H  January(103)  February(113)  March(175)  APRIL(74)  MAY(28)  JUNE(198)  July(423)  August(462)  September(389)  October(406)  November(5)  December()

DATE

NAME

CATEGORY

WEB

31.10.23Exploit released for critical Cisco IOS XE flaw, many hosts still hackedExploitBleepingComputer
31.10.23LastPass breach linked to theft of $4.4 million in cryptoIncindentBleepingComputer
31.10.23SEC sues SolarWinds for misleading investors before 2020 hackHackBleepingComputer
31.10.23RCE exploit for Wyze Cam v3 publicly released, patch nowExploit

BleepingComputer

31.10.23FTC orders non-bank financial firms to report breaches in 30 daysIncindentBleepingComputer
31.10.23Google Chrome now auto-upgrades to secure connections for all usersCyberBleepingComputer
31.10.23Toronto Public Library services down following weekend cyberattackCyberBleepingComputer
31.10.23New BiBi-Linux wiper malware targets Israeli orgs in destructive attacksVirusBleepingComputer
31.10.23Huawei, Vivo phones tag Google app as TrojanSMS-PA malwareMobilBleepingComputer
31.10.23New Hunters International ransomware possible rebrand of HiveRansom

BleepingComputer

31.10.23Pirate IPTV network in Austria dismantled and $1.74 million seizedCyberCrimeBleepingComputer
31.10.23Windows 11 adds support for 11 file archives, including 7-Zip and RAROSBleepingComputer
31.10.23Hackers email stolen student data to parents of Nevada school districtIncindentBleepingComputer
31.10.23HackerOne paid ethical hackers over $300 million in bug bountiesCyberBleepingComputer
31.10.23Malicious NuGet Packages Caught Distributing SeroXen RAT MalwareVirusThe Hacker News
31.10.23Atlassian Warns of New Critical Confluence Vulnerability Threatening Data LossVulnerebilityThe Hacker News
31.10.23Trojanized PyCharm Software Version Delivered via Google Search AdsVirusThe Hacker News
31.10.23Canada Bans WeChat and Kaspersky Apps On Government DevicesBigBrothersThe Hacker News
31.10.23Meta Launches Paid Ad-Free Subscription in Europe to Satisfy Privacy LawsBigBrothersThe Hacker News
31.10.23Pro-Hamas Hacktivists Targeting Israeli Entities with Wiper MalwareVirusThe Hacker News
30.10.23ServiceNow Data Exposure: A Wake-Up Call for CompaniesCyberThe Hacker News
30.10.23EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHubCryptocurrencyThe Hacker News
30.10.23Urgent: New Security Flaws Discovered in NGINX Ingress Controller for KubernetesVulnerebilityThe Hacker News
30.10.23Hackers Using MSIX App Packages to Infect Windows PCs with GHOSTPULSE MalwareVirusThe Hacker News
28.10.23Hackers earn over $1 million for 58 zero-days at Pwn2Own TorontoCyberBleepingComputer
28.10.23The Week in Ransomware - October 27th 2023 - Breaking RecordsRansomBleepingComputer
28.10.23Microsoft 365 users get workaround for ‘Something Went Wrong’ errorsOS

BleepingComputer

28.10.23Lazarus hackers breached dev repeatedly to deploy SIGNBT malwareAPTBleepingComputer
28.10.23F5 fixes BIG-IP auth bypass allowing remote code execution attacksVulnerebilityBleepingComputer
28.10.23Windows 11 KB5031455 preview update enables Moment 4 features by defaultOSBleepingComputer
28.10.23Researchers Uncover Wiretapping of XMPP-Based Instant Messaging ServiceHackThe Hacker News
28.10.23N. Korean Lazarus Group Targets Software Vendor Using Known FlawsAPTThe Hacker News
28.10.23Google Expands Its Bug Bounty Program to Tackle Artificial Intelligence ThreatsAIThe Hacker News
27.10.23Windows 10 KB5031445 preview update fixes ctfmon.exe memory leak, 9 issuesOSBleepingComputer
27.10.23Microsoft: Octo Tempest is one of the most dangerous financial hacking groupsCyberBleepingComputer
27.10.23Android adware apps on Google Play amass two million installsAndroidBleepingComputer
27.10.23Nigerian Police dismantle cybercrime recruitment, mentoring hubCyberCrime

BleepingComputer

27.10.23France says Russian state hackers breached numerous critical networksBigBrothersBleepingComputer
27.10.23StripedFly malware framework infects 1 million Windows, Linux hostsVirusBleepingComputer
27.10.23Cloudflare sees surge in hyper-volumetric HTTP DDoS attacksAttack

BleepingComputer

27.10.23New iLeakage attack steals emails, passwords from Apple SafariAttackBleepingComputer
27.10.23Samsung Galaxy S23 hacked two more times at Pwn2Own TorontoMobil

BleepingComputer

27.10.23Chilean telecom giant GTD hit by the Rorschach ransomware gangRansomBleepingComputer
27.10.23Microsoft tests Windows 11 encrypted DNS server auto-discoveryOSBleepingComputer
27.10.23Flipper Zero can now spam Android, Windows users with Bluetooth alertsSpam

BleepingComputer

27.10.23Windows 11 to let admins mandate SMB encryption for outbound connectionsOSBleepingComputer
27.10.23Seiko says ransomware attack exposed sensitive customer dataRansom

