'ProxyToken' Exchange Server Vulnerability Leads to Email Compromise: An attacker could exploit the vulnerability to reconfigure other users' mailboxes and set forwarding rules without authorization. Read More New Edition of Pipeline Cybersecurity Standard Covers All Control Systems: The American Petroleum Institute (API) has published the third edition of its pipeline cybersecurity standard. Read More CISA Expands 'Bad Practices' List With Single-Factor Authentication: This week, the agency added single-factor authentication to its Bad Practices list, underlining that attackers may access systems by matching a single factor only. Read More Vulnerabilities Can Allow Hackers to Disarm Fortress Home Security Systems: Researchers have found a couple of vulnerabilities that can be used to remotely disarm home security systems made by Fortress. Read More Companies Release Security Advisories in Response to New OpenSSL Vulnerabilities: Companies that use OpenSSL in their products have started releasing security advisories for the recently patched vulnerabilities. Read More CISO Conversations: Zoom, Thycotic CISOs Discuss the CISO Career Path: The CISO is an organization's top person in cybersecurity. Is that it? Is that the end of a CISO's career progression? In fact ‒ is being CISO effectively a dead-end job? Read More Code Generated by GitHub Copilot Can Introduce Vulnerabilities: Researchers: Because it was trained over open-source GitHub code that contained vulnerabilities, the artificial intelligence model likely introduces security bugs. Read More Check Point Buys Cloud Email Security Provider Avanan: Israeli software giant Check Point joins the cybersecurity shopping spree with a definitive deal to acquire Avanan. Read More U.S. Justice Department Introduces Cyber Fellowship Program: The three-year course will help train future prosecutors and attorneys on handling cybersecurity-related cases. Read More Exploitation of Flaws in Delta Energy Management System Could Have 'Dire Consequences': An industrial energy management system made by Delta Electronics is affected by several vulnerabilities whose exploitation could have serious consequences. Read More T-Mobile Hack Involved Exposed Router, Specialized Tools and Brute Force Attacks: T-Mobile's CEO and an individual who claims to have hacked the company have shared some information about how the recent attack was carried out. Read More CISA, Microsoft Issue Guidance on Recent Azure Cosmos DB Vulnerability: Azure Cosmos DB instances with the Jupyter Notebook feature enabled were exposed to unauthorized access for months. Read More Experts Warn of Dangers From Breach of Voter System Software: Republican efforts to question the results of the 2020 election have led to two significant breaches of voting software that have alarmed election security experts. Read Feature Boston Public Library Hit With Cyberattack: The Boston Public Library was hit with a cyberattack that crippled its computer network, the library said in a statement. Read Feature FBI Shares IOCs for 'Hive' Ransomware Attacks: First observed in June 2021, the ransomware group employs various TTPs, encrypts and exfiltrates data, then threatens to publish it on the Tor site "HiveLeaks." Read Feature Vulnerability Allows Remote Hacking of Annke Video Surveillance Product: Researchers have discovered a critical vulnerability that can be exploited to remotely hack a video surveillance system made by Annke. Read Feature Enterprise Technology Management Provider Oomnitza Raises $20 Million: Seeking to help enterprises better manage and secure their technology assets, Oomnitza has raised $35 million to date. Read Feature Amazon to Offer Free Cybersecurity Training Materials, MFA Devices: Amazon says it will offer free multi-factor authentication devices for AWS customers and cybersecurity training materials. Read Feature In a Hybrid Workplace, Men Are More Likely to Engage in Risky Behavior Than Women: Study: Report shows a vast difference in risky online behaviors between men and women: 76% of risky users are men, and only 24% are women. Read Feature Critical Vulnerability Exposed Azure Cosmos DBs for Months: The vulnerability could have been exploited to gain full administrative access to the Cosmos DB instances of thousands of organizations. Read Feature FIN8 Hackers Add 'Sardonic' Backdoor to Malware Arsenal: Bitdefender discovers the financially motivated threat actor FIN8 using a new potent backdoor in its malware arsenal. Read More Engineering Workstations Are Concerning Initial Access Vector in OT Attacks: A study conducted by SANS shows that while OT organizations believe cyber risk is high, many of them are unsure if they have suffered a breach. Read More Cisco Patches Serious Vulnerabilities in Data Center Products: Improper access control in APIC could allow an unauthenticated, remote attacker to read or write arbitrary files. Read More Atlassian Patches Critical Code Execution Vulnerability in Confluence: Atlassian has patched a critical code execution vulnerability affecting Confluence Server and Data Center. Read More Microsoft Issues Guidance on ProxyShell Vulnerabilities: The company urges customers to install available patches as soon as possible, to ensure their deployments are protected from active attacks. Read More Vulnerabilities Allow Hackers to Tamper With Doses Delivered by Medical Infusion Pumps: A chain of known and newly identified vulnerabilities could lead to the injection of potentially lethal doses of prescribed medication. Read More |
Comments
Post a Comment