Blog Dorin M
  • Blog
  • Login
  • Cyber Security Menu
    • Cyber Security News
    • Cyro and Cyrene
  1. You are here:  
  2. Home
  3. Cyber Security Menu
  4. Cyber Security News
Logo Cyber News

News from Cyber Security (02.12.2022)

Details
Written by: Merticaru Dorin Nicolae
Category: Cyber Security News
Published: 02 December 2022
Hits: 124
No comments on “News from Cyber Security (02.12.2022)”

Logo Dorin M Wolf

 

- This Judge’s Investigation Of Patent Trolls Must Be Allowed to Move Forward. (to the original material)

- India Requires Internet Services to Collect and Store Vast Amount of Customer Data, Building a Path to Mass Surveillance. (to the original material)

- Protecting major events: an incident response blueprint. (to the original material)

- ScarCruft updates its toolset – Week in security with Tony Anscombe. (to the original material)

- Chinese Gambling Spam Targets World Cup Keywords. (to the original material)

- Binance freezes $3 million worth of crypto stolen in Ankr hack. (to the original material)

- SIM-swapper gets 18 months, must pay back $20 million he stole from crypto investor. (to the original material)

- Spanish police arrest 55 people involved in wide-ranging cyberscam operation. (to the original material)

- More than 150 Oracle Access Management systems exposed to bug highlighted by CISA. (to the original material)

- Attack of drones: airborne cybersecurity nightmare. (to the original material)

- Cuba Ransomware received over $60M in Ransom payments as of August 2022. (to the original material)

- Android Keyboard Apps with 2 Million downloads can remotely hack your device. (to the original material)

- All of Medibank’s stolen data leaked, Australia increases maximum penalties for data breaches. (to the original material)

- New infosec products of the week: December 2, 2022. (to the original material)

- CI Fuzz CLI: Open-source tool to test Java apps for unexpected behaviors. (to the original material)

- Financial organizations more prone to accidental data leakage. (to the original material)

- Zero-trust architecture: A cybersecurity must-have. (to the original material)

- The Week in Ransomware - December 2nd 2022 - Disrupting Health Care. (to the original material)

- Google Chrome emergency update fixes 9th zero-day of the year. (to the original material)

- DHS Cyber Safety Board to review Lapsus$ gang’s hacking tactics. (to the original material)

- BlackProxies proxy service increasingly popular among hackers. (to the original material)

- New CryWiper data wiper targets Russian courts, mayor’s offices. (to the original material)

- Police arrest 55 members of 'Black Panthers' SIM Swap gang. (to the original material)

- How Windows 11's Enhanced Phishing Protection guards your password. (to the original material)
 
- Three Ways to Stay Cyber Secure During the World Cup. (to the original material)
 
- Google Increases Android Security With Memory-Safe Programming Languages. (to the original material)
 
- 'Black Proxies' Enable Threat Actors to Conduct Malicious Activity. (to the original material)
 
- Hackers Use Archive Files and HTML Smuggling to Bypass Detection Tools. (to the original material)
 
- Industry Coalition Urges Congress to Hold off on SBOM (Software Bill Of Materials) Requirements for Defense Contractors. (to the original material)
 
- NATO Launches Massive Cyber-Defense Exercise. (to the original material)
 
- Cuba Ransomware Actors Pocket $60m. (to the original material)
 
- Trojan Steals Facebook Details from Over 300K Victims. (to the original material)
 
- ‘Black Proxies’ use 187,000-plus IP addresses to launch credential stuffing attacks. (to the original material)
 
- LastPass cloud breach involves ‘certain elements’ of customer information. (to the original material)
 
- Five reasons why we can expect a major cyberattack on a healthcare organization in 2023. (to the original material)
 
- Cuba Ransomware Targeting Critical Infrastructure, Feds Warn. (to the original material)
 
- Pediatric EMR Vendor Hack Affects 2.2 Million. (to the original material)
 
- Tories: Firms Should Pay More for Cybersecurity Regulation. (to the original material)
 
- Clumio CEO on Why AWS S3 Buckets Pose a Giant Security Risk. (to the original material)
 
- ISMG Editors: Twitter Breach May Be Worse Than Advertised. (to the original material)
 
- Hacked: What's the Next Step for Web3 Companies? - Part 2. (to the original material)
 
- Securing Federal Government Contractors. (to the original material)
 
- Use Obfuscation, Monitoring and RASP (Runtime Application Self-Protection) to Deepen DevSecOps. (to the original material)
 
- Most Healthcare Ransomware Hits Include Patient Data Theft. (to the original material)
 
- No Pressure: Water Utility Drips Alert 4 Months After Breach. (to the original material)

 

Logo Dorin M Wolf

Logo Cyber News

News from Cyber Security (01.12.2022)

Details
Written by: Merticaru Dorin Nicolae
Category: Cyber Security News
Published: 01 December 2022
Hits: 132
No comments on “News from Cyber Security (01.12.2022)”

Logo Dorin M Wolf

 

- Cybersecurity news of the week (01.12.2022). (to the original material)

- Going to the market for Cybersecurity Market Analysis. (to the original material)

- #StopRansomware: Cuba Ransomware. (to the original material)

- CISA Releases Three Industrial Control Systems Advisories. (to the original material)

- How to Make a Mastodon Account and Join the Fediverse. (to the original material)

- International Coalition of Rights Groups Call on Internet Infrastructure Providers to Avoid Content Policing. (to the original material)

- The End of Facebook’s Dominance on Social Media? Who Will Seize The Crown, And What Does It Mean For Privacy? (to the original material)

- Top tips to save energy used by your electronic devices. (to the original material)

- CISA: Cuba ransomware group has stolen $60 million from at least 100 organizations. (to the original material)

- Hackers accessed LastPass customer details using information stolen in August hack. (to the original material)

- British police ‘overwhelmed and ineffective’ at digital forensics, inspectorate report finds. (to the original material)

- Ransomware group may have stolen customer bank details from British water company. (to the original material)

- New Go-based Redigo malware targets Redis servers. (to the original material)

- 3 of the Worst Data Breaches in the World That Could Have Been Prevented. (to the original material)

- North Korea ScarCruft APT used previously undetected Dolphin Backdoor against South Korea. (to the original material)

- Lastpass discloses the second security breach this year. (to the original material)

- LastPass, GoTo announce security incident. (to the original material)

- A year later, Log4Shell still lingers. (to the original material)

- Predatory loan mobile apps grab data, harass users and their contacts. (to the original material)

- Federal defense contractors are not properly securing military secrets. (to the original material)

- Security pros feel threat detection and response workloads have increased. (to the original material)

- Infosec products of the month: November 2022. (to the original material)

- Malicious bots are targeting your apps. Here’s how to shut them down. (to the original material)

- Small business versus enterprise - what are the challenges around security? (to the original material)

- Identity fraud doubles in crypto and banking sectors. (to the original material)

- Cyber extortion dominates the threat landscape. (to the original material)

- Dropbox is bringing end-to-end encryption to business users thanks to Boxcryptor acquisition. (to the original material)

- Samsung, LG, Mediatek certificates compromised to sign Android malware. (to the original material)

- Android malware infected 300,000 devices to steal Facebook accounts. (to the original material)

- FBI: Cuba ransomware raked in $60 million from over 100 victims. (to the original material)

- New Redigo malware drops stealthy backdoor on Redis servers. (to the original material)

- New DuckLogs malware service claims having thousands of ‘customers’. (to the original material)

- Hyundai app bugs allowed hackers to remotely unlock, start cars. (to the original material)
 
- Is there a way for healthcare providers to prevent cyber-attacks from spreading? (to the original material)
 
- Check Point Research analyzes files on the Dark Web and finds millions of records available. (to the original material)
 
- Hackers Target Colombia's Healthcare System With Ransomware. (to the original material)
 
- Spyware Vendor Variston Exploited N-Days in Chrome, Firefox, Windows. (to the original material)
 
- WhatsApp Files on Dark Web Show Millions of Records For Sale. (to the original material)
 
- UK Extends NIS Regulations to IT Managed Service Providers. (to the original material)
 
- Eight Charged with $30m Unemployment Benefits Fraud. (to the original material)
 
- Researchers Accidentally Crash Cryptomining Botnet. (to the original material)
 
- LastPass Reveals Another Customer Data Breach. (to the original material)
 
- Archives overtake Office formats as top file type for delivering malware. (to the original material)
 
- Delinea CloudSuite promises more granular privileged access management. (to the original material)
 
- As the economy slows, the need for security heightens. (to the original material)
 
- Zscaler CEO: 'Uncertainty Can Act as a Catalyst for Change'. (to the original material)
 
- Medibank Hackers Dump Stolen Data on the Dark Web. (to the original material)
 
- HHS: Web Trackers in Patient Portals Violate HIPAA. (to the original material)
 
- LastPass Breach Exposes Customer Data. (to the original material)
 
- Ransom Realpolitik: Paying for Data Deletion Is for Suckers. (to the original material)
 
- Essential Aerospace and Defense Software Security Practices. (to the original material)
 
- Why Ransomware Victims Avoid Calling It 'Ransomware'. (to the original material)

 

Logo Dorin M Wolf

Logo Cyber News

News from Cyber Security (30.11.2022)

Details
Written by: Merticaru Dorin Nicolae
Category: Cyber Security News
Published: 30 November 2022
Hits: 190
No comments on “News from Cyber Security (30.11.2022)”

Logo Dorin M Wolf

 

- Pairing up Cybersecurity and Data Protection Efforts: EDPS and ENISA sign Memorandum of Understanding. (to the original material)
 
- Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin. (to the original material)
 
- Three out of four organizations are still vulnerable to Log4Shell. (to the original material)
 
- Cybersecurity budgets are up but aren't being well spent. (to the original material)
 
- Researchers Find a Way Malicious NPM Libraries Can Evade Vulnerability Detection. (to the original material)
 
- This Malicious App Abused Hacked Devices to Create Fake Accounts on Multiple Platforms. (to the original material)
 
- French Electricity Provider Fined for Storing Users' Passwords with Weak MD5 Algorithm. (to the original material)
 
- Australia Passes Bill to Fine Companies up to $50 Million for Data Breaches. (to the original material)
 
- 3 New Vulnerabilities Affect OT Products from German Companies Festo and CODESYS. (to the original material)
 
- Chinese Cyber Espionage Hackers Using USB Devices to Target Entities in Philippines. (to the original material)
 
- 33% of attacks in the cloud leverage credential access. (to the original material)
 
- CISOs’ priorities for the coming year. (to the original material)
 
- GoTo says hackers breached its dev environment, cloud storage. (to the original material)
 
- Keralty ransomware attack impacts Colombia's health care system. (to the original material)
 
- Critical RCE bugs in Android remote keyboard apps with 2M installs. (to the original material)
 
- Lastpass says hackers accessed customer data in new breach. (to the original material)
 
- New Windows malware also steals data from victims’ mobile phones. (to the original material)
 
- Cybersecurity researchers take down DDoS botnet by accident. (to the original material)
 
- Australia will now fine firms up to AU$50 million for data breaches. (to the original material)
 
- Google discovers Windows exploit framework used to deploy spyware. (to the original material)
 
- NVIDIA releases GPU driver update to fix 29 security flaws. (to the original material)
 
- Android and iOS apps with 15 million installs extort loan seekers. (to the original material)
 
- Crafty threat actor uses 'aged' domains to evade security platforms. (to the original material)
 
- Acer Fixes Bugs That Enable Attackers to Bypass Secure Boot. (to the original material)
 
- How to Carry Out a Crypto Heist - Part 1. (to the original material)
 
- Brooklyn Hospitals Decried for Silence on Cyber Incident. (to the original material)
 
- UK Court Orders Crypto Firms to Share Data to Track Thieves. (to the original material)
 
- Okta Clears Up Customer Identity Confusion as SMB Sales Dip. (to the original material)
 
- Attackers lure users to install malware via TikTok challenge. (to the original material)
 
- A syntax error took down the KmsdBot cryptomining botnet, effectively killing it. (to the original material)
 
- How security leaders can clarify priorities to fuel accelerated outcomes. (to the original material)
 
- Why cloud security has become a top priority in the 5G era. (to the original material)
 
- Google links three exploitation frameworks to Spanish commercial spyware vendor Variston. (to the original material)
 
- Attackers abused the popular TikTok Invisible Challenge to spread info-stealer. (to the original material)
 
- China-linked UNC4191 APT relies on USB Devices in attacks against entities in the Philippines. (to the original material)
 
- ENC Security, the encryption provider for Sony and Lexar, leaked sensitive data for over a year. (to the original material)
 
- Majority of US Defense Contractors Not Meeting Basic Cybersecurity Requirements. (to the original material)
 
- Australian Parliament Passes Privacy Penalty Bill. (to the original material)
 
- China-Based Hackers Target Southeast Asia With USB-Based Malware. (to the original material)
 
- Zero-Day Flaw Discovered in Quarkus Java Framework. (to the original material)
 
- Businesses Increasing Cyber Spend Without Clear Strategy, Fastly Finds. (to the original material)
 
- Let's Encrypt Issues Three Billionth Certificate. (to the original material)
 
- Most Small Biz IaaS Users Seeing Surge in Attacks. (to the original material)
 
- New "Icefall" Bugs Include Critical DoS Flaw. (to the original material)
 
- Let Data Breach Victims Sue Marriott. (to the original material)
 
- Let Them Know: San Francisco Shouldn’t Arm Robots. (to the original material)

