H  January(103)  February(113)  March(175)  APRIL(74)  MAY(28)  JUNE(198)  July(423)  August(462)  September(389)  October(48)  November()  December()

DATE

NAME

CATEGORY

WEB

30.9.23New Critical Security Flaws Expose Exim Mail Servers to Remote AttacksVulnerebilityThe Hacker News
30.9.23Cybercriminals Using New ASMCrypt Malware Loader to Fly Under the RadarVirusThe Hacker News
30.9.23Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace FirmAPTThe Hacker News
30.9.23Post-Quantum Cryptography: Finally Real in Consumer Apps?SecurityThe Hacker News
30.9.23Microsoft's AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing SitesAIThe Hacker News
30.9.23Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP ServerVulnerebilityThe Hacker News
30.9.23Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation AttemptsExploitThe Hacker News
30.9.23GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot ContributionsVirusThe Hacker News
30.9.23China's BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese CompaniesBigBrothersThe Hacker News
30.9.23China-Linked Budworm Targeting Middle Eastern Telco and Asian Government AgenciesBigBrothersThe Hacker News
30.9.23Update Chrome Now: Google Releases Patch for Actively Exploited Zero-Day VulnerabilityVulnerebilityThe Hacker News
30.9.23Red Cross-Themed Phishing Attacks Distributing DangerAds and AtlasAgent BackdoorsVirusThe Hacker News
30.9.23Researchers Uncover New GPU Side-Channel Vulnerability Leaking Sensitive DataVulnerebilityThe Hacker News
30.9.23New Survey Uncovers How Companies Are Confronting Data Security Challenges Head-OnSecurityThe Hacker News
30.9.23New ZenRAT Malware Targeting Windows Users via Fake Password Manager SoftwareVirusThe Hacker News
30.9.23Critical libwebp Vulnerability Under Active Exploitation - Gets Maximum CVSS ScoreExploitThe Hacker News
30.9.23Microsoft is Rolling out Support for Passkeys in Windows 11OSThe Hacker News
30.9.23ShadowSyndicate: A New Cybercrime Group Linked to 7 Ransomware FamiliesRansomThe Hacker News
30.9.23Xenomorph Banking Trojan: A New Variant Targeting 35+ U.S. Financial InstitutionsVirusThe Hacker News
30.9.23Threat Report: High Tech Industry targeted the most with 46% of attack traffic tagged by NLXAttackThe Hacker News
30.9.23Chinese Hackers TAG-74 Targets South Korean Organizations in a Multi-Year CampaignBigBrothersThe Hacker News
30.9.23Critical JetBrains TeamCity Flaw Could Expose Source Code and Build Pipelines to AttackersVulnerebilityThe Hacker News
30.9.23Ukrainian Military Targeted in Phishing Campaign Leveraging Drone ManualsBigBrothersThe Hacker News
30.9.23Are You Willing to Pay the High Cost of Compromised Credentials?IncindentThe Hacker News
30.9.23From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and TaiwaneseBigBrothersThe Hacker News
30.9.23New Report Uncovers 3 Distinct Clusters of China-Nexus Attacks on Southeast Asian GovernmentBigBrothersThe Hacker News

24.9.23

Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian GovernmentMalware blogPalo Alto

24.9.23

Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang PandaBigBrother blogPalo Alto

24.9.23

Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy TaurusBigBrother blogPalo Alto

24.9.23

Fake CVE-2023-40477 Proof of Concept Leads to VenomRATMalware blogPalo Alto

24.9.23

BEHIND THE SCENES OF BBTOK: ANALYZING A BANKER’S SERVER SIDE COMPONENTSMalware blogCheckpoint

24.9.23

UNVEILING THE SHADOWS: THE DARK ALLIANCE BETWEEN GULOADER AND REMCOSMalware blog

Checkpoint

24.9.23

New ShroudedSnooper actor targets telecommunications firms in the Middle East with novel ImplantsMalware blog

Cisco Blog

24.9.23

What’s the point of press releases from threat actors?Cyber blog

Cisco Blog

24.9.23

ESET's cutting-edge threat research at LABScon – Week in security with Tony AnscombeCyber blog

Eset

24.9.23

Stealth Falcon preying over Middle Eastern skies with DeadglyphMalware blog

Eset

24.9.23

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipesMalware blog

Eset

24.9.23

New stealthy and modular Deadglyph malware used in govt attacksVirusBleepingComputer

24.9.23

Evasive Gelsemium hackers spotted in attack against Asian govtBigBrothers

BleepingComputer

24.9.23

National Student Clearinghouse data breach impacts 890 schoolsIncindent

BleepingComputer

24.9.23

Air Canada discloses data breach of employee and 'certain records'Incindent

BleepingComputer

24.9.23

Deadglyph: New Advanced Backdoor with Distinctive Malware TacticsVirusThe Hacker News

23.9.23

New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator SpywareAppleThe Hacker News

23.9.23

New Variant of Banking Trojan BBTok Targets Over 40 Latin American BanksVirusThe Hacker News

23.9.23

Recently patched Apple and Chrome zero-days exploited to infect devices in Egypt with Predator spywareAppleSecurityaffairs

23.9.23

CISA adds Trend Micro Apex One and Worry-Free Business Security flaw to its Known Exploited Vulnerabilities catalogBigBrothers

