Logo Cyber News

Logo Dorin M Wolf

 

- NSW gov struggles to find its 'cyber army'. (to the original material)
 
- Uber faces $26m penalty for misleading Australian users. (to the original material)
 
- Google's VirusTotal service vulnerable for over eight months. (to the original material)
 
- Iranian hacking group among those exploiting recently disclosed VMWare RCE flaw. (to the original material)
 
- North Korean state actors deploying novel malware to spy on journalists. (to the original material)
 
- French Hospitals cut internet connection after data raid. (to the original material)
 
- Bored Ape Yacht Club customers lose $3m in NFT scam. (to the original material)
 
- MFA: A simple solution to protect your identity. (to the original material)
 
- Do you need cyber asset attack surface management (CAASM - Cyber Asset Attack Surface Management)? (to the original material)
 
- Download: CISO’s guide to choosing an automated security questionnaire platform. (to the original material)
 
- Principles for Kubernetes security and good hygiene. (to the original material)
 
- Manage and monitor third-party identities to protect your organization. (to the original material)
 
- Shadow IT is a top concern related to SaaS adoption. (to the original material)
 
- Fraudsters answer security questions better than customers. (to the original material)
 
- Disavowed: Chrome plans to deprecate ‘document.domain’ lays the groundwork for shift in browser security. (to the original material)
 
- Bug bounty platform Intigriti offers new hourly payment option for vulnerability researchers. (to the original material)
 
- US offers $10 million reward for tips on Russian Sandworm hackers. (to the original material)
 
- Emotet malware now installs via PowerShell in Windows shortcut files. (to the original material)
 
- American Dental Association hit by new Black Basta ransomware. (to the original material)
 
- Coca-Cola investigates hackers' claims of breach and data theft. (to the original material)
 
- Google Play Store now forces apps to disclose what data is collected. (to the original material)
 
- Public interest in Log4Shell fades but attack surface remains. (to the original material)
 
- David Colombo on Tesla Hacks and Growing into Hacking. (to the original material)
 
- Hackers exploit critical VMware RCE flaw to install backdoors. (to the original material)
 
- US offers $10 million for information on Russians involved in NotPetya attacks. (to the original material)
 
- Is Emotet trojan testing new email attack tactics using OneDrive URLs? (to the original material)
 
- Embrace the five fundamentals of cloud security. (to the original material)
 
- Should government help manage cybersecurity for small businesses? (to the original material)
 
- Breach update shows 2.6M individuals affected by Smile Brands data theft. (to the original material)
 
- Tenet Health investigating cybersecurity incident, IT outage. (to the original material)
 
- Iran-linked APT Rocket Kitten exploited VMware bug in recent attacks. (to the original material)
 
- CISA adds new Microsoft, Linux, and Jenkins flaws to its Known Exploited Vulnerabilities Catalog. (to the original material)
 
- Stormous ransomware gang claims to have hacked Coca-Cola. (to the original material)
 
- North Korea-linked APT37 targets journalists with GOLDBACKDOOR. (to the original material)
 
- Anomaly Six, a US surveillance firm that tracks roughly 3 billion devices in real-time. (to the original material)
 
- Inside a ransomware incident: How a single mistake left a door open for attackers. (to the original material)
 
- EFF to European Court: No intermediary liability for social media users. (to the original material)
 
- What low-income people will lose with a Deadlocked FCC. (to the original material)
 
- DSA Agreement: No Filternet, but human rights concerns remain. (to the original material)
 
- Quarterly Report: Incident Response trends in Q1 2022. (to the original material)
 
- The trouble with BEC: How to stop the costliest internet scam. (to the original material)
 
- Vulnerability Roundup – April 2022. (to the original material)
 
- Learning Machine learning part 2: Attacking White Box models. (to the original material)
 
- US disrupted Russian GRU’s Hydra and Sandworm. (to the original material)

 

Logo Dorin M Wolf

No comments