Logo Cyber News

Logo Dorin M Wolf

 

- Google releases security updates for Chrome. (to the original material)
 
- SDP (Software Defined Perimeter) solutions are true ZTNA solutions: They trust no one. (to the original material)
 
- How do I select a CDR (Content Disarm and Reconstruction) solution for my business? (to the original material)
 
- How to keep your medical device IP safe from cyber attacks. (to the original material)
 
- Bad actors are becoming more successful at evading AI/ML (Artificial Intelligence/ Machine Learning) technologies. (to the original material)
 
- Security leaders want legal action for failing to patch for Log4j. (to the original material)
 
- How much do different generations trust their mobile devices’ security? (to the original material)
 
- Cyberattacks in Ukraine soon could spill over to other countries. (to the original material)
 
- Salt Security Survey surfaces API security weaknesses. (to the original material)
 
- Cybersecurity’s evolution through 2022. (to the original material)
 
- Ignoring US cybersecurity vulnerabilities is no longer an option. (to the original material)
 
- #CCSE22: "Zero Trust Model is becoming the default cyber posture," claims expert. (to the original material)
 
- #CCSE22: The Need to change course in user cybersecurity training. (to the original material)
 
- The Rise of VR and the transformation of the cybersecurity capability. (to the original material)
 
- Ghostwriter group targets NATO refugee effort. (to the original material)
 
- Nvidia admits hackers stole employee and internal data. (to the original material)
 
- Cyber Start-ups: How to get off the ground and into the stratosphere. (to the original material)
 
- Apple and Google turn off map features to help Ukraine. (to the original material)
 
- Conti ransomware’s source code Is now public. (to the original material)
 
- Xenomorph trojan spreading via Play Store to target European banks. (to the original material)
 
- Hackers try to target European officials to get info on Ukrainian refugees, supplies. (to the original material)
 
- Hackers begin weaponizing TCP Middlebox Reflection for amplified DDoS attacks. (to the original material)
 
- Ukrainian sites saw a 10x increase in attacks when the invasion started. (to the original material)
 
- Over 100,000 medical infusion pumps are vulnerable to years old critical bugs. (to the original material)
 
- Russian space agency says hacking satellites is an act of war. (to the original material)
 
- Attacks abusing programming APIs grew over 600% in 2021. (to the original material)
 
- Log4shell exploits are now used mostly for DDoS botnets, cryptominers. (to the original material)
 
- Phishing attacks target countries aiding Ukrainian refugees. (to the original material)
 
- Researchers devise attacks for stealing data during Homomorphic Encryption. (to the original material)
 
- Companies' code leaking more passwords and secrets. (to the original material)
 
- 3 Ways to expand gender diversity in cybersecurity. (to the original material)
 
- 7 Ways to secure collaboration tools in your organization. (to the original material)
 
- Russian-Themed Phishing Emails Target Microsoft Users. (to the original material)
 
- #CCSE22: How to create a security-first culture. (to the original material)
 
- #CCSE22: "Focusing on reducing time to containment is way to reduce threat risk". (to the original material)
 
- Rural Idaho receives a cybersecurity boost. (to the original material)
 
- Swiss Bank requests destruction of documents. (to the original material)
 
- HSB survey finds EV security fears. (to the original material)
 
- MuddyWater rounds up its arsenal with multi-malware sets. (to the original material)
 
- Iranian hackers introduce new malware to target Middle East. (to the original material)
 
- TrickBot’s AnchorDNS is now upgraded to AnchorMail. (to the original material)
 
- Intel's 12th-gen Alder Lake processors will not include Microsoft's Pluton security. (to the original material)
 
- Details of '120,000 Russian soldiers' leaked by Ukrainian media. (to the original material)
 
- Conti ransomware group’s source code leaked. (to the original material)
 
- EU, US close to replacing defunct Privacy Shield II. (to the original material)
 
- The zero-password future can't come soon enough. (to the original material)
 
- The Many faces of threat intelligence Part 1: Identifying the problems. (to the original material)
 
- Google paid out over $100,000 for vulnerabilities patched by Chrome 99. (to the original material)
 
- Open Source Security Foundation now counts 60 members. (to the original material)
 
- The Tel Aviv company paid millions to stop cybercriminals. (to the original material)
 
- Monongalia Health System hacked again? Second incident report in one year. (to the original material)
 
- OT and ICS vulnerabilities increase in the second half of 2021. (to the original material)
 
- API attacks increase almost 700 percent in the last year. (to the original material)
 
- Less than a quarter of directors see ransomware as a top priority. (to the original material)
 
- The password hygiene message still isn't getting across to consumers. (to the original material)
 
- CrowdStrike cracks PartyTicket ransomware targeting Ukraine. (to the original material)
 
- Cyber companies step up support for Ukraine. (to the original material)
 
- SunSeed malware hits those involved in Ukraine refugee relief. (to the original material)
 
- ESET - For companies, current conflict justifies increased focus on cybersecurity processes and operations. (to the original material)
 
- Russia-Ukraine cryptocurrency scams detected by researchers. (to the original material)
 
- US Senate passes incident reporting, FISMA update Bill. (to the original material)
 
- Insurance broker AON discloses cyberattack. (to the original material)
 
- Personal data of 120,000 Russian soldiers was published online. (to the original material)
 
- Mon Health reports breach soon after phishing incident. (to the original material)
 
- Cloud Security: With challenges come solutions. (to the original material)
 
- Russia-Ukraine conflict leverages phishing themes. (to the original material)
 
- Prospect of global cyber warfare puts security teams on edge. (to the original material)
 
- Threat Spotlight: Attacks on Log4Shell vulnerabilities. (to the original material)
 
- Logan Health cyberattack, server hack leads to data access of 214K people. (to the original material)
 
- Watchdog: CISA must make critical infrastructure threats, resources a higher priority. (to the original material)
 
- What happens during a ransomware attack: Understanding stages of targeting and response. (to the original material)
 
- Threat groups with Russian ties, the malware used in Ukraine prompt alert for US health sector. (to the original material)
 
- Only 23% of board members consider ransomware their top priority. (to the original material)
 
- Android banking trojan TeaBot levels up, spreads to more countries. (to the original material)
 
- Ukraine invasion: WordPress-hosted university websites hacked in ‘targeted attacks’. (to the original material)
 
- Remote code execution vulnerability uncovered in Hashnode blogging platform. (to the original material)
 
- Toyota shuts down production after ‘cyber-attack’ on suppliers. (to the original material)
 
- Conti ransomware decryptor, TrickBot source code leaked. (to the original material)
 
- TeaBot trojan haunts Google Play Store, again. (to the original material)
 
- SMS PVA Part 3: Countries most impacted by service. (to the original material)
 
- Ukraine calls for corporate support as Oracle suspends Russian operations. (link material original)
 
- TeaBot Android Banking Trojan continues its global conquest with new upgrades. (to the original material)
 
- Maryland officials outline a package to tighten cybersecurity. (to the original material)
 
- Army of cyber hackers rises up to back Ukraine. (to the original material)
 
- Microsoft Defender takes aim at Mid-Market. (to the original material)
 
- Cyber Incident Disclosure Bill passes in Senate amid fears of Russian attacks. (to the original material)

 

Logo Dorin M Wolf

No comments