Study - Technical - LMS-SFC (EN) - Cyber Security - News Archive February 2021


Cyber Security - News Archive

February 2021

28.02.2021 - News from cyber security.

- "Cyber Action Plan" to help increasingly digital small businesses stay secure from rising threats. (to the original material)

- Beware: AOL phishing email states your account will be closed. (to the original material)

- What are these suspicious Google GVT1.com URLs?. (to the original material)

- Recent Google Voice outage caused by expired certificates. (to the original material)

- Week in review: Kali Linux 2021.1, CNAME-based tracking, VMware vCenter Servers under attack. (to the original material)

27.02.2021 - News from cyber security.

- NSA, Microsoft promote a Zero Trust approach to cybersecurity. (to the original material)

- Microsoft fixes Windows 10 drive corruption bug — what you need to know. (to the original material)

- Google shares PoC exploit for critical Windows 10 Graphics RCE bug. (to the original material)

26.02.2021 - News from cyber security.

- Facebook is stepping up the fight against content that promoted child abuse. (to the original material)

- NSA Releases Guidance on Zero Trust Security Model. (to the original material)

- Identifying Weak Parts of a Supply Chain. (to the original material)

- The Week in Ransomware - February 26th 2021 - Back from the Holidays. (to the original material)

- Twitter scammers earned over $145k this week in Bitcoin, Ethereum, Doge. (to the original material)

- T-Mobile discloses data breach after SIM swapping attacks. (to the original material)

- Ransomware gang Hotarus Corp hacks Ecuador's largest private bank, Ministry of Finance. (to the original material)

- Ryuk ransomware now self-spreads to other Windows LAN devices. (to the original material)

- Malicious Firefox extension allowed hackers to hijack Gmail accounts. (to the original material)

- Helping you immunize your organization against cyber pandemic> Check Point Research's 2021 Security Report 2021. (to the original material)

- ICS threat landscape highlights. (to the original material)

- Application container market to grow steadily by 2026. (to the original material)

- One in four people use work passwords for consumer websites. (to the original material)

- Massive rise in threats across expanding attack surfaces. (to the original material)

- The rise of non-English language spear phishing emails. (to the original material)

- Closing the data divide: How to create harmony among data scientists and privacy advocates. (to the original material)

25.02.2021 - News from cyber security.

- Cisco Releases Security Updates. (to the original material)

- ACSC identified Australian organizations may have been impacted the Accellion File Transfer Appliance vulnerability and has provided mitigation recommendations. (to the original material)

- The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) advises users of VMware vCenter Server products, including as part of VMware Cloud Foundation, to ensure their systems are promptly patched after the recent disclosure of a new remote code execution vulnerability (CVE-2021-21972). (to the original material)

- Dutch Research Council (NWO) confirms ransomware attack, data leak. (to the original material)

- Microsoft shares CodeQL queries to scan code for SolarWinds-like implants. (to the original material)

- North Korean hackers target defense industry with custom malware. (to the original material)

- VC giant Sequoia Capital discloses data breach after failed BEC attack. (to the original material)

- Attackers scan for vulnerable VMware servers after PoC exploit release. (to the original material)

- Users largely unaware of the privacy implications of location tracking. (to the original material)

- C-level executives driving the adoption of MACH across their organizations. (to the original material)

- Attackers disrupting COVID-19 efforts and critical supply chains. (to the original material)

- Five factors driving investment in IDV (IDentity  Verification). (to the original material)

- Why enterprises need rugged devices with integrated endpoint management systems (to the original material)

- Attackers are looking to exploit critical VMware vCenter Server RCE flaw, patch ASAP! (to the original material)

24.02.2021 - News from cyber security.

