Study - Technical - LMS-SFC (EN) - Cyber Security - News Archive January 2022
Cyber Security - News Archive
January 2022
31.01.2022
- News
from Cyber Security.
- Vulnerability Summary for
the Week of January 24, 2022. (to
the original material)
- FBI warns of 2022 Beijing
Olympics cyberattack, privacy risks. (to
the original material)
- Samba bug can let remote
attackers execute code as root. (to
the original material)
- 600K WordPress sites
impacted by critical plugin RCE vulnerability. (to
the original material)
- QNAP: DeadBolt ransomware
exploits a bug patched in December. (to
the original material)
- CISA adds 8
vulnerabilities to list of actively exploited bugs. (to
the original material)
- Microsoft Office 365 to
add better protection for priority accounts. (to
the original material)
- Russian "Gamaredon"
hackers use 8 new malware payloads in attacks. (to
the original material)
- 277,000 routers exposed
to Eternal Silence attacks via UPnP. (to
the original material)
- Cybersecurity staff
turnover and burnout: How worried should organizations be? (to
the original material)
- Reducing the blast radius
of credential theft. (to
the original material)
- Why vulnerability
scanners aren’t enough to prevent a ransomware attack on
your business. (to
the original material)
- How costly is an insider
threat? (to
the original material)
- Number of data
compromises reaching all-time high. (to
the original material)
- Cloud infrastructure
spending jumped to $18.6B in 3Q21. (to
the original material)
- Dark Overlord
collaborator sentenced to three years. (to
the original material)
- Prison for Dark Overlord
collaborator. (to
the original material)
- Banking Trojan in Google
Play App Store - "2FA Authenticator" drops Vultur RAT. (to
the original material)
- Number of COVID-19
testing scams jumps sharply. (to
the original material)
- Ransomware gangs are
recruiting your employees. (to
the original material)
- Attacks signal coming
shift from ID theft to ID fraud. (to
the original material)
- Cengage to buy
cybersecurity training platform, Infosec. (to
the original material)
- Aussie Tech entrepreneur
extradited over SMS fraud. (to
the original material)
- Bad Clicks and fallible
users: How organizations can mitigate insider risks. (to
the original material)
- The vulnerability of the
UK's "Just in Time" supply chain. (to
the original material)
- #HowTo: Implement
continuous compliance for Kubernetes. (to
the original material)
- US revokes China Unicom's
license. (to
the original material)
- Crypto Finance Firm
offers $2m bug bounty to hackers. (to
the original material)
- QNAP Ransomware:
Thousands infected with DeadBolt. (to
the original material)
- Researchers uncover new
Iranian hacking campaign targeting Turkish users. (to
the original material)
- New SureMDM
vulnerabilities could expose companies to supply chain
attacks. (to
the original material)
- SureMDM vulnerabilities
exposed companies to supply chain attacks. (to
the original material)
- New Samba bug allows
remote attackers to execute arbitrary code as root. (to
the original material)
- Behind The Buzzword: Four
ways to assess your Zero Trust security posture. (to
the original material)
- Your graphics card
fingerprint can be used to track your activities across the
web. (to
the original material)
- German Court rules
websites embedding Google fonts violates GDPR. (to
the original material)
- Crypto outfit Qubit
appeals to the honour of thieves who lifted $80M of its
digi-dollars. (to
the original material)
- 3 Things you should
consider before mining Monero. (to
the original material)
- The Third Building Block
for the SOC of the Future: Balanced Automation. (to
the original material)
- CISA's "Must Patch" list
puts spotlight on Vulnerability Management Processes. (to
the original material)
- Israeli lawyer, Hungarian
rights group target Pegasus Spyware. (to
the original material)
- Iranian APT MuddyWater
targets Turkish users via malicious PDFs, executables. (to
the original material)
- Vulnerability Spotlight:
Memory corruption and use-after-free vulnerabilities in
Foxit PDF Reader. (to
the original material)
- Data on children of armed
forces personnel exposed in data breach at the
Ministry of Defense (UK). (to
the original material)
- How to tell if your phone
has been hacked. (to
the original material)
- ITRC data breach report
shows surge in data compromises. (to
the original material)
- Rust-Coded malware key
factor in BlackCat's meteoric rise. (to
the original material)
- Report details Russian
cyberespionage efforts in Ukraine. (to
the original material)
- HHS HC3: BlackMatter
threat to Health Sector "Reduced". (to
the original material)
- Lazarus using Windows
Update, GitHub to deploy malware. (to
the original material)
- Unsecured AWS server
exposed 3TB in airport employee records. (to
the original material)
- Meta will warn you if
someone screengrabs your encrypted Messenger chats. (to
the original material)
- This is the year to build
a cybersecurity culture. (to
the original material)
- Breaches exposed 45.67M
patient records in 2021, largest annual total since 2015. (to
the original material)
- Feds move to settle case
with DoD cyber official in clearance dispute. (to
the original material)
- Finance organizations
targeted by ransomware may be "left chasing shadows". (to
the original material)
- Bug Bounty Radar - The
latest bug bounty programs for February 2022. (to
the original material)
- No smoke without fire?
"Critical" Loguru security flaw turns out to be non-issue. (to
the original material)
- Vulnerability in PostBus
public transport platform exposed customer data. (to
the original material)
- Emsisoft releases
DeadBolt ransomware decryption tool. (to
the original material)
- Shuckworm continues
cyber-espionage attacks against Ukraine. (to
the original material)
- DazzleSpy backdoor spies
on Hong Kong politicians. (to
the original material)
- Cobalt Strike and
Prometheus Traffic Direction System - New tools of the cyber
threat trade. (to
the original material)
- Reasons why every
business is a target of DDoS attacks. (to
the original material)
- Top Ways websites get
hacked by spammers. (to
the original material)
- Microsoft OneDrive for
macOS local privilege escalation. (to
the original material)
- Outdated IoT healthcare
devices pose major security threats. (to
the original material)
- Microsoft: Here's how we
stopped the biggest ever DDoS attack. (to
the original material)
- Interview with
Narendra Sahoo – VISTA InfoSec. (to
the original material)
30.01.2022
- News
from Cyber Security.
- Researchers use GPU
fingerprinting to track users online. (to
the original material)
- Researchers use natural
silk fibers to generate secure keys for strong
authentication. (to
the original material)
- Apple pays $100,500
bounty to hacker who found way to hack MacBook Webcam. (to
the original material)
- DeepDotWeb news site
operator sentenced to 8 years for money laundering. (to
the original material)
- FTC: Americans lost $770
million from social media fraud surge. (to
the original material)
- Role of computer science
degrees in the field of cybersecurity. (to
the original material)
- Big differences between
computer science and cyber degrees. (to
the original material)
- Week in review: PolKit
vulnerability, fake tax apps pushing malware, EU’s bug
bounty for open source. (to
the original material)
- Finnish diplomats
targeted by Pegasus Spyware: Ministry. (to
the original material)
29.01.2022
- News
from Cyber Security.
- Jupyter: A
Cyberspace invader stealing SLTT Data. (to
the original material)
- Microsoft Azure customer
hit by largest ever 3.47 Tbps DDoS attack. (to
the original material)
- FBI reportedly considered
buying NSO Spyware. (to
the original material)
- Designing security to
mitigate growing ransomware threats. (to
the original material)
- Windows vulnerability
with new public exploits lets you become admin. (to
the original material)
- Over 20,000 data center
management systems exposed to hackers. (to
the original material)
- Information assurance vs
cybersecurity. (to
the original material)
- What are the best
cybersecurity programming languages? (to
the original material)
28.01.2022
- News
from Cyber Security.
- CISA adds eight known
exploited vulnerabilities to Catalog. (to
the original material)
- The National Directorate
of Cybersecurity (DNSC) participated in the European
cybersecurity crisis exercise - 'EU Cyber Crisis Linking
Exercise on Solidarity – EU CyCLES. (to
the original material)
- New infosec products of
the week: January 28, 2022. (to
the original material)
- Ransomware families
becoming more sophisticated with newer attack methods. (to
the original material)
- Why we can’t put all our
trust into AI. (to
the original material)
- Healthcare industry
most common victim of third-party breaches last year. (to
the original material)
- Use of AI to fight
insurance fraud hits all-time high. (to
the original material)
- The state of SD-WAN and
SASE planning. (to
the original material)
- Spending on edge
computing to reach $176 billion in 2022. (to
the original material)
- QNAP force-installs
update after DeadBolt ransomware hits 3,600 devices. (to
the original material)
- FBI releases PIN (Private
Industry Notification) on Iranian cyber group Emennet
Pasargad. (to
the original material)
- Zoom launches virtual
conference floor for online events. (to
the original material)
- Cisco adds Webex support
to SD-WAN Cloud OnRamp. (to
the original material)
- Accenture, Celonis
partner in process mining technology. (to
the original material)
- Microsoft gives NASA a
lesson in timeshare optimisation. (to
the original material)
- British court rules in
HP’s favour in Mike Lynch fraud case. (to
the original material)
- Kaseya boss looking for
strong 2022. (to
the original material)
- Cyber skills gap
affecting data privacy practice, finds ISACA. (to
the original material)
- Korean researchers invent
silk-based security device. (to
the original material)
- Manchester United signs
Extreme Networks to modernize in-stadium connectivity
experience. (to
the original material)
- Leeds NHS Trust moves
millions of patient records to the Microsoft Azure public
cloud. (to
the original material)
- Smart connectivity to
transform world experience within a decade. (to
the original material)
- Verizon Business and Atos
team on predictive analytics 5G edge solution. (to
the original material)
- CISOs must get out in
front of Ukraine cyber crisis, says NCSC. (to
the original material)
- The Week in Ransomware -
January 28th 2022 - Get NAS devices off the Internet. (to
the original material)
- US bans major Chinese
telecom over national security risks. (to
the original material)
- NCSC alerts UK orgs to
brace for destructive Russian cyberattacks. (to
the original material)
- EU to create pan-European
cyber incident coordination framework. (to
the original material)
- Hackers are taking over
CEO accounts with rogue OAuth apps. (to
the original material)
- Finnish diplomats’ phones
infected with NSO Group Pegasus spyware. (to
the original material)
- Finland warns of Facebook
accounts hijacked via Messenger phishing. (to
the original material)
- Microsoft Outlook RCE
zero-day exploits now selling for $400,000. (to
the original material)
- Fake cash scams thrive on
Facebook and Insta - FTC. (to
the original material)
- From Drone to
Counter-Drone: The shifting role of cybersecurity. (to
the original material)
- FBI issues warning over
Iranian cyber company. (to
the original material)
- Most ransomware
infections are self-installed. (to
the original material)
- Water utilities get
100-Day cybersecurity plan. (to
the original material)
- White House releases Zero
Trust Strategy for federal government. (to
the original material)
- NCSC warns UK
organizations to prepare for Russian cyber-attacks. (to
the original material)
- Online investment fraud
network taken down by law enforcement. (to
the original material)
- 2FA Authenticator App
downloaded Vultur Trojan on 10,000 Android devices. (to
the original material)
- Hackers using device
registration trick to attack enterprises with lateral
phishing. (to
the original material)
- How Wazuh can improve
digital security for businesses. (to
the original material)
- North Korean hackers
using Windows Update Service to infect PCs with malware. (to
the original material)
- North Korean hackers
return with stealthier variant of KONNI RAT malware. (to
the original material)
- Internet Society condemns
UK's Online Safety Bill for demonizing encryption using
"think of the children" tactic. (to
the original material)
- Silk could tie up
all-but-unbreakable encryption, say South Korean boffins. (to
the original material)
- Intel fails to get
Spectre, Meltdown chip flaw class-action super-suit tossed
out. (to
the original material)
- What You should know
about Private Residential Proxies? (to
the original material)
- Cyber Fraud Trends to be
aware of in 2022: From iGaming to pandemic-related phishing.
