Logo Cyber News

Logo Dorin M Wolf

 

- Google releases security updates for Chrome. (to the original material)
 
- VMware releases security updates for Cloud Director. (to the original material)
 
- CISA adds nine known exploited vulnerabilities to Catalog. (to the original material)
 
- Critical Microsoft RPC runtime bug: No PoC exploit yet, but patch ASAP! (CVE-2022-26809). (to the original material)
 
- New infosec products of the week: April 15, 2022. (to the original material)
 
- Confessions of a CTO (Chief Technology Officers). (to the original material)
 
- Unmanaged and unsecured digital identities are driving rise in cybersecurity debt. (to the original material)
 
- Advance your penetration testing skills by mastering Kali Linux. (to the original material)
 
- Dark data is a pain point for many security leaders. (to the original material)
 
- Spanish FA report cyber attack to police after email accounts, private texts stolen. (to the original material)
 
- U.S. links North Korean hacker group to Axie Infinity crypto theft. (to the original material)
 
- GitHub: Attacker breached dozens of orgs using stolen OAuth tokens. (to the original material)
 
- The Week in Ransomware - April 15th 2022 - Encrypting Russia. (to the original material)
 
- T-Mobile customers warned of unblockable SMS phishing attacks. (to the original material)
 
- Cisco vulnerability lets hackers craft their own login credentials. (to the original material)
 
- CISA orders agencies to fix actively exploited VMware, Chrome bugs. (to the original material)
 
- Cryptocurrency DeFi platforms are now more targeted than ever. (to the original material)
 
- 'Mute' button in conferencing apps may not actually mute your mic. (to the original material)
 
- Karakurt revealed as data extortion arm of Conti cybercrime syndicate. (to the original material)
 
- Behavioral analytics and why it's important to threat detection and response [Q&A]. (to the original material)
 
- GitHub says hackers breached dozens of organizations using stolen OAuth Access Tokens. (to the original material)
 
- JekyllBot:5 flaws let attackers take control of Aethon TUG Hospital robots. (to the original material)
 
- Haskers gang gives away ZingoStealer malware to other cybercriminals for free. (to the original material)
 
- 3 Key components to raising the bar on digital acceleration. (to the original material)
 
- Tearing down red flags: Women in CyberSecurity’s Lynn Dohm on tackling the high exit rate of female infosec pros. (to the original material)
 
- Karakurt ensnares Conti, Diavol ransomware groups in its web. (to the original material)
 
- Cyber extortion group Karakurt linked to Conti and Diavol ransomware groups. (to the original material)
 
- Four strategies for protecting against a new breed of encrypted DDoS attacks. (to the original material)
 
- Scammers exploit chaos of tax season to take advantage of consumers, deploy trojans. (to the original material)
 
- 5 benefits Google Cloud Platform customers may get from the Mandiant acquisition. (to the original material)
 
- FDA on medical device security: ‘We’re not waiting for harm’ to act. (to the original material)
 
- Multiple lawsuits against SuperCare allege FTC, HIPAA violations in 2021 breach. (to the original material)
 
- Lazarus targets chemical sector with 'Dream Jobs,' then trojans. (to the original material)
 
- New malware tools pose 'clear and present threat' to ICS environments. (to the original material)
 
- Data scientists, watch out: Attackers have your number. (to the original material)
 
- Bitdefender enters native XDR (eXtended Detection and Response) market with new offering. (to the original material)
 
- Why you should patch the latest critical Windows RPC vulnerability right now. (to the original material)
 
- Let's encrypt wins Levchin Prize for work on internet security. (to the original material)
 
- Understanding SASE and Zero-Trust to strengthen security. (to the original material)
 
- Gov’t advisory warns of Pipedream malware aimed at ICS. (to the original material)
 
- Attack on Panasonic Canada shows Conti is still dangerous. (to the original material)
 
- Ransomcloud: Ransomware's latest manifestation targets the cloud. (to the original material)
 
- How to design an effective cybersecurity awareness training program for SMB employees. (to the original material)
 
- CVE-2022-22966: Critical VMware cloud director vulnerability. (to the original material)
 
- CVE-2022-1364 Chrome vulnerability exploited in the wild. (to the original material)
 
- Threat Roundup for April 8 to April 15. (to the original material)
 
- Threat actors use Zimbra exploits to target organizations in Ukraine. (to the original material)
 
- Conti Ransomware Gang claims responsibility for the Nordex hack. (to the original material)
 
- ZingoStealer crimeware released for free in the cybercrime ecosystem. (to the original material)
 
- Auth bypass flaw in Cisco Wireless LAN Controller Software allows device takeover. (to the original material)
 
- Google fixed third zero-day in Chrome since the start of 2022. (to the original material)
 
- Ways to develop a Cybersecurity Training Program for employees. (to the original material)
 
- Analysis of the SunnyDay ransomware. (to the original material)
 
- New Book: Security Awareness For Dummies. (to the original material)

 

Logo Dorin M Wolf

No comments