- Joint Advisory: Exploitation of Accellion File Transfer Appliance. (to the original material)

- Mozilla Releases Security Updates for Thunderbird, Firefox ESR, and Firefox. (to the original material)

- VMware Releases Multiple Security Updates. (to the original material)

- CISA Releases Joint Cybersecurity Advisory on Exploitation of Accellion File Transfer Appliance. (to the original material)

- Clubhouse chats have been sent to a third-party site. (to the original material)

- The names of six popular banks in Romania are being used illegally by hackers to trick people into revealing their bank details. (to the original material)

- Over 8 million COVID-19 test results leaked online. (to the original material)

- Cisco fixes maximum severity MSO auth bypass vulnerability. (to the original material)

- Google funds Linux maintainers to boost Linux kernel security. (to the original material)

- Cyberpunk 2077 patch 1.2 delayed by CD Projekt ransomware attack. (to the original material)

- Russian hackers linked to attack targeting Ukrainian government. (to the original material)

- Five Eyes members warn of Accellion FTA extortion attacks. (to the original material)

- Ransomware gang Clop extorts jet maker Bombardier after Accellion breach. (to the original material)

- LazyScripter hackers target airlines with remote access trojans. (to the original material)

- NASA and the FAA were also breached by the SolarWinds hackers. (to the original material)

- Heavily used Node.js package has a code injection vulnerability. (to the original material)

- Don't get caught in the hackers' web: The new frontier in web security. (to the original material)

- Whitepaper EDR (Endpoint Detection & Response) to secure mobile devices: Coverage, limits & recommendations. (to the original material)

- Researchers propose more secure and private mobile contact tracing. (to the original material)

- Most businesses see state-sponsored cyberattacks as a major threat. (to the original material)

- U.S. municipalities are the perfect target for cybercriminals in 2021. (to the original material)

- Third-party risk management programs still largely a checkbox exercise. (to the original material)

- 2021 will be the year of hybrid working: How can CTOs (Chief Technology/ Technical Officer) keep staff secure and productive? (to the original material)

- CNAME-based tracking increasingly used to bypass browsers’ anti-tracking defenses. (to the original material)

23.02.2021 - News from cyber security.

- New Password Checkup Feature Coming to Android. (to the original material)

- SonicWall Releases Additional Patches. (to the original material)

- Tor's Brave navigation mode has exposed the activity of the users on the darkweb. (to the original material)

- A constant state of flux - Trend Micro 2020 Annual Cybersecurity Report. (to the original material)

- APT32 state hackers target human rights defenders with spyware. (to the original material)

- VMware fixes critical RCE bug in all default vCenter installs. (to the original material)

- Finnish IT services giant TietoEVRY discloses ransomware attack. (to the original material)

- Twitter removes accounts of Russian government-backed actors. (to the original material)

- Google adds Password Checkup support to Android autofill. (to the original material)

- Ukraine: DDoS attacks on govt sites originated from Russia. (to the original material)

- Disrupting cyber strategies for 2021, and beyond. (to the original material)

- According to a report, money laundering is based on surprisingly few addresses. (to the original material)

- The DopplePaymer group allegedly attacked Kia Motors America with ransomware. (to the original material)

- Top cloud infrastructure risks faced by real-world organizations. (to the original material)

- Adversaries exploit supply chains, double down on COVID-19 and ransomware. (to the original material)

- Physical cyber threats: What do criminals leave when they break in?  (to the original material)

- Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations. (to the original material)

22.02.2021 - News from cyber security.

- 22nd February – Threat Intelligence Report. (to the original material)

- NCSC consolidates advice on secure home learning. (to the original material)

- Texas electric company warns of scammers threatening to cut power. (to the original material)

- SHAREit fixes security bugs in app with 1 billion downloads. (to the original material)

- New Silver Sparrow malware infects 30,000 Macs for unknown purpose. (to the original material)

- Chinese hackers used NSA zero-day exploit (EpMe) years before Shadow Brokers leak. (to the original material)

- Global Accellion data breaches linked to Clop ransomware gang. (to the original material)

- Vulnerability Summary for the Week of February 15, 2021. (to the original material)

- Jian – The Chinese Double-edged Cyber Sword. (to the original material)

- Criminals leveraging shift to remote work to develop targeted attacks. (to the original material)

- The state of multicloud adoption, its drivers, and the technologies enabling it. (to the original material)

- Exploring DevOps adoption among database pros. (to the original material)

- Database encryption: Protecting the crown jewels. (to the original material)

21.02.2021 - News from cyber security.

