BOOK THIS SPACE FOR AD
ARTICLE AD28. July 2021
Defending IT infrastructure with analytics
ARPA and the infrastructure bill don’t look like calls for advanced analytics – but they are
Florida taps education analytics platform to boost employment
Former Facebook Insider Says The Company Profits Too Much From Misinformation To Change
BlackMatter, a new ransomware group, claims link to DarkSide, REvil
Biden orders CISA and NIST to develop cybersecurity performance goals for critical infrastructure
New ‘BlackMatter’ ransomware gang has echoes of REvil
Ministerio de Educación de Costa Rica obtiene una mejor visibilidad de su infraestructura
Why You Need to Get Serious About Multi-Factor Authentication
Cybersecurity in Supply Chain Management, Risks to Consider
Lawmakers Seek To Hold Facebook Accountable For Harmful Content
US, UK, and Australian agencies warn of top routinely exploited issues
Hushpuppi Pleads Guilty: Sentence Estimate? 11-14 Years
Many U.S. Apple Retail Stores Again Require Customers to Wear Masks
Should Congress Close the FBI’s Backdoor for Spying on American Communications? Yes.
Security breaches where working from home is involved are costlier, claims IBM report
8 Security Tools to be Unveiled at Black Hat USA
A vaccine requirement for feds could get complicated
BlackMatter & Haron: Evil Ransomware Newborns or Rebirths
Best practices for user access review
BSides Vancouver 2021 – Rob Slade’s ‘Presenting Technical Evidence In Court’
Nintendo Discontinuing Dr. Mario World iOS Game
Payment Security: Understanding the Four Corner Model
TSA ramps up fuel pipeline cyber strategy
Apple Says Don’t Buy AirTag Replacement Batteries With Bitter Coating
Google Reveals ‘New Chapter’ For Bug Bounty Program
Average organization targeted by over 700 social engineering attacks each year: report
Reboot of PunkSpider Tool at DEF CON Stirs Debate
Data breach costs hit record high due to pandemic
US Acting to Better Protect Infrastructure From Cyberthreats
Unhacked: 121 tools against ransomware on a single website
Good catch in joint actions targeting illegal fishing
Stylish Magento Card Stealer loads Without Script Tags
Apple Considering Vaccination Requirement for Employees Returning to Offices
EFF at 30: Freeing the Internet, with Net Neutrality Pioneer Gigi Sohn
macOS Malware Now Steals Account Logins Of Telegram, Chrome, And More
Apple Releases New Public Betas of iOS 15, iPadOS 15, watchOS 8, and tvOS 15
Apple Releases New macOS 12 Monterey Public Beta
Lawfare Live: What’s Going on With Jan. 6 Congressional Investigations and Civil Litigation?
The Olympics: a timeline of scams, hacks, and malware
The State of Blockchain Applications in Cybersecurity
BSides Vancouver 2021 – Michael Cavallin’s ‘Attacking Zero Trust Designs In 2021’
Google Maps Gains Home Screen Widgets on iPhone
Four Questions about SASEDay 21 with Bitglass’ Kevin Sheu
Bitglass Security Spotlight: Misconfigured, Unsecured Cloud Platforms and Averted Attacks
The Future of Work is Hybrid – Is Your Security Ready?
Native Security: Cure or Disease?
How to be safely connected while travelling?
Facebook Pauses Sales Of Oculus Quest 2 VR Headset Over Skin Complaints
Hackers posed as aerobics instructors in malware attack on defense contractors
Open Source is Revolutionizing Careers in Cybersecurity – What You Need to Know>
How the Dark Web enables access to corporate networks
Several Security Flaws Found in 3 Open-Source Software
No More Ransom Saves Victims Almost €1B Over 5 Years
Signal Patches Zero-Day Bug in its Android App
Chinese cyberspies used a new PlugX variant, dubbed THOR, in attacks against MS Exchange Servers
Think twice before using Olympics sports in your password
Zero Trust Adoption Report: How does your organization compare?
