IT Security News Weekly Summary – Week 02

2 years ago 96
BOOK THIS SPACE FOR AD
ARTICLE AD

IT Security News Daily Summary 2022-01-16

Microsoft Uncovers Destructive Malware Used in Ukraine Cyberattacks

A Cybersecurity Conversation with Vince Moore – Senior Network Engineer at OPSWAT

European Union simulated a cyber attack on a fictitious Finnish power company

Gurman: Apple Considered a Battery-Powered ‘HomePod’ Years Ago

Russian Court Remands Hackers in Custody

ProMotion Now Expected to Remain Exclusive to iPhone 14 Pro Models, Not Expand to Entire Lineup

Why Did Russia Escalate Its Gray Zone Conflict in Ukraine?

New Mexico Jail went on Lockdown due to Cyberattack

Ukraine Government Websites Targeted in a Suspected Russian Cyber Attack

2021 (ISC)² Leadership Webinars On-Demand

SnatchCrypto attack hits DeFi and Blockchain Platforms with backdoor

Apple Requiring Employees to Submit Proof of COVID-19 Booster Shot or Face Frequent Testing

Microsoft Warns of Destructive Malware Targeting Ukrainian Organizations

Defense Contractor Hensoldt Confirms Lorenz Ransomware Attack

Destructive Hacks Against Ukraine Echo Its Last Cyberwar

Microsoft Warns of Destructive Malware Targeting Ukrainian Organizations

Microsoft spotted a destructive malware campaign targeting Ukraine

Ukraine Says Has ‘Evidence’ Russia Behind Cyberattack

How Apple’s iCloud Private Relay Can Keep You Safe

A new wave of Qlocker ransomware attacks targets QNAP NAS devices

New Unpatched Apple Safari Browser Bug Allows Cross-Site User Tracking

North Korea pulled in $400m in cryptocurrency heists last year – report

Security Affairs newsletter Round 349

Because of a Flaw in Microsoft Defender, Threat Actors can Evade Detection

A New Destructive Malware Targeting Ukrainian Government and Business Entities

Threat actors stole $18.7M from the Lympo NTF platform

Week in review: 2022 cloud security trends, Microsoft fixes wormable RCE

Penetration testing

Is fighting cybercrime a losing battle for today’s CISO?

New iPad Air Rumored to Launch This Spring With A15 Chip, 5G, Center Stage Camera, and More

Destructive malware targeting Ukrainian organizations

Apple Adding Last MacBook Pro With CD Drive to Vintage Products List

Comcast announces test of a prototype 10G modem for home broadband use

Uppsala Security partners with NSHC to offer virtual asset tracking solution

Why Hackers Attack Mobile Devices and How to Prevent It

What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?

How to Avoid Spam Texts and Protect Personal Information in the Digital Age

Moscow court charges 8 alleged REvil ransomware hackers

Markus Ogurek joins CommScope as SVP and Segment Leader of Venue and Campus Networks

Red Canary appoints Dean Hager to Board of Directors

IT Security News Daily Summary 2022-01-15

Six Rumored Apple Products You’re Unlikely to See This Year

Ukraine Hacks Add to Worries of Cyber Conflict With Russia

Prominent Carding Marketplace UniCC announced it’s shutting down

NFT Minting Platform Lympo Got Compromised for $18.7M

How to evolve your organization into a data-centric security architecture

Largest dark web market for stolen cards UniCC calls it quits

A Teen Took Control of Teslas by Hacking a Third-Party App

Top Stories: iPhone 14 Pro Rumors, iCloud Private Relay Controversy, iOS 15.2.1 Released, and More

The GootLoader Hackers are After Law Firms and Accounting Firms

One of the REvil members arrested by FSB was behind Colonial Pipeline attack

Cyberattack Compels Albuquerque Public Schools to Close 144 Schools

Russia Arrests REvil Ransomware Gang Responsible for High-Profile Cyber Attacks

Apple to Allow In-App Third-Party Payment Options for First Time in the Netherlands

19-Year-Old Claims to Have Hacked Into More Than 25 Teslas

Build or Buy your own antivirus product

Massive Cyber Attack Knocks Down Ukrainian Government Websites

What do cybersecurity experts predict in 2022?

Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases

Holiday shopping? Get an amazing 75% discount offer? A case study on evaluating a special holiday sale

Why Is It Important to Invest in OT Cybersecurity for 2022?

Russia Stops REvil

How Should Organizations Tackle Their Data Privacy Requirements?

Box Sign expands capabilities and developer tools to digitize agreements in the content cloud

Aditya Birla Fashion and Retail – 5,470,063 breached accounts

RICOH Capture & Conversion Services gives teams access to actionable analytics

TenSec 2019

Exploiting Wi-Fi Stack on Tesla Model S

Tencent Keen Security Lab joins GENIVI Alliance

Tencent Keen Security Lab: Experimental Security Assessment on Lexus Cars

Tencent Security Keen Lab: Experimental Security Assessment of Mercedes-Benz Cars

Russia ”neutralizes” REvil ransomware gang, arrests 14

Week in security with Tony Anscombe

Pondurance appoints Mike Melka as CFO and Amy Thaler as VP of People Operations

Danielle Sheer joins Commvault as Chief Legal and Compliance Officer

Anomali names Chris Peterson as VP of Global Channel and Technology Partnerships

Cybersecurity for Industrial Control Systems: Part 1

Ukraine says more than 70 government websites were defaced, 10 were subjected to ‘unauthorized interference’

At Request of U.S., Russia Rounds Up 14 REvil Ransomware Affiliates

Threat actors defaced Ukrainian government websites

IT Security News Daily Summary 2022-01-14

January 2022 Patch Tuesday: Multiple Critical Vulnerabilities and Microsoft Exchange Remote Code Execution

Who is the Network Access Broker ‘Wazawaka?’

Russia Takes Down REvil Ransomware Operation, Arrests Key Members

Friday Squid Blogging: The Evolution of Squid Eyes

VA delays EHR deployment due to COVID cases

The Cybersecurity Measures CTOs Are Actually Implementing

Verified, Certified, Trusted Security Building Blocks – DATASHUR SD Evaluation

World’s Biggest Darknet Stolen Credit Card Site Closes

Windows RDP Bug Opens Users To Data Theft

Expert Comment: Teen Claims To Have Hacked Dozens Of Teslas Worldwide

Maryland Confirms Ransomware, Leaving Hospitals Struggling

USPS, USDS collaborate on new COVID-19 test website

Netflix Again Raises Prices for All Plans, 4K Streaming Now $20 Per Month

Seditious Conspiracy: What to Make of the Latest Oath Keepers Indictment

Russia starts playing by the rules: FSB busts 14 REvil ransomware suspects

Lorenz ransomware gang stolen files from defense contractor Hensoldt

Former DHS acting IG pleads guilty in software scheme

Developers Now Able to Submit Claims for $250 to $30,000 Payments From Apple in Lawsuit Settlement

Husband and wife among ransomware operators arrested in Ukraine

2022-01-11 – Emotet activity

Army plans ICAM rethink to support unified network operations

Russia arrests REvil ransomware gang members at request of US officials

Details Published on AWS Flaws Leading to Data Leaks

5 Trends in Patch Management for 2022

Russian government claims to have dismantled REvil ransomware gang

Next iPad Pro Might Feature Large Glass Apple Logo to Allow Wireless Charging

New Requirements in the Wake of Omicron have led to Increased Dark Market Activity Around Fake Covid Certificates

Pentagon Moves to Improve its Cybersecurity-Centered Engagement with Universities

ID verification, analytics can help agencies fight fraud

Serious Security: Linux full-disk encryption bug fixed – patch now!

Flaw Found in Biometric ID Devices

DigiCert Acquires Mocana

Maryland Dept. of Health Responds to Ransomware Attack

Russia Takes Down REvil Hackers—as Ukraine Tensions Mount

Upcoming Speaking Engagements

Today’s Trends: Consumers Prioritize Protection Over Convenience

George Takei and Usain Bolt to Join Check Point CPX 360

7 obstacles that organizations face migrating legacy data to the cloud

White House Meets With Software Firms and Open Source Orgs on Security

U.S. Cyber Command Officially Links MuddyWater Gang to Iranian Intelligence

3rd-party flaws allowed a teen hacker to track location of Tesla cars

Network Intrusion Detection Using Snort>

Small Business Cybersecurity: What Will Be Different in 2022?

