Study - Technical
- LMS-SFC (EN) - Cyber
Security - News
Archive February 2021
Cyber Security - News Archive
February 2021
28.02.2021 - News
from cyber security.
- "Cyber Action Plan" to help
increasingly digital small businesses stay secure from rising
threats. (to
the original material)
- Beware: AOL phishing email
states your account will be closed. (to
the original material)
- What are these suspicious Google
GVT1.com URLs?. (to
the original material)
- Recent Google Voice outage
caused by expired certificates. (to
the original material)
- Week in review: Kali Linux
2021.1, CNAME-based tracking, VMware vCenter Servers under attack.
(to
the original material)
27.02.2021 - News
from cyber security.
- NSA, Microsoft promote a Zero
Trust approach to cybersecurity. (to
the original material)
- Microsoft fixes Windows 10 drive
corruption bug — what you need to know. (to
the original material)
- Google shares PoC exploit for
critical Windows 10 Graphics RCE bug. (to
the original material)
26.02.2021 - News
from cyber security.
- Facebook is stepping up the
fight against content that promoted child abuse. (to
the original material)
- NSA Releases Guidance on Zero
Trust Security Model. (to
the original material)
- Identifying Weak Parts of a
Supply Chain. (to
the original material)
- The Week in Ransomware -
February 26th 2021 - Back from the Holidays. (to
the original material)
- Twitter scammers earned over
$145k this week in Bitcoin, Ethereum, Doge. (to
the original material)
- T-Mobile discloses data
breach after SIM swapping attacks. (to
the original material)
- Ransomware gang Hotarus Corp
hacks Ecuador's largest private bank, Ministry of Finance. (to
the original material)
- Ryuk ransomware now
self-spreads to other Windows LAN devices. (to
the original material)
- Malicious Firefox extension
allowed hackers to hijack Gmail accounts. (to
the original material)
- Helping you immunize your
organization against cyber pandemic> Check Point Research's
2021 Security Report 2021. (to
the original material)
- ICS threat landscape
highlights. (to
the original material)
- Application container market
to grow steadily by 2026. (to
the original material)
- One in four people use work
passwords for consumer websites. (to
the original material)
- Massive rise in threats
across expanding attack surfaces. (to
the original material)
- The rise of non-English
language spear phishing emails. (to
the original material)
- Closing the data divide: How
to create harmony among data scientists and privacy advocates. (to
the original material)
- Cisco Releases Security
Updates. (to
the original material)
- ACSC identified Australian
organizations may have been impacted the Accellion File Transfer
Appliance vulnerability and has provided mitigation
recommendations. (to
the original material)
- The Australian Signals
Directorate’s Australian Cyber Security Centre (ACSC) advises
users of VMware vCenter Server products, including as part of
VMware Cloud Foundation, to ensure their systems are promptly
patched after the recent disclosure of a new remote code
execution vulnerability (CVE-2021-21972). (to
the original material)
- Dutch Research Council (NWO)
confirms ransomware attack, data leak. (to
the original material)
- Microsoft shares CodeQL
queries to scan code for SolarWinds-like implants. (to
the original material)
- North Korean hackers target
defense industry with custom malware. (to
the original material)
- VC giant Sequoia Capital
discloses data breach after failed BEC attack. (to
the original material)
- Attackers scan for vulnerable
VMware servers after PoC exploit release. (to
the original material)
- Users largely unaware of the
privacy implications of location tracking. (to
the original material)
- C-level executives driving
the adoption of MACH across their organizations. (to
the original material)
- Attackers disrupting COVID-19
efforts and critical supply chains. (to
the original material)
- Five factors driving
investment in IDV (IDentity Verification). (to
the original material)
- Why enterprises need rugged
devices with integrated endpoint management systems (to
the original material)
- Attackers are looking to
exploit critical VMware vCenter Server RCE flaw, patch ASAP! (to
the original material)
- Joint Advisory: Exploitation
of Accellion File Transfer Appliance. (to
the original material)
- Mozilla Releases Security
Updates for Thunderbird, Firefox ESR, and Firefox. (to
the original material)
- VMware Releases Multiple
Security Updates. (to
the original material)
- CISA Releases Joint
Cybersecurity Advisory on Exploitation of Accellion File
Transfer Appliance. (to
the original material)
- Clubhouse chats have been
