BOOK THIS SPACE FOR AD
ARTICLE ADIT Security News Daily Summary 2022-02-06
Breach of Washington State Database May Expose Personal Information
How to stop the spread of ransomware attacks
Popular VPNs NordVPN And Surfshark Announce Merger
Israeli surveillance firm QuaDream emerges from the dark
Cyber Defense Media Group Launches CyberDefenseCon 2022
The Top 5 Cloud Security Predictions for 2022
Bug Bounty Hunter Finds Google Drive Integration Vulnerability
CISA Issues Warning to Federal Agencies Regarding Actively Exploited Windows Flaw
Microsoft: Russian FSB Hackers Compromising Ukraine Since October
Australian Mogul Sues Facebook Over Scam Advertisements
3 data-driven strategies to secure the atomized network
Forged Kubernetes Apps is used to Extract Sensitive Data from Argo CD Setups
Gurman: Apple Event on March 8, At Least Four M2 Macs to Launch Later This Year
Argo CD flaw could allow stealing sensitive data from Kubernetes Apps
Health Sites Let Ads Track Visitors Without Telling Them
$4.4 million stolen in attack on blockchain infrastructure Meter
Security Affairs newsletter Round 352
Attackers Gained Access to the Systems of the National Games of China
Swissport Ransomware Attack Delays Flights, Disturbs Operations
Week in review: Samba vulnerability, phishing kits bypassing MFA, Patch Tuesday forecast
New Argo CD Bug Could Let Hackers Steal Secret Info from Kubernetes Apps
Massachusetts Lawmakers Weighing Online Data Privacy Bill
Convergint acquires Dramis Communications Solutions to expand direct service coverage in Canada
Noetic Cyber expands its leadership team with 3 key executive hires
IT Security News Daily Summary 2022-02-05
LockBit ransomware gang claims to have stolen data from PayBito crypto exchange
FBI issued a flash alert on Lockbit ransomware operation
Walmart Dissects New ‘Sugar’ Ransomware
Trend Micro Patches Critical Bugs in its Security Products
Convergint Announces Acquisition of Dramis Communications Solutions Ltd.
LockBit ransomware gang claims PayBito crypto exchange as new victim
Tennessee State University was Targeted by a Cyber Attack
Target Reveals Its Personal Skimming Detection Tool
A $320 Million Crypto Hack Sends the DeFi World Reeling
Top Stories: March 8 Apple Event, New iMac Pro Rumors, Universal Control vs. Sidecar, and More
Fortune 500 service provider says ransomware attack led to leak of more than 500k SSNs
Emotet’s Uncommon Approach of Masking IP Addresses
Threat actors are Looking for Ways to Bypass MFA with Evolving Phishing Kits
Hackers Steal Around $320M+ from Crypto Firm Wormhole
CISA orders federal agencies to fix actively exploited CVE-2022-21882 Windows flaw
Build or Buy your own antivirus product
Microsoft Uncovers New Details of Russian Hacking Campaign Targeting Ukraine
Durov Suspected WhatsApp of Intentionally Introducing Vulnerabilities
Critical Flaws in Cisco Small Business Routers let Attackers Execute Arbitrary code
2022-02-04 – BazarLoader infection with Cobalt Strike
Box expands Slack integration to increase security and improve productivity
‘Very concerning’: Cisco router vulnerabilities bring broad risks
Think before you scan: How fraudsters can exploit QR codes to steal money
Week in security with Tony Anscombe
Mozilla adds four privacy-centric orgs to Data Futures Lab, awards each with $100,000
Impinj promotes Hussein Mecklai to COO
Senate Commerce Committee is Letting Big Telecom Hamstring the FCC
EFF to Appeals: Apple’s Monopoly Doesn’t Make Users Safer
Argo CD releases patch for zero-day vulnerability
IT Security News Daily Summary 2022-02-04
How to Protect Cloud Workloads from Zero-day Vulnerabilities
Microsoft discloses new details on Russian hacker group Gamaredon
As IRS grapples with ID.me, what’s next for Login.gov?
Argo CD releases patch for 0-day vulnerability
Friday Squid Blogging: Are Squid from Another Planet?
What to Expect From Apple’s Upcoming 2022 iPhone SE 5G
Microsoft Defender for Endpoint now spots unpatched bugs in iOS and Android devices
Building OAuth 2.0 Authorization Server
NSA rounds up the year in cyber
AI-enabled health care: First, do not automate harm
Microsoft, Symantec Share Notes on Russian Hacks Hitting Ukraine
The 3 Most Common Causes of Data Breaches in 2021
Over 500,000 people were impacted by a ransomware attack that hit Morley
AI Weekly: DeepMind’s AlphaCode, automatic age verification, and a new open language model
Republican senators demand briefing on IRS decision to require ID.me ‘selfies’
Suspected Chinese spies break into cloud accounts of News Corp journalists
5 Steps to Becoming a Cybersecurity Consultant
Cryptojacking Attacks Target Alibaba ECS Instances
Michigan to build nation’s first EV charging public road
Investment in data privacy in Brazil falls below global average
Expert Insights: Training the Data Elephant in the AI Room
New Low-Cost iPhone SE 5G and iPad Air Coming on March 8
Freeze out hackers during the 2022 Winter Olympic Games
4 Top Cyber Threats to the Finance and Insurance Industries
Ransomware attack hit Swissport International causing delays in flights
PowerPoint add-on used to spread malicious files: Avanan
Intuit releases security notices, warns of phishing emails ahead of tax season
‘Long Live Log4Shell’: CVE-2021-44228 Not Dead Yet
Argo CD Security Bug Opens Kubernetes Cloud Apps to Attackers
Nord Security and Surfshark to Merge
Major Vulnerability Found in Argo CD
Understanding Identity Detection and Response
How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks
ACTINIUM targets Ukrainian organizations
Software development, implementation and support services
Wormhole cryptotrading company turns over $340,000,000 to criminals
Tennessee College Hit with Ransomware
BlackCat Ransomware Gang Employing Novel Techniques to Target Organizations
Text Message Scams: How to Recognize, Report and Restrict Them
Beware of the Attacks of Zombie Botnet
The Alpha and Omega of software supply chain security
News Corp reports January cyberattack targeting Wall Street Journal, New York Post, Dow Jones
Airport services firm Swissport reports ransomware incident
Singapore urges shared responsibility in preventing online scams as it readies liability framework
#Enigma2022: Security’s Role in Helping HealthTech Find Its Way
Low Detection Phishing Kits Increasingly Bypass MFA
Airport Services Firm Swissport Reports Ransomware Incident
Nintendo Wants Admitted Team Xecuter Pirate Jailed For Five Years
Ransomware Wants You To Like Or Subscribe, Or Else
Apple’s $1.1 Billion Patent Dispute With Caltech Granted New Damages Trial
New iPad Air and iPhone SE Models With A15 Chip, 5G, and More Reportedly Enter Production
Apple Music Reduces Free Trial Period to One Month
MacRumors Giveaway: Win a Tech Folio and Tech Pocket From WaterField Designs
China-Linked Group Attacked Taiwanese Financial Firms for 18 Months
Russia-Ukraine escalation of tensions: FBI calls for reports of uptick in cyber activit
Live XSS Flaw Exists in DMCA-dot-com
IT Personnel Equally Susceptible to Phishing Attempts as the General Population
Cloud Threats: What Business Executives Need To Know Right Now
BotenaGo strikes again – malware source code uploaded to GitHub
China linked Cyber Attack on News Corp
Business Services Firm Morley Discloses Data Breach Affecting 500,000 People
CISA Adds One Known Exploited Vulnerability to Catalog
Threat actor steals email with Zimbra zero-day
Cynomi raises $3.5M for virtual CISO platform
CISA Adds One Known Exploited Vulnerability to Catalog
Impacts from a new reality drive the need for an enhanced digital identity framework
Lost In Translation: Language Gaps in Social Media Labels
As Part of Electoral Count Act Reform, Liberals Should Learn to Love Bush v. Gore
Detect Log4j Vulnerability Using ACS
Strong authentication protects against phishing. So why aren’t more people using it?