Ferriero to retire from National Archives

Top Illicit Carding Marketplace UniCC Abruptly Shuts Down

MacRumors Giveaway: Win a Weekender Bag and Backpack From Vessel

A Cybersecurity Role Has Topped List of Best Jobs

3rd-party flaws allowed teen hacker to track location of Tesla cars

Android Users can Disable 2G to Protect From Stingrays or IMSI Catchers

Today’s Trends: People Feel More Exposed to Online Threats, Want Stronger Protection

Cold-calling 02 scam artists are offering 40% plan discounts, free phone contracts for your security code

Russian authorities take down REvil ransomware gang

Critical Cisco Contact Center Bug Threatens Customer-Service Havoc

Real Big Phish: Mobile Phishing & Managing User Fallibility

Report: Facebook Is Still Failing To Crack Down On Fake Reviews

Insurers Stake Out Their Ground for Covering State Cyber Attacks

Multi-day IT systems outage whacks umbrella biz Parasol Group amid fears of a cyber attack

‘Be Afraid:’ Massive Cyberattack Downs Ukrainian Gov’t Sites

Austrian Regulator Says Google Analytics Contravenes GDPR

Ivanti Updates Log4j Advisory with Security Updates for Multiple Products  

Apple AR/VR Headset Potentially Delayed Until 2023 Amid Development Problems

The FCC propose new rules for data breach reporting

Russian cyber attack on Ukraine downs government websites

North Korean Hackers Stole $400 Million Worth of Cryptocurrency in 2021

Ivanti Updates Log4j Advisory with Security Updates for Multiple Products  

North Korea-linked APT BlueNoroff focuses on crypto theft

Ukrainian government targeted in cyberattack

Ukraine shrugs off mass govt website defacement as world turns to stare at Russia

George Takei and Usain Bolt to Join Check Point CPX 3

A Shift Away from Daily COVID Case Counts Has Begun

Cyber Attack in Albuquerque Latest to Target Public Schools

REvil ransomware crew allegedly busted in Russia, says FSB

REvil Ransomware Gang Arrested In Russia

Three Plugins With Same Bug Put 84k WordPress Sites At Risk

BioPlus Faces Class-Action Lawsuit Over Security Measures

North Korean Hackers Impersonate Crypto Firm To Scam Startups

Ukrainian Government Websites Face Attack

Analyst: All iPhone 14 Models to Feature 120Hz Displays, 6GB of RAM, and More

Deals: Get Up to $100 Off Apple’s 12.9-Inch iPad Pro and Magic Keyboard

Hackers Behind MacBook Pro Schematics Leak Arrested in Russia

What Is Vulnerability Management?

Russian Security Takes Down REvil Ransomware Gang

Russia Lays the Smackdown on REvil Ransomware Gang

What’s Next for Patch Management: Automation

Ukraine Suffers Massive Cyberattack, As Russia Increases Troop Buildup

Detection Rules for Sysjoker (and How to Make Them With Osquery)

Three Plugins with Same Bug Put 84K WordPress Sites at Risk

North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide

Deals: AirPods 3 Return to Holiday All-Time Low Price of $139.99

Google Continues Real Estate Push With $1bn London Office Purchase

The Great Resignation: How to Acquire and Retain Cybersecurity Talent

Amazon fixes security flaw in AWS Glue service

Cold calling 02 scam artists are offering 40% plan discounts, free phone contracts for your security code

A major hacker service has been eliminated in Ukraine

The race towards renewable energy is creating new cybersecurity risks

Dark web carding platform UniCC shuts up shop after making millions

Recent GootLoader Campaign Targets Law, Accounting Firms

There is no substitute for a CISO…or is there?

Free Unofficial Patch for Windows ‘RemotePotato0’ Now Available

Help Shape The CSSLP Exam

Lazarus, Cobalt, and FIN7 Cyber Groups Allegedly Opened Fire on the Financial Industry

A ‘massive’ hacking attack has hit government websites in Ukraine

North Korean hackers stole a record-breaking amount of cryptocurrency last year

SnatchCrypto campaign plants backdoors in crypto startups, DeFi, blockchain networks

Salvadoran Government Denies Using Spyware on Journalists

Ukrainian Government Websites Forced Offline in “Massive” Cyber-Attack

Using EM Waves to Detect Malware

Apple ‘Ready to Spend Billions’ on Live Sports Content Over Next Four Years

Cryptocurrency Startups Targeted by the BlueNoroff Hacking Group

Facebook Faces £2.3 Billion Lawsuit From 44m UK Users

U.S. Government, Tech Giants Discuss Open Source Software Security

North Korean Hackers Stole $400m in Cryptocurrency Last Year

Ukrainian police arrested Ransomware gang behind attacks on 50 companies

A Weakness Found in Microsoft Defender Allows Hackers to Avoid Malware Detection

Analyzing an Old Bug and Discovering CVE-2021-30995

Ukrainian Cops Bust Suspected $1m Cybercrime Ring

Hacker Hacked Multiple High-profile FIFA 22 Accounts by Phishing EA Support Agents

Nanocore, Netwire, and AsyncRAT Distribution Campaigns Make Use of Public Cloud Infrastructure

What Is Risk-Based Vulnerability Management?

Malicious QR Codes Found In Austin | Avast

Ukraine Reports Massive Cyber Attack on Government Websites

Tech Giants to Team-Up on Open Source Security After White House Meet

New Chrome security measure aims to curtail an entire class of Web attack

Uber Finally Fixes Email Bug | Avast

Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows ?

Husband-Wife Arrested in Ukraine for Ransomware Attacks on Foreign Companies

U.K. Hacker Jailed for Spying on Children and Downloading Indecent Images

Threat actors can bypass malware detection due to Microsoft Defender weakness

Visibility, immutability, security … a revolutionary approach to fighting off ransomware

Singapore busts network hawking contraband e-vaporisers via Telegram

Weekly Update 278

Cisco Releases Patch for Critical Bug Affecting Unified CCMP and Unified CCDM

Analytics Are Essential for Effective Database Security

New infosec products of the week: January 14, 2022

How to improve your IR tabletop exercises and why you really should?

Cyber attack on New Mexico’s Largest School District

The future of security protocols for remote work

US authorities track MuddyWater Hacking Group to Iran

Manufacturers are starting to realize the importance of OT security

In 2022, AI-based full-suite security is needed

Anomali Appoints Chris Peterson as Vice President of Global Channel and Technology Partnerships

What Were the Best Cybersecurity Webinars of 2021?

Find A New Cybersecurity Job in 2022

AT&T teams with Cisco to create new managed SASE offering

Top 10 AT&T Cybersecurity blogs published in 2021

MFA market to reach $21.3 billion by 2027

Beware!! Magniber Ransomware Delivered via Microsoft Edge and Google Chrome as an Update

CyberSaint CyberBase helps SMBs to comply with regulations

Maryland Lawmaker: Officials Misled on Ransomware Attack

IronNet collaborates with New York Power Authority to defend key supply chain partners

Backblaze partners with Kasten by Veeam to offer backup and protection for containerized applications

FIN7 group continues to target US companies with BadUSB devices

January 6 House Committee subpoenas Google, Facebook, Twitter and Reddit

Making loyalty pay: How to keep your loyalty rewards safe from scammers

Recapping Rumors About Under-Screen Face ID and Touch ID on Future iPhones

Virtana raises $73 million to deliver hybrid cloud solutions for migration and end-to-end observability

Merit raises $50 million to expand into new business lines and use cases

DigiCert acquires Mocana to accelerate its presence in the IoT market

Zayo Group acquires QOS Networks to offer SD-WAN solutions for enterprise customers

CTIA 5G Security Test Bed assesses potential threats to 5G security

Keeping Your System Secure is Easier than Ever with LinuxSecurity Customized Advisories!>

Cyberattack shuts down Albuquerque schools; county copes with ransomware incident

New York Power Authority to beef up cybersecurity with new IronNet, AWS deal

Open Source Sabotage Incident Hits Software Supply Chain

Mogo appoints Allan Smith as CPO

Elastic promotes Ashutosh Kulkarni to CEO

Denis Cashman joins Onapsis as CFO

SysJoker: Cross-Platform Backdoor Malware for Mac, Windows, and Linux

Microsoft Yanks Buggy Windows Server Updates

Alef appoints Dean Bogdanovic as CTO and Ritesh Johar as EVP of Engineering

Russell P. Reeder joins Netrix as CEO

City heat officers lean into tech to control temperatures, inform response

Want to improve corporate security? Prioritize personal security

Albuquerque public schools shut down by cyberattack as county struggles with ransomware incident

Iran-Based APT35 Group Exploits Log4J Flaw

Federal Communications Commission proposed stricter rules on how telco carriers should report data breaches

IT Security News Daily Summary 2022-01-13

Is there a path forward in Congress for mandatory cyber incident reporting?