BleepingComputer

27.10.23Citrix Bleed exploit lets hackers hijack NetScaler accountsExploitBleepingComputer
27.10.23Ransomware isn’t going away – the problem is only getting worseRansomBleepingComputer
27.10.23European govt email servers hacked using Roundcube zero-dayVulnerebility

BleepingComputer

27.10.23VMware fixes critical code execution flaw in vCenter ServerVulnerebilityBleepingComputer
27.10.23F5 Issues Warning: BIG-IP Vulnerability Allows Remote Code ExecutionVulnerebilityThe Hacker News
27.10.23iLeakage: New Safari Exploit Impacts Apple iPhones and Macs with A- and M-Series CPUsExploitThe Hacker News
27.10.23Microsoft Warns as Scattered Spider Expands from SIM Swaps to RansomwareRansomThe Hacker News
27.10.23Record-Breaking 100 Million RPS DDoS Attack Exploits HTTP/2 Rapid Reset FlawAttackThe Hacker News
26.10.23Iranian Group Tortoiseshell Launches New Wave of IMAPLoader Malware AttacksVirusThe Hacker News
26.10.23Critical Flaw in NextGen's Mirth Connect Could Expose Healthcare DataVulnerebilityThe Hacker News
26.10.23YoroTrooper: Researchers Warn of Kazakhstan's Stealthy Cyber Espionage GroupBigBrothersThe Hacker News
26.10.23Nation State Hackers Exploiting Zero-Day in Roundcube Webmail SoftwareExploitThe Hacker News
26.10.23Critical OAuth Flaws Uncovered in Grammarly, Vidio, and Bukalapak PlatformsVulnerebilityThe Hacker News
26.10.23Act Now: VMware Releases Patch for Critical vCenter Server RCE VulnerabilityVulnerebilityThe Hacker News
26.10.23Malvertising Campaign Targets Brazil's PIX Payment System with GoPIX MalwareVirusThe Hacker News
25.10.23Samsung Galaxy S23 hacked twice on first day of Pwn2Own TorontoHackBleepingComputer
25.10.23Hackers backdoor Russian state, industrial orgs for data theftBigBrothers

BleepingComputer

25.10.23Decentralized Matrix messaging network says it now has 115M usersSecurityBleepingComputer
25.10.23ASVEL basketball team confirms data breach after ransomware attackRansomBleepingComputer
25.10.23VMware warns admins of public exploit for vRealize RCE flawVulnerebility

BleepingComputer

25.10.23Cyberattack on health services provider impacts 5 Canadian hospitalsAttackBleepingComputer
25.10.23September was a record month for ransomware attacks in 2023RansomBleepingComputer
25.10.231Password discloses security incident linked to Okta breachIncindent

BleepingComputer

25.10.23University of Michigan employee, student data stolen in cyberattackIncindentBleepingComputer
25.10.23Palestine crypto donation scams emerge amid Israel-Hamas warBigBrothersBleepingComputer
25.10.23Citrix warns admins to patch NetScaler CVE-2023-4966 bug immediatelyVulnerebility

BleepingComputer

25.10.23US energy firm shares how Akira ransomware hacked its systemsRansomBleepingComputer
25.10.23Spain arrests 34 cybercriminals who stole data of 4 million peopleCyberCrimeBleepingComputer
25.10.23Cisco patches IOS XE zero-days used to hack over 50,000 devicesVulnerebility

BleepingComputer

25.10.23QNAP takes down server behind widespread brute-force attacksAttackBleepingComputer
25.10.23City of Philadelphia discloses data breach after five monthsIncindentBleepingComputer
25.10.23D.C. Board of Elections: Hackers may have breached entire voter rollBigBrothers

BleepingComputer

25.10.23Google Chrome's new "IP Protection" will hide users' IP addressesSafetyBleepingComputer
25.10.23Hackers update Cisco IOS XE backdoor to hide infected devicesVirusBleepingComputer
25.10.23New TetrisPhantom hackers steal data from secure USB drives on govt systemsIncindent

BleepingComputer

25.10.23Microsoft announces Security Copilot early access programOSBleepingComputer
25.10.23Alert: PoC Exploits Released for Citrix and VMware VulnerabilitiesVulnerebilityThe Hacker News
25.10.23Ex-NSA Employee Pleads Guilty to Leaking Classified Data to RussiaBigBrothersThe Hacker News
25.10.2334 Cybercriminals Arrested in Spain for Multi-Million Dollar Online ScamsCyberCrimeThe Hacker News
24.10.23Operation Triangulation: Experts Uncover Deeper Insights into iOS Zero-Day AttacksAppleThe Hacker News
24.10.23Backdoor Implant on Hacked Cisco Devices Modified to Evade DetectionVirusThe Hacker News
24.10.231Password Detects Suspicious Activity Following Okta Support BreachIncindentThe Hacker News
24.10.23Who's Experimenting with AI Tools in Your Organization?AIThe Hacker News
24.10.23DoNot Team's New Firebird Backdoor Hits Pakistan and AfghanistanVirusThe Hacker News
23.10.23Quasar RAT Leverages DLL Side-Loading to Fly Under the RadarVirusThe Hacker News
22.10.23American Family Insurance confirms cyberattack is behind IT outagesIncindentBleepingComputer
22.10.23The Week in Ransomware - October 20th 2023 - Fighting BackRansom

BleepingComputer

22.10.23International Criminal Court systems breached for cyber espionageIncindentBleepingComputer
22.10.23Threat Brief: Cisco IOS XE Web UI Privilege Escalation Vulnerability (Updated)Vulnerebility

