- Vulnerability Summary for the Week of May 16, 2022. (to the original material)
- The UK is considering the legality of defensive cyber attacks. (to the original material)
- CISA adds 20 known exploited vulnerabilities to Catalog. (to the original material)
- What does prioritizing cybersecurity at the leadership level entail? (to the original material)
- Vishing cases reach all time high. (to the original material)
- Taking the right approach to data extortion. (to the original material)
- Account pre-hijacking attacks possible on many online services. (to the original material)
- RansomHouse: Bug bounty hunters gone rogue? (to the original material)
- Paying the ransom is not a good recovery strategy. (to the original material)
- How confident are CISOs about their security posture? (to the original material)
- Quad countries to boost CERT cooperation. (to the original material)
- Clearview AI fined £7.5 million by UK privacy watchdog. (to the original material)
- Multiple governments buying android zero-days for spying: Google. (to the original material)
- Malicious Python Repository Package drops Cobalt Strike on Windows, macOS & Linux Systems. (to the original material)
- Podcast Episode: Securing the Vote. (to the original material)
- Credit card stealer targets PsiGate Payment Gateway Software. (to the original material)
- Two-thirds of data breaches at UK legal firms caused by insiders. (to the original material)
- Zola Wedding App ‘Hacked’ - Victims lose BIG money. (to the original material)
- Next-Generation authorization for advanced access controls. (to the original material)
- Windows 11 KB5014019 update fixes app crashes, slow copying. (to the original material)
- DuckDuckGo browser allows Microsoft trackers due to search agreement. (to the original material)
- Mozilla fixes Firefox, Thunderbird zero-days exploited at Pwn2Own. (to the original material)
- Hackers target Russian govt with fake Windows updates pushing RATs. (to the original material)
- Microsoft: Credit card stealers are getting much stealthier. (to the original material)
- CISA adds 41 vulnerabilities to list of bugs used in cyberattacks. (to the original material)
- US Senate: Govt’s ransomware fight hindered by limited reporting. (to the original material)
- Screencastify Chrome extension flaws allow webcam hijacks. (to the original material)
- Trend Micro fixes bug Chinese hackers exploited for espionage. (to the original material)
- Researchers to release exploit for new VMware auth bypass, patch now. (to the original material)
- Popular Python and PHP libraries hijacked to steal AWS keys. (to the original material)
- Chaos ransomware builder linked to Onyx and Yashma variants. (to the original material)
- How security leaders can influence without authority. (to the original material)
- Why security teams need to automate DevSecOps for SAP. (to the original material)
- Web app attacks on the rise in healthcare as insider challenges remain. (to the original material)
- IBM expands free cybersecurity expert service for schools. (to the original material)
- Trend Micro addressed a flaw exploited by China-linked Moshen Dragon APT. (to the original material)
- Microsoft warns of new highly evasive web skimming campaigns. (to the original material)
- Nation-state malware could become a commodity on dark web soon, Interpol warns. (to the original material)
- Senate Report: US Government lacks comprehensive data on ransomware. (to the original material)
- Ransomware attacks increasing at "Alarming" rate. (to the original material)
- What does Zero Trust mean for MSPs (Managed Service Providers)? (to the original material)
- Cabinet Office reports 800 missing electronic devices in three years. (to the original material)
- US car giant General Motors hit by cyber-attack exposing car Owners' personal info. (to the original material)
- ICO fines Clearview AI £7.5m for collecting UK citizens’ data. (to the original material)
- Israeli Ministry illegally shared biometric images of millions with unknown agency. (to the original material)
- Bayonne Police Sergeant charged with unauthorized use of law enforcement database. (to the original material)
- Fake Windows exploits target infosec community with Cobalt Strike. (to the original material)
- Open source packages with millions of installs hacked to harvest AWS credentials. (to the original material)
- FTC Blog: “The FTC Act creates a de facto breach disclosure requirement”. (to the original material)
- K-12 school districts in New Mexico, Ohio crippled by cyberattacks. (to the original material)
- The truth about China’s Uyghur camps Beijing is trying to hide: Hacked data reveals thousands of prisoners forced to undergo ‘re-education’… with a shoot-to-kill policy for anyone who tries to flee. (to the original material)
- 3 Health data hacks affect 1.4 million individuals. (to the original material)