
- Details
- Written by: Merticaru Dorin Nicolae
- Category: Cyber Security News
- Hits: 108
- NCSC-UK Releases Guidance on Using MSP for Administering Cloud Services. (to the original material)
- Cybersecurity Trends 2023: How we can protect the hybrid lifestyle. (to the original material)
- Now you can legally repair your tech – sort of. (to the original material)
- Secured.22: Optimize SD-WAN and SASE adoption. (to the original material)
- How to improve communication between information security staff and management. (to the original material)
- LABScon Replay | Blasting Event-Driven Cornucopia: WMI-based User-Space Attacks Blind SIEMs and EDRs. (to the original material)
- Cybercriminals bypass Windows security with driver-vulnerability exploit. (to the original material)
- Timeline of the latest LastPass data breaches. (to the original material)
- Crypto audit of Threema revealed many vulnerabilities. (to the original material)
- Google is calling EU cybersecurity founders. (to the original material)
- Attackers abuse business-critical cloud apps to deliver malware. (to the original material)
- Organizations are adopting SSE technology to secure hybrid work. (to the original material)
- Royal Mail is suffering service disruption due to a ‘cyber incident’. (to the original material)
- Gootkit Loader campaign targets Australian Healthcare Industry. (to the original material)
- US CISA adds MS Exchange bug CVE-2022-41080 to its Known Exploited Vulnerabilities Catalog. (to the original material)
- Microsoft Patch Tuesday for January 2023 fixed actively exploited zero-day. (to the original material)
- Ransomware Group Behind Victoria Fire Department Outage. (to the original material)
- The Guardian Says Hackers Accessed UK Employee Data. (to the original material)
- Why Hackers Are Going 'Downmarket' in Their Attacks. (to the original material)
- Microsoft's First 2023 Patch Tuesday Fixes 0-Day, 98 Vulns. (to the original material)
- Organizationwide Passwordless Orchestration. (to the original material)
- US Flights Resume After Reported Computer Glitch Resolved. (to the original material)
- Darknet Markets Using Custom Android Apps for Fulfillment. (to the original material)
- Aflac, Zurich Policyholders in Japan Affected by Data Leaks. (to the original material)
- Flaws found in nearly a third of applications on the first scan. (to the original material)
- USPTO awards seven new authentication patents to SecureAuth. (to the original material)
- Observability, hybrid IT and secure software development: Three trends that defined 2022. (to the original material)
- What CISOs don’t know about their SOCs. (to the original material)
- Crypto audit of Threema revealed many vulnerabilities. (to the original material)
- Google is calling EU cybersecurity founders. (to the original material)
- Attackers abuse business-critical cloud apps to deliver malware. (to the original material)
- Organizations are adopting SSE technology to secure hybrid work. (to the original material)
- Scattered Spider hackers use old Intel driver to bypass security. (to the original material)
- Twitter claims leaked data of 200M users not stolen from its systems. (to the original material)
- Threema claims encryption flaws never had a real-world impact. (to the original material)
- Cisco warns of auth bypass bug with public exploit in EoL routers. (to the original material)
- Gootkit malware abuses VLC to infect healthcare orgs with Cobalt Strike. (to the original material)
- Royal Mail halts international services after cyberattack. (to the original material)
- New Dark Pink APT group targets govt and military with custom malware. (to the original material)
- Apps gain more security flaws as they get older. (to the original material)
- Personal details account for almost half of stolen data. (to the original material)
- AI-generated texts could increase threat exposure. (to the original material)
- The KB5022287 and KB5022303 updates feature important security fixes for Windows 11. (to the original material)
- Microsoft releases security-boosting, bug-fixing KB5022282 and KB5022286 Windows 10 updates, the first of 2023. (to the original material)

- Details
- Written by: Merticaru Dorin Nicolae
- Category: Cyber Security News
- Hits: 78
- Adobe Releases Security Updates for Multiple Products. (to the original material)
- Microsoft Releases January 2023 Security Updates. (to the original material)
- CISA Adds Two Known Exploited Vulnerabilities to Catalog. (to the original material)
- CISA Releases Two Industrial Control Systems Advisories. (to the original material)
- StrongPity espionage campaign targeting Android users. (to the original material)
- What is Red Teaming & How it Benefits Orgs. (to the original material)
