Study - Technical
- LMS-SFC (EN) - Cyber
Security - News
Archive June 2021
Cyber Security - News Archive
June 2021
30.06.2021 - News
from cyber security.
- PrintNightmare, Critical Windows
Print Spooler Vulnerability. (to
the original material)
- CISA’s CSET Tool Sets Sights
on Ransomware Threat. (to
the original material)
- Microsoft Releases Security
Updates for Microsoft Edge Browser. (to
the original material)
- Microsoft update on brute
force and password spraying activity. (to
the original material)
- Ransomware attacks: what they
are and how you can protect yourself. (to
the original material)
- The data of 700 million
LinkedIn accounts has reached the hackers' forums. (to
the original material)
- Leaked Babuk Locker
ransomware builder used in new attacks. (to
the original material)
- CISA releases new ransomware
self-assessment security audit tool (Ransomware Readiness
Assessment - RRA). (to
the original material)
- Windows 11 makes TPM
Diagnostics tool its first optional feature. (to
the original material)
- Microsoft finds Netgear
router bugs enabling corporate breaches. (to
the original material)
- Public Windows PrintNightmare
0-day exploit allows domain takeover. (to
the original material)
- Facebook sues hackers who
hijacked advertising agencies' accounts. (to
the original material)
- Service linked to ransomware
cartels, DoubleVPN, has its servers seized by Europol. (to
the original material)
- Freshly scraped LinkedIn data
of 88,000 US business owners shared online. (to
the original material)
- 2020 Report: ICS Endpoints as
starting point for threats. (to
the original material)
- Cyberattacks and threats
continue to break records, warns Check Point Research. (to
the original material)
- SMBs willing to spend more
money to protect their data. (to
the original material)
- An organization’s security
posture will benefit from increased coordination. (to
the original material)
- Major threats to cloud
infrastructure security include a lack of visibility and
inadequate IAM (Identity ans Access Management) inadecvat. (to
the original material)
- Chief Compliance Officers
must embrace new leadership responsibilities. (to
the original material)
- Threat modeling needs a
reset. (to
the original material)
- XDR (eXtended Detection and
Response): Security’s new frontier. (to
the original material)
- Download: The CISO’s Guide to
Third-Party Security Management. (to
the original material)
- PoC (Proof of Concept) for
critical Windows Print Spooler flaw leaked (CVE-2021-1675). (to
the original material)
- Coordinated action cuts off
access to VPN service used by ransomware groups. (to
the original material)
- Lorenz ransomware decryptor
recovers victims' files for free. (to
the original material)
- Hackers use zero-day to
mass-wipe My Book Live devices. (to
the original material)
- Windows 11 includes the
DNS-over-HTTPS (DoH) privacy feature - How
to use. (to
the original material)
- DoubleVPN servers, logs, and
account info seized by law enforcement. (to
the original material)
- Microsoft's Halo dev site
breached using dependency hijacking. (to
the original material)
- Russian hackers had
months-long access to Denmark's central bank. (to
the original material)
- Brave launches its own
privacy-focused search engine. (to
the original material)
- CISA Begins Cataloging Bad
Practices that Increase Cyber Risk. (to
the original material)
- Digital transformation needs
data integrity to be successful. (to
the original material)
- Consumers neglecting mobile
security despite growing number of threats. (to
the original material)
- Researchers design new
techniques to bolster computer security. (to
the original material)
- Unstructured data still
overshared inside and outside organizations. (to
the original material)
- Zero day malware reached an
all-time high of 74% in Q1 2021. (to
the original material)
- How to conquer synthetic
identity fraud. (to
the original material)
- Regula: Open source policy
engine for IaC (Infrastructure as Code)
security. (to
the original material)
- Cisco security devices
targeted with CVE-2020-3580 PoC exploit. (to
the original material)
- New security measures to keep
Google Play safe. (to
the original material)
- 28th June – Threat
Intelligence Report. (to
the original material)
- Phishing most common Cyber
Incident faced by SMEs. (to
the original material)
- Gaming Industry Assaulted by
Cyber Attacks During the Pandemic. (to
the original material)
- REvil ransomware's new Linux
encryptor targets ESXi virtual machines. (to
the original material)
- Ransomware gangs now creating
websites to recruit affiliates. (to
the original material)
- Vulnerability Summary for the
Week of June 21, 2021. (to
the original material)
- SMEs strongly positioned in
the data protection sector. (to
the original material)
- Many companies believe it is
important to protect employee privacy, yet few are effective in
doing so. (to
the original material)
- Technical certifications
demand growing, most IT employees have at least one. (to
the original material)
- USB threats could critically
impact business operations. (to
the original material)
- A closer look at Google
Workspace privacy and data security. (to
the original material)
- How IoT is keeping businesses
connected in an expanding network. (to
the original material)
- Navigating the complexity of
ransomware negotiations. (to
the original material)
- How do I select a big data
solution for my business? (to
