Study - Technical - LMS-SFC (EN) - Cyber Security - News Archive January 2022

Cyber Security - News Archive

January 2022



- Vulnerability Summary for the Week of January 24, 2022. (to the original material)

- FBI warns of 2022 Beijing Olympics cyberattack, privacy risks. (to the original material)

- Samba bug can let remote attackers execute code as root. (to the original material)

- 600K WordPress sites impacted by critical plugin RCE vulnerability. (to the original material)

- QNAP: DeadBolt ransomware exploits a bug patched in December. (to the original material)

- CISA adds 8 vulnerabilities to list of actively exploited bugs. (to the original material)

- Microsoft Office 365 to add better protection for priority accounts. (to the original material)

- Russian "Gamaredon" hackers use 8 new malware payloads in attacks. (to the original material)

- 277,000 routers exposed to Eternal Silence attacks via UPnP. (to the original material)

- Cybersecurity staff turnover and burnout: How worried should organizations be? (to the original material)

- Reducing the blast radius of credential theft. (to the original material)

- Why vulnerability scanners aren’t enough to prevent a ransomware attack on your business. (to the original material)

- How costly is an insider threat? (to the original material)

- Number of data compromises reaching all-time high. (to the original material)

- Cloud infrastructure spending jumped to $18.6B in 3Q21. (to the original material)

-  Dark Overlord collaborator sentenced to three years. (to the original material)

- Prison for Dark Overlord collaborator. (to the original material)

- Banking Trojan in Google Play App Store - "2FA Authenticator" drops Vultur RAT. (to the original material)

- Number of COVID-19 testing scams jumps sharply. (to the original material)

- Ransomware gangs are recruiting your employees. (to the original material)

- Attacks signal coming shift from ID theft to ID fraud. (to the original material)

- Cengage to buy cybersecurity training platform, Infosec. (to the original material)

- Aussie Tech entrepreneur extradited over SMS fraud. (to the original material)

- Bad Clicks and fallible users: How organizations can mitigate insider risks. (to the original material)

- The vulnerability of the UK's "Just in Time" supply chain. (to the original material)

- #HowTo: Implement continuous compliance for Kubernetes. (to the original material)

- US revokes China Unicom's license. (to the original material)

- Crypto Finance Firm offers $2m bug bounty to hackers. (to the original material)

- QNAP Ransomware: Thousands infected with DeadBolt. (to the original material)

- Researchers uncover new Iranian hacking campaign targeting Turkish users. (to the original material)

- New SureMDM vulnerabilities could expose companies to supply chain attacks. (to the original material)

- SureMDM vulnerabilities exposed companies to supply chain attacks. (to the original material)

- New Samba bug allows remote attackers to execute arbitrary code as root. (to the original material)

- Behind The Buzzword: Four ways to assess your Zero Trust security posture. (to the original material)

- Your graphics card fingerprint can be used to track your activities across the web. (to the original material)

- German Court rules websites embedding Google fonts violates GDPR. (to the original material)

- Crypto outfit Qubit appeals to the honour of thieves who lifted $80M of its digi-dollars. (to the original material)

- 3 Things you should consider before mining Monero. (to the original material)

- The Third Building Block for the SOC of the Future: Balanced Automation. (to the original material)

- CISA's "Must Patch" list puts spotlight on Vulnerability Management Processes. (to the original material)

- Israeli lawyer, Hungarian rights group target Pegasus Spyware. (to the original material)

- Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables. (to the original material)

- Vulnerability Spotlight: Memory corruption and use-after-free vulnerabilities in Foxit PDF Reader. (to the original material)

- Data on children of armed forces personnel exposed in data breach  at the Ministry of Defense (UK). (to the original material)

- How to tell if your phone has been hacked. (to the original material)

- ITRC data breach report shows surge in data compromises. (to the original material)

- Rust-Coded malware key factor in BlackCat's meteoric rise. (to the original material)

- Report details Russian cyberespionage efforts in Ukraine. (to the original material)

- HHS HC3: BlackMatter threat to Health Sector "Reduced". (to the original material)

- Lazarus using Windows Update, GitHub to deploy malware. (to the original material)

- Unsecured AWS server exposed 3TB in airport employee records. (to the original material)

- Meta will warn you if someone screengrabs your encrypted Messenger chats. (to the original material)

- This is the year to build a cybersecurity culture. (to the original material)

- Breaches exposed 45.67M patient records in 2021, largest annual total since 2015. (to the original material)

- Feds move to settle case with DoD cyber official in clearance dispute. (to the original material)

- Finance organizations targeted by ransomware may be "left chasing shadows". (to the original material)

- Bug Bounty Radar - The latest bug bounty programs for February 2022. (to the original material)

- No smoke without fire? "Critical" Loguru security flaw turns out to be non-issue. (to the original material)

- Vulnerability in PostBus public transport platform exposed customer data. (to the original material)

- Emsisoft releases DeadBolt ransomware decryption tool. (to the original material)

- Shuckworm continues cyber-espionage attacks against Ukraine. (to the original material)

- DazzleSpy backdoor spies on Hong Kong politicians. (to the original material)

- Cobalt Strike and Prometheus Traffic Direction System - New tools of the cyber threat trade. (to the original material)

- Reasons why every business is a target of DDoS attacks. (to the original material)

- Top Ways websites get hacked by spammers. (to the original material)

- Microsoft OneDrive for macOS local privilege escalation. (to the original material)

- Outdated IoT healthcare devices pose major security threats. (to the original material)

- Microsoft: Here's how we stopped the biggest ever DDoS attack. (to the original material)

- Interview with Narendra Sahoo – VISTA InfoSec. (to the original material)


-  Researchers use GPU fingerprinting to track users online. (to the original material)

- Researchers use natural silk fibers to generate secure keys for strong authentication. (to the original material)

- Apple pays $100,500 bounty to hacker who found way to hack MacBook Webcam. (to the original material)

- DeepDotWeb news site operator sentenced to 8 years for money laundering. (to the original material)

- FTC: Americans lost $770 million from social media fraud surge. (to the original material)

- Role of computer science degrees in the field of cybersecurity. (to the original material)

- Big differences between computer science and cyber degrees. (to the original material)

- Week in review: PolKit vulnerability, fake tax apps pushing malware, EU’s bug bounty for open source. (to the original material)

- Finnish diplomats targeted by Pegasus Spyware: Ministry. (to the original material)


-  Jupyter: A Cyberspace invader stealing SLTT Data. (to the original material)

- Microsoft Azure customer hit by largest ever 3.47 Tbps DDoS attack. (to the original material)

- FBI reportedly considered buying NSO Spyware. (to the original material)

- Designing security to mitigate growing ransomware threats. (to the original material)

- Windows vulnerability with new public exploits lets you become admin. (to the original material)

- Over 20,000 data center management systems exposed to hackers. (to the original material)

- Information assurance vs cybersecurity. (to the original material)

- What are the best cybersecurity programming languages? (to the original material)


- CISA adds eight known exploited vulnerabilities to Catalog. (to the original material)

- The National Directorate of Cybersecurity (DNSC) participated in the European cybersecurity crisis exercise - 'EU Cyber Crisis Linking Exercise on Solidarity – EU CyCLES. (to the original material)

- New infosec products of the week: January 28, 2022. (to the original material)

- Ransomware families becoming more sophisticated with newer attack methods. (to the original material)

- Why we can’t put all our trust into AI. (to the original material)

-  Healthcare industry most common victim of third-party breaches last year. (to the original material)

- Use of AI to fight insurance fraud hits all-time high. (to the original material)

- The state of SD-WAN and SASE planning. (to the original material)

- Spending on edge computing to reach $176 billion in 2022. (to the original material)

- QNAP force-installs update after DeadBolt ransomware hits 3,600 devices. (to the original material)

- FBI releases PIN (Private Industry Notification) on Iranian cyber group Emennet Pasargad. (to the original material)

- Zoom launches virtual conference floor for online events. (to the original material)

- Cisco adds Webex support to SD-WAN Cloud OnRamp. (to the original material)

- Accenture, Celonis partner in process mining technology. (to the original material)

- Microsoft gives NASA a lesson in timeshare optimisation. (to the original material)

- British court rules in HP’s favour in Mike Lynch fraud case. (to the original material)

- Kaseya boss looking for strong 2022. (to the original material)

- Cyber skills gap affecting data privacy practice, finds ISACA. (to the original material)

- Korean researchers invent silk-based security device. (to the original material)

- Manchester United signs Extreme Networks to modernize in-stadium connectivity experience. (to the original material)

- Leeds NHS Trust moves millions of patient records to the Microsoft Azure public cloud. (to the original material)

- Smart connectivity to transform world experience within a decade. (to the original material)

- Verizon Business and Atos team on predictive analytics 5G edge solution. (to the original material)

- CISOs must get out in front of Ukraine cyber crisis, says NCSC. (to the original material)

- The Week in Ransomware - January 28th 2022 - Get NAS devices off the Internet. (to the original material)

- US bans major Chinese telecom over national security risks. (to the original material)

- NCSC alerts UK orgs to brace for destructive Russian cyberattacks. (to the original material)

- EU to create pan-European cyber incident coordination framework. (to the original material)

- Hackers are taking over CEO accounts with rogue OAuth apps. (to the original material)

- Finnish diplomats’ phones infected with NSO Group Pegasus spyware. (to the original material)

- Finland warns of Facebook accounts hijacked via Messenger phishing. (to the original material)

- Microsoft Outlook RCE zero-day exploits now selling for $400,000. (to the original material)

- Fake cash scams thrive on Facebook and Insta - FTC. (to the original material)

- From Drone to Counter-Drone: The shifting role of cybersecurity. (to the original material)

- FBI issues warning over Iranian cyber company. (to the original material)

- Most ransomware infections are self-installed. (to the original material)

- Water utilities get 100-Day cybersecurity plan. (to the original material)

- White House releases Zero Trust Strategy for federal government. (to the original material)

- NCSC warns UK organizations to prepare for Russian cyber-attacks. (to the original material)

- Online investment fraud network taken down by law enforcement. (to the original material)

- 2FA Authenticator App downloaded Vultur Trojan on 10,000 Android devices. (to the original material)

- Hackers using device registration trick to attack enterprises with lateral phishing. (to the original material)

- How Wazuh can improve digital security for businesses. (to the original material)

- North Korean hackers using Windows Update Service to infect PCs with malware. (to the original material)

- North Korean hackers return with stealthier variant of KONNI RAT malware. (to the original material)

- Internet Society condemns UK's Online Safety Bill for demonizing encryption using "think of the children" tactic. (to the original material)

- Silk could tie up all-but-unbreakable encryption, say South Korean boffins. (to the original material)

- Intel fails to get Spectre, Meltdown chip flaw class-action super-suit tossed out. (to the original material)

- What You should know about Private Residential Proxies? (to the original material)

- Cyber Fraud Trends to be aware of in 2022: From iGaming to pandemic-related phishing. (to the original material)

- What are the best cybersecurity certifications for beginners? (to the original material)

- In the Hacker's crosshairs: K-12 Schools. (to the original material)

- Threat Roundup for January 21 to January 28. (to the original material)

- Week in security with Tony Anscombe. (to the original material)

- New ransomware DeadBolt targets QNAP devices. (to the original material)

- DeFi Platform Qubit Finance hacked for $80 million. (to the original material)

- Log4j exploitations have slowed, but attack vectors remain. (to the original material)

- FCC votes to ban China Unicom from operating in US. (to the original material)

- How refund fraud changed the cybercrime landscape. (to the original material)

- New macOS malware planted via Pro-Democracy Hong Kong Radio. (to the original material)

- Flaw in Polkit's pkexec puts Linux users at risk. (to the original material)

- Darknet Market search engine operator gets 8-year sentence. (to the original material)

- ISMG Editors: Tough lessons learned from Log4j, ransomware. (to the original material)

- Cyberattack spillover from Ukraine: Be prepared, UK warns. (to the original material)

