BOOK THIS SPACE FOR AD
ARTICLE ADIT Security News Daily Summary 2022-01-16
Microsoft Uncovers Destructive Malware Used in Ukraine Cyberattacks
A Cybersecurity Conversation with Vince Moore – Senior Network Engineer at OPSWAT
European Union simulated a cyber attack on a fictitious Finnish power company
Gurman: Apple Considered a Battery-Powered ‘HomePod’ Years Ago
Russian Court Remands Hackers in Custody
ProMotion Now Expected to Remain Exclusive to iPhone 14 Pro Models, Not Expand to Entire Lineup
Why Did Russia Escalate Its Gray Zone Conflict in Ukraine?
New Mexico Jail went on Lockdown due to Cyberattack
Ukraine Government Websites Targeted in a Suspected Russian Cyber Attack
2021 (ISC)² Leadership Webinars On-Demand
SnatchCrypto attack hits DeFi and Blockchain Platforms with backdoor
Apple Requiring Employees to Submit Proof of COVID-19 Booster Shot or Face Frequent Testing
Microsoft Warns of Destructive Malware Targeting Ukrainian Organizations
Defense Contractor Hensoldt Confirms Lorenz Ransomware Attack
Destructive Hacks Against Ukraine Echo Its Last Cyberwar
Microsoft Warns of Destructive Malware Targeting Ukrainian Organizations
Microsoft spotted a destructive malware campaign targeting Ukraine
Ukraine Says Has ‘Evidence’ Russia Behind Cyberattack
How Apple’s iCloud Private Relay Can Keep You Safe
A new wave of Qlocker ransomware attacks targets QNAP NAS devices
New Unpatched Apple Safari Browser Bug Allows Cross-Site User Tracking
North Korea pulled in $400m in cryptocurrency heists last year – report
Security Affairs newsletter Round 349
Because of a Flaw in Microsoft Defender, Threat Actors can Evade Detection
A New Destructive Malware Targeting Ukrainian Government and Business Entities
Threat actors stole $18.7M from the Lympo NTF platform
Week in review: 2022 cloud security trends, Microsoft fixes wormable RCE
Is fighting cybercrime a losing battle for today’s CISO?
New iPad Air Rumored to Launch This Spring With A15 Chip, 5G, Center Stage Camera, and More
Destructive malware targeting Ukrainian organizations
Apple Adding Last MacBook Pro With CD Drive to Vintage Products List
Comcast announces test of a prototype 10G modem for home broadband use
Uppsala Security partners with NSHC to offer virtual asset tracking solution
Why Hackers Attack Mobile Devices and How to Prevent It
What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?
How to Avoid Spam Texts and Protect Personal Information in the Digital Age
Moscow court charges 8 alleged REvil ransomware hackers
Markus Ogurek joins CommScope as SVP and Segment Leader of Venue and Campus Networks
Red Canary appoints Dean Hager to Board of Directors
IT Security News Daily Summary 2022-01-15
Six Rumored Apple Products You’re Unlikely to See This Year
Ukraine Hacks Add to Worries of Cyber Conflict With Russia
Prominent Carding Marketplace UniCC announced it’s shutting down
NFT Minting Platform Lympo Got Compromised for $18.7M
How to evolve your organization into a data-centric security architecture
Largest dark web market for stolen cards UniCC calls it quits
A Teen Took Control of Teslas by Hacking a Third-Party App
Top Stories: iPhone 14 Pro Rumors, iCloud Private Relay Controversy, iOS 15.2.1 Released, and More
The GootLoader Hackers are After Law Firms and Accounting Firms
One of the REvil members arrested by FSB was behind Colonial Pipeline attack
Cyberattack Compels Albuquerque Public Schools to Close 144 Schools
Russia Arrests REvil Ransomware Gang Responsible for High-Profile Cyber Attacks
Apple to Allow In-App Third-Party Payment Options for First Time in the Netherlands
19-Year-Old Claims to Have Hacked Into More Than 25 Teslas
Build or Buy your own antivirus product
Massive Cyber Attack Knocks Down Ukrainian Government Websites
What do cybersecurity experts predict in 2022?
Why Is It Important to Invest in OT Cybersecurity for 2022?
How Should Organizations Tackle Their Data Privacy Requirements?
Box Sign expands capabilities and developer tools to digitize agreements in the content cloud
Aditya Birla Fashion and Retail – 5,470,063 breached accounts
RICOH Capture & Conversion Services gives teams access to actionable analytics
Exploiting Wi-Fi Stack on Tesla Model S
Tencent Keen Security Lab joins GENIVI Alliance
Tencent Keen Security Lab: Experimental Security Assessment on Lexus Cars
Tencent Security Keen Lab: Experimental Security Assessment of Mercedes-Benz Cars
Russia ”neutralizes” REvil ransomware gang, arrests 14
Week in security with Tony Anscombe
Pondurance appoints Mike Melka as CFO and Amy Thaler as VP of People Operations
Danielle Sheer joins Commvault as Chief Legal and Compliance Officer
Anomali names Chris Peterson as VP of Global Channel and Technology Partnerships
Cybersecurity for Industrial Control Systems: Part 1
At Request of U.S., Russia Rounds Up 14 REvil Ransomware Affiliates
Threat actors defaced Ukrainian government websites
IT Security News Daily Summary 2022-01-14
Who is the Network Access Broker ‘Wazawaka?’
Russia Takes Down REvil Ransomware Operation, Arrests Key Members
Friday Squid Blogging: The Evolution of Squid Eyes
VA delays EHR deployment due to COVID cases
The Cybersecurity Measures CTOs Are Actually Implementing
Verified, Certified, Trusted Security Building Blocks – DATASHUR SD Evaluation
World’s Biggest Darknet Stolen Credit Card Site Closes
Windows RDP Bug Opens Users To Data Theft
Expert Comment: Teen Claims To Have Hacked Dozens Of Teslas Worldwide
Maryland Confirms Ransomware, Leaving Hospitals Struggling
USPS, USDS collaborate on new COVID-19 test website
Netflix Again Raises Prices for All Plans, 4K Streaming Now $20 Per Month
Seditious Conspiracy: What to Make of the Latest Oath Keepers Indictment
Russia starts playing by the rules: FSB busts 14 REvil ransomware suspects
Lorenz ransomware gang stolen files from defense contractor Hensoldt
Former DHS acting IG pleads guilty in software scheme
Developers Now Able to Submit Claims for $250 to $30,000 Payments From Apple in Lawsuit Settlement
Husband and wife among ransomware operators arrested in Ukraine
Army plans ICAM rethink to support unified network operations
Russia arrests REvil ransomware gang members at request of US officials
Details Published on AWS Flaws Leading to Data Leaks
5 Trends in Patch Management for 2022
Russian government claims to have dismantled REvil ransomware gang
Next iPad Pro Might Feature Large Glass Apple Logo to Allow Wireless Charging
Pentagon Moves to Improve its Cybersecurity-Centered Engagement with Universities
ID verification, analytics can help agencies fight fraud
Serious Security: Linux full-disk encryption bug fixed – patch now!
Flaw Found in Biometric ID Devices
Maryland Dept. of Health Responds to Ransomware Attack
Russia Takes Down REvil Hackers—as Ukraine Tensions Mount
Today’s Trends: Consumers Prioritize Protection Over Convenience
George Takei and Usain Bolt to Join Check Point CPX 360
7 obstacles that organizations face migrating legacy data to the cloud
White House Meets With Software Firms and Open Source Orgs on Security
U.S. Cyber Command Officially Links MuddyWater Gang to Iranian Intelligence
3rd-party flaws allowed a teen hacker to track location of Tesla cars
Network Intrusion Detection Using Snort>
Small Business Cybersecurity: What Will Be Different in 2022?
