Logo Cyber News
Logo Dorin M Wolf
 
CISA adds five known exploited vulnerabilities to Catalog. (to the original material)
 
Over 300,000 users downloaded malware droppers from Google Play. (to the original material)
 
- The ripple effect: Why protection against supply chain attacks is a must. (to the original material)
 
- Despite the popularity of password managers, many still use pen and paper. (to the original material)
 
Control failures are behind a growing number of cybersecurity incidents. (to the original material)
 
Alarming rise in cyberattacks against healthcare facilities, 68 attacks in the third quarter of 2021 only. (to the original material)
 
How can businesses realize the true value of digital transformation? (to the original material)
 
InfoSec products of the month: November 2021. (to the original material)
 
Microsoft Exchange servers were hacked to deploy BlackByte ransomware. (to the original material)
 
Europol: 18,000 money mules caught laundering money from online fraud. (to the original material)
 
- VirusTotal collection feature helps keep neat IoC (Indicator of Compromise) lists. (to the original material)
 
State-backed hackers increasingly use RTF (Rich Text Format) injection for phishing. (to the original material)
 
Malicious Android app steals Malaysian bank credentials and MFA codes. (to the original material)
 
Mozilla fixes critical bugs in the cross-platform cryptography library. (to the original material)
 
- Twitter to remove the images of people posted without the consent of the subject in private media. (to the original material)
 
Organizations now have 76 security tools to manage. (to the original material)
 
- HP printer hijack bugs impact 150 models. (to the original material)
 
Head of MI6: Digital attack surface growing "exponentially". (to the original material)
 
Vulnerabilities Spotlight: Use-after-free conditions in Google Chrome could lead to code execution. (to the original material)
 
- Jumping the air gap: 15 years of nation-state effort. (to the original material)
 
Planned Parenthood LA discloses data breach after ransomware attack. (to the original material)
 
Emotet now spreads via Adobe Windows app installer fake packages. (to the original material)
 
- Former Ubiquiti developer charged with trying to extort his employer. (to the original material)
 
The founder of Bulletproof Hosting imprisoned for helping cybercrime gangs. (to the original material)
 
WordPress Admin Creator – A simple but effective attack. (to the original material)
 
PrivSec Global: Why the Council of Europe's police surveillance treaty is a pernicious influence on Latam legal privacy frameworks. (to the original material)
 
- Facebook's secret "Dangerous Organizations and Individuals" list creates problems for the company - and its users. (to the original material)
 
- The Internet needs fair rules of the road - and competitive drivers. (to the original material)
 
AI/ML powered automation: The future of cybersecurity at scale. (to the original material)
 
- How to proactively remove file-based malware. (to the original material)
 
- Improving cybersecurity with MITRE ATT&CK framework. (to the original material)

 

Logo Dorin M Wolf

No comments