- CISA adds four known exploited vulnerabilities to Catalog. (to the original material)
- Vulnerability Summary for the Week of March 28, 2022. (to the original material)
- The challenges of consumer data and PII usage. (to the original material)
- The CISO as brand enabler, customer advocate, and product visionary. (to the original material)
- New and less known cybersecurity risks you should be aware of. (to the original material)
- Security flaws are found in 82% of public sector software applications. (to the original material)
- Mainframe still powering critical business operations. (to the original material)
- Vulnerabilities and cyberattacks that marked the year 2021. (to the original material)
- IT in manufacturing is insufficiently prepared to support long-term hybrid work. (to the original material)
- Application security market is to reach $13.1 billion by 2025. (to the original material)
- Infosec products of the month: March 2022. (to the original material)
- WhatsApp voice message phishing emails push info-stealing malware. (to the original material)
- GitHub can now auto-block commits containing API keys, and auth tokens. (to the original material)
- VMware patches Spring4Shell RCE flaw in multiple products. (to the original material)
- Hackers breach MailChimp's internal tools to target crypto customers. (to the original material)
- FIN7 hackers evolve toolset and work with multiple ransomware gangs. (to the original material)
- Cybersecurity Weekly: UPS attack warning from CISA and DOE, Lapsus$ hacker group takedown and a surprising new text scam. (to the original material)
- JANGOW: 1.0.1: CTF walkthrough. (to the original material)
- WordPress overtakes Magento in credit card skimmers. (to the original material)
- Researchers uncover new Android spyware with C2 Server linked to Turla hackers. (to the original material)
- Multiple hacker groups capitalizing on the Ukraine conflict for distributing malware. (to the original material)
- Brokenwire hack could let remote attackers disrupt charging for electric vehicles. (to the original material)
- Experts shed light on BlackGuard Infostealer malware sold on Russian hacking forums. (to the original material)
- Beastmode DDoS botnet exploiting new TOTOLINK bugs to enslave more routers. (to the original material)
- Debate erupts at the news the White House may scale back DOD cyber-ops authorities. (to the original material)
- Fixing a vulnerability? Make sure your GitHub isn't showing too much. (to the original material)
- Microsoft's cloud business is targeted by EU antitrust regulators. (to the original material)
- Borat RAT emerges as a triple threat to cyber organizations. (to the original material)
- Qualys leverages cloud platforms to help security teams reduce alert fatigue. (to the original material)
- Anatomy of an Android malware dropper. (to the original material)
- The NDO (Non-Disclosure Order) Fairness Act is an important step toward transparency. (to the original material)
- Day of action for Antitrust: Our rights are tied to having choices. (to the original material)
- Deepfakes evolve from novelty to serious cyber threat. (to the original material)
- 10 Hot ethical hacking companies to watch in 2022. (to the original material)
- 10 Hot penetration testing companies to watch in 2022. (to the original material)
- How Pentera became a cybersecurity unicorn. (to the original material)
- Harden your cybersecurity defenses against Y2Q. (to the original material)
- Always update Safari on your iPhone. (to the original material)
- German wind turbine maker shut down after a cyberattack. (to the original material)
- Hacker accessed 319 crypto- and finance-related Mailchimp accounts, the company said. (to the original material)
- Clearview AI fined in Italy, starts scanning dead Russian soldiers in Ukraine. (to the original material)