Microsoft Windows and Linux machines are vulnerable to LemonDuck Malware
In the First Half of 2021, HP Found that 75% of Threats Came via Email
LockBit Now Encrypts Windows Domains Using Group Policies
US Gov Warning: VPN, Network Perimeter Product Flaws Under Constant Attack
Foxit Plugs Multiple Security Holes in PDF Reader, Editor
Anitian Recognized as a Vendor in Three Gartner Hype Cycle Reports
How to cyber security: Addressing security fatigue
Apple Supplier TSMC Readies 2nm Chips for 2024
New cybersecurity technique keeps hackers guessing
Microsoft Thrives Thanks To Azure Growth
The Hacker Mind Podcast: Hacking Charity
Hands-On With Sonnet’s DuoModo Modular Desktop Enclosures and eGPU
Cyber Asset Management Platform Noetic Launches With $20 Million in Funding
World-Class OTT Streaming from MwareTV with Akamai
Software-Defined Networking Concept Adoption at Akamai
Apple Posts Record Breaking Profit, But Warns Of Chip Shortage
5 must-try user flow diagramming tools for UX designing 2021
It’s All About You: McAfee’s New All-Consumer Focus
AST New 100% Mobile Friendly Magazine Now Live (Multi-Video)
Leveraging People in the Email Security Battle
Hospital Network Reveals Cause of 2020 Cyberattack
IBM Cost of a Data Breach study: average Cost of Data Breach exceeds $4.2M
Deals: Amazon Taking Up to $100 Off 2021 iPad Pro Models
Cybersecurity for Small Businesses. What Can You Do to Protect Your Business from Cyber Threats?
Survey Shows Reasons for Cloud Misconfigurations are Many and Complex
Fake Windows 11 Installers are Being Used to Spread Malware
Hackers Applying HTML Smuggling To Distribute Malware
Cyberattacks Zero in Tokyo Olympics as Games Begin
Boosting performance with network monitoring solutions
Ermetic Joins AWS ISV Accelerate Program to Streamline Customer Experience
Put Your AppSec Program in the Fast Lanes with the New NIST Standards for Security Testing.
CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable
What is Malware? How to Prevent & the Different Types
Apple Demands Leaker Reveals Sources Under Threat of Being Reported to Police
Latest Top 5 Dark Web Search Engines for 2021
Get patching: US, UK, and Australia issue joint advisory on top 30 exploited vulnerabilities
Will Washington Face a Reckoning Over Taiwan?
UDP Technology IP Camera firmware vulnerabilities allow for attacker to achieve root
Intel Warns Chip Shortage Could Last Until 2023
Noetic Cyber raises $20M to automate cybersecurity remediation
Studies show cybersecurity skills gap is widening as the cost of breaches rises
University of San Diego Health Says Personal Information Stolen in Data Breach
UBEL is the New Oscorp — Android Credential Stealing Malware Active in the Wild
Let’s Duo It Again: Why I Returned to Duo for a Second Internship
Biden Warns Cyberattacks Could Lead To ‘Shooting War’
Cybersecurity for Small Businesses. What Can You Do to Protect Your Business from Cyberthreats?
Cyolo raises $21M for zero trust networking tech
Iranian Spies Maintained Social Media Persona for Years Before Targeting Defense Contractor
Top Routinely Exploited Vulnerabilities
Top Routinely Exploited Vulnerabilities
Hybrid work is here to stay – but what does that mean for cybersecurity?
Making Authentication Safer and Simpler for Customers
Signal Zero-Day Bug Allows for Sending Unintended Images To Contacts
Numerous Vulnerabilities Discovered In Telegram Encryption Protocol
Numerous web apps found vulnerable to DNS cache poisoning via ‘forgot password’ feature
IBM: Average Cost of Data Breach Exceeds $4.2 Million
Top 5 Benefits of Cloud Infrastructure Security
LogRhythm NextGen SIEM for Electricity Utility
What Does It Take to Be Secure with Multi-Factor Authentication?
Telegram Zeek, you’re my main notice
China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road
BlackMatter Ransomware Emerges As Successor to DarkSide, REvil
Data Breach Costs at Record High, Zero Trust, AI and Automation Help Reduce Costs
Podcast: Why Securing Active Directory Is a Nightmare
In 1st Visit to Intel Agency, Biden Warns of Cyber Conflict
Chinese Hackers Implant PlugX Variant on Compromised MS Exchange Servers
iOS 15 to Limit Siri Functionality With Third-Party Apps
LockBit Ransomware Is Now Encrypting Windows Domains
UC San Diego Health Discloses Data Breach
These hackers posed as an aerobics instructor online to trick their targets into downloading malware
Biden: Major cyber attack could lead to a ‘real shooting war’
Hackers Posed as Aerobics Instructors for Years to Target Aerospace Employees
Microsoft Teams Users Get Extra Phishing Protection
READY for What’s New at (ISC)² Security Congress in 2021?
