28. April 2021

The Sodinokibi Chronicles: A (R)Evil Cybercrime Gang Disrupts Organizations for Trade Secrets and Cash

Court will hear case against Trump on JEDI

Army wants AI to improve analysis of intelligence data

Experian API Exposed Credit Scores of Most Americans

FluBot Malware’s Rapid Spread May Soon Hit US Phones

What Are Your NOT Detecting?

Apple Reports 2Q 2021 Results: $23.6B Profit on $89.6B Revenue, Record Mac and Services Revenue

Apple’s Mac Revenue Up 70% in Q2 2021, iPad Revenue Up Almost 79%

Apple’s macOS 11.3 fixes a zero-day exploit and includes M1 improvements

Codecov breach raises concerns about software supply chain

74% of Financial Institutions See Spike in COVID-Related Threats

Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs

Apple Pay Support for Coinbase Card Appears to Be Getting Closer

Google Tracking Of Safari Users, Heads To UK Supreme Court

CISA experiments with cloud log aggregation to ID threats

Microsoft Office SharePoint Targeted With High-Risk Phish, Ransomware Attacks

FBI Works With ‘Have I Been Pwned’ to Notify Emotet Victims

CPDP 2021 – Moderator: TJ McIntyre ‘Analysis Of Private Communications In The Fight Against Child Sexual Abuse Online’

Netflix Launches New ‘Play Something’ Shuffle Feature

Isolate Your CloudHub Worker Instances Using VPN

Google Chrome V8 Bug Allows Remote Code-Execution

Ransomware attack hits Washington, D.C. police department

Cybersecurity key to protect brands in the digital landscape

Data Breach Impacts 1 in 4 Wyomingites

US Arrests Alleged Crypto Mixer

Facebook Blocks Employees From Reading Controversial Report

XKCD ‘Virus Consulting’

Indusface GDPR Data Processing Addendum – Now Part of Service Terms

Groups & User Right Management

Chipolo Takes Dig at AirTags When Advertising ONE Spot Item Tracker: ‘No Accessory Needed’

Apple Updates AirPods Pro and AirPods 2 Firmware to Version 3E751

Watch out! Android Flubot spyware is spreading fast

Bitcoin scammers phish for wallet recovery codes on Twitter

Deadline is Extended for 2021(ISC)² Global Achievement Awards Nominations!

What Docker runtime deprecation means for your Kubernetes

Lessons learned from building an inventory of systems

Passwordstate Password Manager Suffered Supply-Chain Attack

GitHub Announces Blocking Google’s FLoC

Hackers Using Prometei Botnet to Exploiting Microsoft Exchange Vulnerabilities

Death of the Manual Pen-Test: Blind Spots, Limited Visibility

How to Secure Employees’ Home Wi-Fi Networks

Tala welcomes Jim Routh to its Board of Advisors

T-Mobile Launches $60 LTE ‘SyncUP’ Item Tracker

Ransomware crooks who broke into Merseyrail used director’s email address to brag about it – report

Lockbit Ransomware targets England Merseyrail

Biden picks former Army acquisition exec for DOD’s top tech job

CISO Conversations: Raytheon and BAE Systems CISOs on Leadership, Future Threats

Rise in ransom payments may fuel more dangerous attacks

Gamers update! Nvidia patches GPU driver kernel escalation bugs

G7 Nations Sign Declaration to Keep the Internet Safe and Open

Alsid SAS Acquired by Tenable

Apple will pay $100 million to Russian hackers for leaking data on new products

NTLM Relay Attack Exploits Windows RPC Flaws

Cartoon Caption Winner: Rough Patch?

Machines Learn That Brussels Writes the Rules: The EU’s New AI Regulation

Facebook disables Palestinian APT Group Activities

Cybersecurity and Online Gaming

What Is SSL Vulnerability In Computer Network Science?

