Logo Cyber News
Logo Dorin M Wolf
 
- Google releases security updates for Chrome. (to the original material)
 
- Natural disasters expose cyber weaknesses for financial firms. (to the original material)
 
- VMware releases security updates. (to the original material)
 
- How legitimate websites are used to spread ransomware. (to the original material)
 
- A walk through a Year of Website Security: Part II. (to the original material)
 
- Warning: Log4j still lurks where dependency analysis can't find it. (to the original material)
 
- "We all need to be better": Financial advisers confront flaws in their security posture. (to the original material)
 
- What value does Extend Detection and Response (XDR) bring to the cybersecurity market [Q&A]? (to the original material)
 
- How can SMBs extend their SecOps capabilities without adding headcount? (to the original material)
 
- The CISO's guide to third-party security management. (to the original material)
 
- SMBs should consider new approaches for increasing their cybersecurity posture. (to the original material)
 
- How companies manage data and AI initiatives. (to the original material)
 
- API security: Understanding the next top attack vector. (to the original material)
 
- Embedded hypervisor software market to reach $1.16 billion by 2026. (to the original material)
 
- 70 investors lose $50 million to fraudsters posing as broker-dealers. (to the original material)
 
- Microsoft Defender for Endpoint adds zero-touch iOS onboarding. (to the original material)
 
- NY OAG (New York State Office of the Attorney General): Hackers stole 1.1 million customer accounts from 17 companies. (to the original material)
 
- Crypto platform ARBIX flagged as a rugpull, transfers $10 million. (to the original material)
 
- iOS malware can fake iPhone shutdowns to snoop on camera, microphone. (to the original material)
 
- "Elephant Beetle" spends months in victim networks to divert transactions. (to the original material)
 
- Microsoft code-sign check bypassed to drop Zloader malware. (to the original material)
 
- WhiteSource automates remediation of Log4j vulnerabilities. (to the original material)
 
- Defending against modern ransomware tactics. (to the original material)
 
- McMenamins reports data breach. (to the original material)
 
- Kansas gets 17 critical cybersecurity recommendations. (to the original material)
 
- Morgan Stanley agrees to data breach settlement. (to the original material)
 
- Cybersecurity trends for 2022. (to the original material)
 
- AI progress in security is impressive enough without embellishment. (to the original material)

- Palo Alto Networks appoints CEO for EMEA and LATAM Regions. (to the original material)
 
- Info-stealing malware hits 100+ countries. (to the original material)
 
- UK's information commissioner starts new role amid major changes. (to the original material)
 
- FTC: Patch Log4j now or risk major fines. (to the original material)
 
- Duty-search redirect removal guide [free delete steps]. (to the original material)
 
- LIKEAHORSE ransomware virus [remove and restore data]. (to the original material)
 
- FormulaBuffer Mac adware removal [free uninstall steps]. (to the original material)
 
- DEHD virus ransomware [.dehd files] removal & decrypt guide. (to the original material)
 
- Using CASB to establish user access, control of critical assets. (to the original material)
 
- New Zloader Banking malware campaign exploiting Microsoft signature verification. (to the original material)
 
- How ransomware gangs went pro. (to the original material)
 
- The FreeRTOS vulnerability disaster. (to the original material)
 
- Importance of cybersecurity in military. (to the original material)
 
- A majority of Gen Z crypto investors think they will become millionaires, according to a new survey. (to the original material)
 
- Interesting cyber crime stories. (to the original material)
 
- IBM bosses wrongly sacked channel salesman after Tech Data joint venture failed, tribunal rules. (to the original material)
 
- Hauliers report problems with post-Brexit customs system but HMRC (Her Majesty's Revenue & Customs) insists it is "online and working as planned". (to the original material)
 
- Remember Norton 360's bundled cryptominer? Irritated folk realizes Ethereum crafter is tricky to delete. (to the original material)
 
- Microsoft pushes ahead adapting Azure for 5G telecoms after swallowing AT&T's Network cloud. (to the original material)
 
- You better have patched those Log4j holes or we'll see what a judge has to say - FTC. (to the original material)
 
- 5 ways hackers steal passwords (and how to stop them). (to the original material)
 
Top 10 bad cybersecurity habits to shed in 2022. (to the original material)

 

Logo Dorin M Wolf

No thoughts on “News from Cyber Security (05.01.2022)”