- Lakehead University (Canada) shuts down campus network after cyberattack. (to the original material)

- Warning: Google Alerts abused to push fake Adobe Flash updater. (to the original material)

- New Chrome for iOS feature locks Incognito tabs with Face ID. (to the original material)

- Microsoft Edge is crowdsourcing whether to show notification prompts. (to the original material)

- Week in review: Most used MITRE ATT&CK tactics, boosting the “Sec” in DevSecOps. (to the original material)

20.02.2021 - News from cyber security.

- Kroger data breach exposes pharmacy and employee data. (to the original material)

- Recently fixed Windows zero-day actively exploited since mid-2020. (to the original material)

-  SonicWall releases additional update for SMA 100 vulnerability. (to the original material)

19.02.2021 - News from cyber security.

- Underwriters Laboratories (UL) certification giant hit by ransomware. (to the original material)

- CIS (Center for Internet Security) now offers free ransomware protection to all US hospitals. (to the original material)

- Brave privacy bug exposes Tor onion URLs to your DNS provider. (to the original material)

- BEC (Business Email Compromise) is a top concern for banks. (to the original material)

- CXOs (Chief eXperience Officer) consider mainframe and legacy modernization a business priority. (to the original material)

- Most security pros think a  WAF (Web Application Firewall) is high maintenance. (to the original material)

- What behavioral experts can teach us about improving security. (to the original material)

- Microsoft: Solorigate attackers grabbed Azure, Intune, Exchange component source code. (to the original material)

- Apple details major security, privacy enhancements in its devices. (to the original material)

18.02.2021 - News from cyber security.

- Cisco Releases Security Updates for AnyConnect Secure Mobility Client. (to the original material)

- US cities disclose data breaches after vendor's ransomware attack on ATFS (Automated Funds Transfer Services). (to the original material)

- RIPE NCC Internet Registry discloses SSO (single sign-on) credential stuffing attack. (to the original material)

- RIPE NCC Internet Registry discloses SSO credential stuffing attack (Content Security Policy). (to the original material)

- Microsoft: SolarWinds hackers downloaded some Azure, Exchange source code. (to the original material)

- FBI: Telephony denial-of-service attacks can lead to loss of lives. (to the original material)

- US shares info on North Korean malware used to steal cryptocurrency (AppleJeus of state-funded hackers from Lazarus). (to the original material)

- Why do enterprise SOC teams need CIEM (Cloud Infrastructure Entitlement Management) now? (to the original material)

- Phishers tricking users via fake LinkedIn Private Shared Document. (to the original material)

17.02.2021 - News from cyber security.

- Google Releases Security Updates for Chrome. (to the original material)

- Mitigating Memory Safety Issues in Open Source Software. (to the original material)

- North Korean Malicious Cyber Activity: AppleJeus. (to the original material)

- UK supports US charges against North Korean cyber actors. (to the original material)

- Beware of COVID-19 vaccine scams and misinformation. (to the original material)

- A series of attacks targeting different IT firms is causing concern and controversy. (to the original material)

- Victims of Fonix and DarkSide ransomware threats can recover their locked data for free. (to the original material)

- Record number of vulnerabilities reported in 2020. (to the original material)

- Malware targeting Centreon software. (to the original material)

- Kia Motors America suffers ransomware attack, $20 million ransom. (to the original material)

- US indicts North Korean hackers for stealing $1.3 billion. (to the original material)

- Rising healthcare breaches driven by hacking and unsecured servers. (to the original material)

- Russian Sandworm hackers only hit orgs with old Centreon software. (to the original material)

- Dutch Police post "say no to cybercrime" warnings on hacker forums. (to the original material)

- QNAP patches critical vulnerability in Surveillance Station NAS app. (to the original material)

- Malware increased by 358% in 2020. (to the original material)

- Cybersecurity risks connected to AI in autonomous vehicles. (to the original material)

- Analysts need advanced automation tools to reduce fear of missing incidents. (to the original material)

- 57% of vulnerabilities in 2020 were classified as critical or high severity. (to the original material)

- Knowledge graphs: The secret of Google Search and now XDR (eXtended Detection and Response). (to the original material)

- Tips for boosting the “Sec” part of DevSecOps. (to the original material)

16.02.2021 - News from cyber security.