Palo Alto

22.10.23BlackCat Climbs the Summit With a New TacticRansom

Palo Alto

22.10.23R2R STOMPING – ARE YOU READY TO RUN?CyberCheckpoint
22.10.23Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerabilitiesExploit

Cisco Blog

22.10.23What is Cracktivator software?Security

Cisco Blog

22.10.23Why logging is one of the most overlooked aspects of incident response, and how Cisco Talos IR can helpSecurity

Cisco Blog

22.10.23Spearphishing targets in Latin America – Week in security with Tony AnscombeSafety

Eset

22.10.23Strengthening the weakest link: top 3 security awareness topics for your employeesSecurity

Eset

22.10.23Better safe than sorry: 10 tips to build an effective business backup strategySecurity

Eset

22.10.23Operation King TUT: The universe of threats in LATAMCyber

Eset

21.10.23Cisco discloses new IOS XE zero-day exploited to deploy malware implantExploitBleepingComputer
21.10.23Okta says its support system was breached using stolen credentialsIncindent

BleepingComputer

21.10.23Ragnar Locker ransomware developer arrested in FranceRansomBleepingComputer
21.10.23Critical RCE flaws found in SolarWinds access audit solutionVulnerebility

BleepingComputer

21.10.23Kwik Trip finally confirms cyberattack was behind ongoing outageCyberBleepingComputer
21.10.23Fake Corsair job offers on LinkedIn push DarkGate malwareVirusBleepingComputer
21.10.23Over 40,000 Cisco IOS XE devices infected with backdoor using zero-dayVirus

BleepingComputer

21.10.23E-Root admin faces 20 years for selling stolen RDP, SSH accountsIncindentBleepingComputer
21.10.23BlackCat ransomware uses new ‘Munchkin’ Linux VM in stealthy attacksRansom

BleepingComputer

21.10.23Microsoft extends Purview Audit log retention after July breachIncindentBleepingComputer
21.10.23Fake KeePass site uses Google Ads and Punycode to push malwareVirusBleepingComputer
21.10.23India targets Microsoft, Amazon tech support scammers in nationwide crackdownSpamBleepingComputer
21.10.23Europol Dismantles Ragnar Locker Ransomware Infrastructure, Nabs Key DeveloperCyberCrimeThe Hacker News
21.10.23Okta's Support System Breach Exposes Customer Data to Unidentified Threat ActorsIncindentThe Hacker News
21.10.23Cisco Zero-Day Exploited to Implant Malicious Lua Backdoor on Thousands of DevicesExploitThe Hacker News
21.10.23Malvertisers Using Google Ads to Target Users Searching for Popular SoftwareVirusThe Hacker News
21.10.23Vietnamese Hackers Target U.K., U.S., and India with DarkGate MalwareVirusThe Hacker News
20.10.23ExelaStealer: A New Low-Cost Cybercrime Weapon EmergesVirusThe Hacker News
20.10.23U.S. DoJ Cracks Down on North Korean IT Scammers Defrauding Global BusinessesSpamThe Hacker News

19.10.23

Iranian hackers lurked in Middle Eastern govt network for 8 monthsHackBleepingComputer

19.10.23

Ragnar Locker ransomware’s dark web extortion sites seized by policeRansom

BleepingComputer

19.10.23

Casio discloses data breach impacting customers in 149 countriesIncindentBleepingComputer

19.10.23

Ukrainian activists hack Trigona ransomware gang, wipe serversRansom

BleepingComputer

19.10.23

North Korean hackers exploit critical TeamCity flaw to breach networksExploit

BleepingComputer

19.10.23

Ex-Navy IT head gets 5 years for selling people’s data on darkwebCyberCrimeBleepingComputer

19.10.23

Hacker leaks millions of new 23andMe genetic data profilesIncindent

BleepingComputer

19.10.23

Google Play Protect adds real-time scanning to fight Android malwareAndroid

BleepingComputer

19.10.23

MATA malware framework exploits EDR in attacks on defense firmsVirusBleepingComputer

19.10.23

Google links WinRAR exploitation to Russian, Chinese state hackersBigBrothers

BleepingComputer

19.10.23

Recently patched Citrix NetScaler bug exploited as zero-day since AugustExploit

BleepingComputer

19.10.23

Qubitstrike attacks rootkit Jupyter Linux servers to steal credentialsVirusBleepingComputer

19.10.23

Twitter testing annual subscriptions for tweeting and retweetingSocial

BleepingComputer

19.10.23

Microsoft disables bad spam rule flagging all sent emails as junkOS

BleepingComputer

19.10.23

FBI warns of extortion groups targeting plastic surgery officesBigBrothers

BleepingComputer

19.10.23

Over 40,000 admin portal accounts use 'admin' as a passwordIncindentBleepingComputer

19.10.23

KwikTrip all but says IT outage was caused by a cyberattackIncindent

BleepingComputer

19.10.23

Malicious Notepad++ Google ads evade detection for monthsVirus

BleepingComputer

19.10.23

Amazon adds passkey support as new passwordless login optionSecurity

BleepingComputer

19.10.23

D-Link confirms data breach after employee phishing attackPhishing

BleepingComputer

19.10.23

SpyNote Android malware spreads via fake volcano eruption alertsAndroid

BleepingComputer

19.10.23

Microsoft fixes known issue causing Outlook freezes, slow startsOSBleepingComputer

19.10.23

Fighting off cyberattacks? Make sure user credentials aren’t compromisedCyberBleepingComputer