Securityaffairs

23.9.23

Information of Air Canada employees exposed in recent cyberattackIncindentSecurityaffairs

23.9.23

Sandman APT targets telcos with LuaDream backdoorAPT

Securityaffairs

23.9.23

Experts warn of a 600X increase in P2Pinfect trafficVirusSecurityaffairs

23.9.23

Apple rolled out emergency updates to address 3 new actively exploited zero-day flawsAppleSecurityaffairs

23.9.23

Ukrainian hackers are behind the Free Download Manager supply chain attackAttack

Securityaffairs

23.9.23

Space and defense tech maker Exail Technologies exposes database accessIncindentSecurityaffairs

23.9.23

Pro-Russia hacker group NoName launched a DDoS attack on Canadian airports causing severe disruptionsBigBrothers

Securityaffairs

23.9.23

Experts found critical flaws in Nagios XI network monitoring softwareVulnerebilitySecurityaffairs

23.9.23

The dark web drug marketplace PIILOPUOTI was dismantled by Finnish CustomsCyberCrimeSecurityaffairs

23.9.23

International Criminal Court hit with a cyber attackAttackSecurityaffairs

23.9.23

GitLab addressed critical vulnerability CVE-2023-5009Vulnerebility

Securityaffairs

23.9.23

Trend Micro addresses actively exploited zero-day in Apex One and other security ProductsExploitSecurityaffairs

23.9.23

ShroudedSnooper threat actors target telecom companies in the Middle EastVirusSecurityaffairs

23.9.23

Recent cyber attack is causing Clorox products shortageAttack

Securityaffairs

23.9.23

Dallas says Royal ransomware breached its network using stolen accountRansom

BleepingComputer

23.9.23

Nigerian man pleads guilty to attempted $6 million BEC email heistSpam

BleepingComputer

23.9.23

Recently patched Apple, Chrome zero-days exploited in spyware attacksApple

BleepingComputer

23.9.23

Government of Bermuda links cyberattack to Russian hackersBigBrothers

BleepingComputer

23.9.23

Crypto firm Nansen asks users to reset passwords after vendor breachIncindent

BleepingComputer

23.9.23

T-Mobile denies new data breach rumors, points to authorized retailerIncindent

BleepingComputer

23.9.23

Hotel hackers redirect guests to fake Booking.com to steal cardsIncindent

BleepingComputer

23.9.23

‘Sandman’ hackers backdoor telcos with new LuaDream malwareVirus

BleepingComputer

23.9.23

GitHub passkeys generally available for passwordless sign-insIncindent

BleepingComputer

23.9.23

Apple emergency updates fix 3 new zero-days exploited in attacksApple

BleepingComputer

23.9.23

Microsoft Copilot rolls out with Windows 11 22H2 update next weekOS

BleepingComputer

23.9.23

Pizza Hut Australia warns 193,000 customers of a data breachIncindent

BleepingComputer

23.9.23

P2PInfect botnet activity surges 600x with stealthier malware variantsVirus

BleepingComputer

23.9.23

T-Mobile app glitch let users see other people's account infoIncindent

BleepingComputer

23.9.23

TransUnion denies it was hacked, links leaked data to 3rd partyHack

BleepingComputer

23.9.23

Free Download Manager releases script to check for Linux malwareVirus

BleepingComputer

23.9.23

Fake WinRAR proof-of-concept exploit drops VenomRAT malwareVirusBleepingComputer

23.9.23

Signal adds quantum-resistant encryption to its E2EE messaging protocolSecurityBleepingComputer

22.9.23

How to Interpret the 2023 MITRE ATT&CK Evaluation ResultsCyberThe Hacker News

22.9.23

Iranian Nation-State Actor OilRig Targets Israeli OrganizationsBigBrothersThe Hacker News

22.9.23

High-Severity Flaws Uncovered in Atlassian Products and ISC BIND ServerVulnerebilityThe Hacker News

22.9.23

Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More VulnerableAppleThe Hacker News

22.9.23

Mysterious 'Sandman' Threat Actor Targets Telecom Providers Across Three ContinentsCyberCrimeThe Hacker News

21.9.23

Researchers Raise Red Flag on P2PInfect Malware with 600x Activity SurgeVirusThe Hacker News

21.9.23

China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei ServersBigBrothersThe Hacker News

21.9.23

Cyber Group 'Gold Melody' Selling Compromised Access to Ransomware AttackersRansomThe Hacker News

21.9.23

Ukrainian Hacker Suspected to be Behind "Free Download Manager" Malware AttackVirusThe Hacker News

21.9.23

Beware: Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with Venom RATVirusThe Hacker News

20.9.23

Finnish Authorities Dismantle Notorious PIILOPUOTI Dark Web Drug Marketplace

CyberCrimeThe Hacker News

20.9.23

Critical Security Flaws Exposed in Nagios XI Network Monitoring Software

VulnerebilityThe Hacker News

20.9.23

Fresh Wave of Malicious npm Packages Threaten Kubernetes Configs and SSH Keys

VirusThe Hacker News

20.9.23

Sophisticated Phishing Campaign Targeting Chinese Users with ValleyRAT and Gh0st RAT