sent to a third-party site. (to
the original material)
- The names of six popular
banks in Romania are being used illegally by hackers to trick
people into revealing their bank details. (to
the original material)
- Over 8 million COVID-19 test
results leaked online. (to
the original material)
- Cisco fixes maximum severity
MSO auth bypass vulnerability. (to
the original material)
- Google funds Linux
maintainers to boost Linux kernel security. (to
the original material)
- Cyberpunk 2077 patch 1.2
delayed by CD Projekt ransomware attack. (to
the original material)
- Russian hackers linked to
attack targeting Ukrainian government. (to
the original material)
- Five Eyes members warn of
Accellion FTA extortion attacks. (to
the original material)
- Ransomware gang Clop extorts
jet maker Bombardier after Accellion breach. (to
the original material)
- LazyScripter hackers target
airlines with remote access trojans. (to
the original material)
- NASA and the FAA were also
breached by the SolarWinds hackers. (to
the original material)
- Heavily used Node.js package
has a code injection vulnerability. (to
the original material)
- Don't get caught in the
hackers' web: The new frontier in web security. (to
the original material)
- Whitepaper EDR (Endpoint
Detection & Response) to secure mobile devices: Coverage,
limits & recommendations. (to
the original material)
- Researchers propose more
secure and private mobile contact tracing. (to
the original material)
- Most businesses see
state-sponsored cyberattacks as a major threat. (to
the original material)
- U.S. municipalities are
the perfect target for cybercriminals in 2021. (to
the original material)
- Third-party risk
management programs still largely a checkbox exercise. (to
the original material)
- 2021 will be the year of
hybrid working: How can CTOs (Chief Technology/ Technical
Officer) keep staff secure and productive? (to
the original material)
- CNAME-based tracking
increasingly used to bypass browsers’ anti-tracking defenses.
(to
the original material)
- New Password Checkup Feature
Coming to Android. (to
the original material)
- SonicWall Releases Additional
Patches. (to
the original material)
- Tor's Brave navigation mode
has exposed the activity of the users on the darkweb. (to
the original material)
- A constant state of flux -
Trend Micro 2020 Annual Cybersecurity Report. (to
the original material)
- APT32 state hackers target
human rights defenders with spyware. (to
the original material)
- VMware fixes critical RCE bug
in all default vCenter installs. (to
the original material)
- Finnish IT services giant
TietoEVRY discloses ransomware attack. (to
the original material)
- Twitter removes accounts of
Russian government-backed actors. (to
the original material)
- Google adds Password Checkup
support to Android autofill. (to
the original material)
- Ukraine: DDoS attacks on govt
sites originated from Russia. (to
the original material)
- Disrupting cyber strategies
for 2021, and beyond. (to
the original material)
- According to a report, money
laundering is based on surprisingly few addresses. (to
the original material)
- The DopplePaymer group
allegedly attacked Kia Motors America with ransomware. (to
the original material)
- Top cloud infrastructure
risks faced by real-world organizations. (to
the original material)
- Adversaries exploit supply
chains, double down on COVID-19 and ransomware. (to
the original material)
- Physical cyber threats: What
do criminals leave when they break in? (to
the original material)
- Chief Legal Officers face
mounting compliance, privacy and cybersecurity obligations. (to
the original material)
- 22nd February – Threat
Intelligence Report. (to
the original material)
- NCSC consolidates advice on
secure home learning. (to
the original material)
- Texas electric company warns
of scammers threatening to cut power. (to
the original material)
- SHAREit fixes security bugs
in app with 1 billion downloads. (to
the original material)
- New Silver Sparrow malware
infects 30,000 Macs for unknown purpose. (to
the original material)
- Chinese hackers used NSA
zero-day exploit (EpMe) years before Shadow Brokers leak. (to
the original material)
- Global Accellion data
breaches linked to Clop ransomware gang. (to
the original material)
- Vulnerability Summary for the
Week of February 15, 2021. (to
the original material)
- Jian – The Chinese
Double-edged Cyber Sword. (to
the original material)
- Criminals leveraging shift to
remote work to develop targeted attacks. (to
the original material)
- The state of multicloud
adoption, its drivers, and the technologies enabling it. (to
the original material)
- Exploring DevOps adoption
