Logo Cyber News
Logo Dorin M Wolf
 
- Canada's foreign affairs ministry hacked, some services down. (to the original material)
 
- The Ransomware Files, Episode 4: Maersk and NotPetya. (to the original material)
 
- EU launches bug bounty programs for five open source solutions. (to the original material)
 
- Beware of fake tax apps pushing malware. (to the original material)
 
- 53% of medical devices have a known critical vulnerability. (to the original material)
 
- Why organizations should consider adopting cloud governance as code. (to the original material)
 
- Strong security starts with the strengthening of the weakest link: passwords. (to the original material)
 
- AI to greatly enhance urban surveillance technologies. (to the original material)
 
- Healthcare fraud detection market to grow steadily by 2026. (to the original material)
 
- New DeadBolt ransomware targets QNAP devices, ask 50 BTC for master key. (to the original material)
 
- VMware: Patch Horizon servers against ongoing Log4j attacks! (to the original material)
 
- Linux system service bug gives root on all major distros, exploit released. (to the original material)
 
- TrickBot now crashes researchers' browsers to block malware analysis. (to the original material)
 
- UK govt releasing Nmap scripts to find unpatched vulnerabilities. (to the original material)
 
- New DazzleSpy malware targets macOS users in watering hole attacks. (to the original material)
 
- Linux kernel bug can let hackers escape Kubernetes containers. (to the original material)
 
- Google Drive now warns you of suspicious phishing, malware docs. (to the original material)
 
- Segway store hacked to steal customers' credit cards. (to the original material)
 
- Russia arrests leader of the “Infraud Organization” hacker group. (to the original material)
 
- Google Drive flags nearly empty files for "copyright infringement". (to the original material)
 
- 3 Common cloud misconfigurations to avoid. (to the original material)
 
- Vulnerability disclosures rise to meet federal requirements. (to the original material)
 
- LA launches Cyber Resilience Center. (to the original material)
 
- New Mexico files cybersecurity bills. (to the original material)
 
- Cyber-Attack on Global Affairs Canada. (to the original material)
 
- Why the assure scheme Is still getting off the ground in the aviation sector. (to the original material)
 
- #DataPrivacyWeek: Data Privacy vs. Visibility: The security consideration. (to the original material)
 
- UK Government announces new cyber strategy to protect public sector. (to the original material)
 
- #DataPrivacyWeek Interview: Overcoming privacy challenges in AI. (to the original material)
 
- Experts call for more open security culture after VW sacking. (to the original material)
 
- Cyber Essentials overhauled for new hybrid working era. (to the original material)
 
- Security Agencies continue to raise red flags against Log4Shell. (to the original material)
 
- MoonBounce: Third UEFI Bootkit in Town. (to the original material)
 
- Molerats APT Group targets the Middle East. (to the original material)
 
- 12-Year-Old Polkit flaw lets unprivileged Linux users gain root access. (to the original material)
 
- Hackers exploited MSHTML flaws to spy on Government and Defense Targets. (to the original material)
 
- Hackers infect macOS with new DazzleSpy backdoor in watering-hole attacks. (to the original material)
 
- TrickBot malware using new techniques to evade Web Injection attacks. (to the original material)
 
- UK government opens consultation on medic-style register for Brit infosec pros. (to the original material)
 
- Sophos: Log4Shell would have been a catastrophe without the Y2K-esque mobilization of engineers. (to the original material)
 
- Current and future state of Identity Access Management (IAM). (to the original material)
 
- Top most dangerous types of malware attacks. (to the original material)
 
- Cost for Cyber Security Training. (to the original material)
 
- Combating the surge in retail theft and E-Commerce fraud with Open Source Intelligence. (to the original material)
 
- Delay in creating new Cybersecurity Board prompts concern. (to the original material)
 
- Application Security Company ArmorCode raises $8 million. (to the original material)
 
- Canada's Foreign Ministry targeted in cyberattack. (to the original material)
 
- Vulnerability Spotlight: Vulnerability in Apple iOS, iPad OS and macOS could lead to disclosure of sensitive memory data. (to the original material)
 
- How do you know if your email has been hacked. (to the original material)
 
- Watering hole deploys new macOS malware, DazzleSpy, in Asia. (to the original material)
 
- US, NATO discuss Ukrainian cyber aid amid tensions. (to the original material)
 
- Drug Testing Lab Portal incident exposed data for 4 years. (to the original material)
 
- Log4j Updates: Flaw challenges global security leaders. (to the original material)
 
- "Email security doesn't get the attention it deserves". (to the original material)
 
- How Do You Detect - and Stop - Bank Identity Number Attacks? (to the original material)
 
- Brand Narratives and Awareness in Cybersecurity. (to the original material)
 
- Segway website hacked and infected with payment card skimmer. (to the original material)
 
- Staff negligence is now a major reason for insider security incidents. (to the original material)
 
- Mirai splinter botnets dominate the IoT attack scene. (to the original material)
 
- TianySpy malware uses smishing disguised as message from Telco. (to the original material)
 
- Cyberattacks on Squid Game Minecraft Tourney takedown Andorra’s internet. (to the original material)
 
- Ozzy Osbourne NFTs used to bite off chunks of crypto coins. (to the original material)
 
- Google drops FLoC and introduces topics API to replace tracking cookies for Ads. (to the original material)
 
- PrinterLogic vendor addresses triple RCE threat against all connected endpoints. (to the original material)
 
- California public office admits Covid-19 healthcare data breach. (to the original material)
 
- Triple-digit threshold: Browser makers offer compatibility testing tools as version 100 approaches. (to the original material)
 
- Juniper announces routers, line cards using new Trio 6 ASIC. (to the original material)
 
- Sophos: Log4Shell impact limited, threat remains. (to the original original)
 
- Nvidia Arm deal another step closer to - death? (to the original material)
 
- Bernalillo County ransomware attack still felt weeks later. (to the original material)
 
- IBM hybrid cloud strategy driving revenue growth. (to the original material)
 
- Cyber Essentials program gets biggest update since launch. (to the original material)
 
- UK government launches internal cyber strategy. (to the original material)
 
- StayLinked flags IIoT channel opportunity. (to the original material)
 
- UK launches international data transfer council. (to the original material)
 
- Subpostmaster campaign group to meet government over unfair compensation settlement. (to the original material)
 
- Below the Surface: Cybersecurity trends for 2022. (to the original material)
 
- A chaotic tax season brings new cyberthreats. (to the original material)

 

Logo Dorin M Wolf

No comments