Logo Cyber News

Logo Dorin M Wolf

 

- Google releases security updates for Chrome. (to the original material)
 
- Microsoft releases May 2022 security updates. (to the original material)
 
- CISA adds one known exploited vulnerability to Catalog. (to the original material)
 
- CISA joins partners to release advisory on protecting MSPs and their customers. (to the original material)
 
- Vulnerability summary for the Week of May 2, 2022. (to the original material)
 
- Researchers uncover URL spoofing flaws on Zoom, Box, Google Docs. (to the original material)
 
- An offensive mindset is crucial for effective cyber defense. (to the original material)
 
- Ransomware works fast, you need to be faster to counter it. (to the original material)
 
- Google Drive emerges as top app for malware downloads. (to the original material)
 
- Is that health app safe to use? A new framework aims to provide an answer. (to the original material)
 
- Download guide: Evaluating third-party security platforms. (to the original material)
 
- Password reuse is rampant among Fortune 1000 employees. (to the original material)
 
- US charges hacker for breaching brokerage accounts, securities fraud. (to the original material)
 
- HP fixes bug letting attackers overwrite firmware in over 200 models. (to the original material)
 
- New stealthy Nerbian RAT malware spotted in ongoing attacks. (to the original material)
 
- CISA tells federal agencies to fix actively exploited F5 BIG-IP bug. (to the original material)
 
- Our medical devices' open source problem – What are the risks? (to the original material)
 
- FBI, CISA, and NSA warn of hackers increasingly targeting MSPs. (to the original material)
 
- Bitter cyberspies target South Asian govts with new malware. (to the original material)
 
- New IceApple exploit toolset deployed on Microsoft Exchange servers. (to the original material)
 
- Intel memory firmware bug hits hundreds of products. (to the original material)
 
- Active Directory defaults lead to no-fix PrivEsc vulnerability. (to the original material)
 
- MSPs, customers targeted by malicious cyber actors, intelligence alliance warns. (to the original material)
 
- Novel ‘Nerbian RAT’ uses OS-agnostic Go programming language to spread across platforms. (to the original material)
 
- Ivanti, Lookout partner to create cloud-based ‘Everywhere Workplace’. (to the original material)
 
- Why security teams should look for SaaS options from their 5G communications service providers. (to the original material)
 
- Nine principles of zero-trust in hardware. (to the original material)
 
- Financial firms need new tactics to get out of their ‘compromising’ position. (to the original material)
 
- Tech group pushes back against SEC cyber rules, warns of reporting overload. (to the original material)
 
- Prominent IT security group recommends SEC reconsider proposed incident reporting rules. (to the original material)
 
- Intel announces confidential computing-as-a-service ‘Project Amber’. (to the original material)
 
- CISA adds CVE-2022-1388 flaw in F5 BIG-IP to its Known Exploited Vulnerabilities Catalog. (to the original material)
 
- Microsoft Patch Tuesday updates for May 2022 fixes 3 zero-days, 1 under active attack. (to the original material)
 
- EU condemns Russian cyber operations against Ukraine. (to the original material)
 
- Microsoft fixed RCE flaw in a driver used by Azure Synapse and Data Factory. (to the original material)
 
- British man charged with hacking US Bank computers, stealing millions. (to the original material)
 
- Why relying on AI for automated detection and response is dangerous. (to the original material)
 
- Five Eyes Nations issue new supply chain security advisory. (to the original material)
 
- Celebrating a new era for Infosecurity Europe and cyber house party. (to the original material)
 
- NCSC's free email security check spots domain issues. (to the original material)
 
- Microsoft: Ransomware relies on the Gig economy. (to the original material)
 
- Microsoft simplifies security patching process for Exchange Server. (to the original material)
 
- NSA warns managed service providers are now prime targets for cyberattacks. (to the original material)
 
- Top 6 security threats targeting remote workers. (to the original material)
 
- Cyber-Espionage attack drops post-exploit malware framework on Microsoft Exchange Servers. (to the original material)
 
- Vanity URLs could be spoofed for social engineering attacks. (to the original material)
 
- Novel Nerbian RAT lurks behind faked COVID safety emails. (to the original material)
 
- What to Patch Now: Actively exploited Windows zero-day threatens domain controllers. (to the original material)
 
- US pledges to help Ukraine keep the internet and lights on. (to the original material)
 
- Stealthy Linux implant BPFdoor compromised organizations globally for years. (to the original material)
 
- The EU Commission’s new proposal would undermine encryption and scan our messages. (to the original material)
 
- EFF to Court: Fair use is a right Congress cannot cast aside. (to the original material)
 
- How to disable Ad ID tracking on iOS and Android, and why you should do it now. (to the original material)
 
- Rising Google searches for procedures suggest recovering demand, analysts say. (to the original material)
 
- How to delete yourself from internet search results and hide your identity online. (to the original material)
 
- Cybersecurity has a desperate skills crisis. Rural America could have the answer. (to the original material)
 
- US, allies blame Russia for Viasat cyberattack. (to the original material)
 
- The next level of surveillance: Real-Time AI detection of emotions in video streams. (to the original material)
 

Logo Dorin M Wolf

No comments