- In transit, interconnected, at risk. (to the original material)

- Microsoft releases Azure Firewall Premium in public preview. (to the original material)

- Microsoft Edge is getting a new child-friendly Kids Mode. (to the original material)

- Kia Motors America experiences massive IT outage across the US. (to the original material)

- Windows 10 Secure Boot update triggers BitLocker key recovery. (to the original material)

- LastPass Free to force users to choose between mobile, desktop. (to the original material)

- ScamClub malvertisers exploited browser zero-day to redirect users to scams. (to the original material)

- Emerging Mobile Threats and How to Prevent Them. (to the original material)

- Consumers not protecting data online despite having privacy concerns. (to the original material)

- The cybersecurity issues of seismic monitoring devices. (to the original material)

- Why contextual machine learning is the fix that zero-trust email security needs. (to the original material)

- Enable secure remote workspaces without trashing your entire IT infrastructure. (to the original material)

- Top 10 most used MITRE ATT&CK tactics and techniques. (to the original material)

- Hackers exploited Centreon monitoring software to compromise IT providers. (to the original material)

15.02.2021 - News from cyber security.

- 15th February – Threat Intelligence Report. (to the original material)

- Schools recognised by cyber experts for first-rate teaching. (to the original material)

- Vulnerability Summary for the Week of February 8, 2021. (to the original material)

- DDoS attack takes down EXMO cryptocurrency exchange servers. (to the original material)

- Cyberattack on Dutch Research Council (NWO) suspends research grants. (to the original material)

- France links Russian Sandworm hackers to hosting provider attacks. (to the original material)

- Microsoft will alert Office 365 admins of Forms phishing attempts. (to the original material)

- Google Chrome, Microsoft Edge getting this Intel security feature (Control-flow Enforcement Technology). (to the original material)

- CFOs (Chief Financial Officer) are becoming catalysts of digital strategy. (to the original material)

- Rampant password reuse puts companies and customers at risk. (to the original material)

- Quantum computing and encryption: Key to achieving resilience, technological sovereignty and leadership. (to the original material)

- Nearly 40% of consumers lost money to phone scams in 2020. (to the original material)

- How do I select a DRM (Digital Rights Management) solution for my business? (to the original material)

- Have we put too much emphasis on protecting the network? (to the original material)

14.02.2021 - News from cyber security.

- Egregor ransomware affiliates arrested by Ukrainian, French police. (to the original material)

- Pro-India hackers use Android spyware to spy on Pakistani military. (to the original material)

- Week in review: Improving vulnerability triage, RDP attacks soaring, hackers in high demand. (to the original material)

13.02.2021 - News from cyber security.

- Leading Canadian rental car company hit by DarkSide ransomware. (to the original material)

- Cyberpunk 2077 maker CD Projekt Red has GWENT source code leaked after ransomware attack. (to the original material)

12.02.2021 - News from cyber security.

- VMware Releases Security Update. (to the original material)

- The Week in Ransomware - February 12th 2021 - More keys released. (to the original material)

- Scammers target US tax pros in ongoing IRS (Internal Revenue Service) phishing attacks. (to the original material)

- Telegram privacy feature failed to delete self-destructing video files. (to the original material)

- Google: Gmail users from US most targeted by phishing attacks. (to the original material)

- Copycats (ethical penetration research packages) imitate novel supply chain attack that hit tech giants. (to the original material)

- Yandex suffers data breach after sysadmin sold access to user emails. (to the original material)

- Researchers spot massive increase in RDP (Remote Desktop Protocol) attack attempts. (to the original material)

- 2020 vulnerability disclosures on track to exceed those from 2019. (to the original material)

- mHealth apps consistently expose PII (Personally Identifiable Information) and PHI (Protected Health Information) through APIs. (to the original material)

- Successful BEC attacks become 56% more costly. (to the original material)

- 5 cybersecurity trends MSPs must address in 2021. (to the original material)

- Accellion to retire enterprise file-sharing product targeted in recent attacks. (to the original material)

11.02.2021 - News from cyber security.