(to
the original material)
- What are the best
cybersecurity certifications for beginners? (to
the original material)
- In the Hacker's
crosshairs: K-12 Schools. (to
the original material)
- Threat Roundup for
January 21 to January 28. (to
the original material)
- Week in security with
Tony Anscombe. (to
the original material)
- New ransomware DeadBolt
targets QNAP devices. (to
the original material)
- DeFi Platform Qubit
Finance hacked for $80 million. (to
the original material)
- Log4j exploitations have
slowed, but attack vectors remain. (to
the original material)
- FCC votes to ban China
Unicom from operating in US. (to
the original material)
- How refund fraud changed
the cybercrime landscape. (to
the original material)
- New macOS malware planted
via Pro-Democracy Hong Kong Radio. (to
the original material)
- Flaw in Polkit's pkexec
puts Linux users at risk. (to
the original material)
- Darknet Market search
engine operator gets 8-year sentence. (to
the original material)
- ISMG Editors: Tough
lessons learned from Log4j, ransomware. (to
the original material)
- Cyberattack spillover
from Ukraine: Be prepared, UK warns. (to
the original material)
- ITRC: Identity Crime
predictions for 2022. (to
the original material)
- All the World's a Stage:
Russia arrests ransomware suspects. (to
the original material)
- Vetting the security
risks of open-source code in healthcare. (to
the original material)
- Don't forget about
privacy: Create a strong attitude to privacy on World Data
Protection Day. (to
the original material)
- Google Play app dropped
Vultur banking Trojan on Android handsets. (to
the original material)
- This Week in Security
News - January 28th, 2022. (to
the original material)
- Zerodium spikes payout
for zero-click Outlook zero-days. (to
the original material)
- Conti, DeadBolt
ransomwares target Delta, QNAP. (to
the original material)
- Lazarus APT uses Windows
Update to spew malware. (to
the original material)
- Shlayer and Bundlore
MacOS malware strains – How Uptycs EDR Detection can help. (to
the original material)
- Data Privacy Day aims to
raise awareness of how we collect and use data. (to
the original material)
- The Importance of
Responsible Disclosure. (to
the original material)
- MITRE ATT&ACK®: What
it is and how it improves security. (to
the original material)
- DeFi thefts beget DeFi
for money laundering. (to
the original material)
- Ad hoc cyber assessments
at Commerce limit visibility over threats. (to
the original material)
- 68K affected by data
theft, "sophisticated" network hack of health nonprofit
Advocates. (to
the original material)
- US government’s "zero
trust" roadmap calls time on perimeter-based paradigm. (to
the original material)
- Xerox belatedly addresses
web-based printer bricking threat. (to
the original material)
- Privacy slalom: Human
rights, media orgs offer OPSEC warning to Winter Olympics
attendees. (to
the original material)
- Scammers target us on
social media now more than ever. (to
the original material)
- Your personal data is
valuable, and dangerous in the wrong hands. It's time to
protect it better. (to
the original material)
- WhisperGate malware
corrupts computers in Ukraine. (to
the original material)
27.01.2022
- News
from Cyber Security.
- Cybersecurity Week News
(27.01.2022). (to
the original material)
- Promoting data protection
by design: Exploring techniques. (to
the original material)
- Apple releases security
updates for multiple products. (to
the original material)
- Stealthy Excel malware
putting organizations in crosshairs of ransomware gangs. (to
the original material)
- Attackers connect rogue
devices to organizations’ network with stolen Office 365
credentials. (to
the original material)
- Malware resets Android
devices after performing fraudulent wire transfers. (to
the original material)
- What makes achieving
cyber resilience difficult? (to
the original material)
- 65% of organizations
continue to rely on shared logins. (to
the original material)
- How would zero trust
prevent a Log4Shell attack? (to
the original material)
- Digital IDs under attack:
How to tackle the threat? (to
the original material)
- Familiarity with vaccine
passport tech is laying the foundations for digital IDs. (to
the original material)
- Fraud detection and
prevention market to reach $75,139.66 million by 2028. (to
the original material)
- Beyond the tick box: What
to consider before agreeing to a privacy policy. (to
the original material)
- DeepDotWeb admin
imprisoned for advertising illegal dark web markets. (to
the original material)
- Taiwanese Apple and Tesla
contractor hit by Conti ransomware. (to
the original material)
- Lazarus hackers use
Windows Update to deploy malware. (to
the original material)
- Microsoft warns of
multi-stage phishing campaign leveraging Azure AD. (to
the original material)
- Russian APT29 hackers'
stealthy malware undetected for years. (to
the original material)
- Microsoft mitigated a
record 3.47 Tbps DDoS attack on Azure users. (to
the original material)
- 105 million Android users
targeted by subscription fraud campaign. (to
the original material)
- Threat Source Newsletter
(Jan. 27, 2022). (to
the original material)
- Beers with Talos, Ep.
#115: Everybody's measured by quarters - even threat actors.
(to
the original material)
- SolarWinds hackers still
active, using new techniques. (to
the original material)
- Google scales up Cloud
Bigtable NoSQL database. (to
the original material)
- Infor: Marketplace will
drive ERP industry functionality. (to
the original material)
- UK spectrum sharing
should be a spectrum policy priority, says UK SPF (Spectrum
Policy Forum). (to
the original material)
- DCMS (Digital, Culture,
Media and Sport) taps Arqit for 5G project to provide Open
RAN security by default. (to
the original material)
- SAP full-year 2021:
Revenue nudges up 1%, cloud growth up 17%. (to
the original material)
- Apple security update
fixes zero-day vulnerability. (to
the original material)
- Lack of tech skills is
delaying projects. (to
the original material)
- Novel phishing campaign
highlights need for MFA, says Microsoft. (to
the original material)
- Barclaycard customers
increase contactless spending following limit rise. (to
the original material)
- Microsoft uses Q2 2022
earnings to delve into Metaverse. (to
the original material)
- Confluent Kafka connects
apps on new Dish 5G network. (to
the original material)
- Nightmare Log4Shell
scenario averted by prompt, professional action. (to
the original material)
- Bank account switching
accelerates as consumers choose digital services. (to
the original material)
- Imperial College London
embarks on cloud security research push with Abu Dhabi tech
hub. (to
the original material)
- CORT deploys IoT to
monitor indoor air quality. (to
the original material)
- Meta makes frontline
worker push with Workplace, WhatsApp. (to
the original material)
- It monitors our every
move: do fitness trackers, however, pose privacy risks? (to
the original material)
- How retailers can beat
the top four online shopping security threats in 2022. (to
the original material)
- The top attack trends
businesses need to address this year. (to
the original material)
- Three in four mobile apps
contain at least one vulnerability. (to
the original material)
- Tech workers are more
likely to fall for phishing emails. (to
the original material)
- Why are WordPress
websites targeted by hackers? (to
the original material)
- Cybersecurity teams need
to enforce SBOM mandates. (to
the original material)
- Florida considers
deepfake ban. (to
the original material)
- Data breach at drug
screening lab. (to
the original material)
- Hacker flags flaw in
Swiss Railway System. (to
the original material)
- Nearly $9bn laundered in
cryptocurrency in 2021. (to
the original material)
- QNAP: Act now to mitigate
DeadBolt ransomware. (to
the original material)
- IT and DevOps staff more
likely to click on phishing links. (to
the original material)
- North Korea loses
Internet in suspected cyber-attack. (to
the original material)
- RARBG (Random Access
Memory Block Generator) Proxy List 2022. (to
the original material)
- Top 5 Cybersecurity
measures for businesses. (to
the original material)
- Cybersecurity Laws. (to
the original material)
- How long will it take to
become a cybersecurity professional? (to
the original material)
- What Cyber Incident
Analysis means. (to
the original material)
- Crypto advocates Decry
Bill that could ban transactions. (to
the original material)
- SEC Chair seeks to
"modernize" cybersecurity regulations. (to
the original material)
- Conti ransomware hits
Apple, Tesla supplier. (to
the original material)
- DeepDotWeb co-admin
sentenced to 8 years in prison. (to
the original material)
- Defending the Supply
Chain: Why the DDS protocol is critical in Industrial and
Software Systems. (to
the original material)
- 2FA App loaded with
banking trojan infests 10K Victims via Google Play. (to
the original material)
- Shipment-Delivery scams
become the favored way to spread malware. (to
the original material)
- White House, EPA expand
cybersecurity initiative to vulnerable water sector. (to
the original material)
- ‘It’s not a gimmick’:
Arkose Labs announces "chief criminal officer". (to
the original material)
- Solarwinds fixes code
execution bug in enterprise helpdesk software. (to
the original material)
- Apple pays out $100k
bounty for Safari webcam hack that imperiled victims’ online
accounts. (to
the original material)
- This phishing attack uses
an unusual trick to spread further. (to
the original material)
- #NoPlaceToHide…for
stupid ideas like Backdooring End-To-End Encryption and
undermining privacy. (to
the original material)
26.01.2022
- News
from Cyber Security.
- What’s in for mobile
operators this year? (to
the original material)
- DDoS protection and
mitigation market to reach $6.7 billion by 2026. (to
the original material)
- Linux distros haunted by
Polkit-geist for 12+ years: Bug grants root access to any
user. (to
the original material)
- WBTC to USDT Exchange in
2022: Latest developments, tendencies, predictions. (to
the original material)
- PolKit vulnerability can
give attackers root on many Linux distros (CVE-2021-4034). (to
the original material)
- DazzleSpy: macOS backdoor
delivered through watering hole attacks. (to
the original material)
- Open-source code: How to
stay secure while moving fast. (to
the original material)
- Product showcase: CIOs
can optimize and secure hybrid IT environments with
Runecast. (to
the original material)
- Buy now, pay later fraud,
romance and cryptocurrency schemes top the list of threats
this year. (to
the original material)
- How to achieve greater
cyber resiliency. (to
the original material)
- Apple fixes 2 zero-day
security bugs, one exploited in the wild. (to
the original material)
- "Dark Herring" billing
malware swims onto 105M android devices. (to
the original material)
- Linux bug in all major
distros: "An attacker’s dream come true". (to
the original material)
- New Year, New Threats: 4
tips to activate your best cyber-defense. (to
the original material)
- TrickBot crashes security
researchers’ browsers in latest upgrade. (to
the original material)
- Cybercriminals love
supply-chain chaos: Here’s how to protect your Inbox. (to
the original material)
- Threat actors blanket
Androids with Flubot, Teabot campaigns. (to
the original material)
- Apple releases iOS and
macOS updates to patch actively exploited 0-day
vulnerability. (to
the original material)
- Initial access broker
(Prophet Spider) involved in Log4Shell attacks against
VMware Horizon Servers. (to
the original material)
- Webinar: How to see more,
but respond less with Enhanced Threat Visibility. (to
the original material)
- Linux version of LockBit
ransomware targets VMware ESXi servers. (to
the original material)
- Major Discord outage
caused by API and database issues. (to
the original material)
- Apple fixes new zero-day
exploited to hack macOS, iOS devices. (to
the original material)
- Chaes banking trojan
hijacks Chrome with malicious extensions. (to
the original material)
- White House wants US govt
to use a Zero Trust security model. (to
the original material)
- New FluBot and TeaBot
campaigns target Android devices worldwide. (to
the original material)
- German govt warns of
APT27 hackers backdooring business networks. (to
the original material)
- Let's Encrypt is revoking
lots of SSL certificates in two days. (to
the original material)
- Nobel Foundation site hit
by DDoS attack on award day. (to
the original material)
- QNAP warns of new
DeadBolt ransomware encrypting NAS devices. (to
the original material)
- Fantasy Premier League
account hack surge prompts plans to introduce extra login
checks for football fans. (to
the original material)
- US healthcare company
EyeMed reaches settlement following 2020 data breach. (to
the original material)
- Android security tool
APKLeaks patches critical vulnerability. (to
the original material)
- Tor Project heads to
Russian court to appeal against censorship. (to
the original material)
- Best cybersecurity
research paper revealed. (to
the original material)
- How automation can
mitigate the cybersecurity skills gap. (to
the original material)
- EyeMed fined $600k over
data breach. (to
the original material)
- #DataPrivacyWeek: Online
trackers can detect 80% of users' browsing history. (to
the original material)
- #DataPrivacyWeek:
Prioritize data protection to safeguard consumer privacy. (to
the original material)
- "Hack One, Breach Many"
is here to stay: How to secure your third-party risks. (to
the original material)
- 2022 - Predictions for
the Year Ahead. (to
the original material)
- Experts reveals 29% surge
in bugs used by ransomware actors. (to
the original material)
- Government trials effort
to make bug scanning easier. (to
the original material)
- Home working drives 44%
surge in insider threats. (to
the original material)
- Admins struggle to keep
users safe in a post-COVID world. (to
the original material)
- Hackers continue to
target zero-day vulnerabilities. (to
the original material)
- Over three-quarters of
container images have high risk vulnerabilities. (to
the original material)
- Every major Linux distro
has a PwnKit flaw that is easily exploited to gain root
access. (to
the original material)
- How poor security culture
leads to insider risk. (to
the original material)
- Cybercriminals using QR
codes to steal financial info, FBI warns. (to
the original material)
- Vulnerability Spotlight:
WiFi-connected security camera could be manipulated to spy
on communications, among other malicious actions. (to
the original material)
- Every breath you take,
every move you make: Do fitness trackers pose privacy risks?
