well...
news
latest news about cyber-security
news
>
@cyber-security
↑
HOT:
@ukraine
,
@russia
,
@israel
,
@palestine
zdroje:
#bleepingcomputer.com
#blog.google-TAG
#csirt.cz
#cyberscoop.com
#cybersecuritynews.com
#darkreading.com
#googleprojectzero.blogspot.com
#kratkespravy.sk
#krebsonsecurity.com
#linuxsecurity.com
#nakedsecurity.sophos.com
#nukib.cz
#scmagazine.com
#security.googleblog.com
#securityaffairs.co
#securityweek.com
#thehackernews.com
#therecord.media
#threatpost.com
#tripwire.com-state-of-security
bleepingcomputer.com
Microsoft: Exchange 2016 and 2019 reach end of support in October
HPE investigates breach as hacker claims to steal source code
Microsoft fixes Windows Server 2022 bug breaking device boot
Microsoft shares temp fix for Outlook crashing when writing emails
TikTok is back up in the US after Trump says he will extend deadline
TikTok shuts down in the US as Trump throws the company a lifeline
Star Blizzard hackers abuse WhatsApp to target high-value diplomats
FTC orders GM to stop collecting and selling driver’s data
Microsoft removes Assassin’s Creed Windows 11 upgrade blocks
FTC cracks down on Genshin Impact gacha loot box practices
Otelier data breach exposes info, hotel reservations of millions
blog.google-TAG
TAG Bulletin: Q4 2024
TAG Bulletin: Q3 2024
State-backed attackers and commercial surveillance vendors repeatedly use the same exploits
Iranian backed group steps up phishing campaigns against Israel, U.S.
Google disrupted over 10,000 instances of DRAGONBRIDGE activity in Q1 2024
TAG Bulletin: Q2 2024
A review of zero-day in-the-wild exploits in 2023
TAG Bulletin: Q1 2024
Tool of First Resort: Israel-Hamas War in Cyber
Buying Spying: How the commercial surveillance industry works and what can be done about it
TAG Bulletin: Q4 2023
Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware
csirt.cz
Postřehy z bezpečnosti: běžný den týmu telefonických podvodníků
Pozor na phishing napodobující službu MojeID
Ransomwarový útok ochromil služby katastru na Slovensku
Akt o kybernetické odolnosti je platný. V účinnost vstoupí za dva roky
Nový rootkit ohrožuje linuxové systémy
Postřehy z bezpečnosti: zranitelnost v Google Chrome umožňuje vzdálené spuštění kódu
RomCom zneužila řetězec dvou zero-day zranitelností k rozsáhlým útokům na uživatele v Evropě a Severní Americe
Postřehy z bezpečnosti: pašování škodlivého kódu v metadatech souborů
Nejen s blížícími se Vánoci je nutné být při online nakupování obezřetnější
Můj telefon je rozbitý
cyberscoop.com
TSA extends cyber requirements for pipeline owners
Noem: No anti-disinformation, misinformation action under her as DHS secretary
Treasury sanctions Chinese cybersecurity company, affiliate for Salt Typhoon hacks
Closing software-understanding gap is critical to national security, CISA says
Restoring U.S. cyber resilience: A blueprint for the new administration
How HHS has strengthened cybersecurity of hospitals and health care systems
Treasury sanctions North Korea over remote IT worker schemes
Biden cyber executive order gets mostly plaudits, but its fate is uncertain
Microsoft catches Russian state-sponsored hackers shifting tactics to WhatsApp
A CISA secure-by-design guru makes the case for the future of the initiative
cybersecuritynews.com
private
Apache CXF Vulnerability Let Attackers Push Systems to Trigger DoS Condition
Beware! Fake SBI Reward APK Attacking Users To Deliver Android Malware
New Contacto Ransomware Evades AV Detection & Uses Windows Console For Execution
Microsoft Enables New Administrator Protection Feature in Windows Security Settings
Debian LDAP Server Vulnerabilities Allow Attackers Authenticate as Users
Windows BitLocker Vulnerability(CVE-2025-21210) Exploited in Randomization Attack
Ransomware Attack Forces UK Balcom High School to Close Doors for Students
Linux PoDoFo Library Vulnerabilities Lets Attackers Trick User To Open PDF To Launch DOS Attacks
OpenVPN Easy-RSA Vulnerability Enables Bruteforce of Private CA Key
126 Linux kernel Vulnerabilities Lets Attackers Exploit 78 Linux Sub-Systems
darkreading.com
Name That Toon: Incentives
US Ban on Automotive Components Could Curb Supply Chain
Phishing Attacks Are the Most Common Smartphone Security Issue for Consumers
Has the TikTok Ban Already Backfired on US Cybersecurity?