- Compromise of U.S. Water Treatment Facility. (to the original material)

- Verify Your Valentine. (to the original material)

- Microsoft released a patch for the actively exploited vulnerability in the Windows kernel. (to the original material)

- Avaddon ransomware fixes flaw allowing free decryption. (to the original material)

- Internet Explorer 11 zero-day vulnerability gets unofficial micropatch. (to the original material)

- Microsoft avertizează cu privire la numărul tot mai mare de atacuri web shell. (to the original material)

- Singtel, QIMR Berghofer report Accellion-related data breaches. (to the original material)

- Buggy WordPress plugin (Responsive Menu) exposes 100K sites to takeover attacks. (to the original material)

- Intel fixes vulnerabilities in Windows, Linux graphics drivers. (to the original material)

- 12-year-old Windows Defender bug gives hackers admin rights. (to the original material)

- TrickBot's BazarBackdoor malware is now coded in Nim (programming language) to evade antivirus. (to the original material)

- Hackers ask only $1,500 for access to breached company networks. (to the original material)

- January 2021’s Most Wanted Malware: Emotet Continues Reign as Top Malware Threat Despite Takedown. (to the original material)

- IPCDump: Open-source tool for tracing interprocess communication on Linux. (to the original material)

- 5G experimentation and security grows in govt, military sectors. (to the original material)

- People are often the collateral damage of attacks on corporations. (to the original material)

- Credential spill incidents nearly doubled since 2016. (to the original material)

- Protecting productivity within the disappearing perimeter. (to the original material)

- Big Tech will try to pre-empt harsh privacy laws by writing their own. (to the original material)

- Which users are at higher risk of email-based phishing and malware? (to the original material)

- Vulnerabilities in widely used TCP/IP stacks open IoT, OT devices to attack. (to the original material)

10.02.2021 - News from cyber security.

- Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472). (to the original material)

- French MNH health insurance company hit by RansomExx ransomware. (to the original material)

- French MNH health insurance company hit by RansomExx ransomware. (to the original material)

- Microsoft now forces secure RPC (Remote Procedure Call) to block Windows Zerologon attacks. (to the original material)

- Hackers auction alleged stolen Cyberpunk 2077, Witcher source code. (to the original material)

- SIM hijackers arrested after stealing millions from US celebrities. (to the original material)

- Microsoft Office February security updates patch Sharepoint, Excel RCE bugs. (to the original material)

- Microsoft fixes Windows 10 bug letting attackers trigger BSOD (Blue Screen Of Death) crashes. (to the original material)

- 6 questions you should ask yourself when choosing an email security solution. (to the original material)

- Roses are red, violets are blue, cybercriminals are ready to come after you! (to the original material)

- COVID-19 has increased urgency for businesses to adopt VSaaS (Video Surveillance-as-a-Service) ACaaS (Access Control-as-a-Service). (to the original material)

- The cost of synthetic fraud to reach new highs. (to the original material)

- BluBracket Community Edition: Detect and monitor secrets in code for free. (to the original material)

- Collaboration is the key to a secure world-class sporting event. (to the original material)

- When it comes to vulnerability triage, ditch CVSS and prioritize exploitability. (to the original material)

- Dark web analysis shows high demand for hackers. (to the original material)

- Whitepaper: A new approach to help you achieve least privilege at cloud scale. (to the original material)

09.02.2021 - News from cyber security.

