Come to the TaskForce ready to share your story, challenges, and/or questions. You can email your thoughts by contacting [email protected] before the call. · Participate live during the event by unmuting your mic, turning on your video, or sharing in the Zoom chat feature. · Understand the challenges and successes other SAP customers are experiencing. · Acquire new ideas for real-world solutions. · Make a lasting new industry connection.
Key Information
CISA Adds 4 Actively Exploited Vuls to KEV Catalog
By infosecbulletin
/ Wednesday , February 5 2025
CISA added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, noting they are actively being exploited. The list...
Read More
AMD Patches CPU Vulnerability
By infosecbulletin
/ Wednesday , February 5 2025
AMD announced patches on Monday for a microprocessor vulnerability that risks the loss of Secure Encrypted Virtualization (SEV) protection, potentially...
Read More
Hackers To Use HTTP Client Tools To Compromise Microsoft 365 Accounts
By infosecbulletin
/ Wednesday , February 5 2025
Hackers are using HTTP client tools for advanced account takeover attacks on Microsoft 365. Seventy-eight percent of Microsoft 365 tenants...
Read More
Google patches 47 Android flaws, Including Actively Exploited CVE-2024-53104
By infosecbulletin
/ Wednesday , February 5 2025
Google has released patches for 47 security flaws in Android, including one that is actively being exploited. CVE-2024-53104 (CVSS score: 7.8)...
Read More
CVE-2025-21415
Microsoft Patches Critical Azure AI Face Service Vulnerability
By infosecbulletin
/ Tuesday , February 4 2025
Microsoft has released patches for two critical security flaws in Azure AI Face Service and Microsoft Account that could allow...
Read More
Daily Security Update Dated:4.02.2025
By infosecbulletin
/ Tuesday , February 4 2025
Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
768 Exploited CVEs in 2024, a 20% Increase from 639 in 2023
By infosecbulletin
/ Tuesday , February 4 2025
In 2024, 768 vulnerabilities with CVE identifiers were reported as exploited in the wild, a 20% increase from 639 in...
Read More
.Gov Domains Weaponized in Phishing Surge
By infosecbulletin
/ Monday , February 3 2025
A recent report from Cofense Intelligence highlights a concerning trend: threat actors are increasingly misusing .gov top-level domains (TLDs) to...
Read More
RedSentry presents
Hacked 101 Seminar Successfully Ended at UITS
By infosecbulletin
/ Sunday , February 2 2025
The cybersecurity seminar "RedSentry presents: Hacked 101," organized by RedSentry with the University of Information Technology and Sciences (UITS) as...
Read More
US scientists claim to replicate DeepSeek for $30 dubbed “TinyZero,”
By infosecbulletin
/ Sunday , February 2 2025
Researchers at the University of California, Berkeley, claims they’ve managed to reproduce the core technology behind DeepSeek’s at a total...
Read More