among database pros. (to
the original material)
- Database encryption:
Protecting the crown jewels. (to
the original material)
- Lakehead University (Canada)
shuts down campus network after cyberattack. (to
the original material)
- Warning: Google Alerts abused
to push fake Adobe Flash updater. (to
the original material)
- New Chrome for iOS feature
locks Incognito tabs with Face ID. (to
the original material)
- Microsoft Edge is
crowdsourcing whether to show notification prompts. (to
the original material)
- Week in review: Most used
MITRE ATT&CK tactics, boosting the “Sec” in DevSecOps. (to
the original material)
- Kroger data breach exposes
pharmacy and employee data. (to
the original material)
- Recently fixed Windows
zero-day actively exploited since mid-2020. (to
the original material)
- SonicWall releases
additional update for SMA 100 vulnerability. (to
the original material)
- Underwriters Laboratories
(UL) certification giant hit by ransomware. (to
the original material)
- CIS (Center for Internet
Security) now offers free ransomware protection to all US
hospitals. (to
the original material)
- Brave privacy bug exposes Tor
onion URLs to your DNS provider. (to
the original material)
- BEC (Business Email
Compromise) is a top concern for banks. (to
the original material)
- CXOs (Chief eXperience
Officer) consider mainframe and legacy modernization a business
priority. (to
the original material)
- Most security pros think
a WAF (Web Application Firewall) is high maintenance. (to
the original material)
- What behavioral experts can
teach us about improving security. (to
the original material)
- Microsoft: Solorigate
attackers grabbed Azure, Intune, Exchange component source code.
(to
the original material)
- Apple details major security,
privacy enhancements in its devices. (to
the original material)
- Cisco Releases Security
Updates for AnyConnect Secure Mobility Client. (to
the original material)
- US cities disclose data
breaches after vendor's ransomware attack on ATFS (Automated
Funds Transfer Services). (to
the original material)
- RIPE NCC Internet Registry
discloses SSO (single sign-on) credential stuffing attack. (to
the original material)
- RIPE NCC Internet Registry
discloses SSO credential stuffing attack (Content Security
Policy). (to
the original material)
- Microsoft: SolarWinds hackers
downloaded some Azure, Exchange source code. (to
the original material)
- FBI: Telephony
denial-of-service attacks can lead to loss of lives. (to
the original material)
- US shares info on North
Korean malware used to steal cryptocurrency (AppleJeus of
state-funded hackers from Lazarus). (to
the original material)
- Why do enterprise SOC teams
need CIEM (Cloud Infrastructure Entitlement Management) now? (to
the original material)
- Phishers tricking users via
fake LinkedIn Private Shared Document. (to
the original material)
- Google Releases Security
Updates for Chrome. (to
the original material)
- Mitigating Memory Safety
Issues in Open Source Software. (to
the original material)
- North Korean Malicious Cyber
Activity: AppleJeus. (to
the original material)
- UK supports US charges
against North Korean cyber actors. (to
the original material)
- Beware of COVID-19 vaccine
scams and misinformation. (to
the original material)
- A series of attacks targeting
different IT firms is causing concern and controversy. (to
the original material)
- Victims of Fonix and DarkSide
ransomware threats can recover their locked data for free. (to
the original material)
- Record number of
vulnerabilities reported in 2020. (to
the original material)
- Malware targeting Centreon
software. (to
the original material)
- Kia Motors America suffers
ransomware attack, $20 million ransom. (to
the original material)
- US indicts North Korean
hackers for stealing $1.3 billion. (to
the original material)
- Rising healthcare breaches
driven by hacking and unsecured servers. (to
the original material)
- Russian Sandworm hackers only
hit orgs with old Centreon software. (to
the original material)
- Dutch Police post "say no to
cybercrime" warnings on hacker forums. (to
the original material)
- QNAP patches critical
vulnerability in Surveillance Station NAS app. (to
the original material)
- Malware increased by 358% in
2020. (to
the original material)
- Cybersecurity risks connected
to AI in autonomous vehicles. (to
the original material)
- Analysts need advanced
automation tools to reduce fear of missing incidents. (to
the original material)
- 57% of vulnerabilities in
2020 were classified as critical or high severity. (to
the original material)
- Knowledge graphs: The secret
of Google Search and now XDR (eXtended Detection and Response).