Maryland Health Department hit with ransomware

To improve corporate security, employers need to make personal security a priority

BlueNoroff Threat Group Targets Cryptocurrency Startups

How to Protect Your Phone from Pegasus and Other APTs

Fighting Back Against Pegasus, Other Advanced Mobile Malware

Cisco fixes a critical flaw in Unified CCMP and Unified CCDM

Report: Majority of malware downloads in 2021 were traced to cloud apps

Biden’s CX order puts new momentum behind longtime efforts, leaders say

6 strategies for better mobile services delivery

Log4j: Google and IBM call for list of critical open source projects

North Korean APTs Stole ~$400M in Crypto in 2021

Pennsylvania Welcomes New Cybersecurity Center

Vice Principal Charged with Cyber-Stalking

How to Make the Attack Lifecycle Actionable with Intelligence

Review: CalDigit’s Element Hub Delivers Flexible Thunderbolt and USB Support

PUBG Maker Sues Apple and Google for Not Removing Clone Apps

Orca Security tells AWS fail tale with a happy ending

Log4J: After White House meeting, Google and IBM call for list of critical open source projects

Ukrainian police bust unnamed ransomware gang

EFF Asks Appeals Court to Rule DMCA Anti-Circumvention Provisions Violate First Amendment

EFF Threat Lab’s “apkeep” APK Downloader, Now More Capable and Available in More Places

Ransomware cyberattack forces New Mexico jail to lock down

Researcher Gains Remote Control Of More Than 20 Tesla’s

Meshed Cybersecurity Platforms Enable Complex Business Environments

New RAT Targeting AWS, Azure

Over Half Of Organizations Struggle To Avoid Major Incidents And Losses

Hot wallet hack: Hackers steal $18.7m from Animoca’s Lympo NTF platform

FCC Proposes Stricter Data Breach Reporting Requirements

What to Expect From the New OSCP Exam

Apple More Aggressively Pushing iOS 14 Users to Upgrade to iOS 15

Fortnite Coming Back to iOS Soon Thanks to Nvidia’s GeForce NOW Service

SBA faces fraud risks and IT security woes, IG says

New Vulnerabilities Highlight Risks of Trust in Public Cloud

Panasonic Confirms Hackers Accessed Personal Information – Security Expert Comment

Threat Intelligence Expert On Iranian MOIS Threat Group MuddyWater / TEMP.Zagros

San Francisco Police Illegally Used Surveillance Cameras at the George Floyd Protests. The Courts Must Stop Them

Linux-Targeted Malware Increases by 35% in 2021: XorDDoS, Mirai and Mozi Most Prevalent

FIN7 Uses Flash Drives to Spread Remote Access Trojan

Apple Seeds Second Public Betas of iOS 15.3 and iPadOS 15.3

Continuous security and compliance for hybrid cloud, the Red Hat way

Wireshark creator joins Sysdig to extend it to cloud security

After Log4J, White House worries about the next big open source flaw

US Military Ties Prolific MuddyWater Cyberespionage APT to Iran

New study reveals phishing simulations might not be effective in training users

FCC Chair Proposes New Policies for Carrier Data Breach Reporting

How Cybercriminals Are Cashing in on the Culture of ‘Yes’

Why There Is Increase In QR-code Phishing Scams

Multiple Critical Bugs Identified in SonicWall SMA 100 Appliances

Cisco Releases Security Updates for Multiple Products

Apple Releases Security Updates for iOS and iPadOS

Citrix Releases Security Updates for Hypervisor 

Juniper Networks Releases Security Updates for Multiple Products

iOS 15 Now Installed on 72% of iPhones From the Last Four Years

Learn about 4 approaches to comprehensive security that help leaders be fearless

German Watchdog Finds No Evidence Of Xiaomi Secret Function

Is ransomware as a service going out of style?

Cisco Releases Security Updates for Multiple Products

Apple Releases Security Updates for iOS and iPadOS

Citrix Releases Security Updates for Hypervisor 

Juniper Networks Releases Security Updates for Multiple Products

Rethinking the Press in an Era of Distrust

Securing Taiwan Requires Immediate Unprecedented Cyber Action

Nearly 130 Public Interest Organizations and Experts Urge the United Nations to Include Human Rights Safeguards in Proposed UN Cybercrime Treaty

Chinese Hackers Exploiting Log4Shell Vulnerability & Attack Internet-Facing Systems

The Best Threat Hunters Are Human

Some Android users can disable 2G now and why that is a good thing

Windows 11 setup: Which user account type should you choose?

S3 Ep65: Supply chain conniption, NetUSB hole, Honda flashback, FTC muscle [Podcast + Transcript]

Ransomware attack locks down inmates in US Jail

Ransomware attack on New Mexico jail put prisoners in lockdown

Threat actors abuse public cloud services to spread multiple RATs

Using Foreign Nationals to Bypass US Surveillance Restrictions

Phishers on the prowl with fake parking meter QR codes

Ukrainian cops nab husband and wife suspected to be part of $1m ransomware operation

Group-IB revealed 50 fraud schemes with fake investments

Treasury Select Committee To Investigate Visa, Mastercard Fee Increases

New GootLoader Campaign Targets Accounting, Law Firms

Ransomware Group That Targeted Over 50 Companies Dismantled in Ukraine

Redefining the CISO-CIO Relationship

Apple Expanding ‘App Store Foundations’ Program to Additional Countries

Malicious USB drives are being posted to businesses

Microsoft RDP Bug Enables Data Theft, Smart-Card Hijacking

Austrian watchdog rules German company’s use of Google Analytics breached GDPR by sending data to US

Digital Transformation: Balancing Speed, Security and Innovation

Adobe Cloud Abused to Steal Office 365, Gmail Credentials

Researchers Decrypted Qakbot Banking Trojan’s Encrypted Registry Keys

GootLoader Hackers Targeting Employees of Law and Accounting Firms

Deals: Apple’s 21.5-Inch iMac Hits Record Low Price of $599.99 ($499 Off)

Lazarus Group, Cobalt Gang and FIN7 the Worst Threat Actors Targeting the Financial Services Sector

Phishers are targeting Office 365 users by exploiting Adobe Cloud

Windows 11 OS Struggles To Crack 1 Percent – Lansweeper

DigiCert acquires Mocana to bolster IoT security

Virtana, which helps companies to manage multiple cloud environments, raises $73M

Norton’s cynical crypto ploy: A dark harbinger of crapware to come?

When open-source developers go bad

Cisco Patches Critical Vulnerability in Contact Center Products

Maryland Confirms Ransomware Attack at Health Agency

Shield raises $15M to monitor financial industry employee communications

Ransomware locks down prison, knocks systems offline

Check If You Have to Worry About the Latest HTTP Protocol Stack Flaw

North Korean Hackers Stole Nearly $400M in Crypto Last Year

Apple to Attend White House Meeting to Discuss Security Risks of Open-Source Software

Amazon and Azure Cloud Services Abused in a Malicious Trio RAT Campaign

Admins report Hyper-V and domain controller issues after first Patch Tuesday of 2022

The Future of Work without Workers

Zero Trust Integrations Are Expanding in the CrowdStrike Partner Ecosystem

ZDI Announces Rules and Prizes for Pwn2Own 2022

Mozilla addresses High-Risk Firefox, Thunderbird vulnerabilities

TellYouThePass Ransomware Returns as a Cross-Platform Golang Threat

MuddyWater APT Cybercrime Group Associated to Iranian Intelligence, the U.S. Cyber Command Confirms