19.10.23

Over 10,000 Cisco devices hacked in IOS XE zero-day attacksHack

BleepingComputer

19.10.23

October Windows Server updates cause Hyper-V VM boot issuesOS

BleepingComputer

19.10.23

Discord still a hotbed of malware activity — Now APTs join the funAPT

BleepingComputer

19.10.23

Kansas courts IT systems offline after ‘security incident’IncindentBleepingComputer

19.10.23

Hackers exploit critical flaw in WordPress Royal Elementor pluginExploitBleepingComputer

19.10.23

Russian Sandworm hackers breached 11 Ukrainian telcos since MayBigBrothers

BleepingComputer

19.10.23

Cisco warns of new IOS XE zero-day actively exploited in attacksExploit

BleepingComputer

19.10.23

Fake 'RedAlert' rocket alert app for Israel installs Android spywareAndroid

BleepingComputer

19.10.23

CISA, FBI urge admins to patch Atlassian Confluence immediatelyBigBrothersBleepingComputer

19.10.23

Microsoft fixes Windows 10 security update installation issueOSBleepingComputer

19.10.23

Signal says there is no evidence rumored zero-day bug is realSocial

BleepingComputer

19.10.23

Steam enforces SMS verification to curb malware-ridden updatesVirus

BleepingComputer

19.10.23

Women Political Leaders Summit targeted in RomCom malware phishingPhishing

BleepingComputer

19.10.23

AI algorithm detects MitM attacks on unmanned military vehiclesAIBleepingComputer

19.10.23

DarkGate malware spreads through compromised Skype accountsVirusBleepingComputer

19.10.23

Ubuntu discovers 'hate speech' in release 23.10 — how to upgrade?OSBleepingComputer

19.10.23

Sophisticated MATA Framework Strikes Eastern European Oil and Gas CompaniesBigBrothersThe Hacker News

19.10.23

Google Play Protect Introduces Real-Time Code-Level Scanning for Android MalwareAndroidThe Hacker News

19.10.23

Iran-Linked OilRig Targets Middle East Governments in 8-Month Cyber CampaignBigBrothersThe Hacker News

19.10.23

Microsoft Warns of North Korean Attacks Exploiting JetBrains TeamCity FlawExploitThe Hacker News

19.10.23

Google TAG Detects State-Backed Threat Actors Exploiting WinRAR FlawExploitThe Hacker News

19.10.23

Lazarus Group Targeting Defense Experts with Fake Interviews via Trojanized VNC AppsAPTThe Hacker News

19.10.23

Critical Citrix NetScaler Flaw Exploited to Target from Government, Tech FirmsExploitThe Hacker News

19.10.23

Unraveling Real-Life Attack Paths – Key Lessons LearnedAttackThe Hacker News

19.10.23

Qubitstrike Targets Jupyter Notebooks with Crypto Mining and Rootkit CampaignCyberCrimeThe Hacker News

18.10.23

TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC GovernmentsBigBrothersThe Hacker News

18.10.23

New Admin Takeover Vulnerability Exposed in Synology's DiskStation ManagerVulnerebilityThe Hacker News

18.10.23

D-Link Confirms Data Breach: Employee Falls Victim to Phishing AttackPhishingThe Hacker News

18.10.23

Discord: A Playground for Nation-State Hackers Targeting Critical InfrastructureBigBrothersThe Hacker News

18.10.23

Critical Vulnerabilities Uncovered in Open Source CasaOS Cloud SoftwareVulnerebilityThe Hacker News

17.10.23

Exploring the Realm of Malicious Generative AI: A New Digital Security ChallengeAIThe Hacker News

17.10.23

Experts Warn of Severe Flaws Affecting Milesight Routers and Titan SFTP ServersVulnerebilityThe Hacker News

17.10.23

CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by CyberattacksBigBrothersThe Hacker News

17.10.23

Warning: Unpatched Cisco Zero-Day Vulnerability Actively Targeted in the WildVulnerebilityThe Hacker News

17.10.23

Pro-Russian Hackers Exploiting Recent WinRAR Vulnerability in New CampaignBigBrothersThe Hacker News

16.10.23

SpyNote: Beware of This Android Trojan that Records Audio and Phone CallsAndroidThe Hacker News

16.10.23

Signal Debunks Zero-Day Vulnerability Reports, Finds No EvidenceVulnerebilityThe Hacker News

16.10.23

Binance's Smart Chain Exploited in New 'EtherHiding' Malware CampaignExploitThe Hacker News

15.10.23

Understanding DNS Tunneling Traffic in the Wild

Security

Palo Alto

15.10.23

Wireshark Tutorial: Identifying Hosts and Users

Security

Palo Alto

15.10.23

STAYIN’ ALIVE – TARGETED ATTACKS AGAINST TELECOMS AND GOVERNMENT MINISTRIES IN ASIA

BigBrother

Checkpoint

15.10.23

R2R STOMPING – ARE YOU READY TO RUN?

Cyber

Checkpoint

15.10.23

What to know about the HTTP/2 Rapid Reset DDoS attacks

Attack

Cisco Blog

15.10.23

10 zero-day vulnerabilities in industrial cell router could lead to code execution, buffer overflows

Vulnerebility

Cisco Blog

15.10.23

Microsoft patches 12 critical vulnerabilities, nine of which are in Layer 2 Tunneling Protocol

Vulnerebility

Cisco Blog

15.10.23

Staying on top of security updates – Week in security with Tony Anscombe

Cyber

Eset

15.10.23

Virus Bulletin – building digital armies

Cyber

Eset

15.10.23

6 steps to getting the board on board with your cybersecurity program

Cyber

Eset

15.10.23

Virus Bulletin PUA – a love letter

Cyber

Eset

15.10.23

Your family, home and small business need a cyber-resilience strategy, too!