(to
the original material)
- DeadBolt ransomware
targeting QNAP NAS storage devices. (to
the original material)
- Apache Kafka 3.1 opens up
data streaming for analytics. (to
the original material)
- More intel emerges on
WhisperGate malware that hit Ukraine. (to
the original material)
- Storage tech brief: Look
out for PCIe gen 5 drives in 2022. (to
the original material)
- New vulnerability rating
framework aims to fill in CVSS gaps. (to
the original material)
- PwnKit bug endangers
Linux distributions worldwide. (to
the original material)
- Kaspersky MSP growth
plans are delivering. (to
the original material)
- MPs to debate landmark
IoT security law. (to
the original material)
- Appetite rising for
network as a service. (to
the original material)
- Demands on Fujitsu to
contribute to £1bn Horizon scandal compensation costs. (to
the original material)
- IBM fourth-quarter
results show hybrid refocus. (to
the original material)
- Google debuts Topics, its
latest third-party cookie replacement. (to
the original material)
- IRS facial recognition
move raises bias, privacy concerns. (to
the original material)
- Dremio raises $160M for
cloud data lake platform technology. (to
the original material)
- Threat actors set to turn
up the heat across cloud, email, networks and more in 2022.
(to
the original material)
- Gemini Annual Report
2021: Magecart thrives in the payment card fraud landscape.
(to
the original material)
25.01.2022
- News
from Cyber Security.
- Canada's foreign affairs
ministry hacked, some services down. (to
the original material)
- The Ransomware Files,
Episode 4: Maersk and NotPetya. (to
the original material)
- EU launches bug bounty
programs for five open source solutions. (to
the original material)
- Beware of fake tax apps
pushing malware. (to
the original material)
- 53% of medical devices
have a known critical vulnerability. (to
the original material)
- Why organizations should
consider adopting cloud governance as code. (to
the original material)
- Strong security starts
with the strengthening of the weakest link: passwords. (to
the original material)
- AI to greatly enhance
urban surveillance technologies. (to
the original material)
- Healthcare fraud
detection market to grow steadily by 2026. (to
the original material)
- New DeadBolt ransomware
targets QNAP devices, asks 50 BTC for master key. (to
the original material)
- VMware: Patch Horizon
servers against ongoing Log4j attacks! (to
the original material)
- Linux system service bug
gives root on all major distros, exploit released. (to
the original material)
- TrickBot now crashes
researchers' browsers to block malware analysis. (to
the original material)
- UK govt releasing Nmap
scripts to find unpatched vulnerabilities. (to
the original material)
- New DazzleSpy malware
targets macOS users in watering hole attack. (to
the original material)
- Linux kernel bug can let
hackers escape Kubernetes containers. (to
the original material)
- Google Drive now warns
you of suspicious phishing, malware docs. (to
the original material)
- Segway store hacked to
steal customers' credit cards. (to
the original material)
- Russia arrests leader of
“Infraud Organization” hacker group. (to
the original material)
- Google Drive flags nearly
empty files for "copyright infringement". (to
the original material)
- 3 Common cloud
misconfigurations to avoid. (to
the original material)
- Vulnerability disclosures
rise to meet federal requirements. (to
the original material)
- LA launches Cyber
Resilience Center. (to
the original material)
- New Mexico files
cybersecurity bills. (to
the original material)
- Cyber-Attack on Global
Affairs Canada. (to
the original material)
- Why the assure scheme Is
still getting off the ground in the aviation sector. (to
the original material)
- #DataPrivacyWeek: Data
Privacy vs. Visibility: The security consideration. (to
the original material)
- UK Government announces
new cyber strategy to protect public sector. (to
the original material)
- #DataPrivacyWeek
Interview: Overcoming privacy challenges in AI. (to
the original material)
- Experts call for more
open security culture after VW sacking. (to
the original material)
- Cyber Essentials
overhauled for new hybrid working era. (to
the original material)
- Security Agencies
continue to raise red flags against Log4Shell. (to
the original material)
- MoonBounce: Third UEFI
Bootkit in Town. (to
the original material)
- Molerats APT Group
targets the Middle East. (to
the original material)
- 12-Year-Old Polkit flaw
lets unprivileged Linux users gain root access. (to
the original material)
- Hackers exploited MSHTML
flaw to spy on Government and Defense Targets. (to
the original material)
- Hackers infect macOS with
new DazzleSpy backdoor in watering-hole attacks. (to
the original material)
- TrickBot malware using
new techniques to evade Web Injection attacks. (to
the original material)
- UK government opens
consultation on medic-style register for Brit infosec pros.
(to
the original material)
- Sophos: Log4Shell would
have been a catastrophe without the Y2K-esque mobilisation
of engineers. (to
the original material)
- Current and future state
of Identity Access Management (IAM). (to
the original material)
- Top most dangerous types
of malware attacks. (to
the original material)
- Cost for Cyber Security
Training. (to
the original material)
- Combating the surge in
retail theft and E-Commerce fraud with Open Source
Intelligence. (to
the original material)
- Delay in creating new
Cybersecurity Board prompts concern. (to
the original material)
- Application Security
Company ArmorCode raises $8 million. (to
the original material)
- Canada's Foreign Ministry
targeted in cyberattack. (to
the original material)
- Vulnerability Spotlight:
Vulnerability in Apple iOS, iPad OS and MacOS could lead to
disclosure of sensitive memory data. (to
the original material)
- How do you know if your
email has been hacked. (to
the original material)
- Watering hole deploys new
macOS malware, DazzleSpy, in Asia. (to
the original material)
- US, NATO discuss
Ukrainian cyber aid amid tensions. (to
the original material)
- Drug Testing Lab Portal
incident exposed data for 4 years. (to
the original material)
- Log4j Updates: Flaw
challenges global security leaders. (to
the origina material)
- "Email security doesn't
get the attention it deserves". (to
the original material)
- How Do You Detect - and
Stop - Bank Identity Number Attacks? (to
the original material)
- Brand Narratives and
Awareness in Cybersecurity. (to
the original material)
- Segway website hacked and
infected with payment card skimmer. (to
the original material)
- Staff negligence is now a
major reason for insider security incidents. (to
the original material)
- Mirai splinter botnets
dominate IoT attack scene. (to
the original material)
- TianySpy malware uses
smishing disguised as message from Telco. (to
the original material)
- Cyberattacks on Squid
Game Minecraft Tourney take down Andorra’s internet. (to
the original material)
- Ozzy Osbourne NFTs used
to bite off chunk of crypto coin. (to
the original material)
- Google drops FLoC and
introduces topics API to replace tracking cookies for Ads. (to
the original material)
- PrinterLogic vendor
addresses triple RCE threat against all connected endpoints.
(to
the original material)
- California public office
admits Covid-19 healthcare data breach. (to
the original material)
- Triple-digit threshold:
Browser makers offer compatibility testing tools as version
100 approaches. (to
the original material)
- Juniper announces
routers, line card using new Trio 6 ASIC. (to
the original material)
- Sophos: Log4Shell impact
limited, threat remains. (to
the original original)
- Nvidia Arm deal another
step closer to - death? (to
the original material)
- Bernalillo County
ransomware attack still felt weeks later. (to
the original material)
- IBM hybrid cloud strategy
driving revenue growth. (to
the original material)
- Cyber Essentials
programme gets biggest update since launch. (to
the original material)
- UK government launches
internal cyber strategy. (to
the original material)
- StayLinked flags IIoT
channel opportunity. (to
the original material)
- UK launches international
data transfer council. (to
the original material)
- Subpostmaster campaign
group to meet government over unfair compensation
settlement. (to
the original material)
- Below the Surface:
Cybersecurity trends for 2022. (to
the original material)
- A chaotic tax season
brings new cyberthreats. (to
the original material)
24.01.2022
- News
from Cyber Security.
- CISA publishes
infographic on layering network security through
segmentation. (to
the original material)
- Vulnerability summary for
the Week of January 17, 2022. (to
the original material)
- A 2022 priority:
Automated mobile application security testing. (to
the original material)
- Fraud detection is great,
but you also need prevention. (to
the original material)
- COVID test related scam
emails still highly popular among cybercriminals. (to
the original material)
- Spike in brand abuse
attacks, 3-D Secure transaction volume rising. (to
the original material)
- What is challenging
multicloud adoption? (to
the original material)
- Digital transformation
leaders reaping the fruits of their investments. (to
the original material)
- IoT data management
market to grow steadily by 2026. (to
the original material)
- Researchers find way to
bypass MFA of Box Accounts. (to
the original material)
- White Rabbit may be FIN8
Group's New Pet. (to
the original material)
- China-based Earth Lusca
Group targeting multiple industries. (to
the original material)
- Global renewable energy
firms under cyberespionage attacks. (to
the original material)
- New DDoS IRC bot spreads
through Korean WebHard. (to
the original material)
- Researchers break down
WhisperGate wiper malware used in Ukraine website
defacement. (to
the original material)
- Microsoft: Now we're
switching off Excel 4.0 macros by default. (to
the original material)
- Investigating APT36 or
Earth Karkaddan’s attack chain and malware arsenal. (to
the original material)
- Analysis and impact of
LockBit ransomware’s first Linux and VMware ESXi variant. (to
the original material)
- China accused of
hijacking Australia Prime Minister Scott Morrison's WeChat
account. (to
the original material)
- Hackers hijack smart
contracts in cryptocurrency token "rug pull" exit scams. (to
the original material)
- Attackers now actively
targeting critical SonicWall RCE bug. (to
the original material)
- Tor Project appeals
Russian court's decision to block access to Tor. (to
the original material)
- CWP (Control Web Panel)
bugs allow code execution as root on Linux servers, patch
now. (to
the original material)
- Android malware BRATA
wipes your device after stealing data. (to
the original material)
- Hackers say they
encrypted Belarusian Railway servers in protest. (to
the original material)
- Ransomware gangs increase
efforts to enlist insiders for attacks. (to
the original material)
- Malicious PowerPoint
files used to push remote access trojans. (to
the original material)
- Dark Souls servers taken
down to prevent hacks using critical bug. (to
the original material)
- See No Evil, Hear No
Evil: The Use of deepfakes in social engineering attacks. (to
the original material)
- WordPress Supply Chain
Attack - 93 Add-Ons infected for Months. (to
the original material)
- API Security, Ransomware
Top 2022 Threats. (to
the original material)
- Predict 2022: Top
Cybersecurity Threats for 2022. (to
the original material)
- IRS to require new ID
verification. (to
the original material)
- SBA Announces $3m
Cybersecurity Program. (to
the original material)
- 3 Reasons why DDoS
protection fails. (to
the original material)
- Identity Theft will get
worse. (to
the original material)
- NSF (National Science
Foundation) awards $29m to cybersecurity scholarships. (to
the original material)
- Two in five IT Security
Managers considering quitting their jobs. (to
the original material)
- #DataPrivacyWeek: The
best kept secrets about data privacy. (to
the original material)
- #HowTo: Evaluate your
cyber insurance. (to
the original material)
- Interview: Leveraging the
talents of older workers in cyber. (to
the original material)
- US Data breaches surge
68% to all-time high. (to
the original material)
- US adds 17 exploited bugs
to "Must Patch" List. (to
the original material)
- UK's Privacy Tsar mounts
fierce defense of End-to-End Encryption. (to
the original material)
- Linux Servers at risk of
RCE due to critical CWP bugs. (to
the original material)
- Unusual "Donald Trump"
packer malware delivers RATs, infostealers. (to
the original material)
- Dark Souls 3 servers shut
down due to critical RCE bug. (to
the original material)
- F5 fixes high-risk NGINX
Controller vulnerability in January patch rollout. (to
the original material)
- RCE bug chain patched in
CentOS Web Panel. (to
the original material)
- OpenSubtitles data
breach: Users asked to re-secure accounts after plaintext
password snafu. (to
the original material)
- Chain of vulnerabilities
led to RCE on Cisco Prime servers. (to
the original material)
- New solution helps
guarantee electronic documents. (to
the original material)
- What the UK's revised
security guidelines mean for business [Q&A]. (to
the original material)
- Mobile Banking Trojan
BRATA gains new, dangerous capabilities. (to
the original material)
- Hackers using new malware
packer DTPacker to avoid analysis, detection. (to
the original material)
- ZTNAs address
requirements VPNs cannot. Here's why. (to
the original material)
- How I hacked my friend’s
PayPal account. (to
the original material)
- Alleged RCE Vulnerability
in Dark Souls III under investigation. (to
the original material)
- FBI warns of
cybercriminals using QR codes to steal funds. (to
the original material)
- Microsoft finds
SolarWinds vulnerability amid Log4j search. (to
the original material)
- NY fines vision benefits
firm (EyeMed Vision Care LLC) $600,000 for 2020 breach. (to
the original material)
- Tor Project battles
Russian censorship through the courts. (to
the original material)
- Everything you need to
know about Web Application Firewalls. (to
the original material)
- Russia makes more
arrests, but cybercrime-harboring reputation hard to shake.