 

Logo Dorin M Wolf

Logo Cyber News

News from Cyber Security (29.11.2022)

Details
Written by: Merticaru Dorin Nicolae
Category: Cyber Security News
Published: 29 November 2022
Hits: 167
No comments on “News from Cyber Security (29.11.2022)”

Logo Dorin M Wolf

 

- CISA Releases Seven Industrial Control Systems Advisories. (to the original material)
 
- Vulnerability Summary for the Week of November 21, 2022. (to the original material)
 
- Vote for Zero Trust early and often. (to the original material)
 
- EU Council adopts the NIS2 directive. (to the original material)
 
- Pre-auth RCE in Oracle Fusion Middleware exploited in the wild (CVE-2021-35587). (to the original material)
 
- The top 200 most common passwords in 2022 are bad, mkay? (to the original material)
 
- Cybercriminals are cashing in on FIFA World Cup-themed cyberattacks. (to the original material)
 
- Trigona ransomware spotted in increasing attacks worldwide. (to the original material)
 
- Let’s Encrypt issued over 3 billion certificates, securing 309M sites for free. (to the original material)
 
- Spanish police dismantle operation that made €12M via investment scams. (to the original material)
 
- Ransomware detection with Wazuh SIEM and XDR platform. (to the original material)
 
- Microsoft Defender boosts default protection for all enterprise users. (to the original material)
 
- CrowdStrike Sales Growth Slows as SMB Clients Delay Spending. (to the original material)
 
- UK Companies Fear Reporting Cyber Incidents, Parliament Told. (to the original material)
 
- HHS Rule to Ease Record Sharing, Guard Substance Abuse Data. (to the original material)
 
- TSA Plans Cyber Risk Regulation for Pipeline and Rail Sector. (to the original material)
 
- Why Are HIPAA Fines Down 93% - With Data Breaches Soaring? (to the original material)
 
- Cybersecurity Stigma: More Victims Avoid Saying 'Ransomware'. (to the original material)
 
- Over half of SMBs using the cloud faced more attacks in the past year. (to the original material)
 
- Security, ESG (Environmental, Social and Governance) are the top two risks for corporate audit professionals. (to the original material)
 
- Cybercriminals look to exploit sports fans with World Cup-themed attacks. (to the original material)
 
- Adversary disruption: We can’t underestimate the power of public-private collaboration. (to the original material)
 
- Five ways security teams can create continuous security for APIs. (to the original material)
 
- Threat actors are offering access to corporate networks via unauthorized Fortinet VPN access. (to the original material)
 
- CISA adds Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities Catalog. (to the original material)
 
- Tips for Gamifying Your Cybersecurity Awareness Training Program. (to the original material)
 
- Irish data protection commission fines Meta over 2021 data-scraping leak. (to the original material)
 
- Tips for International Computer Security Day. (to the original material)
 
- CISOs look to balance transformation and cybersecurity. (to the original material)
 
- WordPress Vulnerability & Patch Roundup November 2022. (to the original material)
 
- New Flaw in Acer Laptops Could Let Attackers Disable Secure Boot Protection. (to the original material)
 
- Hackers Using Trending TikTok 'Invisible Challenge' to Spread Malware. (to the original material)
 
- 7 Cyber Security Tips for SMBs. (to the original material)
 
- Irish Regulator Fines Facebook $277 Million for Leak of Half a Billion Users' Data. (to the original material)
 
- CISA Warns of Actively Exploited Critical Oracle Fusion Middleware Vulnerability. (to the original material)
 
- Oracle Fusion Middleware Vulnerability Actively Exploited in the Wild: CISA. (to the original material)
 
- PII May Have Been Stolen in Virginia County Ransomware Attack. (to the original material)
 
- US Census Bureau Head Fends Off Critics of 'Differential Privacy' Tool. (to the original material)
 
- Police Shutter 13,000 Sites in Piracy Crackdown. (to the original material)
 
- Ireland’s DPC Fines Meta €265m Following Large-Scale Data Leak. (to the original material)
 
- Experts Find 16,000+ Scam FIFA World Cup Domains. (to the original material)
 
- Web App and API Attacks Surge 257% in Financial Services. (to the original material)
 
- Coalition of Human Rights, LGBTQ+ Organizations Tell Congress to Oppose the Kids Online Safety Act. (to the original material)
 
- From Camera Towers to Spy Blimps, Border Researchers Now Can Use 65+ Open-licensed Images of Surveillance Tech from EFF. (to the original material)

 

Logo Dorin M Wolf

Logo Cyber News

News from Cyber Security (28.11.2022)

