- Details
- Written by: Merticaru Dorin Nicolae
- Category: Cyber Security News
- Hits: 227
- CISA Releases Eight Industrial Control Systems Advisories. (to the original material)
- EFF to Fifth Circuit: The First Amendment Protects the Right to Make Jokes on Social Media. (to the original material)
- See What We Accomplished Together in EFF's 2021 Annual Report. (to the original material)
- WP-CLI: How to Install WordPress via SSH. (to the original material)
- It's time for better data protection: Why the 3-2-1 rule isn't enough. (to the original material)
- Cyberattacks cost enterprises $1,200 per employee per year. (to the original material)
- Microsoft is adding a handy VPN indicator to the Windows 11 taskbar. (to the original material)
- How to create a cyber immune system? (to the original material)
- Cyber risk focus areas for portfolio companies. (to the original material)
- 90% of organizations have Microsoft 365 security gaps. (to the original material)
- Donut extortion group also targets victims with ransomware. (to the original material)
- Hackers breach energy orgs via bugs in discontinued web server. (to the original material)
- Android file manager apps infect thousands with Sharkbot malware. (to the original material)
- AGs Urge Apple to Tighten Health Privacy, Security in Apps. (to the original material)
- Broadcom-VMware Merger Faces European Regulatory Hurdles. (to the original material)
- LockBit 3.0 Says It's Holding a Canadian City for Ransom. (to the original material)
- Authorized Payment Scams: Why Banks Are So Slow to Respond. (to the original material)
- Australian Children's Charity Breach Affects 80,000 Donors. (to the original material)
- Digital Army 2030: Modernizing Technology at Scale - Part 1. (to the original material)
- IT pros concerned of successful attacks on their organizations in next 12 months. (to the original material)
- Five ways security leaders can prepare for economic uncertainty. (to the original material)
- 5 API Vulnerabilities That Get Exploited by Criminals. (to the original material)
- Researcher warns that Cisco Secure Email Gateways can easily be circumvented. (to the original material)
- Aurora Stealer Malware is becoming a prominent threat in the cybercrime ecosystem. (to the original material)
- Two Estonian citizens arrested in $575M cryptocurrency fraud scheme. (to the original material)
- Emotet is back and delivers payloads like IcedID and Bumblebee. (to the original material)
- Security fatigue is real: Here’s how to overcome it. (to the original material)
- This Malware Installs Malicious Browser Extensions to Steal Users' Passwords and Cryptos. (to the original material)
- Researchers Warn of Cyber Criminals Using Go-based Aurora Stealer Malware. (to the original material)
- Here's How to Ensure Your Incident Response Strategy is Ready for Holiday Hackers. (to the original material)
- Luna Moth Gang Invests in Call Centers to Target Businesses with Callback Phishing Campaigns. (to the original material)
- U.S. Authorities Seize Domains Used in 'Pig butchering' Cryptocurrency Scams. (to the original material)
- Ducktail Hacker Group Evolves, Targets Facebook Business Accounts. (to the original material)
- US Takes Down Domains Used in 'Pig Butchering' Cryptocurrency Scheme. (to the original material)
- Firms Spend $1197 Per Employee Yearly to Address Cyber-Attacks. (to the original material)
- Estonian Duo Arrested for Masterminding $575m Ponzi Scheme. (to the original material)
- Experts Warn Threat Actors May Abuse Red Team Tool Nighthawk. (to the original material)
- Credential Stuffers Steal $300K from DraftKings Customers. (to the original material)
- Details
- Written by: Merticaru Dorin Nicolae
- Category: Cyber Security News
- Hits: 225
- Vulnerability Summary for the Week of November 14, 2022. (to the original material)
- EFF, Coalition of California Privacy Advocates Caution Against Weakening CA Privacy Rights. (to the original material)
- EFF Files Comments on the FTC’s Commercial Surveillance Rulemaking. (to the original material)
- VICTORY! Congress Sends the Safe Connections Act to the President’s Desk. (to the original material)
- Monetization, Not Human Rights or Vulnerable Communities, Matter Most at Twitter Under Musk. (to the original material)
- Documents Show DOJ’s Multi-Pronged Effort to Undermine Section 230. (to the original material)
- Rise of security champions: Application development's long-awaited evolution. (to the original material)
- How to choose the safest data center [Q&A]. (to the original material)
- Rules for safe online shopping. (to the original material)
- How AppSec will be shifted left. (to the original material)
- Threat predictions for 2023 from Barracuda’s security frontline. (to the original material)