VirusThe Hacker News

20.9.23

Signal Messenger Introduces PQXDH Quantum-Resistant Encryption

SocialThe Hacker News

20.9.23

GitLab Releases Urgent Security Patches for Critical Vulnerability

VulnerebilityThe Hacker News

20.9.23

Trend Micro Releases Urgent Fix for Actively Exploited Critical Security Vulnerability

VulnerebilityThe Hacker News

20.9.23

Claimants in Celsius crypto bankruptcy targeted in phishing attackPhishing

BleepingComputer

20.9.23

Trend Micro fixes endpoint protection zero-day used in attacksVulnerebility

BleepingComputer

20.9.23

Hackers breached International Criminal Court’s systems last weekIncindent

BleepingComputer

20.9.23

GitLab urges users to install security updates for critical pipeline flawSecurity

BleepingComputer

20.9.23

Microsoft to start retiring Exchange Web Services in October 2026OS

BleepingComputer

20.9.23

Hackers backdoor telecom providers with new HTTPSnoop malwareVirus

BleepingComputer

20.9.23

APT36 state hackers infect Android devices using YouTube app clonesAPT

BleepingComputer

20.9.23

Windows Subsystem for Linux gets new 'mirrored' network modeOS

BleepingComputer

20.9.23

Thousands of Juniper devices vulnerable to unauthenticated RCE flawVulnerebility

BleepingComputer

20.9.23

Bumblebee malware returns in new attacks abusing WebDAV foldersVirus

BleepingComputer

20.9.23

Microsoft leaks 38TB of private data via unsecured Azure storageIncindent

BleepingComputer

20.9.23

New SprySOCKS Linux malware used in cyber espionage attacksVirus

BleepingComputer

20.9.23

TikTok flooded by 'Elon Musk' cryptocurrency giveaway scamsSocial

BleepingComputer

20.9.23

Google Chrome tests Microsoft Edge-like Read Aloud featureSecurity

BleepingComputer

20.9.23

Microsoft Edge is losing tablet-friendly "Web Select" featureSecurity

BleepingComputer

20.9.23

BlackCat ransomware hits Azure Storage with Sphynx encryptorRansomBleepingComputer

19.9.23

ShroudedSnooper's HTTPSnoop Backdoor Targets Middle East Telecom CompaniesVirusThe Hacker News

19.9.23

Operation Rusty Flag: Azerbaijan Targeted in New Rust-Based Malware CampaignVirusThe Hacker News

19.9.23

Inside the Code of a New XWorm VariantVirusThe Hacker News

19.9.23

Earth Lusca's New SprySOCKS Linux Backdoor Targets Government EntitiesVirusThe Hacker News

19.9.23

Microsoft AI Researchers Accidentally Expose 38 Terabytes of Confidential DataIncindentThe Hacker News

19.9.23

Nearly 12,000 Juniper Firewalls Found Vulnerable to Recently Disclosed RCE VulnerabilityVulnerebilityThe Hacker News

19.9.23

Transparent Tribe Uses Fake YouTube Android Apps to Spread CapraRAT MalwareVirusThe Hacker News

18.9.23

New AMBERSQUID Cryptojacking Operation Targets Uncommon AWS ServicesCryptocurrencyThe Hacker News

18.9.23

Think Your MFA and PAM Solutions Protect You? Think AgainSecurityThe Hacker News

18.9.23

Hook: New Android Banking Trojan That Expands on ERMAC's Legacy

Android

The Hacker News

18.9.23

Retool Falls Victim to SMS-Based Phishing Attack Affecting 27 Cloud ClientsPhishingThe Hacker News

18.9.23

Financially Motivated UNC3944 Threat Actor Shifts Focus to Ransomware AttacksRansomThe Hacker News

17.9.23

CardX released a data leak notification impacting their customers in ThailandIncindentSecurityaffairs

17.9.23

TikTok fined €345M by Irish DPC for violating children’s privacySocial

Securityaffairs

17.9.23

Iranian Peach Sandstorm group behind recent password spray attacksAttackSecurityaffairs

17.9.23

Caesars Entertainment paid a ransom to avoid stolen data leaksRansom

Securityaffairs

17.9.23

Free Download Manager backdoored to serve Linux malware for more than 3 yearsVirusSecurityaffairs

17.9.23

Lockbit ransomware gang hit the Carthage Area Hospital and the Clayton-Hepburn Medical Center in New YorkRansomSecurityaffairs

17.9.23

UK Greater Manchester Police disclosed a data breachIncindent

Securityaffairs

17.9.23

North Korea's Lazarus Group Suspected in $31 Million CoinEx HeistAPTThe Hacker News

17.9.23

TikTok Faces Massive €345 Million Fine Over Child Data Violations in E.U.SocialThe Hacker News

16.9.23

Threat Group Assessment: Turla (aka Pensive Ursa)Ransom blogPalo Alto

16.9.23

Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per MonthCyber blogPalo Alto

16.9.23

RedLine Stealer: Answers to Unit Wireshark QuizMalware blogPalo Alto

16.9.23

Crossing the Line: Unit 42 Wireshark Quiz for RedLine StealerMalware blogPalo Alto

16.9.23

GUARDING AGAINST THE UNSEEN: INVESTIGATING A STEALTHY REMCOS MALWARE ATTACK ON COLOMBIAN FIRMSMalware blogCheckpoint

16.9.23

ELECTIONS SPOTLIGHT: GENERATIVE AI AND DEEP FAKESSecurity blog

Checkpoint

16.9.23

From Hidden Bee to Rhadamanthys – The Evolution of Custom Executable FormatsRansom blogCheckpoint