the original material)
- Cisco ASA vulnerability
actively exploited after exploit released. (to
the original material)
- Week in review: Preventing
ransomware attacks, SOC burnout, and customizing your ATT&CK
database. (to
the original material)
- Nobelium hackers accessed
Microsoft customer support tools. (to
the original material)
- Microsoft admits to signing
rootkit malware in supply-chain fiasco. (to
the original material)
- New ransomware group Hive
leaks Altus group sample files. (to
the original material)
- Nothing's for free: cracked
video games earn hackers millions in crypto. (to
the original material)
- UK to investigate Amazon and
Google over fake reviews (to
the original material)
- The Week in Ransomware - June
25th 2021 - Back in Business. (to
the original material)
- Mercedes-Benz data breach
exposes SSNs, credit card numbers. (to
the original material)
- Windows 11 won't work without
a TPM (Trusted Platform Module) - What you
need to know. (to
the original material)
- Citrix Releases Security
Updates for Hypervisor. (to
the original material)
- Ireland and UK partnership
key in countering cyber threats. (to
the original material)
- The Evolution of Application
Security (AppSec). (to
the original material)
- Android devices are under
attack: fake apps and SMS messages launch malware that extracts
victims' data. (to
the original material)
- RockYou2021: Colossus of
Password Collections Published, Leaking 8.4 Billion Passwords
Online. (to
the original material)
- Criminal networks busted
using 'secure' chat app actually run by police. (to
the original material)
- Mobile Security Threats:
Truth or Myth? (to
the original material)
- Cyberattack traffic targeting
video game industry surged during the pandemic. (to
the original material)
- 71% of organizations
experienced BEC attacks over the past year. (to
the original material)
- The impact of current and
emerging threats on the day-to-day lives of SecOps teams. (to
the original material)
- Most businesses to accelerate
data security investments in 2021. (to
the original material)
- How SMBs are dealing with
emerging threats. (to
the original material)
- Third-party identity risk
management, compliance, or both? (to
the original material)
- New infosec products of the
week: June 25, 2021. (to
the original material)
- Announcing a unified
vulnerability schema for open source. (to
the original material)
- WD (Western
Digital) My Book NAS devices are being remotely
wiped clean worldwide. (to
the original material)
- First rate cyber
apprenticeships recognised by UK experts. (to
the original material)
- Study: Most health apps
collect more data than needed. (to
the original material)
- Binance exchange helped track
down Clop ransomware money launderers. (to
the original material)
- US brokerage firms warned of
'FINRA Support' phishing attacks. (to
the original material)
- A Google Drive security
update will break some of your shared links. (to
the original material)
- Phishing attack's unusual
file attachment is a double-edged sword. (to
the original material)
- Dell SupportAssist bugs put
over 30 million PCs at risk. (to
the original material)
- Security Flaws in Atlassian’s
Platform Led to Account Takeover in One Click. (to
the original material)
- Make the internet a better
and safer place on Cyberbullying Day. (to
the original material)
- Digital identity verification
spend to reach $16.7 billion in 2026. (to
the original material)
- What is the impact of remote
work on security best practices? (to
the original material)
- It takes less than one hour
to exploit vulnerable container infrastructure. (to
the original material)
- MITRE D3FEND: Enabling
cybersecurity pros to tailor defenses against specific cyber
threats. (to
the original material)
- Most third-party libraries
are never updated after being included in a codebase. (to
the original material)
- Combatting OpSec threats to
our COVID-19 vaccination efforts: What can we do? (to
the original material)
- How to convince your boss
that cybersecurity includes Active Directory. (to
the original material)
- Cyberstalking tendencies in
modern day relationships. (to
the original material)
- Vulnerabilities in Dell
computers allow RCE at the BIOS/UEFI level. (to
the original material)
- VMware Releases Security
Updates. (to
the original material)
- Social engineering (in cyber
security) – what it is and how it works. (to
the original material)
- EU Boost against
cyberattacks: EU Agency for Cybersecurity welcomes proposal for
the Joint Cyber Unit. (to
the original material)
- Healthcare giant Grupo Fleury
hit by REvil ransomware attack. (to
the original material)
- VMware fixes authentication
bypass in Carbon Black App Control. (to
the original material)
- Scammer arrested for phishing
operation, sent 25,000 texts in a day. (to
the original material)
- Tulsa warns of data breach
after Conti ransomware leaks police citations. (to
the original material)
- PYSA ransomware backdoors
education orgs using ChaChi malware. (to
the original material)
- Clop ransomware is back in
business after recent arrests. (to
the original material)
- Brave launched a
privacy-focused search engine to compete with Google. (to
the original material)
- Swedish COVID-19 lab with
millions of test results breached. (to
the original material)
- Global Surge in Ransomware
Attacks: To pay or not to pay is not the only question. (to
the original material)
- Ransomware decreases as