(to
the original material)
- Feds want bulk electric
systems to monitor network security. (to
the original material)
- RIPTA under fire: Why
would a public transit authority have healthcare data? (to
the original material)
- Cybersecurity: 11 steps
to take as threat levels increase. (to
the original material)
- Bombshell decision
that use of Google Analytics in Austria violates Top EU
Court’s ruling boosts GDPR impact again. (to
the original material)
- Interview with Nick Terkay - Cobalt. (to the original material)
23.01.2022
- News
from Cyber Security.
- Week in review: Finding
stolen credentials on VirusTotal, BNPL attracting
fraudsters. (to
the original material)
- Introduction to automated
penetration testing. (to
the original material)
- Use these 6 user
authentication types to secure networks. (to
the original material)
- How to start implementing
passwordless authentication today. (to
the original material)
- FBI warns of malicious QR
codes used to steal your money. (to
the original material)
- Emotet now using
unconventional IP address formats to evade detection. (to
the original material)
- High-Severity Rust
programming bug could lead to File, Directory Deletion. (to
the original material)
22.01.2022
- News
from Cyber Security.
- Experts find strategic
similarities b/w NotPetya and WhisperGate attacks on
Ukraine. (to
the original material)
- Molerats hackers hiding
new espionage attacks behind public cloud infrastructure. (to
the original material)
- FSB (The Russian Federal
Security Service) detains administrator of UniCC carding
forum. (to
the original material)
- CISA adds 17
vulnerabilities to list of bugs exploited in attacks. (to
the original material)
- School District reports a
334% hike in cybersecurity insurance costs. (to
the original material)
- Dutch cybersecurity
agency warns of lingering Log4j risks. (to
the original material)
- Apple preps fix for
Safari's web-history-leaking IndexedDB privacy bug. (to
the original material)
- Talos Incident Response
year-in-review for 2021. (to
the original material)
- Twitter reportedly fires
Head of Security, CISO to leave. (to
the original material)
- Vulnerabilities in
Control Web Panel potentially expose Linux Servers to hack.
(to
the original material)
21.01.2022
- News
from Cyber Security.
- CISA adds four known
exploited vulnerabilities to Catalog. (to
the original material)
- McAfee releases security
update for McAfee Agent for Windows. (to
the original material)
- Log4j vulnerability -
update from the CSIRTs Network. (to
the original material)
- New infosec products of
the week: January 21, 2022. (to
the original material)
- Stealthy firmware bootkit
leveraged by APT in targeted attacks. (to
the original material)
- Google Drive starts
warning users about suspicious files. (to
the original material)
- The importance of
securing machine-to-machine and human-to-machine
interaction. (to
the original material)
- How do IT leaders plan to
overcome remote work security challenges? (to
the original material)
- Cybersecurity industry
trends from 2021 bound to shape this year’s threat
landscape. (to
the original material)
- Exposed records exceeded
40 billion in 2021. (to
the original material)
- What is opening EV
(Electric Vehicle) charging stations to cyberattacks? (to
the original material)
- Cybersecurity market to
reach $346 billion by 2027. (to
the original material)
- Biden signs authority for
NSS to NSA: Think CISA for military, intel systems. (to
the original material)
- Does your cyberinsurance
policy cover cyberwar? (to
the original material)
- U.S. Sanctions 4
Ukrainians for working with Russia to destabilize Ukraine. (to
the original material)
- Crypto.com confirms
breach, nearly $34 million in losses. (to
the original material)
- Ukraine cyber attacks: A
case of hacktivism? (to
the original material)
- The Week in Ransomware -
January 21st 2022 - Arrests, Wipers, and More. (to
the original material)
- Phishing impersonates
shipping giant Maersk to push STRRAT malware. (to
the original material)
- Microsoft disables Excel
4.0 macros by default to block malware. (to
the original material)
- Over 90 WordPress themes,
plugins backdoored in supply chain attack. (to
the original material)
- McAfee Agent bug lets
hackers run code with Windows SYSTEM privileges. (to
the original material)
- Homelife of Connecticut
residents secretly recorded. (to
the original material)
- Pennsylvania approves
ransomware bill. (to
the original material)
- The New Amateur Hackers:
How professional hackers are enabling a new wave of novices.
(to
the original material)
- Memorial Health System
confirms data breach. (to
the original material)
- Tackling misconceptions
of mobile-based authentication. (to
the original material)
- (ISC)2 Appoints its first
CISO. (to
the original material)
- Two-Fifths of ransomware
victims still paying up. (to
the original material)
- #COVID19 phishing emails
surge 500% on Omicron concerns. (to
the original material)
- Merck Wins $1.4bn
NotPetya payout from insurer. (to
the original material)
- Researchers find
similarities between NotPetya, attacks on Ukrainian
government systems. (to
the original material)
- A bug in McAfee Agent
allows running code with Windows SYSTEM privileges. (to
the original material)
- Disruptive attacks in
Ukraine likely linked to escalating tensions. (to
the original material)
- Will ransomware gangs see
flow of cash throttled by Russia cryptocurrency
restrictions? (to
the original material)
- Ukraine campaign delivers
defacement and wipers, in continued escalation. (to
the original material)
- Threat Roundup for
January 14 to January 21. (to
the original material)
- Week in security with
Tony Anscombe. (to
the original material)
- Compliance, emerging
technology will fuel financial tech funding in 2022. (to
the original material)
- What’s it mean? Making
sense of Twitter’s decision to oust "Mudge" Zatko and Rinki
Sethi. (to
the original material)
- Patient data stolen ahead
of Memorial Health ransomware attack, EHR downtime. (to
the original material)
- IRS plans for facial
recognition draw scrutiny from privacy, cybersecurity
advocates. (to
the original material)
- HHS shares Log4j
remediation guide, urges healthcare to assume compromise. (to
the original material)
- European Commission
launches new open source software bug bounty program. (to
the original material)
- Was COMELEC hacked?
Philippines Commission on Elections casts doubt on data
breach claims. (to
the original material)
- Open debug mode in Cisco
mobile networking software created critical security hole. (to
the original material)
- BitLocker encryption:
Clear text key storage prompts security debate online. (to
the original material)
- US Federal Reserve issues
report on Digital Dollar. (to
the original material)
- Federal Authorities,
patient safety experts warn of risks. (to
the original material)
- EU Plans to build its own
DNS infrastructure. (to
the original material)
- 3 Weeks, 6 bugs: Experts
analyze, advise on WordPress flaws. (to
the original material)
- ISMG Editors: Will
ransomware kill cyber insurance? (to
the original material)
- From the Trenches:
Remediating widespread Apache Log4j flaw. (to
the original material)
- Hackers planted secret
backdoor in dozens of WordPress plugins and themes. (to
the original material)
- Critical bugs in control
web panel expose Linux Servers to RCE attacks. (to
the original material)
- Chinese hackers spotted
using new UEFI Firmware implant in targeted attacks. (to
the original material)
- Chinese APT deploys
MoonBounce implant in UEFI firmware. (to
the original material)
- Amazon fake crypto token
investment scam steals Bitcoin from victims. (to
the original material)
- The Internet’s most
tempting targets. (to
the original material)
- Spyware blitzes
compromise, cannibalize ICS Networks. (to
the original material)
- Arm rages against the
insecure chip machine with new Morello architecture. (to
the original material)
- Emotet spam abuses
unconventional IP address formats to spread malware. (to
the original material)
- This Week in Security
News - January 21, 2022. (to
the original material)
- Codex Exposed: Task
automation and response consistency. (to
the original material)
- Crime Shop sells hacked
logins to other crime shops. (to
the original material)
20.01.2022
- News
from Cyber Security.
- F5 releases January 2022
Quarterly Security Notification. (to
the original material)
- Drupal releases security
updates. (to
the original material)
- Google releases security
updates for Chrome. (to
the original material)
- Cisco releases security
updates for multiple products. (to
the original material)
- CISA releases Final
Version of Guidance: IPv6 considerations for TIC 3.0. (to
the original material)
- Cybersecurity news of the
week (20.01.2022). (to
the original material)
- Beware of Digital ID
attacks: your face can be spoofed! (to
the original material)
- New SolarWinds Serv-U
vulnerability exploited in Log4j-related attacks. (to
the original material)
- Endpoint malware and
ransomware detections hit all-time high. (to
the original material)
- Cyber risks top worldwide
business concerns in 2022. (to
the original material)
- When protecting and
managing digital identities, orchestration and automation
are critical. (to
the original material)
- The evolution of security
analytics. (to
the original material)
- Software supply chain
attacks jumped over 300% in 2021. (to
the original material)
- Multicloud environment
complexities putting digital transformation at risk. (to
the original material)
- Cryptocurrency market to
reach $2.73 billion in 2025. (to
the original material)
- New MoonBounce UEFI
malware used by APT41 in targeted attacks. (to
the original material)
- 483 Crypto.com accounts
compromised in $34 million hack. (to
the original material)
- "Anomalous" spyware
stealing credentials in industrial firms. (to
the original material)
- FBI links Diavol
ransomware to the TrickBot cybercrime group. (to
the original material)
- US sanctions former
Ukrainian official for helping Russian cyberspies. (to
the original material)
- ProtonMail introduces a
new email tracker blocking system. (to
the original material)
- WordPress plugin (WP
HTML Mail) flaw puts users of 20,000 sites at phishing
risk. (to
the original material)
- Indonesia's central bank
confirms ransomware attack, Conti leaks data. (to
the original material)
- Biden signs memo to boost
US national security systems’ defenses. (to
the original material)
- Cisco bug gives remote
attackers root privileges via debug mode. (to
the original material)
- Threat Source Newsletter
(Jan. 20, 2022). (to
the original material)
- How to know if your email
has been hacked. (to
the original material)
- Threat Spotlight: COVID-19
test-related email scams. (to
the original material)
- Focus on open source
security software increases. (to
the original material)
- AccessPress Themes hit with
targeted supply chain attack. (to
the original material)
- 65 percent of organizations
still use shared logins for infrastructure access. (to
the original material)
- New targeted attack
strategies used against industrial companies. (to
the original material)
- 20 Years of SIEM:
Celebrating my dubious anniversary. (to
the original material)
- Teachable moment: An
insider threat on your team. (to
the original material)
- Biden signs Memo to boost
National Cybersecurity. (to
the original material)
- Third firmware bootkit
discovered. (to
the original material)
- Applications open for next
NCSC for startups cohort. (to
the original material)
- Twitter mentions more
effective than CVSS at reducing exploitability. (to
the original material)
- Eleven arrested in bust of
prolific Nigerian BEC gang. (to
the original material)
- Red Cross: Supply chain
data breach hit 500K people. (to
the original material)
- Cisco issues patch for
critical RCE vulnerability in RCM for StarOS software. (to
the original material)
- Google details two zero-day
bugs reported in Zoom Clients and MMR Servers. (to
the original material)
- Israeli officials deny
claims of improper spyware use. (to
the original material)
- UK issues fresh proposals
to tackle cyberthreats. (to
the original material)
- HHS HC3: Healthcare sector
remains at risk for Log4j attacks. (to
the original material)
- Biden memo orders
cybersecurity improvements. (to
the original material)
- How medical device
"Ingredient Labels" could bolster security. (to
the original material)
- Use FITARA law to measure
government cybersecurity goals, experts say. (to
the original material)
- IV pumps riskiest
healthcare IoT, while 50% of medical devices hold critical
flaws. (to
the original material)
- Spiking fraud will force
financial industry to rethink authentication in 2022. (to
the original material)
- Critical Cisco StarOS bug
grants root access via debug mode. (to
the original material)
- Microsoft: Attackers tried
to login to SolarWinds Serv-U via Log4j bug. (to
the original material)
- Defending Users’ NAS
devices from evolving threats. (to
the original material)
- Cybersecurity for
Industrial Control Systems: Part 2. (to
the original material)
19.01.2022
- News
from Cyber Security.
