Logo Cyber News
Logo Dorin M Wolf
 
- CISA Insights: Foreign influence operations targeting critical infrastructure. (to the original material)
 
- NCSC-NZ releases advisory on cyber threats related to Russia-Ukraine tensions. (to the original material)
 
- CISA compiles free cybersecurity services and tools for network defenders. (to the original material)
 
- This Week in Security News - February 18, 2022. (to the original material)
 
- New infosec products of the week: February 18, 2022. (to the original material)
 
- Ransomware’s savage reign continues as attacks increase 105%. (to the original material)
 
- Even when warned, businesses ignore critical vulnerabilities and hope for the best. (to the original material)
 
- Software supply chain security is still a pain point. (to the original material)
 
- Is higher security a benefit of database migration to the cloud? (to the original material)
 
- How hackers could use popular virtual reality headsets to steal sensitive information. (to the original material)
 
- The Week in Ransomware - February 18th, 2022 - Mergers & Acquisitions. (to the original material)
 
- White House pins Ukraine DDoS attacks on Russian GRU hackers. (to the original material)
 
- New Golang botnet empties Windows users’ cryptocurrency wallets. (to the original material)
 
- Iranian hackers target VMware Horizon servers with Log4j exploits. (to the original material)
 
- FCC proposes $45 million fine for health insurance robocaller. (to the original material)
 
- WordPress force installs UpdraftPlus patch on 3 million sites. (to the original material)
 
- Conti ransomware gang takes over TrickBot malware operation. (to the original material)
 
- Warning: Popular e-cigarette store hacked to steal credit cards. (to the original material)
 
- Google Drive flags macOS '.DS_Store' files for copyright violation. (to the original material)
 
- Ukraine DDoS: 'Cyberattack' or not? (to the original material)
 
- Darktrace artificial intelligence stops cyberattack at Italian electronics distributor. (to the original material)
 
- Dangerous privilege escalation bugs found in Linux package manager Snap. (to the original material)
 
- Why IT admins are joining the security team. (to the original material)
 
- How to create a digital workplace governance program. (to the original material)
 
- Poor offboarding leaves organizations open to threats. (to the original material)
 
- Probation for medicare fraudster. (to the original material)
 
- US goes after crypto criminals. (to the original material)
 
- Carpet bombing attacks are on the rise. (to the original material)
 
- UK Government consults on plans to restrict Huawei’s involvement in telecoms networks. (to the original material)
 
- Diversifying Cyber: A focus on neurodiversity and physical disability. (to the original material)
 
- Criminal cryptocurrency transactions will drop by 30% by 2024 - Here's why. (to the original material)
 
- Trickbot targets 140,000 victims in 14 months. (to the original material)
 
- High severity WordPress plugin (UpDraft Plus) bug hits three million. (to the original material)
 
- FlexBooker data leak impacts millions of end customers. (to the original material)
 
- NFT Security and Risks: How secure are your digital assets? (to the original material)
 
- Multiple vulnerabilities in Adobe Commerce and Magento could allow for remote code execution. (to the original material)
 
- New WordPress plugin leaks millions of personal information; an immediate update is suggested. (to the original material)
 
- Master decryption keys released for multiple ransomware. (to the original material)
 
- Updated Trickbot now targets technology and financial firms. (to the original material)
 
- U.S. Cybersecurity Agency publishes a list of free security tools and services. (to the original material)
 
- Critical flaw uncovered in WordPress backup plugin used by over 3 million sites. (to the original material)
 
- Microsoft warns of 'Ice Phishing' threat on Web3 and decentralized networks. (to the original material)
 
- PseudoManuscrypt malware spreading the same way as CryptBot targets Koreans. (to the original material)
 
- New Linux privilege escalation flaw uncovered in Snap Package Manager. (to the original material)
 
- Linux Snap package tool fixes make-me-root bugs. (to the original material)
 
- CISA publishes the list of free security tools for business protection. (to the original material)
 
- Adobe warns of a second critical security hole in Adobe Commerce, Magento. (to the original material)
 
- Microsoft offers defense against 'ice phishing' crypto scammers. (to the original material)
 
- Taiwan cracks down on China spying on tech firms. (to the original material)
 
- Social Engineering. (to the original material)
 
- Open-Source vs. Closed-Source Software. (to the original material)
 
- How biometrics are rapidly improving the Construction Sector? (to the original material)
 
- Top Hacking Techniques. (to the original material)
 
- NSA provides guidance on Cisco device passwords. (to the original material)
 
- VMware NSX Data Center flaw can expose virtual systems to attacks. (to the original material)
 
- Lawyers say ‘unprecedented’ secrecy deprived EncroChat defendants of fair trials. (to the original material)
 
- UK organizations untroubled by Trickbot surge. (to the original material)
 
- Threat Roundup for February 11 to February 18. (to the original material)
 
- The cyber security challenges facing global retailers. (to the original material)
 
- Week in security with Tony Anscombe. (to the original material)
 
- Data Breach Trends: Global count of known victims increases. (to the original material)
 
- First National cryptocurrency enforcement team director named. (to the original material)
 
- Cisco's Email Security Appliances at risk of DoS Attacks. (to the original material)
 
- Massive bot attack generates 400 million requests in 4 days. (to the original material)
 
- ISMG Editors: Ransomware Trends - The Bad and the Ugly. (to the original material)
 
- Academics publish methods for recovering data encrypted by the Hive ransomware. (to the original material)
 
- Mexican man pleads guilty to brokering sale of surveillance devices, WhatsApp hacking tools. (to the original material)
 
- Thanks, dad: Jammer used to stop kids going online, wipes out a town's internet by mistake. (to the original material)
 
- Ukraine cyberattack 2022: Geopolitical cybersecurity. (to the original material)
 
- Iranian state broadcaster clobbered by ‘Clumsy, Buggy’ code. (to the original material)
 
- Red Cross servers ‘were hacked via unpatched ManageEngine flaw’. (to the original material)
 
- Critical vulnerabilities in Zabbix Web Frontend allow authentication bypass, code execution on servers. (to the original material)
 
- Officials: Russia likely cause of cyberattacks on Ukraine, but ‘no specific credible threats to the US homeland’. (to the original material)
 
- HHS outlines threats to electronic health and medical records, remediation guidance. (to the original material)
 
- Former OCR Director on access rights, HIPAA enforcement: ‘It’s not about gotcha’. (to the original material)
 
- NIST wants public input on updates to Cybersecurity Framework, supply chain security. (to the original material)
 
- Banking customers are overwhelmed by fraud but trust their financial institutions. (to the original material)
 
- Attackers abuse poorly regulated top-level domains in ongoing redirect campaigns. (to the original material)
 
- Why cybersecurity professionals burn out. (to the original material)
 
- How to protect against QuickBooks scammers. (to the original material)
 
- Not everyone in medicine is a doctor; Not everyone in cybersecurity is a coder. (to the original material)

 

Logo Dorin M Wolf

No comments