Logo Cyber News

Logo Dorin M Wolf

 

- Vulnerability Summary for the Week of January 24, 2022. (to the original material)
 
- FBI warns of 2022 Beijing Olympics cyberattack, privacy risks. (to the original material)
 
- Samba bug can let remote attackers execute code as root. (to the original material)
 
- 600K WordPress sites impacted by critical plugin RCE vulnerability. (to the original material)
 
- QNAP: DeadBolt ransomware exploits a bug patched in December. (to the original material)
 
- CISA adds 8 vulnerabilities to list of actively exploited bugs. (to the original material)
 
- Microsoft Office 365 to add better protection for priority accounts. (to the original material)
 
- Russian "Gamaredon" hackers use 8 new malware payloads in attacks. (to the original material)
 
- 277,000 routers were exposed to Eternal Silence attacks via UPnP. (to the original material)
 
- Cybersecurity staff turnover and burnout: How worried should organizations be? (to the original material)
 
- Reducing the blast radius of credential theft. (to the original material)
 
- Why vulnerability scanners aren’t enough to prevent a ransomware attack on your business. (to the original material)
 
- How costly is an insider threat? (to the original material)
 
- Number of data compromises reaching all-time high. (to the original material)
 
- Cloud infrastructure spending jumped to $18.6B in 3Q21. (to the original material)
 
-  Dark Overlord collaborator sentenced to three years. (to the original material)
 
- Prison for Dark Overlord collaborator. (to the original material)
 
- Banking Trojan in Google Play App Store - "2FA Authenticator" drops Vultur RAT. (to the original material)
 
- Number of COVID-19 testing scams jumps sharply. (to the original material)
 
- Ransomware gangs are recruiting your employees. (to the original material)
 
- Attacks signal coming shift from ID theft to ID fraud. (to the original material)
 
- Cengage to buy cybersecurity training platform, Infosec. (to the original material)
 
- Aussie Tech entrepreneur extradited over SMS fraud. (to the original material)
 
- Bad Clicks and fallible users: How organizations can mitigate insider risks. (to the original material)
 
- The vulnerability of the UK's "Just in Time" supply chain. (to the original material)
 
- #HowTo: Implement continuous compliance for Kubernetes. (to the original material)
 
- US revokes China Unicom's license. (to the original material)
 
- Crypto Finance Firm offers $2m bug bounty to hackers. (to the original material)
 
- QNAP Ransomware: Thousands infected with DeadBolt. (to the original material)
 
- Researchers uncover new Iranian hacking campaign targeting Turkish users. (to the original material)
 
- New SureMDM vulnerabilities could expose companies to supply chain attacks. (to the original material)
 
- SureMDM vulnerabilities exposed companies to supply chain attacks. (to the original material)
 
- New Samba bug allows remote attackers to execute arbitrary code as root. (to the original material)
 
- Behind The Buzzword: Four ways to assess your Zero Trust security posture. (to the original material)
 
- Your graphics card fingerprint can be used to track your activities across the web. (to the original material)
 
- German Court rules websites embedding Google fonts violate GDPR. (to the original material)
 
- Crypto outfit Qubit appeals to the honor of thieves who lifted $80M of its digi-dollars. (to the original material)
 
- 3 Things you should consider before mining Monero. (to the original material)
 
- The Third Building Block for the SOC of the Future: Balanced Automation. (to the original material)
 
- CISA's "Must Patch" list puts spotlight on Vulnerability Management Processes. (to the original material)
 
- Israeli lawyer, Hungarian rights group target Pegasus Spyware. (to the original material)
 
- Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables. (to the original material)
 
- Vulnerability Spotlight: Memory corruption and use-after-free vulnerabilities in Foxit PDF Reader. (to the original material)
 
- Data on children of armed forces personnel exposed in data breach at the Ministry of Defense (UK). (to the original material)
 
- How to tell if your phone has been hacked. (to the original material)
 
- ITRC data breach report shows surge in data compromises. (to the original material)
 
- Rust-Coded malware key factor in BlackCat's meteoric rise. (to the original material)
 
- Report details Russian cyberespionage efforts in Ukraine. (to the original material)
 
- HHS HC3: BlackMatter threat to Health Sector "Reduced". (to the original material)
 
- Lazarus using Windows Update, GitHub to deploy malware. (to the original material)
 
- Unsecured AWS server exposed 3TB in airport employee records. (to the original material)
 
- Meta will warn you if someone screengrabs your encrypted Messenger chats. (to the original material)
 
- This is the year to build a cybersecurity culture. (to the original material)
 
- Breaches exposed 45.67M patient records in 2021, largest annual total since 2015. (to the original material)
 
- Feds move to settle case with DoD cyber official in clearance dispute. (to the original material)
 
- Finance organizations targeted by ransomware may be "left chasing shadows". (to the original material)
 
- Bug Bounty Radar - The latest bug bounty program for February 2022. (to the original material)
 
- No smoke without fire? "Critical" Loguru security flaw turns out to be non-issue. (to the original material)
 
- Vulnerability in PostBus public transport platform exposed customer data. (to the original material)
 
- Emsisoft releases DeadBolt ransomware decryption tool. (to the original material)
 
- Shuckworm continues cyber-espionage attacks against Ukraine. (to the original material)
 
- DazzleSpy backdoor spies on Hong Kong politicians. (to the original material)
 
- Cobalt Strike and Prometheus Traffic Direction System - New tools of the cyber threat trade. (to the original material)
 
- Reasons why every business is a target of DDoS attacks. (to the original material)
 
- Top Ways websites get hacked by spammers. (to the original material)
 
- Microsoft OneDrive for macOS local privilege escalation. (to the original material)
 
- Outdated IoT healthcare devices pose major security threats. (to the original material)

 

Logo Dorin M Wolf

No comments