- Microsoft Releases February 2021 Security Updates. (to the original material)

- Microsoft February 2021 Patch Tuesday fixes 56 flaws, 1 zero-day. (to the original material)

- Apple Releases Security Updates. (to the original material)

- Apple fixes SUDO root privilege escalation flaw in macOS. (to the original material)

- Adobe Releases Security Updates. (to the original material)

- Microsoft Warns of Windows Win32k Privilege Escalation. (to the original material)

- HelloKitty ransomware behind CD Projekt Red cyberattack, data theft. (to the original material)

- Microsoft urges customers to patch critical Windows TCP/IP bugs. (to the original material)

- New BendyBear APT malware gets linked to Chinese hacking group. (to the original material)

- Researcher hacks over 35 tech firms in novel supply chain attack. (to the original material)

- Adobe fixes critical Reader vulnerability exploited in the wild. (to the original material)

- Office 365 will help admins find impersonation attack targets. (to the original material)

- Microsoft: Recent Windows 10 gaming issues caused by Discord bug. (to the original material)

- CD PROJEKT RED gaming studio hit by ransomware attack. (to the original material)

- COVID-19 impact on SecOps: Increased threats, greater investments in automation. (to the original material)

- Most zoombombing incidents are inside jobs. (to the original material)

- Your security technology is only as strong as your team. (to the original material)

- Can we put a stop to cyber harassment? (to the original material)

- Microsoft to alert enterprise security teams when nation-state attackers target their employees. (to the original material)

- Hackers hit CD Projekt Red, steal data, ask for ransom. (to the original material)

- Misplaced expectations securing water treatment systems. (to the original material)

- February 2021 Patch Tuesday: Microsoft and Adobe fix exploited zero-days. (to the original material)

- CISA and Cyber.org partner to deliver safety video series. (to the original material)

08.02.2021 - News from cyber security.

- 8th February – Threat Intelligence Report. (to the original material)

- Mozilla Releases Security Updates for Firefox and Firefox ESR. (to the original material)

- Vulnerability Summary for the Week of February 1, 2021. (to the original material)

- Hackers gains access via TeamViewer to the water treatment system and tries to increase the level of caustic soda (NaOH) in the water town. (to the original material)

- Critical vulnerability fixed in WordPress plugin NextGen Gallery (to create image galleries) with 800K installs. (to the original material)

- Cyberpunk 2077 bug fixed that let malicious mods take over PCs. (to the original material)

- Microsoft: Keep your guard up even after Emotet’s disruption (banking trojan run-of-the-mill). (to the original material)

- Android app (developed by Lavabird LTD) joins the dark side, sends malware update to millions. (to the original material)

- Microsoft to alert Office 365 users of nation-state hacking activity. (to the original material)

- Identity verification market to grow steadily in the next few years. (to the original material)

- Researchers develop approach that can recognize fake news. (to the original material)

- Empowering a remote workforce is a top priority for CEOs. (to the original material)

- Organizations can no longer afford a reactive approach to risk management. (to the original material)

- How do I select a remote access solution for my business? (to the original material)

- Three ways MITRE ATT&CK can improve your organizational security. (to the original material)

- Open-source tool BlobHunter helps pinpoint public Azure blobs that might contain sensitive files. (to the original material)

07.02.2021 - News from cyber security.

- Ziggy ransomware shuts down and releases victims' decryption keys. (to the original material)

- New phishing attack uses Morse code to hide malicious URLs. (to the original material)

- Fortinet fixes critical vulnerabilities in SSL VPN and web firewall. (to the original material)

- Of Kittens and Princes: the latest updates on two Iranian espionage operations. (to the original material)

- Week in review: Top 10 most exploited vulns, SMB ransomware extortion, Patch Tuesday forecast. (to the original material)

06.02.2021 - News from cyber security.

- Mozilla fixes Windows 10 NTFS corruption bug in Firefox. (to the original material)

- The Great Suspender Chrome extension's fall from grace. (to the original material)

- Launching OSV (Open Source Vulnerabilities) - Better vulnerability triage for open source. (to the original material)

05.02.2021 - News from cyber security.