- ITRC: Identity Crime predictions for 2022. (to the original material)

- All the World's a Stage: Russia arrests ransomware suspects. (to the original material)

- Vetting the security risks of open-source code in healthcare. (to the original material)

- Don't forget about privacy: Create a strong attitude to privacy on World Data Protection Day. (to the original material)

- Google Play app dropped Vultur banking Trojan on Android handsets. (to the original material)

- This Week in Security News - January 28th, 2022. (to the original material)

- Zerodium spikes payout for zero-click Outlook zero-days. (to the original material)

- Conti, DeadBolt ransomwares target Delta, QNAP. (to the original material)

- Lazarus APT uses Windows Update to spew malware. (to the original material)

- Shlayer and Bundlore MacOS malware strains – How Uptycs EDR Detection can help. (to the original material)

- Data Privacy Day aims to raise awareness of how we collect and use data. (to the original material)

- The Importance of Responsible Disclosure. (to the original material)

- MITRE ATT&ACK®: What it is and how it improves security. (to the original material)

- DeFi thefts beget DeFi for money laundering. (to the original material)

- Ad hoc cyber assessments at Commerce limit visibility over threats. (to the original material)

- 68K affected by data theft, "sophisticated" network hack of health nonprofit Advocates. (to the original material)

- US government’s "zero trust" roadmap calls time on perimeter-based paradigm. (to the original material)

- Xerox belatedly addresses web-based printer bricking threat. (to the original material)

- Privacy slalom: Human rights, media orgs offer OPSEC warning to Winter Olympics attendees. (to the original material)

- Scammers target us on social media now more than ever. (to the original material)

- Your personal data is valuable, and dangerous in the wrong hands. It's time to protect it better. (to the original material)

- WhisperGate malware corrupts computers in Ukraine. (to the original material)


- Cybersecurity Week News (27.01.2022). (to the original material)

- Promoting data protection by design: Exploring techniques. (to the original material)

- Apple releases security updates for multiple products. (to the original material)

- Stealthy Excel malware putting organizations in crosshairs of ransomware gangs. (to the original material)

- Attackers connect rogue devices to organizations’ network with stolen Office 365 credentials. (to the original material)

- Malware resets Android devices after performing fraudulent wire transfers. (to the original material)

- What makes achieving cyber resilience difficult? (to the original material)

- 65% of organizations continue to rely on shared logins. (to the original material)

- How would zero trust prevent a Log4Shell attack? (to the original material)

- Digital IDs under attack: How to tackle the threat? (to the original material)

- Familiarity with vaccine passport tech is laying the foundations for digital IDs. (to the original material)

- Fraud detection and prevention market to reach $75,139.66 million by 2028. (to the original material)

- Beyond the tick box: What to consider before agreeing to a privacy policy. (to the original material)

- DeepDotWeb admin imprisoned for advertising illegal dark web markets. (to the original material)

- Taiwanese Apple and Tesla contractor hit by Conti ransomware. (to the original material)

- Lazarus hackers use Windows Update to deploy malware. (to the original material)

- Microsoft warns of multi-stage phishing campaign leveraging Azure AD. (to the original material)

- Russian APT29 hackers' stealthy malware undetected for years. (to the original material)

- Microsoft mitigated a record 3.47 Tbps DDoS attack on Azure users. (to the original material)

- 105 million Android users targeted by subscription fraud campaign. (to the original material)

- Threat Source Newsletter (Jan. 27, 2022). (to the original material)

- Beers with Talos, Ep. #115: Everybody's measured by quarters - even threat actors. (to the original material)

- SolarWinds hackers still active, using new techniques. (to the original material)

- Google scales up Cloud Bigtable NoSQL database. (to the original material)

- Infor: Marketplace will drive ERP industry functionality. (to the original material)

- UK spectrum sharing should be a spectrum policy priority, says UK SPF (Spectrum Policy Forum). (to the original material)

- DCMS (Digital, Culture, Media and Sport) taps Arqit for 5G project to provide Open RAN security by default. (to the original material)

- SAP full-year 2021: Revenue nudges up 1%, cloud growth up 17%. (to the original material)

- Apple security update fixes zero-day vulnerability. (to the original material)

- Lack of tech skills is delaying projects. (to the original material)

- Novel phishing campaign highlights need for MFA, says Microsoft. (to the original material)

- Barclaycard customers increase contactless spending following limit rise. (to the original material)

- Microsoft uses Q2 2022 earnings to delve into Metaverse. (to the original material)

- Confluent Kafka connects apps on new Dish 5G network. (to the original material)

- Nightmare Log4Shell scenario averted by prompt, professional action. (to the original material)

- Bank account switching accelerates as consumers choose digital services. (to the original material)

- Imperial College London embarks on cloud security research push with Abu Dhabi tech hub. (to the original material)

- CORT deploys IoT to monitor indoor air quality. (to the original material)

- Meta makes frontline worker push with Workplace, WhatsApp. (to the original material)

- It monitors our every move: do fitness trackers, however, pose privacy risks? (to the original material)

- How retailers can beat the top four online shopping security threats in 2022. (to the original material)

- The top attack trends businesses need to address this year. (to the original material)

- Three in four mobile apps contain at least one vulnerability. (to the original material)

- Tech workers are more likely to fall for phishing emails. (to the original material)

- Why are WordPress websites targeted by hackers? (to the original material)

- Cybersecurity teams need to enforce SBOM mandates. (to the original material)

- Florida considers deepfake ban. (to the original material)

- Data breach at drug screening lab. (to the original material)

- Hacker flags flaw in Swiss Railway System. (to the original material)

- Nearly $9bn laundered in cryptocurrency in 2021. (to the original material)

- QNAP: Act now to mitigate DeadBolt ransomware. (to the original material)

- IT and DevOps staff more likely to click on phishing links. (to the original material)

- North Korea loses Internet in suspected cyber-attack. (to the original material)

- RARBG (Random Access Memory Block Generator) Proxy List 2022. (to the original material)

- Top 5 Cybersecurity measures for businesses. (to the original material)

- Cybersecurity Laws. (to the original material)

- How long will it take to become a cybersecurity professional? (to the original material)

- What Cyber Incident Analysis means. (to the original material)

- Crypto advocates Decry Bill that could ban transactions. (to the original material)

- SEC Chair seeks to "modernize" cybersecurity regulations. (to the original material)

- Conti ransomware hits Apple, Tesla supplier. (to the original material)

- DeepDotWeb co-admin sentenced to 8 years in prison. (to the original material)

- Defending the Supply Chain: Why the DDS protocol is critical in Industrial and Software Systems. (to the original material)

- 2FA App loaded with banking trojan infests 10K Victims via Google Play. (to the original material)

- Shipment-Delivery scams become the favored way to spread malware. (to the original material)

- White House, EPA expand cybersecurity initiative to vulnerable water sector. (to the original material)

- ‘It’s not a gimmick’: Arkose Labs announces "chief criminal officer". (to the original material)

- Solarwinds fixes code execution bug in enterprise helpdesk software. (to the original material)

- Apple pays out $100k bounty for Safari webcam hack that imperiled victims’ online accounts. (to the original material)

- This phishing attack uses an unusual trick to spread further. (to the original material)

- #NoPlaceToHide…for stupid ideas like Backdooring End-To-End Encryption and undermining privacy. (to the original material)


- What’s in for mobile operators this year? (to the original material)

- DDoS protection and mitigation market to reach $6.7 billion by 2026. (to the original material)

- Linux distros haunted by Polkit-geist for 12+ years: Bug grants root access to any user. (to the original material)

- WBTC to USDT Exchange in 2022: Latest developments, tendencies, predictions. (to the original material)

- PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034). (to the original material)

- DazzleSpy: macOS backdoor delivered through watering hole attacks. (to the original material)

- Open-source code: How to stay secure while moving fast. (to the original material)

- Product showcase: CIOs can optimize and secure hybrid IT environments with Runecast. (to the original material)

- Buy now, pay later fraud, romance and cryptocurrency schemes top the list of threats this year. (to the original material)

- How to achieve greater cyber resiliency. (to the original material)

- Apple fixes 2 zero-day security bugs, one exploited in the wild. (to the original material)

- "Dark Herring" billing malware swims onto 105M android devices. (to the original material)

- Linux bug in all major distros: "An attacker’s dream come true". (to the original material)

- New Year, New Threats: 4 tips to activate your best cyber-defense. (to the original material)

- TrickBot crashes security researchers’ browsers in latest upgrade. (to the original material)

- Cybercriminals love supply-chain chaos: Here’s how to protect your Inbox. (to the original material)

- Threat actors blanket Androids with Flubot, Teabot campaigns. (to the original material)

- Apple releases iOS and macOS updates to patch actively exploited 0-day vulnerability. (to the original material)

- Initial access broker (Prophet Spider) involved in Log4Shell attacks against VMware Horizon Servers. (to the original material)

- Webinar: How to see more, but respond less with Enhanced Threat Visibility. (to the original material)

- Linux version of LockBit ransomware targets VMware ESXi servers. (to the original material)

- Major Discord outage caused by API and database issues. (to the original material)

- Apple fixes new zero-day exploited to hack macOS, iOS devices. (to the original material)

- Chaes banking trojan hijacks Chrome with malicious extensions. (to the original material)

- White House wants US govt to use a Zero Trust security model. (to the original material)

- New FluBot and TeaBot campaigns target Android devices worldwide. (to the original material)

- German govt warns of APT27 hackers backdooring business networks. (to the original material)

- Let's Encrypt is revoking lots of SSL certificates in two days. (to the original material)

- Nobel Foundation site hit by DDoS attack on award day. (to the original material)

- QNAP warns of new DeadBolt ransomware encrypting NAS devices. (to the original material)

- Fantasy Premier League account hack surge prompts plans to introduce extra login checks for football fans. (to the original material)

- US healthcare company EyeMed reaches settlement following 2020 data breach. (to the original material)

- Android security tool APKLeaks patches critical vulnerability. (to the original material)

- Tor Project heads to Russian court to appeal against censorship. (to the original material)

- Best cybersecurity research paper revealed. (to the original material)

- How automation can mitigate the cybersecurity skills gap. (to the original material)

- EyeMed fined $600k over data breach. (to the original material)

- #DataPrivacyWeek: Online trackers can detect 80% of users' browsing history. (to the original material)

- #DataPrivacyWeek: Prioritize data protection to safeguard consumer privacy. (to the original material)

- "Hack One, Breach Many" is here to stay: How to secure your third-party risks. (to the original material)

- 2022 - Predictions for the Year Ahead. (to the original material)

- Experts reveals 29% surge in bugs used by ransomware actors. (to the original material)

- Government trials effort to make bug scanning easier. (to the original material)

- Home working drives 44% surge in insider threats. (to the original material)

- Admins struggle to keep users safe in a post-COVID world. (to the original material)

- Hackers continue to target zero-day vulnerabilities. (to the original material)

- Over three-quarters of container images have high risk vulnerabilities. (to the original material)

- Every major Linux distro has a PwnKit flaw that is easily exploited to gain root access. (to the original material)

- How poor security culture leads to insider risk. (to the original material)

- Cybercriminals using QR codes to steal financial info, FBI warns. (to the original material)

- Vulnerability Spotlight: WiFi-connected security camera could be manipulated to spy on communications, among other malicious actions. (to the original material)

- Every breath you take, every move you make: Do fitness trackers pose privacy risks? (to the original material)

- DeadBolt ransomware targeting QNAP NAS storage devices. (to the original material)

- Apache Kafka 3.1 opens up data streaming for analytics. (to the original material)

- More intel emerges on WhisperGate malware that hit Ukraine. (to the original material)

- Storage tech brief: Look out for PCIe gen 5 drives in 2022. (to the original material)

- New vulnerability rating framework aims to fill in CVSS gaps. (to the original material)

- PwnKit bug endangers Linux distributions worldwide. (to the original material)

- Kaspersky MSP growth plans are delivering. (to the original material)

- MPs to debate landmark IoT security law. (to the original material)