Password-Stealing Android Malware Is Spreading Quickly

REvil Ransomware Gang Warns to Leak New Apple Logos and iPad Plans

German Hospitals on their Way to the Future

Jeff Bezos Blue Origin Protests NASA’s SpaceX Contract

watering hole attack

Chase Bank Phish Swims Past Exchange Email Protections

How phishing attacks spoofing Microsoft are evading security detection

Cyberspace Solarium Commission: CISA Funding Should Increase by at Least $400M

Google Data Protection Case to be Heard in UK Supreme Court

Cisco Live 2021 – Highlights from a fresh perspective!

Webinar: The Current State and Future Challenges of Security

Retailer DeinDeal Secures its API-driven E-commerce Platform with Salt Security

Code42 Incydr Delivers Innovative Detection of Browser Uploads to Combat Insider Risk

Ransomware Crooks Threaten To ID Informants If Cops Don’t Pay Up

Signal’s Cellebrite Hack Is Already Causing Grief For The Law

Apple Patches macOS Gatekeeper Bypass Vulnerability

Linux Kernel Vuln Exposes Stack Memory, Causes Data Leaks

CES 2022 Returning to Las Vegas Next January as Both In-Person and Digital Event

Delta Rolling Out iPhone 12 to Over 19,000 Flight Attendants

Experts Advise on World Password Day

APT Security: What You Need to Know about Advanced Persistent Threats

Google’s FLoC Tracking Blocked by GitHub

FBI Speeds Emotet Cleanup by Sharing Over 4 Million Email Addresses on HIBP

What Is Endpoint Privilege Management?

Brit MPs and campaigners come together to oppose COVID status certificates as ‘divisive and discriminatory’

Why is USPS tracking social media posts?

Apple patches macOS Gatekeeper bypass vulnerability exploited in the wild

Navy SEALs to Shift From Counterterrorism to Global Threats

Attacks Targeting ADFS Token Signing Certificates Could Become Next Big Threat

Is Your Cloud Raining Sensitive Data?

Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts
Ghostwriter Influence Activity

Cybercriminals Widely Abusing Excel 4.0 Macro to Distribute Malware

Google addresses a high severity flaw in V8 engine in Chrome

Stay Ahead of Global Uncertainty With Real-time Geopolitical Intelligence for Esri

Deals: 40mm GPS Apple Watch Series 6 Marked Down to Lowest Price Yet at $299 ($100 Off)

Secure by default: Take these steps to reduce your attack surface

Washington DC Police Dept Threatened After Ransomware Attack

Secrets management and authentication platform Akeyless raises $14M

Viso Trust assesses third-party cybersecurity risk with AI, raises $3M

Prisma Cloud can now automatically protect cloud workloads and containers

DevSecOps Company Sysdig Raises $188 Million at $1.19 Billion Valuation

FBI Offers Millions of Emotet Compromised Credentials to Have I Been Pwned

F5 BIG-IP Found Vulnerable to Kerberos KDC Spoofing Vulnerability

The Changing Attack Landscape and Foiling Detection Evasion

The Multi-Layered K-12 Cybersecurity Tech Stack

Akeyless Reimagines Cloud Security, Raises $14M Series A

Apple Explains Why ‘Allow Apps to Request to Track’ May Be Grayed Out on iOS 14.5

Report: (ISC)2 Cybersecurity Career Pursuers Study Provides Insights From Professionals and Jobseekers to Highlight What Security Jobs Actually Entail

CISA issues guidance on defending against software supply chain attacks

Emotet botnet harvested 4.3 million email addresses. Now the FBI is using Have I Been Pwned to alert the victims

Russia-Linked ‘Ghostwriter’ Disinformation Campaign Tied to Cyberspy Group

Dark Hash Collisions: New Service Confidentially Finds Leaked Passwords

Security Spending Doubles but Two-Fifths of Firms Suffer Breaches

#GartnerIAM: Pandemic Disruption Necessitates a Transformation in Identity Access Management

Leaked Apple Schematics & Extortion Threats Removed From Dark Web

PARETO Botnet Utilized Hacked Android Phones To Generate Fake Ad Views

UK To Regulate Self-Driving Cars On Motorways

Ransomware Strain Qlocker Targeting QNAP NAS Flaws – Patch It!

