2. August 2021

NSA outlines Wi-Fi safety best practices

CISA launches vulnerability disclosure platform

Defending against attacks on vehicle networks

COVID-19 vaccine portal for Italy’s Lazio region hit with cyberattack

Do You Trust Your Smart TV?

Apple Decided Not to Buy Reese Witherspoon’s ‘Hello Sunshine’ Media Company

Household data of 35 million US residents exposed in database mess up

‘PwnedPiper’: Devastating Bugs in >80% of Hospital Pneumatics

Network security in the return-to-work era

Apple Can’t Escape Apple Watch Heart Rate Sensor Patent Lawsuit, Court Rules

Workers Are Taking Cybersecurity Shortcuts, Despite Knowing Dangers

PwnedPiper flaws in PTS systems affect 80% of major US hospitals

Cloud Security Automation: The Fastest Path to Zero Trust

No, You Don’t Need

Taking Back Control of Today’s Software Supply Chain

How to Accelerate SecOps efficiency and extend capabilities with XDR

Security updates for Samsung devices this August

Chromebook’s Safety Check – check passwords, extensions and security

Hacker Downloaded 286,000 ID Photos From Government Database

Chipotle Emails Serve Up Phishing Lures

Twitter Rolls Out Sign in With Apple on iPhone and iPad

Zoom Agrees To $85 Million Privacy Settlement Over Sharing Data With Facebook, Other Tech Companies

New Normal Demands New Security Leadership Structure

iOS 15: How to Get AR Walking Directions in Maps

Credit-card-stealing, backdoored packages found in Python’s PyPI library hub

Cybersecurity Lessons from the Pandemic: Why Not

Working Apple-1 Computer, and Jobs’ Leather Bomber Jacket and Other Apple Memorabilia Going up for Auction

Hopper – The Security Tool That Protects Enterprises From Lateral Network Movement

BrandPost: Improving Cybersecurity as a Team

US Cyber Games and TikTok turn cybersecurity into an esport

Enable secure DNS on your Chromebook: Here’s how

Responsible Cyber Offense

Why Trump Cannot Hide Behind Presidential Immunity for Inciting an Insurrection

Cybersecurity shortage — How to find qualified cyberattack defenders

Potential RCE Flaw Patched in PyPI’s GitHub Repository

This Vulnerability in E-Learning Platform Moodle Could Even Modify Exam Results

Deals: Verizon’s New Sale Lets You Build Your Own Accessory Bundle and Get Up to 50% Off

Google Previews Upcoming Pixel 6 With Custom Tensor SoC, Rear Camera Bar, In-Display Fingerprint Sensor and More

City Officials of Grass Valley Negotiates with the Handlers of Ransomware Attack

Champion Spotlight: Hans Dam

Security BSides Athens 2021 – Talk 2: Anastasios Pingios’ ‘Analysis Of The GR TLD Cyber Espionage Operation’

Unreleased Apple Macs and Apple Watches Listed in Eurasian Database Ahead of Fall Product Launches

How can eSIM help overcome the challenges of IoT connectivity activation?

MWC Barcelona 2021 – Highlights from the biggest mobile trade show

Set up an SSH tarpit in Ubuntu Server 20.04: Here’s how

OT Security Firm Nozomi Networks Raises $100 Million

Vulnerability Summary for the Week of July 26, 2021

Data breach news trending on Google Search Engine

CDW acquires cybersecurity company Focal Point Data Risk

A week in security (July 26 – August 1)

SolarWinds Actors Hacked 27 State Attorneys’ Offices in the U.S.

How data-driven patch management can defeat ransomware

Chipotle’s Email Marketing Account Hacked to Spread Malware

Detect What Others Miss with CESA

NOW AVAILABLE: Introducing Thundra Sidekick Python Support

New Report Shows Global Ransomware Volume Reached 304.7 Million Attempted Attacks in the 1st Half of 2021

Nuisance call-blocking firm fined £170,000 for making almost 200,000 nuisance calls

DarkSide Ransomware Gang Re-emerge As BlackMatter

Data-driven ransomware strategy is the only way to scale

Behind the scenes: A day in the life of a cybersecurity expert

Cybersecurity M&A Roundup: 38 Deals Announced in July 2021

Deals: Get Apple’s 512GB M1 Mac Mini for Record Low of $799 on Amazon ($100 Off)

Wi-Fi 6E Explained: What It Could Mean for iPhone 13 and Beyond

Russia’s SVR WellMess Malware Is Seemingly Still in the Game

FBI Is Warning Investors of Fraudsters Posing as Brokers

PwnedPiper Vulnerabilities Found in Swisslog’s Translogic Pneumatic Tube System

Windows 11 is the COVID-19 vaccine for your PC

Amazon Fined $886M for Alleged Data Breach

Cybercriminals Leaked Full Data Dump Stolen from EA

PwnedPiper Threatens Thousands of Hospitals Around the World

An Optimisation Story: Building a Code Scanner for Large Golang Apps

Novel Meteor Wiper Used In Attack That Crippled Iranian Train System

SolarWinds Attackers Breached Email Of US Prosecutors, Says Department Of Justice

