Logo Cyber News
Logo Dorin M Wolf
 
- Vulnerability Summary for the Week of December 20, 2021. (to the original material)
 
- 4 practical strategies for the Log4j discovery. (to the original material)
 
How to avoid "festive fraud" during the holiday season. (to the original material)
 
Manufacturers of IT devices should step up efforts when it comes to security. (to the original material)
 
- Web apps attacks are skyrocketing, it's time to protect APIs. (to the original material)
 
- Five megatrends for 5G mmWave for 2022 and beyond. (to the original material)
 
QNAP NAS devices hit in a surge of eCh0raix ransomware attacks. (to the original material)
 
Shutterfly services were disrupted by the Conti ransomware attack. (to the original material)
 
2021: Looking back on the year in malware and cyber attacks, from SolarWinds to Log4j. (to the original material)
 
2021 in review: The biggest cybersecurity stories of the year. (to the original material)
 
Market opportunities, security challenges, and the edge - 5G predictions for 2022. (to the original material)
 
The most interesting vulnerabilities of 2021. (to the original material)
 
- The internet scans for Log4j vulnerability dip 40% for Christmas but may recover soon. (to the original material)
 
- CISA to put out bids for the supply chain predictive tool, with national exercise support. (to the original material)
 
Japan and US are expected to boost cooperation on ransomware threats. (to the original material)
 
- More than 1,200 phishing tools are capable of intercepting 2FA detected in-the-wild. (to the original material)
 
The 5 most wanted threadpost stories of 2021. (to the original material)
 
Global cyberattacks from Nation-State actors posing greater threats. (to the original material)
 
- GOP (Grand Old Party - Republican) Senator to introduce "comprehensive" crypto regs bill. (to the original material)
 
- Rook uses Babuk's leaked code in Kazakh Bank attacks. (to the original material)
 
- 2 vulnerabilities were discovered in Apache HTTP Server. (to the original material)
 
- Azure App Service's flaw exposed source code for 4 years. (to the original material)
 
- The need to think differently about cybersecurity in 2022. (to the original material)
 
- Phishers attempt to steal the 2FA code of coinspot users. (to the original material)
 
- Shutterfly acknowledges being hit by ransomware attack. (to the original material)
 
- Flaws in WordPress plug-in put 2 million websites at risk. (to the original material)
 
- Medical device incident response: Patient safety concerns. (to the original material)
 
- #How to: Measure the performance of your cyber team. (to the original material)
 
- How to create a convincing persona to hide your identity online. (to the original material)

- Interview With Dr. Tirthankar Ghosh – UWF Center for Cybersecurity. (to the original material)

 

Logo Dorin M Wolf

No comments