- Cisco Releases Security Advisory for IP Phone 7800 and 8800 Series. (to the original material)
- Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns. (to the original material)
- US Dept of Health warns of ‘increased’ Royal ransomware attacks on hospitals. (to the original material)
- Local governments allegedly targeted with Iranian ‘Drokbk’ malware through Log4j vulnerability. (to the original material)
- Cisco discloses high-severity flaw impacting IP Phone 7800 and 8800 Series. (to the original material)
- Experts devised a technique to bypass web application firewalls (WAF) of several vendors. (to the original material)
- Cloud Atlas targets entities in Russia and Belarus amid the ongoing war in Ukraine. (to the original material)
- Check Point CloudGuard Spectral exposes new obfuscation techniques for malicious packages on PyPi. (to the original material)
- Truebot Malware Activity Increases With Possible Evil Corp Connections. (to the original material)
- BEC Attacks Expand Beyond Email and Toward Mobile Devices. (to the original material)
- Cobalt Mirage Affiliate Uses GitHub to Relay Drokbk Malware Instructions. (to the original material)
- Software Supply Chain Attacks Leveraging Open-Sources Repos Growing. (to the original material)
- #BHEU: UK Government Calls for Industry Input on its Cybersecurity Strategy. (to the original material)
- Government to Fund Security Studies for Hundreds of Students. (to the original material)
- Security Concerns Scupper Deals for Two-Thirds of Firms. (to the original material)
- Government Sets Out New Rules to Enhance App Security. (to the original material)
- Attackers lure victims to click on fake invoice to bypass Microsoft Office 365 email security. (to the original material)
- Truebot malware linked to Evil Corp shifts tactics to exploit RCEs, USBs. (to the original material)
- North Korean threat group exploiting Internet Explorer zero-day. (to the original material)
- The road to CNAPP (cloud-native app protection platform): Key steps to take on the path to deployment. (to the original material)
- How HTTP security headers can help harden web applications. (to the original material)
- How to develop your security team, even when you have no resources. (to the original material)
- What companies can do to lower cyber insurance costs. (to the original material)
- Australia Aims to Be World's 'Most Cyber-Secure' Country. (to the original material)
- Claroty CEO Yaniv Vardi on the Need to Guard Medical Devices. (to the original material)
- US Law Enforcement Arrests 4 for Business Email Compromise (BEC). (to the original material)
- ISMG Editors: How Will the Role of CISO Evolve in 2023? (to the original material)
- UK Government Rolls Out Security Guidance for Mobile Apps. (to the original material)
- Avoiding Roadblocks on the Path to Cybersecurity Maturity. (to the original material)
- Ransomware-Wielding Criminals Increasingly Hit Healthcare. (to the original material)
- A Plan to Address Future Healthcare Cyber Challenges. (to the original material)