Cyber Newsroom Feed
The "Cyber Newsroom Feed" module is a live feed of the latest cyber news enriched with CVE and vulnerability data. The feed is updated every 5 minutes and includes the latest news from the cyber security industry. The feed is designed to provide users with a comprehensive overview of the latest cyber security news and trends.

-
SentinelOne
The State of Cloud Ransomware in 2024
Overview Ransom attacks in the cloud are a perennially popular topic of discussion in the cloud security realm. Cloud services inherently provide an advantage over endpoint and web server-based servic ... Read more

-
SentinelOne
The State of Cloud Ransomware in 2024
Overview Ransom attacks in the cloud are a perennially popular topic of discussion in the cloud security realm. Cloud services inherently provide an advantage over endpoint and web server-based servic ... Read more

-
SentinelOne
The State of Cloud Ransomware in 2024
Overview Ransom attacks in the cloud are a perennially popular topic of discussion in the cloud security realm. Cloud services inherently provide an advantage over endpoint and web server-based servic ... Read more

-
security.nl
Thunderbird kan via remote content inhoud versleutelde berichten lekken
Thunderbird kan de inhoud van met OpenPGP versleutelde e-mail lekken als er gebruik wordt gemaakt van remote content. Er is een beveiligingsupdate uitgebracht om het probleem te verhelpen. Details ove ... Read more

-
Cybersecurity News
CVE-2024-10571 (CVSS 9.8): Critical Flaw in WordPress Chart Plugin Under Active Attack
Administrator websites are facing a new threat as attackers actively exploit a critical vulnerability in the popular Chartify – WordPress Chart Plugin. This plugin, with over 2,000 active installation ... Read more

-
Help Net Security
How a Windows zero-day was exploited in the wild for months (CVE-2024-43451)
CVE-2024-43451, a Windows zero-day vulnerability for which Microsoft released a fix on November 2024 Patch Tuesday, has been exploited since at least April 2024, ClearSky researchers have revealed. Ab ... Read more

-
security.nl
Windows-spoofinglek sinds juni misbruikt om NTLMv2-hashes te stelen
Aanvallers gebruiken sinds juni malafide URL-bestanden om NTLMv2-hashes van doelwitten te stelen. Daarbij wordt gebruikgemaakt van een kwetsbaarheid in Windows waarvoor Microsoft afgelopen dinsdag bev ... Read more

-
Kaspersky
CVE-2024-43451 allows stealing NTLMv2 hash | Kaspersky official blog
vulnerabilities Exploitation of vulnerability CVE-2024-43451 allows an attacker to steal an NTLMv2 hash with minimal interaction from the victim. November 14, 2024 With November’s Patch Tuesday Micros ... Read more

-
security.nl
Actief misbruik van kritiek lek in end-of-life D-Link NAS-apparaten gemeld
Aanvallers maken actief misbruik van een kritieke kwetsbaarheid in NAS-apparaten van D-Link die end-of-life zijn, zo meldt The Shadowserver Foundation. Omdat de apparaten niet meer worden ondersteund ... Read more

-
The Register
Five Eyes infosec agencies list 2024's most exploited software flaws
The cyber security agencies of the UK, US, Canada, Australia, and New Zealand have issued their annual list of the 15 most exploited vulnerabilities, and warned that attacks on zero-day exploits have ... Read more