Automating Dead Link Detection | HAHWUL
20
Oct
2024

Automating Dead Link Detection | HAHWUL

Using Deadfinder and GitHub Actions for Seamless Link Management A dead link, or broken link, occurs when a hyperlink points…

The Internet Archive
20
Oct
2024

Internet Archive breached again through stolen access tokens

The Internet Archive was breached again, this time on their Zendesk email support platform after repeated warnings that threat actors…

Cyber Security News Letter(Weekly) – Data Breaches, Vulnerability, Cyber Attack & Other Stories
20
Oct
2024

Cyber Security News Letter(Weekly) – Data Breaches, Vulnerability & Other Stories

Welcome to this week’s Cybersecurity Newsletter, bringing you the latest updates and insights from the world of cybersecurity. Stay informed…

F5 fixed a high-severity elevation of privilege vulnerability in BIG-IP
20
Oct
2024

F5 fixed a high-severity elevation of privilege vulnerability in BIG-IP

F5 fixed a high-severity elevation of privilege vulnerability in BIG-IP Pierluigi Paganini October 20, 2024 Technology firm F5 patches a…

Roundcube Webmail XSS Vulnerability
20
Oct
2024

Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials

Oct 20, 2024Ravie LakshmananVulnerability / Email Security Unknown threat actors have been observed attempting to exploit a now-patched security flaw…

Week in review: 87k+ Fortinet devices still open to attack, red teaming tool used for EDR evasion
20
Oct
2024

Week in review: 87k+ Fortinet devices still open to attack, red teaming tool used for EDR evasion

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 87,000+ Fortinet devices still open…

Hackers Use Fake ESET Emails to Target Israeli Firms with Wiper Malware
19
Oct
2024

Hackers Use Fake ESET Emails to Target Israeli Firms with Wiper Malware

Hackers impersonate ESET in phishing attacks targeting Israeli organizations. Malicious emails, claiming to be from ESET, deliver wiper malware. Security…

U.S. CISA adds Veeam Backup and Replication flaw to its Known Exploited Vulnerabilities catalog
19
Oct
2024

U.S. CISA adds Veeam Backup and Replication flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Veeam Backup and Replication flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini October 19, 2024 U.S. Cybersecurity…

Google Scholar and Sir Isaac Newton
19
Oct
2024

Google Scholar has a ‘verified email’ for Sir Isaac Newton

It’s true: Google Scholar profile of the renowned former physicist and polymath, Sir Isaac Newton bears a “verified email” note. According to Google…

North Korea-linked APT37 exploited IE zero-day in a recent attack
19
Oct
2024

North Korea-linked APT37 exploited IE zero-day in a recent attack

North Korea-linked APT37 exploited IE zero-day in a recent attack Pierluigi Paganini October 19, 2024 North Korea-linked group APT37 exploited…

Microsoft creates fake Azure tenants to pull phishers into honeypots
19
Oct
2024

Microsoft creates fake Azure tenants to pull phishers into honeypots

Microsoft is using deceptive tactics against phishing actors by spawning realistic-looking honeypot tenants with access to Azure and lure cybercriminals…

The Unsolvable Problem: XZ and Modern Infrastructure
19
Oct
2024

The Unsolvable Problem: XZ and Modern Infrastructure

The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst…