Study - Technical - LMS-SFC (EN) - Cyber Security - News Archive December 2021


Cyber Security - News Archive

December 2021



- Supply chains, ransomware, zero trust and other security predictions for 2022. (to the original material)

- Exploring the curent state of cybersecurity resilience. (to the original material)

- The pandemic is changing technology solutions for the future of work. (to the original material)

- Top 10 Computer Weekly downtime upload podcasts of 2021. (to the original material)

- Top 10 crime, national security and law stories of 2021. (to the original material)

- 2021 review: The main channel themes. (to the original material)

- Top 10 startup stories of 2021. (to the original material)

- Pulse TV discloses potential compromise of 200,000 credit cards. (to the original material)

- Top 10 healthcare breaches in the U.S. exposed data of 19 million. (to the original material)

- Netgear leaves vulnerabilities unpatched in Nighthawk router. (to the original material)

- Block this now: Cobalt Strike and other Red-team tools. (to the original material)


- Cybersecurity News of the Week (30.12.2021). (to the original material)

- 22 cybersecurity statistics to know for 2022. (to the original material)

< Forrester as cybersecurity incident response services provider. (to the original material)

- 5 common gift card scams and how to spot them. (to the original material)

- Emotet now drops Cobalt Strike, fast forwards ransomware attacks. (to the original material)

- Grafana fixes zero-day vulnerability after exploits spread over Twitter. (to the original material)

- Alleged ransomware affiliate arrested for healthcare attacks. (to the original material)

- U.S. universities targeted by Office 365 phishing attacks. (to the original material)

- New Cerber ransomware targets Confluence and GitLab servers. (to the original material)

- Google disrupts massive Glupteba botnet, sues Russian operators. (to the original material)

- 27 flaws in USB-over-network SDK affect millions of cloud users. (to the original material)

- German security company G DATA has launched a STOP ransomware vaccine released to block encryption. (to the original material)

- QNAP warns users of bitcoin miner targeting their NAS devices. (to the original material)

- Twitter bots pose as support staff to steal your cryptocurrency. (to the original material)

- Nordic Choice Hotels hit by Conti ransomware, but there is no ransom demand yet. (to the original material)

- Below the Surface: Bot Attacks: Top threats and trends (to the original material)

- Omicron scam targets universities. (to the original material)

- Vulnerabilities found in GOautodial. (to the original material)

- Just 3% of UK firms escaped a supply chain breach in 2021. (to the original material)

- 96% of ransomware victims who paid the ransom agree to pay additional extortion fees. (to the original material)

- UK's poor cyber risk planning could "wreak havoc". (to the original material)

- The technical support during the holidays guide: Repair and strengthen the family's router. (to the original material)

- Most security leaders worry traditional approach doesn't shield again supply chain attacks. (to the original material)

- Why a password manager could be your most vital security tool. (to the original material)

- First Circuit affirms school's punishment of students for online social media posts. (to the original material)

- Pay a hacker, save a life. (to the original material)

- Microsoft Whac-A-Moles websites of Chinese hackers APT15 ("Nickel"). (to the original material)

- The Linux Foundation embraces CASE for cyber security forensics. (to the original material)

- Cloud protection over bifurcated network security. (to the original material)

- Charitable giving sector a major cyberattack target. (to the original material)

- Cambridge Quantum launches cryptographic key service. (to the original material)


- Zoho releases security advisory for ManageEngine Desktop Central and Desktop Central MSP. (to the original material)

- CISA releases security advisory on WebHMI vulnerabilities. (to the original material)

- Vulnerabilities summary for the week of November 29, 2021. (to the original material)

- Kafdrop flaw allows data from Kafka clusters to be exposed internet-wide. (to the original material)

- Making robotics security a top priority. (to the original material)

- 2022 and the threat landscape: The top 5 future cybersecurity challenges. (to the original material)

- Fraudulent e-commerce transactions spiked between Thanksgiving and Cyber Monday. (to the original material)

- Cybercrime supply chain: Fueling the rise in ransomware. (to the original material)

- How proactive are companies when managing data? (to the original material)

- Increased connectivity: What's in store for 2022? (to the original material)

- Quantum computing market to reach $8.6 billion in 2027. (to the original material)

- What are buffer overflow attacks and how are they thwarted? (to the original material)

- Microsoft seizes sites used by APT15 Chinese state hackers. (to the original material)

- France warns of Nobelium cyberspies attacking French organizations. (to the original material)

- Hundreds of SPAR (chain of shops in the north of England) stores shut down, switching to cash after cyberattack. (to the original material)

- WhatsApp adds default disappearing messages for new chats. (to the original material)

- Securing the everywhere cloud. (to the original material)

- Prison for Newstar Enterprise websites administrator, money launderer. (to the original material)

- Cyberattack shutting down the work of several SPAR convenience stores in UK. (to the original material)

- BitMart confirms $150 million crypto theft. (to the original material)

- Cuba ransomware network extort nearly $50 million. (to the original material)

- Nine State Department officials had their iPhones hacked, hijacked by spyware. (to the original material)

- Romance fraudster pleads guilty to charges of fraud and online money laundering in the case of 670 female victims. (to the original material)

- WooCommerce credit card swiper injected into random plugin files. (to the original material)

- How federal agencies can thwart nation-state attacks. (to the original material)

- Home routers are full of security bugs - patch now. (to the original material)

- Ikea Reply Chain Attack spotlights need for security boost. (to the original material)

- Your CEO isn't real: How to deal with deep fakes. (to the original material)

- Interview with Nathan Collins – PAVilion. (to the original material)


- Beware of SIM swap fraud. (to the original material)

- Convincing Microsoft phishing uses fake Office 365 spam alerts. (to the original material)

- As Twitter removes blue badges for many, phishing campaign targets verified accounts. (to the original material)

- Week in review: 150+ HP multifunction printers open to attack, how to combat ransomware with visibility. (to the original material)

- Russian hacking group (Nobelium) uses new Ceeloader malware. (to the original material)

- Malicious Excel XLL add-ins distribute RedLine password-stealing malware. (to the original material)

- Persuasive Phishing Microsoft uses fake Office 365 spam alerts. (to the original material)

- As Twitter removes the blue badges for many, phishing targets verified accounts. (to the original material)

- Enterprise security leaders think traditional methods aren't meeting modern threats. (to the original material)

- Software developers at biggest risk of cybersecurity breaches. (to the original material)

- New report identifies malicious activity "hotspots". (to the original material)

- Meta explains why it is taking so long to bring end-to-end encryption to Facebook Messenger and Instagram – and what it is doing in the meantime. (to the original material)

- Why remote workforces needs better strategies for security and data protection (Q&A). (to the original material)


- Malicious KMSPico installers steal your cryptocurrency wallets. (to the original material)

- Many businesses still refuse to shake legacy systems and processes. (to the original material)

- Mid-market businesses are particularly ill-equipped to shield against attacks. (to the original material)

- B2B are getting cold feet on buying decisions. (to the original material)

- Many workers are fed up with faulty IT kits. (to the original material)

- Google Cloud hacks mostly used for illegal cryptomining. (to the original material)

- Malware gets more sophisticated and is more likely to demand a ransom. (to the original material)

- International Computer Security Day seeks to raise awareness. (to the original material)

- Vulnerabilities found in HP multi-function printers. (to the original material)

- Zoom boosts security with automatic updates for Windows and macOS – but Linux users miss out. (to the original material)

- Telehealth takes off, but cybersecurity concerns persist. (to the original material)

- 0patch beats Microsoft to fix serious local privilege escalation vulnerability in Windows. (to the original material)


- 7 arrested in Malta on suspicion of illegal money transfers. (to the original material)