Security Risk Scores: Fast, Slow, And Adaptive
Cyber Insurance Firm At-Bay Raises $185 Million at $1.35 Billion Valuation
Mitre D3FEND explained: A new knowledge graph for cybersecurity defenders
How to review password quality in Active Directory
Microsoft adds Safe Links phishing protection to Microsoft Teams
Why you need to urgently update all your iPhones, iPads, and Macs – NOW!
(ISC)² announces keynote speakers for Security Congress 2021
‘For All Mankind’ Season 4 May Have Already Been Signed Off By Apple, Writers Guild Suggests
Praying Mantis hacker group strikes IIS web servers
Cost of a data breach hits record high during the pandemic
Mimecast Makes Security Training a Laughing Matter
Racing car dealership says PwC failed to spot fraud
Looking for adding new detection technologies in your security products?
The Next Disruptive ICS Attack: 3 Likely Sources for Major Disruptions
Cloud Compliance Best Practices: A Quick Overview
No More Ransom Saves Victims Nearly €1 billion Over 5 Years
Colonial Pipeline Hinted at Critical Infrastructure Threat
BlackMatter ransomware group claims to be Darkside and REvil succesor
What’s New in the 2021 Cost of a Data Breach Report
Phishers targeting everyone, from sales staff to C-suite execs
Google revamps bug bounty program
10 Best Free Password Manager to Secure Your Password For 2021
A New Remote Zero-Trust Platform is Needed
Critical infrastructure pain points: The toughest challenges
Over 100 active ransomware groups are on FBI Tracking Radar
Joe Biden says cyber attacks could easily trigger a shooting war
How security leaders can build emotionally intelligent cybersecurity teams
Trending cybercrimes and the big impact of lesser-known breaches
Where does the SME fit into a supply chain attack?
Confidence redefined: The cybersecurity industry needs a reboot
Biden warns ‘real shooting war’ will be sparked by severe cyber attack
The Role of Culture in Compliance
How Digital First will revolutionise the customer EMV card issuance journey
Enterprise data breach cost reached record high during COVID-19 pandemic
Exposing the latest cloud threats affecting enterprises
Consumers are increasingly concerned about online security and imminent attacks
Executives have increased business analytics usage
Neustar UltraBot Protect provides more visibility into application layer traffic
Stellar Cyber’s AI-driven incident correlation increases attack detection efficiency
Ivanti Neurons for Zero Trust Access enhances cybersecurity in the everywhere workplace
Move of BLM headquarters to Colorado still under review
Box Sign delivers unlimited signatures to customers at no additional cost
Katalon TestOps enhances collaboration between development and QA teams
Infinipoint DIaaS solution offers zero trust security posture for devices
Axie Infinity Player Wallets Targeted by Poisoned Google Ads Content
Apple releases patch for zero‑day flaw in iOS,iPadOS and macOS
Corero Network Security expands DDoS protection portfolio with ETD capability
Tencent suspends signups to WeChat, citing ‘security upgrade’ and need to comply with Chinese laws
EMQ X Cloud now available on Microsoft Azure to help users carry out their IoT projects with MQTT
Hunting IcedID and unpacking automation with Qiling Framework
Owl Labs collaborates with Bechtle to expand its presence within key European markets
RtBrick adds new open hardware support to increase broadband performance
Biden: If U.S. has ‘real shooting war’ it could be result of cyber attacks
Clubhouse Opens Its Doors. Is Anyone Rushing to Get In?