- Podcast: Don’t miss these timely software security tips. (to the original material)
- How scammers steal cryptocurrency from Twitter users. (to the original material)
- Bad Paths & The Importance of Using Valid URL Characters. (to the original material)
- Study shows attackers can use ChatGPT to significantly enhance phishing and BEC scams. (to the original material)
- Data leak exposes information of 10,000 French social security beneficiaries. (to the original material)
- Intel boosts VM security, guards against stack attacks in new Xeon release. (to the original material)
- Beware the Gifts of Dragons: How D&D’s Open Gaming License May Have Become a Trap for Creators. (to the original material)
- Increasing trust, commitment, and predictability during a remote incident response. (to the original material)
- Vulnerability Spotlight: Asus router access, information disclosure, denial of service vulnerabilities discovered. (to the original material)
- Microsoft Patch Tuesday for January 2023 - Snort rules and prominent vulnerabilities. (to the original material)
- APT Topic Summary Report: Cisco Talos Year in Review 2022. (to the original material)
- Microsoft plugs actively exploited zero-day hole (CVE-2023-21674). (to the original material)
- You must build a security team. Where do you start? (to the original material)
- Guide: How virtual CISOs can efficiently extend their services into compliance readiness. (to the original material)
- StrongPity APT spreads backdoored Android Telegram app via fake Shagle site. (to the original material)
- Zoom Rooms was affected by four “high” severity vulnerabilities. (to the original material)
- Remote code execution bug discovered in the popular JsonWebToken library. (to the original material)
- Kinsing malware targets Kubernetes environments via misconfigured PostgreSQL. (to the original material)
- Danish Banks Are Targets of Pro-Russian DDoS Hacking Group. (to the original material)
- Analysis: Third-Party Health Data Breaches Dominated in 2022. (to the original material)
- Mango Markets Hacker in US Regulator's Crosshairs. (to the original material)
- Misconfigured PostgreSQL Used to Target Kubernetes Clusters. (to the original material)
- How Poor Vendor Practices Lead to Major Health Data Breaches. (to the original material)
- Check Fraud, First-Party Fraud to Rise in 2023. (to the original material)
- Finding and Managing the Risk in your IT Estate: A Comprehensive Overview. (to the original material)
- 5 Reasons to Consolidate Your Security Stack. (to the original material)
- How zero-trust can help security teams defend against cyberattacks during the ongoing downturn. (to the original material)
- The number of cloud apps delivering malware nearly tripled in 2022. (to the original material)
- The FCC wants telecoms to report breaches to feds and customers faster. (to the original material)
- Buying MDR (Managed Detection and Response): Quotes from the experts. (to the original material)
- Ask these three questions to prepare for the next cyberattack. (to the original material)
- Microsoft plugs actively exploited zero-day hole (CVE-2023-21674). (to the original material)
- You must build a security team. Where do you start? (to the original material)
- Guide: How virtual CISOs can efficiently extend their services into compliance readiness. (to the original material)
- CISA orders agencies to patch Exchange bug abused by ransomware gang. (to the original material)
- Over 1,300 fake AnyDesk sites push Vidar info-stealing malware. (to the original material)
- Lorenz ransomware gang plants backdoors to use months later. (to the original material)
- Trojan Puzzle attack trains AI assistants into suggesting malicious code. (to the original material)
- Microsoft January 2023 Patch Tuesday fixes 98 flaws, 1 zero-day. (to the original material)
- Iowa’s largest school district cancels classes after cyberattack. (to the original material)
- StrongPity hackers target Android users via trojanized Telegram app. (to the original material)
- In-House vs. External Pen Testing: Which is Right For Your Organization? (to the original material)
- Attacks and payments are down - but don't write off ransomware yet. (to the original material)
- Microsoft ends Windows 7 extended support today - install all updates now to fix all known issues... and gain Secure Boot support. (to the original material)

- Details
- Written by: Merticaru Dorin Nicolae
- Category: Cyber Security News
- Hits: 85
- DNS4EU: The European Commission plans to launch an alternative to the current public DNS. (to the original material)
- Warnings about phishing traps at the beginning of the year. (to the original material)
