IT Security News Weekly Summary – Week 05

2 years ago 77
BOOK THIS SPACE FOR AD
ARTICLE AD

IT Security News Daily Summary 2022-02-06

Breach of Washington State Database May Expose Personal Information

How to stop the spread of ransomware attacks

Popular VPNs NordVPN And Surfshark Announce Merger

Israeli surveillance firm QuaDream emerges from the dark

Cyber Defense Media Group Launches CyberDefenseCon 2022

The Top 5 Cloud Security Predictions for 2022

Bug Bounty Hunter Finds Google Drive Integration Vulnerability

CISA Issues Warning to Federal Agencies Regarding Actively Exploited Windows Flaw

Microsoft: Russian FSB Hackers Compromising Ukraine Since October

Keeper Security Acquires Glyptodon to Provide Zero-Trust Remote Access for IT Admins, SREs and DevOps Teams

Australian Mogul Sues Facebook Over Scam Advertisements

3 data-driven strategies to secure the atomized network

Forged Kubernetes Apps is used to Extract Sensitive Data from Argo CD Setups

Gurman: Apple Event on March 8, At Least Four M2 Macs to Launch Later This Year

Argo CD flaw could allow stealing sensitive data from Kubernetes Apps

Health Sites Let Ads Track Visitors Without Telling Them

$4.4 million stolen in attack on blockchain infrastructure Meter

Security Affairs newsletter Round 352

Attackers Gained Access to the Systems of the National Games of China

Swissport Ransomware Attack Delays Flights, Disturbs Operations

Week in review: Samba vulnerability, phishing kits bypassing MFA, Patch Tuesday forecast

Penetration testing

New Argo CD Bug Could Let Hackers Steal Secret Info from Kubernetes Apps

SentinelOne And Mimecast Integrate To Improve End-To-End Threat Protection For Enterprise Devices and Email

Massachusetts Lawmakers Weighing Online Data Privacy Bill

Convergint acquires Dramis Communications Solutions to expand direct service coverage in Canada

Weekly Update 281

Noetic Cyber expands its leadership team with 3 key executive hires

IT Security News Daily Summary 2022-02-05

LockBit ransomware gang claims to have stolen data from PayBito crypto exchange

FBI issued a flash alert on Lockbit ransomware operation

Walmart Dissects New ‘Sugar’ Ransomware

Trend Micro Patches Critical Bugs in its Security Products

Convergint Announces Acquisition of Dramis Communications Solutions Ltd.

LockBit ransomware gang claims PayBito crypto exchange as new victim

Tennessee State University was Targeted by a Cyber Attack

Target Reveals Its Personal Skimming Detection Tool

A $320 Million Crypto Hack Sends the DeFi World Reeling

Top Stories: March 8 Apple Event, New iMac Pro Rumors, Universal Control vs. Sidecar, and More

Fortune 500 service provider says ransomware attack led to leak of more than 500k SSNs

Emotet’s Uncommon Approach of Masking IP Addresses

Threat actors are Looking for Ways to Bypass MFA with Evolving Phishing Kits

Hackers Steal Around $320M+ from Crypto Firm Wormhole

CISA orders federal agencies to fix actively exploited CVE-2022-21882 Windows flaw

Build or Buy your own antivirus product

Microsoft Uncovers New Details of Russian Hacking Campaign Targeting Ukraine

Durov Suspected WhatsApp of Intentionally Introducing Vulnerabilities

Critical Flaws in Cisco Small Business Routers let Attackers Execute Arbitrary code

2022-02-04 – BazarLoader infection with Cobalt Strike

Box expands Slack integration to increase security and improve productivity

‘Very concerning’: Cisco router vulnerabilities bring broad risks

Think before you scan: How fraudsters can exploit QR codes to steal money

Week in security with Tony Anscombe

Mozilla adds four privacy-centric orgs to Data Futures Lab, awards each with $100,000

Impinj promotes Hussein Mecklai to COO

Senate Commerce Committee is Letting Big Telecom Hamstring the FCC

EFF to Appeals: Apple’s Monopoly Doesn’t Make Users Safer

Argo CD releases patch for zero-day vulnerability

IT Security News Daily Summary 2022-02-04

How to Protect Cloud Workloads from Zero-day Vulnerabilities

Microsoft discloses new details on Russian hacker group Gamaredon

As IRS grapples with ID.me, what’s next for Login.gov?

Argo CD releases patch for 0-day vulnerability

Friday Squid Blogging: Are Squid from Another Planet?

What to Expect From Apple’s Upcoming 2022 iPhone SE 5G

Microsoft Defender for Endpoint now spots unpatched bugs in iOS and Android devices

Building OAuth 2.0 Authorization Server

NSA rounds up the year in cyber

AI-enabled health care: First, do not automate harm

Microsoft, Symantec Share Notes on Russian Hacks Hitting Ukraine

The 3 Most Common Causes of Data Breaches in 2021

Over 500,000 people were impacted by a ransomware attack that hit Morley

AI Weekly: DeepMind’s AlphaCode, automatic age verification, and a new open language model

Republican senators demand briefing on IRS decision to require ID.me ‘selfies’

Suspected Chinese spies break into cloud accounts of News Corp journalists

5 Steps to Becoming a Cybersecurity Consultant

Cryptojacking Attacks Target Alibaba ECS Instances

Michigan to build nation’s first EV charging public road

Investment in data privacy in Brazil falls below global average

Expert Insights: Training the Data Elephant in the AI Room

New Low-Cost iPhone SE 5G and iPad Air Coming on March 8

Freeze out hackers during the 2022 Winter Olympic Games

4 Top Cyber Threats to the Finance and Insurance Industries

Ransomware attack hit Swissport International causing delays in flights

PowerPoint add-on used to spread malicious files: Avanan

Intuit releases security notices, warns of phishing emails ahead of tax season

‘Long Live Log4Shell’: CVE-2021-44228 Not Dead Yet

Argo CD Security Bug Opens Kubernetes Cloud Apps to Attackers

Nord Security and Surfshark to Merge

Major Vulnerability Found in Argo CD

Understanding Identity Detection and Response

How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks

ACTINIUM targets Ukrainian organizations

Software development, implementation and support services

Wormhole cryptotrading company turns over $340,000,000 to criminals

Tennessee College Hit with Ransomware

BlackCat Ransomware Gang Employing Novel Techniques to Target Organizations

Text Message Scams: How to Recognize, Report and Restrict Them

Beware of the Attacks of Zombie Botnet

Government agencies are tapping a facial recognition company to prove you’re you – here’s why that raises concerns about privacy, accuracy and fairness

The Alpha and Omega of software supply chain security

News Corp reports January cyberattack targeting Wall Street Journal, New York Post, Dow Jones

Airport services firm Swissport reports ransomware incident

Singapore urges shared responsibility in preventing online scams as it readies liability framework

#Enigma2022: Security’s Role in Helping HealthTech Find Its Way

Low Detection Phishing Kits Increasingly Bypass MFA

Airport Services Firm Swissport Reports Ransomware Incident

Nintendo Wants Admitted Team Xecuter Pirate Jailed For Five Years

Ransomware Wants You To Like Or Subscribe, Or Else

Apple’s $1.1 Billion Patent Dispute With Caltech Granted New Damages Trial

New iPad Air and iPhone SE Models With A15 Chip, 5G, and More Reportedly Enter Production

Apple Music Reduces Free Trial Period to One Month

MacRumors Giveaway: Win a Tech Folio and Tech Pocket From WaterField Designs

China-Linked Group Attacked Taiwanese Financial Firms for 18 Months

Russia-Ukraine escalation of tensions: FBI calls for reports of uptick in cyber activit

Ransomware gangs and supply chain vulnerabilities: Nozomi Networks Labs reports on the current threat landscape

Live XSS Flaw Exists in DMCA-dot-com

IT Personnel Equally Susceptible to Phishing Attempts as the General Population

Cloud Threats: What Business Executives Need To Know Right Now

BotenaGo strikes again – malware source code uploaded to GitHub

Aqua Security CNAPP is first to combine frictionless cloud workload visibility with active protection across the application lifecycle

China linked Cyber Attack on News Corp

Business Services Firm Morley Discloses Data Breach Affecting 500,000 People

CISA Adds One Known Exploited Vulnerability to Catalog

Threat actor steals email with Zimbra zero-day

Cynomi raises $3.5M for virtual CISO platform

CISA Adds One Known Exploited Vulnerability to Catalog

The EARN IT Act Is Back

Impacts from a new reality drive the need for an enhanced digital identity framework

Lost In Translation: Language Gaps in Social Media Labels

As Part of Electoral Count Act Reform, Liberals Should Learn to Love Bush v. Gore

Detect Log4j Vulnerability Using ACS

Strong authentication protects against phishing. So why aren’t more people using it?

Meet Nord Security: The company behind NordVPN wants to be your one-stop privacy suite

Media Giant News Corp Targeted in China-Linked Cyberattack

Want to Be an Ethical Hacker? Here’s Where to Begin

A nation-state actor hacked media and publishing giant News Corp

New iPad Air and iPhone SE Production Reportedly Underway

Edgescan partners with Manicode to revolutionise secure coding courses

How to Prevent Ransomware?

Open-source Kubernetes tool Argo CD has a high-severity path traversal flaw: Patch now

Glasswall Solutions

UK Bosses Rethink Physical Office Spaces, Slack Finds

Best Internet Security Suites & Software for 2022

ISO 27002 and Threat Intelligence: The New Security Standard

OpenSSF Announces The Alpha-Omega Project To Improve Software Supply Chain Security For 10,000 OSS Projects

Iranian Charming Kitten Adds PowerShell Back Door

Creating Coherence out of Chaos

Elephants Must Learn to Street Dance: The Chinese Communist Party’s Appeal to Youth in Overseas Propaganda

Best Free and Public DNS Servers

European Oil And Port Facilities Suffer Cyberattacks

Russian APT Primitive Bear attacks Western gov’t department in Ukraine through job hunt

More companies are using multi-factor authentication. Hackers are looking for a way to beat it

Just-in-Time Access Explained. What It Means, Benefits and Best Practices of JIT

5 Reasons to Choose Duo Over Free Multi-Factor Authentication

9 Best Gaming Mouse Under $50 2022 – For Fortnite, CS:GO

Attackers Target Intuit Users by Threatening to Cancel Tax Accounts

The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips

Retail giant Target open sources Merry Maker e-skimmer detection tool

Software Asset Management (SAM) – How It Can Benefit Your Company

FBI issues cybersecurity warnings to athletes at Winter Olympics in Beijing

Investment scams are on the rise

FBI warns of bogus job postings on recruitment sites

CMA Fines Meta A Second Time Over Giphy Order

US Accuses Russia of Disinformation Plot to Justify Invasion of Ukraine

File Taxes Safely And Securely | Avast

Tech salaries, developer skills, cybersecurity, and more: ZDNet’s research roundup

Operation EmailThief: Zero-day XSS vulnerability in Zimbra email platform revealed

DHS Connects Government, Private Sector in New Cyber Safety Review Board

Twitter Expands Downvote Button Test Worldwide

Top 9 Best Laptop for Adobe Creative Cloud 2022 – Photoshop, Illustrator

Target Open Sources Web Skimmer Detection Tool

Another Israeli Firm, QuaDream, Caught Weaponizing iPhone Bug for Spyware

Russia-linked Gamaredon APT targeted a western government entity in Ukraine

Phishing kits that bypass MFA protection are growing in popularity

NFT Wash Trading Made Scammers at Least $9m in 2021

Apple to Collect 27% Commission on Third-Party App Payment Systems in the Netherlands

Pharma employee credentials exposed

Zimbra zero-day vulnerability exploited to steal emails

CISA issues advisory warning of critical vulnerabilities in Airspan Networks Mimosa

Trustpilot Set to Sue Firms That Solicit Fake Reviews

Cyber-Attacks Hobble Some of Europe’s Largest Ports

US Federal government creates cybersecurity incident review board

National Games of China Systems Attack Analysis | Avast

Amazon Set to Increase Prime Membership Fee By 17% for US Customers

Chinese Hackers Target Financial Institutions in Taiwan With Custom Backdoor

U.S. Authorities Charge 6 Indian Call Centers Scamming Thousands of Americans

Zimbra zero-day vulnerability actively exploited by an alleged Chinese threat actor

BATLOADER and Atera Agent are Being Distributed Through an SEO Poisoning Campaign

Civicom Data Breach Disclosed 8TB of Files

The Cat and Mouse Chase of Account Takeovers

Russian Gamaredon Hackers Targeted ‘Western Government Entity’ in Ukraine

US Authorities Charge 6 Indian Call Centers Scamming Thousands of Americans

Cynet Log4Shell Webinar: A Thorough – And Clear – Explanation

Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows ?

ESET Antivirus Flaw Let Attackers to Escalate Privileges & Execute Arbitrary Code

“Modern CTO” Podcast Features Avast CISO Jaya Baloo | Avast

Microsoft blocked tens of billions of brute-force and phishing attacks in 2021

White Hat Hacker Accesses Teslas | Avast

February 2022 Patch Tuesday forecast: A rough start for 2022

New infosec products of the week: February 4, 2022

How threat actors are using npm to launch attacks

Cyber Attack on Europe’s major Oil terminal

US hacker claims to have downed the internet of North Korea

Trio of RCE CVSS 10 vulnerabilities among 15 CVEs in Cisco small business routers

CISA Warns of Critical Vulnerabilities Discovered in Airspan Networks Mimosa

Apple Says Pro Display XDR and 2021 MacBook Pro Can Experience Limited Brightness in High Temperatures

Exposed corporate credentials threatening the pharma sector

Hackers Exploited 0-Day Vulnerability in Zimbra Email Platform to Spy on Users

Bank executives mostly concerned about cybercrime

Code review: How satisfied are development teams?

Piracy is alive and well, demand reaching 3.7 billion unlicensed streams and downloads

New Cloud Security Alliance Survey Finds Uneven Adoption of Emerging Technologies

Security Awareness Training and Human Risk Management Company AwareGO Achieves Year of Outstanding Growth

Lattice to Host Virtual Seminar on Anti-Fragile Security and Post-Quantum Cryptography in FPGAs

AT&T Cybersecurity Insights Report: Securing the Edge – Available today

Privacy in 2021: A Year Worth Reviewing

Database security market to reach $16,273.8 million by 2028

Major vulnerability found in open source dev tool for Kubernetes

G-71 launches a new version of LeaksID to offer intellectual property protection

What Does an Internal Attack Resulting in a Data Breach Look Like in Today’s Threat Landscape?

HUMAN Bot Insights Services protects businesses from sophisticated bot attacks

Outseer Emerging Payments detects and prevents fraud in installment transactions

Tenable.cs updates enable organizations to detect and fix cloud infrastructure misconfigurations

JumpCloud expands cloud directory platform with patch management to improve device security

Aqua Security CNAPP features help security teams assess their cloud native security risk

FortiGate 3000F increases security and networking convergence across hybrid IT architectures

Teradata partners with Microsoft to modernize complex data analytics environments

Dialpad expands partnership with Google Cloud to centralize business communications

Axio joins with Cyber Risk Institute to improve cybersecurity resilience for financial institutions

That’s a signature move: How $320m in Ether was stolen from crypto biz Wormhole

CMMC gets a new home in the Pentagon

Xerox acquires Powerland to strengthen IT services offerings in North America

Yellowbrick Data collaborates with NI+C to unlock data value for enterprises

Suzanne McBride joins Skyworks Solutions Board of Directors

Dialpad appoints Jim Nystrom and Kent Venook to key sales leadership roles

ColorTokens announces strategic hires across EMEA

John A. Wheeler joins CyberSaint Growth Advisory Board

Cyberattack was attempted against a western government ‘entity’ in Ukraine, researchers say

New Orleans leans into data to reduce over-incarceration

White House creates board to review cybersecurity incidents, members to start with Log4J

Kronos Still Dragging Itself Back From Ransomware Hell

Mac Malware-Dropping Adware Gets More Dangerous

Exclusive interview with the Powerful Greek Army (PGA) hacker group

Orca Cloud Risk Encyclopedia provides ongoing education for security practitioners