Pegasus spyware is just the latest tool autocrats are using to stay in power
Microsoft introduces new phishing protections in Teams
TikTok to open cyber-security centre in Ireland
Top cyber officials testify on growing ransomware threat
eBay ex-security boss sent down for 18 months for cyber-stalking, witness tampering
New AI tools aim to improve live-stream content moderation
Cryptomathic and UTIMACO deliver QES solution for banks, governments and trust service providers
LemonDuck Shows Malware Can Evolve, Putting Linux and Microsoft at Risk
Deloitte acquires TransientX to expand its zero trust solutions
Radiant Logic participates in NIST’s NCCoE Zero Trust Architecture project
NIST selects Ivanti on Implementing A Zero Trust Architecture project
Anna Convery joins Jumio as CMO
Elizabeth Rafael joins Informatica Board of Directors
Cloudflare’s Project Pangea helps underserved communities expand access to the internet for free
Spectro Cloud raises $20M to improve its product and services for customers
Wiliot raises $200M to grow its team and create new IoT products
Google announces new bug bounty platform
Apple Expecting iPhone and iPad Supply Constraints in September Quarter
Apple Saw Double Digit Growth in iPhone Upgraders and Switchers in Q3 2021
IT Security News Daily Summary 2021-07-27
NASA ships satellite mission data to the cloud
US needs combat cloud to bolster warfighting collaboration
COVID cloud data fuels virus studies
No More Ransom Saves Victims Nearly €1 Over 5 Years
Frequently asked questions on Extended Detection and Response
Apple’s Services Revenue Reaches $17.5 Billion in Q3 2021, Setting New All-Time Record
Flaws in Zimbra could allow to takeover webmail server of a targeted organization
Apple Reports 3Q 2021 Results: $21.7B Profit on $81.4B Revenue, New June Quarter Records
Apple’s Mac and iPad Sales Continue to Surge in Q3 2021
Scam-baiting YouTube channel Tech Support Scams taken offline by tech support scam
Microsoft warns of PetitPotam attack taking over Windows domains
Box unveils unlimited e-signature capabilities
A importância da análise de comportamento na segurança cibernética da sua organização
The Joy of Tech® ‘How Stupid Can It Get?’
In Case You Missed It: 2 Cyber Expert Webinars Now Available On-Demand
BSides Vancouver 2021 – Amiran Alavidze’s ‘Securing Kubernetes In The Cloud’
COVID-19 2021 Wave Mapped to 1854 Kansas-Nebraska Act Votes
EFF Sues U.S. Postal Service For Records About Covert Social Media Spying Program
CODESYS Patches Dozen Vulnerabilities in Industrial Automation Products
Transnet Suffers Ransomware Attack, Halts Port Operations
Machine Learning Testing for Data Scientists
Use a decentralized identity framework to reduce enterprise risk
iPadOS 15 Gains macOS Monterey’s Redesigned Safari Tab Interface
macOS Monterey Beta 4 Brings Live Text to Intel-Based Macs
EvilModel – New Method to Secretly Deliver Malware Via Neural Networks To Evading Antivirus Engines
‘Praying Mantis’ threat actor targeting Windows internet-facing servers with malware
Zimbra Server Bugs Could Lead to Email Plundering
Two New Games Coming to Apple Arcade, Including Gameloft’s Racing Classic ‘Asphalt 8: Airborne’
Apple Seeds Fourth Beta of tvOS 15 to Developers
Apple Seeds Fourth Beta of watchOS 8 to Developers
Apple Seeds Fourth Betas of iOS and iPadOS 15 to Developers
Apple Seeds Fourth Beta of macOS 12 Monterey to Developers
House Select Committee Investigating Jan. 6 Holds Its First Hearing
Open source web app projects hailed for quickly patching bugs
Kaseya Unitrends has unpatched vulnerabilities that could help attackers expand a breach
How Digital ID can help citizens access government services from anywhere
Newark Releases Latest Global IoT Trends Report
Google Paid Over $29 Million in Bug Bounty Rewards in 10 Years
A Controversial Tool Calls Out Vulnerabilities Across the Web
CISA Releases Security Advisory for Geutebruck Devices
The Evolution of Security Testing
BSides Vancouver 2021 – Rose’s ‘The Overlooked Security Risk: 3rd Party Risk Management’
What is a DDoS Extortion Attack and How do you Respond to it?
The Clubhouse database “breach” is likely a non-breach. Here’s why.
