In all, the company released fixes for a whopping 139 CVEs in its own products and four for non-Microsoft products.
| LATEST SECURITY NEWS & COMMENTARY | Attackers Already Exploiting Flaws in Microsoft's July Security Update In all, the company released fixes for a whopping 139 CVEs in its own products and four for non-Microsoft products. Chinese Threat Group APT40 Exploits N-Day Vulns at Rapid Pace The state-sponsored threat group is capable of exploiting fresh software vulnerabilities within hours of their initial discovery. Google Targets Passkey Support to High-Risk Execs, Civil Society The tech giant has rolled out passkey support for account authentication within its Advanced Protection Program to complement existing compatibility with FIDO2 hardware keys. Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi The ransomware-as-a-service platform just rolled off the assembly line, also targets Windows, and uses Golang for cross-platform capabilities. Evolve Bank & Trust Reveals 7M Impacted in LockBit Breach Though the company reassures its users that customer funds were not accessed, the same cannot be said for customer information. Trojanized jQuery Packages Spread via 'Complex' Supply Chain Attack The campaign, which distributes dozens of malicious jQuery variants across npm, GitHub, and jsDelivr, appears to be a manual effort, and lacks the typical pattern that characterizes similar, related attacks. CISA Takedown of Ivanti Systems Is a Wake-up Call The exploitation of vulnerabilities in Ivanti's software underscores the need for robust cybersecurity measures and proactive response strategies to mitigate risks and protect critical assets. (Sponsored Article) How the CISO Can Transform Into a True Cyber Hero Three steps that can help CISOs bring calm to incident response, redefine how they are perceived, and emerge as the hero in a cyber crisis. MORE NEWS / MORE COMMENTARY | | | PRODUCTS & RELEASES | 2024 SANS SOC Survey Reveals Critical Trends and Technologies in Cyber Defense Global Quantum Computing Market Expected to Reach $7.13B By 2031 As Data Protection Needs Increase Implementing Zero Trust and Mitigating Risk: ISC2 Courses to Support Your Development MORE PRODUCTS & RELEASES |
| | WEBINARS | The CIOs Guide to Enhancing GRC in 2024 When structured correctly, Governance, Risk, and Compliance (GRC) can enable enterprises to align IT and business goals, while mitigating risks and abiding by industry and government requirements. Effectively manage your resources and unify your enterprise by utilizing emerging technology that ... Smart Service Management Attend this webinar to get real-life examples of how teams are expediting response time, decreasing team drain, and increasing self-service adoption. | View More Dark Reading Webinars >> | |
| | | |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|