- Going with all the acceleration in terms of cybersecurity certification and the market. (to the original material)

Determined APT group exploits ManageEngine SeviceDesk Plus vulnerability (CVE-2021-44077). (to the original material)

- New InfoSec products of the week: December 3, 2021. (to the original material)

- Major trends in online identity verification for 2022. (to the original material)

- Tor2Mine cryptominer has evolved: Just patching and cleaning the system won't help. (to the original material)

- Phishing kits' favorite brand? Amazon. (to the original material)

- Top technological trends for 2022. (to the original material)

- Enterprises are embracing the multicloud, turning to providers for strategy. (to the original material)

- SMS firewalls revenue to reach $4.1 billion in 2026. (to the original material)

- The Week in ransomware - December 3, 2021 - Seizing Bitcoin. (to the original material)

- U.S. State Dept employees' phones hacked using NSO spyware. (to the original material)

- Fake support agents call victims to install Android banking malware. (to the original material)

- FBI: Cuba ransomware breached 49 US critical infrastructure organizations. (to the original material)

- Researchers discover 14 new data-stealing web browser attacks. (to the original material)

- Zoho: Patch new ManageEngine bug exploited in attacks ASAP. (to the original material)

- Ex Ubiquiti developer arrested for data theft. (to the original material)

- UK Government fined over honors list data breach. (to the original material)

- The U.S. develops cybersecurity directives for airlines and rails. (to the original material)

- Twitter and Meta Tackle Anti-Vaxxers and Chinese disinformation. (to the original material)

- Misconfigured database leaks info on 150,000 e-commerce buyers. (to the original material)

- Omicron phishing campaign hits users' inboxes. (to the original material)

- Threat Roundup for November 26 to December 3. (to the original material)

- Talos Takes, ep. 79: Emotet's back with the worst type of holiday present. (to the original material)

- Week in security with Tony Anscombe. (to the original material)

- Scammers exploit Omicron fears in new Covid-19 phishing campaign. (to the original material)

- Is my site hacked? 4 Gut checks. (to the original material)

- $150 million stolen in "imaginary money" crypto/DeFi hacks. (to the original material)

- Is artificial intelligence (AI) the future of cybersecurity? (to the original material)

- Widespread threats target automotive companies. (to the original material)

- Interview with Ivan Spencer-Phillips – Astaris. (to the original material)

- Interview with Jay Akin – Mushroom Networks. (to the original material)

- Interview with Tunio Zafer – pCloud. (to the original material)

- Interview with Hen Lamay – Deceptive Bytes. (to the original material)


- CISA and FBI release alert on active exploitation of CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus. (to the original material)

- Mozilla releases security updates for network security services. (to the original material)

- NSA and CISA release Part III of guidance on securing 5G cloud infrastructures. (to the original material)

- Cybersecurity news of the week (02.12.2021). (to the original material)

- Exploring container security: A storage vulnerability deep dive. (to the original material)

- Acra: Open-source database protection with field-level encryption and intrusion detection. (to the original material)

- The importance of vulnerability management for your organization. (to the original material)

- How phishing kits are enabling a new legion of pro phishers. (to the original material)

- Open source cloud native security analyzer Terrascan embeds security into native DevOps tooling. (to the original material)

- Malware variants in 2021: Harder to detect and respond to. (to the original material)

- Railway cyber risk management: Raising awareness on relevant threats. (to the original material)

- The 5G market is about to take off: What to expect in 2022 and beyond. (to the original material)

- Phishing actors start exploiting the Omicron Covid-19 variant. (to the original material)

- Twitter removes 3,400 accounts used in government propaganda campaigns. (to the original material)

- Hackers use the in-house Zoho ServiceDesk exploit to drop webshells. (to the original material)

- Russian internet watchdog announces ban of six more VPN products. (to the original material)

- Nine WiFi routers used by millions of people were vulnerable to 266 flaws. (to the original material)