Online Form Builders That Lets You Create Registration Forms

Looking For a Form Builder? Here are Some Applications To Try

UK jails man for spying on kids, adults with Remote Access Trojans

U.S. Cyber Command Officially Links MuddyWater Group to Iranian Intelligence

New “Undetected” Backdoor Runs Across Three OS Platforms

PC Sales Reach Highest Level Since 2012, Says IDC

Safeguarding Your Remote Business From Suspicious Activity? 6 Ways to Keep Your Virtual Office Secure

Apple Loses Key Server Chip Designer To Microsoft

2021 Cyber Attacks Statistics

SysJoker Malware and Scams in the App Store – Intego Mac Podcast Episode 222

Machine Learning For Contested Antivirus Decisions | Avast

EU to launch Cyberattack simulations on supply chains

The Medical Review Institute of America Alerts Patients of a Privacy Breach

IP Spoofing Flaw Leaves Django REST Applications Vulnerable to DDoS Attacks

Report: Dozens of El Salvador Journalists, Activists Hacked

US: MuddyWater is Iranian State-Backed Group

The BlueNoroff cryptocurrency hunt is still on

Data Breach at Ciox Health Exposed Information on Over 12,000 Patients

Report Identifies Weaknesses in Online Banking Security

Dropbox Mac App With Apple Silicon Support Now Available to All Beta Users

Fingers point to Lazarus, Cobalt, FIN7 as key hacking groups attacking finance industry

Iranian Hackers Exploit Log4j Vulnerability to Deploy PowerShell Backdoor

Volunteer Dutch flaw finders bag $100k to forward national bug bounty goal

Do you know what your supply chain is and if it is secure?

How To Spot Email Scams | Avast

Meeting Patching-Related Compliance Requirements with TuxCare

USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence

SysJoker Malware Targets Windows, Mac & Linux to Steal Sensitive Data

US Cyber Command Links ‘MuddyWater’ Hacking Group to Iranian Intelligence

Cybersecurity firm discusses how to tackle threats in the metaverse

The rising threat of cyber criminals targeting cloud infrastructure in 2022

SysJoker, a previously undetected cross-platform backdoor made the headlines

When it comes to banking security, there’s no silver bullet

Teenager hacks 23 Tesla Car through software vulnerability

Ransomware news headlines trending on Google

Telstra to flag recent SIM swaps when banks ask

Delivering vulnerable signed kernel drivers remains popular among attackers

FCC chair proposes updating data breach reporting requirements

The public sector is more concerned about external than internal threats

Apple Releases iPhone and iPad Updates to Patch HomeKit DoS Vulnerability

What makes edge computing successful?

Looking Back at 2021 and Forward to 2022

Manual and semi-automated testing for IDORs using Burp Suite

NSO spyware found targeting journalists and NGOs in El Salvador

The 5 Stages of a Credential Stuffing Attack

Consumer IAM market to reach $17.6 billion by 2026

CyberRes Galaxy accelerates executive understanding of cyber risk

NSO Group Spyware Targeted Dozens of Reporters in El Salvador

Perimeter 81 Technology Alliance Partner Program delivers cybersecurity solutions for enterprises

US Cyber Command links MuddyWater to Iranian intelligence

Rambus collaborates with Kyocera to improve printer security

MEDITECH partners with SecureLink to keep PHI data safe from cyberattacks

Ransomware Attack Locks Down US Prison

What You Need to Know for a Safe Web Browsing Experience?

After Oral Argument, the Future of Thompson v. Trump Remains Unclear

Flashpoint acquires Risk Based Security to help businesses detect emerging cyber risks

NETSCOUT provides service assurance for Southern Linc’s private 4G LTE network

Uptake collaborates with Cognizant to accelerate access to industrial AI

Device Authority integrates FIDO FDO with KeyScaler for secure device onboarding

Pacific Global Security Group partners with Dragos and IronNet to protect sensitive OT and IT systems

Cryptocurrency scams: What to know and how to protect yourself

Exchange Server woes continue on January Patch Tuesday

KCodes NetUSB flaw impacts millions of SOHO routers

VICTORY: Google Releases “disable 2g” Feature for New Android Smartphones

SAP supply chains need zero trust to reach enterprise cybersecurity

Maryland officials confirm ransomware attack shut down Department of Health

Expel adds Jennifer Lawrence and Kelly Fiedler to its leadership team

Stephanie Garcia joins 8×8 as Chief Human Resources Officer

Datto appoints Brooke Cunningham as CMO

ThreatX hires Libby Merrill as CFO

Apple Outlines $30M Bag Check Lawsuit Settlement on Legal Website

How to Make API Security an Integral Part of Your Application Security Strategy

Mitchell Mlinar joins Tortuga Logic as VP of Engineering

Everbridge appoints David Henshall to Board of Directors

Dustin Grosse joins Talend as Chief Marketing and Strategy Officer

Judge: FTC Lawsuit To Break Up Facebook Can Proceed

Oxeye Introduce Open Source Payload Deobfuscation Tool

IT Security News Daily Summary 2022-01-12

TransCredit exposed financial data of half a million Americans and Canadians

Defense officials press lawmakers for a 2022 appropriation

Fortinet: Cybercriminals are exploiting Omicron news to distribute RedLine malware

Maryland officials confirm ransomware attack shut down department of health

New Research Reveals Public-Sector IAM Weaknesses and Priorities

Apple Says iOS 15.2 Included No Changes That Would Have Toggled iCloud Private Relay Off

Ransomware puts New Mexico prison in lockdown: Cameras, doors go offline

Apple Patches iOS HomeKit Flaw After Researcher Warning

CNMF Identifies and Discloses Malware used by Iranian APT MuddyWater

Q4 2021 Cyber Attacks Statistics

Livestreamed Hearing Friday: EFF Will Ask Court to Issue Judgment Against SFPD for Illegally Spying on Protesters Marching in Support of Black Lives

Lessons from the Kronos Ransomware Attack – Why Good Enough isn’t Enough

Amazon, Azure Clouds Host RAT-ty Trio in Infostealing Campaign

Widespread, Easily Exploitable Windows RDP Bug Opens Users to Data Theft

CNMF Identifies and Discloses Malware used by Iranian APT MuddyWater

Hands-On With LG’s 32-Inch UltraFine OLED Pro Display

Tennessee taps evidence-based budgeting for funding decisions

Fortinet warns of cybercriminals using Omicron variant news to distribute RedLine stealer

Clinical Review Vendor Reports Data Breach

U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions

Russia-linked threat actors targets critical infrastructure, US authorities warn

Apple Clarifies iCloud Private Relay Wording in iOS 15.3 to Prevent Confusion Over Carrier Support

Microsoft Hires Former Apple Chip Architect

Amazon’s Alabama Warehouse To Vote Next Month On Trade Union

2-year prison for pervert who hacked webcams to spy on underage girls

DHS launches new program to recruit, train climate professionals

Stolen TikTok Videos, Bent on Fraud, Invade YouTube Shorts

Teen Makes Tesla Hacking Claim

IRS plans new version of its $700M digital platform contract

‘ASTORS’ Award Winner Ermetic Receives SOC 2 Type II Certification

EA confirms dozens of high-profile FIFA accounts hacked

Phishers Take Over FIFA 22 Accounts

Flashpoint Acquires Risk Based Security

iOS 15.2.1 and iPadOS 15.2.1 Address HomeKit Vulnerability

Face ID Under the Display Returns to Being an iPhone 15 Pro Rumor

New York AG Warns 17 Firms of Credential Attacks

Mozilla Patches High-Risk Firefox, Thunderbird Security Flaws

Apple Seeds Second Beta of tvOS 15.3 to Developers

Apple Seeds Second Beta of watchOS 8.4 to Developers

Apple Seeds Second Betas of iOS 15.3 and iPadOS 15.3 to Developers

Ransomware demands… a new approach to security

US government urges organizations to prepare for Russian-sponsored cyber threats

New RAT campaign abusing AWS, Azure cloud services

Critical Infrastructure Security and a Case for Optimism in 2022

FTC Antitrust Case Against Facebook Can Proceed, Judge Rules

Increasing Number of Bank-Themed Survey Scams

How to balance self-service analytics and security

Firefox 96 update focuses on noise improvements, main thread efficiency

5 Best VPN Services 2022: Tried-and-true picks for your online privacy

iPhone 14 Pro Now Rumored to Feature Both Pill-Shaped and Circular Cutouts

Microsoft Zero Trust solutions deliver 92 percent return on investment, says new Forrester study

