Logo Cyber News
Logo Dorin M Wolf
 
- Cyber teams from across the globe to compete in the 1st International Cybersecurity Challenge. (to the original material)
 
- Adobe releases security updates for multiple products. (to the original material)
 
- Citrix releases security updates for Hypervisor. (to the original material)
 
- Microsoft Releases February 2022 Security Updates. (to the original material)
 
- Mozilla releases security updates for Firefox and Firefox ESR. (to the original material)
 
- Critical vulnerabilities affecting SAP applications employing Internet Communication Manager (ICM). (to the original material)
 
- A “light” February 2022 Patch Tuesday that should not be ignored. (to the original material)
 
- Disaster recovery is critical for business continuity. (to the original material)
 
- Why cybersecurity and anti-fraud teams need to collaborate. (to the original material)
 
- 3 key elements of a strong cybersecurity program. (to the original material)
 
- Highly Evasive Adaptive Threats (HEAT) bypassing traditional security defenses. (to the original material)
 
- Enterprise data safety during the Great Resignation. (to the original material)
 
- Researchers propose a new method for quantum computing in trapped ions. (to the original material)
 
- Identity theft protection services market to surpass $24B by 2032. (to the original material)
 
- Microsoft to block downloaded VBA macros in Office - you may be able to run 'em anyway. (to the original material)
 
- School District CISO quits over handling of the data breach. (to the original material)
 
- Home8 security suffers an outage, blames AWS for the problem. (to the original material)
 
- Labour reminds UK.gov that it's supposed to be reforming the Computer Misuse Act. (to the original material)
 
- UK.gov threatens to make adults give credit card details for access to Facebook or TikTok (age verification). (to the original material)
 
- Canadian Netwalker ransomware crook pleads guilty to million-dollar crimes. (to the original material)
 
- The rise of the "super malicious" insider. (to the original material)
 
- Firms step up testing to find and fix software security flaws. (to the original material)
 
- Microsoft will disable Office VBA macros by default to block malware. (to the original material)
 
- Working from home leads to increased "digital anxiety". (to the original material)
 
- Google fixes remote escalation of privileges bug on Android. (to the original material)
 
- Kimsuki hackers use commodity RATs with custom Gold Dragon malware. (to the original material)
 
- Microsoft February 2022 Patch Tuesday fixes 48 flaws, 1 zero-day. (to the original material)
 
- US seizes $3.6 billion stolen in 2016 Bitfinex crypto exchange hack. (to the original material)
 
- Mozilla fixes Firefox bug letting you get Windows admin privileges. (to the original material)
 
- ExpressVPN offers $100,000 to the first person who hacks its servers. (to the original material)
 
- Vodafone Portugal 4G and 5G services down after cyberattack. (to the original material)
 
- NetWalker ransomware affiliate sentenced to 80 months in prison. (to the original material)
 
- Google sees 50% security boost for 150M users after 2FA enrollment. (to the original material)
 
- Qbot needs only 30 minutes to steal your credentials, emails. (to the original material)
 
- Google Cloud adds agentless threat detection to virtual machine workloads. (to the original material)
 
- 4 alternatives to encryption backdoors, but no silver bullet. (to the original material)
 
- Microsoft Patch Tuesday for Feb. 2022 - Snort rules and prominent vulnerabilities. (to the original material)
 
- List Of Fortune 500 Chief Information Security Officers. (to the original material)
 
- How SASE works to connect network, security, and cloud. (to the original material)
 
- Could healthcare serve as a model for adoption of software bill of materials? (to the original material)
 
- Senate Homeland leaders package trio of cyber bills tied to incident reporting, cloud, and oversight. (to the original material)
 
- Apache head: No programming tool would have caught Log4j bug. (to the original material)
 
- Hands-on learning knocks two months off fixing broken code. (to the original material)
 
- Zero-day vulnerabilities in Nooie baby monitors could allow video feed hijack. (to the original material)
 
- UK anti-encryption drive meets fierce resistance from privacy, security advocates. (to the original material)

- Pay to play PrivateLoader spreads Smokeloader, Redline, Vidar malware. (to the original material)
 
- Chinese telecom Hytera was charged for allegedly recruiting Motorola employees to steal trade secrets. (to the original material)
 
- Cyberattack brings down Vodafone Portugal mobile, voice, and TV services. (to the original material)
 
- How a Texas hack changed the ransomware business forever. (to the original material)
 
- DoJ seizes $3.6 billion from 2016 Bitfinex hack, arrests New York couple. (to the original material)
 
- US: Your AI has to explain its decisions. (to the original material)
 
- Security experts discuss Log4j mitigation before US Senate. (to the original material)
 
- How fraudsters changed their synthetic fraud tactics. (to the original material)
 
- Chinese APT targeting German enterprises. (to the original material)
 
- Update: Amid IRS' pullback, ID.me offers an alternative solution. (to the original material)
 
- Preparing the entire workforce for devastating cyberattacks. (to the original material)
 
- Russia continues cybercrime offensive with SkyFraud takedown. (to the original material)
 
- DoJ recovers $3.6B from 2016 Bitfinex hack. (to the original material)
 
- The Complete Guide to choosing a career. (to the original material)
 
- Palestine-aligned hackers use new NimbleMamba implant in recent attacks. (to the original material)
 
- Several malware families using the Pay-Per-Install service to expand their targets. (to the original material)

 

Logo Dorin M Wolf

No comments