Meet Nord Security: The company behind NordVPN wants to be your one-stop privacy suite
Media Giant News Corp Targeted in China-Linked Cyberattack
Want to Be an Ethical Hacker? Here’s Where to Begin
A nation-state actor hacked media and publishing giant News Corp
New iPad Air and iPhone SE Production Reportedly Underway
Edgescan partners with Manicode to revolutionise secure coding courses
Open-source Kubernetes tool Argo CD has a high-severity path traversal flaw: Patch now
UK Bosses Rethink Physical Office Spaces, Slack Finds
Best Internet Security Suites & Software for 2022
ISO 27002 and Threat Intelligence: The New Security Standard
Iranian Charming Kitten Adds PowerShell Back Door
Creating Coherence out of Chaos
Best Free and Public DNS Servers
European Oil And Port Facilities Suffer Cyberattacks
Russian APT Primitive Bear attacks Western gov’t department in Ukraine through job hunt
More companies are using multi-factor authentication. Hackers are looking for a way to beat it
Just-in-Time Access Explained. What It Means, Benefits and Best Practices of JIT
5 Reasons to Choose Duo Over Free Multi-Factor Authentication
9 Best Gaming Mouse Under $50 2022 – For Fortnite, CS:GO
Attackers Target Intuit Users by Threatening to Cancel Tax Accounts
The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips
Retail giant Target open sources Merry Maker e-skimmer detection tool
Software Asset Management (SAM) – How It Can Benefit Your Company
FBI issues cybersecurity warnings to athletes at Winter Olympics in Beijing
Investment scams are on the rise
FBI warns of bogus job postings on recruitment sites
CMA Fines Meta A Second Time Over Giphy Order
US Accuses Russia of Disinformation Plot to Justify Invasion of Ukraine
File Taxes Safely And Securely | Avast
Tech salaries, developer skills, cybersecurity, and more: ZDNet’s research roundup
Operation EmailThief: Zero-day XSS vulnerability in Zimbra email platform revealed
DHS Connects Government, Private Sector in New Cyber Safety Review Board
Twitter Expands Downvote Button Test Worldwide
Top 9 Best Laptop for Adobe Creative Cloud 2022 – Photoshop, Illustrator
Target Open Sources Web Skimmer Detection Tool
Another Israeli Firm, QuaDream, Caught Weaponizing iPhone Bug for Spyware
Russia-linked Gamaredon APT targeted a western government entity in Ukraine
Phishing kits that bypass MFA protection are growing in popularity
NFT Wash Trading Made Scammers at Least $9m in 2021
Apple to Collect 27% Commission on Third-Party App Payment Systems in the Netherlands
Pharma employee credentials exposed
Zimbra zero-day vulnerability exploited to steal emails
CISA issues advisory warning of critical vulnerabilities in Airspan Networks Mimosa
Trustpilot Set to Sue Firms That Solicit Fake Reviews
Cyber-Attacks Hobble Some of Europe’s Largest Ports
US Federal government creates cybersecurity incident review board
National Games of China Systems Attack Analysis | Avast
Amazon Set to Increase Prime Membership Fee By 17% for US Customers
Chinese Hackers Target Financial Institutions in Taiwan With Custom Backdoor
U.S. Authorities Charge 6 Indian Call Centers Scamming Thousands of Americans
Zimbra zero-day vulnerability actively exploited by an alleged Chinese threat actor
BATLOADER and Atera Agent are Being Distributed Through an SEO Poisoning Campaign
Civicom Data Breach Disclosed 8TB of Files
The Cat and Mouse Chase of Account Takeovers
Russian Gamaredon Hackers Targeted ‘Western Government Entity’ in Ukraine
US Authorities Charge 6 Indian Call Centers Scamming Thousands of Americans
Cynet Log4Shell Webinar: A Thorough – And Clear – Explanation
Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows ?
ESET Antivirus Flaw Let Attackers to Escalate Privileges & Execute Arbitrary Code
“Modern CTO” Podcast Features Avast CISO Jaya Baloo | Avast
Microsoft blocked tens of billions of brute-force and phishing attacks in 2021
White Hat Hacker Accesses Teslas | Avast
February 2022 Patch Tuesday forecast: A rough start for 2022
New infosec products of the week: February 4, 2022
How threat actors are using npm to launch attacks
Cyber Attack on Europe’s major Oil terminal
US hacker claims to have downed the internet of North Korea
Trio of RCE CVSS 10 vulnerabilities among 15 CVEs in Cisco small business routers
CISA Warns of Critical Vulnerabilities Discovered in Airspan Networks Mimosa
Exposed corporate credentials threatening the pharma sector
Hackers Exploited 0-Day Vulnerability in Zimbra Email Platform to Spy on Users
Bank executives mostly concerned about cybercrime
Code review: How satisfied are development teams?