Software engineer hacked webcams to spy on girls—Here’s how to protect yourself

Update now: Microsoft patches 97 bugs including 6 zero-days and a wormable one

U.S. Cyber Command Operation Targets ‘Real-life Cyber Threats’

Wormable Windows HTTP hole – what you need to know

FIFA 22 phishers tackle customer support with social engineering

Biggest Threats Application Development Companies Are Facing Today

European Union to Launch Supply Chain Attack Simulation

Deals: Shop the Latest New Year’s Discounts on Apple’s Entire iPhone 13 Lineup

Rethinking the Homeland Security Enterprise

Europol to delete huge data sets of personal info of EU Citizens

Foxconn’s India Factory Restarts Production After Protests

Eureka Emerges From Stealth With Cloud Data Security Platform

New RedLine malware version distributed as fake Omicron stat counter

AvosLocker Ransomware New Variant Targets Linux Systems and ESXi Servers

How you can claim your share of the upcoming TikTok privacy settlement

Multi-platform SysJoker backdoor targeting Windows, macOS & Linux Devices

How to Analyze Malicious Microsoft Office Files

Pis Detect Malware By Scanning For Electromagnetic Waves

This new malware wants to create backdoors and targets Windows, Linux and macOS

FIFA Ultimate Team Account Takeovers Plague EA Gamers

Microsoft Introduces New Security Update Notifications

Security Validation Firm Pentera Raises $150 Million at $1 Billion Valuation

Patch Management Today: A Risk-Based Strategy to Defeat Cybercriminals

China Accuses Walmart For Nineteen Cybersecurity Network Breaches

Top-10 Privacy Fines by UK’s Information Commissioner’s Office

Germany May Close Down Telegram, Minister Warns

Korean Companies Battling to Enter Apple Car Supply Chain

iPhone 14 Pro Again Rumored to Feature Upgraded 48-Megapixel Camera

Arming CISOs With the Skills to Combat Disinformation

Eureka emerges from stealth to secure cloud data stores with automation

New Cross-Platform Backdoor ‘SysJoker’ Used in Targeted Attacks

ICS Patch Tuesday: Siemens, Schneider Electric Address 40 Vulnerabilities

Windows, macOS, and Linux OSs Targeted by SysJoker Backdoor

Log4j: How hackers are using the flaw to deliver this new ‘modular’ backdoor

Remote Access Trojans spread through Microsoft Azure, AWS cloud service abuse

Phishers Rip Off High-Profile EA Gamers

UK Launches Initiative to Develop Global AI Standards

Hackers Use Cloud Services to Distribute Nanocore, Netwire, and AsyncRAT Malware

How to drive a successful, proactive tech refresh

A new multi-platform backdoor is leveraged by an advanced threat actor

YouTube ‘Major Conduit’ Of Misinformation, Fact-checkers Allege

Department of Veterans Affairs signs $13M contract with Google Cloud

Cisco Talos discovers a new malware campaign using the public cloud to hide its tracks

A New PowerShell Backdoor Is Being Used in Log4j Attacks

Attackers Could Gain Access to User Data due to a ‘Powerdir’ Flaw in macOS

Apple To Unveil 5G Equipped iPhone SE This Spring – Report

CISA Adds 15 Recent and Older Vulnerabilities to ‘Must-Patch’ List

Faking an iPhone Reboot

New Opportunity: Join (ISC)² Regional Event Committees

U.S. Issues Fresh Warning Over Russian Cyber Threats as Ukraine Tensions Mount

5 Latest Cybersecurity Threat News

Teen Hacker Claims To Have Taken Control Of 25 Teslas

Joint FBI/CISA/NSA Warning On Russian Threats To Critical Infrastructure

Google Drive Top App For Malware Downloads

Comment: Cyber Attacks On Corporations Hit Record Breaking Highs

False Omicron Stat Counter App Embedded with New RedLine Malware Version

Ransomware targets Edge users

Malware Abcbot Related to the Xanthe Cryptomining Bug Developer’s

Is Bluetooth a Cyber Security Liability?

Is Cloud-Based Ransomware the Future of Cyber Crime?

Credential Stuffing Business Guide | Avast

Hackers are using the Log4j flaw to deliver this new ‘modular’ backdoor

Two Years for Man Who Used RATs to Spy on Women and Children

Iran-linked APT35 group exploits Log4Shell flaw to deploy a new PowerShell backdoor

Several EA accounts compromised by phishing mails

Intimate photo hacker spared from jail, said he “liked the detective work”

Info-saturated techie builds bug alert service that phones you to warn of new vulns

Humans might let you down, but CloudGuard won’t! (Just don’t expect a Birthday card)

December 2021’s Most Wanted Malware: Trickbot, Emotet and the Log4j plague

Microsoft Starts 2022 with 97 CVEs in January Patch Tuesday

New SysJoker Espionage Malware Targeting Windows, macOS, and Linux Users

City of Grass Valley, California, Suffers Data Breach

WhatsApp Tests Ability to Play Voice Messages Outside of Chat Threads

XDR: Redefining the game for MSSPs serving SMBs and SMEs

SAP Patches Log4Shell Vulnerability in More Applications

Europol Ordered to Delete Vast Trove of Personal Information

FBI, NSA and CISA Warns of Russian Hackers Targeting Critical Infrastructure

Adobe fixes 4 critical Reader bugs that were demonstrated at Tianfu Cup

Build your own Android security product

Microsoft says Powerdir vulnerability in macOS could have given attackers access to user data

Bugs With URL Parsing Libraries Could Allow DoS, RCE, Spoofing & More

First Patch Tuesday of 2022 Brings Fix for a Critical ‘Wormable’ Windows Vulnerability

Ransomware, supply chain, and deepfakes: The top threats the finance industry needs to prepare for

2022 promises to be a challenging year for cybersecurity professionals

Hack caused by a single click on Google Docs

Proofpoint acquires Dathena

How safe are cloud applications?

Agencies must establish COVID-19 testing programs for certain unvaccinated feds and contractors by Feb. 15

Who is the Network Access Broker ‘Wazawaka?’

SMEs still an easy target for cybercriminals

Technology-related employment still going strong, unemployment rate for IT jobs dropping to 2%

Pentera Announces $150M Series C at $1 Billion Valuation to Disrupt Legacy Vulnerability Management Market

As Manufacturers Modernize Operational Technology, Closing Security Holes is a Growing Priority

Holiday shopping? Get an amazing 75% discount offer? A case study on evaluating a special holiday sale

How to evolve your organization into a data-centric security architecture

Digital asset management market to reach $10.018 billion in 2026

Check your SPF records: Wide IP ranges undo email security and make for tasty phishes

NormCyber smartbloc. offers visibility over cyber and data protection risks

X Security Ransomware Preparedness Assessment helps SMBs to fight ransomware attacks

Audit Your Active Directory with a free, read-only scan from Specops

Avast enhances free security and privacy protection for Windows users

SureCloud Internal Audit Management streamlines and accelerates audit engagements

Logicalis Collaboration suite helps organizations scale the digital collaboration experience

What to Do If Your Identity Has Been Stolen

The Dark Web: A Definitive Guide

Albania Hires US Company to Boost Cybersecurity After Leak

Clones of Popular ‘Wordle’ Game Flooding App Store, Including One Charging $30 Per Year [Updated]

Allegro Network Multimeter 3.4 provides users with enhancements and fixes

Cyxtera extends SmartCabs capabilities to increase operational flexibility for enterprises

2022-01-07 – Traffic analysis exericse – Spoonwatch

2022-01-11 – Emotet activity

Adobe Releases Security Updates for Multiple Products

Adobe Releases Security Updates for Multiple Products

Honeywell and Acalvio launch a solution designed to secure OT environments in commercial buildings

Microsoft starts 2022 with big bundle fixes for 96 security bugs in its software

SentryBay partners with Stratodesk to deliver shield against cyber threats for BYOD environments

SentinelOne integrates with ServiceNow to accelerate incident response for security and IT teams

Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency

It’s 2022 And Cyber Deception Has Arrived – Defeat Tomorrow’s Threat Today

German Ministry of Justice announced millions in fines for Telegram in case of non-compliance with laws