Ferriero to retire from National Archives
Top Illicit Carding Marketplace UniCC Abruptly Shuts Down
MacRumors Giveaway: Win a Weekender Bag and Backpack From Vessel
A Cybersecurity Role Has Topped List of Best Jobs
3rd-party flaws allowed teen hacker to track location of Tesla cars
Android Users can Disable 2G to Protect From Stingrays or IMSI Catchers
Today’s Trends: People Feel More Exposed to Online Threats, Want Stronger Protection
Russian authorities take down REvil ransomware gang
Critical Cisco Contact Center Bug Threatens Customer-Service Havoc
Real Big Phish: Mobile Phishing & Managing User Fallibility
Report: Facebook Is Still Failing To Crack Down On Fake Reviews
Insurers Stake Out Their Ground for Covering State Cyber Attacks
Multi-day IT systems outage whacks umbrella biz Parasol Group amid fears of a cyber attack
‘Be Afraid:’ Massive Cyberattack Downs Ukrainian Gov’t Sites
Austrian Regulator Says Google Analytics Contravenes GDPR
Ivanti Updates Log4j Advisory with Security Updates for Multiple Products
Apple AR/VR Headset Potentially Delayed Until 2023 Amid Development Problems
The FCC propose new rules for data breach reporting
Russian cyber attack on Ukraine downs government websites
North Korean Hackers Stole $400 Million Worth of Cryptocurrency in 2021
Ivanti Updates Log4j Advisory with Security Updates for Multiple Products
North Korea-linked APT BlueNoroff focuses on crypto theft
Ukrainian government targeted in cyberattack
Ukraine shrugs off mass govt website defacement as world turns to stare at Russia
George Takei and Usain Bolt to Join Check Point CPX 3
A Shift Away from Daily COVID Case Counts Has Begun
Cyber Attack in Albuquerque Latest to Target Public Schools
REvil ransomware crew allegedly busted in Russia, says FSB
REvil Ransomware Gang Arrested In Russia
Three Plugins With Same Bug Put 84k WordPress Sites At Risk
BioPlus Faces Class-Action Lawsuit Over Security Measures
North Korean Hackers Impersonate Crypto Firm To Scam Startups
Ukrainian Government Websites Face Attack
Analyst: All iPhone 14 Models to Feature 120Hz Displays, 6GB of RAM, and More
Deals: Get Up to $100 Off Apple’s 12.9-Inch iPad Pro and Magic Keyboard
Hackers Behind MacBook Pro Schematics Leak Arrested in Russia
What Is Vulnerability Management?
Russian Security Takes Down REvil Ransomware Gang
Russia Lays the Smackdown on REvil Ransomware Gang
What’s Next for Patch Management: Automation
Ukraine Suffers Massive Cyberattack, As Russia Increases Troop Buildup
Detection Rules for Sysjoker (and How to Make Them With Osquery)
Three Plugins with Same Bug Put 84K WordPress Sites at Risk
North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide
Deals: AirPods 3 Return to Holiday All-Time Low Price of $139.99
Google Continues Real Estate Push With $1bn London Office Purchase
The Great Resignation: How to Acquire and Retain Cybersecurity Talent
Amazon fixes security flaw in AWS Glue service
A major hacker service has been eliminated in Ukraine
The race towards renewable energy is creating new cybersecurity risks
Dark web carding platform UniCC shuts up shop after making millions
Recent GootLoader Campaign Targets Law, Accounting Firms
There is no substitute for a CISO…or is there?
Free Unofficial Patch for Windows ‘RemotePotato0’ Now Available
Lazarus, Cobalt, and FIN7 Cyber Groups Allegedly Opened Fire on the Financial Industry
A ‘massive’ hacking attack has hit government websites in Ukraine
North Korean hackers stole a record-breaking amount of cryptocurrency last year
SnatchCrypto campaign plants backdoors in crypto startups, DeFi, blockchain networks
Salvadoran Government Denies Using Spyware on Journalists
Ukrainian Government Websites Forced Offline in “Massive” Cyber-Attack
Using EM Waves to Detect Malware
Apple ‘Ready to Spend Billions’ on Live Sports Content Over Next Four Years
Cryptocurrency Startups Targeted by the BlueNoroff Hacking Group
Facebook Faces £2.3 Billion Lawsuit From 44m UK Users
U.S. Government, Tech Giants Discuss Open Source Software Security
North Korean Hackers Stole $400m in Cryptocurrency Last Year
Ukrainian police arrested Ransomware gang behind attacks on 50 companies
A Weakness Found in Microsoft Defender Allows Hackers to Avoid Malware Detection
Analyzing an Old Bug and Discovering CVE-2021-30995
Ukrainian Cops Bust Suspected $1m Cybercrime Ring
Hacker Hacked Multiple High-profile FIFA 22 Accounts by Phishing EA Support Agents
Nanocore, Netwire, and AsyncRAT Distribution Campaigns Make Use of Public Cloud Infrastructure
What Is Risk-Based Vulnerability Management?
Malicious QR Codes Found In Austin | Avast
Ukraine Reports Massive Cyber Attack on Government Websites
Tech Giants to Team-Up on Open Source Security After White House Meet
New Chrome security measure aims to curtail an entire class of Web attack
Uber Finally Fixes Email Bug | Avast
Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows ?
Husband-Wife Arrested in Ukraine for Ransomware Attacks on Foreign Companies
U.K. Hacker Jailed for Spying on Children and Downloading Indecent Images
Threat actors can bypass malware detection due to Microsoft Defender weakness
Visibility, immutability, security … a revolutionary approach to fighting off ransomware
Singapore busts network hawking contraband e-vaporisers via Telegram
Cisco Releases Patch for Critical Bug Affecting Unified CCMP and Unified CCDM
Analytics Are Essential for Effective Database Security
New infosec products of the week: January 14, 2022
How to improve your IR tabletop exercises and why you really should?
Cyber attack on New Mexico’s Largest School District
The future of security protocols for remote work
US authorities track MuddyWater Hacking Group to Iran
Manufacturers are starting to realize the importance of OT security
In 2022, AI-based full-suite security is needed
Anomali Appoints Chris Peterson as Vice President of Global Channel and Technology Partnerships
What Were the Best Cybersecurity Webinars of 2021?
Find A New Cybersecurity Job in 2022
AT&T teams with Cisco to create new managed SASE offering
Top 10 AT&T Cybersecurity blogs published in 2021
MFA market to reach $21.3 billion by 2027
Beware!! Magniber Ransomware Delivered via Microsoft Edge and Google Chrome as an Update
CyberSaint CyberBase helps SMBs to comply with regulations
Maryland Lawmaker: Officials Misled on Ransomware Attack
IronNet collaborates with New York Power Authority to defend key supply chain partners
FIN7 group continues to target US companies with BadUSB devices
January 6 House Committee subpoenas Google, Facebook, Twitter and Reddit
Making loyalty pay: How to keep your loyalty rewards safe from scammers
Recapping Rumors About Under-Screen Face ID and Touch ID on Future iPhones
Merit raises $50 million to expand into new business lines and use cases
DigiCert acquires Mocana to accelerate its presence in the IoT market
Zayo Group acquires QOS Networks to offer SD-WAN solutions for enterprise customers
CTIA 5G Security Test Bed assesses potential threats to 5G security
Keeping Your System Secure is Easier than Ever with LinuxSecurity Customized Advisories!>
Cyberattack shuts down Albuquerque schools; county copes with ransomware incident
New York Power Authority to beef up cybersecurity with new IronNet, AWS deal
Open Source Sabotage Incident Hits Software Supply Chain
Mogo appoints Allan Smith as CPO
Elastic promotes Ashutosh Kulkarni to CEO
Denis Cashman joins Onapsis as CFO
SysJoker: Cross-Platform Backdoor Malware for Mac, Windows, and Linux
Microsoft Yanks Buggy Windows Server Updates
Alef appoints Dean Bogdanovic as CTO and Ritesh Johar as EVP of Engineering
Russell P. Reeder joins Netrix as CEO
City heat officers lean into tech to control temperatures, inform response
Want to improve corporate security? Prioritize personal security
Albuquerque public schools shut down by cyberattack as county struggles with ransomware incident
Iran-Based APT35 Group Exploits Log4J Flaw
IT Security News Daily Summary 2022-01-13
Is there a path forward in Congress for mandatory cyber incident reporting?