Piracy is alive and well, demand reaching 3.7 billion unlicensed streams and downloads
New Cloud Security Alliance Survey Finds Uneven Adoption of Emerging Technologies
Lattice to Host Virtual Seminar on Anti-Fragile Security and Post-Quantum Cryptography in FPGAs
AT&T Cybersecurity Insights Report: Securing the Edge – Available today
Privacy in 2021: A Year Worth Reviewing
Database security market to reach $16,273.8 million by 2028
Major vulnerability found in open source dev tool for Kubernetes
G-71 launches a new version of LeaksID to offer intellectual property protection
What Does an Internal Attack Resulting in a Data Breach Look Like in Today’s Threat Landscape?
HUMAN Bot Insights Services protects businesses from sophisticated bot attacks
Outseer Emerging Payments detects and prevents fraud in installment transactions
Tenable.cs updates enable organizations to detect and fix cloud infrastructure misconfigurations
JumpCloud expands cloud directory platform with patch management to improve device security
Aqua Security CNAPP features help security teams assess their cloud native security risk
FortiGate 3000F increases security and networking convergence across hybrid IT architectures
Teradata partners with Microsoft to modernize complex data analytics environments
Dialpad expands partnership with Google Cloud to centralize business communications
Axio joins with Cyber Risk Institute to improve cybersecurity resilience for financial institutions
That’s a signature move: How $320m in Ether was stolen from crypto biz Wormhole
CMMC gets a new home in the Pentagon
Xerox acquires Powerland to strengthen IT services offerings in North America
Yellowbrick Data collaborates with NI+C to unlock data value for enterprises
Suzanne McBride joins Skyworks Solutions Board of Directors
Dialpad appoints Jim Nystrom and Kent Venook to key sales leadership roles
ColorTokens announces strategic hires across EMEA
John A. Wheeler joins CyberSaint Growth Advisory Board
Cyberattack was attempted against a western government ‘entity’ in Ukraine, researchers say
New Orleans leans into data to reduce over-incarceration
White House creates board to review cybersecurity incidents, members to start with Log4J
Kronos Still Dragging Itself Back From Ransomware Hell
Mac Malware-Dropping Adware Gets More Dangerous
Exclusive interview with the Powerful Greek Army (PGA) hacker group
Orca Cloud Risk Encyclopedia provides ongoing education for security practitioners
Zoho Workplace achieves substantial growth amidst the ongoing migration from competitor suites
ThycoticCentrify renamed Delinea to help solve modern privileged access challenges
Cyvatar appoints Alise Barron as VP of Member Experience
Ermetic hires Eduard Meelhuysen as VP of Sales for EMEA
NortonLifeLock sees growth in excess of 10% for revenues, net income in FY 2022 Q3
Fortinet beats Wall Street estimates for Q4, reports $3.34 billion in revenue for 2021
Volexity Warns of ‘Active Exploitation’ of Zimbra Zero-Day
Several India-Based Call Centers Indicted by US DoJ
Mandiant Bolsters SaaS Platform With Integration of New Attack Surface Management Module
They Were ‘Calling to Help.’ Then They Stole Thousands
IT Security News Daily Summary 2022-02-03
GSA, DOD seek clean electricity to meet emissions targets
Silo-busting software closes benefits gaps in Philadelphia
Low-Detection Phishing Kits Increasingly Bypass MFA
Research From Quantum and ESG Reveals Top Challenges in Data Management
Tenable Launches Suite of New Features to Cloud-Native Application Security Platform
Universal Control: Everything You Need to Know
San Francisco Should Strengthen, Not Gut, Surveillance Technology Ordinance
SHOP SAFE Will Stomp Out Online Sales of Used and Homemade Goods
A worrying Etsy listing reveals the stalking potential of Apple’s AirTags
Let’s go phishing: How we could enter a new era of email trust
Database aims to help tribes adapt to climate change
Gretel goes GA with privacy engineering developer stack
DHS Launches Cyber Safety Review Board to Analyze Major Vulnerability Events
Privacy Shield: EU citizens might get right to challenge US access to their data