- Google Releases Security Updates for Chrome. (to the original material)

- NCIJTF Releases Ransomware Factsheet. (to the original material)

- Google: 1 in 4 zero-day security incidents in 2020 could have been avoided by good patching techniques. (to the original material)

- The Week in Ransomware - February 5th 2021 - Data destruction. (to the original material)

- Malicious extension abuses Chrome sync to steal users’ data. (to the original material)

- SitePoint discloses data breach after stolen info used in attacks. (to the original material)

- Microsoft warns of increasing OAuth Office 365 phishing attacks. (to the original material)

- Eletrobras, Copel energy companies hit by DarkSide ransomware attacks. (to the original material)

- The Growing Challenge of Office 365 & G Suite Protection. (to the original material)

- SOC (Security Operations Centre) Operations: 4 Top Challenges. (to the original material)

- Open-source tool for hardening commonly used HMI/SCADA system. (to the original material)

- API adoption is on the rise across all industries. (to the original material)

- Number of ICS vulnerabilities disclosed in 2020 up significantly. (to the original material)

- Data loss prevention strategies for long-term remote teams. (to the original material)

- The transportation sector needs a standards-driven, industry-wide approach to cybersecurity. (to the original material)

- February 2021 Patch Tuesday forecast: The human communication aspect. (to the original material)

04.02.2021 - News from cyber security.

- Vulnerability Reward Program: 2020 Year in Review. (to the original material)

- How we behave on Facebook: types of behavior you should avoid. (to the original material)

- Cisco Releases Security Updates. (to the original material)

- SonicWall Breach. (to the original material)

- Google fixes Chrome zero-day actively exploited in the wild. (to the original material)

- Hackers steal StormShield firewall source code in data breach after data compromise in support ticket attack. (to the original material)

- Hacking group also used an IE zero-day against security researchers. (to the original material)

- Plex Media servers actively abused to amplify DDoS attacks. (to the original material)

- Ransomware attacks increasingly destroy victims’ data by mistake. (to the original material)

- CISO’s Secrets: get behind the scenes of cybersecurity’s trending topics. True stories, real-life scenarios, and a solutions-focused approach. (to the original material)

- No Matter the Network Growth, you can always have Scalable Security Management on Demand. (to the original material)

- Why pseudonymisation is important to protect personal data? (to the original material)

- NIST provides guidance to protect controlled unclassified information. (to the original material)

- Most are concerned about data privacy, but few are willing to change habits. (to the original material)

- API security concerns hindering new application rollouts. (to the original material)

- Major trends that are changing the CISO role. (to the original material)

- Runtime data no longer has to be vulnerable data. (to the original material)

03.02.2021 - News from cyber security.

- Google Releases Security Updates for Chrome. (to the original material)

- Know, Prevent, Fix: A framework for shifting the discussion around vulnerabilities in open source. (to the original material)

- A new smart surveillance camera allows attackers to spy on people. (to the original material)

- The State pf Ransomware 2020’s Catch-22. (to the original material)

- Oxfam Australia investigates data breach after database put up for sale. (to the original material)

- New Fonix ransomware decryptor can recover victim's files for free. (to the original material)

- SonicWall fixes actively exploited SMA 100 zero-day vulnerability. (to the original material)

- Cisco fixes critical code execution bugs in SMB VPN routers. (to the original material)

- Microsoft Defender ATP detects Chrome updates as PHP backdoors. (to the original material)

- SolarWinds patches critical vulnerabilities in the Orion platform. (to the original material)

- Latest macOS Big Sur also has SUDO root privilege escalation flaw. (to the original material)

- Female escort review site data breach affects 470,000 members. (to the original material)

- North Korean hackers try to target security researchers investigating zero-day vulnerabilities. (to the original material)

- Together for a better internet: Let's make every day Internet Safety Day. (to the original material)

- One-third of businesses have cloud budget overruns of up to 40%. (to the original material)

- 93% of workers overshare online, causing security risks. (to the original material)

- Lack of visibility into remote endpoints leaves companies vulnerable to ransomware. (to the original material)

- Container security is a priority, but who’s responsibility is it? (to the original material)

- Kick off the year with a new vendor management spring cleaning strategy. (to the original material)

- Top 10 most exploited vulnerabilities from 2020. (to the original material)

- SolarWinds Orion exploited by another group of state-sponsored hackers. (to the original material)

02.02.2021 - News from cyber security.

