Logo Cyber News

Logo Dorin M Wolf

 

- Microsoft Releases August 2022 Security Updates. (to the original material)
 
- Adobe Releases Security Updates for Multiple Products. (to the original material)
 
- VMware Releases Security Updates. (to the original material)
 
- CISA Adds Two Known Exploited Vulnerabilities to Catalog. (to the original material)
 
- Microsoft fixes exploited zero-day in Windows Support Diagnostic Tool (CVE-2022-34713). (to the original material)
 
- Kali Linux 2022.3 released: Packages for test labs, new tools, and a community Discord server. (to the original material)
 
- Three ransomware gangs consecutively attacked the same network. (to the original material)
 
- Dissecting Google’s Titan M chip: Vulnerability research challenges. (to the original material)
 
- Twilio confirms data breach after its employees got phished. (to the original material)
 
- Cyber syndicates are working with amateur attackers to target businesses. (to the original material)
 
- Understanding your attack surface is key to recognizing what you are defending. (to the original material)
 
- Introducing the book: If It’s Smart, It’s Vulnerable. (to the original material)
 
- LogoKit update: The phishing kit leveraging open redirect vulnerabilities. (to the original material)
 
- 5 key things we learned from CISOs of smaller enterprises survey. (to the original material)
 
- CISA warns of Windows and UnRAR flaws exploited in the wild. (to the original material)
 
- How hackers are stealing credit cards from classifieds sites. (to the original material)
 
- Microsoft: Exchange ‘Extended Protection’ needed to fully patch new bugs. (to the original material)
 
- Kali Linux 2022.3 adds 5 new tools, updates Linux kernel, and more. (to the original material)
 
- Microsoft patches Windows DogWalk zero-day exploited in attacks. (to the original material)
 
- Microsoft August 2022 Patch Tuesday fixes exploited zero-day, 121 flaws. (to the original material)
 
- Cloudflare employees also hit by hackers behind Twilio breach. (to the original material)
 
- 10 malicious PyPI packages found stealing developer's credentials. (to the original material)
 
- VMware warns of public exploit for critical auth bypass vulnerability. (to the original material)
 
- Maui ransomware operation linked to North Korean 'Andariel' hackers. (to the original material)
 
- Hackers install Dracarys Android malware using modified Signal app. (to the original material)
 
- Microsoft Patch Tuesday for August 2022 - Snort rules and prominent vulnerabilities. (to the original material)
 
- How to check if your PC has been hacked, and what to do next. (to the original material)
 
- Fake Instagram Verification & Twitter Badge Phishing. (to the original material)
 
- 80 percent of enterprises use open source software and nearly all worry about security. (to the original material)
 
- IBM makes open source toolkit available to fight software supply chain attacks. (to the original material)
 
- WhatsApp is gaining some great new privacy features including screenshot blocking. (to the original material)
 
- North Korean Cryptocurrency Hacking Poised to Get Even Worse. (to the original material)
 
- Ransomware Leak Site Listings Invite Follow-On Attacks. (to the original material)
 
- Fresh Guilty Plea Follows Crackdown on BitMEX Exchange. (to the original material)
 
- Microsoft Patch Tuesday for August 2022 fixed actively exploited zero-day. (to the original material)
 
- Experts linked Maui ransomware to North Korean Andariel APT. (to the original material)
 
- Chinese actors behind attacks on industrial enterprises and public institutions. (to the original material)
 
- US sanctioned crypto mixer Tornado Cash used by North Korea-linked APT. (to the original material)
 
- Malicious file analysis – Example 01. (to the original material)

 

Logo Dorin M Wolf

No comments