Employees Enter Sensitive Data Into GenAI Prompts Far Too Often
15K Fortinet Device Configs Leaked to the Dark Web
US Sanctions Chinese Hacker & Firm for Treasury, Critical Infrastructure Breaches
Leveraging Behavioral Insights to Counter LLM-Enabled Hacking
Russian APT Phishes Kazakh Gov't for Strategic Intel
Biden's Cybersecurity EO Leaves Trump a Comprehensive Blueprint for Defense
183M Patient Records Exposed: Fortified Health Security Releases 2025 Healthcare Cybersecurity Report
Karl Triebes Joins Ivanti as Chief Product Officer
googleprojectzero.blogspot.com
The Windows Registry Adventure #5: The regf file format
The Qualcomm DSP Driver - Unexpectedly Excavating an Exploit
Windows Tooling Updates: OleView.NET
Simple macOS kernel extension fuzzing in userspace with IDA and TinyInst
From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code
The Windows Registry Adventure #4: Hives and the registry layout
Effective Fuzzing: A Dav1d Case Study
The Windows Registry Adventure #3: Learning resources
Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models
Driving forward in Android drivers
The Windows Registry Adventure #2: A brief history of the feature
The Windows Registry Adventure #1: Introduction and research results
kratkespravy.sk
Zo sveta IT bezpečnosti, 12/2024
Zo sveta IT bezpečnosti, 11/2024
Zo sveta IT bezpečnosti, 10/2024
Zo sveta IT bezpečnosti, 9/2024
Oslo: Návod na použitie
Zo sveta IT bezpečnosti, 8/2024
Zo sveta IT bezpečnosti, 7/2024
Zo sveta IT bezpečnosti, 6/2024
Zo sveta IT bezpečnosti, 5/2024
Zo sveta IT bezpečnosti, 4/2024
krebsonsecurity.com
Chinese Innovations Spawn Wave of Toll Phishing Via SMS
Microsoft: Happy 2025. Here’s 161 Security Updates
A Day in the Life of a Prolific Voice Phishing Crew
U.S. Army Soldier Arrested in AT&T, Verizon Extortions
Happy 15th Anniversary, KrebsOnSecurity!
Web Hacking Service ‘Araneida’ Tied to Turkish IT Firm
How to Lose a Fortune with Just One Bad Click
How Cryptocurrency Turns to Cash in Russian Banks
Patch Tuesday, December 2024 Edition
U.S. Offered $10M for Hacker Just Arrested by Russia
linuxsecurity.com
A Linux Admin's Guide to Ensuring Data Privacy in 2025
Migrating from .NET Framework to .NET Core: Security and Open Source Benefits
Rsync Under Siege: Essential Steps to Protect Against Recent RCE Vulnerabilities
Linux Mint 22.1 'Xia': A New Era of Stability and Security Until 2029
nakedsecurity.sophos.com
[kanál neteče]
nukib.cz
Členské státy EU varují před kvantovou hrozbou a vyzývají k přechodu k postkvantové kryptografii
Mezinárodní workshop o přechodu na kvantově bezpečné technologie
Vydali jsme přehled kybernetických incidentů za listopad 2024
NÚKIB uspořádal deváté setkání Platformy pro výzkum a vývoj v kybernetické a informační bezpečnosti
Členské státy EU se shodly na doporučeních pro budoucí směřování agentury ENISA
Upozorňujeme na zneužívání identit Amazon, Microsoft a státních institucí
Upozornění na zvýšené riziko DDoS útoků během voleb do Evropského parlamentu
Upozornění na kompromitaci routerů Ubiquity Edge OS aktérem sponzorovaným ruským státem
Upozorňujeme na dvě kritické zranitelnosti v operačním systému FortiOS
Upozorňujeme na hrozbu Terrapin útoku mířícího na SSH protokol
Doporučení v oblasti kryptografických prostředků verze 3.0
Doporučení k používání protokolu TLP ke sdílení chráněných informací
scmagazine.com
[kanál neteče]
security.googleblog.com
[kanál neteče]
securityaffairs.co
CERT-UA warned of scammers impersonating the agency using fake AnyDesk requests
Experts found multiple flaws in Mercedes-Benz infotainment system
HPE is investigating IntelBroker’s claims of the company hack
Esperts found new DoNot Team APT group’s Android malware
Malicious npm and PyPI target Solana Private keys to steal funds from victims’ wallets
Planet WGS-804HPT Industrial Switch flaws could be chained to achieve remote code execution
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 29
Security Affairs newsletter Round 507 by Pierluigi Paganini – INTERNATIONAL EDITION
A flaw in the W3 Total Cache plugin exposes hundreds of thousands of WordPress sites to attacks
U.S. Treasury Sanctions Chinese cybersecurity firm and actor over federal agency breach tied to Salt Typhoon
securityweek.com
Ransomware Groups Abuse Microsoft Services for Initial Access
Industry Moves for the week of January 20, 2025 - SecurityWeek
Cyber Insights 2025: Attack Surface Management
Students, Educators Impacted by PowerSchool Data Breach
Washington Man Admits to Role in Multiple Cybercrime, Fraud Schemes
Social Media Security Firm Spikerz Raises $7 Million
Details Disclosed for Mercedes-Benz Infotainment Vulnerabilities
FCC Taking Action in Response to China’s Telecoms Hacking
CISA, FBI Update Software Security Recommendations
HPE Investigating Breach Claims After Hacker Offers to Sell Data
TikTok Restores Service for US Users Based on Trump’s Promised Executive Order
thehackernews.com
13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects
PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers
CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits
Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers
DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection
THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]
Product Walkthrough: How Satori Secures Sensitive Data From Production to AI
Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP
TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025
U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Salt Typhoon
therecord.media
Russian ransomware hackers increasingly posing as tech support on Microsoft Teams
Ukraine restores state registers after suspected Russian cyberattack
Philippines arrests Chinese national suspected of spying on critical infrastructure
‘Surveillance pricing’ means higher costs for consumers, preliminary FTC report says
Homeland Security nominee Kristi Noem bashes CISA, says agency must be 'smaller, more nimble'
threatpost.com
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
tripwire.com-state-of-security
Medusa Ransomware: What You Need To Know
NASA's Cybersecurity Initiative: What Spacecraft Manufacturers Need to Know
Helping the Energy Sector Navigate NERC Complexities
Managing Security and Compliance in a Remote Work Environment
Think You Know Tripwire? Think Again
CIS Control 06: Access Control Management
VERT Threat Alert: January 2025 Patch Tuesday Analysis
What Is Vulnerability Management?
The $55 Billion Wake-Up Call: Cybersecurity Challenges Facing UK Businesses
Tripwire Patch Priority Index for December 2024