Logo Cyber News
Logo Dorin M Wolf
 
- CISA adds two known exploited vulnerabilities to catalog. (to the original material)
 
Immediate steps to strengthen critical infrastructure against potential cyberattacks. (to the original material)
 
Wave of "sextortion" attacks by email in Romania. Users were fooled that they were filmed in intimate poses. (to the original material)
 
Joint Statement on Log4Shell. (to the original material)
 
Password offenders: Who's the naughtiest of them all? (to the original material)
 
Passwordless verification API transforms every mobile phone into a security token for zero-trust access. (to the original material)
 
How healthcare providers handle safeguards to protect payment and PII (Personal Identifiable Information). (to the original material)
 
Why do data professionals invest in data governance programs? (to the original material)
 
Foundational cloud security with CIS Benchmarks. (to the original material)
 
The cyber risk future doesn't look good, but organizations are ready. (to the original material)
 
Log4Shell: A new fix, details of active attacks, and risk mitigation recommendations. (to the original material)
 
The state of Virginia reeling from ransomware. (to the original material)
 
FBI recovers Oregonians' stolen data. (to the original material)
 
DHS launches Bug Bounty program. (to the original material)
 
Grindr (dating app) was fined 6.5 million euros for selling user data without explicit consent. (to the original material)
 
UK's new cyber strategy, designed to boost position as "global cyber power". (to the original material)
 
Web App attacks surge 251% in two years. (to the original material)
 
Government experts in last-minute seasonal scam warning. (to the original material)
 
Log4j bug gets the Microsoft patch alongside 67 vulnerabilities and 6 zero days. (to the original material)
 
5 signs that your identity has been stolen. (to the original material)
 
- HHS (Department of Health Human Services): Majority health systems faced cyberattacks in the last 18 months. (to the original material)
 
- Study: Medical AI diagnosis models can be manipulated to output wrong diagnosis. (to the original material)
 
- French police detain a suspect who laundered 19 million euros in ransomware payments. (to the original material)
 
- The FBI believes the HelloKitty ransomware gang operates out of Ukraine. (to the original material)
 
- Malicious Exchange Server module hoovers up Outlook credentials. (to the original material)
 
- Facebook Meta targets user information and database scraping in bug bounty expansion. (to the original material)
 
- Ransomware in 2022: We're all screwed. (to the original material)
 
- Volatile and adaptable: Tracking the movements of modern ransomware. (to the original material)
 
- More new malicious files discovered in 2021 than ever before. (to the original material)
 
- EU's Digital identity Framework endangers browser security. (to the original material)
 
- Apple's Android App to scan for Airtag is necessary step forward, but more anti-stalking mitigations are needed. (to the original material)
 
- YouTube's new copyright transparency report leaves a lot out. (to the original material)
 
- Build successful data security evaluation criteria with help from your peers. (to the original material)
 
- How to determine if your network security is working. (to the original material)

 

Logo Dorin M Wolf

No comments