- Vulnerability Summary for the Week of January 2, 2023. (to the original material)
- Children and their first mobile devices: how to approach the security of your child's first smartphone as a parent. (to the original material)
- Cracked it! Highlights from KringleCon 5: Golden Rings. (to the original material)
- Hybrid work: Turning business platforms into preferred social spaces. (to the original material)
- Gootkit Loader Actively Targets Australian Healthcare Industry. (to the original material)
- 9th January – Threat intelligence report. (to the original material)
- Software supply chain security improving. (to the original material)
- Will quantum computers break RSA encryption in 2023? (to the original material)
- If governments are banning TikTok, why is it still on your corporate devices? (to the original material)
- 11 top XDR tools and how to evaluate them. (to the original material)
- EFF and Partners Call Out Threats to Free Expression in Draft Text as UN Cybersecurity Treaty Negotiations Resume. (to the original material)
- What is My SSID & Should I Hide It? (to the original material)
- Louisiana Mandates ID Verification for Viewing Adult Material Online. (to the original material)
- Rackspace ransomware attack was executed by using previously unknown security exploit. (to the original material)
- Airline company Air France-KLM discloses security breach. (to the original material)
- Phishing campaign targets government institutions in Moldova. (to the original material)
- Russia-linked Cold River APT targeted US nuclear research laboratories. (to the original material)
- Resecurity Released a Status Report on Drug Trafficking in the Dark Web (2022-2023). (to the original material)
- Qualcomm Snapdragon flaws impact Lenovo, Microsoft, Lenovo, and Samsung devices. (to the original material)
- inSicurezzaDigitale launches the Dashboard Ransomware Monitor. (to the original material)
- Hive Claims Responsibility for Attack on Nursing Home Chain. (to the original material)
- Colonoscopy Prep Retail Website Breach Festered for Years. (to the original material)
- ChatGPT Showcases Promise of AI in Developing Malware. (to the original material)
- Steps to Strengthen Cloud Security. (to the original material)
- Regulator Eyes Revamped Data Breach Reporting Requirements. (to the original material)
- Mastering the Art of Attack Surface Management. (to the original material)
- Trend Micro creates CTOne, a new subsidiary focused on 5G security. (to the original material)
- AWS says it will now encrypt S3 buckets by default. (to the original material)
- Supreme Court denies NSO Group appeal; Meta’s spyware claims lawsuit can proceed. (to the original material)
- MDR: What to know before you buy, part 1. (to the original material)
- MDR: What to know before you buy, part 2. (to the original material)
- 2023: The year CISOs and DPOs (data privacy officers) will stop making assumptions. (to the original material)
- Rackspace ransomware attack was executed by using previously unknown security exploit. (to the original material)
- Microsoft: Kubernetes clusters hacked in malware campaign via PostgreSQL. (to the original material)
- Darknet drug markets move to custom Android apps for increased privacy. (to the original material)
- GitHub makes it easier to scan your code for vulnerabilities. (to the original material)
- Auth0 fixes RCE flaw in JsonWebToken library used by 22,000 projects. (to the original material)
- Fake OnlyFans dating sites abuse UK Environment Agency open redirect. (to the original material)

- Details
- Written by: Merticaru Dorin Nicolae
- Category: Cyber Security News
- Hits: 87
- Russian and Belarusian men charged with spying for Russian GRU. (to the original material)
- Dridex targets MacOS users with a new delivery technique. (to the original material)
- Security Affairs newsletter Round 401 by Pierluigi Paganini. (to the original material)
- UN to Hold Hearing on Proposed Cybercrime Treaty. (to the original material)
- Hackers push fake Pokemon NFT game to take over Windows devices. (to the original material)

- Details
- Written by: Merticaru Dorin Nicolae
- Category: Cyber Security News
- Hits: 75
- Chick-fil-A launched an investigation into “suspicious activity”. (to the original material)
- IcedID malware campaign targets Zoom users. (to the original material)
- Hive Ransomware gang leaked 550 GB stolen from Consulate Health Care. (to the original material)
- NFT Developer Charged in $2.9 Million Fraud Scheme. (to the original material)
- Malicious PyPi packages create CloudFlare Tunnels to bypass firewalls. (to the original material)
- 0patch will keep releasing security updates for Microsoft Edge on Windows 7, Server 2008 and Server 2012. (to the original material)