- Users Worldwide Said "Stop Scanning Us": 2022 in Review. (to the original material)
- The State of Online Free Expression Worldwide: 2022 in Review. (to the original material)
- RansomBoggs: a new ransomware targeting Ukraine. (to the original material)
- 2022 in review: 10 of the year’s biggest cyberattacks. (to the original material)
- Uncovering the link between PrivateLoader PPI service and RisePro stealer. (to the original material)
- DPRK (Democratic People’s Republic of Korea) hackers steal NFTs using phishing websites. (to the original material)
- We repel up to 10 Russian cyberattacks daily, Ukraine says. (to the original material)
- Privacy-minded DuckDuckGo engine will now block Google Sign-in pop-ups. (to the original material)
- BlueNoroff APT Hackers Using New Ways to Bypass Windows MotW Protection. (to the original material)
- Cloud security gaps linger through 2022 post pandemic. (to the original material)
- Zero trust confusion delays implementation in 2022. (to the original material)
- Five ways to leverage technology to improve the lives of security analysts. (to the original material)
- US Department of Justice Reportedly Investigates FTX Hack. (to the original material)
- Ohio Supreme Court Says Ransomware Is Not Physical Damage. (to the original material)
- Expert Gives Another Reason to Fear the Phish: Smart AI Bots. (to the original material)
- Financial Services Was Among Most-Breached Sectors in 2022. (to the original material)
- Hackers Steal Power Utility Customer Data. (to the original material)
- How to Reduce Clinician Friction in a Zero Trust Approach. (to the original material)
- BTC.com lost $3 million worth of cryptocurrency in cyberattack. (to the original material)
- Hackers steal $8 million from users running trojanized BitKeep apps. (to the original material)
- EarSpy attack eavesdrops on Android phones via motion sensors. (to the original material)
- Enterprises waste money on identity tools they don’t use. (to the original material)
- Modern technology and cyber recovery will intersect in the next generation of attacks. (to the original material)