Signed kernel drivers – Unguarded gateway to Windows’ core

CES 2022: Wireless power for all

Let’s Play! Raising the Stakes for Threat Modeling With Card Games

Mo Katibeh joins RingCentral as COO

F5 appoints James Phillips to Board of Directors

Zluri raises $10M to accelerate global growth and product innovation

Dataprise acquires Global Data Vault to expand DRaaS and data protection offerings

APT35 Executes PowerShell-Based Malware in Log4j Flaw Attacks

Why self-sufficiency is key to fostering data literacy in the Air Force

VERT Threat Alert: January 2022 Patch Tuesday Analysis

Citrix Releases Security Update for Workspace App for Linux

Adobe adds Brett Biggs and Spencer Neumann to its Board of Directors

Dialpad appoints Prashanti Aduma as CIO

Sean Foster joins Anomali as CRO

Arctic Wolf appoints Dan Schiappa as CPO

Intel names David Zinsner as EVP and CFO

Monitoring malware abusing CVE-2020-1599

Microsoft Kicks Off 2022 With 96 Security Patches

Kiteworks Acquires Email Encryption Leader totemo

SAP Releases January 2022 Security Updates

Citrix Releases Security Update for Workspace App for Linux

Trulioo strengthens identity verification services in Ireland

Yugabyte designated as a CVE Numbering Authority

Wyoming health IT modernization nears completion

Cloud Apps Replace Web as Source for Most Malware Downloads

SAP Releases January 2022 Security Updates

Court Orders Authorizing Law Enforcement To Track People’s Air Travels In Real Time Must Be Made Public

Make sure you’re up-to-date with Sonicwall SMA 100 VPN box patches – security hole exploit info is now out

IT Security News Daily Summary 2022-01-11

As security issues dominate, use the right plans and metrics to thrive

Wyoming heath IT modernization nears completion

CISA: Russian state-sponsored groups exploited vulnerabilities in Microsoft, Cisco, Oracle tools

Here’s REALLY How to Do Zero-Trust Security

‘Wormable’ Flaw Leads January 2022 Patch Tuesday

Medigate Acquired by Claroty

Microsoft Releases January 2022 Security Updates

Clones of Popular ‘Wordle’ Game Flooding App Store, Including One Charging $30 Per Year

House FISMA draft codifies federal CISO role, looks to shared services

Microsoft Faces Wormable, Critical RCE Bug & 6 Zero-Days

Mozilla Creates Program To Illustrate How Much Facebook Tracks You Around The Web

Cybersecurity Employment in 2022: Solving the Skills Gap

Apple’s Private Relay Roils Telecoms Around the World

Microsoft Releases January 2022 Security Updates

What to Include in a Cybersecurity Disaster Recovery Plan

Rijndael

Enterprise Security at CES 2022 Marked by IoT, Biometrics, and PC Chips

3 phases on the journey to multicloud

CISA warns local, tribal governments about Russian state-sponsored cyberattacks

MacOS Bug Could Let Creeps Snoop On You

Microsoft Patch Tuesday fixes critical Office RCE

Microsoft fixes wormable RCE in Windows Server and Windows (CVE-2022-21907)

Signal CEO Steps Down, Replaced By WhatsApp Co-founder

Microsoft: China-based ransomware actor exploiting Log4Shell

Hackers Hit Healthcare Data Management Company

Top Cybersecurity Startups to Watch in 2022

How Can You Leave Log4J in 2021?

T-Mobile Says iOS 15.2 Bug Turning Off iCloud Private Relay for Some Users

Standing Up For Privacy In New York State

Cloud solutions speed rental assistance payments

WordPress Bugs Exploded in 2021, Most Exploitable

Details Released on SonicWall Flaws in SMA Devices

TellYouThePass Ransomware Analysis Reveals a Modern Reinterpretation Using Golang

US Issues Alert Over Russian Hackers

MSPB passes five-year mark without a quorum

CISA adds 15 exploited vulnerabilities from Google, IBM, Microsoft, Oracle and more to catalog

Microsoft January 2022 Patch Tuesday: Six zero-days, over 90 vulnerabilities fixed

Adobe Patches Reader Flaws That Earned Hackers $150,000 at Chinese Contest

Patch Tuesday: Microsoft Calls Attention to ‘Wormable’ Windows Flaw

FBI, NSA & CISA Issue Advisory on Russian Cyber Threat to US Critical Infrastructure

Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird

Apple’s Polishing Cloth is Finally Back in Stock

Details Disclosed for Recent Vulnerabilities in SonicWall Remote Access Appliances

Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird

Here are the top jobs in the U.S. — and how to land them

Samba Releases Security Update

Apple Seeds Second Beta of macOS Monterey 12.2 to Developers

Coming Soon: New Security Update Guide Notification System

NetUSB flaw could impact millions of routers

SonicWall SMA 100 appliances beset by multiple vulnerabilities

Home routers with NetUSB support could have critical kernel hole

Why the Insider Threat Will Motivate Cyber and Physical Teams to Collaborate More Than Ever in 2022

Samba Releases Security Update

FBI Warns Of USB In Mail Containing Ransomware, Experts Weigh In

Hybrid Working and Tips to Make It a Success

Custom Software Teams Implementing Latest Practices To Secure Pipelines

New Phishing Campaign Exploits Google Docs Comment Feature

FIN7 Mailing Malicious USB Sticks to Drop Ransomware

Google Drive accounted for the most malware downloads from cloud storage sites in 2021

Businesses Suffered 50% More Cyberattack Attempts per Week in 2021

Top 5 Key Takeaways 2021 CISO Survival Guide

HomePod Mini Now Rumored to Launch in Seven Countries, Including Denmark and Norway

Apple Submits Alternative Payment System In South Korea

Public-Key Cryptography Standards (PKCS)

9 ways that cybersecurity may change in 2022

Cybersecurity First Principles

Combating Human Trafficking With Threat Intelligence — Prevention

EHR Vendor QRS Faces Lawsuit After Cyberattack Exposed Nearly 320,000 Patients’ Information

Mozilla unveils Total Cookie Protection for Firefox Focus on Android

Microsoft: This macOS bug could bypass controls and access private user data

DDoS attacks that come combined with extortion demands are on the rise

With the ‘Great Resignation’ Comes the ‘Great Exfiltration’

Apple’s Private Relay Is Being Blocked

It’s Time to Close Guantanamo

Millions of Routers Impacted by NetUSB Kernel Vulnerability

SonicWall SMA appliances beset by multiple vulnerabilities

Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure

CISA, FBI, and NSA Release Cybersecurity Advisory on Russian Cyber Threats to U.S. Critical Infrastructure

Millions Of Routers Exposed To RCE By USB Kernel Bug

SysJoker Backdoor Malware Targets Windows, Linux, And macOS

macOS Bug Could Bypass Controls And Access Private User Data

EU Data Watchdog To Europol: You’ve Helped Yourself To Too Much Data

Costa Rica Hydro Plant Gets New Lease On Life From Crypto Mining

KITEWORKS AND TOTEMO JOIN FORCES TO DELIVER MOST COMPREHENSIVE PRIVATE CONTENT COMMUNICATIONS PLATFORM

NightSky Ransomware targets Vmware Horizon servers through Log4J Vulnerability

Intel Removes All References To Xinjiang After Public Apology

New SysJoker Backdoor Targets Windows, Linux, and macOS

CISA Steps up Public and Private Sector Collaboration in 2021

Moxie Marlinspike Steps Down as Signal CEO

Kaspersky Research Uncovers Cybersecurity Budgets, Insurance, and Vendor Expectations for 2022

Why Security Awareness Training Should Begin in the C-Suite

Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure

CISA, FBI, and NSA Release Cybersecurity Advisory on Russian Cyber Threats to U.S. Critical Infrastructure

Apple’s Private Relay is Being Blocked

Deals: Apple Watch Series 7 Discounted by Up to $40 in Amazon’s New Sale

Apple Stores Could Stop Thieves With New Security Measures

Patch Tuesday January 2022: Microsoft Pushes Updates for 29 Security and Non-Security Issues. Log4j Bug Hunt Continues.

‘Fully Undetected’ SysJoker Backdoor Malware Targets Windows, Linux & macOS

Honeywell Launches New OT Cybersecurity Solution for Commercial Buildings

Night Sky ransomware operators exploit Log4Shell to target hack VMware Horizon servers

Multi-Cloud API Authorization Challenges

Air Force Improvises With 3D Printing to Overcome Supply Chain Challenge

Critical SonicWall NAC Vulnerability Stems from Apache Mods

World Economic Forum: Cybersecurity an Increasing Global Threat

Meta Delays Office Reopening, Orders Booster Shots For Staff

Cloud Security Trends: What Is Cybersecurity Mesh?