(to
the original material)
- Tips for boosting the “Sec”
part of DevSecOps. (to
the original material)
- In transit, interconnected,
at risk. (to
the original material)
- Microsoft releases Azure
Firewall Premium in public preview. (to
the original material)
- Microsoft Edge is getting a
new child-friendly Kids Mode. (to
the original material)
- Kia Motors America
experiences massive IT outage across the US. (to
the original material)
- Windows 10 Secure Boot update
triggers BitLocker key recovery. (to
the original material)
- LastPass Free to force users
to choose between mobile, desktop. (to
the original material)
- ScamClub malvertisers
exploited browser zero-day to redirect users to scams. (to
the original material)
- Emerging Mobile Threats and
How to Prevent Them. (to
the original material)
- Consumers not protecting data
online despite having privacy concerns. (to
the original material)
- The cybersecurity issues of
seismic monitoring devices. (to
the original material)
- Why contextual machine
learning is the fix that zero-trust email security needs. (to
the original material)
- Enable secure remote
workspaces without trashing your entire IT infrastructure. (to
the original material)
- Top 10 most used MITRE
ATT&CK tactics and techniques. (to
the original material)
- Hackers exploited Centreon
monitoring software to compromise IT providers. (to
the original material)
- 15th February – Threat
Intelligence Report. (to
the original material)
- Schools recognised by cyber
experts for first-rate teaching. (to
the original material)
- Vulnerability Summary for the
Week of February 8, 2021. (to
the original material)
- DDoS attack takes down EXMO
cryptocurrency exchange servers. (to
the original material)
- Cyberattack on Dutch Research
Council (NWO) suspends research grants. (to
the original material)
- France links Russian Sandworm
hackers to hosting provider attacks. (to
the original material)
- Microsoft will alert Office
365 admins of Forms phishing attempts. (to
the original material)
- Google Chrome, Microsoft Edge
getting this Intel security feature (Control-flow Enforcement
Technology). (to
the original material)
- CFOs (Chief
Financial Officer) are becoming catalysts of digital
strategy. (to
the original material)
- Rampant password reuse puts
companies and customers at risk. (to
the original material)
- Quantum computing and
encryption: Key to achieving resilience, technological
sovereignty and leadership. (to
the original material)
- Nearly 40% of consumers lost
money to phone scams in 2020. (to
the original material)
- How do I select a DRM
(Digital Rights Management) solution for my business? (to
the original material)
- Have we put too much emphasis
on protecting the network? (to
the original material)
- Egregor ransomware affiliates
arrested by Ukrainian, French police. (to
the original material)
- Pro-India hackers use Android
spyware to spy on Pakistani military. (to
the original material)
- Week in review: Improving
vulnerability triage, RDP attacks soaring, hackers in high
demand. (to
the original material)
- Leading Canadian rental car
company hit by DarkSide ransomware. (to
the original material)
- Cyberpunk 2077 maker CD
Projekt Red has GWENT source code leaked after ransomware
attack. (to
the original material)
- VMware Releases Security
Update. (to
the original material)
- The Week in Ransomware -
February 12th 2021 - More keys released. (to
the original material)
- Scammers target US tax pros
in ongoing IRS (Internal Revenue Service) phishing attacks. (to
the original material)
- Telegram privacy feature
failed to delete self-destructing video files. (to
the original material)
- Google: Gmail users from US
most targeted by phishing attacks. (to
the original material)
- Copycats (ethical penetration
research packages) imitate novel supply chain attack that hit
tech giants. (to
the original material)
- Yandex suffers data breach
after sysadmin sold access to user emails. (to
the original material)
- Researchers spot massive
increase in RDP (Remote Desktop Protocol) attack attempts. (to
the original material)
- 2020 vulnerability
disclosures on track to exceed those from 2019. (to
the original material)
- mHealth apps consistently
expose PII (Personally Identifiable Information) and PHI
(Protected Health Information) through APIs. (to
the original material)
- Successful BEC attacks become
56% more costly. (to
the original material)
- 5 cybersecurity trends MSPs
must address in 2021. (to
the original material)
- Accellion to retire
enterprise file-sharing product targeted in recent attacks. (to
the original material)
- Compromise of U.S. Water
Treatment Facility. (to
the original material)
- Verify Your Valentine. (to
the original material)
- Microsoft released a patch
for the actively exploited vulnerability in the Windows kernel.
