Logo Cyber News

Logo Dorin M Wolf

 

- CRI-O security update for Kubernetes. (to the original material)
 
- How enterprises responded to Log4Shell. (to the original material)
 
- History Of Hacking: Back to the future. (to the original material)
 
- 30% of Log4j instances still remain vulnerable, with open source apps a major hurdle. (to the original material)
 
- South Denver Cardiology cyberattack, data access impacts 287K patients. (to the original material)
 
- Arkansas AG sues hospital for leaving patient files unsecured after closing shop. (to the original material)
 
- Agencies ‘aware’ of hacking threats to US, allied satellite networks. (to the original material)
 
- Prioritizing ‘reachable’ vulnerabilities makes for faster, more secure code development. (to the original material)
 
- Workaround offered for unpatched HTML-to-PDF rendering vulnerability. (to the original material)
 
- Apple Safari empowers developers to mitigate web flaws with WebKit CSP enhancements. (to the original material)
 
- Agencies warn on satellite hacks & GPS jamming affecting airplanes, critical infrastructure. (to the original material)
 
- DarkHotel APT targets Wynn, Macao Hotels to rip off guest data. (to the original material)
 
- Sandworm APT hunts for ASUS routers with Cyclops Blink botnet. (to the original material)
 
- Google blows lid off Conti, Diavol ransomware access-broker ops. (to the original material)
 
- Defending the data center: The time to act is now. (to the original material)
 
- Week in security with Tony Anscombe. (to the original material)
 
- Threat Roundup for March 11 to March 18. (to the original material)
 
- 1 Million Texans potentially impacted by dental care data breach. (to the original material)
 
- Caketap, a new Unix rootkit used to siphon ATM banking data. (to the original material)
 
- South Africa credit bureau breached, data reportedly held for $15M ransom. (to the original material)
 
- Hackers hit Mass. background-check firm used by state agencies, universities. (to the original material)
 
- Hackers hit Hood. Dairy shut down milk production this week after ‘cyber security event’. (to the original material)
 
- Shooting the Whistleblower? Defamation Suit Claims Nuance Communications Gave False Info to FBI, SEC, Retaliated Against Whistleblower. (to the original material)
 
- The TTPs of Conti’s initial access broker. (to the original material)
 
- New infosec products of the week: March 18, 2022. (to the original material)
 
- Why EDR is not sufficient to protect your organization. (to the original material)
 
- How prepared are organizations to face a ransomware attack on Kubernetes? (to the original material)
 
- Top 5 myths businesses believe about bots. (to the original material)
 
- The problem with multiple cloud security tools: Alert fatigue and burnout. (to the original material)
 
- How to build and retain a strong IT team. (to the original material)
 
- The Week in Ransomware - March 18th, 2022 - Targeting the auto industry. (to the original material)
 
- Free decryptor released for TrickBot gang's Diavol ransomware. (to the original material)
 
- Hackers claim to breach TransUnion South Africa with 'Password' password. (to the original material)
 
- DarkHotel hacking campaign targets luxury Macao resorts. (to the original material)
 
- Google: Chinese state hackers target Ukraine’s government. (to the original material)
 
- Code-Sabotage incident in protest of Ukraine war exposed open source risks. (to the original material)
 
- Satellite networks worldwide are at risk of possible cyberattacks, FBI & CISA warn. (to the original material)
 
- Security teams struggle to get started with zero trust. (to the original material)
 
- MITRE and partners build insider threat knowledge base. (to the original material)
 
- Should the West build its own ‘Great Firewall’? (to the original material)
 
- Zero-Trust’s foundation is identity and access management. (to the original material)
 
- Fighting in Ukraine raises prospect of US cyberattacks. (to the original material)
 
- Ugandan writers charged with cyberstalking President. (to the original material)
 
- A Third of malicious logins originate in Nigeria. (to the original material)

 

Logo Dorin M Wolf

No comments