Logo Cyber News
Logo Dorin M Wolf
 
- CISA publishes infographic on layering network security through segmentation. (to the original material)
 
- Vulnerability summary for the Week of January 17, 2022. (to the original material)
 
- A 2022 priority: Automated mobile application security testing. (to the original material)
 
- Fraud detection is great, but you also need prevention. (to the original material)
 
- COVID test related scam emails still highly popular among cybercriminals. (to the original material)
 
- Spike in brand abuse attacks, 3-D Secure transaction volume rising. (to the original material)
 
- What is challenging multicloud adoption? (to the original material)
 
- Digital transformation leaders reaping the fruits of their investments. (to the original material)
 
- IoT data management market to grow steadily by 2026. (to the original material)
 
- Researchers find way to bypass MFA of Box Accounts. (to the original material)
 
- White Rabbit may be FIN8 Group's New Pet. (to the original material)
 
- China-based Earth Lusca Group targeting multiple industries. (to the original material)
 
- Global renewable energy firms under cyberespionage attacks. (to the original material)
 
- New DDoS IRC bot spreads through Korean WebHard. (to the original material)
 
- Researchers break down WhisperGate wiper malware used in Ukraine website defacement. (to the original material)
 
- Microsoft: Now we're switching off Excel 4.0 macros by default. (to the original material)
 
- Investigating APT36 or Earth Karkaddan’s attack chain and malware arsenal. (to the original material)
 
- Analysis and impact of LockBit ransomware’s first Linux and VMware ESXi variant. (to the original material)
 
- China accused of hijacking Australia Prime Minister Scott Morrison's WeChat account. (to the original material)
 
- Hackers hijack smart contracts in cryptocurrency token "rug pull" exit scams. (to the original material)
 
- Attackers now actively targeting critical SonicWall RCE bug. (to the original material)
 
- Tor Project appeals Russian court's decision to block access to Tor. (to the original material)
 
- CWP (Control Web Panel) bugs allow code execution as root on Linux servers, patch now. (to the original material)
 
- Android malware BRATA wipes your device after stealing data. (to the original material)
 
- Hackers say they encrypted Belarusian Railway servers in protest. (to the original material)
 
- Ransomware gangs increase efforts to enlist insiders for attacks. (to the original material)
 
- Malicious PowerPoint files used to push remote access trojans. (to the original material)
 
- Dark Souls servers taken down to prevent hacks using critical bug. (to the original material)
 
- See No Evil, Hear No Evil: The Use of deepfakes in social engineering attacks. (to the original material)
 
- WordPress Supply Chain Attack - 93 Add-Ons infected for Months. (to the original material)
 
- API Security, Ransomware Top 2022 Threats. (to the original material)
 
- Predict 2022: Top Cybersecurity Threats for 2022. (to the original material)
 
- IRS to require new ID verification. (to the original material)
 
- SBA Announces $3m Cybersecurity Program. (to the original material)
 
- 3 Reasons why DDoS protection fails. (to the original material)
 
- Identity Theft will get worse. (to the original material)
 
- NSF (National Science Foundation) awards $29m to cybersecurity scholarships. (to the original material)
 
- Two in five IT Security Managers considering quitting their jobs. (to the original material)
 
- #DataPrivacyWeek: The best kept secrets about data privacy. (to the original material)
 
- #HowTo: Evaluate your cyber insurance. (to the original material)
 
- Interview: Leveraging the talents of older workers in cyber. (to the original material)
 
- US Data breaches surge 68% to all-time high. (to the original material)
 
- US adds 17 exploited bugs to "Must Patch" List. (to the original material)
 
- UK's Privacy Tsar mounts fierce defense of End-to-End Encryption. (to the original material)
 
- Linux Servers at risk of RCE due to critical CWP bugs. (to the original material)
 
- Unusual "Donald Trump" packer malware delivers RATs, infostealers. (to the original material)
 
- Dark Souls 3 servers shut down due to critical RCE bug. (to the original material)
 
- F5 fixes high-risk NGINX Controller vulnerability in January patch rollout. (to the original material)
 
- RCE bug chain patched in CentOS Web Panel. (to the original material)
 
- OpenSubtitles data breach: Users asked to re-secure accounts after plaintext password snafu. (to the original material)
 
- Chain of vulnerabilities led to RCE on Cisco Prime servers. (to the original material)
 
- New solution helps guarantee electronic documents. (to the original material)
 
- What the UK's revised security guidelines mean for business [Q&A]. (to the original material)
 
- Mobile Banking Trojan BRATA gains new, dangerous capabilities. (to the original material)
 
- Hackers using new malware packer DTPacker to avoid analysis, detection. (to the original material)
 
- ZTNAs address requirements VPNs cannot. Here's why. (to the original material)
 
- How I hacked my friend’s PayPal account. (to the original material)
 
- Alleged RCE Vulnerability in Dark Souls III under investigation. (to the original material)
 
- FBI warns of cybercriminals using QR codes to steal funds. (to the original material)
 
- Microsoft finds SolarWinds vulnerability amid Log4j search. (to the original material)
 
- NY fines vision benefits firm (EyeMed Vision Care LLC) $600,000 for 2020 breach. (to the original material)
 
- Tor Project battles Russian censorship through the courts. (to the original material)
 
- Everything you need to know about Web Application Firewalls. (to the original material)
 
- Russia makes more arrests, but cybercrime-harboring reputation hard to shake. (to the original material)
 
- Feds want bulk electric systems to monitor network security. (to the original material)
 
- RIPTA under fire: Why would a public transit authority have healthcare data? (to the original material)
 
- Cybersecurity: 11 steps to take as threat levels increase. (to the original material)

 

Logo Dorin M Wolf

No comments