Maryland Health Department hit with ransomware
To improve corporate security, employers need to make personal security a priority
BlueNoroff Threat Group Targets Cryptocurrency Startups
How to Protect Your Phone from Pegasus and Other APTs
Fighting Back Against Pegasus, Other Advanced Mobile Malware
Cisco fixes a critical flaw in Unified CCMP and Unified CCDM
Report: Majority of malware downloads in 2021 were traced to cloud apps
Biden’s CX order puts new momentum behind longtime efforts, leaders say
6 strategies for better mobile services delivery
Log4j: Google and IBM call for list of critical open source projects
North Korean APTs Stole ~$400M in Crypto in 2021
Pennsylvania Welcomes New Cybersecurity Center
Vice Principal Charged with Cyber-Stalking
How to Make the Attack Lifecycle Actionable with Intelligence
Review: CalDigit’s Element Hub Delivers Flexible Thunderbolt and USB Support
PUBG Maker Sues Apple and Google for Not Removing Clone Apps
Orca Security tells AWS fail tale with a happy ending
Log4J: After White House meeting, Google and IBM call for list of critical open source projects
Ukrainian police bust unnamed ransomware gang
EFF Asks Appeals Court to Rule DMCA Anti-Circumvention Provisions Violate First Amendment
EFF Threat Lab’s “apkeep” APK Downloader, Now More Capable and Available in More Places
Ransomware cyberattack forces New Mexico jail to lock down
Researcher Gains Remote Control Of More Than 20 Tesla’s
Meshed Cybersecurity Platforms Enable Complex Business Environments
Over Half Of Organizations Struggle To Avoid Major Incidents And Losses
Hot wallet hack: Hackers steal $18.7m from Animoca’s Lympo NTF platform
FCC Proposes Stricter Data Breach Reporting Requirements
What to Expect From the New OSCP Exam
Apple More Aggressively Pushing iOS 14 Users to Upgrade to iOS 15
Fortnite Coming Back to iOS Soon Thanks to Nvidia’s GeForce NOW Service
SBA faces fraud risks and IT security woes, IG says
New Vulnerabilities Highlight Risks of Trust in Public Cloud
Panasonic Confirms Hackers Accessed Personal Information – Security Expert Comment
Threat Intelligence Expert On Iranian MOIS Threat Group MuddyWater / TEMP.Zagros
Linux-Targeted Malware Increases by 35% in 2021: XorDDoS, Mirai and Mozi Most Prevalent
FIN7 Uses Flash Drives to Spread Remote Access Trojan
Apple Seeds Second Public Betas of iOS 15.3 and iPadOS 15.3
Continuous security and compliance for hybrid cloud, the Red Hat way
Wireshark creator joins Sysdig to extend it to cloud security
After Log4J, White House worries about the next big open source flaw
US Military Ties Prolific MuddyWater Cyberespionage APT to Iran
New study reveals phishing simulations might not be effective in training users
FCC Chair Proposes New Policies for Carrier Data Breach Reporting
How Cybercriminals Are Cashing in on the Culture of ‘Yes’
Why There Is Increase In QR-code Phishing Scams
Multiple Critical Bugs Identified in SonicWall SMA 100 Appliances
Cisco Releases Security Updates for Multiple Products
Apple Releases Security Updates for iOS and iPadOS
Citrix Releases Security Updates for Hypervisor
Juniper Networks Releases Security Updates for Multiple Products
iOS 15 Now Installed on 72% of iPhones From the Last Four Years
Learn about 4 approaches to comprehensive security that help leaders be fearless
German Watchdog Finds No Evidence Of Xiaomi Secret Function
Is ransomware as a service going out of style?
Cisco Releases Security Updates for Multiple Products
Apple Releases Security Updates for iOS and iPadOS
Citrix Releases Security Updates for Hypervisor
Juniper Networks Releases Security Updates for Multiple Products
Rethinking the Press in an Era of Distrust
Securing Taiwan Requires Immediate Unprecedented Cyber Action
Chinese Hackers Exploiting Log4Shell Vulnerability & Attack Internet-Facing Systems
The Best Threat Hunters Are Human
Some Android users can disable 2G now and why that is a good thing
Windows 11 setup: Which user account type should you choose?
S3 Ep65: Supply chain conniption, NetUSB hole, Honda flashback, FTC muscle [Podcast + Transcript]
Ransomware attack locks down inmates in US Jail
Ransomware attack on New Mexico jail put prisoners in lockdown
Threat actors abuse public cloud services to spread multiple RATs
Using Foreign Nationals to Bypass US Surveillance Restrictions
Phishers on the prowl with fake parking meter QR codes
Ukrainian cops nab husband and wife suspected to be part of $1m ransomware operation
Group-IB revealed 50 fraud schemes with fake investments
Treasury Select Committee To Investigate Visa, Mastercard Fee Increases
New GootLoader Campaign Targets Accounting, Law Firms
Ransomware Group That Targeted Over 50 Companies Dismantled in Ukraine
Redefining the CISO-CIO Relationship
Apple Expanding ‘App Store Foundations’ Program to Additional Countries
Malicious USB drives are being posted to businesses
Microsoft RDP Bug Enables Data Theft, Smart-Card Hijacking
Austrian watchdog rules German company’s use of Google Analytics breached GDPR by sending data to US
Digital Transformation: Balancing Speed, Security and Innovation
Adobe Cloud Abused to Steal Office 365, Gmail Credentials
Researchers Decrypted Qakbot Banking Trojan’s Encrypted Registry Keys
GootLoader Hackers Targeting Employees of Law and Accounting Firms
Deals: Apple’s 21.5-Inch iMac Hits Record Low Price of $599.99 ($499 Off)
Lazarus Group, Cobalt Gang and FIN7 the Worst Threat Actors Targeting the Financial Services Sector
Phishers are targeting Office 365 users by exploiting Adobe Cloud
Windows 11 OS Struggles To Crack 1 Percent – Lansweeper
DigiCert acquires Mocana to bolster IoT security
Virtana, which helps companies to manage multiple cloud environments, raises $73M
Norton’s cynical crypto ploy: A dark harbinger of crapware to come?
When open-source developers go bad
Cisco Patches Critical Vulnerability in Contact Center Products
Maryland Confirms Ransomware Attack at Health Agency
Shield raises $15M to monitor financial industry employee communications
Ransomware locks down prison, knocks systems offline
Check If You Have to Worry About the Latest HTTP Protocol Stack Flaw
North Korean Hackers Stole Nearly $400M in Crypto Last Year
Apple to Attend White House Meeting to Discuss Security Risks of Open-Source Software
Amazon and Azure Cloud Services Abused in a Malicious Trio RAT Campaign
Admins report Hyper-V and domain controller issues after first Patch Tuesday of 2022
The Future of Work without Workers
Zero Trust Integrations Are Expanding in the CrowdStrike Partner Ecosystem
ZDI Announces Rules and Prizes for Pwn2Own 2022
Mozilla addresses High-Risk Firefox, Thunderbird vulnerabilities
TellYouThePass Ransomware Returns as a Cross-Platform Golang Threat
MuddyWater APT Cybercrime Group Associated to Iranian Intelligence, the U.S. Cyber Command Confirms
Online Form Builders That Lets You Create Registration Forms
Looking For a Form Builder? Here are Some Applications To Try
UK jails man for spying on kids, adults with Remote Access Trojans
U.S. Cyber Command Officially Links MuddyWater Group to Iranian Intelligence
New “Undetected” Backdoor Runs Across Three OS Platforms
PC Sales Reach Highest Level Since 2012, Says IDC
Apple Loses Key Server Chip Designer To Microsoft
SysJoker Malware and Scams in the App Store – Intego Mac Podcast Episode 222
Machine Learning For Contested Antivirus Decisions | Avast
EU to launch Cyberattack simulations on supply chains
The Medical Review Institute of America Alerts Patients of a Privacy Breach
IP Spoofing Flaw Leaves Django REST Applications Vulnerable to DDoS Attacks
Report: Dozens of El Salvador Journalists, Activists Hacked
US: MuddyWater is Iranian State-Backed Group
The BlueNoroff cryptocurrency hunt is still on
Data Breach at Ciox Health Exposed Information on Over 12,000 Patients
Report Identifies Weaknesses in Online Banking Security
Dropbox Mac App With Apple Silicon Support Now Available to All Beta Users
Fingers point to Lazarus, Cobalt, FIN7 as key hacking groups attacking finance industry
Iranian Hackers Exploit Log4j Vulnerability to Deploy PowerShell Backdoor
Volunteer Dutch flaw finders bag $100k to forward national bug bounty goal
Do you know what your supply chain is and if it is secure?