- Appetite rising for network as a service. (to the original material)

- Demands on Fujitsu to contribute to £1bn Horizon scandal compensation costs. (to the original material)

- IBM fourth-quarter results show hybrid refocus. (to the original material)

- Google debuts Topics, its latest third-party cookie replacement. (to the original material)

- IRS facial recognition move raises bias, privacy concerns. (to the original material)

- Dremio raises $160M for cloud data lake platform technology. (to the original material)

- Threat actors set to turn up the heat across cloud, email, networks and more in 2022. (to the original material)

- Gemini Annual Report 2021: Magecart thrives in the payment card fraud landscape. (to the original material)


- Canada's foreign affairs ministry hacked, some services down. (to the original material)

- The Ransomware Files, Episode 4: Maersk and NotPetya. (to the original material)

- EU launches bug bounty programs for five open source solutions. (to the original material)

- Beware of fake tax apps pushing malware. (to the original material)

- 53% of medical devices have a known critical vulnerability. (to the original material)

- Why organizations should consider adopting cloud governance as code. (to the original material)

- Strong security starts with the strengthening of the weakest link: passwords. (to the original material)

- AI to greatly enhance urban surveillance technologies. (to the original material)

- Healthcare fraud detection market to grow steadily by 2026. (to the original material)

- New DeadBolt ransomware targets QNAP devices, asks 50 BTC for master key. (to the original material)

- VMware: Patch Horizon servers against ongoing Log4j attacks! (to the original material)

- Linux system service bug gives root on all major distros, exploit released. (to the original material)

- TrickBot now crashes researchers' browsers to block malware analysis. (to the original material)

- UK govt releasing Nmap scripts to find unpatched vulnerabilities. (to the original material)

- New DazzleSpy malware targets macOS users in watering hole attack. (to the original material)

- Linux kernel bug can let hackers escape Kubernetes containers. (to the original material)

- Google Drive now warns you of suspicious phishing, malware docs. (to the original material)

- Segway store hacked to steal customers' credit cards. (to the original material)

- Russia arrests leader of “Infraud Organization” hacker group. (to the original material)

- Google Drive flags nearly empty files for "copyright infringement". (to the original material)

- 3 Common cloud misconfigurations to avoid. (to the original material)

- Vulnerability disclosures rise to meet federal requirements. (to the original material)

- LA launches Cyber Resilience Center. (to the original material)

- New Mexico files cybersecurity bills. (to the original material)

- Cyber-Attack on Global Affairs Canada. (to the original material)

- Why the assure scheme Is still getting off the ground in the aviation sector. (to the original material)

- #DataPrivacyWeek: Data Privacy vs. Visibility: The security consideration. (to the original material)

- UK Government announces new cyber strategy to protect public sector. (to the original material)

- #DataPrivacyWeek Interview: Overcoming privacy challenges in AI. (to the original material)

- Experts call for more open security culture after VW sacking. (to the original material)

- Cyber Essentials overhauled for new hybrid working era. (to the original material)

- Security Agencies continue to raise red flags against Log4Shell. (to the original material)

- MoonBounce: Third UEFI Bootkit in Town. (to the original material)

- Molerats APT Group targets the Middle East. (to the original material)

- 12-Year-Old Polkit flaw lets unprivileged Linux users gain root access. (to the original material)

- Hackers exploited MSHTML flaw to spy on Government and Defense Targets. (to the original material)

- Hackers infect macOS with new DazzleSpy backdoor in watering-hole attacks. (to the original material)

- TrickBot malware using new techniques to evade Web Injection attacks. (to the original material)

- UK government opens consultation on medic-style register for Brit infosec pros. (to the original material)

- Sophos: Log4Shell would have been a catastrophe without the Y2K-esque mobilisation of engineers. (to the original material)

- Current and future state of Identity Access Management (IAM). (to the original material)

- Top most dangerous types of malware attacks. (to the original material)

- Cost for Cyber Security Training. (to the original material)

- Combating the surge in retail theft and E-Commerce fraud with Open Source Intelligence. (to the original material)

- Delay in creating new Cybersecurity Board prompts concern. (to the original material)

- Application Security Company ArmorCode raises $8 million. (to the original material)

- Canada's Foreign Ministry targeted in cyberattack. (to the original material)

- Vulnerability Spotlight: Vulnerability in Apple iOS, iPad OS and MacOS could lead to disclosure of sensitive memory data. (to the original material)

- How do you know if your email has been hacked. (to the original material)

- Watering hole deploys new macOS malware, DazzleSpy, in Asia. (to the original material)

- US, NATO discuss Ukrainian cyber aid amid tensions. (to the original material)

- Drug Testing Lab Portal incident exposed data for 4 years. (to the original material)

- Log4j Updates: Flaw challenges global security leaders. (to the origina material)

- "Email security doesn't get the attention it deserves". (to the original material)

- How Do You Detect - and Stop - Bank Identity Number Attacks? (to the original material)

- Brand Narratives and Awareness in Cybersecurity. (to the original material)

- Segway website hacked and infected with payment card skimmer. (to the original material)

- Staff negligence is now a major reason for insider security incidents. (to the original material)

- Mirai splinter botnets dominate IoT attack scene. (to the original material)

- TianySpy malware uses smishing disguised as message from Telco. (to the original material)

- Cyberattacks on Squid Game Minecraft Tourney take down Andorra’s internet. (to the original material)

- Ozzy Osbourne NFTs used to bite off chunk of crypto coin. (to the original material)

- Google drops FLoC and introduces topics API to replace tracking cookies for Ads. (to the original material)

- PrinterLogic vendor addresses triple RCE threat against all connected endpoints. (to the original material)

- California public office admits Covid-19 healthcare data breach. (to the original material)

- Triple-digit threshold: Browser makers offer compatibility testing tools as version 100 approaches. (to the original material)

- Juniper announces routers, line card using new Trio 6 ASIC. (to the original material)

- Sophos: Log4Shell impact limited, threat remains. (to the original original)

- Nvidia Arm deal another step closer to - death? (to the original material)

- Bernalillo County ransomware attack still felt weeks later. (to the original material)

- IBM hybrid cloud strategy driving revenue growth. (to the original material)

- Cyber Essentials programme gets biggest update since launch. (to the original material)

- UK government launches internal cyber strategy. (to the original material)

- StayLinked flags IIoT channel opportunity. (to the original material)

- UK launches international data transfer council. (to the original material)

- Subpostmaster campaign group to meet government over unfair compensation settlement. (to the original material)

- Below the Surface: Cybersecurity trends for 2022. (to the original material)

- A chaotic tax season brings new cyberthreats. (to the original material)


- CISA publishes infographic on layering network security through segmentation. (to the original material)

- Vulnerability summary for the Week of January 17, 2022. (to the original material)

- A 2022 priority: Automated mobile application security testing. (to the original material)

- Fraud detection is great, but you also need prevention. (to the original material)

- COVID test related scam emails still highly popular among cybercriminals. (to the original material)

- Spike in brand abuse attacks, 3-D Secure transaction volume rising. (to the original material)

- What is challenging multicloud adoption? (to the original material)

- Digital transformation leaders reaping the fruits of their investments. (to the original material)

- IoT data management market to grow steadily by 2026. (to the original material)

- Researchers find way to bypass MFA of Box Accounts. (to the original material)

- White Rabbit may be FIN8 Group's New Pet. (to the original material)

- China-based Earth Lusca Group targeting multiple industries. (to the original material)

- Global renewable energy firms under cyberespionage attacks. (to the original material)

- New DDoS IRC bot spreads through Korean WebHard. (to the original material)

- Researchers break down WhisperGate wiper malware used in Ukraine website defacement. (to the original material)

- Microsoft: Now we're switching off Excel 4.0 macros by default. (to the original material)

- Investigating APT36 or Earth Karkaddan’s attack chain and malware arsenal. (to the original material)

- Analysis and impact of LockBit ransomware’s first Linux and VMware ESXi variant. (to the original material)

- China accused of hijacking Australia Prime Minister Scott Morrison's WeChat account. (to the original material)

- Hackers hijack smart contracts in cryptocurrency token "rug pull" exit scams. (to the original material)

- Attackers now actively targeting critical SonicWall RCE bug. (to the original material)

- Tor Project appeals Russian court's decision to block access to Tor. (to the original material)

- CWP (Control Web Panel) bugs allow code execution as root on Linux servers, patch now. (to the original material)

- Android malware BRATA wipes your device after stealing data. (to the original material)

- Hackers say they encrypted Belarusian Railway servers in protest. (to the original material)

- Ransomware gangs increase efforts to enlist insiders for attacks. (to the original material)

- Malicious PowerPoint files used to push remote access trojans. (to the original material)

- Dark Souls servers taken down to prevent hacks using critical bug. (to the original material)

- See No Evil, Hear No Evil: The Use of deepfakes in social engineering attacks. (to the original material)

- WordPress Supply Chain Attack - 93 Add-Ons infected for Months. (to the original material)

- API Security, Ransomware Top 2022 Threats. (to the original material)

- Predict 2022: Top Cybersecurity Threats for 2022. (to the original material)

- IRS to require new ID verification. (to the original material)

- SBA Announces $3m Cybersecurity Program. (to the original material)

- 3 Reasons why DDoS protection fails. (to the original material)

- Identity Theft will get worse. (to the original material)

- NSF (National Science Foundation) awards $29m to cybersecurity scholarships. (to the original material)

- Two in five IT Security Managers considering quitting their jobs. (to the original material)

- #DataPrivacyWeek: The best kept secrets about data privacy. (to the original material)

- #HowTo: Evaluate your cyber insurance. (to the original material)

- Interview: Leveraging the talents of older workers in cyber. (to the original material)

- US Data breaches surge 68% to all-time high. (to the original material)

- US adds 17 exploited bugs to "Must Patch" List. (to the original material)

- UK's Privacy Tsar mounts fierce defense of End-to-End Encryption. (to the original material)

- Linux Servers at risk of RCE due to critical CWP bugs. (to the original material)

- Unusual "Donald Trump" packer malware delivers RATs, infostealers. (to the original material)

- Dark Souls 3 servers shut down due to critical RCE bug. (to the original material)

- F5 fixes high-risk NGINX Controller vulnerability in January patch rollout. (to the original material)

- RCE bug chain patched in CentOS Web Panel. (to the original material)

- OpenSubtitles data breach: Users asked to re-secure accounts after plaintext password snafu. (to the original material)

- Chain of vulnerabilities led to RCE on Cisco Prime servers. (to the original material)

- New solution helps guarantee electronic documents. (to the original material)

- What the UK's revised security guidelines mean for business [Q&A]. (to the original material)

- Mobile Banking Trojan BRATA gains new, dangerous capabilities. (to the original material)

- Hackers using new malware packer DTPacker to avoid analysis, detection. (to the original material)

- ZTNAs address requirements VPNs cannot. Here's why. (to the original material)

- How I hacked my friend’s PayPal account. (to the original material)

- Alleged RCE Vulnerability in Dark Souls III under investigation. (to the original material)

- FBI warns of cybercriminals using QR codes to steal funds. (to the original material)

- Microsoft finds SolarWinds vulnerability amid Log4j search. (to the original material)

- NY fines vision benefits firm (EyeMed Vision Care LLC) $600,000 for 2020 breach. (to the original material)

- Tor Project battles Russian censorship through the courts. (to the original material)

- Everything you need to know about Web Application Firewalls. (to the original material)

- Russia makes more arrests, but cybercrime-harboring reputation hard to shake. (to the original material)

- Feds want bulk electric systems to monitor network security. (to the original material)

- RIPTA under fire: Why would a public transit authority have healthcare data? (to the original material)

- Cybersecurity: 11 steps to take as threat levels increase. (to the original material)

- Bombshell decision that use of Google Analytics in Austria violates Top EU Court’s ruling boosts GDPR impact again. (to the original material)

- Interview with Nick Terkay - Cobalt. (to the original material)


