About Us
Cybersecurity Career Community and Newsletter
100DaysOfCyber.com is a cybersecurity career community and newsletter that features cybersecurity groups, thought leaders, and events to keep you current on the latest industry trends.
Our objective is to:
1) Highlight the hottest cybersecurity groups, training, and events.
2) Suggest cybersecurity practitioners and thought leaders to follow and connect.
3) Provide our newsletter readers and subscribers, the hottest and most valuable cybersecurity discoveries from all around the world!
Important links:
Submit to be featured
Learn
Apple Issues Urgent Updates to Fix New Zero-Day Linked to Pegasus Spyware
Apple has released iOS 14.8, iPadOS 14.8, watchOS 7.6.2, macOS Big Sur 11.6, and Safari 14.1.2 to fix two actively exploited vulnerabilities, one of which defeated extra security protections built into the operating system.
Hackers Leak VPN Account Passwords From 87,000 Fortinet FortiGate Devices
Network security solutions provider Fortinet confirmed that a malicious actor had unauthorizedly disclosed VPN login names and passwords associated with 87,000 FortiGate SSL-VPN devices.
"These credentials were obtained from systems that remained unpatched against CVE-2018-13379 at the time of the actor's scan. While they may have since been patched, if the passwords were not reset, they remain vulnerable," the company said in a statement on Wednesday.
Post Of The Week
New Stealthier ZLoader Variant Spreading Via Fake TeamViewer Download Ads
Users searching for TeamViewer remote desktop software on search engines like Google are being redirected to malicious links that drop ZLoader malware onto their systems while simultaneously embracing a stealthier infection chain that allows it to linger on infected devices and evade detection by security solutions.
"The malware is downloaded from a Google advertisement published through Google Adwords," researchers from SentinelOne said in a report published on Monday. "In this campaign, the attackers use an indirect way to compromise victims instead of using the classic approach of compromising the victims directly, such as by phishing."