
- Vulnerability Summary for the Week of January 10, 2022. (to the original material)
- Flubot - A malware for Android that steals sensitive information is propagated by SMS to Romanian users. (to the original material)
- Ukraine: Wiper malware masquerading as ransomware hits government organizations. (to the original material)
- AI to bring massive benefits, but also cause great concern. (to the original material)
- IR (Incident Response) and SimEx (Simulated Exercises): Can and should they be standardized? (to the original material)
- SecOps teams are understaffed and overworked. (to the original material)
- Why is intergenerational collaboration critical in advancing zero trust security progress? (to the original material)
- The CISO’s guide to evaluating third-party security platforms. (to the original material)
- Many users don’t know how to protect their broadband Wi-Fi routers. (to the original material)
- Mobile device management market to reach $20.4 billion by 2026. (to the original material)
- Campaign uses public cloud to spread RAT payloads. (to the original material)
- Fhkf virus (ransomware) remove & decrypt .fhkf files. (to the original material)
- Dark Web's largest marketplace for stolen credit cards is shutting down. (to the original material)
- A structured response to the Log4j vulnerability. (to the original material)
- Microsoft: Edge will mitigate "unforeseen active" zero-day bugs. (to the original material)
- Firefox Relay gets added to disposable email blocklist, which angers users. (to the original material)
- Zoho plugs another critical security hole in Desktop Central. (to the original material)
- DHL dethrones Microsoft as the most imitated brand in phishing attacks. (to the original material)
- Nintendo warns of spoofed sites pushing fake Switch discounts. (to the original material)
- Cyber espionage campaign targets renewable energy companies. (to the original material)
- Safari bug leaks your Google account info, browsing history. (to the original material)
- "Russian" Wiper Malware: "Prelude to war" in Ukraine. (to the original material)
- Using Zero-Trust to secure dissolving network boundaries. (to the original material)
- Linux Foundation, Red Hat join Supply Chain Security Summit. (to the original material)
- Smart City development Is pushing video surveillance to the cloud. (to the original material)
- EHR vendor faces legal action over data breach. (to the original material)
- Nova Scotia seeks to improve Cyber-Bullying Law. (to the original material)
- Accellion reaches $8.1m data breach settlement. (to the original material)
- Tackling the cyber skills shortfall: A multipronged approach. (to the original material)
- Mitigating cloud security's greatest risk: Exposure. (to the original material)
- #HowTo: Quickly evaluate a SaaS vendor’s cloud security. (to the original material)
- Former Inspector General pleads guilty to software theft. (to the original material)
- Social media in the workplace: Cybersecurity dos and don’ts for employees. (to the original material)
- Celebrate the Month of "Digital Cleaning" by following these six simple steps. (to the original material)
- Understanding Website SQL Injections. (to the original material)