- Zoho releases security
advisory for ManageEngine Desktop Central and Desktop Central
MSP. (to
the original material)
- Phishers go after business
email credentials by impersonating U.S. DoL (Department of
Labor). (to
the original material)
- Is cloud the solution to
optimized data privacy? (to
the original material)
- Product showcase: Adaptive
Shield SaaS Security Posture Management. (to
the original material)
- Cultivating a
security-first mindset for software developers. (to
the original material)
- What are the barriers to
moving legacy data to the cloud? (to
the original material)
- Supply chain disruptions
rose in 2021. (to
the original material)
- Trends that will shape the
security industry in 2022. (to
the original material)
- Network security sandbox
market to reach $43 billion by 2027. (to
the original material)
- Red Cross cyberattack
exposes data of 515,000 people seeking missing family. (to
the original material)
- Microsoft: SolarWinds fixes
Serv-U bug exploited for Log4j attacks. (to
the original material)
- Marketing giant RRD
confirms data theft in Conti ransomware attack. (to
the original material)
- CISA urges US orgs to
prepare for data-wiping cyberattacks. (to
the original material)
- UK’s Cyber Security Center
publishes new guidance to fight smishing. (to
the original material)
- New BHUNT malware targets
your crypto wallets and passwords. (to
the original material)
- Interpol arrests 11 BEC
gang members linked to 50,000 targets. (to
the original material)
- Office 365 phishing attack
impersonates the US Department of Labor. (to
the original material)
- Multi-Cloud Security in
2022. (to
the original material)
- WEF Report: Cyber Risks
Pose Global Threats. (to
the original material)
- Man charged with smuggling
Tech exports to Iran. (to
the original material)
- Thousands of US Public
Sector ransomware victims in 2021. (to
the original material)
- Government to regulate
crypto advertising in new crack down. (to
the original material)
- Endpoint malware and
ransomware reach new highs. (to
the original material)
- FIN8 hackers spotted using
new 'White Rabbit' ransomware in recent attacks. (to
the original material)
- Donot Team APT will strike
gov't, military targets for years - until they succeed. (to
the original material)
- JPMorgan Chase invests $12
billion in security updates. (to
the original material)
- Indian fashion retailer
data leaked on darknet marketplace. (to
the original material)
- Nigerian police arrest
members of SilverTerrier BEC gang. (to
the original material)
- A top Ukrainian security
official on defending the nation against cyber attacks. (to
the original material)
- Cloned Dept. of Labor site
hawks fake government contracts. (to
the original material)
- Beijing Olympics app flaws
allow Man-in-the-Middle attacks. (to
the original material)
- Security vulnerabilities in
Umbraco CMS could lead to account takeover. (to
the original material)
- ThePhish: "The most
complete" non-commercial phishing email analysis tool. (to
the original material)
- Executive predictions for
2022: CEO Hatem Naguib. (to
the original material)
- What should you do if your
WordPress site was hacked? (to
the original material)
- Data breaches expose over
40 billion records in 2021. (to
the original material)
- Researchers hack Olympic
Games App. (to
the original material)
- Ransomware attack on
Moncler. (to
the original material)
- Why Zero Trust is the best
defence for our digital food supply chain. (to
the original material)
- DoNot hacking team
targeting Government and Military entities in South Asia. (to
the original material)
- A Trip to the Dark Site —
Leak Sites Analyzed. (to
the original material)
- New BHUNT Password Stealer
Malware targeting cryptocurrency wallets. (to
the original material)
- Microsoft: Hackers
exploiting new SolarWinds Serv-U bug related to Log4j attacks.
(to
the original material)
- Russian hackers heavily
using malicious traffic direction system to distribute
malware. (to
the original material)
- Cyber Threat Protection -
It all starts with visibility. (to
the original material)
- 2 Key cybersecurity
lawmakers will not seek reelection. (to
the original material)
- Log4Shell Update: VMware
Horizon targeted. (to
the original material)
- OpenSubtitles data breach
affected 6.7 million users. (to
the original material)
- European authorities seize
VPN Service tied to ransomware. (to
the original material)
18.01.2022
- News
from Cyber Security.
- Malware identified in
attacks against organizations in Ukraine. (to
the original material)
- European Commission
information session on the first call for proposals under the
Connecting Europe Facility digital component (CEF-Digital). (to
the original material)
- CISA Adds 13 known
exploited vulnerabilities to catalog. (to
the original material)
- Oracle releases January
2022 Critical Patch Update. (to
the original material)
- CISA urges organizations to
implement immediate cybersecurity measures to protect against
potential threats. (to
the original material)
- VirusTotal Hacking: Finding
stolen credentials hosted on VirusTotal. (to
the original material)
- Phishers’ favorite brands
in Q4 2021. (to
the original material)
- AI (Artificial
Intelligence) and ML (Machine Learning) implementation in
cybersecurity programs pushes for a change in people’s
mindset. (to
the original material)
- PCI SSC (PCI Security
Standards Council) updates card security standards to secure
the card production process. (to
the original material)
- How buy now, pay Later is
being targeted by fraudsters. (to
the original material)
- Governments struggle to
deliver secure online citizen services. (to
the original material)
- The security of devices
held by public sector employees. (to
the original material)
- Zero-trust security market
to reach $64.4B by 2027. (to
the original material)
- Don’t let the great
resignation become an insider threat. (to
the original material)
- Telegram is a hotspot for
the sale of stolen financial accounts. (to
the original material)
- Fashion giant Moncler
confirms data breach after ransomware attack. (to
the original material)
- New White Rabbit ransomware
linked to FIN8 hacking group. (to
the original material)
- Beijing 2022 Winter
Olympics app bursting with privacy risks. (to
the original material)
- Europol shuts down VPN
service used by ransomware groups. (to
the original material)
- Crypto.com: Fortune Favors
the Hacker - $16M "Stolen". (to
the original material)
- Cybersecurity Outlook for
2022: Emerging Threats. (to
the original material)
- Italian denies literary
Wire fraud. (to
the original material)
- Less than a fifth of cyber
leaders feel confident their organization is cyber-resilient.
(to
the original material)
- The future of Cloud-Native
in a Brave New World. (to
the original material)
- Joint law enforcement
action takes down VPN service. (to
the original material)
- High risk vulnerabilities
in fintech soar over the past year. (to
the original material)
- Enterprise SASE needs a
radical approach to be effective. (to
the original material)
- Guess which government
doesn't want you to use end-to-end encryption. (to
the original material)
- DoNot Go! Do not respawn! (to
the original material)
- DDoS IRC Bot malware
spreading through Korean WebHard Platforms. (to
the original material)
- Ukraine: Recent cyber
attacks part of wider plot to sabotage critical
infrastructure. (to
the original material)
- Researchers bypass
SMS-based Multi-Factor Authentication protecting box accounts.
(to
the original material)
- Europol shuts down VPNLab,
Cybercriminals' favourite VPN service. (to
the original material)
- Don't use public Wi-Fi
without DNS filtering. (to
the original material)
- Earth Lusca hackers aimed
at high-value targets in government and private sectors. (to
the original material)
- Washington City loses
$280,309 to successful phishing scam. (to
the original material)
- Ransomware isn’t always
about gangs making money. Sometimes it’s about nations
manufacturing mayhem. (to
the original material)
- International effort takes
down VPN service, VPNLab, used for criminal activity. (to
the original material)
- QR codes can eat your
lunch, FBI warns. (to
the original material)
- Cyberattacks on Ukrainian
websites come into clearer focus as Russia tensions escalate.
(to
the original material)
- Cyber brain drain from
Congress continues as Langevin, Katko announce departures. (to
the original material)
- Healthcare sector struggles
to address Log4j vulnerability without "breaking" critical
applications. (to
the original material)
- All eyes on Ukraine as
Microsoft details new destructive wiper malware. (to
the original material)
- Threat landscape drives US
companies to shift to more proactive security model. (to
the original material)
- 10 nations coordinate
shutdown of ransomware VPN service. (to
the original material)
- Privacy fines: GDPR
sanctions in 2021 exceeded $1 billion. (to
the original material)
- NSO Group spyware
reportedly used by Israeli Police Force. (to
the original material)
- New Chinese threat group
deals in espionage and theft. (to
the original material)
- EU's Cyber Rapid Response
Team on standby for Ukraine. (to
the original material)
- How "The Great Resignation"
is affecting cybersecurity. (to
the original material)
- Researchers discover
"extremely easy" 2FA bypass in Box cloud management software.
(to
the original material)
- Chrome to bolster CSRF
protections with CORS preflight checks on private network
requests. (to
the original material)
- SSRF vulnerability in
VMWare authentication software could allow access to user
data. (to
the original material)
- VPNLab takedown:
Authorities dismantle secure communication tool favored by
cybercriminals. (to
the original material)
- Bosses think that security
is taken care of: CISOs aren't so sure. (to
the original material)
17.01.2022
- News
from Cyber Security.
- Vulnerability Summary for
the Week of January 10, 2022. (to
the original material)
- Flubot - A malware for
Android that steals sensitive information is propagated by SMS
to Romanian users. (to
the original material)
- Ukraine: Wiper malware
masquerading as ransomware hits government organizations. (to
the original material)
- AI to bring massive
benefits, but also cause great concern. (to
the original material)
- IR (Incident Response) and
SimEx (Simulated Exercises): Can and should they be
standardized? (to
the original material)
- SecOps teams are
understaffed and overworked. (to
the original material)
- Why is intergenerational
collaboration critical in advancing zero trust security
progress? (to
the original material)
- The CISO’s guide to
evaluating third-party security platforms. (to
the original material)
- Many users don’t know how
to protect their broadband Wi-Fi routers. (to
the original material)
- Mobile device management
market to reach $20.4 billion by 2026. (to
the original material)
- Campaign uses public cloud
to spread RAT payloads. (to
the original material)
- Fhkf virus (ransomware)
remove & decrypt .fhkf files. (to
the original material)
- Dark Web's largest
marketplace for stolen credit cards is shutting down. (to
the original material)
- A structured response to
the Log4j vulnerability. (to
the original material)
- Microsoft: Edge will
mitigate "unforeseen active" zero day bugs. (to
the original material)
- Firefox Relay gets added to
disposable email blocklist, angers users. (to
the original material)
- Zoho plugs another critical
security hole in Desktop Central. (to
the original material)
- DHL dethrones Microsoft as
most imitated brand in phishing attacks. (to
the original material)
- Nintendo warns of spoofed
sites pushing fake Switch discounts. (to
the original material)
- Cyber espionage campaign
targets renewable energy companies. (to
the original material)
- Safari bug leaks your
Google account info, browsing history. (to
the original material)
- "Russian" Wiper Malware:
"Prelude to war" in Ukraine. (to
the original material)
- Using Zero-Trust to secure
dissolving network boundaries. (to
the original material)
- Linux Foundation, Red Hat
join Supply Chain Security Summit. (to
the original material)
- Smart City development Is
pushing video surveillance to the cloud. (to
the original material)
- EHR vendor faces legal
action over data breach. (to
the original material)
- Nova Scotia seeks to
improve Cyber-Bullying Law. (to
the original material)
- Accellion reaches $8.1m
data breach settlement. (to
the original material)
- Tackling the cyber skills
shortfall: A multipronged approach. (to
the original material)
- Mitigating cloud security's
greatest risk: Exposure. (to
the original material)
- #HowTo: Quickly evaluate a
SaaS vendor’s cloud security. (to
the original material)
- Former Inspector General
pleads guilty to software theft. (to
the original material)
- Social media in the
workplace: Cybersecurity dos and don’t for employees. (to
the original material)
- Celebrate the Month of
"Digital Cleaning" by following these six simple steps. (to
the original material)
- Understanding Website SQL
Injections. (to
the original material)
- Interview with Shrishail
Rana – Tweaking technologies. (to
the original material)
16.01.2022
- News
from Cyber Security.
- Microsoft warns of
destructive malware targeting Ukrainian Organizations. (to
the original material)
- Week in review: 2022 cloud
security trends, Microsoft fixes wormable RCE. (to
the original material)
- eNom data center migration
mistakenly knocks sites offline. (to
the original material)
- Microsoft: Fake ransomware
targets Ukraine in data-wiping attacks. (to
the original material)
- A new wave of Qlocker
ransomware attacks targets QNAP NAS devices. (to
the original material)
- High-Severity vulnerability
in 3 WordPress plugins affected 84,000 websites. (to
the original material)
- Ukrainian Government
officially accuses Russia of recent cyberattacks. (to
the original material)
- New unpatched Apple Safari
Browser bug allows cross-site user tracking. (to
the original material)
- A new destructive malware
targeting Ukrainian Government and business entities. (to
the original material)
15.01.2022
- News
from Cyber Security.
- npm dependency is breaking
some React apps today — here's the fix. (to
the original material)
- Russia charges 8 suspected
REvil ransomware gang members. (to
the original material)
- Qlocker ransomware returns
to target QNAP NAS devices worldwide. (to
the original material)
- Linux malware sees 35%
growth during 2021. (to
the original material)
- Considering a move to Zero
Trust security? Keep these identity security practices and
resources in mind. (to
the original material)
- Good news for GDPR
enforcement against cookie walls, but also a dangerous
legal challenge from WhatsApp. (to
the original material)
14.01.2022
- News
from Cyber Security.