Zoho Workplace achieves substantial growth amidst the ongoing migration from competitor suites

ThycoticCentrify renamed Delinea to help solve modern privileged access challenges

Cyvatar appoints Alise Barron as VP of Member Experience

Ermetic hires Eduard Meelhuysen as VP of Sales for EMEA

NortonLifeLock sees growth in excess of 10% for revenues, net income in FY 2022 Q3

Fortinet beats Wall Street estimates for Q4, reports $3.34 billion in revenue for 2021

Volexity Warns of ‘Active Exploitation’ of Zimbra Zero-Day

Several India-Based Call Centers Indicted by US DoJ

Mandiant Bolsters SaaS Platform With Integration of New Attack Surface Management Module

They Were ‘Calling to Help.’ Then They Stole Thousands

IT Security News Daily Summary 2022-02-03

GSA, DOD seek clean electricity to meet emissions targets

Silo-busting software closes benefits gaps in Philadelphia

Low-Detection Phishing Kits Increasingly Bypass MFA

Research From Quantum and ESG Reveals Top Challenges in Data Management

Tenable Launches Suite of New Features to Cloud-Native Application Security Platform

Universal Control: Everything You Need to Know

San Francisco Should Strengthen, Not Gut, Surveillance Technology Ordinance

SHOP SAFE Will Stomp Out Online Sales of Used and Homemade Goods

A worrying Etsy listing reveals the stalking potential of Apple’s AirTags

Let’s go phishing: How we could enter a new era of email trust

Database aims to help tribes adapt to climate change

Gretel goes GA with privacy engineering developer stack

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT)

DHS Launches Cyber Safety Review Board to Analyze Major Vulnerability Events

Privacy Shield: EU citizens might get right to challenge US access to their data

Great Resignation Increases Security Risks For Businesses, Warns Tessian

DHS forms first-ever Cyber Safety Review Board

Facebook Suffers $10 Billion Loss Because Of Privacy Changes

Microsoft: Multifactor Adoption Remains Low

The Chatter Podcast: The Olympics, Politics, and Security with Ethan Scheiner

Cisco fixes critical flaws in its Small Business Routers

Phishing kits’ use of man-in-the-middle reverse proxies is growing, warns Proofpoint

This book has an awful title, but says a lot of great things

Prosecutors investigating cyberattacks affecting multiple Belgian and Dutch ports

Critical Cisco Bugs Open VPN Routers to Cyberattacks

Intel Patched 226 Vulnerabilities in 2021

Bridging the Gap Between Training and Behavior

DOD’s testing chief wants cloud contracts to allow for more security checks

The importance of a policy-driven threat modeling approach

Simplifying Zero Trust Security in Healthcare Organizations

Conti gang hits KP Snacks with a crippling ransomware attack

A More Modern Approach to Logging in Golang

Big Pharma Finds Patch Management a Bitter Pill

Antlion APT group used a custom backdoor that allowed them to fly under the radar for months

JumpCloud joins the patch management crowd, starting with Windows and Mac updates

How Phishers Are Slinking Their Links Into LinkedIn

Telehealth: A New Frontier in Medicine—and Security

January 2022 Cybersecurity News Roundup: $60 million settlement, ‘zero trust’ strategy, fall of REvil, and more

It’s Back: Senators Want EARN IT Bill to Scan All Online Messages

Tesla Recalls 817,000 Vehicles Over Seatbelt Reminder

Intel expands Bug Bounty program with ‘Project Circuit Breaker’ effort

Wormhole Crypto Platform: ‘Funds Are Safe’ After $314M Heist

The state of AI ethics: The principles, the tools, the regulations

Ransomware is terrifying – but never underestimate the damage an employee with unmonitored access can do

Distrust, feuds building among ransomware groups

Education Provider Infosec Announces New Cybersecurity Scholarships

Defending Against Critical Threats: Analyzing Key Trends, Part 1

How Exploit Intel Makes You Less Vulnerable

Faxes and snail mail: Will pandemic-era flaws unleash improved health technology?

KP Snacks Hit by Cyber-attack

#Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection

DHS Creates Cyber Safety Review Board

CISA Releases Security Advisory for Airspan Networks Mimosa

U.S. Senate Judiciary Committee Approves Another Antitrust Bill That Would Allow Sideloading on iPhone

MacRumors Exclusive: Get 20% Off Brydge’s Popular iPad Keyboards and MacBook Vertical Dock

KP Snacks hit by ransomware: Crisps and nuts firm KO’d by modern scourge

Ransomware Attack On KP Snacks Prompts Shortage Warning

Report: 79% of ML teams say they ‘lack access’ to data needed to identify bias and ethics issues

S3 Ep68: Bugs, scams, privacy …and fonts?! [Podcast + Transcript]

CISA Releases Security Advisory for Airspan Networks Mimosa

Businesses’ Top Concerns Operating Cloud-native Technologies

Top-Ranking Banking Trojan Ramnit Stealing Payment Card Data

Iranian Hackers Employs PowerShell Backdoor to Bypass Security Products

Wormhole hack – Hackers steal $320M in one of the largest crypto heists

iPhone Flaw Exploited By Second Israeli Spy Firm

FBI: China Attacks More Than Everywhere Else Combined

Wormhole Blockchain Bridge Taken For More Than $300 Million

KP Snacks Left With Crumbs After Ransomware Attack

Microsoft Responds to OneDrive Mac User Criticism Following Decision to Enforce Files On-Demand Feature

Sale of ‘Silent AirTags’ on eBay and Etsy Raises Privacy Concerns

Bitcoin miners are helping the Texas grid brace for winter storm impact

Conti Ransomware hits British Company KP Snacks

TMF board member says the fund can’t do everything

Cisco Releases Security Updates for RV Series Routers

QR codes on Twitter deliver malicious Chrome extension

The Open Data Market and Risks to National Security

KP Snacks Hit By Ransomware – Experts Opinions

$320 milllion stolen from Wormhole crypto-trading platform

Beware bogus OperaGX sponsorship offers

Telco Penalized €9 Million for Obscuring Cyberattack Impact from Customers

More than 90% of Russians do not Finish Reading User Agreements on the Internet

Meta Stock Suffers, As Facebook Looses Daily Users For First Time

Black History Month: Diversity in Cybersecurity Is More Important than Technology

BlackCat ransomware – what you need to know

Cisco Releases Security Updates for RV Series Routers

Oil terminals in Europe’s biggest ports hit by a cyberattack

Apple Launches New iPhone 13 Product Pages Highlighting Key Features

New Year, Same Risks? Six Cyber Resilience Resolutions for a Safer 2022

Over $300 Million in Cryptocurrency Stolen in Wormhole Hack

Hackers Went Wild in 2021 — Every Company Should Do These 5 Things in 2022

Critical Flaws Discovered in Cisco Small Business RV Series Routers

As major winter storm descends on Texas, bitcoin miners are helping the power grid brace for impact

Keeper Security acquires Glyptodon to enhance privileged access management platform

Fraudsters set to pounce on massive infrastructure money

Cybersecurity: Many managers just don’t want to understand the risks

A New Cyber Insurance Model: Continuous Control Validation

Deals: AirPods Pro With MagSafe Drop to $179.99 ($69 Off)

Apple Did Not Mislead Customers About iPhone Water Resistance, Federal Judge Rules

Cyber Signals: Defending against cyber threats with the latest research, insights, and trends

Microsoft: ‘Dangerous mismatch’ in security due to slow MFA adoption

PowerPoint Files Abused to Take Over Computers

Cisco plugs critical flaws in small business routers

Ransomware Attack Against KP Snacks

10 Best Laptops Under $200 in 2022 – Review and Buying Guide

Codex Exposed: Helping Hackers in Training?