- Week in review: Finding stolen credentials on VirusTotal, BNPL attracting fraudsters. (to the original material)

- Introduction to automated penetration testing. (to the original material)

- Use these 6 user authentication types to secure networks. (to the original material)

- How to start implementing passwordless authentication today. (to the original material)

- FBI warns of malicious QR codes used to steal your money. (to the original material)

- Emotet now using unconventional IP address formats to evade detection. (to the original material)

- High-Severity Rust programming bug could lead to File, Directory Deletion. (to the original material)


- Experts find strategic similarities b/w NotPetya and WhisperGate attacks on Ukraine. (to the original material)

- Molerats hackers hiding new espionage attacks behind public cloud infrastructure. (to the original material)

- FSB (The Russian Federal Security Service) detains administrator of UniCC carding forum. (to the original material)

- CISA adds 17 vulnerabilities to list of bugs exploited in attacks. (to the original material)

- School District reports a 334% hike in cybersecurity insurance costs. (to the original material)

- Dutch cybersecurity agency warns of lingering Log4j risks. (to the original material)

- Apple preps fix for Safari's web-history-leaking IndexedDB privacy bug. (to the original material)

- Talos Incident Response year-in-review for 2021. (to the original material)

- Twitter reportedly fires Head of Security, CISO to leave. (to the original material)

- Vulnerabilities in Control Web Panel potentially expose Linux Servers to hack. (to the original material)


- CISA adds four known exploited vulnerabilities to Catalog. (to the original material)

- McAfee releases security update for McAfee Agent for Windows. (to the original material)

- Log4j vulnerability - update from the CSIRTs Network. (to the original material)

- New infosec products of the week: January 21, 2022. (to the original material)

- Stealthy firmware bootkit leveraged by APT in targeted attacks. (to the original material)

- Google Drive starts warning users about suspicious files. (to the original material)

- The importance of securing machine-to-machine and human-to-machine interaction. (to the original material)

- How do IT leaders plan to overcome remote work security challenges? (to the original material)

- Cybersecurity industry trends from 2021 bound to shape this year’s threat landscape. (to the original material)

- Exposed records exceeded 40 billion in 2021. (to the original material)

- What is opening EV (Electric Vehicle) charging stations to cyberattacks? (to the original material)

- Cybersecurity market to reach $346 billion by 2027. (to the original material)

- Biden signs authority for NSS to NSA: Think CISA for military, intel systems. (to the original material)

- Does your cyberinsurance policy cover cyberwar? (to the original material)

- U.S. Sanctions 4 Ukrainians for working with Russia to destabilize Ukraine. (to the original material)

- Crypto.com confirms breach, nearly $34 million in losses. (to the original material)

- Ukraine cyber attacks: A case of hacktivism? (to the original material)

- The Week in Ransomware - January 21st 2022 - Arrests, Wipers, and More. (to the original material)

- Phishing impersonates shipping giant Maersk to push STRRAT malware. (to the original material)

- Microsoft disables Excel 4.0 macros by default to block malware. (to the original material)

- Over 90 WordPress themes, plugins backdoored in supply chain attack. (to the original material)

- McAfee Agent bug lets hackers run code with Windows SYSTEM privileges. (to the original material)

- Homelife of Connecticut residents secretly recorded. (to the original material)

- Pennsylvania approves ransomware bill. (to the original material)

- The New Amateur Hackers: How professional hackers are enabling a new wave of novices. (to the original material)

- Memorial Health System confirms data breach. (to the original material)

- Tackling misconceptions of mobile-based authentication. (to the original material)

- (ISC)2 Appoints its first CISO. (to the original material)

- Two-Fifths of ransomware victims still paying up. (to the original material)

- #COVID19 phishing emails surge 500% on Omicron concerns. (to the original material)

- Merck Wins $1.4bn NotPetya payout from insurer. (to the original material)

- Researchers find similarities between NotPetya, attacks on Ukrainian government systems. (to the original material)

- A bug in McAfee Agent allows running code with Windows SYSTEM privileges. (to the original material)

- Disruptive attacks in Ukraine likely linked to escalating tensions. (to the original material)

- Will ransomware gangs see flow of cash throttled by Russia cryptocurrency restrictions? (to the original material)

- Ukraine campaign delivers defacement and wipers, in continued escalation. (to the original material)

- Threat Roundup for January 14 to January 21. (to the original material)

- Week in security with Tony Anscombe. (to the original material)

- Compliance, emerging technology will fuel financial tech funding in 2022. (to the original material)

- What’s it mean? Making sense of Twitter’s decision to oust "Mudge" Zatko and Rinki Sethi. (to the original material)

- Patient data stolen ahead of Memorial Health ransomware attack, EHR downtime. (to the original material)

- IRS plans for facial recognition draw scrutiny from privacy, cybersecurity advocates. (to the original material)

- HHS shares Log4j remediation guide, urges healthcare to assume compromise. (to the original material)

- European Commission launches new open source software bug bounty program. (to the original material)

- Was COMELEC hacked? Philippines Commission on Elections casts doubt on data breach claims. (to the original material)

- Open debug mode in Cisco mobile networking software created critical security hole. (to the original material)

- BitLocker encryption: Clear text key storage prompts security debate online. (to the original material)

- US Federal Reserve issues report on Digital Dollar. (to the original material)

- Federal Authorities, patient safety experts warn of risks. (to the original material)

- EU Plans to build its own DNS infrastructure. (to the original material)

- 3 Weeks, 6 bugs: Experts analyze, advise on WordPress flaws. (to the original material)

- ISMG Editors: Will ransomware kill cyber insurance? (to the original material)

- From the Trenches: Remediating widespread Apache Log4j flaw. (to the original material)

- Hackers planted secret backdoor in dozens of WordPress plugins and themes. (to the original material)

- Critical bugs in control web panel expose Linux Servers to RCE attacks. (to the original material)

- Chinese hackers spotted using new UEFI Firmware implant in targeted attacks. (to the original material)

- Chinese APT deploys MoonBounce implant in UEFI firmware. (to the original material)

- Amazon fake crypto token investment scam steals Bitcoin from victims. (to the original material)

- The Internet’s most tempting targets. (to the original material)

- Spyware blitzes compromise, cannibalize ICS Networks. (to the original material)

- Arm rages against the insecure chip machine with new Morello architecture. (to the original material)

- Emotet spam abuses unconventional IP address formats to spread malware. (to the original material)

- This Week in Security News - January 21, 2022. (to the original material)

- Codex Exposed: Task automation and response consistency. (to the original material)

- Crime Shop sells hacked logins to other crime shops. (to the original material)


- F5 releases January 2022 Quarterly Security Notification. (to the original material)

- Drupal releases security updates. (to the original material)

- Google releases security updates for Chrome. (to the original material)

- Cisco releases security updates for multiple products. (to the original material)

- CISA releases Final Version of Guidance: IPv6 considerations for TIC 3.0. (to the original material)

- Cybersecurity news of the week (20.01.2022). (to the original material)

- Beware of Digital ID attacks: your face can be spoofed! (to the original material)

- New SolarWinds Serv-U vulnerability exploited in Log4j-related attacks. (to the original material)

- Endpoint malware and ransomware detections hit all-time high. (to the original material)

- Cyber risks top worldwide business concerns in 2022. (to the original material)

- When protecting and managing digital identities, orchestration and automation are critical. (to the original material)

- The evolution of security analytics. (to the original material)

- Software supply chain attacks jumped over 300% in 2021. (to the original material)

- Multicloud environment complexities putting digital transformation at risk. (to the original material)

- Cryptocurrency market to reach $2.73 billion in 2025. (to the original material)

- New MoonBounce UEFI malware used by APT41 in targeted attacks. (to the original material)

- 483 Crypto.com accounts compromised in $34 million hack. (to the original material)

- "Anomalous" spyware stealing credentials in industrial firms. (to the original material)

- FBI links Diavol ransomware to the TrickBot cybercrime group. (to the original material)

- US sanctions former Ukrainian official for helping Russian cyberspies. (to the original material)

- ProtonMail introduces a new email tracker blocking system. (to the original material)

- WordPress plugin (WP HTML Mail) flaw puts users of 20,000 sites at phishing risk. (to the original material)

- Indonesia's central bank confirms ransomware attack, Conti leaks data. (to the original material)

- Biden signs memo to boost US national security systems’ defenses. (to the original material)

- Cisco bug gives remote attackers root privileges via debug mode. (to the original material)

- Threat Source Newsletter (Jan. 20, 2022). (to the original material)

- How to know if your email has been hacked. (to the original material)

- Threat Spotlight: COVID-19 test-related email scams. (to the original material)

- Focus on open source security software increases. (to the original material)

- AccessPress Themes hit with targeted supply chain attack. (to the original material)

- 65 percent of organizations still use shared logins for infrastructure access. (to the original material)

- New targeted attack strategies used against industrial companies. (to the original material)

- 20 Years of SIEM: Celebrating my dubious anniversary. (to the original material)

- Teachable moment: An insider threat on your team. (to the original material)

- Biden signs Memo to boost National Cybersecurity. (to the original material)

- Third firmware bootkit discovered. (to the original material)

- Applications open for next NCSC for startups cohort. (to the original material)

- Twitter mentions more effective than CVSS at reducing exploitability. (to the original material)

- Eleven arrested in bust of prolific Nigerian BEC gang. (to the original material)

- Red Cross: Supply chain data breach hit 500K people. (to the original material)

- Cisco issues patch for critical RCE vulnerability in RCM for StarOS software. (to the original material)

- Google details two zero-day bugs reported in Zoom Clients and MMR Servers. (to the original material)

- Israeli officials deny claims of improper spyware use. (to the original material)

- UK issues fresh proposals to tackle cyberthreats. (to the original material)

- HHS HC3: Healthcare sector remains at risk for Log4j attacks. (to the original material)

- Biden memo orders cybersecurity improvements. (to the original material)

- How medical device "Ingredient Labels" could bolster security. (to the original material)

- Use FITARA law to measure government cybersecurity goals, experts say. (to the original material)

- IV pumps riskiest healthcare IoT, while 50% of medical devices hold critical flaws. (to the original material)

- Spiking fraud will force financial industry to rethink authentication in 2022. (to the original material)

- Critical Cisco StarOS bug grants root access via debug mode. (to the original material)

- Microsoft: Attackers tried to login to SolarWinds Serv-U via Log4j bug. (to the original material)

- Defending Users’ NAS devices from evolving threats. (to the original material)

- Cybersecurity for Industrial Control Systems: Part 2. (to the original material)


- Zoho releases security advisory for ManageEngine Desktop Central and Desktop Central MSP. (to the original material)

- Phishers go after business email credentials by impersonating U.S. DoL (Department of Labor). (to the original material)

- Is cloud the solution to optimized data privacy? (to the original material)

- Product showcase: Adaptive Shield SaaS Security Posture Management. (to the original material)

- Cultivating a security-first mindset for software developers. (to the original material)

- What are the barriers to moving legacy data to the cloud? (to the original material)

- Supply chain disruptions rose in 2021. (to the original material)

- Trends that will shape the security industry in 2022. (to the original material)

- Network security sandbox market to reach $43 billion by 2027. (to the original material)

- Red Cross cyberattack exposes data of 515,000 people seeking missing family. (to the original material)

- Microsoft: SolarWinds fixes Serv-U bug exploited for Log4j attacks. (to the original material)

- Marketing giant RRD confirms data theft in Conti ransomware attack. (to the original material)

- CISA urges US orgs to prepare for data-wiping cyberattacks. (to the original material)

- UK’s Cyber Security Center publishes new guidance to fight smishing. (to the original material)

- New BHUNT malware targets your crypto wallets and passwords. (to the original material)

- Interpol arrests 11 BEC gang members linked to 50,000 targets. (to the original material)

- Office 365 phishing attack impersonates the US Department of Labor. (to the original material)

- Multi-Cloud Security in 2022. (to the original material)

- WEF Report: Cyber Risks Pose Global Threats. (to the original material)

