- Ransomware gangs are hitting roadblocks, but aren’t stopping (yet). (to the original material)
- Cyberattack prevention is cost-effective, so why aren’t businesses investing to protect? (to the original material)
- Now is the time to focus on software supply chain security improvements. (to the original material)
- The most impersonated brand in phishing attacks? Microsoft. (to the original material)
- Test your security configuration with a free assessment tool from CIS. (to the original material)
- Most companies are unprepared for CCPA and GDPR compliance. (to the original material)
- Infosec products of the month: July 2022. (to the original material)
- Over 3,200 apps leak Twitter API keys, some allowing account hijacks. (to the original material)
- Microsoft Defender Experts for Hunting now generally available. (to the original material)
- Steam, PayPal blocked as Indonesia enforces new Internet regulation. (to the original material)
- BlackCat ransomware claims attack on European gas pipeline. (to the original material)
- Australian man charged with creating and selling the Imminent Monitor spyware. (to the original material)
- A flaw in Dahua IP Cameras allows full take over of the devices. (to the original material)
- US Federal Communications Commission (FCC) warns of the rise of smishing attacks. (to the original material)
- How Leaked Twitter API Keys Can be Used to Build a Bot Army. (to the original material)
- 2 Vendor Hacks Affect Nearly 1.5 Million and Counting. (to the original material)
- Weary Cybercriminals Turn to Cryptojacking Banks: Report. (to the original material)
- Maintaining Momentum in Your Security Strategy. (to the original material)
- Should US Banks Do More to Reduce APP Fraud? (to the original material)
- Tracking Ransomware: Here's Everything We Still Don’t Know. (to the original material)
- Student details, photos exposed in University of WA data breach. (to the original material)
- Vulnerability Spotlight: How misusing properly serialized data opened TCL LinkHub Mesh Wi-Fi system to 17 vulnerabilities. (to the original material)
- Researcher Spotlight: You should have been listening to Lurene Grenier years ago. (to the original material)
- NFTs – a trend or a newly discovered treasure? (to the original material)
- Protection through restriction: Apple’s new Lockdown Mode. (to the original material)
- The Current and Future State of Smart OT Security. (to the original material)
- Fileless Malware: What It Is and How It Works. (to the original material)