Safeguarding Against Silent Cyber Threats: Exploring the Stealer Log Lifecycle
Hackers use open source Merlin post-exploitation toolkit in attacks
New BitForge cryptocurrency wallet flaws lets hackers steal crypto
Missouri warns that health info was stolen in IBM MOVEit data breach
Rhysida ransomware behind recent attacks on healthcare
Popular open source project Moq criticized for quietly collecting data
Google to fight hackers with weekly Chrome security updates
Preventative medicine for securing IoT tech in healthcare organizations
EvilProxy phishing campaign targets 120,000 Microsoft 365 users
Malicious extensions can abuse VS Code flaw to steal auth tokens
Microsoft Office update breaks actively exploited RCE attack chain
Windows 11 KB5029263 cumulative update released with 27 fixes
Microsoft August 2023 Patch Tuesday warns of 2 zero-days, 87 flaws
Windows 10 KB5029244 and KB5029247 updates released
https://www.bleepingcomputer.com/news/microsoft/windows-10-kb5029244-and-kb5029247-updates-released/
Interpol takes down 16shop phishing-as-a-service platform
New Downfall attacks on Intel CPUs steal encryption keys, data
Android 14 to let you block connections to unencrypted cellular networks
New Inception attack leaks sensitive data from all AMD Zen CPUs
UK Electoral Commission data breach exposes 8 years of voter data
Hackers increasingly abuse Cloudflare Tunnels for stealthy connections