Logo Dorin M Wolf

 

- FBI and CISA Publish a PSA (Public Service Announcement) on Malicious Cyber Activity Against Election Infrastructure. (to the original material)
 
- Vulnerability Summary for the Week of September 26, 2022. (to the original material)
 
- ESET Threat Report T2 2022. (to the original material)
 
- Make the most of Cybersecurity Awareness Month. (to the original material)
 
- NullMixer: multiple malware in one. (to the original material)
 
- Dissect: Open-source framework for collecting, analyzing forensic data. (to the original material)
 
- CISA orders federal agencies to regularly perform IT asset discovery, vulnerability enumeration. (to the original material)
 
- 7 cybersecurity audiobooks you should listen to this year. (to the original material)
 
- Average company with data in the cloud faces $28 million in data-breach risk. (to the original material)
 
- FBI: Cyberattacks targeting election systems unlikely to affect results. (to the original material)
 
- BlackByte ransomware abuses legit driver to disable security products. (to the original material)
 
- Avast releases free decryptor for MafiaWare666 ransomware variants. (to the original material)
 
- City of Tucson discloses data breach affecting over 123,000 people. (to the original material)
 
- Hundreds of Microsoft SQL servers backdoored with new malware. (to the original material)
 
- CommonSpirit US nonprofit health system discloses security incident. (to the original material)
 
- Microsoft updates mitigation for ProxyNotShell Exchange zero days. (to the original material)
 
- New Android malware 'RatMilad' can steal your data, record audio. (to the original material)
 
- NetWalker Ransomware Affiliate Faces 20 Years in US Prison. (to the original material)
 
- Ring Login Issues Wednesday Stem From System Error, Not Hack. (to the original material)
 
- Jury Finds Former Uber CSO Joe Sullivan Guilty of Cover-Up. (to the original material)
 
- Patients Affected By Cybersecurity Event at Hospital Chain. (to the original material)
 
- Why Aren't More Women in Security Leadership Positions? (to the original material)
 
- How to Deal With Endemic Software Vulnerabilities. (to the original material)
 
- Microsoft issues new mitigation measures for Exchange zero-day vulnerabilities. (to the original material)
 
- Ex-Uber chief security officer convicted of covering up 2016 breach. (to the original material)
 
- Cloud account compromise a permanent feature of threat landscape. (to the original material)
 
- Matrix patches five vulnerabilities in its end-to-end encryption. (to the original material)
 
- Threat actors use YouTube to distribute ‘poisoned’ Tor browser installer. (to the original material)
 
- Should we take comfort in knowing that threat actors are finding ways to bypass MFA? (to the original material)
 
- The average company with data in the cloud has a $28 million breach risk. (to the original material)
 
- Time to talk about diversity: Three pleas to cybersecurity hiring managers. (to the original material)
 
- Avast releases a free decryptor for some Hades ransomware variants. (to the original material)
 
- New Maggie malware already infected over 250 Microsoft SQL servers. (to the original material)
 
- Telstra Telecom discloses data breach impacting former and current employees. (to the original material)
 
- OnionPoison: malicious Tor Browser installer served through a popular Chinese YouTube channel. (to the original material)
 
- Canadian Sentenced to 20 Years in US Prison For Ransomware Attacks. (to the original material)
 
- CISA Advisory Details How Hackers Targeted Defense Industrial Base Organization. (to the original material)
 
- CISA Advisory Details How Hackers Targeted Defense Industrial Base Organization. (to the original material)
 
- Ransomware Group Bypasses "Enormous" Range of EDR (Endpoint Detection and Response) Tools. (to the original material)
 
- Landmark US-UK Data Access Agreement Begins. (to the original material)
 
- New Initiative Aims to Strengthen UK's Nuclear Cybersecurity Posture. (to the original material)
 
- 8 Cyber Security Tips for Teachers, Parents and Kids. (to the original material)
 
- FBI: Hackers Exploit Vulnerabilities in DeFi Platforms. (to the original material)
 
- Biometric authentication: what are the most common methods and how do they work? (to the original material)

 

Logo Dorin M Wolf

No comments