Questions Raised About Future Of Microsoft HoloLens

Privacy in Practice: Securing Your Data in 2022 and Beyond

Microsoft: This Mac malware is getting smarter and more dangerous

Ransomware Attack Disrupts Manufacturing at KP Snacks

Experts Reaction On Mandiant Threat Reporting Research: 1 In 7 Ransomware Attacks Leak Critical OT Info

CISA Adds Eight More Flaws To Its Exploited Vulnerabilities Catalogue

New SEO Poisoning Campaign Is Wreaking Havoc on the Cyberthreat Landscape

10 Best Laptops Under $700 – 2022 Buying Guide & Reviews

3D printed guns, underground markets, bomb manuals: police crackdown continues

More than $8 million made from NFT wash trading: Chainalysis

Critical Vulnerabilities Found in Sealevel Device Used in ICS Environments

Interview with the Head of the NSA’s Research Directorate

Introducing Topic Exercises

Execs keep flinging money at us instead of understanding security, moan infosec pros

Shuckworm Group uses Weaponized Word Document to Infect Victims Computer

European Oil Port Terminals Hit by Cyberattack

Cisco Patches Critical Vulnerabilities in Small Business RV Routers

FBI Admits Procurement Of NSO’s Pegasus For ‘Product Testing’

Introducing Check Point Software’s new “SMB Security Suite,” targeted towards offering out-of-the-box, end-to-end security for Small to Midsized Businesses.

Ransomware Often Hits Industrial Systems, With Significant Impact: Survey

Apple’s Proposal to Allow Third-Party Payment Methods in App Store ‘Lacks Detail,’ Says South Korean Regulatory Commission

9 out of 10 Security Leaders Warn of Skills Shortage

KP snacks hit with ransomware attack

China condemns US ban on telco, urges need for fair treatment

Home Improvement Firm Fined £200k for Nuisance Calls

Growing Number of Phish Kits Bypass MFA

They Were ‘Calling to Help.’ Then They Stole Thousands

New SEO Poisoning Campaign Distributing Trojanized Versions of Popular Software

Wormhole cryptocurrency platform hacked, crooks stole $326 million, the second-biggest hack of a DeFi platform

Heimdal CyberSecurity & Threat Intelligence Report 2021

Online Thieves Steal $320m from Crypto Firm Wormhole

How SSPM Simplifies Your SOC2 SaaS Security Posture Audit

CARROT Weather Gets Redesigned Maps With 3D Globe View, Forecast Layers, and More

Hackers steal $326 million from blockchain platform Wormhole

[updated]Cyberattack on fuel supplier causes supply chain disruption

Welsh home improvement biz fined £200,000 over campaign of 675,478 nuisance calls

Face ID with a Mask; Barcodes with Stamps; and Problems with OneDrive – Intego Mac Podcast Episode 225

Financially Motivated Hackers Use Leaked Conti Ransomware Techniques in Attacks

Obrela acquires Encode to become one of Europe’s largest MDR players

New Variant of UpdateAgent Malware Infects Mac Computers with Adware

Apple’s Privacy Measures to Cost Facebook $10 Billion in 2022

Stolen Netflix Accounts | Avast

Over 100,000 Files with Student Records from the British Council were Discovered Online

SolarMarker Malware Utilize Cutting-Edge Techniques

Apple Awards Bounty of $100,500 for Finding Flaws in MacBook

Do you know what your supply chain is and if it is secure?

New Wave of Cyber Attacks Target Palestine with Political Bait and Malware

Building confidence in your system’s security with chaos engineering

eSafety worried proposed anti-trolling laws may be used in vigilante-style justice

Trend Micro fixed 2 flaws in Hybrid Cloud Security products

AI technology is redefining surveillance

People working in IT related roles equally susceptible to phishing attempts as the general population

How organizations are arming themselves to combat threats

FBI says more cyber attacks come from China than everywhere else combined

Apple Inc pays $100,500 to hacker for hacking MacBook Webcam

Malware news trending on Google

DHS official to chair Biden-ordered cyber safety review board

How are collaboration apps fairing in remote work environments?

Companies woefully unprepared for CCPA compliance

Supply chain situation: All the numbers are working in our favor, says Port of Los Angeles

Unsecure Amazon S3 bucket Exposes IDs of Airport Security Employees

A Cybersecurity Role Has Topped List of Best Jobs

Cloud computing market to reach $287.03B by 2025

Cybersecurity in Competitive Online Gaming (Cheating, Mitigation, and Vulnerabilities)

Appgate secures Kubernetes workloads with cloud-native zero trust functionality

Codenotary Cloud identifies vulnerabilities in software development lifecycle

Mandiant Advantage Attack Surface Management allows security teams to operationalize intelligence

Limelight Layer0 Security protects against malicious website attacks

Cynamics launches cloud NDR to strengthen network monitoring and detection capabilities

UEFI firmware vulnerabilities affecting Fujitsu, Intel and more discovered

FBI Confirms It Bought Spyware From Israel’s NSO Group

Keepit for Azure AD offers protection against accidental deletions and ransomware

Qualys minimizes vulnerability risk for organizations with new remediation feature

Gretel’s privacy engineering toolkit guards synthetic data against adversarial attacks

PingOne DaVinci provides no-code identity orchestration capabilities for enterprises

Juniper Secure Edge empowers customers to protect remote workforces from anywhere

DOD debuts office to help It ‘move faster’ on AI

Linux Legend “maddog” Shares Exclusive Security Insights with LinuxSecurity>

Tell the Copyright Office Who Is Really Affected by Filters

More than $320 million stolen in latest apparent crypto hack

Worried about occasional npm malware scares? They’re more common than you may think

$324 million stolen from blockchain platform Wormhole

CoreStack collaborates with Maureen Data Systems to offer cloud governance for managed services

Contrast Security partners with GitHub to deliver pipeline-native security to developers

Cybellum integrates with Siemens Polarion to drive vulnerability management under one platform

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Sideloading Bill Would Allow ‘Malware, Scams and Data-Exploitation to Proliferate,’ Says Apple

DataRobot hires Debanjan Saha as COO

Aaron Ansari joins RangeForce as CRO

Arctic Wolf acquires Tetra Defense to expand incident readiness solutions

Vaultree joins Global Cyber Alliance to create a safer online community

Anjuna Security expands executive team with four industry executives

Veritas Technologies appoints Lawrence Wong as SVP and CSO

Lockheed Martin names Jay Malave as CFO

DOD health record system still faces cyber, training issues

Water Wars: Japan Focused on Defense Expansion, while U.S. Makes a Soft-Power Push

Remi Poujeaux joins Odaseva as SVP of Innovation

White House cyber office ‘expects to lead’ on workforce strategy

If My Organization Is Mostly in the Cloud, Do I Need a Firewall?

IT Security News Daily Summary 2022-02-02

KP Snacks Left with Crumbs After Ransomware Attack

Google One Disappears From App Store a Day After VPN Launch [Update: Google One is Back in the App Store]

Face ID With a Mask: How It Works and What You Need to Know

Microsoft adds ‘critical’ feature for GitHub security

Facebook Celebrates Data Privacy Day By Recapping Year Of Efforts

WhiteSource Threat Report Reveals Massive Uptick In Cyberattacks Related To JavaScript npm

INKY Completes Email Security Offering With Launch of Outbound Mail Protection

Cato Networks Delivers Instant Visibility and Control of Cloud Application Data Risk

Projects I Support

The wrong data privacy strategy could cost you billions

Why Security Pros Are Frustrated With Cloud Security

Welcome to the Burner Phone Olympics

Cloud-Native Threats in 2022

Russia May Employ Cyberattacks For Destablisation, US Warns

NordVPN and Surfshark announce merger

Purple Teaming Security Management Firm PlexTrac Raises $70 Million

Top cybersecurity leadership challenges and how to solve them

A day in the life of a cybersecurity manager

Google One Disappears From App Store a Day After VPN Launch

Emerging NFT frauds: ‘Wash trading’ and money laundering

Defense industry struggles with capacity, report says

NY spearheads regional, data-driven approach to tracing illegal guns

How agencies propel decision-making with data

Thousands of Data Center Management Apps Exposed to Internet

Threating hunting: Your best defense against unknown threats

Register Today! By Popular Demand, More Entry-Level Cybersecurity Certification Pilot Exam Review Offerings Now Available