Cyber

Eset

14.10.23Microsoft to Phase Out NTLM in Favor of Kerberos for Stronger AuthenticationOSThe Hacker News
14.10.23New PEAPOD Cyberattack Campaign Targeting Women Political LeadersBigBrothersThe Hacker News
14.10.23The Week in Ransomware - October 13th 2023 - Increasing AttacksRansomBleepingComputer
14.10.2323andMe hit with lawsuits after hacker leaks stolen genetics dataIncindent

BleepingComputer

14.10.23Microsoft: October Windows 10 security updates fail to installOS

BleepingComputer

14.10.23Kwik Trip IT systems outage caused by mysterious ‘network incident’Incindent

BleepingComputer

14.10.23Microsoft plans to kill off NTLM authentication in Windows 11OSBleepingComputer
14.10.23Hackers use Binance Smart Chain contracts to store malicious scriptsVirusBleepingComputer
14.10.23CISA shares vulnerabilities, misconfigs used by ransomware gangsRansom

BleepingComputer

14.10.23FBI shares AvosLocker ransomware technical details, defense tipsRansom

BleepingComputer

14.10.23Ransomware attacks now target unpatched WS_FTP serversRansom

BleepingComputer

14.10.23Malicious Solana, Kucoin packages infect NuGet devs with SeroXen RATVirusBleepingComputer
14.10.23New Microsoft bug bounty program focuses on AI-powered BingAIBleepingComputer
14.10.23Apple fixes iOS Kernel zero-day vulnerability on older iPhonesApple

BleepingComputer

14.10.23ToddyCat hackers use 'disposable' malware to target Asian telecomsVirus

BleepingComputer

14.10.23Hyped up curl vulnerability falls short of expectationsVulnerebility

BleepingComputer

14.10.23Shadow PC warns of data breach as hacker tries to sell gamers' infoIncindent

BleepingComputer

14.10.23New WordPress backdoor creates rogue admin to hijack websitesVirus

BleepingComputer

14.10.23BianLian extortion group claims recent Air Canada breachIncindentBleepingComputer
14.10.23Microsoft Defender now auto-isolates compromised accountsIncindentBleepingComputer
14.10.23Exchange Online mail delivery issues caused by anti-spam rulesSpamBleepingComputer
14.10.23Windows 11 21H2 and Windows Server 2012 reach end of supportOS

BleepingComputer

14.10.23Microsoft: State hackers exploiting Confluence zero-day since SeptemberExploit

BleepingComputer

14.10.23Simpson Manufacturing shuts down IT systems after cyberattackIncindent

BleepingComputer

14.10.23LinkedIn Smart Links attacks return to target Microsoft accountsSecurityBleepingComputer
13.10.23Researchers Unveil ToddyCat's New Set of Tools for Data ExfiltrationAPTThe Hacker News
13.10.23DarkGate Malware Spreading via Messaging Services Posing as PDF FilesVirusThe Hacker News
13.10.23FBI, CISA Warn of Rising AvosLocker Ransomware Attacks Against Critical InfrastructureRansomThe Hacker News
13.10.23Malicious NuGet Package Targeting .NET Developers with SeroXen RATVirusThe Hacker News
13.10.23ShellBot Uses Hex IPs to Evade Detection in Attacks on Linux SSH ServersBotNetThe Hacker News
12.10.23Microsoft Defender Thwarts Akira Ransomware's Large-Scale AttackAttack

The Hacker News

12.10.23Researchers Uncover Malware Posing as WordPress Caching PluginVirusThe Hacker News
12.10.23Researchers Uncover Ongoing Attacks Targeting Asian Governments and Telecom GiantsBigBrothersThe Hacker News
12.10.23Two High-Risk Security Flaws Discovered in Curl Library - New Patches ReleasedVulnerebilityThe Hacker News
12.10.23Over 17,000 WordPress Sites Compromised by Balada Injector in September 2023HackThe Hacker News
12.10.23CISA Warns of Actively Exploited Adobe Acrobat Reader VulnerabilityVulnerebilityThe Hacker News
11.10.23Microsoft warns of incorrect BitLocker encryption errorsOS

BleepingComputer

11.10.23Mirai DDoS malware variant expands targets with 13 router exploitsBotNetBleepingComputer
11.10.23Microsoft Exchange gets ‘better’ patch to mitigate critical bugOSBleepingComputer
11.10.23Windows 10 KB5031356 update released with 25 improvementsOS

BleepingComputer

11.10.23Windows 11 KB5031354 cumulative update released with new featuresOS

BleepingComputer

11.10.23Microsoft October 2023 Patch Tuesday fixes 3 zero-days, 104 flawsOS

BleepingComputer

11.10.23Air Europa data breach: Customers warned to cancel credit cardsIncindentBleepingComputer
11.10.23Microsoft to kill off VBScript in Windows to block malware deliveryOS

BleepingComputer

11.10.23New critical Citrix NetScaler flaw exposes 'sensitive' dataVulnerebility

BleepingComputer

11.10.23New 'HTTP/2 Rapid Reset' zero-day attack breaks DDoS recordsAttack

BleepingComputer

11.10.23Google makes passkeys the default sign-in for personal accountsSecurity

BleepingComputer

11.10.23D-Link WiFi range extender vulnerable to command injection attacksAttack

BleepingComputer

11.10.23ALPHV ransomware gang claims attack on Florida circuit courtRansom

BleepingComputer

11.10.23GNOME Linux systems exposed to RCE attacks via file downloadsVulnerebilityBleepingComputer
11.10.23Over 17,000 WordPress sites hacked in Balada Injector attacks last monthHackBleepingComputer
11.10.23Hackers modify online stores’ 404 pages to steal credit cardsCyberCrime