TikTok Cybersecurity Hub in Dublin
Three Zero-Day Bugs Plague Kaseya Unitrends Backup Servers
How to create a positive and effective cybersecurity environment instead of a shame culture
Microsoft Rushes Fix for PetitPotam Attack PoC
New Bug Could Let Attackers Hijack Zimbra Server by Sending Malicious Email
AWS Hires Investigators After Gender Discrimination Petition
Old crypto malware makes come back, hits Windows, Linux devices
Hyten: Combat cloud would bolster collaboration with allies, partners
TMF could help solve records request backlog for veterans, lawmakers say
HASC cyber subcommittee pushes mandatory legacy IT audit in defense bill
Brazil Establishes Cyberattack Response Network
Fake Windows 11 Installers are Used by Scammers to Distribute Malware
Persistent Cyberattacks Put Hospitals’ Finances at Risk
Apple Patches Zero-Day Vulnerability in macOS, iOS, and iPadOS
Vulnerabilities Allow Hacking of Zimbra Webmail Servers With Single Email
Mobile County Officials Informs County Employees of Data Breach
Threat Intelligence in SecureX: Fast, Free, or Easy (pick any three)
DevSecOps Best Practices in Identity and Data Security
New Collaboration with Adobe and MAPP
TSMC: Too Early To Consider German Chip Factory
Army tests climate model in Azure cloud
Best VPN 2021: Top VPN services reviewed
HP finds 75% of threats were delivered by email in first six months of 2021
Microsoft warns of credential-stealing NTLM relay attacks against Windows domain controllers
Ukrainian Authorities Confiscated Unencrypted VPN Servers
Microsoft Reveals Enhanced LemonDuck Malware Targeting Windows and Linux
Build developer trust with faster, accurate AppSec testing from Rapid Scan
South Africa’s logistics company Transnet SOC hit by a ransomware attack
Jeff Bezos Offers NASA $2 Billion For Lunar Contract
1Password Raises $100 Million at $2 Billion Valuation
Olympics Broadcaster Announces His Password On Live TV
VPN Servers Seized By Ukrainian Authorities Weren’t Encrypted
Microsoft Rushes Fix For PetitPotam Attack PoC
Babuk Ransomware Gang Ransomed
Researchers Struggle to Use Apple Watch in Studies Due to Sudden Algorithm Changes
What is a Security Theatre and How Is It Impacting the Organisations
Apple Patches Actively Exploited Zero-Day in iOS, MacOS
Apple emergency zero-day fix for iPhones and Macs – get it now!
Apple Releases Security Updates
The XDR Advantage: Eliminate Dwell Time and Gain Visibility
Deals: Apple’s 11-Inch iPad Pro Magic Keyboard Drops to $239.19 on Verizon ($60 Off)
Instagram to Begin Defaulting Accounts for New Users Under the Age of 16 to Private
How To Build Privacy Into Your Company’s Core Values
Critical Vulnerability Found in Sunhillo Aerial Surveillance Product
Cybersecurity investments surge in 2021 as VCs go all in
The Shapeshifting Cam Girl Rewriting the Rules of Porn
Meet Thundra Foresight: Your CI Observability Tool!
The Biden Administration Joins the Military Justice Reform Debate as It Heats Up in the Senate
36% of Organizations Experienced Cloud Misconfigurations in the Past Year
A new chapter for Google’s Vulnerability Reward Program
Threat Actors Exploit Misconfigured Apache Hadoop YARN
New LemonDuck Malware Attack Windows & Linux Systems for Mining & Stealing Activities
Best Mac VPN 2021: VPN services for Apple devices
Kaseya Denies Paying Cybercriminals Who Launched Ransomware Attack
Hackers Turning to ‘Exotic’ Programming Languages for Malware Development
Several Bugs Found in 3 Open-Source Software Used by Several Businesses
DIVD discloses three new unpatched Kaseya Unitrends zero-days
Unpatched Kaseya Unitrends Backup Vulnerabilities Could Be Dangerous
Israeli Pegasus spyware saga could sow diplomatic rifts in Africa
APT group hits IIS web servers with deserialization flaws and memory-resident malware
What is a VPN and Can it Hide My IP Address?
Vulnerability in Popular Survey Tool Exploited in Possible Chinese Attacks on U.S.
ThreatX: Great Place to work-certified!
