Logo Cyber News
Logo Dorin M Wolf
 
- Vulnerability Summary for the Week of October 25, 2021. (to the original material)
 
- CISA begins program to identify critical infrastructure. (to the original material)
 
- Trick & Treat! Paying Leets and Sweets for Linux Kernel privescs and k8s escapes. (to the original material)
 
- "Trojan Source" attack method can hide bugs into open-source code. (to the original material)
 
- Trojan Source: Invisible vulnerabilities in most code. (to the original material)
 
- Microsoft Defender for Windows is getting a massive overhaul. (to the original material)
 
- Canadian province Newfoundland and Labrador health care system disrupted by cyberattack. (to the original material)
 
- Kaspersky's stolen Amazon SES token used in Office 365 phishing. (to the original material)
 
- Signal now lets you report and block spam messages. (to the original material)
 
- BlackShadow hackers breach Israeli hosting firms and extort customers. (to the original material)
 
- FBI: HelloKitty ransomware adds DDoS attacks to extortion tactics. (to the original material)
 
- Stand up your SOC with Crystal Eye XDR: Lift your security monitoring and incident response maturity. (to the original material)
 
- Financial services need to prioritize API security to protect their customers. (to the original material)
 
- Cybersecurity can drive business transformation instead of holding it back. (to the original material)
 
- Avoiding the costly ESU cycle (Extended Security Update): Lessons learned from Windows 7 end-of-life. (to the original material)
 
- Infosec products of the month: October 2021. (to the original material)
 
- Cyber-Incident at South Carolina School District. (to the original material)
 
- California Health Network reports data breach. (to the original material)
 
- Venmo (mobile payment service) to reimburse hacking victims after hacking of Bank of America. (to the original material)
 
- BlackMatter: New data exfiltration tool used in attacks. (to the original material)
 
- BlackMatter Group speeds up data theft with new tool. (to the original material)
 
- Conti Group leaked celebs' data after ransom attack on Jeweller (Graff UK). (to the original material)
 
- Celebrities' data dumped on darknet site after hack. (to the original material)
 
- Euro Police swoop on 12 suspected ransomware gang members. (to the original material)
 
- Cybercriminals target newbie bad actors with phishing sites. (to the original material)
 
- Reduce security risk of Healthcare Legacy Systems, devices. (to the original material)
 
- India’s National Cybersecurity Strategy awaiting approval. (to the original material)
 
- Ransomware Evolves: Affiliates set to Wield Greater Power. (to the original material)
 
- N-Day Vulnerabilities: The Critical Importance of patching. (to the original material)
 
- Changing employee mindsets during digital transformation. (to the original material)
 
- Ransomware attack disrupts Toronto’s public transportation system (Canada). (to the original material)
 
- Critical flaws uncovered in Pentaho Business Analytics Software. (to the original material)
 
- Securing SaaS Apps (Security-as-a-Service) - CASB (Cloud Access Security Broker) versus SSPM (SaaS Security Posture Management). (to the original material)
 
- New "Trojan Source" technique lets hackers hide vulnerabilities in source code. (to the original material)
 
- Researchers uncover "Pink" botnet malware that infected over 1.6 million devices. (to the original material)
 
- Developer community rallies to secure open-source software. (to the original material)

 

Logo Dorin M Wolf

No comments