16.9.23

How Cisco Talos IR helped a healthcare company quickly resolve a Qakbot attackAttack blog

Cisco Blog

16.9.23

Microsoft Patch Tuesday for September 2023 — Unusually low 5 critical vulnerabilities included in Microsoft Patch Tuesday, along with two zero-daysOS Blog

Cisco Blog

16.9.23

You can try to hide your firmware from Kelly Patterson, but she’ll find it (and break it)Cyber blog

Cisco Blog

16.9.23

Cybercriminals target graphic designers with GPU minersCyber blog

Cisco Blog

16.9.23

Turns out even the NFL is worried about deepfakesSecurity blog

Cisco Blog

16.9.23

A secondhand account of the worst possible timing for a scammer to strikeSpam blogCisco Blog

16.9.23

Eight vulnerabilities in Open Automation Software Platform could lead to information disclosure, improper authenticationVulnerebility blog

Cisco Blog

16.9.23

New open-source infostealer, and reflections on 2023 so farMalware blog

Cisco Blog

16.9.23

SapphireStealer: Open-source information stealer enables credential and data theftMalware blog

Cisco Blog

16.9.23

What's in a name? Strange behaviors at top-level domains creates uncertainty in DNSSecurity blogCisco Blog

16.9.23

Years into these games’ histories, attackers are still creating “Fortnite” and “Roblox”-related scamsHacking blog

Cisco Blog

16.9.23

Lazarus Group's infrastructure reuse leads to discovery of new malwareMalware blog

Cisco Blog

16.9.23

Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRATMalware blog

Cisco Blog

16.9.23

Three vulnerabilities in NVIDIA graphics driver could cause memory corruptionVulnerebility blogCisco Blog

16.9.23

Generating FLIRT signatures for Nim and other non-C programming languagesSecurity blog

Cisco Blog

16.9.23

Recapping the top stories from Black Hat and DEF CONCyber blog

Cisco Blog

16.9.23

The rise of AI-powered criminals: Identifying threats and opportunitiesCyber blog

Cisco Blog

16.9.23

Reflecting on supply chain attacks halfway through 2023Attack blogCisco Blog

16.9.23

Out-of-bounds write vulnerabilities in popular chemistry software; Foxit PDF Reader issues could lead to remote code executionVulnerebility blogCisco Blog

16.9.23

Ballistic Bobcat's Sponsor backdoor – Week in security with Tony AnscombeMalware blog

Eset

16.9.23

Read it right! How to spot scams on RedditSpam blog

Eset

16.9.23

ESET Research Podcast: Sextortion, digital usury and SQL brute-forceHacking blog

Eset

16.9.23

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoorMalware blog

Eset

16.9.23

Will you give X your biometric data? – Week in security with Tony AnscombeCyber blog

Eset

16.9.23

Staying ahead of threats: 5 cybercrime trends to watchCyber blog

Eset

16.9.23

Getting off the hook: 10 steps to take after clicking on a phishing linkPhishing blog

Eset

16.9.23

Fake Signal and Telegram apps – Week in security with Tony AnscombeSocial blog

Eset

16.9.23

What you need to know about iCloud Private RelayOS Blog

Eset

16.9.23

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram appsOS Blog

Eset

16.9.23

The Week in Ransomware - September 15th 2023 - Russian RouletteRansom

BleepingComputer

16.9.23

Retool blames breach on Google Authenticator MFA cloud sync featureIncindent

BleepingComputer

16.9.23

Google extends security update support for Chromebooks to 10 yearsSecurity

BleepingComputer

16.9.23

ORBCOMM ransomware attack causes trucking fleet management outageRansom

BleepingComputer

16.9.23

MGM casino's ESXi servers allegedly encrypted in ransomware attackRansom

BleepingComputer

16.9.23

Auckland transport authority hit by suspected ransomware attackRansom

BleepingComputer

16.9.23

Windows 11 Snipping Tool gets OCR support to copy text from imagesOS

BleepingComputer

16.9.23

Caesars Entertainment confirms ransom payment, customer data theftRansom

BleepingComputer

16.9.23

Iranian hackers breach defense orgs in password spray attacksBigBrothers

BleepingComputer

16.9.23

Windows 11 ‘ThemeBleed’ RCE bug gets proof-of-concept exploitExploit

BleepingComputer

16.9.23

Manchester Police officers' data exposed in ransomware attackRansom

BleepingComputer

16.9.23

Fake Cisco Webex Google Ads abuse tracking templates to push malwareVirus

BleepingComputer

16.9.23

Google Agrees to $93 Million Settlement in California's Location-Privacy LawsuitSecurityThe Hacker News

16.9.23

DDoS 2.0: IoT Sparks New DDoS AlertAttackThe Hacker News

16.9.23

NodeStealer Malware Now Targets Facebook Business Accounts on Multiple BrowsersVirusThe Hacker News

16.9.23

Cybercriminals Combine Phishing and EV Certificates to Deliver Ransomware PayloadsRansomThe Hacker News

15.9.23

Iranian Nation-State Actors Employ Password Spray Attacks Targeting Multiple SectorsBigBrothersThe Hacker News