cybercriminals hit more lucrative targets. (to
the original material)
- Defense supply chain
vulnerabilities creating security gaps. (to
the original material)
- It’s time for companies to
take a hard look at how they manage secrets. (to
the original material)
- Only 7% of security leaders
are reporting to the CEO. (to
the original material)
- The paradox of post-quantum
crypto preparedness. (to
the original material)
- Shame culture is the biggest
roadblock to increasing security posture. (to
the original material)
- SOC burnout is real: 3
preventative steps every CISO must take. (to
the original material)
- New tool allows organizations
to customize their ATT&CK database. (to
the original material)
- Virtual machines hide
ransomware until the encryption process is done. (to
the original material)
- EU antitrust regulators to
investigate Google's adtech business. (to
the original material)
- How to Help National
Authorities deal with the Challenges of Mobile Networks
Security? (to
the original material)
- 5 essential things to do
before facing a ransomware attack. (to
the original material)
- Brave launches its
privacy-focused no-tracking search engine. (to
the original material)
- SonicWall bug affecting 800K
firewalls was only partially fixed. (to
the original material)
- Zephyr RTOS fixes Bluetooth
bugs that may lead to code execution. (to
the original material)
- Mysterious ransomware payment
traced to a sensual massage site. (to
the original material)
- Malicious PyPI packages
hijack dev devices to mine cryptocurrency. (to
the original material)
- 76% of IT decision makers
more vulnerable to mobile attacks than just a year ago. (to
the original material)
- Cloud security skills in high
demand. (to
the original material)
- Can blockchain and MPC
technology protect the integrity of auctions? (to
the original material)
- Driving network
transformation with unified communications. (to
the original material)
- Best practices for IT teams
to prevent ransomware attacks. (to
the original material)
- 21st June – Threat
Intelligence Report. (to
the original material)
- Tor Browser fixes
vulnerability that tracks you using installed apps. (to
the original material)
- OnlyFans, Twitter ban users
for leaking politician's BDSM video. (to
the original material)
- ADATA suffers 700 GB data
leak in Ragnar Locker ransomware attack. (to
the original material)
- Data leak marketplace
pressures victims by emailing competitors. (to
the original material)
- Vulnerability Summary for the
Week of June 14, 2021. (to
the original material)
- On-demand webinar:
Demystifying MDR for security conscious buyers. (to
the original material)
- Webinar la cerere:
Demistificarea MDR (Managed Detection and Response) pentru
cumpărătorii conștienți de securitate. (to
the original material)
- Worldwide HDD and SSD market
growth shows strong demand for data storage. (to
the original material)
- Multi-cloud transit enhances
app experience but brings complexity and security challenges. (to
the original material)
- What is plaguing digital
identities? (to
the original material)
- Most organizations would pay
in the event of a ransomware attack. (to
the original material)
- How to rethink risks with new
cloud deployments. (to
the original material)
- Embrace integrations and
automation as you build a security program. (to
the original material)
- How do I select a virtual SOC
solution for my business? (to
the original material)
- Scammers are impersonating
the DarkSide ransomware gang. (to
the original material)
- Fertility clinic discloses
data breach exposing patient info. (to
the original material)
- Google force installs
Massachusetts MassNotify Android COVID app. (to
the original material)
- South Korea's Nuclear
Research agency hacked using VPN flaw. (to
the original material)
- iPhone bug breaks WiFi when
you join hotspot with unusual name. (to
the original material)
- Tinder spam campaign hides
"handwritten" links in profile images. (to
the original material)
- Week in review: VPN attacks
up nearly 2000%, Root of Trust for the cloud era. (to
the original material)
- Get ready for the 2021 Google
CTF. (to
the original material)
- Remote employees pay $111
monthly for work-related cybersecurity - report. (to
the original material)
- The Week in Ransomware - June
18th 2021 - Law enforcement strikes back. (to
the original material)
- Poland blames Russia for
breach, theft of Polish officials' emails. (to
the original material)
- Google Releases Security
Updates for Chrome. (to
the original material)
- Pandemic urges strong
measures to address risks on the security of personal data. (to
the original material)
- Fake DarkSide gang targets
energy, food industry in extortion emails. (to
the original material)
- Russia bans Opera VPN and
VyprVPN, classifies them as threats. (to
the original material)
- US supermarket chain Wegmans
notifies customers of data breach. (to
the original material)
- Biden to Putin:
infrastructure hacks should be 'off-limits'. (to
the original material)
- Real Users Weigh in on the
Characteristics of a Good Next-Generation Firewall (NGFW - Next
Generation Firewall). (to
the original material)
- Software delivery maturity
generating business benefits. (to
the original material)
- Cloud security posture
confidence is high, yet most IT pros have experienced a
cloud-related breach. (to
the original material)
- Malicious COVID-19 online
content bypassing moderation efforts of social media platforms.
