Logo Cyber News

Logo Dorin M Wolf

 

- This Judge’s Investigation Of Patent Trolls Must Be Allowed to Move Forward. (to the original material)

- India Requires Internet Services to Collect and Store Vast Amount of Customer Data, Building a Path to Mass Surveillance. (to the original material)

- Protecting major events: an incident response blueprint. (to the original material)

- ScarCruft updates its toolset – Week in security with Tony Anscombe. (to the original material)

- Chinese Gambling Spam Targets World Cup Keywords. (to the original material)

- Binance freezes $3 million worth of crypto stolen in Ankr hack. (to the original material)

- SIM-swapper gets 18 months, must pay back $20 million he stole from crypto investor. (to the original material)

- Spanish police arrest 55 people involved in wide-ranging cyberscam operation. (to the original material)

- More than 150 Oracle Access Management systems exposed to bug highlighted by CISA. (to the original material)

- Attack of drones: airborne cybersecurity nightmare. (to the original material)

- Cuba Ransomware received over $60M in Ransom payments as of August 2022. (to the original material)

- Android Keyboard Apps with 2 Million downloads can remotely hack your device. (to the original material)

- All of Medibank’s stolen data leaked, Australia increases maximum penalties for data breaches. (to the original material)

- New infosec products of the week: December 2, 2022. (to the original material)

- CI Fuzz CLI: Open-source tool to test Java apps for unexpected behaviors. (to the original material)

- Financial organizations more prone to accidental data leakage. (to the original material)

- Zero-trust architecture: A cybersecurity must-have. (to the original material)

- The Week in Ransomware - December 2nd 2022 - Disrupting Health Care. (to the original material)

- Google Chrome emergency update fixes 9th zero-day of the year. (to the original material)

- DHS Cyber Safety Board to review Lapsus$ gang’s hacking tactics. (to the original material)

- BlackProxies proxy service increasingly popular among hackers. (to the original material)

- New CryWiper data wiper targets Russian courts, mayor’s offices. (to the original material)

- Police arrest 55 members of 'Black Panthers' SIM Swap gang. (to the original material)

- How Windows 11's Enhanced Phishing Protection guards your password. (to the original material)
 
- Three Ways to Stay Cyber Secure During the World Cup. (to the original material)
 
- Google Increases Android Security With Memory-Safe Programming Languages. (to the original material)
 
- 'Black Proxies' Enable Threat Actors to Conduct Malicious Activity. (to the original material)
 
- Hackers Use Archive Files and HTML Smuggling to Bypass Detection Tools. (to the original material)
 
- Industry Coalition Urges Congress to Hold off on SBOM (Software Bill Of Materials) Requirements for Defense Contractors. (to the original material)
 
- NATO Launches Massive Cyber-Defense Exercise. (to the original material)
 
- Cuba Ransomware Actors Pocket $60m. (to the original material)
 
- Trojan Steals Facebook Details from Over 300K Victims. (to the original material)
 
- ‘Black Proxies’ use 187,000-plus IP addresses to launch credential stuffing attacks. (to the original material)
 
- LastPass cloud breach involves ‘certain elements’ of customer information. (to the original material)
 
- Five reasons why we can expect a major cyberattack on a healthcare organization in 2023. (to the original material)
 
- Cuba Ransomware Targeting Critical Infrastructure, Feds Warn. (to the original material)
 
- Pediatric EMR Vendor Hack Affects 2.2 Million. (to the original material)
 
- Tories: Firms Should Pay More for Cybersecurity Regulation. (to the original material)
 
- Clumio CEO on Why AWS S3 Buckets Pose a Giant Security Risk. (to the original material)
 
- ISMG Editors: Twitter Breach May Be Worse Than Advertised. (to the original material)
 
- Hacked: What's the Next Step for Web3 Companies? - Part 2. (to the original material)
 
- Securing Federal Government Contractors. (to the original material)
 
- Use Obfuscation, Monitoring and RASP (Runtime Application Self-Protection) to Deepen DevSecOps. (to the original material)
 
- Most Healthcare Ransomware Hits Include Patient Data Theft. (to the original material)
 
- No Pressure: Water Utility Drips Alert 4 Months After Breach. (to the original material)

 

Logo Dorin M Wolf

No comments