15.9.23

Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS SystemsAppleThe Hacker News

15.9.23

Free Download Manager Site Compromised to Distribute Linux Malware to Users for 3+ YearsVirusThe Hacker News

14.9.23

Rollbar discloses data breach after hackers stole access tokensIncindent

BleepingComputer

14.9.23

New Windows 11 feature blocks NTLM-based attacks over SMBOS

BleepingComputer

14.9.23

France demands Apple pull iPhone 12 due to high RF radiation levelsApple

BleepingComputer

14.9.23

Microsoft Teams down: Ongoing outage behind message failures, delaysSecurity

BleepingComputer

14.9.23

Hackers steal $53 million worth of cryptocurrency from CoinExCryptocurrency

BleepingComputer

14.9.23

Hackers use new 3AM ransomware to save failed LockBit attackRansom

BleepingComputer

14.9.23

Mozilla patches Firefox, Thunderbird against zero-day exploited in attacksExploit

BleepingComputer

14.9.23

New 'MetaStealer' malware targets Intel-based macOS systemsApple

BleepingComputer

14.9.23

Ransomware access broker steals accounts via Microsoft Teams phishingRansom

BleepingComputer

14.9.23

Microsoft September 2023 Patch Tuesday fixes 2 zero-days, 59 flawsOS

BleepingComputer

14.9.23

Windows 10 KB5030211 update released with 11 improvementsOS

BleepingComputer

14.9.23

Adobe warns of critical Acrobat and Reader zero-day exploited in attacksVulnerebility

BleepingComputer

14.9.23

Windows 11 KB5030219 cumulative update released with 24 fixes, changesOS

BleepingComputer

14.9.23

CISA offers free security scans for public water utilitiesBigBrothers

BleepingComputer

14.9.23

Free Download Manager site redirected Linux users to malware for yearsVirus

BleepingComputer

14.9.23

Apple backports BLASTPASS zero-day fix to older iPhonesApple

BleepingComputer

14.9.23

'Redfly' hackers infiltrated power supplier's network for 6 monthsHack

BleepingComputer

14.9.23

New WiKI-Eve attack can steal numerical passwords over WiFiAttack

BleepingComputer

14.9.23

Google fixes another Chrome zero-day bug exploited in attacksVulnerebility

BleepingComputer

14.9.23

Microsoft will block 3rd-party printer drivers in Windows UpdateOS

BleepingComputer

14.9.23

MGM Resorts shuts down IT systems after cyberattackIncindent

BleepingComputer

14.9.23

CISA warns govt agencies to secure iPhones against spyware attacksBigBrothers

BleepingComputer

14.9.23

Iranian hackers backdoor 34 orgs with new Sponsor malwareVirus

BleepingComputer

14.9.23

Square: Last week’s outage was caused by DNS issue, not a cyberattackAttack

BleepingComputer

14.9.23

Facebook Messenger phishing wave targets 100K business accounts per weekSocial

BleepingComputer

14.9.23

Associated Press warns that AP Stylebook data breach led to phishing attackPhishing

BleepingComputer

14.9.23

'Evil Telegram' Android apps on Google Play infected 60K with spyware

Android

BleepingComputer

14.9.23

N-Able's Take Control Agent Vulnerability Exposes Windows Systems to Privilege EscalationVulnerebilityThe Hacker News

14.9.23

Russian Journalist's iPhone Compromised by NSO Group's Zero-Click SpywareBigBrothersThe Hacker News

14.9.23

Alert: New Kubernetes Vulnerabilities Enable Remote Attacks on Windows EndpointsVulnerebilityThe Hacker News

14.9.23

Researchers Detail 8 Vulnerabilities in Azure HDInsight Analytics ServiceVulnerebilityThe Hacker News

14.9.23

Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware FamilyRansomThe Hacker News

14.9.23

Microsoft Warns of New Phishing Campaign Targeting Corporations via Teams MessagesPhishingThe Hacker News

13.9.23

Microsoft Releases Patch for Two New Actively Exploited Zero-Days FlawsExploitThe Hacker News

13.9.23

Update Adobe Acrobat and Reader to Patch Actively Exploited VulnerabilityExploitThe Hacker News

13.9.23

Mozilla Rushes to Patch WebP Critical Zero-Day Exploit in Firefox and ThunderbirdExploitThe Hacker News

13.9.23

Critical GitHub Vulnerability Exposes 4,000+ Repositories to Repojacking AttackAttackThe Hacker News

13.9.23

Chinese Redfly Group Compromised a Nation's Critical Grid in 6-Month ShadowPad CampaignBigBrothersThe Hacker News

13.9.23

Sophisticated Phishing Campaign Deploying Agent Tesla, OriginBotnet, and RedLine ClipperVirusThe Hacker News

13.9.23

Beware: MetaStealer Malware Targets Apple macOS in Recent AttacksVirusThe Hacker News

12.9.23

Google Rushes to Patch Critical Chrome Vulnerability Exploited in the Wild - Update NowExploitThe Hacker News

12.9.23

Vietnamese Hackers Deploy Python-Based Stealer via Facebook MessengerVirusThe Hacker News

12.9.23

Charming Kitten's New Backdoor 'Sponsor' Targets Brazil, Israel, and U.A.E.VirusThe Hacker News

