Blog Dorin M
  • Blog
  • Login
  • Cyber Security Menu
    • Cyber Security News
    • Cyro and Cyrene
  1. You are here:  
  2. Home
  3. Cyber Security Menu
  4. Cyber Security News
Logo Cyber News

News from Cyber Security (12.12.2022)

Details
Written by: Merticaru Dorin Nicolae
Category: Cyber Security News
Published: 12 December 2022
Hits: 147
No comments on “News from Cyber Security (12.12.2022)”

Logo Dorin M Wolf

 

- Fortinet Releases Security Updates for FortiOS. (to the original material)
 
- Vulnerability Summary for the Week of December 5, 2022. (to the original material)
 
- Pulling the curtains on Azov ransomware: Not a skidsware but polymorphic wiper. (to the original material)
 
- 12th December – Threat intelligence report. (to the original material)
 
- Open banking: What online banking says about virtual shopper behavior. (to the original material)
 
- Cybersecurity Trends 2023: Securing our hybrid lives. (to the original material)
 
- HSE (Irish Health Service Executive) Cyber-Attack Costs Ireland $83m So Far. (to the original material)
 
- Chaos RAT Used to Enhance Linux Cryptomining Attacks. (to the original material)
 
- Royal Ransomware Targets US Healthcare. (to the original material)
 
- Transitive Dependencies Account for 95% of Bugs. (to the original material)
 
- North Korean Hackers Impersonate Researchers to Steal Intel. (to the original material)
 
- Researchers Find 63 Zero-Day Bugs at Latest Pwn2Own. (to the original material)
 
- Fortinet urges customers to fix actively exploited FortiOS SSL-VPN bug. (to the original material)
 
- Indian foreign ministry’s Global Pravasi Rishta portal leaks expat passport details. (to the original material)
 
- Cryptomining campaign targets Linux systems with Go-based CHAOS Malware. (to the original material)
 
- Evilnum group targets legal entities with a new Janicab variant. (to the original material)
 
- TrueBot infections were observed in Clop ransomware attacks. (to the original material)
 
- EFF to Court: No Qualified Immunity for Wrongful Arrest of Independent Journalists. (to the original material)
 
- Praetorian ‘open-sources’ its Nosey Parker secret scanning tool. (to the original material)
 
- Cloudflare’s zero-trust tools available free to public interest sites, nonprofits. (to the original material)
 
- Government of Vanuatu offline since early November in suspected ransomware attack. (to the original material)
 
- How MDR can improve threat hunting: An SC eBook preview. (to the original material)
 
- How to get truly offensive with pen tests. (to the original material)
 
- Uber Says Third Party Responsible for Latest Breach. (to the original material)
 
- Feds Clarify Mobile Health App Privacy, Security Reg Issues. (to the original material)
 
- Hydra Aftermath: Where Do Criminals Lurk Now? (to the original material)
 
- CommonSpirit Ransomware Breach Affects About 624,000 Individuals So Far. (to the original material)
 
- Royal Ransomware Hitting Healthcare Targets and Dumping Data. (to the original material)
 
- Vulnerability with public PoC affects Cisco IP phones, fix unavailable (CVE-2022-20968). (to the original material)
 
- Product showcase: The Intruder vulnerability management platform. (to the original material)
 
- Most startups have cyber insurance but are uncertain about how much risk is covered. (to the original material)
 
- Security is no longer an internal affair. (to the original material)
 
- Play ransomware claims attack on Belgium city of Antwerp. (to the original material)
 
- New Python malware backdoors VMware ESXi servers for remote access. (to the original material)
 
- Twitter confirms recent user data leak is from 2021 breach. (to the original material)
 
- Uber suffers new data breach after attack on vendor, info leaked online. (to the original material)
 
- Fortinet says SSL-VPN pre-auth RCE bug is exploited in attacks. (to the original material)
 
- Cloudflare's Zero Trust suite now available for free to at-risk groups. (to the original material)

 

Logo Dorin M Wolf

Logo Cyber News

News from Cyber Security (11.12.2022)