How To Spot Email Scams | Avast
Meeting Patching-Related Compliance Requirements with TuxCare
USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence
SysJoker Malware Targets Windows, Mac & Linux to Steal Sensitive Data
US Cyber Command Links ‘MuddyWater’ Hacking Group to Iranian Intelligence
Cybersecurity firm discusses how to tackle threats in the metaverse
The rising threat of cyber criminals targeting cloud infrastructure in 2022
SysJoker, a previously undetected cross-platform backdoor made the headlines
When it comes to banking security, there’s no silver bullet
Teenager hacks 23 Tesla Car through software vulnerability
Ransomware news headlines trending on Google
Telstra to flag recent SIM swaps when banks ask
Delivering vulnerable signed kernel drivers remains popular among attackers
FCC chair proposes updating data breach reporting requirements
The public sector is more concerned about external than internal threats
Apple Releases iPhone and iPad Updates to Patch HomeKit DoS Vulnerability
What makes edge computing successful?
Looking Back at 2021 and Forward to 2022
Manual and semi-automated testing for IDORs using Burp Suite
NSO spyware found targeting journalists and NGOs in El Salvador
The 5 Stages of a Credential Stuffing Attack
Consumer IAM market to reach $17.6 billion by 2026
CyberRes Galaxy accelerates executive understanding of cyber risk
NSO Group Spyware Targeted Dozens of Reporters in El Salvador
Perimeter 81 Technology Alliance Partner Program delivers cybersecurity solutions for enterprises
US Cyber Command links MuddyWater to Iranian intelligence
Rambus collaborates with Kyocera to improve printer security
MEDITECH partners with SecureLink to keep PHI data safe from cyberattacks
Ransomware Attack Locks Down US Prison
What You Need to Know for a Safe Web Browsing Experience?
After Oral Argument, the Future of Thompson v. Trump Remains Unclear
Flashpoint acquires Risk Based Security to help businesses detect emerging cyber risks
NETSCOUT provides service assurance for Southern Linc’s private 4G LTE network
Uptake collaborates with Cognizant to accelerate access to industrial AI
Device Authority integrates FIDO FDO with KeyScaler for secure device onboarding
Cryptocurrency scams: What to know and how to protect yourself
Exchange Server woes continue on January Patch Tuesday
KCodes NetUSB flaw impacts millions of SOHO routers
VICTORY: Google Releases “disable 2g” Feature for New Android Smartphones
SAP supply chains need zero trust to reach enterprise cybersecurity
Maryland officials confirm ransomware attack shut down Department of Health
Expel adds Jennifer Lawrence and Kelly Fiedler to its leadership team
Stephanie Garcia joins 8×8 as Chief Human Resources Officer
Datto appoints Brooke Cunningham as CMO
ThreatX hires Libby Merrill as CFO
Apple Outlines $30M Bag Check Lawsuit Settlement on Legal Website
How to Make API Security an Integral Part of Your Application Security Strategy
Mitchell Mlinar joins Tortuga Logic as VP of Engineering
Everbridge appoints David Henshall to Board of Directors
Dustin Grosse joins Talend as Chief Marketing and Strategy Officer
Judge: FTC Lawsuit To Break Up Facebook Can Proceed
Oxeye Introduce Open Source Payload Deobfuscation Tool
IT Security News Daily Summary 2022-01-12
TransCredit exposed financial data of half a million Americans and Canadians
Defense officials press lawmakers for a 2022 appropriation
Fortinet: Cybercriminals are exploiting Omicron news to distribute RedLine malware
Maryland officials confirm ransomware attack shut down department of health
New Research Reveals Public-Sector IAM Weaknesses and Priorities
Apple Says iOS 15.2 Included No Changes That Would Have Toggled iCloud Private Relay Off
Ransomware puts New Mexico prison in lockdown: Cameras, doors go offline
Apple Patches iOS HomeKit Flaw After Researcher Warning
CNMF Identifies and Discloses Malware used by Iranian APT MuddyWater
Q4 2021 Cyber Attacks Statistics
Lessons from the Kronos Ransomware Attack – Why Good Enough isn’t Enough
Amazon, Azure Clouds Host RAT-ty Trio in Infostealing Campaign
Widespread, Easily Exploitable Windows RDP Bug Opens Users to Data Theft
CNMF Identifies and Discloses Malware used by Iranian APT MuddyWater
Hands-On With LG’s 32-Inch UltraFine OLED Pro Display
Tennessee taps evidence-based budgeting for funding decisions
Fortinet warns of cybercriminals using Omicron variant news to distribute RedLine stealer
Clinical Review Vendor Reports Data Breach
U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions
Russia-linked threat actors targets critical infrastructure, US authorities warn
Apple Clarifies iCloud Private Relay Wording in iOS 15.3 to Prevent Confusion Over Carrier Support
Microsoft Hires Former Apple Chip Architect
Amazon’s Alabama Warehouse To Vote Next Month On Trade Union
2-year prison for pervert who hacked webcams to spy on underage girls
DHS launches new program to recruit, train climate professionals
Stolen TikTok Videos, Bent on Fraud, Invade YouTube Shorts
Teen Makes Tesla Hacking Claim
IRS plans new version of its $700M digital platform contract
‘ASTORS’ Award Winner Ermetic Receives SOC 2 Type II Certification
EA confirms dozens of high-profile FIFA accounts hacked
Phishers Take Over FIFA 22 Accounts
Flashpoint Acquires Risk Based Security
iOS 15.2.1 and iPadOS 15.2.1 Address HomeKit Vulnerability
Face ID Under the Display Returns to Being an iPhone 15 Pro Rumor
New York AG Warns 17 Firms of Credential Attacks
Mozilla Patches High-Risk Firefox, Thunderbird Security Flaws
Apple Seeds Second Beta of tvOS 15.3 to Developers
Apple Seeds Second Beta of watchOS 8.4 to Developers
Apple Seeds Second Betas of iOS 15.3 and iPadOS 15.3 to Developers
Ransomware demands… a new approach to security
US government urges organizations to prepare for Russian-sponsored cyber threats
New RAT campaign abusing AWS, Azure cloud services
Critical Infrastructure Security and a Case for Optimism in 2022