12.9.23

How to Prevent API Breaches: A Guide to Robust SecuritySecurityThe Hacker News

12.9.23

Google Chrome Rolls Out Support for 'Privacy Sandbox' to Bid Farewell to Tracking CookiesSecurityThe Hacker News

11.9.23

Cybercriminals Using PowerShell to Steal NTLMv2 Hashes from Compromised WindowsHackThe Hacker News

11.9.23

New HijackLoader Modular Malware Loader Making Waves in the Cybercrime WorldVirusThe Hacker News

10.9.23

US CISA added critical Apache RocketMQ flaw to its Known Exploited Vulnerabilities catalogExploitSecurityaffairs

10.9.23

Ragnar Locker gang leaks data stolen from the Israel's Mayanei Hayeshua hospitalRansom

Securityaffairs

10.9.23

Google rolls out Privacy Sandbox to use Chrome browsing history for adsSecurity

BleepingComputer

10.9.23

Microsoft Teams phishing attack pushes DarkGate malwareVirus

BleepingComputer

9.9.23

Millions Infected by Spyware Hidden in Fake Telegram Apps on Google Play

Android

The Hacker News

9.9.23

Cybercriminals Weaponizing Legitimate Advanced Installer Tool in Crypto-Mining AttacksCryptocurrencyThe Hacker News

9.9.23

North Korea-linked threat actors target cybersecurity experts with a zero-dayAPTSecurityaffairs

9.9.23

Zero-day in Cisco ASA and FTD is actively exploited in ransomware attacksRansom

Securityaffairs

9.9.23

Nation-state actors exploit Fortinet FortiOS SSL-VPN and Zoho ManageEngine ServiceDesk Plus, CISA warnsVulnerebility

Securityaffairs

9.9.23

Zero-days fixed by Apple were used to deliver NSO Group’s Pegasus spywareApple

Securityaffairs

9.9.23

Apple discloses 2 new actively exploited zero-day flaws in iPhones, MacsApple

Securityaffairs

9.9.23

A malvertising campaign is delivering a new version of the macOS Atomic StealerApple

Securityaffairs

9.9.23

Two flaws in Apache SuperSet allow to remotely hack serversVulnerebility

Securityaffairs

9.9.23

The Week in Ransomware - September 8th 2023 - Conti IndictmentsRansom

BleepingComputer

9.9.23

Notepad++ 8.5.7 released with fixes for four security vulnerabilitiesVulnerebility

BleepingComputer

9.9.23

Ragnar Locker claims attack on Israel's Mayanei Hayeshua hospitalIncindent

BleepingComputer

9.9.23

Dymocks Booksellers suffers data breach impacting 836k customersIncindentBleepingComputer

9.9.23

U.K. and U.S. Sanction 11 Russia-based TrickBot Cybercrime Gang MembersCyberCrimeThe Hacker News

8.9.23

Cisco warns of VPN zero-day exploited by ransomware gangsExploit

BleepingComputer

8.9.23

Microsoft Paint in Windows 11 gets a background removal toolOS

BleepingComputer

8.9.23

CISA warns of critical Apache RocketMQ bug exploited in attacksExploit

BleepingComputer

8.9.23

Iranian hackers breach US aviation org via Zoho, Fortinet bugsBigBrothers

BleepingComputer

8.9.23

Google is enabling Chrome real-time phishing protection for everyonePhishing

BleepingComputer

8.9.23

Apple zero-click iMessage exploit used to infect iPhones with spywareApple

BleepingComputer

8.9.23

Cisco BroadWorks impacted by critical authentication bypass flawVulnerebility

BleepingComputer

8.9.23

Google Looker Studio abused in cryptocurrency phishing attacksCryptocurrency

BleepingComputer

8.9.23

Microsoft: North Korean hackers target Russian govt, defense orgsBigBrothers

BleepingComputer

8.9.23

Apple discloses 2 new zero-days exploited to attack iPhones, MacsApple

BleepingComputer

8.9.23

Google: State hackers attack security researchers with new zero-dayAttack

BleepingComputer

8.9.23

Windows cryptomining attacks target graphic designer's high-powered GPUsCryptocurrency

BleepingComputer

8.9.23

Johnson & Johnson discloses IBM data breach impacting patientsIncindent

BleepingComputer

8.9.23

US and UK sanction 11 TrickBot and Conti cybercrime gang membersCyberCrime

BleepingComputer

8.9.23

Rogers silent as Canadian customers report internet outagesIncindent

BleepingComputer

8.9.23

Apple Rushes to Patch Zero-Day Flaws Exploited for Pegasus Spyware on iPhonesAppleThe Hacker News

8.9.23

Cisco Issues Urgent Fix for Authentication Bypass Bug Affecting BroadWorks PlatformVulnerebilityThe Hacker News

8.9.23

North Korean Hackers Exploit Zero-Day Bug to Target Cybersecurity ResearchersExploitThe Hacker News

8.9.23

CISA Warning: Nation-State Hackers Exploit Fortinet and Zoho VulnerabilitiesExploitThe Hacker News

8.9.23

Mac Users Beware: Malvertising Campaign Spreads Atomic Stealer macOS MalwareAppleThe Hacker News

7.9.23

Alert: Apache SuperSet Vulnerabilities Expose Servers to Remote Code Execution AttacksVulnerebilityThe Hacker News