Details
Written by: Merticaru Dorin Nicolae
Category: Cyber Security News
Published: 11 December 2022
Hits: 160
No comments on “News from Cyber Security (11.12.2022)”

Logo Dorin M Wolf

 

- From disruption to destruction- Azov Ransomware presents a new shift towards destructive wipers. (to the original material)
 
- Pwn2Own Toronto 2022 Day 4: $989K awarded for 63 unique zero-days. (to the original material)
 
- Security Affairs newsletter Round 397. (to the original material)
 
- MuddyWater APT group is back with updated TTPs. (to the original material)
 
- Australian Telecom Firm Leaks Data of 130,000 Customers. (to the original material)
 
- Week in review: Rackspace outage, Kali Linux 2022.4 released, Patch Tuesday forecast. (to the original material)
 
- Clop ransomware uses TrueBot malware for access to networks. (to the original material)

 

Logo Dorin M Wolf

Logo Cyber News

News from Cyber Security (10.12.2022)

Details
Written by: Merticaru Dorin Nicolae
Category: Cyber Security News
Published: 10 December 2022
Hits: 154
No comments on “News from Cyber Security (10.12.2022)”

Logo Dorin M Wolf

 

- At least 4,460 vulnerable Pulse Connect Secure hosts are exposed to the Internet. (to the original material)

- US HHS warns healthcare orgs of Royal Ransomware attacks. (to the original material)

- Google brings passkey support to Chrome so you can ditch passwords. (to the original material)

- Air-gapped PCs vulnerable to data theft via power supply radiation. (to the original material)

- Hackers earn $989,750 for 63 zero-days exploited at Pwn2Own Toronto. (to the original material)
 
- At least 4,460 vulnerable Pulse Connect Secure hosts are exposed to the Internet. (to the original material)
 
- US HHS warns healthcare orgs of Royal Ransomware attacks. (to the original material)
 
- Rackspace Warns of Phishing Attempts Post-Ransomware. (to the original material)
 
- Air-gapped PCs vulnerable to data theft via power supply radiation. (to the original material)
 
- Hackers earn $989,750 for 63 zero-days exploited at Pwn2Own Toronto. (to the original material)

 

Logo Dorin M Wolf

Logo Cyber News

News from Cyber Security (09.12.2022)

Details
Written by: Merticaru Dorin Nicolae
Category: Cyber Security News
Published: 09 December 2022
Hits: 149
No comments on “News from Cyber Security (09.12.2022)”

Logo Dorin M Wolf

 

- Cisco Releases Security Advisory for IP Phone 7800 and 8800 Series. (to the original material)

- A Promising New GDPR Ruling Against Targeted Ads. (to the original material)

- eIDAS 2.0 Sets a Dangerous Precedent for Web Security. (to the original material)

- Will GDPR’s Win Against Facebook Change Advertising? (to the original material)

- How to Stop Social Media Data Collection. (to the original material)

- Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns. (to the original material)

- Aplicația Lensa Magic Avatars raises data security concerns. (to the original material)

- Diamond industry under attack – Week in security with Tony Anscombe. (to the original material)

- Xenomorph: What to know about this Android banking trojan. (to the original material)

- US Dept of Health warns of ‘increased’ Royal ransomware attacks on hospitals. (to the original material)

- Local governments allegedly targeted with Iranian ‘Drokbk’ malware through Log4j vulnerability. (to the original material)

- CommonSpirit confirms data breach impacts 623K patients. (to the original material)

- Pwn2Own Toronto 2022 Day 3: Participants earned nearly $1 million. (to the original material)

- Cisco discloses high-severity flaw impacting IP Phone 7800 and 8800 Series. (to the original material)

- Experts devised a technique to bypass web application firewalls (WAF) of several vendors. (to the original material)

- December 2022 Patch Tuesday forecast: Fine-tuning the connectivity. (to the original material)

- New infosec products of the week: December 9, 2022. (to the original material)

- Research reveals where 95% of open source vulnerabilities lie. (to the original material)

- PCI Secure Software Standard 1.2 released. (to the original material)

- Leveraging the full potential of zero trust. (to the original material)