- Man charged with smuggling Tech exports to Iran. (to the original material)

- Thousands of US Public Sector ransomware victims in 2021. (to the original material)

- Government to regulate crypto advertising in new crack down. (to the original material)

- Endpoint malware and ransomware reach new highs. (to the original material)

- FIN8 hackers spotted using new 'White Rabbit' ransomware in recent attacks. (to the original material)

- Donot Team APT will strike gov't, military targets for years - until they succeed. (to the original material)

- JPMorgan Chase invests $12 billion in security updates. (to the original material)

- Indian fashion retailer data leaked on darknet marketplace. (to the original material)

- Nigerian police arrest members of SilverTerrier BEC gang. (to the original material)

- A top Ukrainian security official on defending the nation against cyber attacks. (to the original material)

- Cloned Dept. of Labor site hawks fake government contracts. (to the original material)

- Beijing Olympics app flaws allow Man-in-the-Middle attacks. (to the original material)

- Security vulnerabilities in Umbraco CMS could lead to account takeover. (to the original material)

- ThePhish: "The most complete" non-commercial phishing email analysis tool. (to the original material)

- Executive predictions for 2022: CEO Hatem Naguib. (to the original material)

- What should you do if your WordPress site was hacked? (to the original material)

- Data breaches expose over 40 billion records in 2021. (to the original material)

- Researchers hack Olympic Games App. (to the original material)

- Ransomware attack on Moncler. (to the original material)

- Why Zero Trust is the best defence for our digital food supply chain. (to the original material)

- DoNot hacking team targeting Government and Military entities in South Asia. (to the original material)

- A Trip to the Dark Site — Leak Sites Analyzed. (to the original material)

- New BHUNT Password Stealer Malware targeting cryptocurrency wallets. (to the original material)

- Microsoft: Hackers exploiting new SolarWinds Serv-U bug related to Log4j attacks. (to the original material)

- Russian hackers heavily using malicious traffic direction system to distribute malware. (to the original material)

- Cyber Threat Protection - It all starts with visibility. (to the original material)

- 2 Key cybersecurity lawmakers will not seek reelection. (to the original material)

- Log4Shell Update: VMware Horizon targeted. (to the original material)

- OpenSubtitles data breach affected 6.7 million users. (to the original material)

- European authorities seize VPN Service tied to ransomware. (to the original material)


- Malware identified in attacks against organizations in Ukraine. (to the original material)

- European Commission information session on the first call for proposals under the Connecting Europe Facility digital component (CEF-Digital). (to the original material)

- CISA Adds 13 known exploited vulnerabilities to catalog. (to the original material)

- Oracle releases January 2022 Critical Patch Update. (to the original material)

- CISA urges organizations to implement immediate cybersecurity measures to protect against potential threats. (to the original material)

- VirusTotal Hacking: Finding stolen credentials hosted on VirusTotal. (to the original material)

- Phishers’ favorite brands in Q4 2021. (to the original material)

- AI (Artificial Intelligence) and ML (Machine Learning) implementation in cybersecurity programs pushes for a change in people’s mindset. (to the original material)

- PCI SSC (PCI Security Standards Council) updates card security standards to secure the card production process. (to the original material)

- How buy now, pay Later is being targeted by fraudsters. (to the original material)

- Governments struggle to deliver secure online citizen services. (to the original material)

- The security of devices held by public sector employees. (to the original material)

- Zero-trust security market to reach $64.4B by 2027. (to the original material)

- Don’t let the great resignation become an insider threat. (to the original material)

- Telegram is a hotspot for the sale of stolen financial accounts. (to the original material)

- Fashion giant Moncler confirms data breach after ransomware attack. (to the original material)

- New White Rabbit ransomware linked to FIN8 hacking group. (to the original material)

- Beijing 2022 Winter Olympics app bursting with privacy risks. (to the original material)

- Europol shuts down VPN service used by ransomware groups. (to the original material)

- Crypto.com: Fortune Favors the Hacker - $16M "Stolen". (to the original material)

- Cybersecurity Outlook for 2022: Emerging Threats. (to the original material)

- Italian denies literary Wire fraud. (to the original material)

- Less than a fifth of cyber leaders feel confident their organization is cyber-resilient. (to the original material)

- The future of Cloud-Native in a Brave New World. (to the original material)

- Joint law enforcement action takes down VPN service. (to the original material)

- High risk vulnerabilities in fintech soar over the past year. (to the original material)

- Enterprise SASE needs a radical approach to be effective. (to the original material)

- Guess which government doesn't want you to use end-to-end encryption. (to the original material)

- DoNot Go! Do not respawn! (to the original material)

- DDoS IRC Bot malware spreading through Korean WebHard Platforms. (to the original material)

- Ukraine: Recent cyber attacks part of wider plot to sabotage critical infrastructure. (to the original material)

- Researchers bypass SMS-based Multi-Factor Authentication protecting box accounts. (to the original material)

- Europol shuts down VPNLab, Cybercriminals' favourite VPN service. (to the original material)

- Don't use public Wi-Fi without DNS filtering. (to the original material)

- Earth Lusca hackers aimed at high-value targets in government and private sectors. (to the original material)

- Washington City loses $280,309 to successful phishing scam. (to the original material)

- Ransomware isn’t always about gangs making money. Sometimes it’s about nations manufacturing mayhem. (to the original material)

- International effort takes down VPN service, VPNLab, used for criminal activity. (to the original material)

- QR codes can eat your lunch, FBI warns. (to the original material)

- ‎Cyberattacks on Ukrainian websites come into clearer focus as Russia tensions escalate‎. (to the original material)

- Cyber brain drain from Congress continues as Langevin, Katko announce departures. (to the original material)

- Healthcare sector struggles to address Log4j vulnerability without "breaking" critical applications. (to the original material)

- All eyes on Ukraine as Microsoft details new destructive wiper malware. (to the original material)

- Threat landscape drives US companies to shift to more proactive security model. (to the original material)

- 10 nations coordinate shutdown of ransomware VPN service. (to the original material)

- Privacy fines: GDPR sanctions in 2021 exceeded $1 billion. (to the original material)

- NSO Group spyware reportedly used by Israeli Police Force. (to the original material)

- New Chinese threat group deals in espionage and theft. (to the original material)

- EU's Cyber Rapid Response Team on standby for Ukraine. (to the original material)

- How "The Great Resignation" is affecting cybersecurity. (to the original material)

- Researchers discover "extremely easy" 2FA bypass in Box cloud management software. (to the original material)

- Chrome to bolster CSRF protections with CORS preflight checks on private network requests. (to the original material)

- SSRF vulnerability in VMWare authentication software could allow access to user data. (to the original material)

- VPNLab takedown: Authorities dismantle secure communication tool favored by cybercriminals. (to the original material)

- Bosses think that security is taken care of: CISOs aren't so sure. (to the original material)


- Vulnerability Summary for the Week of January 10, 2022. (to the original material)

- Flubot - A malware for Android that steals sensitive information is propagated by SMS to Romanian users. (to the original material)

- Ukraine: Wiper malware masquerading as ransomware hits government organizations. (to the original material)

- AI to bring massive benefits, but also cause great concern. (to the original material)

- IR (Incident Response) and SimEx (Simulated Exercises): Can and should they be standardized? (to the original material)

- SecOps teams are understaffed and overworked. (to the original material)

- Why is intergenerational collaboration critical in advancing zero trust security progress? (to the original material)

- The CISO’s guide to evaluating third-party security platforms. (to the original material)

- Many users don’t know how to protect their broadband Wi-Fi routers. (to the original material)

- Mobile device management market to reach $20.4 billion by 2026. (to the original material)

- Campaign uses public cloud to spread RAT payloads. (to the original material)

- Fhkf virus (ransomware) remove & decrypt .fhkf files. (to the original material)

- Dark Web's largest marketplace for stolen credit cards is shutting down. (to the original material)

- A structured response to the Log4j vulnerability. (to the original material)

- Microsoft: Edge will mitigate "unforeseen active" zero day bugs. (to the original material)

- Firefox Relay gets added to disposable email blocklist, angers users. (to the original material)

- Zoho plugs another critical security hole in Desktop Central. (to the original material)

- DHL dethrones Microsoft as most imitated brand in phishing attacks. (to the original material)

- Nintendo warns of spoofed sites pushing fake Switch discounts. (to the original material)

- Cyber espionage campaign targets renewable energy companies. (to the original material)

- Safari bug leaks your Google account info, browsing history. (to the original material)

- "Russian" Wiper Malware: "Prelude to war" in Ukraine. (to the original material)

- Using Zero-Trust to secure dissolving network boundaries. (to the original material)

- Linux Foundation, Red Hat join Supply Chain Security Summit. (to the original material)

- Smart City development Is pushing video surveillance to the cloud. (to the original material)

- EHR vendor faces legal action over data breach. (to the original material)

- Nova Scotia seeks to improve Cyber-Bullying Law. (to the original material)

- Accellion reaches $8.1m data breach settlement. (to the original material)

- Tackling the cyber skills shortfall: A multipronged approach. (to the original material)

- Mitigating cloud security's greatest risk: Exposure. (to the original material)

- #HowTo: Quickly evaluate a SaaS vendor’s cloud security. (to the original material)

- Former Inspector General pleads guilty to software theft. (to the original material)

- Social media in the workplace: Cybersecurity dos and don’t for employees. (to the original material)

- Celebrate the Month of "Digital Cleaning" by following these six simple steps. (to the original material)

- Understanding Website SQL Injections. (to the original material)

- Interview with Shrishail Rana – Tweaking technologies. (to the original material)


- Microsoft warns of destructive malware targeting Ukrainian Organizations. (to the original material)

- Week in review: 2022 cloud security trends, Microsoft fixes wormable RCE. (to the original material)

- eNom data center migration mistakenly knocks sites offline. (to the original material)

- Microsoft: Fake ransomware targets Ukraine in data-wiping attacks. (to the original material)

- A new wave of Qlocker ransomware attacks targets QNAP NAS devices. (to the original material)

- High-Severity vulnerability in 3 WordPress plugins affected 84,000 websites. (to the original material)

- Ukrainian Government officially accuses Russia of recent cyberattacks. (to the original material)

- New unpatched Apple Safari Browser bug allows cross-site user tracking. (to the original material)

- A new destructive malware targeting Ukrainian Government and business entities. (to the original material)


- npm dependency is breaking some React apps today — here's the fix. (to the original material)

- Russia charges 8 suspected REvil ransomware gang members. (to the original material)

- Qlocker ransomware returns to target QNAP NAS devices worldwide. (to the original material)

- Linux malware sees 35% growth during 2021. (to the original material)

- Considering a move to Zero Trust security? Keep these identity security practices and resources in mind. (to the original material)

- Good news for GDPR enforcement against cookie walls, but also a dangerous legal challenge from WhatsApp. (to the original material)


- Ivanti updates Log4j advisory with security updates for multiple products. (to the original material)

- New infosec products of the week: January 14, 2022. (to the original material)

- How to improve your IR (Incident Response) tabletop exercises and why you really should? (to the original material)

- The future of security protocols for remote work. (to the original material)

- Manufacturers are starting to realize the importance of OT security. (to the original material)

- In 2022, AI-based full-suite security is needed. (to the original material)

- MFA (Multi-Factor Authentication) market to reach $21.3 billion by 2027. (to the original material)

- The Week in Ransomware - January 14th 2022 - Russia finally takes action. (to the original material)

- Goodwill discloses data breach on its ShopGoodwill platform. (to the original material)

- Former DHS (Department of Homeland Security) official charged with stealing govt employees' PII (Personal Identifying Information). (to the original material)

- White House reminds tech giants open source is a national security issue. (to the original material)

- Researchers develop CAPTCHA solver to aid dark web research. (to the original material)

- Defense contractor Hensoldt confirms Lorenz ransomware attack. (to the original material)

- New Intel chips won't play Blu-ray disks due to SGX deprecation. (to the original material)

- Multiple Ukrainian government websites hacked and defaced. (to the original material)