7.9.23

Mirai Botnet Variant 'Pandora' Hijacks Android TVs for CyberattacksBotNetThe Hacker News

7.9.23

Outlook Breach: Microsoft Reveals How a Crash Dump Led to a Major Security BreachIncindentThe Hacker News

7.9.23

Rockstar Games reportedly sold games with Razor 1911 cracks on Steam

Security

BleepingComputer

7.9.23

University of Michigan requires password resets after cyberattack

Incindent

BleepingComputer

7.9.23

Flipper Zero can be used to launch iOS Bluetooth spam attacks

Apple

BleepingComputer

7.9.23

Hackers stole Microsoft signing key from Windows crash dump

HackBleepingComputer

7.9.23

MSI BIOS updates fix Windows unsupported processor BSOD bug

Vulnerebility

BleepingComputer

7.9.23

Mirai variant infects low-cost Android TV boxes for DDoS attacks

Android

BleepingComputer

7.9.23

September Android updates fix zero-day exploited in attacks

Android

BleepingComputer

7.9.23

Toyota says filled disk storage halted Japan-based factories

Security

BleepingComputer

7.9.23

Chinese cyberspies obtained Microsoft signing key from Windows crash dump due to a mistake

BigBrothers

Securityaffairs

7.9.23

Google addressed an actively exploited zero-day in Android

Exploit

Securityaffairs

7.9.23

A zero-day in Atlas VPN Linux Client leaks users' IP address

Vulnerebility

Securityaffairs

7.9.23

Zero-Day Alert: Latest Android Patch Update Includes Fix for Newly Actively Exploited Flaw

ExploitThe Hacker News

7.9.23

Alert: Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant

PhishingThe Hacker News

6.9.23

MITRE and CISA release Caldera for OT attack emulationBigBrothers

Securityaffairs

6.9.23

ASUS routers are affected by three critical remote code execution flawsVulnerebility

Securityaffairs

6.9.23

Hackers stole $41M worth of crypto assets from crypto gambling firm StakeIncindent

Securityaffairs

6.9.23

Freecycle data breach impacted 7 Million usersIncindent

Securityaffairs

6.9.23

Meta disrupted two influence campaigns from China and RussiaSocial

Securityaffairs

6.9.23

A massive DDoS attack took down the site of the German financial agency BaFinAttack

Securityaffairs

6.9.23

X will collect biometric data from its premium usersSafety

Securityaffairs

6.9.23

"Smishing Triad" Targeted USPS and US Citizens for Data TheftIncindent

Securityaffairs

6.9.23

Publicly available Evil_MinIO exploit used in attacks on MinIO Storage SystemsExploit

Securityaffairs

6.9.23

W3LL phishing kit hijacks thousands of Microsoft 365 accounts, bypasses MFAPhishing

BleepingComputer

6.9.23

Coffee Meets Bagel says recent outage caused by destructive cyberattackAttack

BleepingComputer

6.9.23

Atlas VPN zero-day vulnerability leaks users' real IP addressVulnerebility

BleepingComputer

6.9.23

Crypto casino Stake.com loses $41 million to hot wallet hackersIncindentBleepingComputer

6.9.23

Chaes malware now uses Google Chrome DevTools Protocol to steal dataVirus

BleepingComputer

6.9.23

ASUS routers vulnerable to critical remote code execution flawsVulnerebility

BleepingComputer

6.9.23

Freecycle confirms massive data breach impacting 7 million usersIncindent

BleepingComputer

6.9.23

Insurer fined $3M for exposing data of 650k clients for two yearsIncindentBleepingComputer

6.9.23

German financial agency site disrupted by DDoS attack since FridayBigBrothers

BleepingComputer

6.9.23

Hackers exploit MinIO storage system to breach corporate networksExploit

BleepingComputer

6.9.23

Okta: Hackers target IT help desks to gain Super Admin, disable MFAHackBleepingComputer

6.9.23

9 Alarming Vulnerabilities Uncovered in SEL's Power Management ProductsVulnerebilityThe Hacker News

6.9.23

W3LL Store: How a Secret Phishing Syndicate Targets 8,000+ Microsoft 365 AccountsPhishingThe Hacker News

6.9.23

Ukraine's CERT Thwarts APT28's Cyberattack on Critical Energy InfrastructureAPTThe Hacker News

5.9.23

New BLISTER Malware Update Fuelling Stealthy Network Infiltration

Virus

The Hacker News

5.9.23

New Python Variant of Chaes Malware Targets Banking and Logistics Industries

Virus

The Hacker News

5.9.23

Key Cybersecurity Tools That Can Mitigate the Cost of a BreachIncindentThe Hacker News

5.9.23

Researchers Warn of Cyber Weapons Used by Lazarus Group's Andariel ClusterCyberThe Hacker News

5.9.23

Meta Takes Down Thousands of Accounts Involved in Disinformation Ops from China and RussiaBigBrothersThe Hacker News

5.9.23

Hackers Exploit MinIO Storage System Vulnerabilities to Compromise ServersExploitThe Hacker News

4.9.23

University of Sydney suffered a security breach caused by a third-party service providerIncindent

Securityaffairs

4.9.23

Cybercrime will cost Germany $224 billion in 2023CyberCrime

Securityaffairs

4.9.23

PoC exploit code released for CVE-2023-34039 bug in VMware Aria Operations for NetworksExploit