FTC Antitrust Case Against Facebook Can Proceed, Judge Rules
Increasing Number of Bank-Themed Survey Scams
How to balance self-service analytics and security
Firefox 96 update focuses on noise improvements, main thread efficiency
5 Best VPN Services 2022: Tried-and-true picks for your online privacy
iPhone 14 Pro Now Rumored to Feature Both Pill-Shaped and Circular Cutouts
Microsoft Zero Trust solutions deliver 92 percent return on investment, says new Forrester study
Software engineer hacked webcams to spy on girls—Here’s how to protect yourself
Update now: Microsoft patches 97 bugs including 6 zero-days and a wormable one
U.S. Cyber Command Operation Targets ‘Real-life Cyber Threats’
Wormable Windows HTTP hole – what you need to know
FIFA 22 phishers tackle customer support with social engineering
Biggest Threats Application Development Companies Are Facing Today
European Union to Launch Supply Chain Attack Simulation
Deals: Shop the Latest New Year’s Discounts on Apple’s Entire iPhone 13 Lineup
Rethinking the Homeland Security Enterprise
Europol to delete huge data sets of personal info of EU Citizens
Foxconn’s India Factory Restarts Production After Protests
Eureka Emerges From Stealth With Cloud Data Security Platform
New RedLine malware version distributed as fake Omicron stat counter
AvosLocker Ransomware New Variant Targets Linux Systems and ESXi Servers
How you can claim your share of the upcoming TikTok privacy settlement
Multi-platform SysJoker backdoor targeting Windows, macOS & Linux Devices
How to Analyze Malicious Microsoft Office Files
Pis Detect Malware By Scanning For Electromagnetic Waves
This new malware wants to create backdoors and targets Windows, Linux and macOS
FIFA Ultimate Team Account Takeovers Plague EA Gamers
Microsoft Introduces New Security Update Notifications
Security Validation Firm Pentera Raises $150 Million at $1 Billion Valuation
Patch Management Today: A Risk-Based Strategy to Defeat Cybercriminals
China Accuses Walmart For Nineteen Cybersecurity Network Breaches
Top-10 Privacy Fines by UK’s Information Commissioner’s Office
Germany May Close Down Telegram, Minister Warns
Korean Companies Battling to Enter Apple Car Supply Chain
iPhone 14 Pro Again Rumored to Feature Upgraded 48-Megapixel Camera
Arming CISOs With the Skills to Combat Disinformation
Eureka emerges from stealth to secure cloud data stores with automation
New Cross-Platform Backdoor ‘SysJoker’ Used in Targeted Attacks
ICS Patch Tuesday: Siemens, Schneider Electric Address 40 Vulnerabilities
Windows, macOS, and Linux OSs Targeted by SysJoker Backdoor
Log4j: How hackers are using the flaw to deliver this new ‘modular’ backdoor
Remote Access Trojans spread through Microsoft Azure, AWS cloud service abuse
Phishers Rip Off High-Profile EA Gamers
UK Launches Initiative to Develop Global AI Standards
Hackers Use Cloud Services to Distribute Nanocore, Netwire, and AsyncRAT Malware
How to drive a successful, proactive tech refresh
A new multi-platform backdoor is leveraged by an advanced threat actor
YouTube ‘Major Conduit’ Of Misinformation, Fact-checkers Allege
Department of Veterans Affairs signs $13M contract with Google Cloud
Cisco Talos discovers a new malware campaign using the public cloud to hide its tracks
A New PowerShell Backdoor Is Being Used in Log4j Attacks
Attackers Could Gain Access to User Data due to a ‘Powerdir’ Flaw in macOS
Apple To Unveil 5G Equipped iPhone SE This Spring – Report
CISA Adds 15 Recent and Older Vulnerabilities to ‘Must-Patch’ List
New Opportunity: Join (ISC)² Regional Event Committees
U.S. Issues Fresh Warning Over Russian Cyber Threats as Ukraine Tensions Mount
5 Latest Cybersecurity Threat News
Teen Hacker Claims To Have Taken Control Of 25 Teslas
Joint FBI/CISA/NSA Warning On Russian Threats To Critical Infrastructure
Google Drive Top App For Malware Downloads
Comment: Cyber Attacks On Corporations Hit Record Breaking Highs
False Omicron Stat Counter App Embedded with New RedLine Malware Version
Malware Abcbot Related to the Xanthe Cryptomining Bug Developer’s
Is Bluetooth a Cyber Security Liability?
Is Cloud-Based Ransomware the Future of Cyber Crime?
Credential Stuffing Business Guide | Avast
Hackers are using the Log4j flaw to deliver this new ‘modular’ backdoor
Two Years for Man Who Used RATs to Spy on Women and Children
Iran-linked APT35 group exploits Log4Shell flaw to deploy a new PowerShell backdoor
Several EA accounts compromised by phishing mails
Intimate photo hacker spared from jail, said he “liked the detective work”
Info-saturated techie builds bug alert service that phones you to warn of new vulns
Humans might let you down, but CloudGuard won’t! (Just don’t expect a Birthday card)
December 2021’s Most Wanted Malware: Trickbot, Emotet and the Log4j plague
Microsoft Starts 2022 with 97 CVEs in January Patch Tuesday
New SysJoker Espionage Malware Targeting Windows, macOS, and Linux Users
City of Grass Valley, California, Suffers Data Breach
WhatsApp Tests Ability to Play Voice Messages Outside of Chat Threads
XDR: Redefining the game for MSSPs serving SMBs and SMEs
SAP Patches Log4Shell Vulnerability in More Applications
Europol Ordered to Delete Vast Trove of Personal Information
FBI, NSA and CISA Warns of Russian Hackers Targeting Critical Infrastructure
Adobe fixes 4 critical Reader bugs that were demonstrated at Tianfu Cup
Build your own Android security product
Microsoft says Powerdir vulnerability in macOS could have given attackers access to user data
Bugs With URL Parsing Libraries Could Allow DoS, RCE, Spoofing & More
First Patch Tuesday of 2022 Brings Fix for a Critical ‘Wormable’ Windows Vulnerability
Ransomware, supply chain, and deepfakes: The top threats the finance industry needs to prepare for
2022 promises to be a challenging year for cybersecurity professionals
Hack caused by a single click on Google Docs
How safe are cloud applications?
Who is the Network Access Broker ‘Wazawaka?’