- Russia arrests REvil ransomware gang members, seize $6.6 million. (to the original material)

- Best Practices for Improving Cloud Encryption. (to the original material)

- SEC, FTC Issue Warning on Log4j Vulnerabilities. (to the original material)

- 1/6/21 Insurrection - What Did the Social Networks Know? (to the original material)

- "Massive" Cyberattack on Ukraine Cripples Gov’t Websites. (to the original material)

- Russia stops REvil. (to the original material)

- Flaw found in Biometric ID Devices. (to the original material)

- Measuring cybersecurity effectiveness is the only way to know if you are protected. (to the original material)

- Why is data destruction the best way to impede data breach risks? (to the original material)

- Your Multi-Factor Authentication technology is already compromised – Here's how. (to the original material)

- Ukrainian Government websites forced offline in "massive" cyber-attack. (to the original material)

- North Korean hackers stole $400m in cryptocurrency last year. (to the original material)

- AWS patches glue bug that put customer data at risk. (to the original material)

- Ukrainian cops bust suspected $1m cybercrime ring. (to the original material)

- Tech Giants to team-up on open source security after White House meet. (to the original material)

- Threat Roundup for January 7 to January 14. (to the original material)

- Talos Takes Ep. #82: Log4j followed us in 2022. (to the original material)

- Week in security with Tony Anscombe. (to the original material)

- How to Stop & Prevent DDoS Attacks. (to the original material)

- Instant Messaging Apps: How private are they & what alternatives are there? (to the original material)

- Interview with Anand Naik – Sequretek. (to the original material)


- Cybersecurity news of the week (13.01.2022). (to the original material)

- How to achieve the interoperability of EU Risk Management Frameworks. (to the original material)

- Juniper Networks releases security updates for multiple products. (to the original material)

- Citrix releases security updates for Hypervisor. (to the original material)

- Apple releases security updates for iOS and iPadOS. (to the original material)

- Cisco releases security updates for multiple products. (to the original material)

- Phishers are targeting Office 365 users by exploiting Adobe Cloud (to the original material)

- Delivering vulnerable signed kernel drivers remains popular among attackers. (to the original material)

- When it comes to banking security, there’s no silver bullet. (to the original material)

- The rising threat of cyber criminals targeting cloud infrastructure in 2022. (to the original material)

- The public sector is more concerned about external than internal threats. (to the original material)

- What makes edge computing successful? (to the original material)

- Consumer IAM (Identity and Access Management) market to reach $17.6 billion by 2026. (to the original material)

- Android users can now disable 2G to block Stingray attacks. (to the original material)

- FCC wants new data breach reporting rules for telecom carriers. (to the original material)

- BlueNoroff hackers steal crypto using fake MetaMask extension. (to the original material)

- AWS fixes security flaws allowing access to AWS customer data. (to the original material)

- Microsoft Defender weakness lets hackers bypass malware detection. (to the original material)

- Windows "RemotePotato0" zero-day gets an unofficial patch. (to the original material)

- Carding site UniCC retires after generating $358 million in sales. (to the original material)

- Ukranian police arrests ransomware gang that hit over 50 firms. (to the original material)

- FBI Issues Warning on FIN7 USB Stick Exploit. (to the original material)

- Why You Need Pentesting-as-a-Service (PtaaS). (to the original material)

- Machine Learning For Contested Antivirus Decisions | Avast. (to the original material)

- Analytics Are Essential for Effective Database Security. (to the original material)

- Vice Principal charged with cyber-stalking. (to the original material)

- Pennsylvania welcomes new cybersecurity center. (to the original material)

- FCC proposes stricter data breach reporting requirements. (to the original material)

- New "undetected" backdoor runs across three OS platforms. (to the original material)

- US: MuddyWater is Iranian state-backed group. (to the original material)

- Report identifies weaknesses in online banking security. (to the original material)

- Threat Source Newsletter (Jan. 13, 2022). (to the original material)

- Beers with Talos, Ep. #114: And then there were two... (to the original material)

- Cryptocurrency scams: What you need to know about them and how to protect yourself. (to the original material)

- Making loyalty pay: How to keep your loyalty rewards safe from scammers. (to the original material)


- The National Directorate of Cyber Security and ISACA Romania launch the Practical Guide for Operators of Essential Services (OSE). (to the original material)

- CNMF identifies and discloses malware used by Iranian APT MuddyWater. (to the original material)

- A new multi-platform backdoor is leveraged by an advanced threat actor. (to the original material)

- Ransomware, supply chain, and deepfakes: The top threats the finance industry needs to prepare for. (to the original material)

- How safe are cloud applications? (to the original material)

- SMEs still an easy target for cybercriminals. (to the original material)

- Audit your Active Directory with a free, read-only scan from Specops. (to the original material)

- 2022 promises to be a challenging year for cybersecurity professionals. (to the original material)

- Technology-related employment still going strong, unemployment rate for IT jobs dropping to 2%. (to the original material)

- Digital asset management market to reach $10 billion in 2026. (to the original material)

- Attackers more successful at delivering malware payloads. (to the original material)

- Why 2022 should be a year of cybersecurity optimism. (to the original material)

- Zero-Trust for Health Care in the age of ransomware. (to the original material)

- Oxeye Tool Can Counter Log4j Obfuscation Attacks. (to the original material)

- CISA, NSA warn of Russian attacks on critical infrastructure. (to the original material)

- Left of SIEM? Right of SIEM? Get It Right! (to the original material)

- Researchers says flaw allows remote access to Teslas. (to the original material)

- Apple fixes doorLock bug that can disable iPhones and iPads. (to the original material)

- US links MuddyWater hacking group to Iranian intelligence agency. (to the original material)

- UK jails man for spying on teenagers, stealing photos using RATs (Remote Access Trojans). (to the original material)

- Magniber ransomware using signed APPX files to infect systems. (to the original material)

- TellYouThePass ransomware returns as a cross-platform Golang threat. (to the original material)

- OceanLotus hackers turn to web archive files to deploy backdoors. (to the original material)

- EA: 50 high-profile FIFA 22 accounts taken over by phishing actors. (to the original material)

- Hackers take over diplomat's email, target Russian deputy minister (Ministry of Foreign Affairs). (to the original material)

- Clinical Review vendor reports data breach. (to the original material)

- Teen makes Tesla hacking claim. (to the original material)

- Phishers take over FIFA 22 accounts. (to the original material)

- European Union to launch supply chain attack simulation. (to the original material)

- UK launches initiative to develop global AI standards. (to the original material)

- Two years for man who used RATs to spy on women and children. (to the original material)

- Microsoft Starts 2022 with 97 CVEs in January Patch Tuesday. (to the original material)

- Europol ordered to delete vast trove of personal information. (to the original material)

- Nanocore, Netwire and AsyncRAT spreading campaign uses public cloud infrastructure. (to the original material)

- The People Behind Us – Website Security Champions 2021. (to the original material)

- Interview with Reinard Mortlock – Livex. (to the original material)

11.01.2022 - News from Cyber Security.

- CISA, FBI, and NSA release cybersecurity advisory on Russian cyber threats to U.S. critical infrastructure. (to the original material)

- Samba releases security update. (to the original material)

- Mozilla releases security updates for Firefox, Firefox ESR, and Thunderbird. (to the original material)

- Microsoft releases January 2022 Security Updates. (to the original material)

- SAP releases January 2022 Security Updates. (to the original material)

- Citrix releases security update for Workspace App for Linux. (to the original material)

- Adobe releases security updates for multiple products. (to the original material)

- Microsoft fixes wormable RCE in Windows Server and Windows (CVE-2022-21907). (to the original material)

- Small, minority-led banks and credit unions face greater cyber risk. (to the original material)

- Data breaches reached another all-time high in 2021. (to the original material)

- New Zero Trust solution helps guard IT infrastructure. (to the original material)

- Cybersecurity budgets set to increase in the next year. (to the original material)

- Microsoft reveals "powerdir" macOS vulnerability that allows unauthorized user data access. (to the original material)

- Data security in the age of insider threats: A primer. (to the original material)

- Analyst guide: Encryption solutions buyers checklist. (to the original material)

- How the pandemic fueled enterprise digital transformation. (to the original material)

- Small businesses are most vulnerable to growing cybersecurity threats. (to the original material)

- Video surveillance systems market to grow steadily by 2026. (to the original material)

- Microsoft January 2022 Patch Tuesday fixes 6 zero-days, 97 flaws. (to the original material)

- New RedLine malware version spread as fake Omicron stat counter. (to the original material)

- US govt warns of Russian hackers targeting critical infrastructure. (to the original material)

- New SysJocker backdoor targets Windows, macOS, and Linux. (to the original material)

- KCodes NetUSB exposes millions of routers to RCE attacks. (to the original material)

- Night Sky ransomware uses Log4j bug to hack VMware Horizon servers. (to the original material)

- Cybersecurity in 2022: Addressing insider threats. (to the original material)

- This is the year to create a cybersecurity culture. (to the original material)

- Defence against the dark arts: Learnings from the magical world to boost your AppSec. (to the original material)

- World Economic Forum: Cybersecurity an increasing global threat. (to the original material)

- Banks still struggling to spot the signs of human trafficking. (to the original material)

- Corporate cyber-attacks spike 50% in 2021. (to the original material)

- Romance scammers stole £92 million from victims last year. (to the original material)

- State hackers use new PowerShell backdoor in Log4j attacks. (to the original material)

- Microsoft: New critical Windows HTTP vulnerability is wormable. (to the original material)

- Firefox Focus now blocks cross-site tracking on Android devices. (to the original material)

- CISA alerts federal agencies of ancient bugs still being exploited. (to the original material)

- Microsoft fixes critical Office bug, delays macOS security updates. (to the original material)

- Hackers hit healthcare data management company. (to the original material)

- US issues alert over russian hackers. (to the original material)

- Microsoft Patch Tuesday for Jan. 2022 - Snort rules and prominent vulnerabilities. (to the original material)

- Vulnerability Spotlight: Two vulnerabilities in Adobe Acrobat DC could lead to arbitrary code execution. (to the original material)

- Vulnerability Spotlight: Heap buffer overflow condition in Google Chrome could lead to code execution. (to the original material)

- Signed kernel drivers – Unguarded gateway to Windows’ core. (to the original material)

- 2021 was a terrible year for cybersecurity. Without action, 2022 could be even worse. (to the original material)

10.01.2022 - News from Cyber Security.

