[tl;dr sec] #190 – Securely Build on AI, CISA Pen Test repo, Joining Google’s Red Team
I hope you’ve been doing well! 🏋️ Our Gym If you’ve been wanting to improve your fitness but haven’t been sure where to start, I…
I hope you’ve been doing well! 🏋️ Our Gym If you’ve been wanting to improve your fitness but haven’t been sure where to start, I…
The All-In-One Security (AIOS) WordPress plugin was found to be logging plaintext passwords from login attempts. Installed on more than one million WordPress sites, the…
Cybercriminals are using malicious Chrome extensions to steal Facebook login information in a recent operation. The reports shared by Malwarebytes Labs also stated that sponsored…
Human Rights Watch and 149 other civil society organisaitons are urging European Union (EU) institutions to enhance the protections for people’s fundamental rights in its…
Three large tax preparation firms sent “extraordinarily sensitive” information on tens of millions of taxpayers to Facebook parent company Meta over the course of at…
Today, Armis and Honeywell have jointly disclosed Crit.IX, 9 new vulnerabilities that Armis researchers found in the Honeywell Experion® DCS platforms (7 of which are…
Apple zero-day vulnerability has been identified that was actively exploited by the threat actors in the wild to break the browsing on some websites and…
The Biden-Harris Administration’s recently released National Cybersecurity Strategy calls for two fundamental shifts in how the United States allocates roles, responsibilities, and resources in cyberspace:…
A zero-day vulnerability in Microsoft was found being exploited for cyber espionage. CVE-2023-36884 was marked as important for its severity as it could result in…
A recent security advisory from Jenkins reported that they had fixed 24 vulnerabilities affecting multiple Jenkins plugins. This Flaw includes 5 High, 18 Medium, and…
Fidelis Cybersecurity released the new Fidelis Active Directory Intercept, a capability that combines network detection and response, deception technology, and Active Directory (AD) security, as…
Jul 13, 2023THNLinux / Vulnerability In a sign that cybersecurity researchers continue to be under the radar of malicious actors, a proof-of-concept (PoC) has been…