(to
the original material)
- Avaddon ransomware fixes flaw
allowing free decryption. (to
the original material)
- Internet Explorer 11 zero-day
vulnerability gets unofficial micropatch. (to
the original material)
- Microsoft avertizează cu
privire la numărul tot mai mare de atacuri web shell. (to
the original material)
- Singtel, QIMR Berghofer
report Accellion-related data breaches. (to
the original material)
- Buggy WordPress plugin
(Responsive Menu) exposes 100K sites to takeover attacks. (to
the original material)
- Intel fixes vulnerabilities
in Windows, Linux graphics drivers. (to
the original material)
- 12-year-old Windows Defender
bug gives hackers admin rights. (to
the original material)
- TrickBot's BazarBackdoor
malware is now coded in Nim (programming language) to evade
antivirus. (to
the original material)
- Hackers ask only $1,500 for
access to breached company networks. (to
the original material)
- January 2021’s Most Wanted
Malware: Emotet Continues Reign as Top Malware Threat Despite
Takedown. (to
the original material)
- IPCDump: Open-source tool for
tracing interprocess communication on Linux. (to
the original material)
- 5G experimentation and
security grows in govt, military sectors. (to
the original material)
- People are often the
collateral damage of attacks on corporations. (to
the original material)
- Credential spill incidents
nearly doubled since 2016. (to
the original material)
- Protecting productivity
within the disappearing perimeter. (to
the original material)
- Big Tech will try to pre-empt
harsh privacy laws by writing their own. (to
the original material)
- Which users are at higher
risk of email-based phishing and malware? (to
the original material)
- Vulnerabilities in widely
used TCP/IP stacks open IoT, OT devices to attack. (to
the original material)
- Microsoft Launches Phase 2
Mitigation for Netlogon Remote Code Execution Vulnerability
(CVE-2020-1472). (to
the original material)
- French MNH health insurance
company hit by RansomExx ransomware. (to
the original material)
- French MNH health insurance
company hit by RansomExx ransomware. (to
the original material)
- Microsoft now forces secure
RPC (Remote Procedure Call) to block Windows Zerologon attacks.
(to
the original material)
- Hackers auction alleged
stolen Cyberpunk 2077, Witcher source code. (to
the original material)
- SIM hijackers arrested after
stealing millions from US celebrities. (to
the original material)
- Microsoft Office February
security updates patch Sharepoint, Excel RCE bugs. (to
the original material)
- Microsoft fixes Windows 10
bug letting attackers trigger BSOD (Blue Screen Of Death)
crashes. (to
the original material)
- 6 questions you should ask
yourself when choosing an email security solution. (to
the original material)
- Roses are red, violets are
blue, cybercriminals are ready to come after you! (to
the original material)
- COVID-19 has increased
urgency for businesses to adopt VSaaS (Video
Surveillance-as-a-Service) ACaaS (Access Control-as-a-Service).
(to
the original material)
- The cost of synthetic fraud
to reach new highs. (to
the original material)
- BluBracket Community Edition:
Detect and monitor secrets in code for free. (to
the original material)
- Collaboration is the key to a
secure world-class sporting event. (to
the original material)
- When it comes to
vulnerability triage, ditch CVSS and prioritize exploitability.