- Ivanti updates Log4j
advisory with security updates for multiple products. (to
the original material)
- New infosec products of the
week: January 14, 2022. (to
the original material)
- How to improve your IR
(Incident Response) tabletop exercises and why you really
should? (to
the original material)
- The future of security
protocols for remote work. (to
the original material)
- Manufacturers are starting
to realize the importance of OT security. (to
the original material)
- In 2022, AI-based
full-suite security is needed. (to
the original material)
- MFA (Multi-Factor
Authentication) market to reach $21.3 billion by 2027. (to
the original material)
- The Week in Ransomware -
January 14th 2022 - Russia finally takes action. (to
the original material)
- Goodwill discloses data
breach on its ShopGoodwill platform. (to
the original material)
- Former DHS (Department of
Homeland Security) official charged with stealing govt
employees' PII (Personal Identifying Information). (to
the original material)
- White House reminds tech
giants open source is a national security issue. (to
the original material)
- Researchers develop CAPTCHA
solver to aid dark web research. (to
the original material)
- Defense contractor Hensoldt
confirms Lorenz ransomware attack. (to
the original material)
- New Intel chips won't play
Blu-ray disks due to SGX deprecation. (to
the original material)
- Multiple Ukrainian
government websites hacked and defaced. (to
the original material)
- Russia arrests REvil
ransomware gang members, seize $6.6 million. (to
the original material)
- Best Practices for
Improving Cloud Encryption. (to
the original material)
- SEC, FTC Issue Warning on
Log4j Vulnerabilities. (to
the original material)
- 1/6/21 Insurrection - What
Did the Social Networks Know? (to
the original material)
- "Massive" Cyberattack on
Ukraine Cripples Gov’t Websites. (to
the original material)
- Russia stops REvil. (to
the original material)
- Flaw found in Biometric ID
Devices. (to
the original material)
- Measuring cybersecurity
effectiveness is the only way to know if you are protected. (to
the original material)
- Why is data destruction the
best way to impede data breach risks? (to
the original material)
- Your Multi-Factor
Authentication technology is already compromised – Here's how.
(to
the original material)
- Ukrainian Government
websites forced offline in "massive" cyber-attack. (to
the original material)
- North Korean hackers stole
$400m in cryptocurrency last year. (to
the original material)
- AWS patches glue bug that
put customer data at risk. (to
the original material)
- Ukrainian cops bust
suspected $1m cybercrime ring. (to
the original material)
- Tech Giants to team-up on
open source security after White House meet. (to
the original material)
- Threat Roundup for January
7 to January 14. (to
the original material)
- Talos Takes Ep. #82: Log4j
followed us in 2022. (to
the original material)
- Week in security with Tony Anscombe. (to the original material)
- How to Stop & Prevent
DDoS Attacks. (to
the original material)
- Instant Messaging Apps:
How private are they & what alternatives are there? (to
the original material)
- Interview with Anand Naik – Sequretek. (to the original material)
13.01.2022
- News
from Cyber Security.
- Cybersecurity news of the
week (13.01.2022). (to
the original material)
- How to achieve the
interoperability of EU Risk Management Frameworks. (to
the original material)
- Juniper Networks releases
security updates for multiple products. (to
the original material)
- Citrix releases security
updates for Hypervisor. (to
the original material)
- Apple releases security
updates for iOS and iPadOS. (to
the original material)
- Cisco releases security
updates for multiple products. (to
the original material)
- Phishers are targeting
Office 365 users by exploiting Adobe Cloud (to
the original material)
- Delivering vulnerable
signed kernel drivers remains popular among attackers. (to
the original material)
- When it comes to banking
security, there’s no silver bullet. (to
the original material)
- The rising threat of cyber
criminals targeting cloud infrastructure in 2022. (to
the original material)
- The public sector is more
concerned about external than internal threats. (to
the original material)
- What makes edge computing
successful? (to
the original material)
- Consumer IAM (Identity and
Access Management) market to reach $17.6 billion by 2026. (to
the original material)
- Android users can now
disable 2G to block Stingray attacks. (to
the original material)
- FCC wants new data breach
reporting rules for telecom carriers. (to
the original material)
- BlueNoroff hackers steal
crypto using fake MetaMask extension. (to
the original material)
- AWS fixes security flaws
allowing access to AWS customer data. (to
the original material)
- Microsoft Defender weakness
lets hackers bypass malware detection. (to
the original material)
- Windows "RemotePotato0"
zero-day gets an unofficial patch. (to
the original material)
- Carding site UniCC retires
after generating $358 million in sales. (to
the original material)
- Ukranian police arrests
ransomware gang that hit over 50 firms. (to
the original material)
- FBI Issues Warning on FIN7
USB Stick Exploit. (to
the original material)
- Why You Need
Pentesting-as-a-Service (PtaaS). (to
the original material)
- Machine Learning For
Contested Antivirus Decisions | Avast. (to
the original material)
- Analytics Are Essential for
Effective Database Security. (to
the original material)
- Vice Principal charged with
cyber-stalking. (to
the original material)
- Pennsylvania welcomes new
cybersecurity center. (to
the original material)
- FCC proposes stricter data
breach reporting requirements. (to
the original material)
- New "undetected" backdoor
runs across three OS platforms. (to
the original material)
- US: MuddyWater is Iranian
state-backed group. (to
the original material)
- Report identifies
weaknesses in online banking security. (to
the original material)
- Threat Source Newsletter
(Jan. 13, 2022). (to
the original material)
- Beers with Talos, Ep. #114:
And then there were two... (to
the original material)
- Cryptocurrency scams: What
you need to know about them and how to protect yourself. (to
the original material)
- Making loyalty pay: How to
keep your loyalty rewards safe from scammers. (to
the original material)
12.01.2022
- News
from Cyber Security.
- The National Directorate of
Cyber Security and ISACA Romania launch the Practical Guide
for Operators of Essential Services (OSE). (to
the original material)
- CNMF identifies and
discloses malware used by Iranian APT MuddyWater. (to
the original material)
- A new multi-platform
backdoor is leveraged by an advanced threat actor. (to
the original material)
- Ransomware, supply chain,
and deepfakes: The top threats the finance industry needs to
prepare for. (to
the original material)
- How safe are cloud
applications? (to
the original material)
- SMEs still an easy target
for cybercriminals. (to
the original material)
- Audit your Active Directory
with a free, read-only scan from Specops. (to
the original material)
- 2022 promises to be a
challenging year for cybersecurity professionals. (to
the original material)
- Technology-related
employment still going strong, unemployment rate for IT jobs
dropping to 2%. (to
the original material)
- Digital asset management
market to reach $10 billion in 2026. (to
the original material)
- Attackers more successful
at delivering malware payloads. (to
the original material)
- Why 2022 should be a year
of cybersecurity optimism. (to
the original material)
- Zero-Trust for Health Care
in the age of ransomware. (to
the original material)
- Oxeye Tool Can Counter
Log4j Obfuscation Attacks. (to
the original material)
- CISA, NSA warn of Russian
attacks on critical infrastructure. (to
the original material)
- Left of SIEM? Right of
SIEM? Get It Right! (to
the original material)
- Researchers says flaw
allows remote access to Teslas. (to
the original material)
- Apple fixes doorLock bug
that can disable iPhones and iPads. (to
the original material)
- US links MuddyWater hacking
group to Iranian intelligence agency. (to
the original material)
- UK jails man for spying on
teenagers, stealing photos using RATs (Remote Access Trojans).
(to
the original material)
- Magniber ransomware using
signed APPX files to infect systems. (to
the original material)
- TellYouThePass ransomware
returns as a cross-platform Golang threat. (to
the original material)
- OceanLotus hackers turn to
web archive files to deploy backdoors. (to
the original material)
- EA: 50 high-profile FIFA 22
accounts taken over by phishing actors. (to
the original material)
- Hackers take over
diplomat's email, target Russian deputy minister (Ministry of
Foreign Affairs). (to
the original material)
- Clinical Review vendor
reports data breach. (to
the original material)
- Teen makes Tesla hacking
claim. (to
the original material)
- Phishers take over FIFA 22
accounts. (to
the original material)
- European Union to launch
supply chain attack simulation. (to
the original material)
- UK launches initiative to
develop global AI standards. (to
the original material)
- Two years for man who used
RATs to spy on women and children. (to
the original material)
- Microsoft Starts 2022 with
97 CVEs in January Patch Tuesday. (to
the original material)
- Europol ordered to delete
vast trove of personal information. (to
the original material)
- Nanocore, Netwire and
AsyncRAT spreading campaign uses public cloud infrastructure.
(to
the original material)
- The People Behind Us –
Website Security Champions 2021. (to
the original material)
- Interview with
Reinard Mortlock – Livex. (to
the original material)
11.01.2022
- News
from Cyber Security.
- CISA, FBI, and NSA release
cybersecurity advisory on Russian cyber threats to U.S. critical
infrastructure. (to
the original material)
- Samba releases security
update. (to
the original material)
- Mozilla releases security
updates for Firefox, Firefox ESR, and Thunderbird. (to
the original material)
- Microsoft releases January
2022 Security Updates. (to
the original material)
- SAP releases January 2022
Security Updates. (to
the original material)
- Citrix releases security
update for Workspace App for Linux. (to
the original material)
- Adobe releases security
updates for multiple products. (to
the original material)
- Microsoft fixes wormable RCE
in Windows Server and Windows (CVE-2022-21907). (to
the original material)
- Small, minority-led banks and
credit unions face greater cyber risk. (to
the original material)
- Data breaches reached another
all-time high in 2021. (to
the original material)
- New Zero Trust solution helps
guard IT infrastructure. (to
the original material)
- Cybersecurity budgets set to
increase in the next year. (to
the original material)
- Microsoft reveals "powerdir"
macOS vulnerability that allows unauthorized user data access. (to
the original material)
- Data security in the age of
insider threats: A primer. (to
the original material)
- Analyst guide: Encryption
solutions buyers checklist. (to
the original material)
- How the pandemic fueled
enterprise digital transformation. (to
the original material)
- Small businesses are most
vulnerable to growing cybersecurity threats. (to
the original material)
- Video surveillance systems
market to grow steadily by 2026. (to
the original material)
- Microsoft January 2022 Patch
Tuesday fixes 6 zero-days, 97 flaws. (to
the original material)
- New RedLine malware version
spread as fake Omicron stat counter. (to
the original material)
- US govt warns of Russian
hackers targeting critical infrastructure. (to
the original material)
- New SysJocker backdoor
targets Windows, macOS, and Linux. (to
the original material)
- KCodes NetUSB exposes
millions of routers to RCE attacks. (to
the original material)
- Night Sky ransomware uses
Log4j bug to hack VMware Horizon servers. (to
the original material)
- Cybersecurity in 2022:
Addressing insider threats. (to
the original material)
- This is the year to create a
cybersecurity culture. (to
the original material)
- Defence against the dark
arts: Learnings from the magical world to boost your AppSec. (to
the original material)
- World Economic Forum:
Cybersecurity an increasing global threat. (to
the original material)
- Banks still struggling to
spot the signs of human trafficking. (to
the original material)
- Corporate cyber-attacks spike
50% in 2021. (to
the original material)
- Romance scammers stole £92
million from victims last year. (to
the original material)
- State hackers use new
PowerShell backdoor in Log4j attacks. (to
the original material)
- Microsoft: New critical
Windows HTTP vulnerability is wormable. (to
the original material)
- Firefox Focus now blocks
cross-site tracking on Android devices. (to
the original material)
- CISA alerts federal agencies
of ancient bugs still being exploited. (to
the original material)
- Microsoft fixes critical
Office bug, delays macOS security updates. (to
the original material)
- Hackers hit healthcare data
management company. (to
the original material)
- US issues alert over russian
hackers. (to
the original material)
- Microsoft Patch Tuesday for
Jan. 2022 - Snort rules and prominent vulnerabilities. (to
the original material)
- Vulnerability Spotlight: Two
vulnerabilities in Adobe Acrobat DC could lead to arbitrary code
execution. (to
the original material)
- Vulnerability Spotlight: Heap
buffer overflow condition in Google Chrome could lead to code
execution. (to
the original material)
- Signed kernel drivers –
Unguarded gateway to Windows’ core. (to
the original material)
- 2021 was a terrible year for
cybersecurity. Without action, 2022 could be even worse. (to
the original material)
10.01.2022
- News
from Cyber Security.