Double Trouble – the Threat of Double Extortion Ransomware and How Your Organization Can Protect Itself

Sysdig raises $189M to monitor containers and apps in the cloud

Linux kernel vulnerability exposes stack memory, causes data leaks

Threat Actor Leaks Personal Records of 250 Million American Households on Hacking Forum

UK rail network Merseyrail hit by ransomware gang

Ransomware group threatens to leak information about police informants

3 ways to prevent firmware attacks without replacing systems

6 tips for better collaboration between security and cloud teams

FCW Insider: April 28, 2021

Microsoft mulls over tweaks to threat data, code-sharing scheme following Exchange Server debacle

Average Ransom Surges 43% After Accellion Attacks

Cloud misconfiguration, a major risk for cloud security

Australian Watchdog Wants iOS Users to Have More Control Over Preinstalled Apps

Apple To Build $1 Billion Campus In North Carolina

Telsa Executives Says Fatal ‘Driverless’ Crash Had Driver

Apple And Digital Identity | Avast

Google Patches Yet Another Serious V8 Vulnerability in Chrome

#COVID19 Rattles Banks and Insurers as Security Budgets Are Slashed

30 arrested in the Netherlands and Poland after 5,4 million counterfeit cigarettes seized

Fake Microsoft DirectX 12 Distributes Malware

5.6 Million Customer Records Leaked as Music Marketplace Giant Reverb Suffers Data Breach

Welcoming the Luxemburg Government CERT to Have I Been Pwned

Securing AWS Management Configurations By Combating 6 Common Threats

Should Doctors Receive a Cybersecurity Education?

Descomplica – 4,845,378 breached accounts

Attention! FluBot Android Banking Malware Spreads Quickly Across Europe

Why Financial Services Needs Network Transformation

Achieving Data Protection With SASE

Looking for adding new detection technologies in your security products?

Hacker leaks financial data of European Super League

Ransomware Cyber Attack on Mining firm Gyrodata

Shorten wants Morrison to pivot social media ‘evil’ remark to fighting online harms to kids

Thoma Bravo Lacks Options with Proofpoint

Deeper Analyzis of my Last Malicious PowerPoint Add-On, (Wed, Apr 28th)

Apple Reportedly Lowering AirPods Production Due to Decreasing Sales

Ombudsman finds unlawful metadata access by ACT cops on 1,704 occasions

Apple patches severe macOS security flaw

Managing and maturing Kubernetes security in the enterprise

The next big thing in cloud computing? Shh… It’s confidential

Evolving Identity: Why Legacy IAM May Not Be Fit for Purpose

Considerations for performing IoMT Risk Assessments

COVID-19, WFH prompts spike in cyberattacks against banks, insurers

MFA spending on the rise, but organizations still unclear on best practices

Only 8% of businesses that paid a ransom got all of their data back

Creating Cloud Security Policies that Work

Despite the pandemic, 85% of organizations completed their audits as planned

IT security teams challenges fueled by record-setting cyberattacks

ISC Stormcast For Wednesday, April 28th, 2021 https://isc.sans.edu/podcastdetail.html?id=7476, (Wed, Apr 28th)

Scality and HPE introduce ARTESCA, a cloud-native object storage solution for Kubernetes

VMware Telco Cloud Platform RAN enables CSPs to virtualize RAN functions

Metodologías ágiles y ‘trabajo en reversa’: el caso de Amazon

Second Click Here to Kill Everybody Sale

Verimatrix Multi-DRM Core offers video streaming service providers a customizable DRM solution

ComplyAdvantage announces ComplyLaunch, a free AML program for early-stage startups

Sensitive source codes exposed in Microsoft Azure Blob account leak

Australian government’s major IT shops to help others with cybersecurity

iOS 14.5: How to Automatically Download New Podcast Episodes and Follow Shows

Rambus partners with Lattice to leverage their technology expertise in next-gen security solutions

Microsoft and Intel join forces to advance endpoint detection and response against cryptojacking

Samsung launches PM1653, a 24G SAS SSD to handle AI and big data in enterprise servers

Extreme Networks achieves three ISO certifications for information security and data protection

Cyber Intelligence House signs agreement with INTERPOL to aid in investigating cybercrime