- Number of vulnerable Log4j downloads remains high one year on. (to the original material)

- Active defense: Going on the offensive against cyber criminals. (to the original material)

- The Week in Ransomware - December 9th 2022 - Wide Impact. (to the original material)

- Rackspace warns of phishing risks following ransomware attack. (to the original material)

- Australia arrests 'Pig Butchering' suspects for stealing $100 million. (to the original material)

- Antivirus and EDR solutions tricked into acting as data wipers. (to the original material)

- Samsung Galaxy S22 hacked in 55 seconds on Pwn2Own Day 3. (to the original material)
 
- Cloud Atlas targets entities in Russia and Belarus amid the ongoing war in Ukraine. (to the original material)
 
- Check Point CloudGuard Spectral exposes new obfuscation techniques for malicious packages on PyPi. (to the original material)
 
- Truebot Malware Activity Increases With Possible Evil Corp Connections. (to the original material)
 
- BEC Attacks Expand Beyond Email and Toward Mobile Devices. (to the original material)
 
- Cobalt Mirage Affiliate Uses GitHub to Relay Drokbk Malware Instructions. (to the original material)
 
- Software Supply Chain Attacks Leveraging Open-Sources Repos Growing. (to the original material)
 
- #BHEU: UK Government Calls for Industry Input on its Cybersecurity Strategy. (to the original material)
 
- Government to Fund Security Studies for Hundreds of Students. (to the original material)
 
- Security Concerns Scupper Deals for Two-Thirds of Firms. (to the original material)
 
- Government Sets Out New Rules to Enhance App Security. (to the original material)
 
- Attackers lure victims to click on fake invoice to bypass Microsoft Office 365 email security. (to the original material)
 
- Truebot malware linked to Evil Corp shifts tactics to exploit RCEs, USBs. (to the original material)
 
- North Korean threat group exploiting Internet Explorer zero-day. (to the original material)
 
- The road to CNAPP (cloud-native app protection platform): Key steps to take on the path to deployment. (to the original material)
 
- How HTTP security headers can help harden web applications. (to the original material)
 
- How to develop your security team, even when you have no resources. (to the original material)
 
- What companies can do to lower cyber insurance costs. (to the original material)
 
- Australia Aims to Be World's 'Most Cyber-Secure' Country. (to the original material)
 
- Claroty CEO Yaniv Vardi on the Need to Guard Medical Devices. (to the original material)
 
- US Law Enforcement Arrests 4 for Business Email Compromise (BEC). (to the original material)
 
- ISMG Editors: How Will the Role of CISO Evolve in 2023? (to the original material)
 
- UK Government Rolls Out Security Guidance for Mobile Apps. (to the original material)
 
- Avoiding Roadblocks on the Path to Cybersecurity Maturity. (to the original material)
 
- Ransomware-Wielding Criminals Increasingly Hit Healthcare. (to the original material)
 
- A Plan to Address Future Healthcare Cyber Challenges. (to the original material)

 

Logo Dorin M Wolf

Logo Cyber News

News from Cyber Security (08.12.2022)

Details
Written by: Merticaru Dorin Nicolae
Category: Cyber Security News
Published: 08 December 2022
Hits: 139
No comments on “News from Cyber Security (08.12.2022)”

Logo Dorin M Wolf

 

- Cybersecurity news of the week (08.12.2022). (to the original material)

- Cybersecurity & Foreign Interference in the EU Information Ecosystem. (to the original material)

- CISA Releases Phishing Infographic. (to the original material)

- CISA Releases Three Industrial Control Advisories. (to the original material)

- Victory! Judge’s Critical Investigation of Patent Troll Companies Can Move Forward. (to the original material)

- How to Securely Shop With Your Credit Card: Use a Virtual Card & Check for Skimmers. (to the original material)

- Metropolitan Opera dealing with cyberattack that shut down website, box office. (to the original material)

- Zombinder APK binding service used in multiple malware attacks. (to the original material)

- Pwn2Own Toronto 2022 Day 2: Participants earned $281K. (to the original material)

