Logo Cyber News

Logo Dorin M Wolf

 

- Press release: National Cyber Security Directorate (DNSC) and S&T Romania collaborate in the project 'Early warning system and real-time information - RO-SAT'. (to the original material)
 
- Cybersecurity News of the Week (07.04.2022) (to the original material)
 
- Guidance on sharing cyber incident information. (to the original material)
 
- VMware releases security updates. (to the original material)
 
- First malware targeting AWS Lambda Serverless Platform discovered. (to the original material)
 
- Hamas-linked hackers targeting high-ranking Israelis using 'Catfish' lures. (to the original material)
 
- Into the Breach: Breaking down 3 SaaS app cyber attacks in 2022. (to the original material)
 
- SharkBot Banking trojan resurfaces on Google Play Store hidden behind 7 new apps. (to the original material)
 
- Researchers uncover how Colibri malware stays persistent on hacked systems. (to the original material)
 
- FBI shut down Russia-linked "Cyclops Blink" botnet that infected thousands of devices. (to the original material)
 
- The Mysterious Borat RAT is an All-In-One threat. (to the original material)
 
- Zero-Day bugs bug the Biggies. (to the original material)
 
- New spyware actively targets Android users. (to the original material)
 
- Beastmode powered with newly added exploits. (to the original material)
 
- Deep Panda uses Fire Chili Windows rootkit. (to the original material)
 
- China hackers tried to hit power grid near Ladakh, "Unsuccessful": Centre. (to the original material)
 
- Dell ships patch for vulnerable filesystem. (to the original material)
 
- The Cyclops Blink botnet has been disrupted. (to the original material)
 
- Cybercriminals on Discord: Discovering developing threats. (to the original material)
 
- Paying ransom doesn’t guarantee data recovery. (to the original material)
 
- 86% of developers don’t prioritize application security. (to the original material)
 
- Cybercriminals taking advantage of the Ukraine crisis to create charity donation scams. (to the original material)
 
- How many steps does it take for attackers to compromise critical assets? (to the original material)
 
- The latest salary trends in the global DevOps industry. (to the original material)
 
- Embedded security market to reach $9 billion by 2027. (to the original material)
 
- Microsoft asks bug hunters to probe on-premises Exchange, SharePoint servers. (to the original material)
 
- Digital transformation requires security intelligence. (to the original material)
 
- FIN7 hacking group 'pen tester' sentenced to 5 years in prison. (to the original material)
 
- Google boosts Android security with new set of dev policy changes. (to the original material)
 
- New malware targets serverless AWS Lambda with cryptominers. (to the original material)
 
- Malicious web redirect service infects 16,500 sites to push malware. (to the original material)
 
- Bearded Barbie hackers catfish high ranking Israeli officials. (to the original material)
 
- Android apps with 45 million installs used data harvesting SDK. (to the original material)
 
- FBI Cyclops Blink operation disinfected thousands of WatchGuard appliances. (to the original material)
 
- Telstra now blocking scam texts in the network. (to the original material)
 
- Service NSW shortlists face matching tech for identity verification. (to the original material)
 
- Explainable AI pays off for Microsoft's LinkedIn. (to the original material)
 
- How to develop faster, better, more secure software. (to the original material)
 
- DHS, CISA must better coordinate with stakeholders to protect critical infrastructure. (to the original material)
 
- Seeking CISO feedback, FDA shares draft medical device cybersecurity guide. (to the original material)
 
- Ransomware negotiations are taking longer (and that’s a good thing). (to the original material)
 
- Ukrainian member of notorious FIN7 cybercrime group sentenced. (to the original material)
 
- Zoom's bug bounty programs soar to $1.8M. (to the original material)
 
- Nearly 40% of Macs left exposed to 2 zero-day exploits. (to the original material)
 
- CrowdStrike and Mandiant form strategic partnership to protect organizations against cyber threats. (to the original material)
 
- The Catalog of Carceral Surveillance: Tablet advertising that can also issue discipline. (to the original material)
 
- Brighter stars and persistent gaps mark new Paraguay’s “Who defends your data” report. (to the original material)
 
- Threat Source newsletter (April 7, 2022) - More money for cybersecurity still doesn't solve the skills gap problem. (to the original material)
 
- How secure is your cloud storage? Mitigating data security risks in the cloud. (to the original material)
 
- Why data-centric security is now a top priority for every business. (to the original material)
 
- Half of cybersecurity professionals consider quitting due to pressure. (to the original material)
 
- Best-of-breed, integrated security and evolving threats. (to the original material)
 
- Fortinet Security Researchers discover multiple vulnerabilities in AutoDesk products: DWG TrueView, Navisworks & Design Review. (to the original material)
 
- North Carolina A&T hit with ransomware after ALPHV attack. (to the original material)
 
- WonderHero game disabled after hackers steal $320,000 in cryptocurrency. (to the original material)
 
- Meta said it disrupted a network of fake accounts targeting Ukrainians with espionage. (to the original material)
 
- Suspected China-backed hackers target 7 Indian electricity grid centers. (to the original material)
 
- Google’s Radar Chip: Real-Time biometric data collection. (to the original material)

 

Logo Dorin M Wolf

No comments