- Google seeks to make Cobalt Strike useless to attackers. (to the original material)
- 5 free resources from the Cybersecurity and Infrastructure Security Agency (CISA). (to the original material)
- The pros and cons of using open-source Kubernetes security software. (to the original material)
- Two Estonians arrested for running $575M crypto Ponzi scheme. (to the original material)
- Aurora infostealer malware increasingly adopted by cybergangs. (to the original material)
- Attackers bypass Coinbase and MetaMask 2FA via TeamViewer, fake support chat. (to the original material)
- Hackers steal $300,000 in DraftKings credential stuffing attack. (to the original material)
- Google Chrome extension used to steal cryptocurrency, passwords. (to the original material)
- Google releases 165 YARA rules to detect Cobalt Strike attacks. (to the original material)
- Apps with over 3 million installs leak 'Admin' search API keys. (to the original material)
- RSA CEO Rohit Ghai on Authenticating Users to Mobile Devices. (to the original material)
- 5 Hospital Workers Charged with Selling Patient Information. (to the original material)
- Chinese APT Using Google Drive, Dropbox to Drop Malware. (to the original material)
- Central Depository Attack Delays Trade Settlement in India. (to the original material)
- Amazon to Shut Down Controversial Encrypted Messaging App. (to the original material)
- Covering Data Breaches in an Ethical Way. (to the original material)
- Callback phishing campaign targets legal and retail sectors. (to the original material)
- IT pros struggle to hire, train staff to implement multi-cloud architecture. (to the original material)
- How to tune out AppSec noise through DAST (Dynamic Application Security Testing). (to the original material)
- Why are CISOs resigning? (to the original material)
- Expert published PoC exploit code for macOS sandbox escape flaw. (to the original material)
- Google won a lawsuit against the Glupteba botnet operators. (to the original material)
- Google provides rules to detect tens of cracked versions of Cobalt Strike. (to the original material)
- Octocrypt, Alice, and AXLocker Ransomware, new threats in the wild. (to the original material)
- Daixin Ransomware Gang Steals 5 Million AirAsia Passengers' and Employees' Data. (to the original material)
- Notorious Emotet Malware Returns With High-Volume Malspam Campaign. (to the original material)
- Been Doing It The Same Way For Years? Think Again. (to the original material)
- Google Wins Lawsuit Against Russians Linked to Blockchain-based Glupteba Botnet. (to the original material)
- Google Identifies 34 Cracked Versions of Popular Cobalt Strike Hacking Toolkit in the Wild. (to the original material)
- Google Wins Legal Battle Against Glupteba Botnet. (to the original material)
- Thousands of Algolia API Keys Could Expose Users' Data. (to the original material)
- Luna Moth Phishing Extortion Campaign Targets Businesses in Multiple Sectors. (to the original material)
- Private Equity Exposed by Cyber-Hygiene Shortcomings. (to the original material)
- New AXLocker Ransomware Steals Victims' Discord Tokens. (to the original material)
- Ten Charged in $11m Healthcare BEC Plots. (to the original material)
- Details
- Written by: Merticaru Dorin Nicolae
- Category: Cyber Security News
- Hits: 192
- Week in review: 5 Kali Linux tools, Spotify’s Backstage vulnerability, Cybertech NYC 2022. (to the original material)
- New ransomware encrypts files, then steals your Discord account. (to the original material)
- Donald Trump returns to Twitter after Elon Musk's poll. (to the original material)
- Remote code execution found in cloud development toolkit Backstage. (to the original material)
- Security Affairs newsletter Round 394. (to the original material)
- PoC exploit code for ProxyNotShell Microsoft Exchange bugs released online. (to the original material)
- Details
- Written by: Merticaru Dorin Nicolae
- Category: Cyber Security News
- Hits: 206
- New attacks use Windows security bypass zero-day to drop malware. (to the original material)
- Simplifying cloud native security for posture management and AppSec. (to the original material)
- DEV-0569 group uses Google Ads to distribute Royal Ransomware. (to the original material)
- Black Friday and Cyber Monday, crooks are already at work. (to the original material)
- New improved versions of LodaRAT spotted in the wild. (to the original material)
- New attacks use Windows security bypass zero-day to drop malware. (to the original material)
- DOJ Charges 10 With BEC Targeting Federal Health Program. (to the original material)
- Cybersecurity Analysis of the FTX Crypto Heist: Part Two. (to the original material)
