3. July 2022

Tens of Jenkins plugins are affected by zero-day vulnerabilities

ZuoRAT Malware Targets SOHO Routers In North America, Europe – Expert Comment

What Expert Says On Marqeta Expanding Credit Platform With 40 New APIs

ATC Healthcare, Community of Hope & The People Concern Disclose Data Breaches

Your Comments On Macmillan Ransomware Attack

Almost Half Of UK Organisations Now Encrypt All Data, According To Annual Apricorn Survey

Geographic Solutions Ransomware, Experts Weigh In

Microsoft: Raspberry Robin worm already infected hundreds of networks

45% Of Financial Services Customers Are Very Comfortable Using Non-Password Login Methods, Are You?

Skyhigh Security Partners With Gotara to Support and Mentor Women in Cybersecurity

Security Affairs newsletter Round 372 by Pierluigi Paganini

Why Are Cyber Insurance Premiums Going Up, And How Can You Get a Better Deal?

Dutch University Receives Bitcoin Ransom Paid in 2019

Users get Directly Infected by AstraLocker 2.0 via Word Files

Google Blocks Malicious Domains Used by Hack-for-hire Groups

Why Is It So Difficult to Get Off a Terrorist List?

Half of actively exploited zero-day issues in H1 2022 are variants of previous flaws

Lazarus Group Responsible For $100M Crypto-Heist

What to do about inherent security flaws in critical infrastructure?

Microsoft Detects Raspberry Robin Worm in Windows Networks

Week in review: ZuoRAT targeting SOHO routers, trends affecting your security strategy

Penetration testing

Bourse des Vols – 1,460,130 breached accounts

IronNet Added to Membership of Russell 2000Ⓡ and 3000Ⓡ Indexes

Inspectiv raises $8.6 million to help companies protect against security threats

Sourcepoint hires Chris Chapman as CTO and promotes Chloe Grutchfield to CPO

IT Security News Daily Summary 2022-07-02

Experts shared PoC exploit code for RCE in Zoho ManageEngine ADAudit Plus tool

The role of Social Media in modern society – Social Media Day 22 interview

Why you should care about privacy computing technologies

Why more regulation of connected car technology is probably just up the road

Susceptible APIs Costing Organizations Billions Every year

Fortified Castles With Wooden Gates: Weak Keys and Outdated Machine Identity Management Undermine TLSv1.3 Adoption

A New YTStealer Malware Targets YouTube Content Creator

Experts: California Lacked Safeguards for Gun Owner Info

California Gun Permit Website Exposes User Data

Netwalker: Ex Canadian Government Employee Pleads Guilty to Cybercrimes

Gun Database Breach Leaks Details on Thousands of Owners

Why Zero Trust is Easier Said Than Done

LiFi, the Technology That Brings You the Internet Through Light

Dutch Uni Gets Cyber Ransom Money Back… With Interest

Google location tracking to forget you were ever at that medical clinic

Build or Buy your own antivirus product

Weekly Update 302

Phishing scam poses as Canadian tax agency before Canada Day

Watch out for survey scams – Week in security with Tony Anscombe

A ransomware attack forced publishing giant Macmillan to shuts down its systems

TikTok Assures U.S. Lawmakers it’s Working to Safeguard User Data From Chinese Staff

Resecurity’s cybersecurity solutions now available in the Microsoft Azure marketplace

Generated on 2022-07-03 23:55:17.759906