Details
Written by: Merticaru Dorin Nicolae
Category: Cyber Security News
Published: 28 November 2022
Hits: 154
No comments on “News from Cyber Security (28.11.2022)”

Logo Dorin M Wolf

 

- CISA Adds Two Known Exploited Vulnerabilities to Catalog. (to the original material)
 
- Red Alert: The SFPD (San Francisco Police Department) want the power to kill with robots. (to the original material)
 
- Is Elon Begging Us to Look for Twitter Alternatives? The Silver Lining of Twitter’s Deepening Woes. (to the original material)
 
- What I Learned About Privacy Laws in the US. (to the original material)
 
- 7 free cybersecurity resources you need to bookmark. (to the original material)
 
- Many Global 2000 companies lack proper domain security. (to the original material)
 
- Acer fixes UEFI bugs that can be used to disable Secure Boot. (to the original material)
 
- Malicious Android app found powering account creation service. (to the original material)
 
- TikTok ‘Invisible Body’ challenge exploited to push malware. (to the original material)
 
- Cyber Monday deal: Get 50% off Malwarebytes Premium, Privacy VPN. (to the original material)
 
- Meta fined €265M for not protecting Facebook users' data from scrapers. (to the original material)
 
- The Cyber Monday 2022 Security, IT, VPN, & Antivirus Deals. (to the original material)
 
- US bans sales of Huawei, Hikvision, ZTE, and Dahua equipment. (to the original material)
 
- Meta Fined by Irish Privacy Regulator for GDPR Violations. (to the original material)
 
- Indiana Health Entity Reports Breach Involving Tracking Code. (to the original material)
 
- UK Online Safety Bill Harms Privacy & Security, Experts Say. (to the original material)
 
- Greater Toronto School Offline Following 'Cyber Incident'. (to the original material)
 
- Cybercrime Forum Dumps Stolen Details on 5.4M Twitter Users. (to the original material)
 
- Addressing the Shortage of Medical Device Cyber Talent. (to the original material)
 
- Attackers target vulnerable financial customers, rather than the institutions themselves. (to the original material)
 
- Trend Micro’s Cloud Sentry promises increased visibility into cloud environments. (to the original material)
 
- The top five risks mitigated by network and security convergence. (to the original material)
 
- A flaw in some Acer laptops can be used to bypass security features. (to the original material)
 
- Experts found a vulnerability in AWS AppSync. (to the original material)
 
- RansomBoggs Ransomware hit several Ukrainian entities, experts attribute it to Russia. (to the original material)
 
- RansomBoggs: New ransomware targeting Ukraine. (to the original material)
 
- Researchers Detail AppSync Cross-Tenant Vulnerability in Amazon Web Services. (to the original material)
 
- The 5 Cornerstones for an Effective Cyber Security Awareness Training. (to the original material)
 
- Over a Dozen New BMC Firmware Flaws Expose OT and IoT Devices to Remote Attacks. (to the original material)
 
- Elon Musk Confirms Twitter 2.0 will Bring End-to-End Encryption to Direct Messages. (to the original material)
 
- Elon Musk Unveils End-to-End Encrypted DMs For Twitter 2.0. (to the original material)
 
- Phishing Campaign Impersonating UAE Ministry of Human Resources Grows. (to the original material)
 
- Millions of Twitter Accounts Potentially Compromised. (to the original material)
 
- Orange Cyberdefense Unveils Its Security Navigator With OT Hacking Demos. (to the original material)
 
- Belgian Police Under Fire After Major Ransomware Leak. (to the original material)
 
- Russian Sandworm Hackers Linked to New Ransomware Blitz. (to the original material)
 
- African Police Bust $800K Fraud Schemes. (to the original material)

 

Logo Dorin M Wolf

  1. News from Cyber Security (27.11.2022)
  2. News from Cyber Security (26.11.2022)
  3. News from Cyber Security (25.11.2022)
  4. News from Cyber Security (24.11.2022)

Page 13 of 152

  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17

Select your language

  • Română (România)
  • English (United Kingdom)
My Blog

Login Form

  • Forgot your password?
  • Forgot your username?

Main menu en-GB

  • Home

Popular Tags

Ransomware 60 Securitate 57 Cibernetica 57 Malware 37 Log4j 35 Cyber 30 Security 28 Phishing 27

Older Posts

  • What could prevent ZTA (Zero Trust Architecture) – Case study.
  • Threats associated with ZTA.
  • Zero Trust Principles
  • Introduction in Zero Trust Architecture (ZTA)
  • Zero Trust before anything
  • Login