(to
the original material)
- Dark web analysis shows high
demand for hackers. (to
the original material)
- Whitepaper: A new approach to
help you achieve least privilege at cloud scale. (to
the original material)
- Microsoft Releases February
2021 Security Updates. (to
the original material)
- Microsoft February 2021 Patch
Tuesday fixes 56 flaws, 1 zero-day. (to
the original material)
- Apple Releases Security
Updates. (to
the original material)
- Apple fixes SUDO root
privilege escalation flaw in macOS. (to
the original material)
- Adobe Releases Security
Updates. (to
the original material)
- Microsoft Warns of Windows
Win32k Privilege Escalation. (to
the original material)
- HelloKitty ransomware behind
CD Projekt Red cyberattack, data theft. (to
the original material)
- Microsoft urges customers to
patch critical Windows TCP/IP bugs. (to
the original material)
- New BendyBear APT malware
gets linked to Chinese hacking group. (to
the original material)
- Researcher hacks over 35 tech
firms in novel supply chain attack. (to
the original material)
- Adobe fixes critical Reader
vulnerability exploited in the wild. (to
the original material)
- Office 365 will help admins
find impersonation attack targets. (to
the original material)
- Microsoft: Recent Windows 10
gaming issues caused by Discord bug. (to
the original material)
- CD PROJEKT RED gaming studio
hit by ransomware attack. (to
the original material)
- COVID-19 impact on SecOps:
Increased threats, greater investments in automation. (to
the original material)
- Most zoombombing incidents
are inside jobs. (to
the original material)
- Your security technology is
only as strong as your team. (to
the original material)
- Can we put a stop to cyber
harassment? (to
the original material)
- Microsoft to alert enterprise
security teams when nation-state attackers target their
employees. (to
the original material)
- Hackers hit CD Projekt Red,
steal data, ask for ransom. (to
the original material)
- Misplaced expectations
securing water treatment systems. (to
the original material)
- February 2021 Patch Tuesday:
Microsoft and Adobe fix exploited zero-days. (to
the original material)
- CISA and Cyber.org partner to
deliver safety video series. (to
the original material)
- 8th February – Threat
Intelligence Report. (to
the original material)
- Mozilla Releases Security
Updates for Firefox and Firefox ESR. (to
the original material)
- Vulnerability Summary for the
Week of February 1, 2021. (to
the original material)
- Hackers gains
access via TeamViewer to the water treatment system and
tries to increase the level of caustic soda (NaOH) in
the water town. (to
the original material)
- Critical vulnerability fixed
in WordPress plugin NextGen Gallery (to create image galleries)
with 800K installs. (to
the original material)
- Cyberpunk 2077 bug fixed that
let malicious mods take over PCs. (to
the original material)
- Microsoft: Keep your guard up
even after Emotet’s disruption (banking trojan run-of-the-mill).
(to
the original material)
- Android app (developed by
Lavabird LTD) joins the dark side, sends malware update to
millions. (to
the original material)
- Microsoft to alert Office 365
users of nation-state hacking activity. (to
the original material)
- Identity verification market
to grow steadily in the next few years. (to
the original material)
- Researchers develop approach
that can recognize fake news. (to
the original material)
- Empowering a remote workforce
is a top priority for CEOs. (to
the original material)
- Organizations can no longer
afford a reactive approach to risk management. (to
the original material)
- How do I select a remote
access solution for my business? (to
the original material)
- Three ways MITRE ATT&CK
can improve your organizational security. (to
the original material)
- Open-source tool BlobHunter
helps pinpoint public Azure blobs that might contain sensitive
files. (to
the original material)
- Ziggy ransomware shuts down
and releases victims' decryption keys. (to
the original material)
- New phishing attack uses
Morse code to hide malicious URLs. (to
the original material)
- Fortinet fixes critical
vulnerabilities in SSL VPN and web firewall. (to
the original material)
- Of Kittens and Princes: the
latest updates on two Iranian espionage operations. (to
the original material)
- Week in review: Top 10 most
exploited vulns, SMB ransomware extortion, Patch Tuesday
forecast. (to
the original material)
- Mozilla fixes Windows 10 NTFS
corruption bug in Firefox. (to
the original material)
- The Great Suspender Chrome
extension's fall from grace. (to
the original material)
- Launching OSV (Open Source
Vulnerabilities) - Better vulnerability triage for open source.
