Logo Cyber News

Logo Dorin M Wolf

 

- CISA adds two known exploited vulnerabilities to Catalog. (to the original material)
 
- Apache releases security advisory for Tomcat. (to the original material)
 
- Vulnerability Summary for the Week of May 9, 2022. (to the original material)
 
- EU’s NIS 2 Directive to strengthen cybersecurity requirements for companies. (to the original material)
 
- The most insecure and easily hackable passwords. (to the original material)
 
- Recovering from a cybersecurity earthquake: The lessons organizations must learn. (to the original material)
 
- 79% of organizations have activated a disaster recovery response within the past 12 months. (to the original material)
 
- Where do federal agencies stand with zero trust implementation? (to the original material)
 
- EU governments, lawmakers agree on tougher cyber security rules for key sectors. (to the original material)
 
- Eternity Project: You can pay $260 for a stealer and $490 for a ransomware. (to the original material)
 
- May 08 – May 14 Ukraine – Russia the silent cyber conflict. (to the original material)
 
- UK sets out nuclear cybersecurity strategy. (to the original material)
 
- Over 20,000 Zyxel firewalls still exposed to critical bug. (to the original material)
 
- Ukraine supporters in Germany targeted with PowerShell RAT malware. (to the original material)
 
- CISA warns not to install May Windows updates on domain controllers. (to the original material)
 
- Kali Linux 2022.2 released with 10 new tools, WSL improvements, and more. (to the original material)
 
- Engineering firm Parker discloses data breach after ransomware attack. (to the original material)
 
- HTML attachments remain popular among phishing actors in 2022. (to the original material)
 
- Third-party web trackers log what you type before submitting. (to the original material)
 
- US links Thanos and Jigsaw ransomware to 55-year-old doctor. (to the original material)
 
- Apple emergency update fixes zero-day used to hack Macs, Watches. (to the original material)
 
- OneTrust launches Ethics and Compliance Cloud to foster ethical work culture. (to the original material)
 
- US-EU expand access to cybersecurity tools for small businesses. (to the original material)
 
- Beware the ‘Industrial Spy’ within. (to the original material)
 
- Experts show how to run malware on chips of a turned-off iPhone. (to the original material)
 
- Ukrainian national sentenced to 4 years in prison for selling access to hacked servers. (to the original material)
 
- US manufacturing giant Parker hit by Conti ransomware gang. (to the original material)
 
- Microsoft identifies botnet variant targeting Windows and Linux systems. (to the original material)
 
- 'The People Hacker' Jenny Radcliffe inducted into Infosecurity Europe's Hall of Fame. (to the original material)
 
- Italian Police foil pro-Russia attacks on Eurovision. (to the original material)
 
- Open Source security gets $30M boost from industry heavy hitters. (to the original material)
 
- Critical Zyxel Firewall bug under active attack after PoC (Proof-of-Concept) exploit debut. (to the original material)
 
- US Cyber Director: Forging a cybersecurity social contract is not optional. (to the original material)
 
- British citizen Alaa Abd El Fattah demands an end to mistreatment in Egyptian prison. (to the original material)
 
- EFF, Al Sur launch Guide to raise awareness about deficiencies in cross-border surveillance Treaty and strategies to mitigate human rights risks. (to the original material)
 
- Ransomware: How executives should prepare given the current threat landscape. (to the original material)
 
- The downside of ‘debugging’ ransomware. (to the original material)
 
- Do you want secure supply chains? Show me the money. (to the original material)
 
- Privacy as enabling technology. (to the original material)
 
- CISA, Int’l cybersecurity bodies issue advisory to MSPs. (to the original material)

 

Logo Dorin M Wolf

No comments