(to
the original material)
- The challenges of technical
debt and how it impacts organizations. (to
the original material)
- 73% of enterprises suffer
security and compliance issues due to internal misalignment. (to
the original material)
- Can on-prem security experts
make the move to the cloud? (to
the original material)
- New infosec products of the
week: June 18, 2021. (to
the original material)
- Eggfree Cake Box suffer data
breach exposing credit card numbers. (to
the original material)
- Financial sector cyber
collaboration centre (FSCCC). (to
the original material)
- Cisco Releases Security
Updates for Multiple Products. (to
the original material)
- Google fixes seventh Chrome
zero-day exploited in the wild this year. (to
the original material)
- Audi, Volkswagen customer
data being sold on a hacking forum. (to
the original material)
- NSA shares guidance on
securing voice, video communications. (to
the original material)
- Carnival Cruise hit by data
breach, warns of data misuse risk. (to
the original material)
- Vigilante malware blocks
victims from downloading pirated software. (to
the original material)
- Worldwide server market
reaching $20.9 billion during 1Q21. (to
the original material)
- Flexible work is the new
operating model. (to
the original material)
- What is the true meaning of
SASE? (to
the original material)
- Organizations ill-equipped to
deal with growing BYOD (Bring Your Own Device)
security threats. (to
the original material)
- Care este costul real al
ransomware-ului? (to
the original material)
- Are your cryptographic keys
truly safe? Root of Trust redefined for the cloud era. (to
the original material)
- Preventing security issues
from destroying the promise of IoT. (to
the original material)
- Unprotected CVS database
exposed sensitive customer searches. (to
the original material)
- Microsoft Defender for
Endpoint now detects jailbroken iOS devices. (to
the original material)
- Introducing SLSA, an
End-to-End Framework for Supply Chain Integrity. (to
the original material)
- Cl0p affiliated hackers
exposed in Ukraine, $500 million in damages estimated. (to
the original material)
- Criminals are mailing altered
Ledger devices to steal cryptocurrency. (to
the original material)
- US convicts Russian national
behind Kelihos botnet crypting service. (to
the original material)
- Microsoft takes down a
large-scale Business Email Compromise operation. (to
the original material)
- Ukraine arrests Clop
ransomware gang members, seizes servers. (to
the original material)
- Peloton Bike+ vulnerability
allowed complete takeover of devices. (to
the original material)
- Cybercriminals go after
Amazon Prime Day Shoppers. (to
the original material)
- Are you making plans for your
summer vacation? Here's what you need to know to avoid holiday
booking scams. (to
the original material)
- CISA and FBI warn of new
spearphishing campaign targeting government organizations and
NGOs. (to
the original material)
- Bad cybersecurity behaviors
plaguing the remote workforce. (to
the original material)
- Open source UChecker tool
detects vulnerable libraries on Linux servers. (to
the original material)
- Identity management is now
mostly about security. (to
the original material)
- Effects of the pandemic on
consumer security behaviors. (to
the original material)
- Corporate attack surfaces
growing concurrently with a dispersed workforce. (to
the original material)
- Understanding the cloud
shared responsibility model. (to
the original material)
- How to secure data one
firewall at a time. (to
the original material)
- Apple fixes actively
exploited vulnerabilities affecting older iDevices. (to
the original material)
- Avaddon ransomware's exit
sheds light on victim landscape. (to
the original material)
- Microsoft Defender ATP (Advanced
Threat Protection) now warns of jailbroken iPhones,
iPads. (to
the original material)
- Paradise Ransomware source
code released on a hacking forum. (to
the original material)
- Largest US propane
distributor discloses '8-second' data breach. (to
the original material)
- Vishing: What is it and how
do I avoid this scam? (to
the original material)
- Apple Releases Security
Updates for iOS 12.5.4. (to
the original material)
- Hackers counts on the
popularity of Bitcoin and Elon Musk in their latest fraud
campaign. (to
the original material)
- Google Workspace adds new
phishing protection, client-side encryption. (to
the original material)
- Apple fixes ninth zero-day
bug exploited in the wild this year. (to
the original material)
- Ransomware Double Extortion
and Beyond: REvil, Clop, and Conti. (to