(to
the original material)
- Google Releases Security
Updates for Chrome. (to
the original material)
- NCIJTF Releases Ransomware
Factsheet. (to
the original material)
- Google: 1 in 4 zero-day
security incidents in 2020 could have been avoided by good
patching techniques. (to
the original material)
- The Week in Ransomware -
February 5th 2021 - Data destruction. (to
the original material)
- Malicious extension abuses
Chrome sync to steal users’ data. (to
the original material)
- SitePoint discloses data
breach after stolen info used in attacks. (to
the original material)
- Microsoft warns of increasing
OAuth Office 365 phishing attacks. (to
the original material)
- Eletrobras, Copel energy
companies hit by DarkSide ransomware attacks. (to
the original material)
- The Growing Challenge of
Office 365 & G Suite Protection. (to
the original material)
- SOC (Security Operations
Centre) Operations: 4 Top Challenges. (to
the original material)
- Open-source tool for
hardening commonly used HMI/SCADA system. (to
the original material)
- API adoption is on the rise
across all industries. (to
the original material)
- Number of ICS vulnerabilities
disclosed in 2020 up significantly. (to
the original material)
- Data loss prevention
strategies for long-term remote teams. (to
the original material)
- The transportation sector
needs a standards-driven, industry-wide approach to
cybersecurity. (to
the original material)
- February 2021 Patch Tuesday
forecast: The human communication aspect. (to
the original material)
- Vulnerability Reward Program:
2020 Year in Review. (to
the original material)
- How we behave on Facebook:
types of behavior you should avoid. (to
the original material)
- Cisco Releases Security
Updates. (to
the original material)
- SonicWall Breach. (to
the original material)
- Google fixes Chrome zero-day
actively exploited in the wild. (to
the original material)
- Hackers steal StormShield
firewall source code in data breach after data compromise in
support ticket attack. (to
the original material)
- Hacking group also used an IE
zero-day against security researchers. (to
the original material)
- Plex Media servers actively
abused to amplify DDoS attacks. (to
the original material)
- Ransomware attacks
increasingly destroy victims’ data by mistake. (to
the original material)
- CISO’s Secrets: get behind
the scenes of cybersecurity’s trending topics. True stories,
real-life scenarios, and a solutions-focused approach. (to
the original material)
- No Matter the Network Growth,
you can always have Scalable Security Management on Demand. (to
the original material)
- Why pseudonymisation is
important to protect personal data? (to
the original material)
- NIST provides guidance to
protect controlled unclassified information. (to
the original material)
- Most are concerned about data
privacy, but few are willing to change habits. (to
the original material)
- API security concerns
hindering new application rollouts. (to
the original material)
- Major trends that are
changing the CISO role. (to
the original material)
- Runtime data no longer has to
be vulnerable data. (to
the original material)
- Google Releases Security
Updates for Chrome. (to
the original material)
- Know, Prevent, Fix: A
framework for shifting the discussion around vulnerabilities in
open source. (to
the original material)
- A new smart surveillance
camera allows attackers to spy on people. (to
the original material)
- The State pf Ransomware
2020’s Catch-22. (to
the original material)
- Oxfam Australia investigates
data breach after database put up for sale. (to
the original material)
- New Fonix ransomware
decryptor can recover victim's files for free. (to
the original material)
- SonicWall fixes actively
exploited SMA 100 zero-day vulnerability. (to
the original material)
- Cisco fixes critical code
execution bugs in SMB VPN routers. (to
the original material)
- Microsoft Defender ATP
detects Chrome updates as PHP backdoors. (to
the original material)
- SolarWinds patches critical
vulnerabilities in the Orion platform. (to
the original material)
- Latest macOS Big Sur also has
SUDO root privilege escalation flaw. (to
the original material)
- Female escort review site
data breach affects 470,000 members. (to
the original material)
- North Korean hackers try to
target security researchers investigating zero-day
vulnerabilities. (to
the original material)
- Together for a better
internet: Let's make every day Internet Safety Day. (to
the original material)
- One-third of businesses have
cloud budget overruns of up to 40%. (to
the original material)
- 93% of workers overshare
online, causing security risks. (to
the original material)
