Logo Cyber News

Logo Dorin M Wolf

 

- CISA’s Zero Trust Guidance for enterprise mobility is available for public comment. (to the original material)
 
- CISA adds 11 known exploited vulnerabilities to Catalog. (to the original material)
 
- Mozilla releases security updates for multiple products. (to the original material)
 
- Vulnerability Summary for the Week of February 28, 2022. (to the original material)
 
- Press release: Cyber security incident at Rompetrol. (to the original material)
 
- Mozilla fixes Firefox zero-days exploited in the wild (CVE-2022-26485, CVE-2022-26486). (to the original material)
 
- IT leaders confident in their ability to manage a ransomware attack: They should know better. (to the original material)
 
- Every business is a cybersecurity business. (to the original material)
 
- Solving the problem of secrets sprawling in corporate codebases. (to the original material)
 
- How frustrated and burned out are security analysts? (to the original material)
 
- BBC targeted with 383,278 spam, phishing, and malware attacks every day. (to the original material)
 
- Coinbase blocks over 25,000 Russian-linked crypto addresses. (to the original material)
 
- Dozens of COVID passport apps put users' privacy at risk. (to the original material)
 
- FBI: Govt officials impersonated in widespread extortion schemes. (to the original material)
 
- Samsung confirms hackers stole Galaxy devices' source code. (to the original material)
 
- Piracy OK: Russia to ease software licensing rules after sanctions. (to the original material)
 
- Microsoft fixes critical Azure bug that exposed customer data. (to the original material)
 
- Rompetrol gas station network hit by Hive ransomware. (to the original material)
 
- Industrial systems see more vulnerabilities, greater threats. (to the original material)
 
- Researchers find a new ways to neutralize side-channel memory attacks. (to the original material)
 
- EFF to European Court: “Right to be Forgotten” shouldn’t stop the public from reading the news. (to the original material)
 
- Lapsus$ strikes again - 190GB Samsung data release by Nvidia hackers. (to the original material)
 
- PressReader suffers cyber-attack. (to the original material)
 
- Weight management companies settle data privacy suits. (to the original material)
 
- Samsung source codes were stolen. (to the original material)
 
- A critical component of a layered approach to cybersecurity: SIEMaaS (SIEM-as-a-Service). (to the original material)
 
- Blaming users for security fails: Oh, yes we should vs. Oh, no we shouldn’t. (to the original material)
 
- Cameras, video analytics and legislation: Top video privacy trends of 2022. (to the original material)
 
- #HowTo: Prepare for the future of electronic identities. (to the original material)
 
- Musk warns Starlink could attract Russian bombs. (to the original material)
 
- Counterfeit and pirated imports surge during the pandemic. (to the original material)
 
- Ukraine is set to join NATO Cyber Hub. (to the original material)
 
- Deep dive: Vulnerabilities in ZTE router could lead to complete attacker control of the device. (to the original material)
 
- MS Office files involved again in recent Emotet trojan campaign - Part I. (to the original material)
 
- Fake purchase order used to deliver Agent Tesla. (to the original material)
 
- Organizations take two months to patch critical vulnerabilities. (to the original material)
 
- How to create a website maintenance schedule. (to the original material)
 
- Time to remove politics from cybersecurity research. (to the original material)
 
- Android banking trojan SharkBot distributed via Google Play Store. (to the original material)
 
- KnowBe4 asks security pros for input on its Security Culture Maturity Model. (to the original material)
 
- Samsung confirms Galaxy device source code leaked after a breach. (to the original material)
 
- Fortinet ceases operations within Russia. (to the original material)
 
- How to move beyond cybersecurity compliance in healthcare? Focus on clinician workflows. (to the original material)
 
- Draft registration system gets $6 million in funding for cyber, data analysis upgrades. (to the original material)
 
- Kaseya CISO talks security through the lens of law enforcement. (to the original material)
 
- Fresh flaws in Facebook Canvas earn bug bounty hunter a second payday. (to the original material)
 
- Utah privacy bill places tighter controls on consumer data. (to the original material)
 
- Critical Firefox zero-day bugs allow RCE, Sandbox escape. (to the original material)
 
- Samsung confirms Lapsus$ ransomware hit, source code leak. (to the original material)
 
- NVIDIA’s stolen code-signing certs used to sign malware. (to the original material)
 
- Ukraine fighting first-ever 'Hybrid War' - Cyber Official. (to the original material)
 
- White House requests billions in tech aid for Ukraine. (to the original material)
 
- Russia-Ukraine Updates: Cybersecurity news amid conflict. (to the original material)
 
- Federal report offers healthcare cyberattack trend insights. (to the original material)
 
- Days-long DDoS attack with embedded ransom note mitigated. (to the original material)
 
- IsaacWiper and HermeticWizard: New wiper and worm malware targeting Ukraine. (to the original material)
 
- Cyber‑readiness in the face of an escalated gray zone conflict. (to the original material)
 
- Cloudflare, CrowdStrike, and Ping Identity join forces to strengthen U.S. cybersecurity in light of increased cyber threats. (to the original material)
 
- Long delay before Cybersecurity NSW notified of Accellion hack. (to the original material)
 
- OH: Hilliard City Schools evaluating protocols after releasing 4,200 names of students in public-information requests. (to the original material)
 
- CISA informs organizations of flaws in unsupported Industrial Telecontrol devices. (to the original material)
 
- New Linux bug gives root on all major distros, exploit released. (to the original material)
 
- FBI: Ransomware gang breached 52 US critical infrastructure orgs. (to the original material)
 
- How to keep customers safe with the correct print security strategy. (to the original material)

 

Logo Dorin M Wolf

No comments