data breach

  1. CVE-2024-30073: Windows Security Zone Vulnerability Explained

    Introduction The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. With growing concerns about cybersecurity, Microsoft’s rapid response to vulnerabilities has become paramount in protecting users...
  2. CVE-2024-38254: Critical Windows Authentication Vulnerability Explained

    CVE-2024-38254: Understanding the Windows Authentication Information Disclosure Vulnerability and Its Implications for Users In the ever-evolving landscape of cybersecurity, Microsoft has become a primary target for scrutiny, both from malicious actors and vigilant defenders alike. The recent...
  3. CVE-2024-26186: Critical SQL Server Vulnerability Explained and Mitigated

    In a landscape defined by constant cyber threats, the unveiling of new vulnerabilities continues to grab the attention of security professionals and IT administrators alike. One such concerning vulnerability is CVE-2024-26186, recently identified in the Microsoft SQL Server Native Scoring...
  4. Understanding CVE-2024-38206: Vulnerability in Microsoft Copilot Studio

    On August 6, 2024, security experts at the Microsoft Security Response Center identified an important vulnerability (CVE-2024-38206) within Microsoft Copilot Studio that could compromise sensitive information. This article delves into the details of this vulnerability, its implications, and...
  5. Critical Security Alert: CERT-In Warns Windows 10 and 11 Users of Vulnerabilities

    In a recent announcement, the Indian Computer Emergency Response Team (CERT-In) has issued a stark warning to users of Windows 10 and Windows 11 regarding serious security vulnerabilities. These weaknesses have the potential to enable attackers to gain elevated privileges on affected systems...
  6. Microsoft Addresses CVE-2024-21302: Critical VBS Vulnerability Update

    In an important update released just recently, Microsoft has addressed the critical Virtualization-Based Security (VBS) vulnerability dubbed CVE-2024-21302, a flaw that could potentially allow attackers to downgrade modern Windows operating systems without user awareness. This significant...
  7. NEWS Optus asks court to stop release of Deloitte cyberattack report

    Thousands of Optus customers who had personal details stolen in a cyberattack and leaked on the dark web may never find out how the breach happened after the telecommunications group pleaded “legal professional privilege” to try to stop a report into the hack being released. Optus asks court to...
  8. NEWS Australian horse riding organisations caught up in cyber attack impacting 10,000 people

    Cyber criminals have followed through on their threats of leaking the sensitive details of 10,000 people, after the company refused to bow to their extortion attempts. Cyber criminals have targeted yet another Australian small business by stealing and leaking the data of 10,000 people. Last...
  9. Keeping your family safer online with Microsoft Edge and celebrating 1 year of Give with Bing

    We have lots of news this month to make the most of your time and help keep your family safer online. Today, we’re excited to unveil Microsoft Edge Kids Mode, a safer space for your child to discover the web. You can also learn more about Kids Mode by visiting Link Removed. Along with this news...
  10. Keeping your family safer online with Microsoft Edge and celebrating 1 year of Give with Bing

    We have lots of news this month to make the most of your time and help keep your family safer online. Today, we’re excited to unveil Microsoft Edge Kids Mode, a safer space for your child to discover the web. You can also learn more about Kids Mode by visiting Link Removed. Along with this news...
  11. VIDEO Cyberpunk 2077's Stolen Source Code Being Auctioned For $7 Million Dollars! CDPR Refuses To Pay Up!

    :eek:
  12. AA21-008A: Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments

    Original release date: January 8, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This Alert is a companion alert to Link Removed...
  13. AA20-275A: Potential for China Cyber Response to Heightened U.S.–China Tensions

    Original release date: October 1, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. In light of heightened tensions between the United States and...
  14. AA20-258A: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity

    Original release date: September 14, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics...
  15. AA20-183A: Defending Against Malicious Cyber Activity Originating from Tor

    Original release date: July 1, 2020 | Last revised: July 2, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) and Pre-ATT&CK framework. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques. This...
  16. AA20-126A: APT Groups Target Healthcare and Essential Services

    Original release date: May 5, 2020 Summary This is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). CISA and NCSC continue to see indications that...
  17. AA19-339A: Dridex Malware

    Original release date: December 5, 2019 Summary This Alert is the result of recent collaboration between the Department of the Treasury Financial Sector Cyber Information Group (CIG) and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) to identify and share...
  18. Introducing the new Microsoft Edge and Bing

    The browser and search engine for business In our mission to empower people with knowledge with Microsoft 365, one critical opportunity is the internet. We know that 60% of the time people spend on the PC is within the web browser, and it has become the primary way we work, learn and play...
  19. Cybercrimes Go Unreported More Often Than People Think, Report Finds

    About half of organizations say cybercrime is under-reported at their organizations, even when reporting is required. Continue reading...
  20. Exploring Password Managers: Community Poll on User Experiences and Recommendations

    I understand if you don't want to participate in the poll. But I thought it'd be interesting to see what the community here uses considering it's a mixture of us older geeks and newer geeks. So that spans lots of changes in tech and lots of opinions. I've been using LastPass for a few years...