ICYMI: 2024-07-25
Latest Headlines
North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks
6 Types of Applications Security Testing You Must Know About
Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams
Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security
Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform
Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins
CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software
New Chrome Feature Scans Password-Protected Files for Malicious Content
North Korean Charged in Ransomware Attacks on American Hospitals
Chainguard Raises $140 Million, Expands Tech to Secure AI Workloads
Network of 3,000 GitHub Accounts Used for Malware Distribution
Mandiant Shines Spotlight on APT45 Behind North Korea’s Digital Military Machine
Phone Lines Down in Multiple Courts Across California After Ransomware Attack
Nvidia Patches High-Severity Vulnerabilities in AI, Networking Products
RA Ransomware Group Aggressively Attacking Manufacturing Sector
Vigorish Viper, nn Advanced Suite for Cybercrime Supply Chain
Red Art Games Hacked, Customers Personal Information Exposed
Threat Actors Using Telegram APIs To Steal Login Credentials
North Korean APT45 Hackers, Long Running Digital Military Since 2009
Hackers Bypass Secure Email Gateway With Sophisticated Malware Exploits
Hackers Allegedly Leaked CrowdStrike’s Threat Actor Database
Google Chrome Enhances Security to Block Malicious Downloads
6600+ Vulnerable GeoServer instances Exposed to the Internet
Microsoft’s Windows Hello for Business Flaw Let Attackers Bypass Authentication
PKfail Secure Boot bypass lets attackers install UEFI malware
Critical ServiceNow RCE flaws actively exploited to steal credentials
US offers $10M for tips on DPRK hacker linked to Maui ransomware attacks
Meta nukes massive Instagram sextortion network of 63,000 accounts
French police push PlugX malware self-destruct payload to clean PCs
Why Multivendor Cybersecurity Stacks Are Increasingly Obsolete
– MTZ