- Indian Government Publishes Draft of Digital Personal Data Protection Bill 2022. (to the original material)
- Microsoft Warns of Hackers Using Google Ads to Distribute Royal Ransomware. (to the original material)
- Chinese 'Mustang Panda' Hackers Actively Targeting Governments Worldwide. (to the original material)
- Atlassian Releases Patches for Critical Flaws Affecting Crowd and Bitbucket Products. (to the original material)
- Details
- Written by: Merticaru Dorin Nicolae
- Category: Cyber Security News
- Hits: 208
- Data security advice for supporters traveling to Qatar for the World Cup. (to the original material)
- Photos: Cybersecurity marketers gather at Cyber Marketing Con 2022. (to the original material)
- New infosec products of the week: November 18, 2022. (to the original material)
- ODD Platform: Open-source data discovery and observability. (to the original material)
- PCI SSC publishes new standard for mobile payment acceptance solutions. (to the original material)
- Transportation sector targeted by both ransomware and APTs. (to the original material)
- The Week in Ransomware - November 18th 2022 - Rising Operations. (to the original material)
- Exploit released for actively abused ProxyNotShell Exchange bug. (to the original material)
- Researchers secretly helped decrypt Zeppelin ransomware for 2 years. (to the original material)
- US charges BEC suspects with targeting federal health care programs. (to the original material)
- Chinese hackers use Google Drive to drop malware on govt networks. (to the original material)
- Google Search results poisoned with torrent sites via Data Studio. (to the original material)
- Atlassian fixes critical command injection bug in Bitbucket Server. (to the original material)
- PCI Releases New Payment Standards for Mobile Devices. (to the original material)
- ID Agent's Amelia Paro on Why Tech Alone Can't Protect Email. (to the original material)
- Piedmont CISO on Protecting Hospitals in the Age of COVID-19. (to the original material)
- Feds Alert Healthcare, Other Sectors of Growing Hive Threats. (to the original material)
- Ransomware-as-a-Service Market Now Highly Specialized. (to the original material)
- Ransomware: Did Law Enforcement Lose Ground Early On? (to the original material)
- Cybersecurity Analysis of the FTX Crypto Heist: Part 1. (to the original material)
- With FTX's Collapse, Cycle of Cryptocurrency Loss Continues. (to the original material)
- Emotet’s return underscores that some threat groups never go away for good. (to the original material)
- IT pros cite configuration controls, management as top weaknesses of cloud providers. (to the original material)
- AI and open-source intelligence can mitigate ransomware and cryptocurrency risks. (to the original material)
- Atlassian fixed 2 critical flaws in Crowd and Bitbucket products. (to the original material)
- Hive Ransomware extorted over $100M in ransom payments from over 1,300 companies. (to the original material)
- Ongoing supply chain attack targets Python developers with WASP Stealer. (to the original material)
- China-based Fangxiao group behind a long-running phishing campaign. (to the original material)
- Leaving Twitter's Walled Garden. (to the original material)
- Cybercriminals looking to score with World Cup scams. (to the original material)
- Mining still a serious threat to business. (to the original material)
- 5 cybersecurity hygiene best practices every MSP should follow. (to the original material)
- Latest insights on APT activity – Week in security with Tony Anscombe. (to the original material)
- Tor vs. VPN: Which should you choose? (to the original material)
- Meta Reportedly Fires Dozens of Employees for Hijacking Users' Facebook and Instagram Accounts. (to the original material)
- LodaRAT Malware Resurfaces with New Variants Employing Updated Functionalities. (to the original material)
- Threat hunting with MITRE ATT&CK and Wazuh. (to the original material)
- Hive Ransomware Attackers Extorted $100 Million from Over 1,300 Companies Worldwide. (to the original material)
- W4SP Stealer Constantly Targeting Python Developers in Ongoing Supply Chain Attack. (to the original material)
- CISA, NSA, ODNI Publish Software Supply Chain Guidelines For Customers. (to the original material)
- Shoppers Warned Stay Alert this Black Friday as Hackers Renew Efforts. (to the original material)
- Instagram Credential Phishing Attacks Bypass Microsoft Email Security. (to the original material)
- Emerging Threat Actor DEV-0569 Expands Its Toolkit to Deliver Royal Ransomware. (to the original material)
- Netflix Phishing Emails Surge 78%. (to the original material)
- Russian Duo Indicted Over E-Book Piracy. (to the original material)
- Hive Ransomware Has Made $100m to Date. (to the original material)