Logo Cyber News

Logo Dorin M Wolf

 

- Vulnerability Summary for the Week of February 21, 2022. (to the original material)
 
- Broadcom Software discloses APT actors deploying Daxin malware in a global espionage campaigns. (to the original material)
 
- Press release: National Cyber ​​Security Directorate (DNSC) calls on users to be vigilant about the sources of information they access online. (to the original material)
 
- Building cyber-secure Railway Infrastructure. (to the original material)
 
- Ukrainian researcher leaks Conti ransomware gang data. (to the original material)
 
- Take a dev-centric approach to cloud-native AppSec testing. (to the original material)
 
- Leveraging mobile networks to threaten national security. (to the original material)
 
- Cybercrime getting more destructive, remote workers are in the crosshairs. (to the original material)
 
- How prepared are organizations to face email-based ransomware attacks? (to the original material)
 
- Authorization is bridging the gap between security and IAM (Identity and Access Management). (to the original material)
 
- CISA and FBI warn of potential data wiping attacks spillover. (to the original material)
 
- Chinese cyber spies target govts with their ‘most advanced’ backdoor. (to the original material)
 
- Hackers to NVIDIA: Remove mining cap or we leak hardware data. (to the original material)
 
- Ukraine says its 'IT Army' has taken down key Russian sites. (to the original material)
 
- Insurance giant AON was hit by a cyberattack over the weekend. (to the original material)
 
- Toyota halts production after a reported cyberattack on the supplier. (to the original material)
 
- Meta: Ukrainian officials, the military targeted by Ghostwriter hackers. (to the original material)
 
- Axis Communications shares details on disruptive cyberattacks. (to the original material)
 
- Microsoft: Ukraine hit with new FoxBlade malware hours before the invasion. (to the original material)
 
- Phishing attack in Ukraine could be a prelude to a disinformation campaign. (to the original material)
 
- Researchers warn of stealthy Chinese backdoor targeting multiple foreign agencies. (to the original material)
 
- Companies borrow attack techniques to watermark machine learning models. (to the original material)
 
- How to boost shift-left security in the SDLC (Software Development Life Cycle). (to the original material)
 
- Wiper malware targets Ukraine as military conflict extends into cyberspace. (to the original material)
 
- Look beyond external threats to insider threats. (to the original material)
 
- CISA, FBI advise vigilance as Ukraine conflict continues. (to the original material)
 
- How to improve signal-to-noise ratio to reduce alert fatigue. (to the original material)
 
- The H4unt3d hacker on Ukraine crisis and cybersecurity. (to the original material)
 
- Cyber insurers key to combating ransomware. (to the original material)
 
- How Biden’s national security Memo bolsters US cybersecurity. (to the original material)
 
- US indicts BitConnect founder. (to the original material)
 
- Moscow Exchange was downed by a cyber-attack. (to the original material)
 
- #MWC2022: Creating trust and safety during the new technology revolution. (to the original material)
 
- #MWC2022: The Metaverse – "We've gone from scrolling to strolling". (to the original material)
 
- Russian TV stations hacked. (to the original material)
 
- Dissecting the UK’s new IoT security Bill. (to the original material)
 
- Rationalizing security awareness training. (to the original material)
 
- #HowTo: Solve the UK's shortage of cybersecurity experts. (to the original material)
 
- Conti group suffers a massive data breach. (to the original material)
 
- Nvidia appears to brush off a ransomware attacks. (to the original material)
 
- Meta squeezes Russian state-controlled media platforms. (to the original material)
 
- SockDetour fileless backdoor targets U.S.-based defense contractors. (to the original material)
 
- DeadBolt ransomware eyeing ASUSTOR devices. (to the original material)
 
- UNC2596 deploys Cuba ransomware via Microsoft Exchange Server vulnerabilities. (to the original material)
 
- Electron bot leverages Microsoft App Store to pierce social media accounts. (to the original material)
 
- Defense contractors under attack using new SockDetour backdoor. (to the original material)
 
- Toyota halts operations at all Japan plants due to cyberattack. (to the original material)
 
- CISA adds a recently disclosed Zimbra bug to its Exploited Vulnerabilities Catalog. (to the original material)
 
- 100 million Samsung Galaxy phones were affected by flawed hardware encryption features. (to the original material)
 
- CISA warns of high-severity flaws in Schneider and GE Digital's SCADA software. (to the original material)
 
- Reborn of Emotet: New features of the Botnet and how to detect it. (to the original material)
 
- Experts create Apple AirTag clone that can bypass anti-tracking measures. (to the original material)
 
- Quarter of a million lawyer disciplinary records leak. (to the original material)
 
- Conti ransomware gang leak: 60,000 messages online. (to the original material)
 
- Tech world's Ukraine response mixes evacuation efforts, ad bans, free phones, infosec FUD. (to the original material)
 
- Beware of scams that exploit people's desire to contribute to charities for Ukraine. (to the original material)
 
- #ShieldsUp – Now is the time to double‑check cybersecurity processes and operations. (to the original material)
 
- How to protect Magento websites. (to the original material)

 

Logo Dorin M Wolf

No comments