
- CISA adds five known exploited vulnerabilities to Catalog. (to the original material)
- Over 300,000 users downloaded malware droppers from Google Play. (to the original material)
- The ripple effect: Why protection against supply chain attacks is a must. (to the original material)
- Despite the popularity of password managers, many still use pen and paper. (to the original material)
- Control failures are behind a growing number of cybersecurity incidents. (to the original material)
- Alarming rise in cyberattacks against healthcare facilities, 68 attacks in the third quarter of 2021 only. (to the original material)
- How can businesses realize the true value of digital transformation? (to the original material)
- InfoSec products of the month: November 2021. (to the original material)
- Microsoft Exchange servers were hacked to deploy BlackByte ransomware. (to the original material)
- Europol: 18,000 money mules caught laundering money from online fraud. (to the original material)
- VirusTotal collection feature helps keep neat IoC (Indicator of Compromise) lists. (to the original material)
- State-backed hackers increasingly use RTF (Rich Text Format) injection for phishing. (to the original material)
- Malicious Android app steals Malaysian bank credentials and MFA codes. (to the original material)
- Mozilla fixes critical bugs in the cross-platform cryptography library. (to the original material)
- Twitter to remove the images of people posted without the consent of the subject in private media. (to the original material)
- Organizations now have 76 security tools to manage. (to the original material)
- HP printer hijack bugs impact 150 models. (to the original material)
- Head of MI6: Digital attack surface growing "exponentially". (to the original material)
- Vulnerabilities Spotlight: Use-after-free conditions in Google Chrome could lead to code execution. (to the original material)
- Jumping the air gap: 15 years of nation-state effort. (to the original material)
- Planned Parenthood LA discloses data breach after ransomware attack. (to the original material)
- Emotet now spreads via Adobe Windows app installer fake packages. (to the original material)
- Former Ubiquiti developer charged with trying to extort his employer. (to the original material)
- The founder of Bulletproof Hosting imprisoned for helping cybercrime gangs. (to the original material)
- WordPress Admin Creator – A simple but effective attack. (to the original material)
- PrivSec Global: Why the Council of Europe's police surveillance treaty is a pernicious influence on Latam legal privacy frameworks. (to the original material)
- Facebook's secret "Dangerous Organizations and Individuals" list creates problems for the company - and its users. (to the original material)
- The Internet needs fair rules of the road - and competitive drivers. (to the original material)
- AI/ML powered automation: The future of cybersecurity at scale. (to the original material)
- How to proactively remove file-based malware. (to the original material)
- Improving cybersecurity with MITRE ATT&CK framework. (to the original material)