Logo Cyber News
Logo Dorin M Wolf
 
- CISA adds eight known exploited vulnerabilities to Catalog. (to the original material)
 
- The National Directorate of Cybersecurity (DNSC) participated in the European cybersecurity crisis exercise - 'EU Cyber Crisis Linking Exercise on Solidarity – EU CyCLES. (to the original material)
 
- New infosec products of the week: January 28, 2022. (to the original material)
 
- Ransomware families becoming more sophisticated with newer attack methods. (to the original material)
 
- Why we can’t put all our trust into AI. (to the original material)
 
-  Healthcare industry most common victim of third-party breaches last year. (to the original material)
 
- Use of AI to fight insurance fraud hits all-time high. (to the original material)
 
- The state of SD-WAN and SASE planning. (to the original material)
 
- Spending on edge computing to reach $176 billion in 2022. (to the original material)
 
- QNAP force-installs update after DeadBolt ransomware hits 3,600 devices. (to the original material)
 
- FBI releases PIN (Private Industry Notification) on Iranian cyber group Emennet Pasargad. (to the original material)
 
- Zoom launches virtual conference floor for online events. (to the original material)
 
- Cisco adds Webex support to SD-WAN Cloud OnRamp. (to the original material)
 
- Accenture, Celonis partner in process mining technology. (to the original material)
 
- Microsoft gives NASA a lesson in timeshare optimisation. (to the original material)
 
- British court rules in HP’s favour in Mike Lynch fraud case. (to the original material)
 
- Kaseya boss looking for strong 2022. (to the original material)
 
- Cyber skills gap affecting data privacy practice, finds ISACA. (to the original material)
 
- Korean researchers invent silk-based security device. (to the original material)
 
- Manchester United signs Extreme Networks to modernize in-stadium connectivity experience. (to the original material)
 
- Leeds NHS Trust moves millions of patient records to the Microsoft Azure public cloud. (to the original material)
 
- Smart connectivity to transform world experience within a decade. (to the original material)
 
- Verizon Business and Atos team on predictive analytics 5G edge solution. (to the original material)
 
- CISOs must get out in front of Ukraine cyber crisis, says NCSC. (to the original material)
 
- The Week in Ransomware - January 28th 2022 - Get NAS devices off the Internet. (to the original material)
 
- US bans major Chinese telecom over national security risks. (to the original material)
 
- NCSC alerts UK orgs to brace for destructive Russian cyberattacks. (to the original material)
 
- EU to create pan-European cyber incident coordination framework. (to the original material)
 
- Hackers are taking over CEO accounts with rogue OAuth apps. (to the original material)
 
- Finnish diplomats’ phones infected with NSO Group Pegasus spyware. (to the original material)
 
- Finland warns of Facebook accounts hijacked via Messenger phishing. (to the original material)
 
- Microsoft Outlook RCE zero-day exploits now selling for $400,000. (to the original material)
 
- Fake cash scams thrive on Facebook and Insta - FTC. (to the original material)
 
- From Drone to Counter-Drone: The shifting role of cybersecurity. (to the original material)
 
- FBI issues warning over Iranian cyber company. (to the original material)
 
- Most ransomware infections are self-installed. (to the original material)
 
- Water utilities get 100-Day cybersecurity plan. (to the original material)
 
- White House releases Zero Trust Strategy for federal government. (to the original material)
 
- NCSC warns UK organizations to prepare for Russian cyber-attacks. (to the original material)
 
- Online investment fraud network taken down by law enforcement. (to the original material)
 
- 2FA Authenticator App downloaded Vultur Trojan on 10,000 Android devices. (to the original material)
 
- Hackers using device registration trick to attack enterprises with lateral phishing. (to the original material)
 
- How Wazuh can improve digital security for businesses. (to the original material)
 
- North Korean hackers using Windows Update Service to infect PCs with malware. (to the original material)
 
- North Korean hackers return with stealthier variant of KONNI RAT malware. (to the original material)
 
- Internet Society condemns UK's Online Safety Bill for demonizing encryption using "think of the children" tactic. (to the original material)
 
- Silk could tie up all-but-unbreakable encryption, say South Korean boffins. (to the original material)
 
- Intel fails to get Spectre, Meltdown chip flaw class-action super-suit tossed out. (to the original material)
 
- What You should know about Private Residential Proxies? (to the original material)
 
- Cyber Fraud Trends to be aware of in 2022: From iGaming to pandemic-related phishing. (to the original material)
 
- What are the best cybersecurity certifications for beginners? (to the original material)
 
- In the Hacker's crosshairs: K-12 Schools. (to the original material)
 
- Threat Roundup for January 21 to January 28. (to the original material)
 
- Week in security with Tony Anscombe. (to the original material)
 
- New ransomware DeadBolt targets QNAP devices. (to the original material)
 
- DeFi Platform Qubit Finance hacked for $80 million. (to the original material)
 
- Log4j exploitations have slowed, but attack vectors remain. (to the original material)
 
- FCC votes to ban China Unicom from operating in US. (to the original material)
 
- How refund fraud changed the cybercrime landscape. (to the original material)
 
- New macOS malware planted via Pro-Democracy Hong Kong Radio. (to the original material)
 
- Flaw in Polkit's pkexec puts Linux users at risk. (to the original material)
 
- Darknet Market search engine operator gets 8-year sentence. (to the original material)
 
- ISMG Editors: Tough lessons learned from Log4j, ransomware. (to the original material)
 
- Cyberattack spillover from Ukraine: Be prepared, UK warns. (to the original material)
 
- ITRC: Identity Crime predictions for 2022. (to the original material)
 
- All the World's a Stage: Russia arrests ransomware suspects. (to the original material)
 
- Vetting the security risks of open-source code in healthcare. (to the original material)
 
- Don't forget about privacy: Create a strong attitude to privacy on World Data Protection Day. (to the original material)
 
- Google Play app dropped Vultur banking Trojan on Android handsets. (to the original material)
 
- This Week in Security News - January 28th, 2022. (to the original material)
 
- Zerodium spikes payout for zero-click Outlook zero-days. (to the original material)
 
- Conti, DeadBolt ransomwares target Delta, QNAP. (to the original material)
 
- Lazarus APT uses Windows Update to spew malware. (to the original material)
 
- Shlayer and Bundlore MacOS malware strains – How Uptycs EDR Detection can help. (to the original material)
 
- Data Privacy Day aims to raise awareness of how we collect and use data. (to the original material)
 
- The Importance of Responsible Disclosure. (to the original material)
 
- MITRE ATT&ACK®: What it is and how it improves security. (to the original material)
 
- DeFi thefts beget DeFi for money laundering. (to the original material)
 
- Ad hoc cyber assessments at Commerce limit visibility over threats. (to the original material)
 
- 68K affected by data theft, "sophisticated" network hack of health nonprofit Advocates. (to the original material)
 
- US government’s "zero trust" roadmap calls time on perimeter-based paradigm. (to the original material)
 
- Xerox belatedly addresses web-based printer bricking threat. (to the original material)
 
- Privacy slalom: Human rights, media orgs offer OPSEC warning to Winter Olympics attendees. (to the original material)
 
- Scammers target us on social media now more than ever. (to the original material)
 
- Your personal data is valuable, and dangerous in the wrong hands. It's time to protect it better. (to the original material)
 
- WhisperGate malware corrupts computers in Ukraine. (to the original material)

 

Logo Dorin M Wolf

No comments