SMEs still an easy target for cybercriminals
Technology-related employment still going strong, unemployment rate for IT jobs dropping to 2%
As Manufacturers Modernize Operational Technology, Closing Security Holes is a Growing Priority
How to evolve your organization into a data-centric security architecture
Digital asset management market to reach $10.018 billion in 2026
Check your SPF records: Wide IP ranges undo email security and make for tasty phishes
NormCyber smartbloc. offers visibility over cyber and data protection risks
X Security Ransomware Preparedness Assessment helps SMBs to fight ransomware attacks
Audit Your Active Directory with a free, read-only scan from Specops
Avast enhances free security and privacy protection for Windows users
SureCloud Internal Audit Management streamlines and accelerates audit engagements
Logicalis Collaboration suite helps organizations scale the digital collaboration experience
What to Do If Your Identity Has Been Stolen
The Dark Web: A Definitive Guide
Albania Hires US Company to Boost Cybersecurity After Leak
Clones of Popular ‘Wordle’ Game Flooding App Store, Including One Charging $30 Per Year [Updated]
Allegro Network Multimeter 3.4 provides users with enhancements and fixes
Cyxtera extends SmartCabs capabilities to increase operational flexibility for enterprises
2022-01-07 – Traffic analysis exericse – Spoonwatch
Adobe Releases Security Updates for Multiple Products
Adobe Releases Security Updates for Multiple Products
Honeywell and Acalvio launch a solution designed to secure OT environments in commercial buildings
Microsoft starts 2022 with big bundle fixes for 96 security bugs in its software
SentryBay partners with Stratodesk to deliver shield against cyber threats for BYOD environments
SentinelOne integrates with ServiceNow to accelerate incident response for security and IT teams
Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency
It’s 2022 And Cyber Deception Has Arrived – Defeat Tomorrow’s Threat Today
Signed kernel drivers – Unguarded gateway to Windows’ core
CES 2022: Wireless power for all
Let’s Play! Raising the Stakes for Threat Modeling With Card Games
Mo Katibeh joins RingCentral as COO
F5 appoints James Phillips to Board of Directors
Zluri raises $10M to accelerate global growth and product innovation
Dataprise acquires Global Data Vault to expand DRaaS and data protection offerings
APT35 Executes PowerShell-Based Malware in Log4j Flaw Attacks
Why self-sufficiency is key to fostering data literacy in the Air Force
VERT Threat Alert: January 2022 Patch Tuesday Analysis
Citrix Releases Security Update for Workspace App for Linux
Adobe adds Brett Biggs and Spencer Neumann to its Board of Directors
Dialpad appoints Prashanti Aduma as CIO
Sean Foster joins Anomali as CRO
Arctic Wolf appoints Dan Schiappa as CPO
Intel names David Zinsner as EVP and CFO
Monitoring malware abusing CVE-2020-1599
Microsoft Kicks Off 2022 With 96 Security Patches
Kiteworks Acquires Email Encryption Leader totemo
SAP Releases January 2022 Security Updates
Citrix Releases Security Update for Workspace App for Linux
Trulioo strengthens identity verification services in Ireland
Yugabyte designated as a CVE Numbering Authority
Wyoming health IT modernization nears completion
Cloud Apps Replace Web as Source for Most Malware Downloads
SAP Releases January 2022 Security Updates
IT Security News Daily Summary 2022-01-11
As security issues dominate, use the right plans and metrics to thrive
Wyoming heath IT modernization nears completion
CISA: Russian state-sponsored groups exploited vulnerabilities in Microsoft, Cisco, Oracle tools
Here’s REALLY How to Do Zero-Trust Security
‘Wormable’ Flaw Leads January 2022 Patch Tuesday
Microsoft Releases January 2022 Security Updates
Clones of Popular ‘Wordle’ Game Flooding App Store, Including One Charging $30 Per Year
House FISMA draft codifies federal CISO role, looks to shared services
Microsoft Faces Wormable, Critical RCE Bug & 6 Zero-Days
Mozilla Creates Program To Illustrate How Much Facebook Tracks You Around The Web
Cybersecurity Employment in 2022: Solving the Skills Gap
Apple’s Private Relay Roils Telecoms Around the World
Microsoft Releases January 2022 Security Updates
What to Include in a Cybersecurity Disaster Recovery Plan
Enterprise Security at CES 2022 Marked by IoT, Biometrics, and PC Chips
3 phases on the journey to multicloud
CISA warns local, tribal governments about Russian state-sponsored cyberattacks
MacOS Bug Could Let Creeps Snoop On You
Microsoft Patch Tuesday fixes critical Office RCE
Microsoft fixes wormable RCE in Windows Server and Windows (CVE-2022-21907)
Signal CEO Steps Down, Replaced By WhatsApp Co-founder
Microsoft: China-based ransomware actor exploiting Log4Shell
Hackers Hit Healthcare Data Management Company
Top Cybersecurity Startups to Watch in 2022
How Can You Leave Log4J in 2021?
T-Mobile Says iOS 15.2 Bug Turning Off iCloud Private Relay for Some Users
Standing Up For Privacy In New York State
Cloud solutions speed rental assistance payments
WordPress Bugs Exploded in 2021, Most Exploitable
Details Released on SonicWall Flaws in SMA Devices
TellYouThePass Ransomware Analysis Reveals a Modern Reinterpretation Using Golang
US Issues Alert Over Russian Hackers
MSPB passes five-year mark without a quorum
CISA adds 15 exploited vulnerabilities from Google, IBM, Microsoft, Oracle and more to catalog
Microsoft January 2022 Patch Tuesday: Six zero-days, over 90 vulnerabilities fixed
Adobe Patches Reader Flaws That Earned Hackers $150,000 at Chinese Contest
Patch Tuesday: Microsoft Calls Attention to ‘Wormable’ Windows Flaw
FBI, NSA & CISA Issue Advisory on Russian Cyber Threat to US Critical Infrastructure
Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird
Apple’s Polishing Cloth is Finally Back in Stock
Details Disclosed for Recent Vulnerabilities in SonicWall Remote Access Appliances
Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird
Here are the top jobs in the U.S. — and how to land them
Samba Releases Security Update
Apple Seeds Second Beta of macOS Monterey 12.2 to Developers
Coming Soon: New Security Update Guide Notification System
NetUSB flaw could impact millions of routers
SonicWall SMA 100 appliances beset by multiple vulnerabilities
Home routers with NetUSB support could have critical kernel hole
Why the Insider Threat Will Motivate Cyber and Physical Teams to Collaborate More Than Ever in 2022
Samba Releases Security Update
FBI Warns Of USB In Mail Containing Ransomware, Experts Weigh In
Hybrid Working and Tips to Make It a Success
Custom Software Teams Implementing Latest Practices To Secure Pipelines
New Phishing Campaign Exploits Google Docs Comment Feature
FIN7 Mailing Malicious USB Sticks to Drop Ransomware
Google Drive accounted for the most malware downloads from cloud storage sites in 2021
Businesses Suffered 50% More Cyberattack Attempts per Week in 2021
Top 5 Key Takeaways 2021 CISO Survival Guide
HomePod Mini Now Rumored to Launch in Seven Countries, Including Denmark and Norway
Apple Submits Alternative Payment System In South Korea
Public-Key Cryptography Standards (PKCS)
9 ways that cybersecurity may change in 2022
Cybersecurity First Principles
Combating Human Trafficking With Threat Intelligence — Prevention
EHR Vendor QRS Faces Lawsuit After Cyberattack Exposed Nearly 320,000 Patients’ Information
Mozilla unveils Total Cookie Protection for Firefox Focus on Android
Microsoft: This macOS bug could bypass controls and access private user data
DDoS attacks that come combined with extortion demands are on the rise
With the ‘Great Resignation’ Comes the ‘Great Exfiltration’
Apple’s Private Relay Is Being Blocked
Millions of Routers Impacted by NetUSB Kernel Vulnerability
SonicWall SMA appliances beset by multiple vulnerabilities
Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure
CISA, FBI, and NSA Release Cybersecurity Advisory on Russian Cyber Threats to U.S. Critical Infrastructure
Millions Of Routers Exposed To RCE By USB Kernel Bug
SysJoker Backdoor Malware Targets Windows, Linux, And macOS
macOS Bug Could Bypass Controls And Access Private User Data
EU Data Watchdog To Europol: You’ve Helped Yourself To Too Much Data
Costa Rica Hydro Plant Gets New Lease On Life From Crypto Mining
NightSky Ransomware targets Vmware Horizon servers through Log4J Vulnerability
Intel Removes All References To Xinjiang After Public Apology
New SysJoker Backdoor Targets Windows, Linux, and macOS
CISA Steps up Public and Private Sector Collaboration in 2021
Moxie Marlinspike Steps Down as Signal CEO
Kaspersky Research Uncovers Cybersecurity Budgets, Insurance, and Vendor Expectations for 2022
Why Security Awareness Training Should Begin in the C-Suite
Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure
CISA, FBI, and NSA Release Cybersecurity Advisory on Russian Cyber Threats to U.S. Critical Infrastructure
Apple’s Private Relay is Being Blocked
Deals: Apple Watch Series 7 Discounted by Up to $40 in Amazon’s New Sale
Apple Stores Could Stop Thieves With New Security Measures
‘Fully Undetected’ SysJoker Backdoor Malware Targets Windows, Linux & macOS
Honeywell Launches New OT Cybersecurity Solution for Commercial Buildings
Night Sky ransomware operators exploit Log4Shell to target hack VMware Horizon servers
Multi-Cloud API Authorization Challenges
Air Force Improvises With 3D Printing to Overcome Supply Chain Challenge
Critical SonicWall NAC Vulnerability Stems from Apache Mods
World Economic Forum: Cybersecurity an Increasing Global Threat
Meta Delays Office Reopening, Orders Booster Shots For Staff
Cloud Security Trends: What Is Cybersecurity Mesh?
