Logo Cyber News

Logo Dorin M Wolf

 

- Cybersecurity news of the week (15.09.2022). (to the original material)
 
- CISA Releases Eleven Industrial Control Systems Advisories. (to the original material)
 
- CISA Adds Six Known Exploited Vulnerabilities to Catalog. (to the original material)
 
- CISA and NSA Publish Open Radio Access Network Security Considerations. (to the original material)
 
- US government software suppliers must attest their solutions are secure. (to the original material)
 
- Linux variant of the SideWalk backdoor discovered. (to the original material)
 
- Q-Day doesn’t equal doomsday: Enacting an enterprise quantum security strategy. (to the original material)
 
- SMBs are hardest-hit by ransomware. (to the original material)
 
- Backlogs larger than 100K+ vulnerabilities but too time-consuming to address. (to the original material)
 
- Hackers trojanize PuTTY SSH client to backdoor media company. (to the original material)
 
- Hive ransomware claims cyberattack on Bell Canada subsidiary. (to the original material)
 
- Akamai stopped new record-breaking DDoS attack in Europe. (to the original material)
 
- Microsoft Edge’s News Feed ads abused for tech support scams. (to the original material)
 
- New malware bundle self-spreads through YouTube gaming videos. (to the original material)
 
- Zoom outage left users unable to sign in or join meetings. (to the original material)
 
- Russian hackers use new info stealer malware against Ukrainian orgs. (to the original material)
 
- Webworm hackers modify old malware in new attacks to evade attribution. (to the original material)
 
- FBI: Hackers steal millions from healthcare payment processors. (to the original material)
 
- CISA Plans Grants, Info-Sharing for Small OT Security Shops. (to the original material)
 
- Senators Seek HIPAA Changes to Protect Reproductive Info. (to the original material)
 
- Texas Hospital Still Struggling Through Ransomware Attack. (to the original material)
 
- Pentagon Backs Call for Internet Routing Security Fixes. (to the original material)
 
- EO (Executive Order) Stresses Cybersec, Data Protection in Foreign Deal Review. (to the original material)
 
- Chinese State Hackers Unleash Linux Backdoor. (to the original material)
 
- Sound Off: How Is SoftPOS Changing the Payments Landscape? (to the original material)
 
- OWASP Top 10: A Real-World Retrospective. (to the original material)
 
- Analyzing Twitter's Security Nightmare. (to the original material)
 
- Vulnerability allows access to credentials in Microsoft Teams. (to the original material)
 
- Policymakers eye incentives to fund better OT cybersecurity. (to the original material)
 
- FBI: Active cyberattacks on healthcare payment processors ‘cost victims millions in losses’. (to the original material)
 
- Financial executives say fraud more pervasive than previously thought. (to the original material)
 
- Senators want HHS to bolster privacy protections after abortion ruling. (to the original material)
 
- Akamai mitigated a new record-breaking DDoS attack against a Europe customer. (to the original material)
 
- Experts warn of self-spreading malware targeting gamers looking for cheats on YouTube. (to the original material)
 
- Russia-linked Gamaredon APT target Ukraine with a new info-stealer. (to the original material)
 
- FBI: Millions in Losses resulted from attacks against Healthcare payment processors. (to the original material)
 
- Crooks are using lures related to Her Majesty Queen Elizabeth II in phishing attacks. (to the original material)
 
- The mobile malware landscape in 2022 – Of Spyware, Zero-Click attacks, Smishing and Store Security. (to the original material)
 
- Apple fixes vulnerabilities in iOS devices and Mac computers. (to the original material)
 
- Nearly a third of security teams lack a management platform for IT secrets. (to the original material)
 
- Decentralized identity: What it is, why it matters. (to the original material)
 
- Telltale signs of a network compromise: A step-by-step analysis. (to the original material)
 
- How to transform the security model for continuous improvement and better outcomes. (to the original material)
 
- Threat Source newsletter (Sept. 15, 2022) — Teachers have to be IT admins now, too. (to the original material)
 
- Gamaredon APT targets Ukrainian government agencies in new campaign. (to the original material)
 
- Third‑party cookies: How they work and how to stop them from tracking you across the web. (to the original material)
 
- SparklingGoblin deploys new Linux backdoor – Week in security, special edition. (to the original material)
 
- Cyber hygiene: Stacking the odds against attackers. (to the original material)
 
- Magento Supply Chain Attack Targets Extension Developer FishPig. (to the original material)
 
- Where did that game cheats video on your YouTube channel come from? (to the original material)

 

Logo Dorin M Wolf

No comments