Fudo Security partners with SYNNEX to deliver zero trust network security

Jefit – 9,052,457 breached accounts

5 Cases of Blockchain for Cybersecurity

Biden selects former Army acquisition exec for DOD’s top tech job

Do Cyberattacks Affect Stock Prices? It Depends on the Breach

Feds Arrest an Alleged $336M Bitcoin-Laundering Kingpin

‘America’s Back’ at the Table: Cataloguing the Biden Administration’s First Security Council Presidency

Optiv Security announces key appointments to accelerate growth and drive brand visibility

Nick Baglin joins Guardicore as VP of EMEA Sales

Dasera appoints David McCaw as VP of Sales

Don’t fall for this trick that unleashes nasty new Android malware

Senator discusses priorities for advancing national cybersecurity legislation

Emotet Malware Uninstalled From Infected Devices

Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise

Katie Moussouris Interviews Dan Kaminsky

Contact Tracing Fail: Why is Google So Bad at Basic Security and Privacy?

Eddy Cue Wanted to Port iMessage to Android in 2013 According to Epic Deposition

Apple Inks Deal for Siegfried & Roy Podcast

IT Security News Daily Summary 2021-04-27

Vulnerabilities In Cosori Smart Air Fryer Could Allow Remote Code Execution Attacks

Biden orders $15 minimum wage for federal contractors

Former CIO urges lawmakers to relax TMF paybacks

How automation can transform storage provisioning

Cloud solution improves VSAT communication

Keeping cloud collaboration after CVR winds down

Kessel Run seeks DevSecOps help with modernization

Esports gaming platforms take off in Air Force

FireEye Q1 revenue, EPS top expectations, forecast higher, shares rise

Nintendo Sues Video-Game Pirates

Apple Explains How Unlocking iPhone With Apple Watch Works

How to use iOS 14.5 privacy settings to turn off iPhone apps tracking

Linux Kernel Bug Opens Door to Wider Cyberattacks

FBI/DHS Issue Guidance for Network Defenders to Mitigate Russian Gov Hacking

Collaboration is key to a secure web application architecture

Applying web application reconnaissance to offensive hacking

10K Hackers Defend the Planet Against Extraterrestrials

Emotet Malware Uninstalled from Infected Devices

Apple Celebrating International Dance Day With New Fitness Challenge

iOS 14.5: How to Use AirPlay 2 With Apple Fitness+

D.C. Police Department suffers ransomware attack

“Crypto Dictionary: 500 Cryptographic Tidbits for the Curious” is a crash course in ciphers and cryptids

Kik Tip Leads to Kindergarten Teacher’s Arrest

Ransomware Recovery Costs Near $2M

CPDP 2021 – Moderator: Daniel Drewer ‘Radical Insights – The Fight Against Online Radicalisation And Its Data Protection Implications’

FBI shares with HIBP 4 million email addresses involved in Emotet attacks

Lawfare Live: The Biden Administration’s First 100 Days

Come Work For Lawfare—As Our Managing Editor

Russia’s Illegal Restriction of Navigation in the Black Sea

Security expert publishes coffee table book for cryptographers to explain the science of secrecy

Online Music Marketplace Suffers Data Breach

Threat Actors Impersonate Chase Bank

Abusing Replication: Stealing AD FS Secrets Over the Network

Gathering Cyber Threat Intelligence on the Dark Web: Guidance for the Private Sector

WhiteHat Security Adds Enterprise-Grade Attack Surface Management Features with New Bit Discovery Partnership

Cigent Technology Extends Firmware to Secure SSDs

Apple Files Expert Witness Testimony Ahead of Upcoming Trial With Epic

iOS 14.5: How to Share Apple Music Lyrics and Song Clips

Apple Fined $12 Million in Russia for Violating Anti-Monopoly Rules With App Store

Hands-On With the Apple TV’s New Color Balance Calibration Feature

Here’s what Russia’s SVR spy agency does when it breaks into your network, says US CISA infosec agency

Box Releases Powerful Set of Security Features to Advance the Content Cloud

Updates to the (ISC)² CAP Exam. What is Changing?