5 Things to Know About Next-Generation SIEM
LoRaWAN’s Protocol Stacks: The Forgotten Targets at Risk
The Benefits of Rapid Prototyping in Manufacturing
New ‘powerdir’ Vulnerability in macOS Exposes Protected Data
CISA Unaware of Any Significant Log4j Breaches in U.S.
Cyber attacks on corporations hit record breaking highs
Cyberattacks on Businesses Hit an All-time High of 925 per Week, New Report Shows
The Facebook Pixel Hunt aims to unravel Facebook’s tracking methods. Will you join?
Avoid Scams While Helping Loved Ones | Avast
Ransomware: Hackers are using Log4j flaw as part of their attacks, warns Microsoft
2021 was a terrible year for cybersecurity. Without action, 2022 could be even worse
Cybersecurity: Last year was a record year for attacks, and Log4J made it worse
KCodes NetUSB kernel remote code execution flaw impacts millions of devices
Industrial Firms Advised Not to Ignore Security Risks Posed by URL Parsing Confusion
Microsoft Details ‘powerdir’ macOS Vulnerability Leading to Data Leaks
Millions of Routers Exposed to RCE by USB Kernel Bug
Is the ‘Great Resignation’ Impacting Cybersecurity?
Beats Fit Pro to Launch in Canada and Europe on January 24
Microsoft Shares Details on macOS Bug
Night Sky: the new corporate ransomware demanding a sky high ransom
How to share your Wi-Fi password safely
noPac Exploit: Latest Microsoft AD Flaw May Lead to Total Domain Compromise in Seconds
Attackers are mailing USB sticks to drop ransomware on victims’ computers
Ransomware warning: Hackers are using Log4j flaw as part of their attacks, warns Microsoft
Millions of Routers Exposed by Bug in USB Module
New KCodes NetUSB Bug Affect Millions of Routers from Different Vendors
How banks can help counter Human Trafficking
DDoS Attacks Have Grown Stronger in 2021
EU data watchdog to Europol: You’ve helped yourself to too much data
Cookie Files: Associated Privacy and Security Risk Overview
Apple’s Silicon Designer Jeff Wilcox Joins Intel
O2, Virgin Will Not Introduce EU Roaming Charges
MRIoA Discloses Data Breach Affecting 134,000 People
Beats Fit Pro to Launch in Additional Countries on January 24
£92m lost to romance scammers in 2021
What Is FIM (File Integrity Monitoring)?
Fraud Bible – Scammers Offer Classes On How To Defraud People
Security Expert re: CISA Warns About Log4j And Long-term Risks For U.S. Critical Infrastructure
38.9M Health Records Stolen From Bangkok Hospital
Services Australia Dismisses Security Concerns with COVID-19 Digital Certificates
Misinformation is a Hazard to Cyber Security
Banks Still Struggling to Spot the Signs of Human Trafficking
Secure boot for UK electric car chargers isn’t mandatory until 2023 – but why the delay?
Romance Scammers Stole £92m From Victims Last Year
Corporate Cyber-Attacks Spike 50% in 2021
AvosLocker ransomware now targets Linux systems, including ESXi servers
Signal CEO Resigns, WhatsApp Co-Founder Takes Over as Interim CEO
Analyst guide: Encryption solutions buyers checklist
2022 Cybersecurity Predictions from Lookout: Work From Anywhere Ends On-Premises Security
Looking for adding new detection technologies in your security products?
Microsoft Details macOS Bug That Could Let Attackers Gain Access to User Data
Small businesses are most vulnerable to growing cybersecurity threats
Podcast Episode: Algorithms for a Just Future
Russians will face even more serious cyber threats in 2022
Data security in the age of insider threats: A primer
A 50% increase in cyber attacks year on year
Cyber criminals earning £750m with insecure passwords
Europol Ordered to Delete Data of Individuals With No Proven Links to Crimes
WordPress 5.8.3 Security Release fixes four vulnerabilities
Apple to Allow Alternative Payment Systems in App Store in South Korea
Kuo: Apple Headset Will Use Same 96W Power Adapter as 14-Inch MacBook Pro
How the pandemic fueled enterprise digital transformation
Many users don’t know how to protect their broadband Wi-Fi routers
ZTNA Leader Perimeter 81 Welcomes New VPs Lital Parush-David and Tal Laufer
Arctic Wolf Appoints Dan Schiappa as Chief Product Officer
U.S. News & World Report Names IDShield Among Best Identity Theft Protection Services of 2022
TrueFort Named Top Cyber Security Company of 2021 by The Software Report
Imperva Appoints Brad Steiner as General Counsel and Chief Compliance Officer
Hackers Distribute Malicious Version of dnSpy Malware To Attack Security Researchers
Video surveillance systems market to grow steadily by 2026
Protecting Your Privacy This Year
Apple Could Release OLED iPad With Samsung Display Panel in 2024
Zyxel adds WiFi access point security service to its Nebula Cloud Networking solution
Indian APT exposes its Modus Operandi by infecting their own devices
Europol Ordered to Delete Data Not Linked With Crime
Firms need better breach response, clear regulatory guidelines
JavaScript developer destroys own projects in supply chain “lesson”
Apple’s Shazam Music Recognition Service Now Available as Chrome Extension
CyberCube designs three cyber scenarios for Lloyd’s market to stress test their portfolios of risk
Report: Increased Log4J exploit attempts leads to all-time peak in weekly cyberattacks per org
Panasonic giving employees the option of a four-day work week
The rise of the CISO: The escalation in cyberattacks makes this role increasingly important
Upland Software acquires Objectif Lune to expand its global document workflow product library
LG Electronics joins IBM Quantum Network to explore applications of quantum computing
CES 2022 – the “anyone can make an electric car” edition
Google Exec Pushing RCS Adoption Says He’s ‘Not Asking Apple to Make iMessage Available on Android’
Rash Sahota joins Isotropic Systems as General Manager and COO
Apiiro appoints Eldan Ben-Haim as Chief Architect Officer
SilverSky acquires Cygilant to strengthen its cybersecurity portfolio and expand into new markets
Signal founder and CEO Moxie Marlinspike announces resignation
Equinix hires Jon Lin as EVP and General Manager, Data Center Services
Brad Steiner joins Imperva as General Counsel and CCO
Sectra appoints Jessica Holmquist as CFO
Multiple Vulnerabilities Spotted In MSI Digital Assets
Researchers Explain How SSRF Vulnerabilities Risk Java RMI Services
What Editing Crosswords Can Teach Us About Security Leadership
CrowdStrike Services Offers Incident Response Tracker for the DFIR Community
Can Project Maven help shape acquisition policy?
