Logo Cyber News

Logo Dorin M Wolf

 

- Romania has adopted a law prohibiting the purchase and use, by public authorities, of cyber security software products and services from the Russian Federation. (to the original material)
 
- CISA Adds One Known Exploited Vulnerability to Catalog. (to the original material)
 
- Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities. (to the original material)
 
- Signed Microsoft Drivers Used in Attacks Against Businesses. (to the original material)
 
- AgentTesla Remains Most Prolific Malware in November, Emotet and Qbot Grow. (to the original material)
 
- Apple Fixes Actively Exploited iPhone Zero-Day Vulnerability. (to the original material)
 
- New Google Tool Helps Devs Root Out Open Source Bugs. (to the original material)
 
- Loan Fee Fraud Surges by a Fifth as Christmas Approaches. (to the original material)
 
- Two Zero-Days Fixed in December Patch Tuesday. (to the original material)
 
- GoTrim botnet actively brute forces WordPress and OpenCart sites. (to the original material)
 
- December 2022 Patch Tuesday fixed 2 zero-day flaws. (to the original material)
 
- Apple fixed the tenth actively exploited zero-day this year. (to the original material)
 
- 3.5m IP cameras exposed, with US in the lead. (to the original material)
 
- VMware fixed critical VM Escape bug demonstrated at Geekpwn hacking contest. (to the original material)
 
- Citrix and NSA urge admins to fix actively exploited zero-day in Citrix ADC and Gateway. (to the original material)
 
- EFF Agrees With the NLRB (National Labor Relations Board): Workers Need Protection Against Bossware. (to the original material)
 
- Digital Rights Updates with EFFector 34.6. (to the original material)
 
- Stellar Cyber integrates with Deep Instinct’s deep learning technology. (to the original material)
 
- Microsoft blocks threat actors that obtained signed drivers to deploy ransomware. (to the original material)
 
- CloudBolt says survey of IT leaders show a need for greater maturity, security in cloud environments. (to the original material)
 
- Netskope to offer Cloud Exchange platform as a managed service. (to the original material)
 
- Scanning assets in the cloud: Challenges and improvements to make. (to the original material)
 
- Counter insider risks by taking security out to the edge. (to the original material)
 
- Hacker Reportedly Breaches US FBI Cybersecurity Forum. (to the original material)
 
- Dental Practice Hit With HIPAA Fine for Posting PHI on Yelp. (to the original material)
 
- Microsoft Patches Zero-Day Magniber Ransomware Hackers Used. (to the original material)
 
- How Criminals Extort Healthcare Victims With Ransomware. (to the original material)
 
- Zero Trust: How to Know What Your Crown Jewels Are. (to the original material)
 
- Palo Alto CEO: 'SIEM (Security Intelligence and Extended Management) Needs to Be Eliminated and Replaced'. (to the original material)
 
- Nikesh Arora on Palo Alto's Approach to Supply Chain Defense. (to the original material)
 
- Assessing Cyber Risk, Maturity in Healthcare M&As. (to the original material)
 
- Combating Ransomware Attacks: Which Strategies Hold Promise? (to the original material)
 
- OSV-Scanner: A free vulnerability scanner for open-source software. (to the original material)
 
- Nosey Parker: Find sensitive information in textual data and Git history. (to the original material)
 
- What CISOs consider when building up security resilience. (to the original material)
 
- FBI seized domains linked to 48 DDoS-for-hire service platforms. (to the original material)
 
- Attackers use SVG files to smuggle QBot malware onto Windows systems. (to the original material)
 
- Microsoft patches Windows zero-day used to drop ransomware. (to the original material)
 
- VMware fixes critical ESXi and vRealize security flaws. (to the original material)
 
- NSA shares tips on mitigating 5G network slicing threats. (to the original material)
 
- The Dark Web is Getting Darker - Ransomware Thrives on Illegal Markets. (to the original material)
 
- Open-source repositories flooded by 144,000 phishing packages. (to the original material)

 

Logo Dorin M Wolf

No comments