- Vulnerability summary for the
Week of January 3, 2022. (to
the original material)
- CISA adds 15 known exploited
vulnerabilities to catalog. (to
the original material)
- WordPress 5.8.3. security
update fixes SQL injection, XSS flaws. (to
the original material)
- Endpoint security products
failing against targeted attacks. (to
the original material)
- Finding & Fixing Google
Blocklist warnings. (to
the original material)
- CISA sees low level of Log4j
exploitation against agencies and critical infrastructure. (to
the original material)
- Who's to blame for the Kronos
payroll disruptions, post cyberattack? (to
the original material)
- Scrap the operating system in
the name of infosec? MIT researchers want you to try it out. (to
the original material)
- The blame game: EU criticized
for "fragmented and slow" approach to cyber-attack attribution.
(to
the original material)
- City of Grass Valley,
California, suffers data breach - employee and citizen
information exposed. (to
the original material)
- Report: DDoS attacks
increasing year on year as cybercriminals demand extortionate
payouts. (to
the original material)
- URL parsing bugs allow DoS,
RCE, spoofing and more. (to
the original material)
- Cyber-spike: Orgs suffer 925
attacks per week, an all-time high. (to
the original material)
- Uncovering and defending
systems against attacks with layers of remote control. (to
the original material)
- Ransomware tracker: The
latest figures (December 2021). (to
the original material)
- Mainframe DevOps: What
modernization means. (to
the original material)
- Log4j updates: Flaw
challenges global security leaders. (to
the original material)
- Ransomware's threat to the
mainframe. (to
the original material)
- HHS warns healthcare sector
of Pysa ransomware threats. (to
the original material)
- CISA: Federal response to
Log4j has been "Exceptional". (to
the original material)
- QNAP tells users take
immediate action to stop ransomware. (to
the original material)
- How China's algorithm
regulation affects businesses. (to
the original material)
- Criminaysis: Cryptocurrency
crime reaches all-time high. (to
the original material)
- VMware ESXi 7 users
vulnerable to hypervisor takeover bug. (to
the original material)
- Vulnerability Spotlight:
Buffer overflow vulnerability in AnyCubic Chitubox plugin. (to
the original material)
- Europol ordered to delete
data not tied to investigations. (to
the original material)
- Europol ordered to erase data
on those not linked to crime. (to
the original material)
- Linux Mint 20.3 released
promising security updates until 2025. (to
the original material)
- Microsoft: powerdir bug gives
access to protected macOS user data. (to
the original material)
- Oops: Cyberspies infect
themselves with their own malware. (to
the original material)
- Linux version of AvosLocker
ransomware targets VMware ESXi servers. (to
the original material)
- Extortion DDoS attacks grow
stronger and more common. (to
the original material)
- FinalSite: No school data
stolen in ransomware attack behind sire outages. (to
the original material)
- Unified communications market
size to reach $344.84 billion by 2028. (to
the original material)
- 6 cloud security trends to
watch for 2022. (to
the original material)
- On-premises cloud: The worst
of both worlds? (to
the original material)
- Eight resolutions to help
navigate the new hybrid office model (to
the original material)
- What to expect in 2022
privacy wise? (to
the original material)
- Detect and identify IoT
malware by analyzing electromagnetic signals. (to
the original material)
- Securing onboarding and
offboarding in the cloud. (to
the original material)
- Abcbot botnet linked to
operators of Xanthe cryptomining malware. (to
the original material)
- Forensics expert kept murder
snaps on PC. (to
the original material)
- Connecticut nerds report
CSAM. (to
the original material)
- Cyber-Thieves raid Grass
Valley. (to
the original material)
- Why politically motivated
cyber-attacks are a threat to democracy. (to
the original material)
- Over half of SMEs have
experienced a cybersecurity breach. (to
the original material)
- Howto: Automate your security
processes. (to
the original material)
- US issues warning over
commercial spyware. (to
the original material)
- FlexBooker reveals major
customer data breach. (to
the original material)
- Here comes the Digital
Markets Act, important new legislation from the EU boosting
privacy and interoperability. (to
the original material)
09.01.2022
- News
from Cyber Security.
- Dev corrupts NPM libs
"colors" and "faker" breaking thousands of apps. (to
the original material)
- BADNEWS! Patchwork APT
hackers score own goal in recent malware attacks. (to
the original material)
08.01.2022
- News
from Cyber Security.
- Protecting supply chains from
highly contagious attacks. (to
the original material)
- Troianized dnSpy app drops
malware cocktail on researchers, devs. (to
the original material)
- Rapid windows title changes
cause "white screen of death". (to
the original material)
- Vgkf virus ransomware [.vgkf
files] - Removal and decrypt guide. (to
the original material)
07.01.2022
- News
from Cyber Security.
- This Week in security news -
January 7, 2022. (to
the original material)
- The Week in ransomware -
January 7th 2022 - Watch out for USB drives. (to
the original material)
- SonicWall: Y2k22 bug hits
email security, firewall products. (to
the original material)
- FBI: Hackers use BadUSB to
target defense firms with ransomware. (to
the original material)
- Flubot malware now targets
Europe posing as Flash Player app. (to
the original material)
- US counterintelligence shares
tips to block spyware attacks. (to
the original material)
- QNAP warns of ransomware
targeting Internet-exposed NAS devices. (to
the original material)
- NHS warns of hackers
exploiting Log4Shell in VMware Horizon. (to
the original material)
- Cerberus Sentinel acquires
true digital security. (to
the original material)
- Monsanto employees stole
trade secret. (to
the original material)
- Why holistic ecosystems will
be central to future cybersecurity. (to
the original material)
- Election fraud firm to shut
down after claims debunked. (to
the original material)
- Thousands of schools impacted
after IT provider hit by ransomware. (to
the original material)
- Researchers warn of new
Log4Shell - Like Java vulnerability. (to
the original material)
- Cyber-attack on New Mexico
county. (to
the original material)
- Facebook/ Google use Dark
Patterns in cookie consent - says France, waving $240 million
fines. (to
the original material)
- Antivirus software market to
reach $4.54 billion in 2025. (to
the original material)
- Enterprise PKI automation:
The modern approach to certificate lifecycle management. (to
the original material)
- Supply chain cybersecurity:
Pain or pleasure? (to
the original material)
- January 2022 Patch Tuesday
forecast: Old is new again. (to
the original material)
- Network and security teams
must collaborate to successfully deliver digital transformation.
(to
the original material)
- Case Study: The road to Zero
Trust. (to
the original material)
- Norton 360 offering contains
controversial cryptominer. (to
the original material)
- FBI: FIN7 hackers target US
companies with BadUSB devices to install ransomware. (to
the original material)
- Codex exposed: Exploring the
capabilities and risks of OpenAI's code generator. (to
the original material)
- QNAP: Get NAS devices off the
internet now. (to
the original material)
- 3.7 million FlexBooker
records dumped on hacker forum. (to
the original material)
- EoL (End of Life) Systems
stonewalling Log4j fixes for Fed Agencies. (to
the original material)
- Researchers discover new
JNDI-based vulnerability similar to Log4j. (to
the original material)
- Cyber Command announces
partnership with 84 universities. (to
the original material)
- Mespinoza, Pysa ransomware an
ongoing threat to the healthcare sector, HHS warns. (to
the original material)
- Below the surface: Log4j
attack trends. (to
the original material)
- WordPress 5.8.3. security
release. (to
the original material)
- Malware and ransomware set to
be a larger threat over the next year. (to
the original material)
- How control system
vulnerabilities can threaten the oil industry [Q&A]. (to
the original material)
- Latest WordPress security
release fixes XSS, SQL injection bug. (to
the original material)
- Internet Bug Bounty: High
Severity vulnerability in Apache HTTP Server could lead to RCE.
(to
the original material)
- Log4j - Related RCE flaw in H2 Database earns critical rating. (to the original material)
- Chinese scientist pleads
guilty to stealing US agricultural tech. (to
the original material)
- UK NHS: Threat actor targets
VMware Horizon servers using Log4Shall exploits. (to
the original material)
- FinalSite discloses
ransomware attack that crippled websites for 8,000 schools. (to
the original material)
- Russian denied bail in
insider trading hacking case. (to
the original material)
- ISMG Editors: Secrets and
lies of ransomware operators. (to
the original material)
- Coming invasion? Russian
cyber activity in Ukraine escalates. (to
the original material)
- Goodcaptchastyle.top virus
redirect removal steps [free fix steps]. (to
the original material)
- ConnectProcess Mac adware
removal guide [free delete steps]. (to
the original material)
- Remove Easysearch.club
browser redirect [free fix steps]. (to
the original material)
- Pure Dark Redirect removal
instructions. (to
the original material)
- SafeTravel Redirect removal
guide [free delete steps]. (to
the original material)
- Combo Cleaner Review Mac 2022
[antimalware]. (to
the original material)
06.01.2022
- News
from Cyber Security.
- Cybersecurity news of the
week (06.01.2022). (to
the original material)
- Executive predictions for
2022: CTO Fleming Shi. (to
the original material)
- From crisis to continuity:
Securing remote work for the long term. (to
the original material)
- Java RMI services often
vulnerable to SSRF attacks - research. (to
the original material)
- Kazakhstan government shuts
down internet following country-wide protest. (to
the original material)
- Natural disasters expose
cyber weaknesses for financial firms. (to
the original material)
- Missouri's CRMC (Capital
Region Medical Center) brings network back online, 3 weeks after
cyberattack. (to
the original material)
- Financial advisers embrace
increased security awareness, controls. (to
the original material)
- Security experts develop
search tool to make CISA's (ever growing) Log4j database more
friendly. (to
the original material)
- What companies should expect
as the FTC takes aim at Log4j laggards. (to
the original material)
- Google Docs comment flaw
exploited by attackers. (to
the original material)
- CES 2022: More sensors than
people. (to
the original material)
- Threat Source Newsletter
(January 6, 2022). (to
the original material)
- Covid test data breach at
British School. (to
the original material)
- Cyber-attack on Fertility
Centers of Illinois. (to
the original material)
- Investigation launched into
RIPTA data breach. (to
the original material)
- The Colonial Pipeline attack
eight months on. (to
the original material)
- UK Police seize £322 million
of cryptocurrency in past five years. (to
the original material)
- Man pleads guilty to $50
million investment fraud scheme. (to
the original material)
- Credential stuffers
compromised 1.1 million accounts. (to
the original material)
- Finite state adds binary
analysis to catch zero-days. (to
the original material)
- Bridging the "front and back
of the house": A lesson in risk management. (to
the original material)
- The Log4j debacle showed
again that public disclosure of zero days only helps attackers.
(to
the original material)
- Five tips on how to stay
(cyber) secure in a hybrid work world. (to
the original material)
- Experts uncover Elephant
Beetle, an organized financial-theft operation. (to
the original material)
- Mobile security software
market to reach $2.75 billion by 2025. (to
the original material)
- FinalSite ransomware attack
shuts down thousands of school websites. (to
the original link)
- Night Sky is the latest
ransomware targeting corporate networks. (to
the original material)
- FlexBooker discloses data
breach, over 3.7 million accounts impacted. (to
the original material)
- US arrests suspect who stole
unpublished books in phishing. (to
the original material)
- US online pharmacy Ravkoo
links data breach to AWS portal incident. (to
the original material)
- Swiss army bans all chat apps
but locally-developed Threema. (to
the original material)
- Google Docs commenting
feature exploited for spear-phishing. (to
the original material)
- France hits Facebook and
Google with $210 million in fines. (to
the original material)
- FBI warns about ongoing
Google Voice authentication scams. (to
the original material)
- Is quantum computing ready to
disrupt cybersecurity? (to
the original material)
- Best practices for encrypting
your phone communications. (to
the original material)
- W2 form is for sale on the
dark web. (to
the original material)
- DIY Sinclair clones: Left it
too late to back the Next? Build your own instead. (to
the original material)
- UK government stacks up to
£1.8 billion in vertical application framework. (to
the original material)
- Fugitive mafiosi evaded cops
for two decades until he was spotted on Google Street View. (to
the original material)
- Hearth attack victim "saved"
by defibrillator delivery drone. (to
the original material)
- Google Chrome 97 relaxes
privacy protection just a little to help out Microsoft. (to
the original material)
- New trick could let malware
fake iPhone shutdown to spy on users secretly. (to
the original material)
05.01.2022
- News
from Cyber Security.
