- Vulnerability Summary for the Week of January 24, 2022. (to the original material)
- FBI warns of 2022 Beijing Olympics cyberattack, privacy risks. (to the original material)
- Samba bug can let remote attackers execute code as root. (to the original material)
- 600K WordPress sites impacted by critical plugin RCE vulnerability. (to the original material)
- QNAP: DeadBolt ransomware exploits a bug patched in December. (to the original material)
- CISA adds 8 vulnerabilities to list of actively exploited bugs. (to the original material)
- Microsoft Office 365 to add better protection for priority accounts. (to the original material)
- Russian "Gamaredon" hackers use 8 new malware payloads in attacks. (to the original material)
- 277,000 routers were exposed to Eternal Silence attacks via UPnP. (to the original material)
- Cybersecurity staff turnover and burnout: How worried should organizations be? (to the original material)
- Reducing the blast radius of credential theft. (to the original material)
- Why vulnerability scanners aren’t enough to prevent a ransomware attack on your business. (to the original material)
- How costly is an insider threat? (to the original material)
- Number of data compromises reaching all-time high. (to the original material)
- Cloud infrastructure spending jumped to $18.6B in 3Q21. (to the original material)
- Dark Overlord collaborator sentenced to three years. (to the original material)
- Prison for Dark Overlord collaborator. (to the original material)
- Banking Trojan in Google Play App Store - "2FA Authenticator" drops Vultur RAT. (to the original material)
- Number of COVID-19 testing scams jumps sharply. (to the original material)
- Ransomware gangs are recruiting your employees. (to the original material)
- Attacks signal coming shift from ID theft to ID fraud. (to the original material)
- Cengage to buy cybersecurity training platform, Infosec. (to the original material)
- Aussie Tech entrepreneur extradited over SMS fraud. (to the original material)
- Bad Clicks and fallible users: How organizations can mitigate insider risks. (to the original material)
- The vulnerability of the UK's "Just in Time" supply chain. (to the original material)
- #HowTo: Implement continuous compliance for Kubernetes. (to the original material)
- US revokes China Unicom's license. (to the original material)
- Crypto Finance Firm offers $2m bug bounty to hackers. (to the original material)
- QNAP Ransomware: Thousands infected with DeadBolt. (to the original material)
- Researchers uncover new Iranian hacking campaign targeting Turkish users. (to the original material)
- New SureMDM vulnerabilities could expose companies to supply chain attacks. (to the original material)
- SureMDM vulnerabilities exposed companies to supply chain attacks. (to the original material)
- New Samba bug allows remote attackers to execute arbitrary code as root. (to the original material)
- Behind The Buzzword: Four ways to assess your Zero Trust security posture. (to the original material)
- Your graphics card fingerprint can be used to track your activities across the web. (to the original material)
- German Court rules websites embedding Google fonts violate GDPR. (to the original material)
- Crypto outfit Qubit appeals to the honor of thieves who lifted $80M of its digi-dollars. (to the original material)
- 3 Things you should consider before mining Monero. (to the original material)
- The Third Building Block for the SOC of the Future: Balanced Automation. (to the original material)
- CISA's "Must Patch" list puts spotlight on Vulnerability Management Processes. (to the original material)
- Israeli lawyer, Hungarian rights group target Pegasus Spyware. (to the original material)
- Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables. (to the original material)
- Vulnerability Spotlight: Memory corruption and use-after-free vulnerabilities in Foxit PDF Reader. (to the original material)
- Data on children of armed forces personnel exposed in data breach at the Ministry of Defense (UK). (to the original material)
- How to tell if your phone has been hacked. (to the original material)
- ITRC data breach report shows surge in data compromises. (to the original material)
- Rust-Coded malware key factor in BlackCat's meteoric rise. (to the original material)
- Report details Russian cyberespionage efforts in Ukraine. (to the original material)
- HHS HC3: BlackMatter threat to Health Sector "Reduced". (to the original material)
- Lazarus using Windows Update, GitHub to deploy malware. (to the original material)
- Unsecured AWS server exposed 3TB in airport employee records. (to the original material)
- Meta will warn you if someone screengrabs your encrypted Messenger chats. (to the original material)
- This is the year to build a cybersecurity culture. (to the original material)
- Breaches exposed 45.67M patient records in 2021, largest annual total since 2015. (to the original material)
- Feds move to settle case with DoD cyber official in clearance dispute. (to the original material)
- Finance organizations targeted by ransomware may be "left chasing shadows". (to the original material)
- Bug Bounty Radar - The latest bug bounty program for February 2022. (to the original material)
- No smoke without fire? "Critical" Loguru security flaw turns out to be non-issue. (to the original material)
- Vulnerability in PostBus public transport platform exposed customer data. (to the original material)
- Emsisoft releases DeadBolt ransomware decryption tool. (to the original material)
- Shuckworm continues cyber-espionage attacks against Ukraine. (to the original material)
- DazzleSpy backdoor spies on Hong Kong politicians. (to the original material)
- Cobalt Strike and Prometheus Traffic Direction System - New tools of the cyber threat trade. (to the original material)
- Reasons why every business is a target of DDoS attacks. (to the original material)
- Top Ways websites get hacked by spammers. (to the original material)
- Microsoft OneDrive for macOS local privilege escalation. (to the original material)
- Outdated IoT healthcare devices pose major security threats. (to the original material)