Logo Cyber News

Logo Dorin M Wolf

 

- UK Privacy Regulator Names and Shames Breached Firms. (to the original material)
 
- Ukraine's Delta Military Intel System Hit by Attacks. (to the original material)
 
- UAC-0142 APT targets Ukraine’s Delta military intelligence program. (to the original material)
 
- Russia-linked Gamaredon APT targeted a petroleum refining company in a NATO nation in August. (to the original material)
 
- Microsoft shares details for a Gatekeeper Bypass bug in Apple macOS. (to the original material)
 
- Malicious PyPI package posed as SentinelOne SDK to serve info-stealing malware. (to the original material)
 
- Here's How Apple Could Open Its App Store Without Really Opening Its App Store. (to the original material)
 
- User Generated Content and the Fediverse: A Legal Primer. (to the original material)
 
- VICTORY! There Is No Link Tax in the End-of-Year Bills. (to the original material)
 
- We Need to Talk About Infrastructure. (to the original material)
 
- VIP impersonation attack on a Microsoft Office 365 environment targets 100,000 mailboxes. (to the original material)
 
- Threat actors find way to abuse the AWS Elastic IP Transfer feature. (to the original material)
 
- Four principles employers can follow while monitoring employees. (to the original material)
 
- EU-US Data Privacy Framework in Activist's Crosshairs. (to the original material)
 
- Sysdig CEO on How Open Source Fuels Cloud, Container Defense. (to the original material)
 
- Russian Hackers Targeted Oil Refinery Firm in NATO Country. (to the original material)
 
- Risk-Based Security: What to Look for in an MDR Provider. (to the original material)
 
- The Troublemaker CISO: Laziness, Failure, Great Expectations. (to the original material)
 
- What Brands Get Wrong About Customer Authentication. (to the original material)
 
- Hack on a Services Firm's Vendor Affects 271,000 Patients. (to the original material)
 
- Protecting Your Brand With Public Web Data Scraping. (to the original material)
 
- Companies overwhelmed by available tech solutions. (to the original material)
 
- Connected homes are expanding, so is attack volume. (to the original material)
 
- Ransomware gang uses new Microsoft Exchange exploit to breach servers. (to the original material)
 
- VirusTotal cheat sheet makes it easy to search for specific results. (to the original material)
 
- Microsoft will turn off Exchange Online basic auth in January. (to the original material)
 
- Google Ad fraud campaign used adult content to make millions. (to the original material)
 
- Hackers bombard PyPi platform with information-stealing malware. (to the original material)
 
- Raspberry Robin worm drops fake malware to confuse researchers. (to the original material)

 

Logo Dorin M Wolf

No comments