Logo Cyber News

Logo Dorin M Wolf

 

- Apple releases security updates for multiple products. (to the original material)
 
- Weak security controls and practices routinely exploited for initial access. (to the original material)
 
- BLE (Bluetooth Low Energy) vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones. (to the original material)
 
- Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more! (to the original material)
 
- Mastering microsegmentation for enterprise applications. (to the original material)
 
- Cardiologist charged for use and sale of ransomware. (to the original material)
 
- Why cyber security can’t just say “no“. (to the original material)
 
- Emotet is the most common malware. (to the original material)
 
- Remote work hazards: Attackers exploit weak WiFi, endpoints, and the cloud. (to the original material)
 
- Best practices for healthcare delivery organizations to manage supply chain cybersecurity risks. (to the original material)
 
- North Korean devs pose as US freelancers and aid DRPK govt hackers. (to the original material)
 
- NVIDIA fixes ten vulnerabilities in Windows GPU display drivers. (to the original material)
 
- Microsoft Defender for Endpoint gets new troubleshooting mode. (to the original material)
 
- Cybersecurity agencies reveal top initial access attack vectors. (to the original material)
 
- Hackers can steal your Tesla Model 3, Y using new Bluetooth attack. (to the original material)
 
- What is ISO 27001 and why it matters for compliance standards. (to the original material)
 
- CISA warns admins to patch actively exploited Spring, Zyxel bugs. (to the original material)
 
- Hackers target Tatsu WordPress plugin in millions of attacks. (to the original material)
 
- Apple patches actively exploited macOS Big Sur bug. (to the original material)
 
- Apple's "Find My" feature created attack vector, researchers say. (to the original material)
 
- Here are the most commonly exploited controls, according to 5 different countries. (to the original material)
 
- Open Source Burnout: An opening to more security gaps? (to the original material)
 
- Resorting to force signals the failure of influence. (to the original material)
 
- CISA pledges half of federal agencies will have EDR (Endpoint Detection and Response) by end of fiscal year. (to the original material)
 
- North Koreans pose as citizens from other countries for IT jobs at US companies. (to the original material)
 
- Venezuelan cardiologist accused of operating and selling Thanos ransomware. (to the original material)
 
- Over 200 Apps on Play Store were distributing Facestealer info-stealer. (to the original material)
 
- CISA adds CVE-2022-30525 flaw in Zyxel Firewalls to its Known Exploited Vulnerabilities Catalog. (to the original material)
 
- A custom PowerShell RAT uses to target German users using Ukraine crisis as bait. (to the original material)
 
- Apple fixes the sixth zero-day since the beginning of 2022. (to the original material)
 
- Ransomware hits american healthcare company Omnicell. (to the original material)
 
- US government warns firms to avoid hiring North Korean IT workers. (to the original material)
 
- (ISC)2 Offers 100,000 free entry-level certification places. (to the original material)
 
- Fifth of businesses say cyber-attack nearly broke them. (to the original material)
 
- US and EU move closer on cyber in new trade pact. (to the original material)
 
- Doctor accused of being prolific ransomware developer. (to the original material)
 
- FBI: E-Tailers, beware web Injections for scraping credit-card data, backdoors. (to the original material)
 
- Google Cloud aims to share its vetted open source ecosystem. (to the original material)
 
- Google to launch repository service with security-tested versions of open-source software packages. (to the original material)
 
- EFF to Supreme Court: Put Texas social media law back on hold. (to the original material)
 
- Podcast Episode: An AI Hammer in search of a nail. (to the original material)
 
- Vulnerability Spotlight: Multiple memory corruption vulnerabilities in NVIDIA GPU driver. (to the original material)
 
- It’s time to put AI to work in security. (to the original material)
 
- Red Flags that your environment is ripe for a ransomware attack. (to the original material)
 
- IT pros feel the pressure to maintain organizations' security. (to the original material)
 
- Twitter Facebook LinkedIn Spy. (to the original material)
 
- 26 percent still not using strong and unique passwords for work applications. (to the original material)

 

Logo Dorin M Wolf

No comments