- Lack of visibility into
remote endpoints leaves companies vulnerable to ransomware. (to
the original material)
- Container security is a
priority, but who’s responsibility is it? (to
the original material)
- Kick off the year with a new
vendor management spring cleaning strategy. (to
the original material)
- Top 10 most exploited
vulnerabilities from 2020. (to
the original material)
- SolarWinds Orion exploited by
another group of state-sponsored hackers. (to
the original material)
- MyNCSC is the single point of
entry to the NCSC’s digital services including Active Cyber
Defence (ACD). (to
the original material)
- Cyber innovators help protect
UK connected places. (to
the original material)
- Zero-Day Vulnerability in
SonicWall SMA 100 Series Version 10.x Products. (to
the original material)
- Apple Releases Security
Updates. (to
the original material)
- Sudo Heap-Based Buffer
Overflow Vulnerability - CVE-2021-3156. (to
the original material)
- US federal payroll agency
hacked using SolarWinds software flaw. (to
the original material)
- Babyk Ransomware won't hit
charities, unless they support LGBT, BLM. (to
the original material)
- Microsoft Defender now
detects macOS system, app vulnerabilities. (to
the original material)
- Trickbot malware now maps
victims’ networks using Masscan. (to
the original material)
- Malicious script steals
credit card info stolen by other hackers. (to
the original material)
- Apple pulls iCloud 12 for
Windows 10 with Keychain sync feature. (to
the original material)
- New Linux malware steals SSH
credentials from supercomputers. (to
the original material)
- Netgain ransomware incident
impacts local governments. (to
the original material)
- Two employees of the Dutch
public health system have been arrested for selling information
about patients infected with the new virus. (to
the original material)
- Install available security
patches on your Apple devices – iOS 14.4 to fix “actively
exploited” security issues. (to
the original material)
- Download: The Phisher’s
Playbook. (to
the original material)
- CCAPS: New cybersecurity
category that protects households and small businesses. (to
the original material)
- The first step in protecting
ourselves is realizing that there’s a lot we can do to stay safe
online. (to
the original material)
- Digital transformation plans
have accelerated due to the pandemic. (to
the original material)
- How to motivate employees to
take cybersecurity seriously. (to
the original material)
- Extorcare ransomware SMB:
Identificarea pieselor puzzle-ului. (to
the original material)
- Actively exploited SonicWall
zero-day affects SMA 100 series appliances. (to
the original material)
- Linux malware backdoors
supercomputers. (to
the original material)
- 1st February – Threat Intelligence Report. (to
the original material)
- Vulnerability Summary for the Week of January
25, 2021. (to
the original material)
- Data breach exposes 1.6 million Washington
unemployment claims. (to
the original material)
- US govt: Number of identity theft reports
doubled last year. (to
the original material)
- Phishing campaign lures US businesses with
fake PPP (Paycheck Protection Program) loans. (to
the original material)
- SonicWall SMA 100 zero-day exploit actively
used in the wild. (to
the original material)
- Exposed Azure bucket leaked passports, IDs of
volleyball reporters. (to
the original material)
- Scammers posing as FBI agents threaten
targets with jail time. (to
the original material)
- Android emulator supply-chain attack targets
gamers with malware. (to
the original material)
- IoT Firmware Security: Zero-Day Exploitation
& Prevention. (to
the original material)
- New value exists at the intersection of
digital tech and sustainability. (to
the original material)
- Board members aren’t taking cybersecurity as
seriously as they should. (to
the original material)
- How do I select a PAM (Privileged Access
Management) solution for my business? (to
the original material)
Archive:
Click here to access CMS (Content Management System) in Joomla.
Source:
Note Dorin M.
This site has a double
form, one in HTML and one in Joomla (if you are interested
in the utility behind this effort you can read the "Why
a HTML and a CMS (Joomla)" page).
That's why I suggest you, depending on your desire, to use the HTML form for simple browsing / information or the Joomla form if you want in-depth studies / searches using the CMS search engine.
That's why I suggest you, depending on your desire, to use the HTML form for simple browsing / information or the Joomla form if you want in-depth studies / searches using the CMS search engine.
Dorin M - February 28, 2021