Securityaffairs

4.9.23

Windows 11 23H2: Top three new features

OS

BleepingComputer

4.9.23

University of Sydney data breach impacts recent applicantsIncindent

BleepingComputer

4.9.23

Microsoft reminds users Windows will disable insecure TLS soon

OS

BleepingComputer

4.9.23

Children's snack recalled after its website caught serving pornHackBleepingComputer

4.9.23

X (Twitter) to Collect Biometric Data from Premium Users to Combat Impersonation

SocialThe Hacker News

4.9.23

Everything You Wanted to Know About AI Security but Were Afraid to Ask

AIThe Hacker News

4.9.23

Vietnamese Cybercriminals Targeting Facebook Business Accounts with Malvertising

SocialThe Hacker News

4.9.23

Beware of MalDoc in PDF: A New Polyglot Attack Allowing Attackers to Evade Antivirus

Virus

The Hacker News

4.9.23

Chinese-Speaking Cybercriminals Launch Large-Scale iMessage Smishing Campaign in U.S.

CyberCrime

The Hacker News

3.9.23

Social engineering attacks target Okta customers to achieve a highly privileged role

Hack

Securityaffairs

3.9.23

LockBit ransomware gang hit the Commission des services electriques de Montréal (CSEM)

Ransom

Securityaffairs

3.9.23

Chrome extensions can steal plaintext passwords from websites

Hack

BleepingComputer

3.9.23

Fake YouPorn extortion scam threatens to leak your sex tape

Spam

BleepingComputer

3.9.23

PoC Exploit Released for Critical VMware Aria's SSH Auth Bypass Vulnerability

Exploit

The Hacker News

2.9.23Talos wars of customizations of the open-source info stealer SapphireStealerVirusSecurityaffairs
2.9.23UNRAVELING EternalBlue: inside the WannaCry’s enablerVirusSecurityaffairs
2.9.23Researchers released a free decryptor for the Key Group ransomwareRansomSecurityaffairs
2.9.23North Korea-linked APT Labyrinth Chollima behind PyPI supply chain attacksAPTSecurityaffairs
2.9.23Microsoft is killing WordPad in Windows after 28 yearsOSBleepingComputer
2.9.23Exploit released for critical VMware SSH auth bypass vulnerabilityVulnerebilityBleepingComputer
2.9.23Microsoft reminds of Windows 11 21H2 forced updates before end of serviceOSBleepingComputer
2.9.23Microsoft retires Visual Studio for Mac, support ends in a yearOSBleepingComputer
2.9.23Golf gear giant Callaway data breach exposes info of 1.1 millionIncindentBleepingComputer
2.9.23Okta Warns of Social Engineering Attacks Targeting Super Administrator PrivilegesHackThe Hacker News
2.9.23Threat Actors Targeting Microsoft SQL Servers to Deploy FreeWorld RansomwareRansomThe Hacker News
2.9.23Russian State-Backed 'Infamous Chisel' Android Malware Targets Ukrainian MilitaryAndroidThe Hacker News
2.9.23New SuperBear Trojan Emerges in Targeted Phishing Attack on South Korean ActivistsVirusThe Hacker News
1.9.23Fashion retailer Forever 21 data breach impacted +500,000 individualsIncindentSecurityaffairs
1.9.23Russia-linked hackers target Ukrainian military with Infamous Chisel Android malwareAndroidSecurityaffairs
1.9.23Akira Ransomware gang targets Cisco ASA without Multi-Factor AuthenticationRansomSecurityaffairs
1.9.23Paramount Global disclosed a data breachIncindentSecurityaffairs
1.9.23National Safety Council data leak: Credentials of NASA, Tesla, DoJ, Verizon, and 2K others leaked by workplace safety organizationIncindentSecurityaffairs
1.9.23Abusing Windows Container Isolation Framework to avoid detection by security productsHackSecurityaffairs
1.9.23Sourcegraph website breached using leaked admin access tokenIncindentBleepingComputer
1.9.23Forever 21 data breach: hackers accessed info of 500,000IncindentBleepingComputer
1.9.23North Korean hackers behind malicious VMConnect PyPI campaignVirusBleepingComputer
1.9.23LogicMonitor customers hacked in reported ransomware attacksRansomBleepingComputer
1.9.23Free Key Group ransomware decryptor helps victims recover dataRansomBleepingComputer
1.9.23GRU hackers attack Ukrainian military with new Android malwareAndroidBleepingComputer
1.9.23Classiscam fraud-as-a-service expands, now targets banks and 251 brandsCyberCrimeBleepingComputer
1.9.23Classiscam Scam-as-a-Service Raked $64.5 Million During the COVID-19 PandemicSpamThe Hacker News
1.9.23SapphireStealer Malware: A Gateway to Espionage and Ransomware OperationsVirusThe Hacker News
1.9.23North Korean Hackers Deploy New Malicious Python Packages in PyPI RepositoryVirusThe Hacker News
1.9.23Numbers Don't Lie: Exposing the Harsh Truths of Cyberattacks in New ReportCyberThe Hacker News
1.9.23Earth Estries' Espionage Campaign Targets Governments and Tech Titans Across ContinentsBigBrothersThe Hacker News