Market research & conferencing service Civicom exposed 8TB of Data

Supply-Chain Security Is Not a Problem…It’s a Predicament

Managing Detections is Not the Same as Stopping Breaches

Researcher found an Information Disclosure in the Brave browser

The Flawed Claims About Bias in Facial Recognition

Japan Focused on Defense Expansion, while U.S. Makes a Soft-Power Push

KP Snacks hit with ransomware attack

Orange County Launches Cybercrime Initiative

Sugar Ransomware, a new RaaS in the threat landscape

Cyber Defense Media Group – 10 Year Anniversary – Daily Celebration in 2022

Alphabet Posts Record Results, Announces 20 for 1 Stock Split

TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware

Report: 75% of security leaders seek to implement edge use cases

Paying for the shift to zero trust

SolarMarker malware spread through advanced SEO poisoning

Fake Influencer Flags Hacking Tactics

The Real-World Impact of the Global Cybersecurity Workforce Gap on Cyber Defenders

Remote code execution vulnerability in Samba due to macOS interop module

Over 100 Million android users fall under Dark Herring Trap

The definition of modern Zero Trust

Elementor WordPress plugin has a gaping security hole – update now

Online Ad Association Fined for Privacy Violation

Google Releases Security Updates for Chrome

Metaverse tech could exacerbate today’s privacy problems, says Superset’s Tom Chavez

The evolution of a Mac trojan: UpdateAgent’s progression

Cyberattack on fuel supplier causes supply chain disruption

North Korea Hacked Him. So He Took Down Its Internet

Google Releases Security Updates for Chrome

German Petrol Company Oiltanking Suffers Cyberattack

Salt Security brings API security to the channel

AI-powered tools to fend off ransomware attacks

Tribal broadband effort gets $1.5 million federal investment

AT&T completes first 5G demonstration for ‘smart warehouse’ effort

Meet CoinStomp: New cryptojacking malware targets Asian cloud service providers

Trend Micro Patches Vulnerabilities in Hybrid Cloud Security Products

Charming Kitten Sharpens Its Claws With PowerShell Backdoor

DMCA-dot-com XSS Flaw Ignored For Over A Year

Notorious Spyware Firm Reportedly Offered Bags Of Cash For Access To US Networks

Samba Fruit Bug Allows RCE, Full Root User Access

Deals: Get Up to $50 Off Apple Watch Series 7 Models on Amazon

The MacRumors Show: Jon Prosser Talks iPhone 14 Design and Controversial Flat-Edged Apple Watch Rumors

UK think tank proposes Online Safety Bill reviewer to keep tabs on Ofcom decisions

Insider Threat Alert as employees take data while leaving a Job

Amazon To Create 1,500 Apprenticeships In UK

Security automation startup Cerby raises $12M to secure non-IT-managed apps

BlackCat ransomware implicated in attack on German oil companies

1,300 Malicious Packages Found in Popular npm JavaScript Package Manager

Finding Vulnerabilities in Open Source Projects

Shadow Sanctions for Immigration Violations

What’s ‘Politicizing’ the 2022 Winter Olympics?

Ransomware Attackers Are The Modern Day Bank Robbers

Alexa Chung’s Twitter Account Hacked By NFT Community

Expert Insights: SAP & Yale Team Up To Promote Diversity In Cybersecurity Hiring

The Moscow Kremlin and the Russian Government Have Estimated the Russian Cryptocurrency Market at $214 Billion

2,77,000 Routers Vulnerable to ‘Eternal Silence’ Assaults via UPnP

Iranian APT MuddyWater Targets Turkish Public and Government Entities

Introduction to Overhide-Ledger and Ledger-Based Authentication

Thousands of Malicious npm Packages Threaten Web Apps

Tennessee Community College Suffers Ransomware Attack

Olympic Athletes Advised by FBI to Bring ‘Burner’ Phones to Beijing

8 Security Dinosaurs and What Filled Their Footprints

Walmart Dissects New ‘Sugar’ Ransomware

TikTok’s Roland Cloutier: How CISOs Can Foster a Culture of Security & Transparency

More Than Half Of Ransomware Attacks Target Three Industries

What You Need to Do Today to Protect Against Account Takeover Attacks

Cloudflare launches paid public bug bounty program

Meet CoinStomp: new cryptojacking malware targets Asian cloud service providers

More than 1,000 malware packages found in NPM repository

Tens of Thousands of Websites Vulnerable to RCE Flaw in WordPress Plug-in

Telegram Gains Better Reactions, Video Stickers, Interactive Emoji, and More

REvil took a hit by Russia’s FSB but may not be shut down yet

Lacework expands capabilities for fixing Log4j flaw

Arid Viper hackers strike Palestine with political lures – and Trojans

Charming Kitten Sharpens Its Claws with PowerShell Backdoor

Announcing the public preview of Microsoft Azure Payment HSM service

FTC To Review Microsoft Activision Buy, As Sony Acquires Bungie

4 Essential Facets of Brand Protection

Passage Emerges From Stealth With Biometric User Authentication Platform

#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information

ESET releases fixes for local privilege escalation bug in Windows Applications

Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Security Through Obscurity. It Doesn’t Work.

PlexTrac lands $70M to automate mundane tasks for security teams

More than 100,000 Files Containing Student Records Exposed

In 2021, Ransomware Threats were Self-Installed

SureMDM Vulnerabilities Expose Organizations to Supply Chain Attacks

FBI warning: Scammers are posting fake job ads on networking sites to steal your money and identity

Microsoft Defender for Endpoint now spots unpatched bugs in iOS and Android devices

Cloudflare Launches Public Bug Bounty Program

Third of Employees Admit to Exfiltrating Data When Leaving Their Job

Out-of-Control Cybercrime Will Cause More Real-World Harm

New Malware Used by SolarWinds Attackers Went Undetected for Years

WhatsApp Readies Message Reactions for iPhone and Android

Citrix Merges With Tibco In $16.5bn Deal

Samba Patches Critical Flaws That Earned Researchers Big Rewards

FBI Warns of Potential Cyberattacks Targeting 2022 Winter Olympics

Cynet’s Keys to Extend Threat Visibility

Experts warn of a spike in APT35 activity and a possible link to Memento ransomware op

4 Top Cyber Threats to the Finance and Insurance Industries

ESET Patches High-Severity Vulnerability in Windows Applications

FBI warns of scam job listings

Samba Vulnerability Can Trigger RCE and Complete Root User Access

German Fuel Supplier Oiltanking Hit with Cyberattack

How to speed up your computer or laptop

The 2022 Workforce Security Report

CVSS 9.9-Rated Samba Bug Requires Immediate Patching

Samba bug may allow code execution as root on Linux machines, NAS devices (CVE-2021-44142)

FBI Urges Olympic Athletes To Use Burner Phones

Scottish Agency Still Recovering from 2020 Ransomware Attack

Ninety Percent of Security Leaders Warn of Skills Shortage

Man Who Duped Apple into Replacing Fake iPhones for Authentic Devices Worth $1 Million Convicted and Sentenced

DMCA-dot-com XSS vuln reported in 2020 still live today and firm has shrugged it off

How To Ensure Your Kubernetes Cloud OS Security

Google Patches 27 Vulnerabilities With Release of Chrome 98

Business leaders are confident in their defences, despite over half falling victim to ransomware

How Dangerous Is Log4Shell and How it Affects the Java Industry?

Build your own Android security product

The Samba Vulnerability: What is CVE-2021-44142 and How to Fix It

Experts found 23 flaws in UEFI firmware potentially impact millions of devices

68K People Who Received Services from Advocates were Affected by Data Theft

How to measure security efforts and have your ideas approved

What are real organisations doing with zero trust?

Q4 2021 Threat Report | Avast

Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors

Two initiatives that can move the needle for cybersecurity in 2022

Hacker Group ‘Moses Staff’ Using New StrifeWater RAT in Ransomware Attacks

Top concerns for operating cloud-native technologies

Product showcase: Cybellum’s Product Security Lifecycle Platform

Cyber Attack affects fuel supply in Germany

NSO Group of Pegasus Spyware wanted to access global signaling network

Rush to remote work left sysadmins struggling to keep businesses safe

Critical Bug Found in WordPress Plugin for Elementor with Over a Million Installations

What is driving NaaS adoption?