Apple Releases Safari 15 Beta for macOS Catalina
4 Tips for Reducing Your Company’s Cyber Exposure
Relevance Requires More than Just Paying Attention
Half of vulnerabilities Singapore government finds via bounties, disclosures are valid
Time to update your iPhone as Apple fixes ‘actively exploited’ zero day flaw
S.Africa’s Port Terminals Still Disrupted Days After Cyber-Attack
3.8 Billion Phone Numbers of Clubhouse Users up for Sale on Dark Web
WhatsApp CEO: US Allies’ National Security Officials Targeted with NSO Malware
Q2 2021 Report by Digital Shadow, Abridged
Maps in iOS 15 Now Factors Weather Warnings into Suggested Routes
The Pegasus spyware saga could sow diplomatic rifts in Africa
Microsoft Predicts 40 Percent May Quit Their Jobs
Password management platform 1Password raises $100M as business booms
Why Are Users Ignoring Multi-Factor Authentication?
Zero-Day Vulnerability Impacting iOS, iPadOS, and macOS Fixed by Apple
Kaseya Denies Paying REvil Hackers For Decryption Tool
Creating an Effective Threat Hunting Program with Limited Resources
Microsoft Teams just got this new protection against phishing attacks
Malware developers turn to ‘exotic’ programming languages to thwart researchers
7 tenets of zero trust explained
18 new cybersecurity bills introduced as US congressional interest heats up
Hackers flooded the Babuk ransomware gang’s forum with gay porn images
South Africa port operations halted and workers reportedly put on leave after major cyberattack
Malicious npm Packages Steal Chrome Browser Passwords
ANAO: Auditing not driving improvements in Commonwealth cybersecurity adherence
Major Australian Healthcare Insurance Companies Now Support Apple Wallet
IBM z/OS V2.5 strengthens security and drives app modernization projects
Chrome Ditched Redesign That Was Similar to Safari in iOS 15, Says Former Google Employee
NHS COVID passes targeted by scammers
Want to add antivirus to your existing portfolio?
How Network Segmentation Can Protect Supply Chains from Ransomware Attacks
CTCI a Game-Changer for Threat Intel
Realme Planning to Launch ‘MagDart’ Magnetic Charger As Android Equivalent to Apple’s MagSafe
Discord targeted to spread malware
TikTok to open new cybersecurity centre in Dublin
Application security testing is not just buzzwords
Ghidra 101: Loading Windows Symbols (PDB files) in Ghidra 10.x
Apple Releases Urgent 0-Day Bug Patch for Mac, iPhone and iPad Devices
Enterprise Security Essentials
It takes intuition and skill to find hidden evidence and hunt for elusive threats
DevilsTongue Malware matches Pegasus Spying Software
Airlines under constant threat of Cyber Attacks says Eurocontrol Data
Phishing Used to Get PII, not Just Ransomware
36% of organizations suffered a serious cloud security data leak or a breach in the past year
How to prevent corporate credentials ending up on the dark web
IT expert: How To Avoid being Tracked by Photos
Product showcase: ManageEngine Vulnerability Manager Plus
Turning the tide on surging account takeovers in the media industry
Apple Patches for CVE-2021-30807, (Tue, Jul 27th)
CISOs operating blind, with limited visibility and control
Consumer attitudes towards various digital identity authentication methods
SSD belonging to Euro-cloud Scaleway was stolen from back of a truck, then turned up on YouTube
Cybersecurity Insurers Are Putting an End to the ‘Pass the Buck’ Era
Consumer expectations of digital services increased since early 2020
Black Hat USA & DEFCON 2021 Coverage on LinuxSecurity: What You Need to Know>
Of course you can’t trust scientists on politics
It’s Time to Rethink Outage Reports
Could the LGBTQ Community Be a Target of Internet Threat Actors?
Judge: Ex-CIA Worker Can Represent Himself in Espionage Case
Bosch provides conferencing and interpretation equipment for high-profile meetings
VPN servers seized by Ukrainian authorities weren’t encrypted
Of course you can’t trust scientists on politics
Apple patches zero-day vulnerability in iOS, iPadOS, macOS under active attack
Tesla CEO Elon Musk Takes Shots at Apple During Earnings Call
Blue Hexagon integrates with AWS Network Firewall to offer protection against unknown cloud threats
Dan Kaminsky’s death leaves vacancy among holders of ‘keys to the internet’
Generated on 2021-07-28 23:55:25.961576
By continuing to use the site, you agree to the use of cookies. more information