16. January 2022

Microsoft Uncovers Destructive Malware Used in Ukraine Cyberattacks

A Cybersecurity Conversation with Vince Moore – Senior Network Engineer at OPSWAT

European Union simulated a cyber attack on a fictitious Finnish power company

Gurman: Apple Considered a Battery-Powered ‘HomePod’ Years Ago

Russian Court Remands Hackers in Custody

ProMotion Now Expected to Remain Exclusive to iPhone 14 Pro Models, Not Expand to Entire Lineup

Why Did Russia Escalate Its Gray Zone Conflict in Ukraine?

New Mexico Jail went on Lockdown due to Cyberattack

Ukraine Government Websites Targeted in a Suspected Russian Cyber Attack

2021 (ISC)² Leadership Webinars On-Demand

SnatchCrypto attack hits DeFi and Blockchain Platforms with backdoor

Apple Requiring Employees to Submit Proof of COVID-19 Booster Shot or Face Frequent Testing

Microsoft Warns of Destructive Malware Targeting Ukrainian Organizations

Defense Contractor Hensoldt Confirms Lorenz Ransomware Attack

Destructive Hacks Against Ukraine Echo Its Last Cyberwar

Microsoft Warns of Destructive Malware Targeting Ukrainian Organizations

Microsoft spotted a destructive malware campaign targeting Ukraine

Ukraine Says Has ‘Evidence’ Russia Behind Cyberattack

How Apple’s iCloud Private Relay Can Keep You Safe

A new wave of Qlocker ransomware attacks targets QNAP NAS devices

New Unpatched Apple Safari Browser Bug Allows Cross-Site User Tracking

North Korea pulled in $400m in cryptocurrency heists last year – report

Security Affairs newsletter Round 349

Because of a Flaw in Microsoft Defender, Threat Actors can Evade Detection

A New Destructive Malware Targeting Ukrainian Government and Business Entities

Threat actors stole $18.7M from the Lympo NTF platform

Week in review: 2022 cloud security trends, Microsoft fixes wormable RCE

Penetration testing

Is fighting cybercrime a losing battle for today’s CISO?

New iPad Air Rumored to Launch This Spring With A15 Chip, 5G, Center Stage Camera, and More

Destructive malware targeting Ukrainian organizations

Apple Adding Last MacBook Pro With CD Drive to Vintage Products List

Comcast announces test of a prototype 10G modem for home broadband use

Uppsala Security partners with NSHC to offer virtual asset tracking solution

Why Hackers Attack Mobile Devices and How to Prevent It

What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?

How to Avoid Spam Texts and Protect Personal Information in the Digital Age

Moscow court charges 8 alleged REvil ransomware hackers

Markus Ogurek joins CommScope as SVP and Segment Leader of Venue and Campus Networks

Red Canary appoints Dean Hager to Board of Directors

IT Security News Daily Summary 2022-01-15

Six Rumored Apple Products You’re Unlikely to See This Year

Ukraine Hacks Add to Worries of Cyber Conflict With Russia

Prominent Carding Marketplace UniCC announced it’s shutting down

NFT Minting Platform Lympo Got Compromised for $18.7M

How to evolve your organization into a data-centric security architecture

Largest dark web market for stolen cards UniCC calls it quits

A Teen Took Control of Teslas by Hacking a Third-Party App

Top Stories: iPhone 14 Pro Rumors, iCloud Private Relay Controversy, iOS 15.2.1 Released, and More

The GootLoader Hackers are After Law Firms and Accounting Firms

One of the REvil members arrested by FSB was behind Colonial Pipeline attack

Cyberattack Compels Albuquerque Public Schools to Close 144 Schools

Russia Arrests REvil Ransomware Gang Responsible for High-Profile Cyber Attacks

Apple to Allow In-App Third-Party Payment Options for First Time in the Netherlands

19-Year-Old Claims to Have Hacked Into More Than 25 Teslas

Build or Buy your own antivirus product

Massive Cyber Attack Knocks Down Ukrainian Government Websites

What do cybersecurity experts predict in 2022?

Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases

Holiday shopping? Get an amazing 75% discount offer? A case study on evaluating a special holiday sale

Why Is It Important to Invest in OT Cybersecurity for 2022?

Russia Stops REvil

How Should Organizations Tackle Their Data Privacy Requirements?

Box Sign expands capabilities and developer tools to digitize agreements in the content cloud

Aditya Birla Fashion and Retail – 5,470,063 breached accounts

RICOH Capture & Conversion Services gives teams access to actionable analytics

TenSec 2019

Exploiting Wi-Fi Stack on Tesla Model S

Tencent Keen Security Lab joins GENIVI Alliance

Tencent Keen Security Lab: Experimental Security Assessment on Lexus Cars

Tencent Security Keen Lab: Experimental Security Assessment of Mercedes-Benz Cars

Russia ”neutralizes” REvil ransomware gang, arrests 14

Week in security with Tony Anscombe

Pondurance appoints Mike Melka as CFO and Amy Thaler as VP of People Operations

Danielle Sheer joins Commvault as Chief Legal and Compliance Officer

Anomali names Chris Peterson as VP of Global Channel and Technology Partnerships

Generated on 2022-01-16 23:55:16.058823