BleepingComputer

11.10.23Hackers hijack Citrix NetScaler login pages to steal credentialsIncindent

BleepingComputer

11.10.23HelloKitty ransomware source code leaked on hacking forumRansom

BleepingComputer

11.10.23Google Chrome's organize tabs will automatically reorder tabsSecurity

BleepingComputer

11.10.23Microsoft 365 admins warned of new Google anti-spam rulesSecurityBleepingComputer
11.10.23Third Flagstar Bank data breach since 2021 affects 800,000 customersIncindent

BleepingComputer

11.10.23Bounty offered for secret NSA seeds behind NIST elliptic curves algoBigBrothers

BleepingComputer

11.10.23Microsoft Releases October 2023 Patches for 103 Flaws, Including 2 Active ExploitsVulnerebility

The Hacker News

11.10.23Microsoft Warns of Nation-State Hackers Exploiting Critical Atlassian Confluence VulnerabilityExploitThe Hacker News
11.10.23HTTP/2 Rapid Reset Zero-Day Vulnerability Exploited to Launch Record DDoS AttacksAttackThe Hacker News
11.10.23Google Adopts Passkeys as Default Sign-in Method for All UsersSecurityThe Hacker News
10.10.23New Report: Child Sexual Abuse Content and Online Risks to Children on the RiseSecurityThe Hacker News
10.10.23Researchers Uncover Grayling APT's Ongoing Attack Campaign Across IndustriesAPTThe Hacker News
10.10.23New Magecart Campaign Alters 404 Error Pages to Steal Shoppers' Credit CardsCyberCrimeThe Hacker News
10.10.23libcue Library Flaw Opens GNOME Linux Systems Vulnerable to RCE AttacksVulnerebilityThe Hacker News
10.10.23Citrix Devices Under Attack: NetScaler Flaw Exploited to Capture User CredentialsExploitThe Hacker News
10.10.23PEACHPIT: Massive Ad Fraud Botnet Powered by Millions of Hacked Android and iOSAndroidThe Hacker News
9.10.23Cybercriminals Using EvilProxy Phishing Kit to Target Senior Executives in U.S. FirmsPhishingThe Hacker News
9.10.23High-Severity Flaws in ConnectedIO's 3G/4G Routers Raise Concerns for IoT SecurityIoTThe Hacker News
9.10.23Security Patch for Two New Flaws in Curl Library Arriving on October 11VulnerebilityThe Hacker News
9.10.23Gaza-Linked Cyber Threat Actor Targets Israeli Energy and Defense SectorsBigBrothersThe Hacker News
8.10.23Leveraging a Hooking Framework to Expand Malware Detection Coverage on the Android PlatformOS BlogPalo Alto
8.10.23Threat Brief - MOVEit Transfer SQL Injection Vulnerabilities: CVE-2023-34362, CVE-2023-35036 and CVE-2023-35708 (Updated Oct 4)Vulnerebility blogPalo Alto
8.10.23Qakbot-affiliated actors distribute Ransom Knight malware despite infrastructure takedownMalware blogCisco Blog
8.10.23What is the dark web?Security blogCisco Blog
8.10.2310 new vulnerabilities disclosed by Talos, including use-after-free issue in Google ChromeVulnerebility blogCisco Blog
8.10.23ICS protocol coverage using Snort 3 service inspectorsICS blogCisco Blog
8.10.23Is it bad to have a major security incident on your résumé? (Seriously I don’t know)Incident blogCisco Blog
8.10.23Threat Roundup for September 22 to September 29Security blogCisco Blog
8.10.23The security pitfalls of social media sites offering ID-based authenticationSocial blogCisco Blog
8.10.23What’s the point of press releases from threat actors?Security blogCisco Blog
8.10.23DinodasRAT used against governmental entity in Guayana – Week in security with Tony AnscombeMalware blogEset
8.10.23Fake friends and followers on social media – and how to spot themSocial blogEset
8.10.23Operation Jacana: Foundling hobbits in GuyanaBigBrother blogEset
8.10.23Playing your part in building a safer digital world: Why cybersecurity mattersCyber blogEset
8.10.23How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony AnscombeAPT blogEset
8.10.23Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace companyAPT blogEset
8.10.235 of the top programming languages for cybersecurityCyber blogEset
8.10.23Can open-source software be secure?Security blogEset
8.10.23North Korea's Lazarus Group Launders $900 Million in CryptocurrencyCryptocurrencyThe Hacker News
7.10.23D.C. Board of Elections confirms voter data stolen in site hackIncindentBleepingComputer
7.10.23Blackbaud agrees to $49.5 million settlement for ransomware data breachRansom

BleepingComputer

7.10.23FTC warns of ‘staggering’ losses to social media scams since 2021BigBrothers

BleepingComputer

7.10.23Genetics firm 23andMe says user data stolen in credential stuffing attackIncindent

BleepingComputer

7.10.23MGM Resorts ransomware attack led to $100 million loss, data theftRansom

BleepingComputer

7.10.23Microsoft officially removes Cortana for Windows 11 InsidersOSBleepingComputer
7.10.23Exploits released for Linux flaw giving root on major distrosExploit