Priority on people – An argument against the excessive use of Cybersecurity technology

Bridging the Cybersecurity frontier: SaaS

ToxicEye Malware Emerges As The Latest Threat To Telegram

New Security Approach to Cloud-Native Applications

Digital Estate Planning – What to Do With Your Digital Assets

HASC chair calls for new incentives to reduce defense costs

Space Command moves for tighter cyber integration

Pentagon readies new policy to boost cyber workforce

University of Minnesota responds to Linux security patch requests

Smishing: Why Text-Based Phishing Should Be on Every CISO’s Radar

Password-stealing spyware targets Android users in the UK

US Air Force Adopts Zero Trust to Secure Flightline Operations

Millions of the Pentagon’s Dormant IP Addresses Sprang to Life, Just Minutes Before Trump Left Office

International Law Enforcement Takes Down Emotet Malware in a Joint Operation

4 Ways CISOs Can Strengthen Their Security Resilience

iOS 14.5: How to Recalibrate Your iPhone 11 Battery

5 Ways Your Software Supply Chain is Out to Get You, Part 3: Exploit Open Source Libraries

Apple’s AppTrackingTransparency is Upending Mobile Phone Tracking

Meet critical infrastructure security compliance requirements with Microsoft 365

Apple Airdrop vulnerability to leak personal details of users

Ransomware attack exposes 250GB files of Washington Police Department

Thoma Bravo acquires Proofpoint for $12.3 billion

OneWeb Grows Total Constellation To 182 satellites With New Launch

Cybersecurity on the Move: Preventing Attacks on Shipping and Logistics

Adopting Microsegmentation Into Your Zero Trust Model, Part 1

Red Hat touts safety in future Linux OS for cars

Babuk Ransomware Gang Targets Washington DC Police

Phishing attacks target Chase Bank customers

Sift Raises $50M at ‘Unicorn’ Valuation

Expect an Increase in Attacks on AI Systems

Google Releases Security Updates for Chrome

Apple Releases Security Updates

CISA, NIST published an advisory on supply chain attacks

Apple’s Privacy Battle With Facebook Just Became All-Out War

Pentagon Explains Odd Transfer Of 175 Million IP Addresses To Obscure Company

Washington DC Police Force Confirms Data Breach From Ransomware

Actively Exploited Mac 0-Day Neutered Core OS Defenses

Emotet Takedown And Its Implications

Experts Reaction On Passwordstate Breached

Defence In Depth – Time To Start Thinking Outside The Box

DC Police Confirms Cyberattack

Cheers to our partners’ marketing success

Cigent Technology melds security and storage to protect sensitive data

FBI: Russian hackers are still trying to break into networks, here’s how to protect yours from attack

Anti-Facebook MeWe continues its user growth surge

Why hackers are increasingly targeting video game companies

Endpoint Management Firm Automox Raises $110 Million

Challenging Our Education System to Nurture the Cyber Pipeline

Apple Shares First Trailer for Rose Byrne-Starring TV+ Show ‘Physical’

Deals: 2020 iPad Pro Models Further Discounted to Record Low Prices on Amazon (Up to $150 Off)

Spotify Announces Podcasts Subscription Service to Rival Apple Podcasts

A New Report Reveals London Has The Highest Rate Of Cybercrime In The UK

Apple’s AirDrop Leaks Users’ PII, And There’s Not Much They Can Do About It

HashiCorp Affected by A Security Breach That Occurred Due to A Codecov Supply-Chain Attack

Ransomware Gang Made $260,000 By Using The 7zip Utility

ToxicEye RAT Exploits Telegram Communications to Steal Users’ Data

Over 5.6 Million Records with Reverb Customers Details Leaked Online

Texas Senate passes new bill to protect state from cyber attacks

Security Vulnerabilities In John Deere API Could Expose Tractor Customers

Apple iOS Update With Tracking Consent Prompts Mixed Reaction

Trusted Notifiers and the Future of DNS Abuse

BigBasket Data Leak – Over 20 Million Personal Records Published on Hacking Forum

Vulnerabilities in Eaton Product Can Allow Hackers to Disrupt Power Supply

Adobe Releases Open Source Anomaly Detection Tool “OSAS”