- Vulnerability summary for the Week of January 3, 2022. (to the original material)

- CISA adds 15 known exploited vulnerabilities to catalog. (to the original material)

- WordPress 5.8.3. security update fixes SQL injection, XSS flaws. (to the original material)

- Endpoint security products failing against targeted attacks. (to the original material)

- Finding & Fixing Google Blocklist warnings. (to the original material)

- CISA sees low level of Log4j exploitation against agencies and critical infrastructure. (to the original material)

- Who's to blame for the Kronos payroll disruptions, post cyberattack? (to the original material)

- Scrap the operating system in the name of infosec? MIT researchers want you to try it out. (to the original material)

- The blame game: EU criticized for "fragmented and slow" approach to cyber-attack attribution. (to the original material)

- City of Grass Valley, California, suffers data breach - employee and citizen information exposed. (to the original material)

- Report: DDoS attacks increasing year on year as cybercriminals demand extortionate payouts. (to the original material)

- URL parsing bugs allow DoS, RCE, spoofing and more. (to the original material)

- Cyber-spike: Orgs suffer 925 attacks per week, an all-time high. (to the original material)

- Uncovering and defending systems against attacks with layers of remote control. (to the original material)

- Ransomware tracker: The latest figures (December 2021). (to the original material)

- Mainframe DevOps: What modernization means. (to the original material)

- Log4j updates: Flaw challenges global security leaders. (to the original material)

- Ransomware's threat to the mainframe. (to the original material)

- HHS warns healthcare sector of Pysa ransomware threats. (to the original material)

- CISA: Federal response to Log4j has been "Exceptional". (to the original material)

- QNAP tells users take immediate action to stop ransomware. (to the original material)

- How China's algorithm regulation affects businesses. (to the original material)

- Criminaysis: Cryptocurrency crime reaches all-time high. (to the original material)

- VMware ESXi 7 users vulnerable to hypervisor takeover bug. (to the original material)

- Vulnerability Spotlight: Buffer overflow vulnerability in AnyCubic Chitubox plugin. (to the original material)

- Europol ordered to delete data not tied to investigations. (to the original material)

- Europol ordered to erase data on those not linked to crime. (to the original material)

- Linux Mint 20.3 released promising security updates until 2025. (to the original material)

- Microsoft: powerdir bug gives access to protected macOS user data. (to the original material)

- Oops: Cyberspies infect themselves with their own malware. (to the original material)

- Linux version of AvosLocker ransomware targets VMware ESXi servers. (to the original material)

- Extortion DDoS attacks grow stronger and more common. (to the original material)

- FinalSite: No school data stolen in ransomware attack behind sire outages. (to the original material)

- Unified communications market size to reach $344.84 billion by 2028. (to the original material)

- 6 cloud security trends to watch for 2022. (to the original material)

- On-premises cloud: The worst of both worlds? (to the original material)

- Eight resolutions to help navigate the new hybrid office model (to the original material)

- What to expect in 2022 privacy wise? (to the original material)

- Detect and identify IoT malware by analyzing electromagnetic signals. (to the original material)

- Securing onboarding and offboarding in the cloud. (to the original material)

- Abcbot botnet linked to operators of Xanthe cryptomining malware. (to the original material)

- Forensics expert kept murder snaps on PC. (to the original material)

- Connecticut nerds report CSAM. (to the original material)

- Cyber-Thieves raid Grass Valley. (to the original material)

- Why politically motivated cyber-attacks are a threat to democracy. (to the original material)

- Over half of SMEs have experienced a cybersecurity breach. (to the original material)

- Howto: Automate your security processes. (to the original material)

- US issues warning over commercial spyware. (to the original material)

- FlexBooker reveals major customer data breach. (to the original material)

- Here comes the Digital Markets Act, important new legislation from the EU boosting privacy and interoperability. (to the original material)

09.01.2022 - News from Cyber Security.

- Dev corrupts NPM libs "colors" and "faker" breaking thousands of apps. (to the original material)

- BADNEWS! Patchwork APT hackers score own goal in recent malware attacks. (to the original material)

08.01.2022 - News from Cyber Security.

- Protecting supply chains from highly contagious attacks. (to the original material)

- Troianized dnSpy app drops malware cocktail on researchers, devs. (to the original material)

- Rapid windows title changes cause "white screen of death". (to the original material)

- Vgkf virus ransomware [.vgkf files] - Removal and decrypt guide. (to the original material)

07.01.2022 - News from Cyber Security.

- This Week in security news - January 7, 2022. (to the original material)

- The Week in ransomware - January 7th 2022 - Watch out for USB drives. (to the original material)

- SonicWall: Y2k22 bug hits email security, firewall products. (to the original material)

- FBI: Hackers use BadUSB to target defense firms with ransomware. (to the original material)

- Flubot malware now targets Europe posing as Flash Player app. (to the original material)

- US counterintelligence shares tips to block spyware attacks. (to the original material)

- QNAP warns of ransomware targeting Internet-exposed NAS devices. (to the original material)

- NHS warns of hackers exploiting Log4Shell in VMware Horizon. (to the original material)

- Cerberus Sentinel acquires true digital security. (to the original material)

- Monsanto employees stole trade secret. (to the original material)

- Why holistic ecosystems will be central to future cybersecurity. (to the original material)

- Election fraud firm to shut down after claims debunked. (to the original material)

- Thousands of schools impacted after IT provider hit by ransomware. (to the original material)

- Researchers warn of new Log4Shell - Like Java vulnerability. (to the original material)

- Cyber-attack on New Mexico county. (to the original material)

- Facebook/ Google use Dark Patterns in cookie consent - says France, waving $240 million fines. (to the original material)

- Antivirus software market to reach $4.54 billion in 2025. (to the original material)

- Enterprise PKI automation: The modern approach to certificate lifecycle management. (to the original material)

- Supply chain cybersecurity: Pain or pleasure? (to the original material)

- January 2022 Patch Tuesday forecast: Old is new again. (to the original material)

- Network and security teams must collaborate to successfully deliver digital transformation. (to the original material)

- Case Study: The road to Zero Trust. (to the original material)

- Norton 360 offering contains controversial cryptominer. (to the original material)

- FBI: FIN7 hackers target US companies with BadUSB devices to install ransomware. (to the original material)

- Codex exposed: Exploring the capabilities and risks of OpenAI's code generator. (to the original material)

- QNAP: Get NAS devices off the internet now. (to the original material)

- 3.7 million FlexBooker records dumped on hacker forum. (to the original material)

- EoL (End of Life) Systems stonewalling Log4j fixes for Fed Agencies. (to the original material)

- Researchers discover new JNDI-based vulnerability similar to Log4j. (to the original material)

- Cyber Command announces partnership with 84 universities. (to the original material)

- Mespinoza, Pysa ransomware an ongoing threat to the healthcare sector, HHS warns. (to the original material)

- Below the surface: Log4j attack trends. (to the original material)

- WordPress 5.8.3. security release. (to the original material)

- Malware and ransomware set to be a larger threat over the next year. (to the original material)

- How control system vulnerabilities can threaten the oil industry [Q&A]. (to the original material)

- Latest WordPress security release fixes XSS, SQL injection bug. (to the original material)

- Internet Bug Bounty: High Severity vulnerability in Apache HTTP Server could lead to RCE. (to the original material)

- Log4j - Related RCE flaw in H2 Database earns critical rating. (to the original material)

- Chinese scientist pleads guilty to stealing US agricultural tech. (to the original material)

- UK NHS: Threat actor targets VMware Horizon servers using Log4Shall exploits. (to the original material)

- FinalSite discloses ransomware attack that crippled websites for 8,000 schools. (to the original material)

- Russian denied bail in insider trading hacking case. (to the original material)

- ISMG Editors: Secrets and lies of ransomware operators. (to the original material)

- Coming invasion? Russian cyber activity in Ukraine escalates. (to the original material)

- Goodcaptchastyle.top virus redirect removal steps [free fix steps]. (to the original material)

- ConnectProcess Mac adware removal guide [free delete steps]. (to the original material)

- Remove Easysearch.club browser redirect [free fix steps]. (to the original material)

- Pure Dark Redirect removal instructions. (to the original material)

- SafeTravel Redirect removal guide [free delete steps]. (to the original material)

- Combo Cleaner Review Mac 2022 [antimalware]. (to the original material)

06.01.2022 - News from Cyber Security.

- Cybersecurity news of the week (06.01.2022). (to the original material)

- Executive predictions for 2022: CTO Fleming Shi. (to the original material)

- From crisis to continuity: Securing remote work for the long term. (to the original material)

- Java RMI services often vulnerable to SSRF attacks - research. (to the original material)

- Kazakhstan government shuts down internet following country-wide protest. (to the original material)

- Natural disasters expose cyber weaknesses for financial firms. (to the original material)

- Missouri's CRMC (Capital Region Medical Center) brings network back online, 3 weeks after cyberattack. (to the original material)

- Financial advisers embrace increased security awareness, controls. (to the original material)

- Security experts develop search tool to make CISA's (ever growing) Log4j database more friendly. (to the original material)

- What companies should expect as the FTC takes aim at Log4j laggards. (to the original material)

- Google Docs comment flaw exploited by attackers. (to the original material)

- CES 2022: More sensors than people. (to the original material)

- Threat Source Newsletter (January 6, 2022). (to the original material)

- Covid test data breach at British School. (to the original material)

- Cyber-attack on Fertility Centers of Illinois. (to the original material)

- Investigation launched into RIPTA data breach. (to the original material)

- The Colonial Pipeline attack eight months on. (to the original material)

- UK Police seize £322 million of cryptocurrency in past five years. (to the original material)

- Man pleads guilty to $50 million investment fraud scheme. (to the original material)

- Credential stuffers compromised 1.1 million accounts. (to the original material)

- Finite state adds binary analysis to catch zero-days. (to the original material)

- Bridging the "front and back of the house": A lesson in risk management. (to the original material)

- The Log4j debacle showed again that public disclosure of zero days only helps attackers. (to the original material)

- Five tips on how to stay (cyber) secure in a hybrid work world. (to the original material)

- Experts uncover Elephant Beetle, an organized financial-theft operation. (to the original material)

- Mobile security software market to reach $2.75 billion by 2025. (to the original material)

- FinalSite ransomware attack shuts down thousands of school websites. (to the original link)

- Night Sky is the latest ransomware targeting corporate networks. (to the original material)

- FlexBooker discloses data breach, over 3.7 million accounts impacted. (to the original material)

- US arrests suspect who stole unpublished books in phishing. (to the original material)

- US online pharmacy Ravkoo links data breach to AWS portal incident. (to the original material)

- Swiss army bans all chat apps but locally-developed Threema. (to the original material)

- Google Docs commenting feature exploited for spear-phishing. (to the original material)

- France hits Facebook and Google with $210 million in fines. (to the original material)

- FBI warns about ongoing Google Voice authentication scams. (to the original material)

- Is quantum computing ready to disrupt cybersecurity? (to the original material)

- Best practices for encrypting your phone communications. (to the original material)

- W2 form is for sale on the dark web. (to the original material)

- DIY Sinclair clones: Left it too late to back the Next? Build your own instead. (to the original material)

- UK government stacks up to £1.8 billion in vertical application framework. (to the original material)

- Fugitive mafiosi evaded cops for two decades until he was spotted on Google Street View. (to the original material)

- Hearth attack victim "saved" by defibrillator delivery drone. (to the original material)

- Google Chrome 97 relaxes privacy protection just a little to help out Microsoft. (to the original material)

- New trick could let malware fake iPhone shutdown to spy on users secretly. (to the original material)

05.01.2022 - News from Cyber Security.

- Google releases security updates for Chrome. (to the original material)

- VMware releases security updates. (to the original material)

- How legitimate websites are used to spread ransomware. (to the original material)

- A walk through a Year of Website Security: Part II. (to the original material)

- Health tech vendor QRS faces lawsuit after data theft impacting 319k patients. (to the original material)

- Warning: Log4j still lurks where dependency analysis can't find it. (to the original material)

- "We all need to be better": Financial advisers confront flaws in their security posture. (to the original material)

- What value does Extend Detection and Response (XDR) bring to the cybersecurity market [Q&A]? (to the original material)

- How can SMBs extend their SecOps capabilities without adding headcount? (to the original material)

- The CISO's guide to third-party security management. (to the original material)

- SMBs should consider new approaches for increasing their cybersecurity posture. (to the original material)

- How companies manage data and AI initiatives. (to the original material)

- API security: Understanding the next top attack vector. (to the original material)

- Embedded hypervisor software market to reach $1.16 billion by 2026. (to the original material)

- 70 investors lose $50 million to fraudsters posing as broker-dealers. (to the original material)

- Microsoft Defender for Endpoint adds zero-touch iOS onboarding. (to the original material)

- NY OAG (New York State Office of the Attorney General): Hackers stole 1.1 million customer accounts from 17 companies. (to the original material)

- Crypto platform ARBIX flagged as a rugpull, transfers $10 million. (to the original material)

- iOS malware can fake iPhone shut downs to snoop on camera, microphone. (to the original material)

- "Elephant Beetle" spends month in victim networks to divert transactions. (to the original material)

- Microsoft code-sign check bypassed to drop Zloader malware. (to the original material)

- WhiteSource automates remediation of Log4j vulnerabilities. (to the original material)

- Defending against modern ransomware tactics. (to the original material)

- McMenamins reports data breach. (to the original material)

- Kansas gets 17 critical cybersecurity recommendations. (to the original material)