Persistent data breaches fueling developer interest in cybersecurity

Immutability Specialist Codenotary Now Offers Trusted Software Supply Chain Assurance in a Fast, Easy, Inexpensive Cloud

No Excuses: Get Your (ISC)² Certification Done in 2022

Help Shape The CSSLP Exam

Three ways banks can ensure a sustainable future

Stories from the SOC – Inactive Account Exploitation

Automotive cybersecurity market size to reach $5.3 billion by 2026

Forescout Acquires Healthcare Cybersecurity Firm CyberMDX

Cymulate Amplify helps companies eliminate critical security blind spots

DrawnApart – A New Fingerprinting Technique Used to Track Your Activities Online

Guardsquare extends protection offering for Flutter to prevent tampering and reverse engineering

Cato CASB protects enterprises against data breach and cloud-delivered threats

GuidePoint Security unveils Zero Trust Workshops to improve zero trust adoption for customers

RIPTA Data Breach Affected About 22,000 People

Quantifind Graphyte platform now available on Microsoft Azure

Picus Security joins MISA to protect critical data and assets against cyber attacks

Eseye and Armis launch a solution to secure connected devices on cellular networks

Nucleus Security partners with Mandiant to accelerate security and risk decision-making for organizations

Accenture names Manish Sharma as COO and Yusuf Tayob as Group Chief Executive of Operations

Talon Cyber Security raises $43 million to support the high demand for secure hybrid work

Pixm raises $4.3 million to protect enterprises from phishing attacks

Cengage Group acquires Infosec to expand into the cybersecurity professional training market

Update now: Samba prior to 4.13.17 hit with remote root code execution bug

Secure Web Browsers Tackle Ransomware, Insider Threat in Enterprises

Noname Security appoints Filip Verloy as Technical Evangelist for EMEA

Eric Guerin joins Skyworks Solutions Board of Directors

SecurID names Laura Marx as CMO

Cadence appoints Mary Louise Krakauer to Board of Directors

Joe Sexton joins Aqua Security Board of Directors

FBI: Use a Burner Phone at the Olympics

Former Facebook Executive Warns The Company Isn’t Ready For Election Hate Speech And Misinformation

Nucleus Security Forms Strategic Partnership with Mandiant

ThycoticCentrify Renamed Delinea

OpenSSF announces Alpha-Omega Project to improve global OSS supply chain security

Hal Pomeranz joins Spyderbat Advisory Board

Hunting pwnkit Local Privilege Escalation in Linux (CVE-2021-4034)

Next-gen contact centers demand cloud infrastructure, AI

Fending off ransomware attacks using AI-powered tools

Ransomware attacks continue to plague public services

Vectra Acquires Siriux Security Technologies to Extend Leadership in Identity and SaaS Threat Management

Massive social engineering waves have impacted banks in several countries

IT Security News Daily Summary 2022-02-01

GAO audit again shines light on problems in VA’s health records rollout

Army Materiel Command looks to advanced manufacturing to improve readiness

ShiftLeft CORE ‘Velocity Update’ Streamlines Triage, Automates Build Security Controls

Disclosure, Panic, Patch: Can We Do Better?

Digital Shadows Launches New Vulnerability Intelligence Module

Ping Identity Launches PingOne DaVinci

Forescout Acquires CyberMDX to Expand Healthcare Cybersecurity Focus

Universal Control vs. Sidecar: What’s the Difference?

OMB’s Shalanda Young talks TMF, CX and improper payments

Newly Detected “StrifeWater” RAT Linked to Iranian APT

OMB’s Zero Trust strategy: Government gets good

Unpatched Security Bugs in Medical Wearables Allow Patient Tracking, Data Theft

Apple Releases watchOS 8.4.1 With Bug Fixes for Apple Watch Series 4 and Later

NAPA report backs shift in leadership for cyber workforce development

Next-gen contact centers demand upgraded infrastructure, automation, human-centered design

The Account Takeover Cat-and-Mouse Game

DOD opens two fresh facilities to field next-gen supercomputers

Me on App Store Monopolies and Security

YouTube Still Testing Picture-in-Picture on iOS With Premium Subscribers

Google One VPN Now Available for iPhone and iPad Users

Researchers Devise “DrawnApart” – A GPU Fingerprinting Technique

Governments turning to data to find solutions to equity issues

Samba ‘Fruit’ Bug Allows RCE, Full Root User Access

Think Big, Start Small, Move Fast: Applying Lessons From The Mayo Clinic to Cybersecurity

Israeli Police: Possible Improper Surveillance by Our Own

7 Red Flags That Can Stop Your Company From Becoming a Unicorn

British Council exposed 144,000 files containing student details

Specters of Fear and Executive Power

The power of chaos: A robust and low-cost cryptosystem for the post-quantum era

Civil rights groups launch effort to stop IRS use of ‘flawed’ ID.me facial recognition

OpenSSF Alpha-Omega Project Tackles Supply Chain Security

How Passwordless can Help us Win the Ransomware War

How to Protect All Five Stages of the IoT Security Lifecycle

DeepDotWeb Operator Sentenced to Eight Years for Role in $8.4 million Kickback Scheme

Cyber Attackers Exploiting Microsoft Excel add-in Files

BRATA Android malware factory resets phones after stealing funds

Mozilla adding multi-account containers to VPN offering

Two Dozen UEFI Vulnerabilities Impact Millions of Devices From Major Vendors

Linux kernel patches “performance can be harmful” bug in video driver

Apple TV+ Shares First Look at ‘Foundation’ Season 2 With New Cast Member Reveal

iOS 15.4 Beta Adds Option to Hide iCloud Keychain Security Recommendations

Improve your security defenses for ransomware attacks with Azure Firewall

Congratulations to the Top MSRC 2021 Q4 Security Researchers!

Ransomware means your database IS the front line. How are you defending it?

British Council Student Data Found in Unprotected Database

Complexity vs. Capability: How to Bridge the Security Effectiveness Gap

SolarMarker Malware Uses Novel Techniques to Persist on Hacked Systems

Expanding the Microsoft Researcher Recognition Program

German Fuel Supplier Offline After Cyberattack

Most Reliable Hosting Company Sites in January 2022

Firewalla launches Purple: Its must-have network security device

Shell forced to reroute supplies after cyberattack on two German oil companies

California Passes FLASH Act

Cyber-Attack on Oil Firms

FBI Releases PIN on Potential Cyber Activities During the 2022 Beijing Winter Olympics and Paralympics

Unreleased iPhone, Entry-Level iPad, and iPad Air Imported Into India Ahead of Rumored Spring Launch

Hackers are now using ransomware in attempt to remain undetected

Germany: 2 Oil Storage and Supply Firms Hit by Cyberattack

Social Security Numbers Most Targeted Sensitive Data

Samba Releases Security Updates

FBI Releases PIN on Potential Cyber Activities During the 2022 Beijing Winter Olympics and Paralympics

FBI Urges Temporary Phones For Olympic Athletes

NSO Group Pegasus Spyware Aims At Finnish Diplomats

Apple Pays $100.5K Bug Bounty For Mac Webcam Hack

Cyber Attack Strikes German Fuel Supplies

U.S. State Department Picks Apart PRC’s South China Sea Customary Law Claim

Four-day Working Week IS Possible For Cybersec Too!

Brits Lost Over £96 Million To Dating Scams In 2021

The High Stakes Of Network Security In 2022

600K WordPress Sites Impacted By Critical Plugin RCE Vulnerability

Cyber Hacking Soars During Home Working, Research Suggests

Why is cybersecurity one of the best fields for young people to enter?