- New malware hides as legit nginx process on e-commerce servers. (to the original material)

- Phishing scam targets military families. (to the original material)

- Holiday season fraud fear higher this year. (to the original material)

- Police arrest 1,800 people in major money laundering crackdown. (to the original material)

- The leader of the Russian Bulletproof hosting Kingpin gets 5 years in prison. (to the original material)

- Double extortion ransomware victims soar 935%. (to the original material)

- Threat source newsletter (December 2, 2021). (to the original material)

- Magnat campaigns use malvertising to deliver information stealer, backdoor and malicious Chrome extensions. (to the original material)

- Technical support during the holidays guide: Checking your family's computer. (to the original material)

- How to outplay the ransomware Playbook. (to the original material)

- Security hygiene and posture management remain challenging. (to the original material)


- CISA adds five known exploited vulnerabilities to Catalog. (to the original material)

- Over 300,000 users downloaded malware droppers from Google Play. (to the original material)

- The ripple effect: Why protection against supply chain attacks is a must. (to the original material)

- Despite the popularity of password managers, many still use pen and paper. (to the original material)

- Control failures are behind a growing number of cybersecurity incidents. (to the original material)

- Alarming rise in cyberattacks against healthcare facilities, 68 attacks in the third quarter of 2021 only. (to the original material)

- How can businesses realize the true value of digital transformation? (to the original material)

- InfoSec products of the month: November 2021. (to the original material)

- Microsoft Exchange servers hacked to deploy BlackByte ransomware. (to the original material)

- Europol: 18,000 money mules caught laundering money from online fraud. (to the original material)

- VirusTotal collection feature helps keep neat IoC (Indicator of Compromise) lists. (to the original material)

- State-backed hackers increasingly use RTF (Rich Text Format) injection for phishing. (to the original material)

- Malicious Android app steals Malaysian bank credentials and MFA codes. (to the original material)

- Mozilla fixes critical bug in the cross-platform cryptography library. (to the original material)

- Twitter to remove the images of people posted without the consent of the subject in private media. (to the original material)

- Organizations now have 76 security tools to manage. (to the original material)

- HP printer hijack bugs impact 150 models. (to the original material)

- Head of MI6: Digital attack surface growing "exponentially". (to the original material)

- Vulnerabilities Spotlight: Use-after-free condition in Google Chrome could lead to code execution. (to the original material)

- Jumping the air gap: 15 years of nation-state effort. (to the original material)

- Planned Parenthood LA discloses data breach after ransomware attack. (to the original material)

- Emotet now spreads via Adobe Windows app installer fake packages. (to the original material)

- Former Ubiquiti developer charged with trying to extort his employer. (to the original material)

- The founder of Bulletproof Hosting imprisoned for help cybercrime gangs. (to the original material)

- WordPress Admin Creator – A simple but effective attack. (to the original material)

- PrivSec Global: Why the Council of Europe's police surveillance treaty is a pernicious influence on Latam legal privacy frameworks. (to the original material)

- Facebook's secret "Dangerous Organizations and Individuals" list creates problems for the company - and its users. (to the original material)

- The Internet needs fair rules of the road - and competitive drivers. (to the original material)

- AI/ML powered automation: The future of cybersecurity at scale. (to the original material)

- How to proactively remove file-based malware. (to the original material)

- Improving cybersecurity with MITRE ATT&CK framework. (to the original material)


Archive:

Click here to access archive content.
Click here to access CMS (Content Management System) in Joomla.

Source:

Click here to access to documentation sources.

Note Dorin M.

This site has a double form, one in HTML and one in Joomla (if you are interested in the utility behind this effort you can read the "Why  a HTML and a CMS (Joomla)" page).
That's why I suggest you, depending on your desire, to use the HTML form for simple browsing / information or the Joomla form if you want in-depth studies / searches using the CMS search engine.

Dorin M - December 31, 2021