BleepingComputer

7.10.23China-linked cyberspies backdoor semiconductor firms with Cobalt StrikeVirus

BleepingComputer

7.10.23NSA and CISA reveal top 10 cybersecurity misconfigurationsBigBrothers

BleepingComputer

7.10.23Amazon to make MFA mandatory for 'root' AWS accounts by mid-2024Security

BleepingComputer

7.10.23Lyca Mobile investigates customer data leak after cyberattackIncindent

BleepingComputer

7.10.23Hundreds of malicious Python packages found stealing sensitive dataVirusBleepingComputer
7.10.23Apple emergency update fixes new zero-day used to hack iPhonesApple

BleepingComputer

7.10.23Atlassian patches critical Confluence zero-day exploited in attacksVulnerebility

BleepingComputer

7.10.23Researchers warn of 100,000 industrial control systems exposed onlineICS

BleepingComputer

7.10.23Cisco fixes hard-coded root credentials in Emergency ResponderVulnerebility

BleepingComputer

7.10.23Microsoft: Hackers target Azure cloud VMs via breached SQL serversHackBleepingComputer
7.10.23Sony confirms data breach impacting thousands in the U.S.Incindent

BleepingComputer

7.10.23New 'Looney Tunables' Linux bug gives root on major distrosVulnerebility

BleepingComputer

7.10.23Microsoft now lets you play a game during Windows 11 installsOS

BleepingComputer

7.10.23Google to bolster phishing and malware delivery defenses in 2024PhishingBleepingComputer
7.10.23Android October security update fixes zero-days exploited in attacksAndroid

BleepingComputer

7.10.23ShellTorch flaws expose AI servers to code execution attacksVulnerebility

BleepingComputer

7.10.23Qualcomm says hackers exploit 3 zero-days in its GPU, DSP driversExploit

BleepingComputer

7.10.23Microsoft Edge, Teams get fixes for zero-days in open-source librariesVulnerebility

BleepingComputer

7.10.23EvilProxy uses indeed.com open redirect for Microsoft 365 phishingPhishingBleepingComputer
7.10.23Microsoft Defender no longer flags Tor Browser as malwareVirus

BleepingComputer

7.10.23Exim patches three of six zero-day bugs disclosed last weekVulnerebility

BleepingComputer

7.10.23New BunnyLoader threat emerges as a feature-rich malware-as-a-serviceVirus

BleepingComputer

7.10.23Ransomware gangs now exploiting critical TeamCity RCE flawRansomBleepingComputer
7.10.23Exploit available for critical WS_FTP bug exploited in attacksExploit

BleepingComputer

7.10.23Arm warns of Mali GPU flaws likely exploited in targeted attacksExploit

BleepingComputer

7.10.23Motel One discloses data breach following ransomware attackRansom

BleepingComputer

7.10.23FBI warns of surge in 'phantom hacker' scams impacting the elderlyCyberCrime

BleepingComputer

7.10.23Amazon sends Mastercard, Google Play gift card order emails by mistakeSecurity

BleepingComputer

7.10.23Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gangRansom

BleepingComputer

7.10.23New Marvin attack revives 25-year-old decryption flaw in RSAAttackBleepingComputer
6.10.23Chinese Hackers Target Semiconductor Firms in East Asia with Cobalt StrikeAPTThe Hacker News
6.10.23GitHub's Secret Scanning Feature Now Covers AWS, Microsoft, Google, and SlackSecurityThe Hacker News
6.10.23Supermicro's BMC Firmware Found Vulnerable to Multiple Critical VulnerabilitiesVulnerebilityThe Hacker News
6.10.23QakBot Threat Actors Still in Action, Using Ransom Knight and Remcos RAT in Latest AttacksVirusThe Hacker News
6.10.23Cisco Releases Urgent Patch to Fix Critical Flaw in Emergency Responder SystemsVulnerebilityThe Hacker News
5.10.23Analysis and Config Extraction of Lu0Bot, a Node.js Malware with Considerable CapabilitiesVirusThe Hacker News
5.10.23Guyana Governmental Entity Hit by DinodasRAT in Cyber Espionage AttackBigBrothersThe Hacker News
5.10.23GoldDigger Android Trojan Targets Banking Apps in Asia Pacific CountriesAndroidThe Hacker News
5.10.23CISA Warns of Active Exploitation of JetBrains and Windows VulnerabilitiesExploitThe Hacker News
5.10.23Apple Rolls Out Security Patches for Actively Exploited iOS Zero-Day FlawAppleThe Hacker News
5.10.23Atlassian Confluence Hit by New Actively Exploited Zero-Day – Patch NowExploitThe Hacker News
5.10.23Researchers Link DragonEgg Android Spyware to LightSpy iOS SurveillancewareAndroidThe Hacker News
5.10.23Wing Disrupts the Market by Introducing Affordable SaaS SecuritySecurityThe Hacker News
5.10.23Rogue npm Package Deploys Open-Source Rootkit in New Supply Chain AttackVirusThe Hacker News
4.10.23Microsoft Warns of Cyber Attacks Attempting to Breach Cloud via SQL Server InstanceAttackThe Hacker News
4.10.23Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major DistributionsVulnerebilityThe Hacker News
4.10.23Qualcomm Releases Patch for 3 new Zero-Days Under Active ExploitationExploitThe Hacker News
4.10.23Warning: PyTorch Models Vulnerable to Remote Code Execution via ShellTorchVulnerebilityThe Hacker News
4.10.23Over 3 Dozen Data-Stealing Malicious npm Packages Found Targeting DevelopersVirusThe Hacker News
3.10.23Protecting your IT infrastructure with Security Configuration Assessment (SCA)SecurityThe Hacker News
3.10.23Researcher Reveals New Techniques to Bypass Cloudflare's Firewall and DDoS ProtectionHackThe Hacker News
3.10.23Arm Issues Patch for Mali GPU Kernel Driver Vulnerability Amidst Ongoing ExploitationExploitThe Hacker News
3.10.23LUCR-3: Scattered Spider Getting SaaS-y in the CloudSecurityThe Hacker News
3.10.23Silent Skimmer: A Year-Long Web Skimming Campaign Targeting Online Payment BusinessesCyberCrimeThe Hacker News
3.10.23OpenRefine's Zip Slip Vulnerability Could Let Attackers Execute Malicious CodeVulnerebilityThe Hacker News
3.10.23BunnyLoader: New Malware-as-a-Service Threat Emerges in the Cybercrime UndergroundVirusThe Hacker News
3.10.23Zanubis Android Banking Trojan Poses as Peruvian Government App to Target UsersAndroidThe Hacker News
1.10.23Cloudflare DDoS protections ironically bypassed using CloudflareSecurity