Quantum computing brings new security risks: How to protect yourself

FBI says no smart phones, computers and tablets at Beijing Winter Olympics

India To Launch Digital Currency In 2022

Report: Enterprises expect remote work to take permanent hold

Check Point acquires ‘developer-first’ security startup to boost CloudGuard platform

Delinea Emerges as a Leading PAM (Privileged Access Mgmt) Provider

Iranian Hackers Using New PowerShell Backdoor Linked to Memento Ransomware

Qualys Adds Advanced Remediation Capabilities to Minimize Vulnerability Risk

Samba Releases Security Updates

Armis and Eseye joint solution reliably secures connected devices on cellular networks

Andreas Deliandreadis announced as Kiteworks VP of Sales, EMEA

Comment From Cybersecurity Expert: The Dangers Of Dating Apps As Valentine’s Day Approaches

Samba patches critical vulnerability that allows remote code execution as root

Cyberattacker hits German service station petrol terminal provider

ESET: Criminals will be Able to Steal Personal Data Using Smartwatches

CRTC Inquiry Targets Dark Web Marketplace Sellers and Administrator

British Council Students’ Data Exposed in Major Breach

Mastercard Launches Global Cybersecurity Alliance Program to Further Secure The Digital Ecosystem

A cyber attack severely impacted the operations of German petrol distributor Oiltanking GmbH

Deals: AirPods Max on Sale for $449.99 in Every Color ($99 Off)

Elon Musk Offers Teenager $5,000 To Stop Tracking Bot

Identity Fraud: 9 Consumer Scams (and How to Stop Them)

Critical Log4j Vulnerabilities Are the Ultimate Gift for Cybercriminals

MuddyWater Targets Turkey

Gucci Releases $980 Case for $549 AirPods Max

One in seven ransom extortion attempts leak key operational data

THE STAKES HAVE NEVER BEEN HIGHER: HOW TO EXPAND THE CYBER WORKFORCE

These hackers are hitting victims with ransomware in an attempt to cover their tracks

Forescout acquires healthcare cybersecurity provider CyberMDX

Living Off the Land: How to Defend Against Malicious Use of Legitimate Utilities

Critical Flaw Impacts WordPress Plugin With 1 Million Installations

Duo of Android dropper and payload target certain countries and app users

Twitter Sues Over German Online Reporting Rule

Cymulate Launches Service to Augment In-House Security Teams

Coalition Launches Executive Risks Products With Personalized Risk Assessment

Solarmarker Malware Uses Novel Techniques to Persist on Hacked Systems

Black Unity Braided Solo Loop Available at Select Apple Stores Starting Today

OneDrive Mac Users Unhappy With Buggy and Enforced New ‘Files On-Demand Experience’

Google and Microsoft back the Alpha-Omega Project to bolster software supply chain

Cybersecurity M&A Roundup: 31 Deals Announced in January 2022

Virgin Media O2 Mulls Fibre Network Expansion With New Venture – Report

One in seven ransomware extortion attempts leak key operational tech records

FBI warn olympians to leave devices at home

Critical WordPress Plugin RCE Impacts 600K WordPress Sites

Island unveils secure browser to give enterprises ‘full control’ over data

Inside Trickbot, Russia’s Notorious Ransomware Gang

Android malware BRATA can wipe devices

Apply those updates now: CVE bypass offers up admin privileges for Windows 10

Ransomware: Is the party almost over for the cyber crooks?

CISA Adds Recent iOS, SonicWall Vulnerabilities to ‘Must Patch’ List

Iran-linked MuddyWater APT group campaign targets Turkish entities

iOS 15.4 Beta Suggests Apple to Support Push Notifications From Web-Based Apps

Google Topics | Avast

AI-powered anti-phishing solution provider Pixm offers last line of defense

State-sponsored Iranian hackers attack Turkish government, private organizations

Apple Trolls Spotify Over Neil Young

FBI: Olympic Athletes Should Leave Devices at Home

Data Leak Exposes IDs of Airport Security Workers

Iranian Hackers Using New PowerShell Backdoor in Cyber Espionage Attacks

Tripwire Patch Priority Index for January 2022

‘White Tur’ Hacking Group Borrows Techniques From Multiple APTs

Telehealth: A New Frontier in Medicine—and Security

14 Best Gaming Laptops Under $1000 2022 – Reviews & Buying Guide

During a Live Stream Ceremony, the Nobel Foundation Disclosed a DDoS attack

Cyber Attack: North Korea Suffers Internet Outage

Making Progress Securing Our Nation’s Water Supply

Russia’s naval exercise near Ireland unlikely to involve cable-tapping shenanigans

Ukraine Continues to Face Cyber Espionage Attacks from Russian Hackers

Apple Offering $25 Extra Credit During Apple Watch Trade-In in Celebration of Heart Month

Looking for adding new detection technologies in your security products?

Reasons Why Every Business is a Target of DDoS Attacks

7 Best Gaming PC under $500 That Can Run Any Game 2022 – Prebuild

Ransomware Groups are Enlisting Breached Individuals to Persuade Firms to Pay Up

Researchers Uncover New Iranian Hacking Campaign Targeting Turkish Users

Review: Group-IB Threat Intelligence & Attribution (TI&A)

Podcast Episode: Saving Podcasts from a Patent Troll

Home Affairs singles out Meta as most reluctant to stop online abuse

How ready are federal agencies for zero trust implementation?

New SureMDM Vulnerabilities Could Expose Companies to Supply Chain Attacks

RCE in WordPress plugin Essential Addons for Elementor impacts hundreds of thousands of websites

Top attack trends every organization should build resilience against

Microsoft stops 3.7 Tbps DDoS Cyber Attack in history

Cengage to acquire Cybersecurity training company InfoSec

North Korean Hacker Group Deliver KONNI Rat Malware Using Weaponized Office Document

Understaffing persistently impacting enterprise privacy teams

Organizations neglecting Microsoft 365 cybersecurity features

Armor Unlocks the Constraints Companies Face with Traditional Cybersecurity Providers

Verimatrix Key Shield Wins Cybersecurity Excellence Award

REGISTER TODAY FOR THE (ISC)² ENTRY-LEVEL CYBERSECURITY CERTIFICATION PILOT EXAM

How can home security be improved with IoT?

What’s new in IoT in ’22?

New Samba Bug Allows Remote Attackers to Execute Arbitrary Code as Root

Infosec products of the month: January 2022

IoT in smart cities market to reach $132.2 billion by 2026

Imperva is on Top of the World as it Announces New PoP in Bogotá

eBook: Anomaly Detection in Cybersecurity for Dummies

Quantum Star Technologies Starpoint detects zero-day threats at the binary level

Magnet AUTOMATE Enterprise provides parallel processing of multiple target endpoints

Google Removed Fake Authenticator App From Play Store That Dropped Vultur Malware

New Phishing Campaign Delivers AsyncRAT Malware

Google Launched Differential Privacy Tool for Python Developers

UK NCSC Rolls Out SME NMAP Scripts To Detect Vulnerabilities

FBI urges athletes to keep personal devices at home, use burners during Beijing Winter Olympics

Apple Targeting Indie Director Over ‘Apple-Man’ Film Title Trademark

Researchers develop automated approach to extract security policies from software

LambdaTest integrates with Datadog to enable better collaboration among testing and development teams

SoftBank-backed Cybereason reportedly files confidential paperwork to go public

Apple, SonicWall, Internet Explorer vulnerabilities added to CISA list

How to tell if your phone has been hacked

Vista and Evergreen to acquire Citrix for $16.5 billion

Updates released for multiple vulnerabilities found in 42 Gears’ SureMDM products

Vulnerability Summary for the Week of January 24, 2022

What Hackers Know About Your Software Supply Chain (That You Don’t)

CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit

Free cybersecurity tools for state, local governments

IaC security options help reduce software development risk

Mandiant: One in 7 Ransomware Extortion Attacks Expose OT Data

Security Service Edge Boosters Form New Forum to Encourage Adoption

Vulnerability Summary for the Week of January 24, 2022

Wasabi opens Paris storage region to enhance the availability of its services

BigBear.ai appoints Carla Fitzgerald as CMO

SaaS Security Guide: How to Protect Your SaaS Business

3 Ways to Save Incident Response Time

State Department confirms ‘defect’ led to resolved global IT outage

Edge, public cloud, security drive network transformation

IT Security News Monthly Summary – February

IT Security News Daily Summary 2022-01-31

2022-01-27 – Contact Forms Campaign IcedID (Bokbot) with Cobalt Strike

Getting facial recognition right

No, a researcher didn’t find Olympics app spying on you

Labor Department announces grants for states to expand UI access

No-cost cybersecurity tools for state, local governments

Include defensive security in your cybersecurity strategy

How to prepare for malicious insider threats

Aggressive BlackCat Ransomware on the Rise

BlackBerry Agrees to Sell Legacy Patents for $600M

Samba fixed CVE-2021-44142 remote code execution flaw

Popular Browser Game ‘Wordle’ Sold to The New York Times, Will Remain Free ‘Initially’

