- Microsoft Releases August 2022 Security Updates. (to the original material)
- Adobe Releases Security Updates for Multiple Products. (to the original material)
- VMware Releases Security Updates. (to the original material)
- CISA Adds Two Known Exploited Vulnerabilities to Catalog. (to the original material)
- Microsoft fixes exploited zero-day in Windows Support Diagnostic Tool (CVE-2022-34713). (to the original material)
- Kali Linux 2022.3 released: Packages for test labs, new tools, and a community Discord server. (to the original material)
- Three ransomware gangs consecutively attacked the same network. (to the original material)
- Dissecting Google’s Titan M chip: Vulnerability research challenges. (to the original material)
- Twilio confirms data breach after its employees got phished. (to the original material)
- Cyber syndicates are working with amateur attackers to target businesses. (to the original material)
- Understanding your attack surface is key to recognizing what you are defending. (to the original material)
- Introducing the book: If It’s Smart, It’s Vulnerable. (to the original material)
- LogoKit update: The phishing kit leveraging open redirect vulnerabilities. (to the original material)
- 5 key things we learned from CISOs of smaller enterprises survey. (to the original material)
- CISA warns of Windows and UnRAR flaws exploited in the wild. (to the original material)
- How hackers are stealing credit cards from classifieds sites. (to the original material)
- Microsoft: Exchange ‘Extended Protection’ needed to fully patch new bugs. (to the original material)
- Kali Linux 2022.3 adds 5 new tools, updates Linux kernel, and more. (to the original material)
- Microsoft patches Windows DogWalk zero-day exploited in attacks. (to the original material)
- Microsoft August 2022 Patch Tuesday fixes exploited zero-day, 121 flaws. (to the original material)
- Cloudflare employees also hit by hackers behind Twilio breach. (to the original material)
- 10 malicious PyPI packages found stealing developer's credentials. (to the original material)
- VMware warns of public exploit for critical auth bypass vulnerability. (to the original material)
- Maui ransomware operation linked to North Korean 'Andariel' hackers. (to the original material)
- Hackers install Dracarys Android malware using modified Signal app. (to the original material)
- Microsoft Patch Tuesday for August 2022 - Snort rules and prominent vulnerabilities. (to the original material)
- How to check if your PC has been hacked, and what to do next. (to the original material)
- Fake Instagram Verification & Twitter Badge Phishing. (to the original material)
- 80 percent of enterprises use open source software and nearly all worry about security. (to the original material)
- IBM makes open source toolkit available to fight software supply chain attacks. (to the original material)
- WhatsApp is gaining some great new privacy features including screenshot blocking. (to the original material)
- North Korean Cryptocurrency Hacking Poised to Get Even Worse. (to the original material)
- Ransomware Leak Site Listings Invite Follow-On Attacks. (to the original material)
- Fresh Guilty Plea Follows Crackdown on BitMEX Exchange. (to the original material)
- Microsoft Patch Tuesday for August 2022 fixed actively exploited zero-day. (to the original material)
- Experts linked Maui ransomware to North Korean Andariel APT. (to the original material)
- Chinese actors behind attacks on industrial enterprises and public institutions. (to the original material)
- US sanctioned crypto mixer Tornado Cash used by North Korea-linked APT. (to the original material)
- Malicious file analysis – Example 01. (to the original material)