Logo Cyber News

Logo Dorin M Wolf

 

- CISA adds four known exploited vulnerabilities to Catalog. (to the original material)
 
- Vulnerability Summary for the Week of March 28, 2022. (to the original material)
 
- The challenges of consumer data and PII usage. (to the original material)
 
- The CISO as brand enabler, customer advocate, and product visionary. (to the original material)
 
- New and less known cybersecurity risks you should be aware of. (to the original material)
 
- Security flaws are found in 82% of public sector software applications. (to the original material)
 
- Mainframe still powering critical business operations. (to the original material)
 
- Vulnerabilities and cyberattacks that marked the year 2021. (to the original material)
 
- IT in manufacturing is insufficiently prepared to support long-term hybrid work. (to the original material)
 
- Application security market is to reach $13.1 billion by 2025. (to the original material)
 
- Infosec products of the month: March 2022. (to the original material)
 
- WhatsApp voice message phishing emails push info-stealing malware. (to the original material)
 
- GitHub can now auto-block commits containing API keys, and auth tokens. (to the original material)
 
- VMware patches Spring4Shell RCE flaw in multiple products. (to the original material)
 
- Hackers breach MailChimp's internal tools to target crypto customers. (to the original material)
 
- FIN7 hackers evolve toolset and work with multiple ransomware gangs. (to the original material)
 
- Cybersecurity Weekly: UPS attack warning from CISA and DOE, Lapsus$ hacker group takedown and a surprising new text scam. (to the original material)
 
- JANGOW: 1.0.1: CTF walkthrough. (to the original material)
 
- WordPress overtakes Magento in credit card skimmers. (to the original material)
 
- Researchers uncover new Android spyware with C2 Server linked to Turla hackers. (to the original material)
 
- Multiple hacker groups capitalizing on the Ukraine conflict for distributing malware. (to the original material)
 
- Brokenwire hack could let remote attackers disrupt charging for electric vehicles. (to the original material)
 
- Experts shed light on BlackGuard Infostealer malware sold on Russian hacking forums. (to the original material)
 
- Beastmode DDoS botnet exploiting new TOTOLINK bugs to enslave more routers. (to the original material)
 
- Debate erupts at the news the White House may scale back DOD cyber-ops authorities. (to the original material)
 
- Fixing a vulnerability? Make sure your GitHub isn't showing too much. (to the original material)
 
- Microsoft's cloud business is targeted by EU antitrust regulators. (to the original material)
 
- Borat RAT emerges as a triple threat to cyber organizations. (to the original material)
 
- Qualys leverages cloud platforms to help security teams reduce alert fatigue. (to the original material)
 
- Anatomy of an Android malware dropper. (to the original material)
 
- The NDO (Non-Disclosure Order) Fairness Act is an important step toward transparency. (to the original material)
 
- Day of action for Antitrust: Our rights are tied to having choices. (to the original material)
 
- Deepfakes evolve from novelty to serious cyber threat. (to the original material)
 
- 10 Hot ethical hacking companies to watch in 2022. (to the original material)
 
- 10 Hot penetration testing companies to watch in 2022. (to the original material)
 
- How Pentera became a cybersecurity unicorn. (to the original material)
 
- Harden your cybersecurity defenses against Y2Q. (to the original material)
 
- Always update Safari on your iPhone. (to the original material)
 
- German wind turbine maker shut down after a cyberattack. (to the original material)
 
- Hacker accessed 319 crypto- and finance-related Mailchimp accounts, the company said. (to the original material)
 
- Clearview AI fined in Italy, starts scanning dead Russian soldiers in Ukraine. (to the original material)

 

Logo Dorin M Wolf

No comments