Microsoft Warns Of Sneakier Than Usual Phishing Attack

CISA Launches Own Vulnerability Disclosure Program

Apple Leaps Up Fortune Global 500 Rankings

U.S. Justice Department Says Russians Hacked Federal Prosecutors

Foreigners Able to Register on Flawy Vaccination Site Despite Data Leaks

Browser Notification Spam Tricks Clicks for Ad Revenue

7 Safety Tips to Schooling in a Digital World

Data-driven ransomware is the only way to scale

NSA Warns Public Networks are Cybercriminals Playground

Zoom Pays $86 Million to Settle U.S. Privacy Lawsuit

Cisco, Sonatype and Others Join Open Source Security Foundation

Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System

The AWS Shared Responsibility Model: Everything You Need to Know

Malicious Life Podcast: The State of Credit Card Security

What the Growing Costs of a Data Breach Means for the Business

Companies search for cyber workers after ransomware attacks

Security Experts Tie Covert Wiper Tool to Iranian Railway Infrastructure Hacking Attempt

IoT: Security researchers warn of vulnerabilities in hospital pneumatic tube systems

A Cold War is raging in cyberspace. Here’s how countries are preparing their defenses

Microsoft: Watch out for this ‘sneakier than usual’ phishing attack

The cybersecurity jobs crisis is getting worse, and companies are making basic mistakes with hiring

Stop ignoring this iPhone warning

Amazon Fined 746 Mn Euros in Luxembourg Over Data Privacy

Armis identifies PwnedPiper vulnerabilities in Swisslog’s Translogic Pneumatic Tube Systems

New WeTransfer phishing attack spoofs file-sharing to steal credential

PwnedPiper PTS Security Flaws Threaten 80% of Hospitals in the U.S.

FBI Finds Over 100 Active Ransomware Variants

NSA Shares Guidance for Government Employees on Securing Wireless Devices in Public

Join the panel: Shifting security left with DevSecOps

The European Space Agency Launches Hackable Satellite

A week in security (July 19 – August 1)

PwnedPiper vulns have potential to turn Swisslog’s PTS hospital products into Swiss cheese, says Armis

FCW Insider: Aug. 2, 2021

SolarWinds attackers breached email of US prosecutors, says Department of Justice

Flaws in Pneumatic Tube System Can Facilitate Cyberattacks on North American Hospitals

New APT Hacking Group Targets Microsoft IIS Servers with ASP.NET Exploits

Emails from 27 US Attorneys’ Offices Breached by the SolarWinds Hackers

Check Point Software breaks down modern-day cloud attacks at Black Hat USA 2021

Ransomware operators love them: Key trends in the Initial Access Broker space

BlackMatter Ransomware Claims to Be a Successor to DarkSide and REvil

Basic flaws put pneumatic tube transport systems in hospitals at risk

Introducing ‘Known Distributors’

Regulator Rejects Blue Origin’s NASA Lunar Contract Challenge

Elon Musk Sides With Epic In Apple App Store Fees Dispute

GitLab’s open source Package Hunter detects malicious code in dependencies

PwnedPiper threatens thousands of hospitals worldwide, patch your systems now

Zoom to Settle US Privacy Lawsuit for $85 Mn

Solarmarker InfoStealer Malware Once Again Making its Way Into the Wild

PyPI Python Package Repository Patches Critical Supply Chain Flaw

YouTube Tests Cheaper ‘Premium Lite’ Subscription for Ad-Free Viewing

Critical vulnerabilities may allow attackers to compromise hospitals’ pneumatic tube system

Hackers Could Get Windows Admin Privileges Through a Remote Print Server

London Underground to get full mobile coverage

Nozomi Networks raises $100M to protect critical infrastructure

Stop ignore this iPhone warning

Polish Border Guard arrest 16 after discovery of illegal cigarette factory

Malevolent PyPI Packages Detected Filching Developer Data

Hospitals Still Use Pneumatic Tubes—and They Can Be Hacked

Thunderbolt 5 Could Offer Up to 80 Gbps Bandwidth, Intel Leak Suggests

5 riskiest mobile apps

CompTIA Security+: Prerequisites, obectives, and cost

Rick Astley Video Rolls Up 1 Billion Views On YouTube

Twitter Offers ‘Bug Bounty’ Contest For AI Biases

More evidence suggests that DarkSide and BlackMatter are the same group

Apple to Make Space for Larger Batteries in iPhones, iPads, and MacBooks By Adopting Slimmer Peripheral Chips

Action1 releases its Q2 2021 results

New File Wiping Malware Meteor Found Involved In Iranian Railway Cyberattack

Cloudflare Vulnerability Enabled Compromise of 12% of All Websites

CISA launches US federal vulnerability disclosure platform

US Tightens Rules For Chinese IPOs After Didi Debacle

High Court Blocks Crowdfunded Action To Halt 5G

Security Researchers Discovered Crimea Manifesto Buried in VBA Rat

Google Plans to Ban ‘Sugar Dating’ Apps From September

Too Many Vulnerability Reports? Not Enough Real Vulnerabilities?

Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”: Lock and Code S02E14

An Indian Firm Facing 1,738 Cyber Attacks A Week On Average, Claims Report

Trying to register your antivirus in Windows Security Center?

EU Fines Amazon Record £637m Over Alleged Data Violation

5 Benefits of Disaster Recovery in the Cloud

Australian Government Now Offering COVID-19 Digital Vaccination Certificates for Apple Wallet

Toll unsure if it lawyered up to avoid ASD assistance following ransomware attack

WordPress Download Manager Plugin was affected by two flaws

U.S., UK and Australia Issue Joint Cybersecurity Advisory

Ransomware Attacks Leave Lasting Damage

Gamification can redefine the cybersecurity demo experience

Huawei to America: You’re not taking cyber-security seriously until you let China vouch for us

Record 300 million Ransomware Attacks in first half of 2021

Cloud Security Company SecureWorx acquired by EY Australia

A digital shift requires a new approach to asset management: How to reduce security risks

A look at the 2021 CWE Top 25 most dangerous software weaknesses

Zoom agrees to pay subscribers $25 to put its security SNAFUs behind it

Reboot Your Smartphone, FBI’s Top Targeted Vulnerabilities, Flirty Account Dupes Defense Contractors

Navigating the 2021 threat landscape: Security operations, cybersecurity maturity

MWC 2021: Three key Thales innovations at this year’s event

Most Important Network Penetration Testing Checklist

Organizations still rely on weak security for remote workers

Zoom to pay $85m to set aside privacy violation and zoombombing allegations

Retailers turn to zero trust to keep consumers and employees secure

Taking a Look at AWS and Cloud Security Monitoring

Tripwire Patch Priority Index for July 2021

NetOps has become fundamental to network management, yet training efforts are lacking

Confidence that quantum computers will solve major problems has soared

AppOmni’s platform protects companies against cloud and SaaS breaches

Fortanix DSM SaaS provides FIPS certified HSM services to cloud platforms and applications

SysTools Cloud Migration Service simplifies cloud data migration

Microchip launches network synchronization solution for 5G wireless access devices

Paian IT Solutions and Corent Technology offer its cloud optimization service on Azure Marketplace

Saviynt and Deloitte expand partnership to offer cloud identity solutions to enterprises

Skybox Security accelerates global expansion to improve security posture of complex hybrid networks

10 DevOps Tools for Continuous Monitoring

IT Security News Weekly Summary – Week 30

IT Security News Daily Summary 2021-08-01

D-BOX Technologies Confirms Recovery Following Ransomware Attack

Solarmarker Malware Emerges As A Potent InfoStealer And Keylogger

Security BSides Athens 2021 – Talk 1: Erfan Fazeli’s ‘Blockchain Basics And Security For Penetration Testers’

Ransomware Attempt Volume Touching Over 300 Million, Sets Record

The Challenges of Mapping Taliban Control in Afghanistan

Hacker Uses Credential Phishing to Gain Access Into PayPal Account

Security BSides Athens 2021 – Keynote: Dr. Najwa Aaraj’s ‘What Would Quantum Computing And Machine Learning Do To Crypto?’

HUMAN Cements Leadership Position in Bot Mitigation and Fight Against Fraud

How can predictive analysis unlock the potential of 5G?

Exploit Code Released for a Critical Flaw in Linux Kernel eBPF on Ubuntu Machines

GhostEmperor, a new Chinese-speaking threat actor targets Southeast Asia

CrowdSec v1.1.x Is Out! Here’s What’s New & How To Get Started >

Justice Department Says Russians Hacked Federal Prosecutors

Alerts, Events, Incidents – Where Should Your Security Team Focus?

Titanium Apple Watch Series 6 Models Currently Widely Unavailable

How to stop your exposed API business logic from being breached

Calgary Parking Authority exposed sensitive data of residents

Evidence Indicates Russia’s SVR is Still Using ‘WellMess’ Malware, Despite US Warnings

Russia’s APT29 is Actively Serving WellMess/WellMail Malware

A Guide to RCS, and Why It Makes Texting So Much Better

Security Affairs newsletter Round 325

Node.js Pushes Out Immediate Fixes for the Severe HTTP Bug

Week in review: Verifiable credentials, API security, how to develop a skilled cybersecurity team

Multilingual Cybersecurity Awareness Training adapted for your needs

Penetration testing

Your top five questions on biometric bank cards answered

Dynatrace’s enhancements deliver analytics capabilities to more open-source services

Red Hat partners with Nutanix to deliver open hybrid multicloud solutions

Generated on 2021-08-02 23:55:35.528264