the original material)
- Vaccine passports challenged
by data privacy and security implications. (to
the original material)
- Top threats to consumer cyber
safety. (to
the original material)
- Cloud computing costs
skyrocketing as businesses support a remote workforce. (to
the original material)
- VPN attacks up nearly 2000%
as companies embrace a hybrid workplace. (to
the original material)
- Why XSS (Cross-site
scripting) is still an XXL issue in 2021. (to
the original material)
- To identify cybersecurity
vendor sustainability, start with the fundamentals. (to
the original material)
- How do I select an ITSM (IT
Service Management) solution for my business? (to
the original material)
- Cyber criminals are targeting
digital artists. (to
the original material)
- 14th June – Threat
Intelligence Report. (to
the original material)
- CISA Releases Advisory on
ZOLL Defibrillator Dashboard. (to
the original material)
- NCSC CEO warns that
ransomware is key cyber threat. (to
the original material)
- G7 leaders ask Russia to hunt
down ransomware gangs within its borders. (to
the original material)
- REvil ransomware hits US
nuclear weapons contractor Sol Oriens. (to
the original material)
- Microsoft: Scammers bypass
Office 365 MFA in BEC (Business Email Compromise)
attacks. (to
the original material)
- Microsoft: SEO poisoning used
to backdoor targets with malware. (to
the original material)
- Fujifilm resumes normal
operations after ransomware attack. (to
the original material)
- Vulnerability Summary for the
Week of June 7, 2021. (to
the original material)
- Ransomware attacks continue
to Surge, hitting a 93% increase year over year. (to
the original material)
- Data teams are discovering
the benefits of automation and flexible coding. (to
the original material)
- PrivacyMic: A smart home
system that doesn’t record speech. (to
the original material)
- Phishing maintained
near-record levels in the first quarter of 2021. (to
the original material)
- Business leaders now feel
more vulnerable to cyber attacks. (to
the original material)
- Investing in the right future
for the cloud. (to
the original material)
- Are your cyber defenses stuck
in the sandbox? (to
the original material)
- Ransomware attackers are
leveraging old SonicWall SRA flaw (CVE-2019-7481). (to
the original material)
- How a conference room
speakerphone might let attackers into your company network? (to
the original material)
- Interpol shuts down thousands
of fake online pharmacies. (to
the original material)
- Week in review: Microsoft
Teams risks, open-source dependencies, DNS’s role in network
security. (to
the original material)
- Audi, Volkswagen data breach
affects 3.3 million customers. (to
the original material)
- Intuit notifies customers of
compromised TurboTax accounts. (to
the original material)
- McDonald's operations in
South Korea and Taiwan hit by data breach. (to
the original material)
- Electronic Arts breach: FIFA
2021 and Frostbite source codes, 9 million user records stolen
from EA and sold online. (to
the original material)
- The Week in Ransomware - June
11th 2021 - Under Pressure. (to
the original material)
- McDonald's discloses data
breach after theft of customer, employee info. (to
the original material)
- Avaddon ransomware shuts down
and releases decryption keys. (to
the original material)
- Network security firm COO
charged with medical center cyberattack. (to
the original material)
- Linux system service bug lets
you get root on most modern distros. (to
the original material)
- Wanted: Cyber security
innovators to help secure UK networks. (to
the original material)
- Google fixes an actively
exploited zero-day vulnerability in Chrome. (to
the original material)
- Biometrics for banking and financial services market to reach $8.9 billion by 2026. (to the original material)
- One step closer to
quantum-secure conference calls. (to
the original material)
- DDoS attacks increase 341%
amid pandemic. (to
the original material)
- Digital criminals turn
toward vaccines to capitalize on COVID-19. (to
the original material)
- The future of FISA
(Foreign Intelligence Surveillance Act). (to
the original material)
- Quantum computing is
imminent, and enterprises need crypto agility now. (to
the original material)
- New infosec products of
the week: June 11, 2021. (to
the original material)
- Analysis: online scam cost
victims over $9 million in 2020. (to
the original material)
- Meat supplier JBS admits
paying hackers a ransom of $11 million. (to
the original material)
- How to hack a satellite. (to
the original material)