DIU boasts more rapid acquisition agreements, fewer transitioned tech in 2021

Dashburgh: Pittsburgh’s open data portal

Public Exploit Released for Windows 10 Bug

2022-01-27 – Contact Forms Campaign IcedID (Bokbot) with Cobalt Strike

Getting facial recognition right

Facebook Messenger Will Now Notify You If Someone Screenshots Your Disappearing Message

CISA adds 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog

Sports Scores and Favorite Team Selection Likely Coming to Apple News App

Apple TV+ Subscribers Who Join for Major Releases Like ‘Greyhound’ Don’t Stick Around

No, a researcher didn’t find Olympics app spying on you

Phishing Campaign Registers Attacker’s Device With Victim Network

Apple Stops Providing EarPods With iPhones Sold in France

IG report points to weaknesses in the Commerce Department’s infosec program

Cengage to Buy Cybersecurity Training platform, Infosec

Hundreds of thousands of routers exposed to Eternal Silence campaign via UPnP

Mini-LED iMac Pro to Launch in Mid-2022, Not Expected at Spring Event

Deals: Apple’s M1 iMac (8-Core GPU, 256GB) Drops to New Low of $1,349.99 in Several Colors

Top 9 Best Laptop for Adobe Creative Cloud 2022 – Photoshop, Illustrator

Security giant exposed 3TB of sensitive airport & employees data

Apple Pays $100.5K Bug Bounty for Mac Webcam Hack

Cyber Insights 2022: Improving Criminal Sophistication

Conti Ransomware Targets Taiwanese Apple and Tesla Supplier Delta Electronics

Zscaler CEO: Network security firms have ‘hijacked’ zero trust

The deadline is here for federal contractors to start paying at least $15 an hour

OT Data Stolen by Ransomware Gangs Can Facilitate Cyber-Physical Attacks

SolarWinds breach news center

8 best practices for blockchain security

Emsisoft releases DeadBolt ransomware decryption tool

Website operator fined for using Google Fonts “the cloudy way”

Aussie Tech Entrepreneur Extradited Over SMS Fraud

iMac Pro to Launch in Mid-2022, Not Expected at Spring Event

Prepublication Review and the Quicksand Foundation of Snepp

An Important Development in the Law of Diplomatic Appointments

CrowdStrike Falcon Proactively Protects Against Wiper Malware as CISA Warns U.S. Companies of Potential Attacks

The top reasons countries ask Google to remove content

NSO Group Pegasus Spyware Aims at Finnish Diplomats

Prison for Dark Overlord Collaborator

Apple Patched Two Zero-Day Bugs And Other Flaws With iOS 15.3, Safari 15.3

This Phishing Attack Meddles With Your Emails – Alerts Microsoft

Cyberattacks Increasingly Hobble Pandemic-Weary US Schools

Some iPhone Users Experiencing Issues With Apple Card Payments

Workplace Disruption Reported at Meta Amid AR and VR Push, Some Staff Defecting to Competitors Like Apple

How a few PhD students revealed that phishing trainings might just not work: Lock and Code S03E03

Top-Ranking Banking Trojan Ramnit Out to Steal Payment Card Data

Enabling Zero Trust with Azure network security services

Multilingual Cybersecurity Awareness Training adapted for your needs

French Court Upholds 100m Euro Fine On Google Over Cookies

Looking Back at Rumors of iPhone X Design With Rear Touch ID That Never Emerged

Cyber attacks at an all time high for UK corps

North Korean Hackers Abuse Windows Update Client in Attacks on Defense Industry

7 Privacy Tips for Security Pros

Your Graphics Card Fingerprint Can Be Used to Track Your Activities Across the Web

Curated, tested and supported: How enterprise vendors mitigate open source supply chain risk

Unsecured AWS Server Exposed 3TB In Airport Employee Records

What To Do To Delete The Scary Amount Of Data Google Has On You

Smart-Chain Financial Site Qubit Hacked For $80 Million

Top US Spy Warns Too Many Government Secrets Harms National Security

Lazarus APT Cell Exploits the Windows Update Client

What data does Google store about you

Healthcare and the increasing importance of cybersecurity

PwnKit Linux Vulnerability Discovered And Fixed After 12 Years

New LockBit Ransomware Variant Evolves To Target Linux Systems

Your device’s GPU may be used for fingerprinting purposes

MoD Reported 7 Serious Data Losses To ICO

Silicon In Focus Podcast: Content Enablement

Funny and malicious server banners

Why Local Governments Remain at Risk of Cyber Crime

DARPA phase 2 of project targeting ‘quantum advantage’

Unsecured AWS server exposed 3TB in airport employee records

Ransomware: Over half of attacks are targeting these three industries

More Russian Attacks Against Ukraine Come to Light

The Looming CISO Mental Health Crisis — and What to Do About It, Part 2

Privacy And You: Take A Step Forward On Data Privacy Day

DARPA phase 2 of project targeting ‘quantum advantage’

Ransomware: Over half of attacks are targeting these three industries

The Zero Trust Timer Is on for Federal Agencies — How Ready Are They?

Hackers stole $80M worth of cryptocurrency from the Qubit DeFi platform

Deals: Get the 32GB Apple TV 4K for $159.99 ($19 Off)

Natural Silk Fibers Used by Researchers to Generate Secure Keys

9 Best Gaming Mouse Under $50 2022 – For Fortnite, CS:GO

Healthcare and the increasing importance of cybersecurity

MoD Reported 7 Serious Data Losses To ICO

Funny and malicious server banners

Why Local Governments Remain at Risk of Cyber Crime

More Russian Attacks Against Ukraine Come to Light

Crypto Agility: Solving for the Inevitable

DeepDotWeb admin sentenced to 97 months in prison for money laundering scheme

Microsoft OneDrive for macOS Local Privilege Escalation

Privacy And You: Take A Step Forward On Data Privacy Day

$770 Million Lost from Social Media Fraud Surge

PwnKit Linux Vulnerability Discovered And Fixed After 12 Years

New LockBit Ransomware Variant Evolves To Target Linux Systems

Your device’s GPU may be used for fingerprinting purposes

Unsecured AWS server exposed 3TB in airport employee records

The Looming CISO Mental Health Crisis — and What to Do About It, Part 2

Deals: iPad Air Drops to All-Time Low Price of $499.99 ($99 Off)

Apple Watch Getting New Activity Challenge for Heart Month

FAA Agrees To Switch On More 5G Towers And Masts

SureMDM Vulnerabilities Exposed Companies to Supply Chain Attacks

The Third Building Block for the SOC of the Future: Balanced Automation

HOW TO BECOME AN (ISC)² VOLUNTEER AND MAKE A DIFFERENCE IN THE CYBERSECURITY COMMUNITY

Projects I Support

Microsoft: Here’s how we stopped the biggest ever DDoS attack

Expert earned $100,500 bounty to hack Apple MacBook webcam and microphone

Cloud-Native Threats in 2022

Finnish Diplomats Targeted by Pegasus Spyware: Ministry

CISA’s ‘Must Patch’ List Puts Spotlight on Vulnerability Management Processes

$2m Bug Bountry offered to Hackers

Actor’s verified Twitter profile hijacked to spam NFT giveaways

How to Make Your Smartphone Secure with These 7 Apps

North Korean Hackers Leverages Windows Update Client to Execute Malicious Payload

A week in security (January 24 – 30)

Putin Orders New System To Ban ‘Toxic’ Internet Content

Crypto Finance Firm Offers $2m Bug Bounty to Hackers

US Revokes China Unicom’s License

Attackers are Using Shipment-Delivery Scams to Lure Victims to Install Trickbot

10K Victims Infested via Google Play 2FA App Loaded with Banking Trojan

Russia Recorded the Largest Botnet Attack on Retail

Priti Patel Approves Extradition Of Autonomy Founder Mike Lynch

QNAP Ransomware: Thousands Infected with DeadBolt

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of January 24, 2022

Why Do Many CISOs Prefer Incident Response over Threat Prevention?

Protecting Networks From Future Attacks | Avast

German Court Rules Websites Embedding Google Fonts Violates GDPR

Trying to register your antivirus in Windows Security Center?

China Unicom Latest To Be Banned Over National Security

Americans lost $770 million from social media fraud in 2021, FTC reports

Read Entire Article