BleepingComputer

1.10.23Microsoft fixes Outlook prompts to reopen closed windowsOSBleepingComputer
1.10.23The Week in Ransomware - September 29th 2023 - Dark AngelsRansom

BleepingComputer

1.10.23Millions of Exim mail servers exposed to zero-day RCE attacksExploit

BleepingComputer

1.10.23Exploit released for Microsoft SharePoint Server auth bypass flawExploit

BleepingComputer

1.10.23ShinyHunters member pleads guilty to $6 million in data theft damagesIncindentBleepingComputer
1.10.23Discord is investigating cause of ‘You have been blocked’ errorsSecurity

BleepingComputer

1.10.23Lazarus hackers breach aerospace firm with new LightlessCan malwareVirus

BleepingComputer

1.10.23Progress warns of maximum severity WS_FTP Server vulnerabilityVulnerebility

BleepingComputer

1.10.23Microsoft breach led to theft of 60,000 US State Dept emailsIncindent

BleepingComputer

1.10.23Bing Chat responses infiltrated by ads pushing malwareVirusBleepingComputer
1.10.23FBI: Dual ransomware attack victims now get hit within 48 hoursRansom

BleepingComputer

1.10.23Cisco urges admins to fix IOS software zero-day exploited in attacksVulnerebility

BleepingComputer

1.10.23Cisco Catalyst SD-WAN Manager flaw allows remote server accessVulnerebility

BleepingComputer

1.10.23Security researcher stopped at US border for investigating crypto scamSpam

BleepingComputer

1.10.23Budworm hackers target telcos and govt orgs with custom malwareVirus

BleepingComputer

1.10.23Google fixes fifth actively exploited Chrome zero-day of 2023VulnerebilityBleepingComputer
1.10.23SSH keys stolen by stream of malicious PyPI and npm packagesVirusBleepingComputer
1.10.23Fake Bitwarden sites push new ZenRAT password-stealing malwareVirus

BleepingComputer

1.10.23Building automation giant Johnson Controls hit by ransomware attackRansom

BleepingComputer

1.10.23US and Japan warn of Chinese hackers backdooring Cisco routersBigBrothers

BleepingComputer

1.10.23Modern GPUs vulnerable to new GPU.zip side-channel attackAttackBleepingComputer
1.10.23GitHub repos bombarded by info-stealing commits masked as DependabotVirusBleepingComputer
1.10.23New ZeroFont phishing tricks Outlook into showing fake AV-scansPhishing

BleepingComputer

1.10.23Windows 11's new ‘Never Combine’ icons feature is almost usableOS

BleepingComputer

1.10.23Sony investigates cyberattack as hackers fight over who's responsibleCyber

BleepingComputer

1.10.23Windows 11 KB5030310 update adds recommended websites, fixes 24 issuesOSBleepingComputer
1.10.23Windows 11 ‘Moment 4’ update released, here are the many new featuresOS

BleepingComputer

1.10.23Windows 11 22H2 adds a built-in passkey manager for Windows HelloOS

BleepingComputer

1.10.23Google assigns new maximum rated CVE to libwebp bug exploited in attacksVulnerebility

BleepingComputer

1.10.23New AtlasCross hackers use American Red Cross as phishing lurePhishingBleepingComputer
1.10.23Hackers actively exploiting Openfire flaw to encrypt serversExploit

BleepingComputer

1.10.23SickKids impacted by BORN Ontario data breach that hit 3.4 millionIncindent

BleepingComputer

1.10.23ShadowSyndicate hackers linked to multiple ransomware ops, 85 serversHack

BleepingComputer

1.10.23BORN Ontario child registry data breach affects 3.4 million peopleIncindent

BleepingComputer

1.10.23Google is retiring its Gmail Basic HTML view in January 2024Security

BleepingComputer

1.10.23Mixin Network suspends operations following $200 million hackIncindent

BleepingComputer

1.10.23Fake celebrity photo leak videos flood TikTok with Temu referral codesSocial

BleepingComputer

1.10.23FBI Warns of Rising Trend of Dual Ransomware Attacks Targeting U.S. CompaniesRansomThe Hacker News
1.10.23Iranian APT Group OilRig Using New Menorah Malware for Covert OperationsAPTThe Hacker News