- Google Releases Security
Updates for Chrome. (to
the original material)
- Cyber security toolkit for
boards: audio transcripts. (to
the original material)
- Foodservice supplier Edward
Don hit by a ransomware attack. (to
the original material)
- CD Projekt: Data stolen in
ransomware attack now circulating online. (to
the original material)
- Slilpp, the largest stolen
logins market, seized by law enforcement. (to
the original material)
- Hackers breach gaming giant
Electronic Arts, steal game source code. (to
the original material)
- JBS paid $11 million to REvil
ransomware, $22.5M first demanded. (to
the original material)
- Cyber security toolkit for
boards: audio transcripts. (to
the original material)
- Check Point Software´s May
2021 Most Wanted Malware: Dridex Drops from List While Trickbot
Rises to Top. (to
the original material)
- European cloud computing
market to surpass $140 billion by 2028. (to
the original material)
- Data security still a major
concern for most consumers. (to
the original material)
- Quantum communications
reaching record distances. (to
the original material)
- 54% of all employees reuse
passwords across multiple work accounts. (to
the original material)
- The 6 steps to implementing
zero trust. (to
the original material)
- Mitigating third-party risks
with effective cyber risk management. (to
the original material)
- Ransomware has become a cost
of doing business. (to
the original material)
- Cybercrime: it will get worse
before it gets better. (to
the original material)
- One password allowed hackers
to disrupt Colonial Pipeline, CEO tells senators. (to
the original material)
- Google fixes sixth Chrome
zero-day exploited in the wild this year. (to
the original material)
- FBI warns of BEC (Business
Email Compromise) scammers impersonating
construction companies. (to
the original material)
- Microsoft warns of
cryptomining attacks on Kubernetes clusters. (to
the original material)
- CISA Addresses the Rise in
Ransomware Targeting Operational Technology Assets. (to
the original material)
- Stealthy Gelsemium cyberspies
linked to NoxPlayer supply-chain attack. (to
the original material)
- Spain's Ministry of Labor and
Social Economy hit by cyberattack. (to
the original material)
- GitHub now scans for
accidentally-exposed PyPI, RubyGems secrets. (to
the original material)
- From VPN to ZTNA (Zero
Trust Network Access) – The Evolution of Secure
Remote Work. (to
the original material)
- Data privacy management
software market to grow steadily. (to
the original material)
- Most mobile finance apps
vulnerable to data breaches. (to
the original material)
- How can companies prioritize
contact center security? (to
the original material)
- Organizations leveraging
Microsoft Teams exposed to potential risk. (to
the original material)
- For CISOs and artificial
intelligence to evolve, trust is a must. (to
the original material)
- Enhancing cyber resilience:
What your team needs to know. (to
the original material)
- What happens to email
accounts once credentials are compromised? (to
the original material)
- Can your MFA
(Multi-Factor Authentication) implementations stymie
MFA bypass attacks? (to
the original material)
- Rust/C++ interop in the
Android Platform. (to
the original material)
- Verifiable Supply Chain
Metadata for Tekton. (to
the original material)
- Email vendor for the U.S.
House hit by a ransomware attack. (to
the original material)
- SAP Releases June 2021
Security Updates. (to
the original material)
- Adobe Releases Security
Updates for Multiple Products. (to
the original material)
- Microsoft Releases June 2021
Security Updates. (to
the original material)
- Intel fixes 73
vulnerabilities in June 2021 Platform Update. (to
the original material)
- Windows 10 targeted by
PuzzleMaker hackers using Chrome zero-days. (to
the original material)
- Microsoft June 2021 Patch
Tuesday fixes 6 exploited zero-days, 50 flaws. (to
the original material)
- Computer memory maker ADATA
hit by Ragnar Locker ransomware. (to
the original material)
- Adobe issues security updates
for 41 vulnerabilities in 10 products. (to
the original material)
- US brokerage firms warned of
ongoing phishing with penalty threats. (to
the original material)
- Microsoft Office MSGraph
vulnerability could lead to code execution. (to
the original material)
- FBI and AFP created a fake
encrypted chat platform to catch criminals. (to
the original material)
- StackOverflow, Twitch,
Reddit, others down in Fastly CDN outage. (to
the original material)
- Modern ransomware's double
extor4tion tactics and how to protect enterprises against them.