- Google releases security
updates for Chrome. (to
the original material)
- VMware releases security
updates. (to
the original material)
- How legitimate websites are
used to spread ransomware. (to
the original material)
- A walk through a Year of
Website Security: Part II. (to
the original material)
- Health tech vendor QRS faces
lawsuit after data theft impacting 319k patients. (to
the original material)
- Warning: Log4j still lurks
where dependency analysis can't find it. (to
the original material)
- "We all need to be better":
Financial advisers confront flaws in their security posture. (to
the original material)
- What value does Extend
Detection and Response (XDR) bring to the cybersecurity market
[Q&A]? (to
the original material)
- How can SMBs extend their
SecOps capabilities without adding headcount? (to
the original material)
- The CISO's guide to
third-party security management. (to
the original material)
- SMBs should consider new
approaches for increasing their cybersecurity posture. (to
the original material)
- How companies manage data and
AI initiatives. (to
the original material)
- API security: Understanding
the next top attack vector. (to
the original material)
- Embedded hypervisor software
market to reach $1.16 billion by 2026. (to
the original material)
- 70 investors lose $50 million
to fraudsters posing as broker-dealers. (to
the original material)
- Microsoft Defender for
Endpoint adds zero-touch iOS onboarding. (to
the original material)
- NY OAG (New York State Office
of the Attorney General): Hackers stole 1.1 million customer
accounts from 17 companies. (to
the original material)
- Crypto platform ARBIX flagged
as a rugpull, transfers $10 million. (to
the original material)
- iOS malware can fake iPhone
shut downs to snoop on camera, microphone. (to
the original material)
- "Elephant Beetle" spends
month in victim networks to divert transactions. (to
the original material)
- Microsoft code-sign check
bypassed to drop Zloader malware. (to
the original material)
- WhiteSource automates
remediation of Log4j vulnerabilities. (to
the original material)
- Defending against modern
ransomware tactics. (to
the original material)
- McMenamins reports data
breach. (to
the original material)
- Kansas gets 17 critical
cybersecurity recommendations. (to
the original material)
- Morgan Stanley agrees to data
breach settlement. (to
the original material)
- Cybersecurity trends for
2022. (to
the original material)
- AI progress in security is
impressive enough without embellishment. (to
the original material)
- Palo Alto Networks appoints CEO for EMEA and LATAM Regions. (to the original material)
- Info-stealing malware hits
100+ countries. (to
the original material)
- UK's information commissioner
starts new role amid major changes. (to
the original material)
- FTC: Patch Log4j now or risk
major fines. (to
the original material)
- Duty-search redirect removal
guide [free delete steps]. (link
to original material)
- LIKEAHORSE ransomware virus
[remove and restore data]. (link
to original material)
- FormulaBuffer Mac adware
removal [free uninstall steps]. (to
the original material)
- DEHD virus ransomware [.dehd
files] removal & decrypt guide. (to
the original material)
- Using CASB to establish user
access, control of critical assets. (to
the original material)
- New Zloader Banking malware
campaign exploiting Microsoft signature verification. (to
the original material)
- How ransomware gangs went
pro. (to
the original material)
- The FreeRTOS vulnerability
disaster. (to
the original material)
- Importance of cybersecurity
in military. (to
the original material)
- A majority of Gen Z crypto
investors think they will become millionaires, according to a
new survey. (to
the original material)
- Interesting cyber crime
stories. (to
the original material)
- IBM bosses wrongly sacked
channel salesman after Tech Data joint venture failed, tribunal
rules. (to
the original material)
- Hauliers report problems with
post-Brexit customs system but HMRC (Her Majesty's Revenue &
Customs) insists it is "online and working as planned". (to
the original material)
- Remember Norton 360's bundled
cryptominer? Irritated folk realize Ethereum crafter is tricky
to delete. (to
the original material)
- Microsoft pushes ahead
adapting Azure for 5G telecoms after swallowing AT&T's
Network cloud. (to
the original material)
- You better have patched those
Log4j holes or we'll see what a judge has to say - FTC. (to
the original material)
- 5 ways hackers steal
passwords (and how to stop them). (to
the original material)
- Top 10 bad
cybersecurity habits to shed in 2022. (to
the original material)
04.01.2022
- News
from Cyber Security.
- Vulnerability summary for the
week of December 27, 2021. (to
the original material)
- U.S. weighs in on open source
software security. (to
the original material)
- Insider threat does not have
to be malicious, so how do you protect your organization? (to
the original material)
- Preventing document fraud in
a world built in digital trust. (to
the original material)
- Healthcare cloud infrastructure market size to reach $142 billion by 2028. (to the original material)
- Should businesses be
concerned about APT-style attacks? (to
the original material)
- Emergency Windows Server
update fixes Remote Desktop issues. (to
the original material)
- FTC warns companies to secure
consumer data from Log4j attacks. (to
the original material)
- First Microsoft
Pluton-powered Windows 11 PCs unveiled at CES. (to
the original material)
- Hackers use video player to
steal credit cards from over 100 sites. (to
the original material)
- UScellular discloses data
breach after billing system hack. (to
the original material)
- Have I Been Pwned warns of
DatPiff data breach impacting millions. (to
the original material)
- Spyderbat tool can discover
Log4j vulnerabilities. (to
the original material)
- Did U.S. charge Klyushin to
reveal 2016 SNC hack info? (to
the original material)
- Top 10 Gurucul blog posts of
2021. (to
the original material)
- Top 10 security challenges
for 2022. (to
the original material)
- Investigation launched into
App "Selling" Women. (to
the original material)
- Google acquires its first
non-american cybersecurity firm (Siemplify). (to
the original material)
- Google acquires Siemplify in
ambitious cybersecurity push. (to
the original material)
- UWO (University of
Wisconsin-Oshkosh) opens new cybersecurity center. (to
the original material)
- Protecting the most crucial
software supply chain targets. (to
the original material)
- Money launderers get 33 years
for £70m criminal scheme. (to
the original material)
- UK Defence Academy attack
forced IT rebuild - report. (to
the original material)
- Microsoft fixes New Year's
Day Exchange Server bug. (to
the original material)
- ToolIndexer Mac Ads removal
guide [free uninstall steps]. (to
the original material)
- MainOperation Mac Adware
delete guide [free removal steps]. (to
the original material)
- EasyMacSoft Mac adware
removal guide [free delete steps]. (to
the original material)
- SafeplexSearch Mac Adware
removal guide. (to
the original material)
- Remote Access malware rises,
ransomware operators rebrand, and more attacks on individuals:
Report. (to
the original material)
- Newly discovered Lapsus$
ransomware targets several organizations in a month. (to
the original material)
- Saltzer Health says patient
data exposed in cyberattack. (to
the original material)
- Log4j flaw attack levels
remain high, Microsoft warns. (to
the original material)
- SAILFISH System to find
State-inconsistency bugs in smart contracts. (to
the original material)
- North Korean Konni hackers
target Russian diplomats using New Year greetings. (to
the original material)
- Skimmer injected into 100
real estate websites via Cloud Video Platform. (to
the original material)
- State-of-the-art EDRs
(Endpoint Detection & Response) are not perfect, fail to
detect common attacks. (to
the original material)
- Predictions: SecurityWeek's 2022 cybersecurity outlook. (to the original material)
- Unpatched HomeKit
vulnerability exposes iPhones, iPads to DoS attacks. (to
the original material)
- Cyber insurance firm Corvus
expands with acquisition of UK-based Tarian. (to
the original material)
- Anti-Bot fraud detection firm
HUMAN snags $100 million investment. (to
the original material)
- Instagram and teens: A quick
guide for parents to keep their kids safe. (to
the original material)
- Microsoft: Log4j exploit
attempts, testing remain rampant. (to
the original material)
- Log4j updates: Flaw
challenges global security leaders. (to
the original material)
- Clinic notifies 212,500 about
2020 breach involving fraud. (to
the original material)
- Card-stealing code found on
more than 100 Sotheby's luxury real estate sites. (to
the original material)
- Latest web hacking tools - Q1
2022. (to
the original material)
- Researcher discovers 70 web
cache poisoning vulnerabilities, nets $40k in bug bounty
rewards. (to
the original material)
- Broward Health healthcare
data theft impacts 1.3 million patients, employees. (to
the original material)
- Cyberattack on payroll vendor
Kronos disrupting healthcare workforce paychecks. (to
the original material)
- Financial advisers face
increased breach threats with remote work, sensitive data. (to
the original material)
- Mac security research and
freeware designer Objective-See becomes non-profit. (to
the original material)
- Organizations Worldwide
experience over 722 million attacks in the last 30 days. (to
the original material)
- Amazon Token Crypto
"presale" scam takes advantage of news hype and steals your
real cryptocurrency. (to
the original material)
- $1.9 million worth of NFTs
stolen and re-sold by hacker. (to
the original material)
- Fake Telegram Messenger
apps are hacking PCs with lethal malware that evades installed
antivirus. (to
the original material)
- RedLine malware leaks over
440,000 accounts, passwords: How to check if You've been
exposed, 2 ways to avoid data breach. (to
the original material)
- Does your cyber insurance
policy look more like health insurance? (to
the original material)
- SlimPay fined €180.000
after 12 million customers' bank data publicly accessible for
5 years. (to
the original material)
- Deception as a form of
defence. (to
the original material)
- Malware detection: What is
heuristic analysis? (to
the original material)
03.01.2022
- News
from Cyber Security.
- A CISO's guide to discussing
cybersecurity with the board. (to
the original material)
- Why the UK's energy sector is
fragile and ripe to cyber attacks. (to
the original material)
- Ransomware attacks decrease,
operators started rebranding. (to
the original material)
- LTE (Long-Term Evolution -
Standard for wireless broadband communication) IoT market to
grow steadily by 2026. (to
the original material)
- InfoSec products of the
month: December 2021. (to
the original material)
- Broward Health (Florida, USA) discloses data breach affecting 1.3 million people. (to the original material)
- BlackTech APT pulls out new Flagpro malware to target Japan and others. (to the original material)
- SEGA Europe left AWS S3 bucket unsecured exposing data and infrastructure to attack. (to the original material)
- Detecting evasive malware on IoT devices using electromagnetic emanations. (to the original material)
- CMMC (Cybersecurity Maturity Model Certification program) stakeholders expect less talk, more action to shore up contractor security. (to the original material)
- New guidance tackles role of manufacturers in medical device security, patient safety. (to the original material)
- Morgan Stanley to pay $60
million to resolve data security lawsuit. (to
the original material)
- IoT's importance is growing rapidly, but its security is still weak. (to the original material)
- CrowdStrike beefs up exploit
detection with Intel CPU telemetry. (to
the original material)
- Hospitality chain says
employee data stolen in ransomware attack. (to
the original material)
- Broward Health hit with data
breach on patient, staff. (to
the original material)
- How to identify whether a
crypto project is legitimate? (to
the original material)
- JetBlue tosses most passwords
out the emergency exit. (to
the original material)
- Florida Hospital System suffers data breach, including medical information. (to the original material)
- Hacking the ransomware
problem. (to
the original material)
- Jerusalem Post (JPost)
targeted pro-Iranian hackers on Soleimani assassination
anniversary. (to
the original material)
- Interview with Elena
Elkina – Women in security and privacy. (to
the original material)
- How to hide from facial
recognition software with Fawkes. (to
the original material)
02.01.2022
- News
from Cyber Security.
- Most popular cybersecurity
and tech stories of 2021. (to
the original material)
- Uber ignores vulnerability
that lets you send any mail from Uber.com. (to
the original material)
- How long before VPN's are
mothballed? (to
the original material)
- Lapsus$ ransomware gang hits
SIC, Portugal's largest TV channel. (to
the original material)
- 6 ways to hack Facebook with
Android device (100% working) step by step procedure. (to
the original material)
- Google Dorks List 2022 -
Latest SQL Dork List. (to
the original material)
01.01.2022
- News
from Cyber Security.
- The Top 5 cybersecurity tools
companies need to implement right now. (to
the
original material)
- Popular Q&A app Curious
Cat loses domain, posts bizarre tweets. (to
the original material)
- PulseTV: Over 200,000 credit
cards details compromised. (to
the original material)
- Latest Google Dorks SQL
Injection - SQL Dorks 2022. (to
the original material)
Archive:
Click here to access CMS (Content Management System) in Joomla.
Source:
Note Dorin M.
This site has a double form,
one in HTML and one in Joomla (if you are interested in the
utility behind this effort you can read the "Why
a HTML and a CMS (Joomla)" page).
That's why I suggest you, depending on your desire, to use the HTML form for simple browsing / information or the Joomla form if you want in-depth studies / searches using the CMS search engine.
That's why I suggest you, depending on your desire, to use the HTML form for simple browsing / information or the Joomla form if you want in-depth studies / searches using the CMS search engine.
Dorin M - January 31, 2022