Microsoft: macOS ‘Powerdir’ Flaw Could Let Attackers Gain Access to User Data
No Significant Intrusions Related to Log4j Flaw Yet, CISA Says
IT Security News Daily Summary 2022-01-10
OPM prods agencies to name chief diversity officers
Breach Response Shift: More Lawyers, Less Cyber-Insurance Coverage
Apple Reportedly Looking to Broadcast Major League Baseball Games Next Season
Finalsite says no data stolen during ransomware attack affecting 3,000 US public schools
Chainalysis: Cryptocurrency crime reaches all-time high
Windows security in ’22 — you need more than just antivirus software
California town announces data breach involving police department, loan provider
Nine Top of Mind Issues for CISOs Going Into 2022
Gmail App for iOS Adds New Inbox Widget
Forensics Expert Kept Murder Snaps on PC
Facebook Rolls Out New “Privacy Center” To Educate Users
Several EA Sports FIFA 22 players have been hacked
UK Launches Parliament Crypto Group
“H2 Security Flaw Is Critical,” Says Experts
Log4j Analysis: Attack Patterns, Payloads And Bypass Techniques
How DDoS Attack On AWS Results In 3.7m FlexBooker Accounts Being Hacked
Hackers Exploit Cloud Video Platform To Target Real Estate Websites
CISA director: ‘We have not seen significant intrusions’ from Log4j — yet
FBI Warns FIN7 Campaign Delivers Ransomware via BadUSB
Uber’s Apple Watch App No Longer Works
NY AG Investigation Highlights Dangers of Credential Stuffing
The metaverse offers a future full of potential – for terrorists and extremists, too
CISA director: ‘We have not seen significant intrusions’ from Log4J yet
Apache Foundation Calls Out Open-Source Leechers
Simplify Cloud with Data Management as a Service
Cities in Texas hit by QR-code phishing scam
Vulnerability Summary for the Week of January 3, 2022
Avira also mines imaginary internet money on customers’ PCs
VMware ESXi 7 users vulnerable to hypervisor takeover bug
Vulnerability Summary for the Week of January 3, 2022
Apple Highlights Services in 2021, Recaps Upcoming Features Like IDs on iPhone
Apple Discontinues Beats Pill+ Bluetooth Speaker
Align your security and network teams to Zero Trust security demands
URL Parsing Bugs Allow DoS, RCE, Spoofing & More
Cyber-Thieves Raid Grass Valley
Beware Of Nasty Telegram Installers That Spread Purple Fox Malware
Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource
The FTC Wants Companies to Find Log4j Fast. It Won’t Be Easy
Apple Building Momentum for 2022 Releases as Supply Chain Recovers
Microsoft Discovered New ‘Powerdir’ macOS Vulnerability, Fixed in 12.1 Update
New macOS vulnerability, “powerdir,” could lead to unauthorized user data access
What Log4j Vulnerability Means for SREs
Weekly cyberattacks jumped by 50% in 2021, with a peak in December due largely to the Log4J exploit
Multilingual Cybersecurity Awareness Training adapted for your needs
Penetration Testing 101: A Beginner’s Guide to Ethical Hacking
How to lock down your Microsoft account and keep it safe from outside attackers
Behind the Community Defense Model with the Center for Internet Security (CIS)
Cyber-Spike: Orgs Suffer 925 Attacks per Week, an All-Time High
GCHQ Rebuked For Ignoring Spy Law Safeguards As Pandemic Hit Britain
Abcbot Botnet Is Linked To Xanthe Cryptojacking Group
China Puts Walmart In The Naughty Corner Over 19 Vulnerabilities
Indian Patchwork Hacking Group Infects Itself With RAT
Deals: Apple’s 256GB 13-Inch M1 MacBook Pro on Sale for $1,149.99 ($149 Off)
Israel’s Counterterrorism Designation Regime: A Process in Need of Reform
How to Run Windows on an Intel or M1 Mac
USB drives now being mailed with ransomware
Abcbot DDoS Botnet Linked to Older Cryptojacking Campaign
U.S. Government Issues Warning Over Commercial Surveillance Tools
3 areas privacy and cybersecurity teams should collaborate
Allowlisting vs. blocklisting: Benefits and challenges
Abcbot and Xanthe botnets have the same origin, experts discovered
US Arrested Multi-year Phishing Scam Suspect
Fertility Centers of Illinois Hit by Cyberattack Impacting Nearly 80,000 Patients
URL parsing: A ticking time bomb of security exploits
Behind the scenes: A day in the life of a security auditing manager
Missed AirPods Deals Over the Holidays? Here Are All The Best Discounts You’ll Find in January
You Can Join FaceTime Calls on an Xbox but Not an Apple TV
Abcbot botnet is linked to Xanthe cryptojacking group
FBI: Cyber criminals are mailing out USB drives that install ransomware
Indian Patchwork hacking group infects itself with remote access Trojan
The Evolution of Patch Management: How and When It Got So Complicated
Researchers Find Bugs in Over A Dozen Widely Used URL Parser Libraries
UScellular Discloses Data Breach Following A Cyber Attack
Indian-linked Patchwork APT infected its own system revealing its ops
Uncovering and Defending Systems Against Attacks With Layers of Remote Control
Omnichannel E-commerce Growth Increases API Security Risk
SecurityWeek Cyber Insights 2022: Ransomware
Abcbot Botnet Linked to Operators of Xanthe Cryptomining malware
China puts Walmart in the naughty corner, citing 19 alleged cybersecurity ‘violations’
A ‘friend from the city’ making her mark on government contracting
Abcbot botnet has now been linked to Xanthe cryptojacking group
SonicWall Patches Y2K22 Bug in Email Security, Firewall Products
Body Temp Sensor in Apple Watch Series 8 Looking Unlikely, Suggests Gurman
Detect and identify IoT malware by analyzing electromagnetic signals
The NPM Libraries ‘Colors’ and ‘Faker’ Were Corrupted
WordPress 5.8.3 Patches Several Injection Vulnerabilities
NPM libraries ‘colors’ and ‘faker’ corrupted
Cybersecurity Researchers and Developers Targeted in a Malicious Campaign Spreading dnSpy
GCHQ was rebuked for ignoring spy law safeguards as pandemic hit Britain
Over Half of SMEs Have Experienced a Cybersecurity Breach
The FTC Wants Companies to Find Log4j Fast. It Won’t Be So Easy
Jason Sudeikis Wins Golden Globe Award for Apple TV+ Comedy Series ‘Ted Lasso’
SonicWall Email Security and Firewall Products Impacted by the Y2K22 Vulnerability
A week in security (January 3 – 9)
What is Quantum Computing? And why does the UK want to lead the world?
Indian Cyberspies Expose Their Operation After Infecting Themselves With RAT
US Issues Warning Over Commercial Spyware
Q4 2021 Cyber Attacks Statistics
Zloader Malware Exploits Microsoft Sign Verification To Drop Payload
India Opens Probe Into Google After Publishers Complain
Roblox To Rebuild China App After Pulling Plug
Silicon In Focus Podcast: Why Digital Transformation Projects Fail
Hackers Targeting Log4j Flaws in VMware Horizon – NHS
FlexBooker Reveals Major Customer Data Breach
Mockup Shows What iPhone 14 With Pill-Shaped Notch Could Look Like in Your Hand
UK’s Virgin Mobile and O2 Network Users Won’t Face EU Roaming Charges When Traveling Abroad
The latest on the Log4j vulnerability
How Zero Trust Will Change Incident Response
Check Point Research: Cyber Attacks Increased 50% Year over Year
Finalsite: All School Sites Now Restored After Ransomware Attack
Cyberattack causes jail lockdown
Gaming Event E3 Cancelled Due To Covid-19
Instagram Criticised After Blocking Memorial Hashtag
Volkswagen Microbus To Return As Electric Vehicle
Edward Snowden Privacy Update | Avast
Spotify Still Can’t Say When Its Delayed ‘HiFi’ Streaming Service Will Launch
No defence for outdated defenders as consumer AV nears RIP
Avira is adding a crypto miner to its products as well
Tripwire Patch Priority Index for December 2021
QNAP Urges Users to Secure NAS Devices as Attacks Surge
A Data Breach To An AWS Portal Glitch By Ravkoo, A US-based Online Pharmacy
What to expect in 2022 privacy wise?
Trying to register your antivirus in Windows Security Center?
Google Removes Features After Sonos Legal Win
According to Chainalysis, Around $2.2 Billion was Stolen from DeFi Protocols in 2021
How To Assess Supply Chain Security For Your Business
KeePass 2.50 speeds up key derivation functions significantly
BADNEWS! Patchwork APT Hackers Score Own Goal in Recent Malware Attacks
New ZLoader malware campaign hit more than 2000 victims across 111 countries
Ragnar Locker Ransomware strikes a cybersecurity firm
Eight resolutions to help navigate the new hybrid office model
Night Sky: New Ransomware Targeting Corporate Networks
On-premises cloud: The worst of both worlds?