(to
the original material)
- The Ultimate Guide to 2020
MITRE ATT&CK® Evaluations. (to
the original material)
- Four Security Vulnerabilities
were Found in Microsoft Office. (to
the original material)
- Guidance to help cyber threat
intelligence analysts apply MITRE ATT&CK. (to
the original material)
- Biden’s plan for
strengthening US cybersecurity is too soft. (to
the original material)
- Application security
approaches broken by rising adoption of cloud-native
architectures. (to
the original material)
- Apple privacy protections in
iOS 15, iPadOS 15, macOS Monterey, and watchOS 8. (to
the original material)
- Apple privacy protections in
iOS 15, iPadOS 15, macOS Monterey, and watchOS 8. (to
the original material)
- Reformulating the cyber
skills gap. (to
the original material)
- Defending the COVID-19
vaccine rollout with best practices from the cybersecurity
industry. (to
the original material)
- DoJ seized $2.3 million paid
to the Colonial Pipeline ransomware extortionists. (to
the original material)
- June 2021 Patch Tuesday:
Microsoft fixes six actively exploited zero-days. (to
the original material)
- 7th June – Threat
Intelligence Report. (to
the original material)
- U.S. officials up pressure on
firms, foreign adversaries over cyberattacks. (to
the original material)
- US recovers most of Colonial
Pipeline's $4.4M ransomware payment. (to
the original material)
- A zero-day vulnerability
found in a WordPress plugin has been exploited to hijack
websites. (to
the original material)
- US truck and military vehicle
maker Navistar discloses data breach. (to
the original material)
- New Kubernetes malware
backdoors clusters via Windows containers. (to
the original material)
- Vulnerability Summary for the
Week of May 31, 2021. (to
the original material)
- Banks accelerating their risk
management transformation. (to
the original material)
- Beware of “Ransomware system
update” emails! (to
the original material)
- New Evil Corp ransomware
mimics PayloadBin gang to evade US sanctions. (to
the original material)
- Signal app safety numbers do
not always change - here's why. (to
the original material)
- Google, Microsoft, and
Mozilla work together on better browser extensions. (to
the original material)
- Amazon to share your Internet
with neighbors on Tuesday - How to opt out. (to
the original material)
- Week in review: Kali Linux
2021.2, the human cost of understaffed SOCs, Patch Tuesday
forecast. (to
the original material)
- GitHub's new policies allow
removal of PoC (Proof of Concept) exploits
used in attacks. (to
the original material)
- Watch out: These online
casino emails never pay what they promise. (to
the original material)
- Announcing New Abuse Research
Grants Program. (to
the original material)
- Digital downsides: 5 ways
technology makes our lives harder. (to
the original material)
- Biden order bans investment
in dozens of Chinese defense, tech firms. (to
the original material)
- The Week in Ransomware - June
4th 2021 - Where's the beef? (to
the original material)
- US charges Latvian for
helping develop the Trickbot malware. (to
the original material)
- Phishing uses Colonial
Pipeline ransomware lures to infect victims. (to
the original material)
- Attackers are scanning for
vulnerable VMware servers, patch now! (to
the original material)
- Google announces new
experimental Abuse Research Grants Program. (to
the original material)
- Unpatched VMware vCenter
Software. (to
the original material)
- Alert: Further ransomware
attacks on the UK education sector by cyber criminals. (to
the original material)
- Fujifilm confirms ransomware
attack disrupted business operations. (to
the original material)
- FreakOut malware worms its
way into vulnerable VMware servers. (to
the original material)
- Meat giant JBS now fully
operational after ransomware attack. (to
the original material)
- CIS Community Defense Model
v2.0 is coming this summer. (to
the original material)
- Future of work driven by
employees having the ability to work anywhere. (to
the original material)
- Cyberattacks target the
anywhere workforce, legacy security systems can’t provide
protection. (to
the original material)
- Higher encryption adoption
driven by rising data breach threats. (to
the original material)
- What happens after a
malicious email reaches employees’ inboxes? (to
the original material)
- Changes in the privacy
landscape through the pandemic. (to
the original material)
- Quantum computing: How should
cybersecurity teams prepare for it? (to
the original material)
- June 2021 Patch Tuesday
forecast: Patch management is back in the spotlight. (to
the original material)
- Critical vulnerabilities
identified in CODESYS ICS automation software. (to
the original material)
- White House urges private
sector to enhance their ransomware defenses. (to
the original material)
- New protections for Enhanced
Safe Browsing users in Chrome. (to
the original material)
- How not to encourage trolling
and tips to avoid online drama. (to
the original material)
- Cisco Releases Security
Updates for Multiple Products. (to
the original material)
- US Supreme Court restricts
broad scope of CFAA law. (to
the original material)
- Microsoft Teams calls are
getting end-to-end encryption in July. (to
the original material)
- UF Health Florida hospitals
back to pen and paper after cyberattack. (to
the original material)
- WordPress force installs
Jetpack security update on 5 million sites. (to
the original material)
- Scripps Health notifies
patients of data breach after ransomware attack. (to
the original material)
- Google Chrome now warns you
of extensions from untrusted devs. (to
the original material)
- Chinese threat actors hacked
NYC MTA (New York City's Metropolitan
Transportation Authority) using Pulse Secure
zero-day. (to
the original material)
- New SkinnyBoy malware used by
Russian hackers to breach sensitive orgs. (to
the original material)
- White House urges businesses
to "take ransomware crime seriously". (to
the original material)
- Massachusetts' largest ferry
service hit by ransomware attack. (to
the original material)
- ARIN (American Registry for
Internet Numbers) will take down its RPKI (Resource
Public Key Infrastructure) for 30 minutes to test
your BGP (Border Gateway Protocol) routes.
