Tag: Cyberattacks

  • The Register: Feds investigate China’s Salt Typhoon amid campaign phone hacks

    Source URL: https://www.theregister.com/2024/10/28/feds_investigate_chinas_salt_typhoon/ Source: The Register Title: Feds investigate China’s Salt Typhoon amid campaign phone hacks Feedly Summary: ‘They’re taunting us,’ investigator says and it looks like it’s working The feds are investigating Chinese government-linked cyberspies breaking into the infrastructure of US telecom companies, as reports suggest Salt Typhoon – the same crew believed to…

  • Hacker News: "An utter shitshow": Inside the Transport for London cyberattack

    Source URL: https://www.londoncentric.media/p/an-utter-shitshow-inside-the-transport Source: Hacker News Title: "An utter shitshow": Inside the Transport for London cyberattack Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant cyberattack on Transport for London (TfL) that has led to widespread disruption and financial strain for many Londoners, particularly those dependent on its services. Although…

  • Alerts: CISA Adds Two Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/24/cisa-adds-two-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Two Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-20481 Cisco ASA and FTD Denial-of-Service Vulnerability CVE-2024-37383 RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability These types of vulnerabilities are frequent attack vectors for malicious…

  • The Register: Microsoft SharePoint RCE flaw exploits in the wild – you’ve had 3 months to patch

    Source URL: https://www.theregister.com/2024/10/23/microsoft_sharepoint_rce_exploited/ Source: The Register Title: Microsoft SharePoint RCE flaw exploits in the wild – you’ve had 3 months to patch Feedly Summary: Plus, a POC to make it extra easy for attackers A Microsoft SharePoint bug that can allow an attacker to remotely inject code into vulnerable versions is under active exploitation, according…

  • Alerts: CISA Adds One Known Exploited Vulnerability to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/23/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, as confirmed by Fortinet. CVE-2024-47575 Fortinet FortiManager Missing Authentication Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors…

  • Alerts: CISA Adds One Known Exploited Vulnerability to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/22/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-38094 Microsoft SharePoint Deserialization Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to…

  • The Register: Codasip opens up SDK for CHERI protection on RISC-V chips

    Source URL: https://www.theregister.com/2024/10/23/codasip_sdk_riscv_chip/ Source: The Register Title: Codasip opens up SDK for CHERI protection on RISC-V chips Feedly Summary: Alliance commits to Integrating the architecture into all high-tech products Processor design outfit Codasip is donating an SDK it developed for the CHERI security architecture to the industry body that promotes the technology, saying this will…

  • METR Blog – METR: Common Elements of Frontier AI Safety Policies

    Source URL: https://metr.org/blog/2024-08-29-common-elements-of-frontier-ai-safety-policies/ Source: METR Blog – METR Title: Common Elements of Frontier AI Safety Policies Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the Frontier AI Safety Commitments made by sixteen developers of large foundation models at the AI Seoul Summit, which focus on risk evaluation and mitigation strategies to ensure…

  • Hacker News: The Internet Archive is back, in read-only mode

    Source URL: https://blog.archive.org/2024/10/21/internet-archive-services-update-2024-10-21/ Source: Hacker News Title: The Internet Archive is back, in read-only mode Feedly Summary: Comments AI Summary and Description: Yes Summary: The Internet Archive has resumed operations after recovering from cyberattacks, emphasizing the importance of data safety and integrity. This incident highlights critical areas of concern regarding cybersecurity within online archives, particularly…

  • Alerts: CISA Adds One Known Exploited Vulnerability to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/21/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-9537 ScienceLogic SL1 Unspecified Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to…