- Morgan Stanley agrees to data breach settlement. (to the original material)

- Cybersecurity trends for 2022. (to the original material)

- AI progress in security is impressive enough without embellishment. (to the original material)

- Palo Alto Networks appoints CEO for EMEA and LATAM Regions. (to the original material)

- Info-stealing malware hits 100+ countries. (to the original material)

- UK's information commissioner starts new role amid major changes. (to the original material)

- FTC: Patch Log4j now or risk major fines. (to the original material)

- Duty-search redirect removal guide [free delete steps]. (link to original material)

- LIKEAHORSE ransomware virus [remove and restore data]. (link to original material)

- FormulaBuffer Mac adware removal [free uninstall steps]. (to the original material)

- DEHD virus ransomware [.dehd files] removal & decrypt guide. (to the original material)

- Using CASB to establish user access, control of critical assets. (to the original material)

- New Zloader Banking malware campaign exploiting Microsoft signature verification. (to the original material)

- How ransomware gangs went pro. (to the original material)

- The FreeRTOS vulnerability disaster. (to the original material)

- Importance of cybersecurity in military. (to the original material)

- A majority of Gen Z crypto investors think they will become millionaires, according to a new survey. (to the original material)

- Interesting cyber crime stories. (to the original material)

- IBM bosses wrongly sacked channel salesman after Tech Data joint venture failed, tribunal rules. (to the original material)

- Hauliers report problems with post-Brexit customs system but HMRC (Her Majesty's Revenue & Customs) insists it is "online and working as planned". (to the original material)

- Remember Norton 360's bundled cryptominer? Irritated folk realize Ethereum crafter is tricky to delete. (to the original material)

- Microsoft pushes ahead adapting Azure for 5G telecoms after swallowing AT&T's Network cloud. (to the original material)

- You better have patched those Log4j holes or we'll see what a judge has to say - FTC. (to the original material)

- 5 ways hackers steal passwords (and how to stop them). (to the original material)

- Top 10 bad cybersecurity habits to shed in 2022. (to the original material)

04.01.2022 - News from Cyber Security.

- Vulnerability summary for the week of December 27, 2021. (to the original material)

- U.S. weighs in on open source software security. (to the original material)

- Insider threat does not have to be malicious, so how do you protect your organization? (to the original material)

- Preventing document fraud in a world built in digital trust. (to the original material)

- Healthcare cloud infrastructure market size to reach $142 billion by 2028. (to the original material)

- Should businesses be concerned about APT-style attacks? (to the original material)

- Emergency Windows Server update fixes Remote Desktop issues. (to the original material)

- FTC warns companies to secure consumer data from Log4j attacks. (to the original material)

- First Microsoft Pluton-powered Windows 11 PCs unveiled at CES. (to the original material)

- Hackers use video player to steal credit cards from over 100 sites. (to the original material)

- UScellular discloses data breach after billing system hack. (to the original material)

- Have I Been Pwned warns of DatPiff data breach impacting millions. (to the original material)

- Spyderbat tool can discover Log4j vulnerabilities. (to the original material)

- Did U.S. charge Klyushin to reveal 2016 SNC hack info? (to the original material)

- Top 10 Gurucul blog posts of 2021. (to the original material)

- Top 10 security challenges for 2022. (to the original material)

- Investigation launched into App "Selling" Women. (to the original material)

- Google acquires its first non-american cybersecurity firm (Siemplify). (to the original material)

- Google acquires Siemplify in ambitious cybersecurity push. (to the original material)

- UWO (University of Wisconsin-Oshkosh) opens new cybersecurity center. (to the original material)

- Protecting the most crucial software supply chain targets. (to the original material)

- Money launderers get 33 years for £70m criminal scheme. (to the original material)

- UK Defence Academy attack forced IT rebuild - report. (to the original material)

- Microsoft fixes New Year's Day Exchange Server bug. (to the original material)

- ToolIndexer Mac Ads removal guide [free uninstall steps]. (to the original material)

- MainOperation Mac Adware delete guide [free removal steps]. (to the original material)

- EasyMacSoft Mac adware removal guide [free delete steps]. (to the original material)

- SafeplexSearch Mac Adware removal guide. (to the original material)

- Remote Access malware rises, ransomware operators rebrand, and more attacks on individuals: Report. (to the original material)

- Newly discovered Lapsus$ ransomware targets several organizations in a month. (to the original material)

- Saltzer Health says patient data exposed in cyberattack. (to the original material)

- Log4j flaw attack levels remain high, Microsoft warns. (to the original material)

- SAILFISH System to find State-inconsistency bugs in smart contracts. (to the original material)

- North Korean Konni hackers target Russian diplomats using New Year greetings. (to the original material)

- Skimmer injected into 100 real estate websites via Cloud Video Platform. (to the original material)

- State-of-the-art EDRs (Endpoint Detection & Response) are not perfect, fail to detect common attacks. (to the original material)

- Predictions: SecurityWeek's 2022 cybersecurity outlook. (to the original material)

- Unpatched HomeKit vulnerability exposes iPhones, iPads to DoS attacks. (to the original material)

- Cyber insurance firm Corvus expands with acquisition of UK-based Tarian. (to the original material)

- Anti-Bot fraud detection firm HUMAN snags $100 million investment. (to the original material)

- Instagram and teens: A quick guide for parents to keep their kids safe. (to the original material)

- Microsoft: Log4j exploit attempts, testing remain rampant. (to the original material)

- Log4j updates: Flaw challenges global security leaders. (to the original material)

- Clinic notifies 212,500 about 2020 breach involving fraud. (to the original material)

- Card-stealing code found on more than 100 Sotheby's luxury real estate sites. (to the original material)

- Latest web hacking tools - Q1 2022. (to the original material)

- Researcher discovers 70 web cache poisoning vulnerabilities, nets $40k in bug bounty rewards. (to the original material)

- Broward Health healthcare data theft impacts 1.3 million patients, employees. (to the original material)

- Cyberattack on payroll vendor Kronos disrupting healthcare workforce paychecks. (to the original material)

- Financial advisers face increased breach threats with remote work, sensitive data. (to the original material)

- Mac security research and freeware designer Objective-See becomes non-profit. (to the original material)

- Organizations Worldwide experience over 722 million attacks in the last 30 days. (to the original material)

- Amazon Token Crypto "presale" scam takes advantage of news hype and steals your real cryptocurrency. (to the original material)

- $1.9 million worth of NFTs stolen and re-sold by hacker. (to the original material)

- Fake Telegram Messenger apps are hacking PCs with lethal malware that evades installed antivirus. (to the original material)

- RedLine malware leaks over 440,000 accounts, passwords: How to check if You've been exposed, 2 ways to avoid data breach. (to the original material)

- Does your cyber insurance policy look more like health insurance? (to the original material)

- SlimPay fined €180.000 after 12 million customers' bank data publicly accessible for 5 years. (to the original material)

- Deception as a form of defence. (to the original material)

- Malware detection: What is heuristic analysis? (to the original material)

03.01.2022 - News from Cyber Security.

- A CISO's guide to discussing cybersecurity with the board. (to the original material)

- Why the UK's energy sector is fragile and ripe to cyber attacks. (to the original material)

- Ransomware attacks decrease, operators started rebranding. (to the original material)

- LTE (Long-Term Evolution - Standard for wireless broadband communication) IoT market to grow steadily by 2026. (to the original material)

- InfoSec products of the month: December 2021. (to the original material)

- Purple Fox malware distributed via malicious Telegram installers. (to the original material)

- Microsoft Skype makes you solve a complex captcha 10 times to sign up. (to the original material)

- Broward Health (Florida, USA) discloses data breach affecting 1.3 million people. (to the original material)

- Apple iOS vulnerable to HomeKit "doorLock" denial of service bug. (to the original material)

- Don't copy and paste commands from webpages - you can get hacked. (to the original material)

- Apple AirTag: Absolutely awful, say stalking victims. (to the original material)

- 6 ways to minimize ransomware damage. (to original material)

- Why insider threat risk increases in the cloud. (to the original material)

- How to: Solve your organization's password woes. (to the original material)

- Loov Virus Ransomware [.loov Files] removal & decrypt guide. (to the original material)

- RedLine malware pilfer passwords saved in multiple browsers. (to the original material)

- MSBuild abused for execution of Cobalt Strike Beacon. (to the original material)

- BlackTech APT pulls out new Flagpro malware to target Japan and others. (to the original material)

- SEGA Europe left AWS S3 bucket unsecured exposing data and infrastructure to attack. (to the original material)

- Multiple vulnerabilities impact Netgear Nighthawk R6700 routers. (to the original material)

- Israeli Media outlets hacked on Soleimani killing anniversary. (to the original material)

- Detecting evasive malware on IoT devices using electromagnetic emanations. (to the original material)

- Breaking the habit: Top 10 bad cybersecurity habits to shed in 2022. (to the original material)

- Report: China mining western social media for intelligence. (to the original material)

- T-Mobile: Some customers affected by SIM swap data breach. (to the original material)

- Hospital system: Data exfiltration breach hits 1.3 million. (to the original material)

- Indian Medical Association's Twitter account compromised. (to the original material)

- Cyber Regulation: Prediction for 2022. (to the original material)

- HIPAA Privacy and Security: At a crossroads in 2022. (to the original material)

- CMMC (Cybersecurity Maturity Model Certification program) stakeholders expect less talk, more action to shore up contractor security. (to the original material)

- Financial firms struggle with security in storage, backups. (to the original material)

- New guidance tackles role of manufacturers in medical device security, patient safety. (to the original material)

- A walk through a year of website security: Part I. (to the original material)

- Morgan Stanley to pay $60 million to resolve data security lawsuit. (to the original material)

- IoT's importance is growing rapidly, but its security is still weak. (to the original material)

- CrowdStrike beefs up exploit detection with Intel CPU telemetry. (to the original material)

- Hospitality chain says employee data stolen in ransomware attack. (to the original material)

- Broward Health hit with data breach on patient, staff. (to the original material)

- How to identify whether a crypto project is legitimate? (to the original material)

- JetBlue tosses most passwords out the emergency exit. (to the original material)

- Florida Hospital System suffers data breach, including medical information. (to the original material)

- Hacking the ransomware problem. (to the original material)

- Jerusalem Post (JPost) targeted pro-Iranian hackers on Soleimani assassination anniversary. (to the original material)

- Interview with Elena Elkina – Women in security and privacy. (to the original material)

- How to hide from facial recognition software with Fawkes. (to the original material)

02.01.2022 - News from Cyber Security.

- Most popular cybersecurity and tech stories of 2021. (to the original material)

- Uber ignores vulnerability that lets you send any mail from Uber.com. (to the original material)

- How long before VPN's are mothballed? (to the original material)

- Lapsus$ ransomware gang hits SIC, Portugal's largest TV channel. (to the original material)

- Cyber-attack on UK's Defence Academy caused "significant" damage. (to the original material)

- NASA Director Twitter account hacked by "Powerfull Greek Army". (to the original material)

- 6 ways to hack Facebook with Android device (100% working) step by step procedure. (to the original material)

- Google Dorks List 2022 - Latest SQL Dork List. (to the original material)

01.01.2022 - News from Cyber Security.

- The Top 5 cybersecurity tools companies need to implement right now. (to the  original material)

- Popular Q&A app Curious Cat loses domain, posts bizarre tweets. (to the original material)

- PulseTV: Over 200,000 credit cards details compromised. (to the original material)

- Latest Google Dorks SQL Injection - SQL Dorks 2022. (to the original material)


Archive:

Click here to access archive content.
Click here to access CMS (Content Management System) in Joomla.

Source:

Click here to access to documentation sources.

Note Dorin M.

This site has a double form, one in HTML and one in Joomla (if you are interested in the utility behind this effort you can read the "Why  a HTML and a CMS (Joomla)" page).
That's why I suggest you, depending on your desire, to use the HTML form for simple browsing / information or the Joomla form if you want in-depth studies / searches using the CMS search engine.

Dorin M - January 31, 2022