- MyNCSC is the single point of entry to the NCSC’s digital services including Active Cyber Defence (ACD). (to the original material)

- Cyber innovators help protect UK connected places. (to the original material)

- Zero-Day Vulnerability in SonicWall SMA 100 Series Version 10.x Products. (to the original material)

- Apple Releases Security Updates. (to the original material)

- Sudo Heap-Based Buffer Overflow Vulnerability - CVE-2021-3156. (to the original material)

- US federal payroll agency hacked using SolarWinds software flaw. (to the original material)

- Babyk Ransomware won't hit charities, unless they support LGBT, BLM. (to the original material)

- Microsoft Defender now detects macOS system, app vulnerabilities. (to the original material)

- Trickbot malware now maps victims’ networks using Masscan. (to the original material)

- Malicious script steals credit card info stolen by other hackers. (to the original material)

- Apple pulls iCloud 12 for Windows 10 with Keychain sync feature. (to the original material)

- New Linux malware steals SSH credentials from supercomputers. (to the original material)

- Netgain ransomware incident impacts local governments. (to the original material)

- Two employees of the Dutch public health system have been arrested for selling information about patients infected with the new virus. (to the original material)

- Install available security patches on your Apple devices – iOS 14.4 to fix “actively exploited” security issues. (to the original material)

- Download: The Phisher’s Playbook. (to the original material)

- CCAPS: New cybersecurity category that protects households and small businesses. (to the original material)

- The first step in protecting ourselves is realizing that there’s a lot we can do to stay safe online. (to the original material)

- Digital transformation plans have accelerated due to the pandemic. (to the original material)

- How to motivate employees to take cybersecurity seriously. (to the original material)

- Extorcare ransomware SMB: Identificarea pieselor puzzle-ului. (to the original material)

- Actively exploited SonicWall zero-day affects SMA 100 series appliances. (to the original material)

- Linux malware backdoors supercomputers. (to the original material)

01.02.2021 - News from cyber security.

- 1st February – Threat Intelligence Report. (to the original material)

- Vulnerability Summary for the Week of January 25, 2021. (to the original material)

- Data breach exposes 1.6 million Washington unemployment claims. (to the original material)

- US govt: Number of identity theft reports doubled last year. (to the original material)

- Phishing campaign lures US businesses with fake PPP (Paycheck Protection Program) loans. (to the original material)

- SonicWall SMA 100 zero-day exploit actively used in the wild. (to the original material)

- Exposed Azure bucket leaked passports, IDs of volleyball reporters. (to the original material)

- Scammers posing as FBI agents threaten targets with jail time. (to the original material)

- Android emulator supply-chain attack targets gamers with malware. (to the original material)

- IoT Firmware Security: Zero-Day Exploitation & Prevention. (to the original material)

- New value exists at the intersection of digital tech and sustainability. (to the original material)

- Board members aren’t taking cybersecurity as seriously as they should. (to the original material)

- How do I select a PAM (Privileged Access Management) solution for my business? (to the original material)


Archive:

Click here to access archive content.
Click here to access CMS (Content Management System) in Joomla.

Source:

Click here to access to documentation sources.

Note Dorin M.

This site has a double form, one in HTML and one in Joomla (if you are interested in the utility behind this effort you can read the "Why  a HTML and a CMS (Joomla)" page).
That's why I suggest you, depending on your desire, to use the HTML form for simple browsing / information or the Joomla form if you want in-depth studies / searches using the CMS search engine.

Dorin M - February 28, 2021