More than one hundred Russian companies were subjected to a cyber attack

Inadequate Cybersecurity

Corvus Insurance Enhances Digital Policyholder Experience with vCISO

Twelve South Launches ‘Forte’ MagSafe Charger Stand

Nomad Launches New Base Station Mini

Eve Debuts Thread-Enabled Eve Energy HomeKit Smart Plug

Editing Text in a PDF File

Automox raises $110M to help enterprises manage endpoints

Rewind extends SaaS data backup and recovery to Trello

Ransomware extortion demands are growing, and so is the downtime caused by attacks

Private Internet Access VPN’s 2-year subscription is 72% off

Linux kernel security uproar: What some people missed

Ransomware: don’t expect a full recovery, however much you pay

Parents Should Take Action to Protect Children from Cyber-Risks

AirDrop Is Leaking Email Addresses and Phone Numbers

Top Flaws in Typical Email Security Solutions

Perception Point Raises $28 Million Grow Collaboration Protection Platform

Apple Music Launches Top 25 Song Playlists for Over 100 Cities

Deals: Save 40% On the Adobe Creative Cloud Annual Subscription ($359.88 For Your First Year)

Apple Listed as ‘Leader’ In TIME’s Most 100 Influential Companies List of 2021

1-15 April 2021 Cyber Attacks Timeline

Why cybersecurity is a driver for commercial success in 2021

5 Best Practices for Conducting Cyber Security Assessments

Washington DC police force confirms data breach after ransomware upstart Babuk posts trophies to Tor blog

Toyota Buys Lyft’s Autonomous Car Unit for $550m

Apple Patches Zero-Day MacOS Bug That Can Bypass Anti-Malware Defenses

Apple Patches macOS Security Bypass Vulnerability Exploited by ‘Shlayer’ Malware

CISA, NIST Provide New Resource on Software Supply Chain Attacks

Cybersecurity Webinar: Understanding the 2020 MITRE ATT&CK Results

Hackers Threaten to Leak D.C. Police Informants’ Info If Ransom Is Not Paid

Ransomware hit Guilderland Central School District near Albany

Security Vulnerabilities in Cellebrite

Apple to Ban Apps That Reward Users For Enabling ATT Tracking

CocoaPods RCE Vulnerability Could Risk 3 Million Mobile Apps Including Signal

DC Police Department Hit by Apparent Extortion Attack

REvil Removes Apple Extortion Attempt from Site: Report

DC Police Extorted by Ransomware Gang Who Allegedly Stole Sensitive Law Enforcement Files

Hackers Exploit 0-Day Gatekeeper Flaw to Attack MacOS Computers

Russian Hackers Target Washington DC Police Department

Apple patches macOS zero-day exploited by malware for months (CVE-2021-30657)

Hackers hold D.C. police data for ransome

Buying cyber insurance in 2021? Expect greater scrutiny, higher premiums

Twitter Removes Critical Tweets Of Indian Government Covid Response

Former Post Office Boss Apologises After Horizon Scandal

HashiCorp revoked private key exposed in Codecov security breach

FCW Insider: April 27, 2021

Quick Hits

Adobe releases open source ‘one-stop shop’ for security threat, data anomaly detection

Ransomware Group Threatens DC Cops with Informant Data Leak

Private Equity Giant Snaps Up Proofpoint for $12.3 billion

FBI, CISA Uncover Tactics Employed by Russian Intelligence Hackers

APT trends report Q1 2021

Apple’s ‘M2’ Next-Gen Mac Chip Enters Mass Production, Expected to Debut in Redesigned MacBooks Later This Year

EU Likely to Charge Apple With Anti-Competitive Behavior This Week

macOS 11.3: How to Use Two HomePods With a Mac for Stereo Audio Output

Thoma Bravo to acquire Proofpoint in a $12.3B transaction

Password manager hijacked to deliver malware in supply chain attack

15 open source GitHub projects for security pros

Foxconn Scales Back $10bn Wisconsin Factory

Define, Reinforce and Track: Helping Develop Positive Cybersecurity Habits

Apple’s AirDrop Comes with a Security Flaw

250 Million Americans Sensitive Data Leaked Online by Pompompurin

Microsoft Defender uses Intel TDT technology against crypto-mining malware

Networks Are Becoming Cloud-centric. Network Security Must Adapt.