5 Things to Know About Next-Generation SIEM

LoRaWAN’s Protocol Stacks: The Forgotten Targets at Risk

The Benefits of Rapid Prototyping in Manufacturing

New ‘powerdir’ Vulnerability in macOS Exposes Protected Data

CISA Unaware of Any Significant Log4j Breaches in U.S.

Cyber attacks on corporations hit record breaking highs

Cyberattacks on Businesses Hit an All-time High of 925 per Week, New Report Shows

The Facebook Pixel Hunt aims to unravel Facebook’s tracking methods. Will you join?

Avoid Scams While Helping Loved Ones | Avast

Ransomware: Hackers are using Log4j flaw as part of their attacks, warns Microsoft

2021 was a terrible year for cybersecurity. Without action, 2022 could be even worse

Cybersecurity: Last year was a record year for attacks, and Log4J made it worse

KCodes NetUSB kernel remote code execution flaw impacts millions of devices

Industrial Firms Advised Not to Ignore Security Risks Posed by URL Parsing Confusion

Microsoft Details ‘powerdir’ macOS Vulnerability Leading to Data Leaks

Millions of Routers Exposed to RCE by USB Kernel Bug

Is the ‘Great Resignation’ Impacting Cybersecurity?

Beats Fit Pro to Launch in Canada and Europe on January 24

Microsoft Shares Details on macOS Bug

Night Sky: the new corporate ransomware demanding a sky high ransom

How to share your Wi-Fi password safely

noPac Exploit: Latest Microsoft AD Flaw May Lead to Total Domain Compromise in Seconds

Attackers are mailing USB sticks to drop ransomware on victims’ computers

Ransomware warning: Hackers are using Log4j flaw as part of their attacks, warns Microsoft

Millions of Routers Exposed by Bug in USB Module

New KCodes NetUSB Bug Affect Millions of Routers from Different Vendors

How banks can help counter Human Trafficking

DDoS Attacks Have Grown Stronger in 2021

EU data watchdog to Europol: You’ve helped yourself to too much data

Cookie Files: Associated Privacy and Security Risk Overview

Apple’s Silicon Designer Jeff Wilcox Joins Intel

O2, Virgin Will Not Introduce EU Roaming Charges

MRIoA Discloses Data Breach Affecting 134,000 People

Beats Fit Pro to Launch in Additional Countries on January 24

£92m lost to romance scammers in 2021

What Is FIM (File Integrity Monitoring)?

Fraud Bible – Scammers Offer Classes On How To Defraud People

Security Expert re: CISA Warns About Log4j And Long-term Risks For U.S. Critical Infrastructure

38.9M Health Records Stolen From Bangkok Hospital

Services Australia Dismisses Security Concerns with COVID-19 Digital Certificates

Misinformation is a Hazard to Cyber Security

Banks Still Struggling to Spot the Signs of Human Trafficking

DDoS Attacks Increasing Again

Secure boot for UK electric car chargers isn’t mandatory until 2023 – but why the delay?

Romance Scammers Stole £92m From Victims Last Year

Corporate Cyber-Attacks Spike 50% in 2021

AvosLocker ransomware now targets Linux systems, including ESXi servers

Signal CEO Resigns, WhatsApp Co-Founder Takes Over as Interim CEO

Analyst guide: Encryption solutions buyers checklist

2022 Cybersecurity Predictions from Lookout: Work From Anywhere Ends On-Premises Security

Looking for adding new detection technologies in your security products?

Four million outdated Log4j downloads were served from Apache Maven Central alone despite vuln publicity blitz

The Log4j Incident Demonstrated Again That Publicly Disclosing 0-day Vulnerabilities Only Aids Intruders

Microsoft Details macOS Bug That Could Let Attackers Gain Access to User Data

Small businesses are most vulnerable to growing cybersecurity threats

Podcast Episode: Algorithms for a Just Future

Russians will face even more serious cyber threats in 2022

Data security in the age of insider threats: A primer

A 50% increase in cyber attacks year on year

Cyber criminals earning £750m with insecure passwords

Europol Ordered to Delete Data of Individuals With No Proven Links to Crimes

WordPress 5.8.3 Security Release fixes four vulnerabilities

Apple to Allow Alternative Payment Systems in App Store in South Korea

Kuo: Apple Headset Will Use Same 96W Power Adapter as 14-Inch MacBook Pro

How the pandemic fueled enterprise digital transformation

Many users don’t know how to protect their broadband Wi-Fi routers

ZTNA Leader Perimeter 81 Welcomes New VPs Lital Parush-David and Tal Laufer

Arctic Wolf Appoints Dan Schiappa as Chief Product Officer

U.S. News & World Report Names IDShield Among Best Identity Theft Protection Services of 2022

TrueFort Named Top Cyber Security Company of 2021 by The Software Report

Imperva Appoints Brad Steiner as General Counsel and Chief Compliance Officer

Hackers Distribute Malicious Version of dnSpy Malware To Attack Security Researchers

Video surveillance systems market to grow steadily by 2026

Protecting Your Privacy This Year

Apple Could Release OLED iPad With Samsung Display Panel in 2024

Zyxel adds WiFi access point security service to its Nebula Cloud Networking solution

Indian APT exposes its Modus Operandi by infecting their own devices

Europol Ordered to Delete Data Not Linked With Crime

Firms need better breach response, clear regulatory guidelines

JavaScript developer destroys own projects in supply chain “lesson”

Apple’s Shazam Music Recognition Service Now Available as Chrome Extension

CyberCube designs three cyber scenarios for Lloyd’s market to stress test their portfolios of risk

Signal CEO Moxie Marlinspike resigns, leaves WhatsApp co-founder to run things until a successor is named

Report: Increased Log4J exploit attempts leads to all-time peak in weekly cyberattacks per org

Panasonic giving employees the option of a four-day work week

The rise of the CISO: The escalation in cyberattacks makes this role increasingly important

Upland Software acquires Objectif Lune to expand its global document workflow product library

LG Electronics joins IBM Quantum Network to explore applications of quantum computing

CES 2022 – the “anyone can make an electric car” edition

Google Exec Pushing RCS Adoption Says He’s ‘Not Asking Apple to Make iMessage Available on Android’

Rash Sahota joins Isotropic Systems as General Manager and COO

Apiiro appoints Eldan Ben-Haim as Chief Architect Officer

SilverSky acquires Cygilant to strengthen its cybersecurity portfolio and expand into new markets

Signal founder and CEO Moxie Marlinspike announces resignation

Equinix hires Jon Lin as EVP and General Manager, Data Center Services

Brad Steiner joins Imperva as General Counsel and CCO

Sectra appoints Jessica Holmquist as CFO

Multiple Vulnerabilities Spotted In MSI Digital Assets

Researchers Explain How SSRF Vulnerabilities Risk Java RMI Services

What Editing Crosswords Can Teach Us About Security Leadership

CrowdStrike Services Offers Incident Response Tracker for the DFIR Community

Can Project Maven help shape acquisition policy?

Microsoft: macOS ‘Powerdir’ Flaw Could Let Attackers Gain Access to User Data

No Significant Intrusions Related to Log4j Flaw Yet, CISA Says

IT Security News Daily Summary 2022-01-10

OPM prods agencies to name chief diversity officers

Breach Response Shift: More Lawyers, Less Cyber-Insurance Coverage

Apple Reportedly Looking to Broadcast Major League Baseball Games Next Season

Finalsite says no data stolen during ransomware attack affecting 3,000 US public schools

Chainalysis: Cryptocurrency crime reaches all-time high

Windows security in ’22 — you need more than just antivirus software

California town announces data breach involving police department, loan provider

Nine Top of Mind Issues for CISOs Going Into 2022

Gmail App for iOS Adds New Inbox Widget

Forensics Expert Kept Murder Snaps on PC

Facebook Rolls Out New “Privacy Center” To Educate Users

Several EA Sports FIFA 22 players have been hacked

UK Launches Parliament Crypto Group

“H2 Security Flaw Is Critical,” Says Experts

Log4j Analysis: Attack Patterns, Payloads And Bypass Techniques

How DDoS Attack On AWS Results In 3.7m FlexBooker Accounts Being Hacked

Hackers Exploit Cloud Video Platform To Target Real Estate Websites

CISA director: ‘We have not seen significant intrusions’ from Log4j — yet

FBI Warns FIN7 Campaign Delivers Ransomware via BadUSB

Uber’s Apple Watch App No Longer Works

Why Data Security is crucial?