- Android app with over 5m downloads leaked user browsing history. (to the original material)

- APT37 used Internet Explorer Zero-Day in a recent campaign. (to the original material)

- Apple unveils end-to-end encryption for iCloud backup, Photos, etc. (to the original material)

- Cybercriminals are scamming each other, tipping off law enforcement. (to the original material)

- Consumers prioritize mobile app security over features. (to the original material)

- How compliance leaders can encourage employees to report misconduct. (to the original material)

- Big but not so clever - ID fraudsters go for quantity over quality. (to the original material)

- Why air-gapping may not be enough to protect your critical systems. (to the original material)

- 67 percent of companies lose business deals over security strategy concerns. (to the original material)

- 62 percent of companies say cybersecurity incidents have impacted their operations. (to the original material)

- US Health Dept warns of Royal Ransomware targeting healthcare. (to the original material)

- Hacked corporate email accounts used to send MSP remote access tool. (to the original material)

- CommonSpirit Health ransomware attack exposed data of 623,000 patients. (to the original material)

- Cisco discloses high-severity IP phone zero-day with exploit code. (to the original material)

- Tor Browser 12.0 brings Apple Silicon support, Android enhancements. (to the original material)

- Google: How Android’s Private Compute Core protects your data. (to the original material)

- Samsung Galaxy S22 hacked again on second day of Pwn2Own. (to the original material)

- Automated dark web markets sell corporate email accounts for $2. (to the original material)

- New 'Zombinder' platform binds Android malware with legitimate apps. (to the original material)
 
- US Sues TikTok Over Child Safety and Data Security Claims. (to the original material)
 
- Iranian APT Agrius Targets Diamond Industry Worldwide With Fantasy Wiper. (to the original material)
 
- Apple Introduces New Data Protections to Increase Cloud Security. (to the original material)
 
- #BHEU: Time for Cyber Pros to Shape the Industry’s Future. (to the original material)
 
- Pet Dog Unmasks Drug Trafficker on Encrypted Chat. (to the original material)
 
- Investment Fraud Gang May Have Made $500m. (to the original material)
 
- Cyber-criminals Scammed Each Other Out of Millions in 2022. (to the original material)
 
- Vonage adds Salesforce encryption to its contact center. (to the original material)
 
- Business email compromise attacks going mobile via SMS and social media apps. (to the original material)
 
- Three cloud security lessons learned in 2022 – and the path forward. (to the original material)
 
- Hive Ransomware Group Leaks Data From European Retailer. (to the original material)
 
- Report: Outsourced HR Firm Sequoia One Undergoes Data Breach. (to the original material)
 
- Mobile Security Vendor Approov Hires New CEO to Expand in US. (to the original material)
 
- Akamai CEO on How Guardicore Prevents the Spread of Malware. (to the original material)
 
- One Brooklyn Health Not Over November Cyber Incident. (to the original material)
 
- Protecting Healthcare Against Ransomware: Essential Defenses. (to the original material)
 
- Novel Botnet Dubbed 'Zerobot' Targets Slew of IoT Devices. (to the original material)
 
- Cybersecurity Pros: Fresh Challenges Face 'Next Generation'. (to the original material)
 
- Ransomware Defense: Common Mistakes to Avoid. (to the original material)

 

Logo Dorin M Wolf

  1. News from Cyber Security (07.12.2022)
  2. News from Cyber Security (06.12.2022)
  3. News from Cyber Security (05.12.2022)
  4. News from Cyber Security (04.12.2022)

Page 11 of 152

  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15

Select your language

  • Română (România)
  • English (United Kingdom)
My Blog

Login Form

  • Forgot your password?
  • Forgot your username?

Main menu en-GB

  • Home

Popular Tags

Ransomware 60 Securitate 57 Cibernetica 57 Malware 37 Log4j 35 Cyber 30 Security 28 Phishing 27

Older Posts

  • What could prevent ZTA (Zero Trust Architecture) – Case study.
  • Threats associated with ZTA.
  • Zero Trust Principles
  • Introduction in Zero Trust Architecture (ZTA)
  • Zero Trust before anything
  • Login