- Vulnerability Summary for the Week of December 20, 2021. (to the original material)
- 4 practical strategies for the Log4j discovery. (to the original material)
- How to avoid "festive fraud" during the holiday season. (to the original material)
- Manufacturers of IT devices should step up efforts when it comes to security. (to the original material)
- Web apps attacks are skyrocketing, it's time to protect APIs. (to the original material)
- Five megatrends for 5G mmWave for 2022 and beyond. (to the original material)
- QNAP NAS devices hit in a surge of eCh0raix ransomware attacks. (to the original material)
- Shutterfly services were disrupted by the Conti ransomware attack. (to the original material)
- 2021: Looking back on the year in malware and cyber attacks, from SolarWinds to Log4j. (to the original material)
- 2021 in review: The biggest cybersecurity stories of the year. (to the original material)
- Market opportunities, security challenges, and the edge - 5G predictions for 2022. (to the original material)
- The most interesting vulnerabilities of 2021. (to the original material)
- The internet scans for Log4j vulnerability dip 40% for Christmas but may recover soon. (to the original material)
- CISA to put out bids for the supply chain predictive tool, with national exercise support. (to the original material)
- Japan and US are expected to boost cooperation on ransomware threats. (to the original material)
- More than 1,200 phishing tools are capable of intercepting 2FA detected in-the-wild. (to the original material)
- The 5 most wanted threadpost stories of 2021. (to the original material)
- Global cyberattacks from Nation-State actors posing greater threats. (to the original material)
- GOP (Grand Old Party - Republican) Senator to introduce "comprehensive" crypto regs bill. (to the original material)
- Rook uses Babuk's leaked code in Kazakh Bank attacks. (to the original material)
- 2 vulnerabilities were discovered in Apache HTTP Server. (to the original material)
- Azure App Service's flaw exposed source code for 4 years. (to the original material)
- The need to think differently about cybersecurity in 2022. (to the original material)
- Phishers attempt to steal the 2FA code of coinspot users. (to the original material)
- Shutterfly acknowledges being hit by ransomware attack. (to the original material)
- Flaws in WordPress plug-in put 2 million websites at risk. (to the original material)
- Medical device incident response: Patient safety concerns. (to the original material)
- #How to: Measure the performance of your cyber team. (to the original material)
- How to create a convincing persona to hide your identity online. (to the original material)
- Interview With Dr. Tirthankar Ghosh – UWF Center for Cybersecurity. (to the original material)