(to
the original material)
- Chinese APT group targets
Southeast Asian government with previously unknown backdoor. (to
the original material)
- The everywhere workplace is
here to stay. (to
the original material)
- Threat intelligence: The
biggest blind spot for CISOs. (to
the original material)
- Remote working security
concerns still lingering. (to
the original material)
- It’s time to stop ransomware
in its tracks. (to
the original material)
- Malware-related attacks jump
by 54%. (to
the original material)
- Making transparency a norm in
cybersecurity. (to
the original material)
- Reimagining enterprise
cryptography: How to regain control in a fragmented environment.
(to
the original material)
- CISA Releases Best Practices
for Mapping to MITRE ATT&CK®. (to
the original material)
- Mozilla Releases Security
Updates for Firefox. (to
the original material)
- Cisco Releases Security
Updates for Multiple Products. (to
the original material)
- 5 common scams targeting
teenagers - how to stay safe. (to
the original material)
- FBI: REvil cybergang behind
the JBS ransomware attack. (to
the original material)
- Fujifilm shuts down network
after suspected ransomware attack. (link
material material)
- Norton 360 antivirus now lets
you mine Ethereum cryptocurrency. (to
the original material)
- Hacker forum contest gives
$100K for new ways to steal digital assets. (to
the original material)
- Kali Linux 2021.2 released
with new tools, improvements, and themes. (to
the original material)
- Huawei USB LTE dongles are
vulnerable to privilege escalation attacks. (to
the original material)
- AI-based diagnostic processes
that safeguard data privacy. (to
the original material)
- Operation HAECHI-I intercepts
$83M in online financial crimes. (to
the original material)
- Adapting the network for a
remote working future. (to
the original material)
- The most important point in a
cyberattack is before it happens. (to
the original material)
- The power of positive
reinforcement in combating cybercriminals. (to
the original material)
- Kali Linux 2021.2 released:
Kaboxer, Kali-Tweaks, new tools, and more! (to
the original material)
- Cyber attack hits factories
in Australia, North America. (to
the original material)
- US seizes domains used by
APT29 in recent USAID phishing attacks. (to
the original material)
- US: Russian threat actors
likely behind JBS ransomware attack. (to
the original material)
- Microsoft adds Automatic
HTTPS in Edge for secure browsing. (to
the original material)
- Critical WordPress plugin
zero-day under active exploitation. (to
the original material)
- Windows 10's package manager
flooded with duplicate, malformed apps. (to
the original material)
- Firefox now blocks cross-site
tracking by default in private browsing. (to
the original material)
- Security leaders more
concerned about legal settlements than regulatory fines. (to
the original material)
- The human cost of
understaffed SOCs. (to
the original material)
- Endpoint complexities leaving
sensitive data at risk. (to
the original material)
- EUCC receives first EU
cybersecurity certification scheme. (to
the original material)
- Helping security teams
respond to gaps in security and compliance programs with Qualys
CSAM (CyberSecurity Asset Management). (to
the original material)
- Cybersecurity industry
analysis: Another recurring vulnerability we must correct. (to
the original material)
- How do I select a data
analytics solution for my business? (to
the original material)
- A CISO’s Guide: Mitigating
the Human Risk Factor. (link
materia original)
Archive:
Click here to access CMS (Content Management System) in Joomla.
Source:
Note Dorin M.
This site has a double
form, one in HTML and one in Joomla (if you are interested
in the utility behind this effort you can read the "Why
a HTML and a CMS (Joomla)" page).
That's why I suggest you, depending on your desire, to use the HTML form for simple browsing / information or the Joomla form if you want in-depth studies / searches using the CMS search engine.
That's why I suggest you, depending on your desire, to use the HTML form for simple browsing / information or the Joomla form if you want in-depth studies / searches using the CMS search engine.
Dorin M - June 30, 2021