NY AG Investigation Highlights Dangers of Credential Stuffing

The metaverse offers a future full of potential – for terrorists and extremists, too

CISA director: ‘We have not seen significant intrusions’ from Log4J yet

Apache Foundation Calls Out Open-Source Leechers

Connecticut Nerds Report CSAM

Simplify Cloud with Data Management as a Service

Cities in Texas hit by QR-code phishing scam

Vulnerability Summary for the Week of January 3, 2022

Avira also mines imaginary internet money on customers’ PCs

VMware ESXi 7 users vulnerable to hypervisor takeover bug

Vulnerability Summary for the Week of January 3, 2022

Apple Highlights Services in 2021, Recaps Upcoming Features Like IDs on iPhone

Apple Discontinues Beats Pill+ Bluetooth Speaker

Align your security and network teams to Zero Trust security demands

URL Parsing Bugs Allow DoS, RCE, Spoofing & More

Cyber-Thieves Raid Grass Valley

Beware Of Nasty Telegram Installers That Spread Purple Fox Malware

Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource

trusted computing base (TCB)

honeynet

The FTC Wants Companies to Find Log4j Fast. It Won’t Be Easy

Apple Building Momentum for 2022 Releases as Supply Chain Recovers

Microsoft Discovered New ‘Powerdir’ macOS Vulnerability, Fixed in 12.1 Update

New macOS vulnerability, “powerdir,” could lead to unauthorized user data access

What Log4j Vulnerability Means for SREs

Weekly cyberattacks jumped by 50% in 2021, with a peak in December due largely to the Log4J exploit

Multilingual Cybersecurity Awareness Training adapted for your needs

Penetration Testing 101: A Beginner’s Guide to Ethical Hacking

How to lock down your Microsoft account and keep it safe from outside attackers

Behind the Community Defense Model with the Center for Internet Security (CIS)

Cyber-Spike: Orgs Suffer 925 Attacks per Week, an All-Time High

GCHQ Rebuked For Ignoring Spy Law Safeguards As Pandemic Hit Britain

Abcbot Botnet Is Linked To Xanthe Cryptojacking Group

China Puts Walmart In The Naughty Corner Over 19 Vulnerabilities

Indian Patchwork Hacking Group Infects Itself With RAT

Deals: Apple’s 256GB 13-Inch M1 MacBook Pro on Sale for $1,149.99 ($149 Off)

Israel’s Counterterrorism Designation Regime: A Process in Need of Reform

How to Run Windows on an Intel or M1 Mac

USB drives now being mailed with ransomware

Abcbot DDoS Botnet Linked to Older Cryptojacking Campaign

U.S. Government Issues Warning Over Commercial Surveillance Tools

3 areas privacy and cybersecurity teams should collaborate

Allowlisting vs. blocklisting: Benefits and challenges

Abcbot and Xanthe botnets have the same origin, experts discovered

US Arrested Multi-year Phishing Scam Suspect

Fertility Centers of Illinois Hit by Cyberattack Impacting Nearly 80,000 Patients

URL parsing: A ticking time bomb of security exploits

Behind the scenes: A day in the life of a security auditing manager

Missed AirPods Deals Over the Holidays? Here Are All The Best Discounts You’ll Find in January

You Can Join FaceTime Calls on an Xbox but Not an Apple TV

Abcbot botnet is linked to Xanthe cryptojacking group

FBI: Cyber criminals are mailing out USB drives that install ransomware

Indian Patchwork hacking group infects itself with remote access Trojan

The Evolution of Patch Management: How and When It Got So Complicated

Researchers Find Bugs in Over A Dozen Widely Used URL Parser Libraries

UScellular Discloses Data Breach Following A Cyber Attack

Indian-linked Patchwork APT infected its own system revealing its ops

Uncovering and Defending Systems Against Attacks With Layers of Remote Control

Omnichannel E-commerce Growth Increases API Security Risk

SecurityWeek Cyber Insights 2022: Ransomware

Abcbot Botnet Linked to Operators of Xanthe Cryptomining malware

China puts Walmart in the naughty corner, citing 19 alleged cybersecurity ‘violations’

A ‘friend from the city’ making her mark on government contracting

Abcbot botnet has now been linked to Xanthe cryptojacking group

SonicWall Patches Y2K22 Bug in Email Security, Firewall Products

EU Mobile Operators Want Apple’s iCloud Private Relay Service to Be Outlawed Over Concerns of ‘Digital Sovereignty’

Body Temp Sensor in Apple Watch Series 8 Looking Unlikely, Suggests Gurman

Detect and identify IoT malware by analyzing electromagnetic signals

The NPM Libraries ‘Colors’ and ‘Faker’ Were Corrupted

WordPress 5.8.3 Patches Several Injection Vulnerabilities

NPM libraries ‘colors’ and ‘faker’ corrupted

Cybersecurity Researchers and Developers Targeted in a Malicious Campaign Spreading dnSpy

GCHQ was rebuked for ignoring spy law safeguards as pandemic hit Britain

Over Half of SMEs Have Experienced a Cybersecurity Breach

The FTC Wants Companies to Find Log4j Fast. It Won’t Be So Easy

Jason Sudeikis Wins Golden Globe Award for Apple TV+ Comedy Series ‘Ted Lasso’

SonicWall Email Security and Firewall Products Impacted by the Y2K22 Vulnerability

A week in security (January 3 – 9)

What is Quantum Computing? And why does the UK want to lead the world?

Indian Cyberspies Expose Their Operation After Infecting Themselves With RAT

US Issues Warning Over Commercial Spyware

Q4 2021 Cyber Attacks Statistics

Zloader Malware Exploits Microsoft Sign Verification To Drop Payload

India Opens Probe Into Google After Publishers Complain

Roblox To Rebuild China App After Pulling Plug

Silicon In Focus Podcast: Why Digital Transformation Projects Fail

Hackers Targeting Log4j Flaws in VMware Horizon – NHS

FlexBooker Reveals Major Customer Data Breach

Mockup Shows What iPhone 14 With Pill-Shaped Notch Could Look Like in Your Hand

UK’s Virgin Mobile and O2 Network Users Won’t Face EU Roaming Charges When Traveling Abroad

The latest on the Log4j vulnerability

How Zero Trust Will Change Incident Response

Check Point Research: Cyber Attacks Increased 50% Year over Year

Finalsite: All School Sites Now Restored After Ransomware Attack

Cyberattack causes jail lockdown

Gaming Event E3 Cancelled Due To Covid-19

Instagram Criticised After Blocking Memorial Hashtag

Volkswagen Microbus To Return As Electric Vehicle

Edward Snowden Privacy Update | Avast

Spotify Still Can’t Say When Its Delayed ‘HiFi’ Streaming Service Will Launch

No defence for outdated defenders as consumer AV nears RIP

Avira is adding a crypto miner to its products as well

Tripwire Patch Priority Index for December 2021

QNAP Urges Users to Secure NAS Devices as Attacks Surge

A Data Breach To An AWS Portal Glitch By Ravkoo, A US-based Online Pharmacy

What to expect in 2022 privacy wise?

Trying to register your antivirus in Windows Security Center?

Google Removes Features After Sonos Legal Win

According to Chainalysis, Around $2.2 Billion was Stolen from DeFi Protocols in 2021

How To Assess Supply Chain Security For Your Business

KeePass 2.50 speeds up key derivation functions significantly

BADNEWS! Patchwork APT Hackers Score Own Goal in Recent Malware Attacks

New ZLoader malware campaign hit more than 2000 victims across 111 countries

Ragnar Locker Ransomware strikes a cybersecurity firm

Cyber Attack on Norway Amedia

Eight resolutions to help navigate the new hybrid office model

Night Sky: New Ransomware Targeting Corporate Networks

On-premises cloud: The worst of both worlds?

6 cloud security trends to watch for in 2022

Can We Lighten the Cybersecurity Load for Heavy Industries?

Read Entire Article