Report: Apple’s ‘M2’ Next-Gen Mac Chip Enters Mass Production

Wormable Malware Comes Back As ‘WhatsApp Pink’ – Now Targets Signal, Telegram Too

Homebrew Package Manager Vulnerability Could Allow Code Execution Attacks

Scraping And Social Media Leaks | Avast

WhatsApp For What? Spammers Bomb User Inboxes With Fake Adult-Themed Opportunities

What’s Next for Connected Devices in Health Care?

Is It Ethical To Buy Breached Data?

Securing Health Care Transformation

Application security testing is not just buzzwords

Remembering Dan Kaminsky | Avast

Patched Exchange to head off Hafnium? You might only be halfway to safety

Shlayer macOS malware abuses zero-day to bypass Gatekeeper feature

Codebar Festival | Avast

4 common ways scammers use celebrity names to lure victims

Contextual Biometrics for Improved Application Security

Avoid these CSPM mistakes to increase your cloud security posture

Attackers can teach you to defend your organization against phishing

Organizations can no longer afford to overlook encrypted traffic

The Delicate Balance of Security Versus Usability

Best practices for businesses to stay safe online this tax season

What is a cybersecurity strategy and how can your business develop one?

Signal CEO Highlights Vulnerabilities In Cellebrite Software

How Retailers Navigate Through Unpredictability And New Risks

16% of mobile devices in developing markets now infected with malware

Research directions in cybersecurity to support a digital strategic autonomy

ISC Stormcast For Tuesday, April 27th, 2021 https://isc.sans.edu/podcastdetail.html?id=7474, (Tue, Apr 27th)

A data-driven look at the key developments shaping the future of work

Trends in the evaluation and implementation of enterprise AI adoption

UnitingCare Queensland security incident takes some systems offline

Officials Say School District Near Albany Hit by Cyberattack

Diving into a Singapore Post Phishing E-mail, (Tue, Apr 27th)

TrustGrid unveils digital vaccine passport for identity authentication and vaccination status

Auth0 Organizations enables providers of B2B SaaS apps to manage their business customers

Trend Micro Warns Users For Active Exploitation Of An Already-Patched Bug

Three SonicWall Zero-Day Bugs Under Active Attack – Patches Deployed – Update Now

Hashicorp revoked private key exposed in Codecov security breach

AttackForge Core: A pentest management solution for consultancies and medium-sized enterprises

Private equity firm Thoma Bravo to spend $12.3 billion on Proofpoint acquisition

NTLM Relay Attack Abuses Windows RPC Protocol Vulnerability

Apple’s iPhone Privacy Clampdown Arrives After 7-Month Delay

N-able N-central integrates with Microsoft Intune helping MSPs protect clients’ apps and devices

Accenture and SAP extend partnership to help businesses capture value from sustainability

NASA’s bold bet on Starship for the Moon may change spaceflight forever

Apple releases iOS 14.5, the biggest update since iOS 14 first launched

Pentagon explains odd transfer of 175 million IP addresses to obscure company

Hackers Used ‘Mind-Blowing’ Bug to Sneak Past macOS Safeguards

How biometrics is moving from verifying identity to verifying humanity

openSUSE: 2021:0621-1 important: MozillaFirefox>

University of Minnesota researchers issue apology letter to the Linux community>

Minified Linux Offerings Boost Containers and Edge Processing>

Protect Your WordPress Sites with CrowdSec>

Cybersecurity World Mourns Over Security Researcher Dan Kaminsky’s Passing>

The Linux Foundation’s demands to the University of Minnesota for its bad Linux patches security project

US Urges Organizations to Implement MFA, Other Controls to Defend Against Russian Attacks

iOS 14.5: How to Set a Preferred Music Streaming Service With Siri

SAIC acquires Koverse to strengthen its AI and analytics capabilities

ACRE acquires TDS to accelerate growth plans and expand competitive position

Generated on 2021-04-28 23:55:32.012333