One login to rule them all: Should you sign in with Google or Facebook on other websites?

Social blog

Eset

4.11.23The Week in Ransomware - November 3rd 2023 - Hive's BackRansomBleepingComputer
4.11.23Dutch hacker jailed for extortion, selling stolen data on RaidForumsCyberCrimeBleepingComputer
4.11.23American Airlines pilot union hit by ransomware attackRansomBleepingComputer
4.11.23Google Play adds security audit badges for Android VPN appsAndroidBleepingComputer
4.11.23New Microsoft Exchange zero-days allow RCE, data theft attacksExploitBleepingComputer
4.11.23StripedFly Malware Operated Unnoticed for 5 Years, Infecting 1 Million DevicesVirusThe Hacker News
4.11.23Okta's Recent Customer Support Data Breach Impacted 134 CustomersIncindentThe Hacker News
4.11.23Google Play Store Introduces 'Independent Security Review' Badge for AppsAndroidThe Hacker News
4.11.23Kinsing Actors Exploiting Recent Linux Flaw to Breach Cloud EnvironmentsVulnerebilityThe Hacker News
3.11.23Okta breach: 134 customers exposed in October support system hackIncindentBleepingComputer
3.11.23Atlassian warns of exploit for Confluence data wiping bug, get patchingExploitBleepingComputer
3.11.23Ace Hardware says 1,202 devices were hit during cyberattackAttackBleepingComputer
3.11.23New macOS 'KandyKorn' malware targets cryptocurrency engineersAppleBleepingComputer
3.11.23BlackCat ransomware claims breach of healthcare giant Henry ScheinRansomBleepingComputer
3.11.23Mortgage giant Mr. Cooper hit by cyberattack impacting IT systemsAttackBleepingComputer
3.11.23HelloKitty ransomware now exploiting Apache ActiveMQ flaw in attacksRansomBleepingComputer
3.11.23Cloudflare Dashboard and APIs down after data center power outageSecurityBleepingComputer
3.11.23Boeing confirms cyberattack amid LockBit ransomware claimsRansomBleepingComputer
3.11.23Microsoft pledges to bolster security as part of ‘Secure Future’ initiativeOSBleepingComputer
3.11.23Okta hit by third-party data breach exposing employee informationIncindentBleepingComputer
3.11.23FSB arrests Russian hackers working for Ukrainian cyber forcesBigBrothersBleepingComputer
3.11.23Toronto Public Library outages caused by Black Basta ransomware attackRansomBleepingComputer
3.11.23New CVSS 4.0 vulnerability severity rating standard releasedSecurityBleepingComputer
3.11.23Hackers use Citrix Bleed flaw in attacks on govt networks worldwideBigBrothersBleepingComputer
3.11.233,000 Apache ActiveMQ servers vulnerable to RCE attacks exposed onlineExploit

BleepingComputer

3.11.23Microsoft: Windows Copilot makes desktop icons jump between displaysOSBleepingComputer
3.11.23Mozi malware botnet goes dark after mysterious use of kill-switchBotNetBleepingComputer
3.11.23Hackers exploit recent F5 BIG-IP flaws in stealthy attacksExploitBleepingComputer
3.11.23LayerX Enterprise Browser Security Extension – Secure the Modern WorkspaceSecurityBleepingComputer
3.11.23Avast confirms it tagged Google app as malware on Android phonesAndroid

BleepingComputer

3.11.23Flipper Zero Bluetooth spam attacks ported to new Android appAndroidBleepingComputer
3.11.23Windows 11 23H2 - New features in the Windows 11 2023 UpdateOSBleepingComputer
3.11.23How to download a Windows 11 23H2 ISO from MicrosoftOSBleepingComputer
3.11.23British Library knocked offline by weekend cyberattackCyberCrimeBleepingComputer
3.11.23Atlassian warns of critical Confluence flaw leading to data lossVulnerebilityBleepingComputer
3.11.23Microsoft releases Windows 11 23H2 as an enablement packageOSBleepingComputer
3.11.23Dozens of countries will pledge to stop paying ransomware gangsRansomBleepingComputer
3.11.23Samsung Galaxy gets new Auto Blocker anti-malware featureSafetyBleepingComputer
3.11.23Massive cybercrime URL shortening service uncovered via DNS dataCyberCrime

BleepingComputer

3.11.23Canada bans WeChat and Kaspersky products on govt devicesBigBrothersBleepingComputer
3.11.23Malicious NuGet packages abuse MSBuild to install malwareVirusBleepingComputer
3.11.23NodeStealer Malware Hijacking Facebook Business Accounts for Malicious AdsVirusThe Hacker News
3.11.23Predictive AI in Cybersecurity: Outcomes Demonstrate All AI is Not Created EquallyAIThe Hacker News
3.11.23CanesSpy Spyware Discovered in Modified WhatsApp VersionsVirusThe Hacker News
3.11.2348 Malicious npm Packages Found Deploying Reverse Shells on Developer SystemsVirusThe Hacker News
2.11.23Mysterious Kill Switch Disrupts Mozi IoT Botnet OperationsBotNetThe Hacker News
2.11.23Iran's MuddyWater Targets Israel in New Spear-Phishing Cyber CampaignBigBrothersThe Hacker News
2.11.23Researchers Find 34 Windows Drivers Vulnerable to Full Device TakeoverVulnerebilityThe Hacker News
2.11.23FIRST Announces CVSS 4.0 - New Vulnerability Scoring SystemSecurityThe Hacker News
2.11.23HelloKitty Ransomware Group Exploiting Apache ActiveMQ VulnerabilityRansomThe Hacker News
2.11.23Researchers Expose Prolific Puma's Underground Link Shortening ServiceHackThe Hacker News
1.11.23Iranian Cyber Espionage Group Targets Financial and Government Sectors in Middle EastBigBrothersThe Hacker News
1.11.23North Korean Hackers Targeting Crypto Experts with KANDYKORN macOS MalwareAppleThe Hacker News
1.11.23Turla Updates Kazuar Backdoor with Advanced Anti-Analysis to Evade DetectionAPTThe Hacker News
1.11.23Alert: F5 Warns of Active Attacks Exploiting BIG-IP VulnerabilityVulnerebilityThe Hacker News
1.11.23Arid Viper Targeting Arabic Android Users with Spyware Disguised as Dating AppAndroidThe Hacker News