Logo Cyber News
Logo Dorin M Wolf
 
- Vulnerability summary for the week of January 3, 2022. (to the original material)
 
- CISA adds 15 known exploited vulnerabilities to the catalog. (to the original material)
 
- WordPress 5.8.3. security update fixes SQL injection, XSS flaws. (to the original material)
 
- Endpoint security products failing against targeted attacks. (to the original material)
 
- Finding & Fixing Google Blocklist warnings. (to the original material)
 
- CISA sees low level of Log4j exploitation against agencies and critical infrastructure. (to the original material)
 
- Who's to blame for the Kronos payroll disruptions, post cyberattack? (to the original material)
 
- Scrap the operating system in the name of infosec? MIT researchers want you to try it out. (to the original material)
 
- The blame game: EU criticized for "fragmented and slow" approach to cyber-attack attribution. (to the original material)
 
- City of Grass Valley, California, suffers data breach - employee and citizen information exposed. (to the original material)
 
- Report: DDoS attacks increasing year on year as cybercriminals demand extortionate payouts. (to the original material)
 
- URL parsing bugs allow DoS, RCE, spoofing, and more. (to the original material)
 
- Cyber-spike: Orgs suffer 925 attacks per week, an all-time high. (to the original material)
 
- Uncovering and defending systems against attacks with layers of remote control. (to the original material)
 
- Ransomware Tracker: The latest figures (December 2021). (to the original material)
 
- Mainframe DevOps: What modernization means. (to the original material)
 
- Log4j updates: Flaw challenges global security leaders. (to the original material)
 
- Ransomware's threat to the mainframe. (to the original material)
 
- HHS warns the healthcare sector of Pysa ransomware threats. (to the original material)
 
- CISA: Federal response to Log4j has been "Exceptional". (to the original material)
 
- QNAP tells users to take immediate action to stop ransomware. (to the original material)
 
- How China's algorithm regulation affects businesses. (to the original material)
 
- Criminaysis: Cryptocurrency crime reaches an all-time high. (to the original material)
 
- Vulnerability Spotlight: Buffer overflow vulnerability in AnyCubic Chitubox plugin. (to the original material)
 
- Europol ordered to delete data not tied to investigations. (to the original material)
 

- Europol was ordered to erase data on those not linked to the crime. (to the original material)

- Linux Mint 20.3 released promising security updates until 2025. (to the original material)

- Microsoft: powerdir bug gives access to protected macOS user data. (to the original material)

- Oops: Cyberspies infect themselves with their own malware. (to the original material)

- Linux version of AvosLocker ransomware targets VMware ESXi servers. (to the original material)

- Extortion DDoS attacks grow stronger and more common. (to the original material)

- FinalSite: No school data stolen in ransomware attack behind sire outages. (to the original material)

- Unified communications market size to reach $344.84 billion by 2028. (to the original material)

- 6 cloud security trends to watch for 2022. (to the original material)

- On-premises cloud: The worst of both worlds? (to the original material)

- Eight resolutions to help navigate the new hybrid office model (to the original material)

- What to expect in 2022 privacy-wise? (to the original material)

- Detect and identify IoT malware by analyzing electromagnetic signals. (to the original material)

- Securing onboarding and offboarding in the cloud. (to the original material)

- Abcbot botnet linked to operators of Xanthe crypto-mining malware. (to the original material)

- Forensics expert kept murder snaps on PC. (to the original material)
 
- Connecticut nerds report CSAM. (to the original material)
 
- Cyber-Thieves raid Grass Valley. (to the original material)
 
- Why politically motivated cyber-attacks are a threat to democracy. (to the original material)
 
- Over half of SMEs have experienced a cybersecurity breach. (to the original material)
 
- Howto: Automate your security processes. (to the original material)
 
- US issues warning over commercial spyware. (to the original material)
 
- FlexBooker reveals a major customer data breach. (to the original material)

 

Logo Dorin M Wolf

No comments