Great Resignation Increases Security Risks For Businesses, Warns Tessian
DHS forms first-ever Cyber Safety Review Board
Facebook Suffers $10 Billion Loss Because Of Privacy Changes
Microsoft: Multifactor Adoption Remains Low
The Chatter Podcast: The Olympics, Politics, and Security with Ethan Scheiner
Cisco fixes critical flaws in its Small Business Routers
Phishing kits’ use of man-in-the-middle reverse proxies is growing, warns Proofpoint
This book has an awful title, but says a lot of great things
Prosecutors investigating cyberattacks affecting multiple Belgian and Dutch ports
Critical Cisco Bugs Open VPN Routers to Cyberattacks
Intel Patched 226 Vulnerabilities in 2021
Bridging the Gap Between Training and Behavior
DOD’s testing chief wants cloud contracts to allow for more security checks
The importance of a policy-driven threat modeling approach
Simplifying Zero Trust Security in Healthcare Organizations
Conti gang hits KP Snacks with a crippling ransomware attack
A More Modern Approach to Logging in Golang
Big Pharma Finds Patch Management a Bitter Pill
Antlion APT group used a custom backdoor that allowed them to fly under the radar for months
JumpCloud joins the patch management crowd, starting with Windows and Mac updates
How Phishers Are Slinking Their Links Into LinkedIn
Telehealth: A New Frontier in Medicine—and Security
It’s Back: Senators Want EARN IT Bill to Scan All Online Messages
Tesla Recalls 817,000 Vehicles Over Seatbelt Reminder
Intel expands Bug Bounty program with ‘Project Circuit Breaker’ effort
Wormhole Crypto Platform: ‘Funds Are Safe’ After $314M Heist
The state of AI ethics: The principles, the tools, the regulations
Distrust, feuds building among ransomware groups
Education Provider Infosec Announces New Cybersecurity Scholarships
Defending Against Critical Threats: Analyzing Key Trends, Part 1
How Exploit Intel Makes You Less Vulnerable
Faxes and snail mail: Will pandemic-era flaws unleash improved health technology?
#Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection
DHS Creates Cyber Safety Review Board
CISA Releases Security Advisory for Airspan Networks Mimosa
MacRumors Exclusive: Get 20% Off Brydge’s Popular iPad Keyboards and MacBook Vertical Dock
KP Snacks hit by ransomware: Crisps and nuts firm KO’d by modern scourge
Ransomware Attack On KP Snacks Prompts Shortage Warning
Report: 79% of ML teams say they ‘lack access’ to data needed to identify bias and ethics issues
S3 Ep68: Bugs, scams, privacy …and fonts?! [Podcast + Transcript]
CISA Releases Security Advisory for Airspan Networks Mimosa
Businesses’ Top Concerns Operating Cloud-native Technologies
Top-Ranking Banking Trojan Ramnit Stealing Payment Card Data
Iranian Hackers Employs PowerShell Backdoor to Bypass Security Products
Wormhole hack – Hackers steal $320M in one of the largest crypto heists
iPhone Flaw Exploited By Second Israeli Spy Firm
FBI: China Attacks More Than Everywhere Else Combined
Wormhole Blockchain Bridge Taken For More Than $300 Million
KP Snacks Left With Crumbs After Ransomware Attack
Sale of ‘Silent AirTags’ on eBay and Etsy Raises Privacy Concerns
Bitcoin miners are helping the Texas grid brace for winter storm impact
Conti Ransomware hits British Company KP Snacks
TMF board member says the fund can’t do everything
Cisco Releases Security Updates for RV Series Routers
QR codes on Twitter deliver malicious Chrome extension
The Open Data Market and Risks to National Security
KP Snacks Hit By Ransomware – Experts Opinions
$320 milllion stolen from Wormhole crypto-trading platform
Beware bogus OperaGX sponsorship offers
Telco Penalized €9 Million for Obscuring Cyberattack Impact from Customers
More than 90% of Russians do not Finish Reading User Agreements on the Internet
Meta Stock Suffers, As Facebook Looses Daily Users For First Time
Black History Month: Diversity in Cybersecurity Is More Important than Technology
BlackCat ransomware – what you need to know
Cisco Releases Security Updates for RV Series Routers
Oil terminals in Europe’s biggest ports hit by a cyberattack
Apple Launches New iPhone 13 Product Pages Highlighting Key Features
New Year, Same Risks? Six Cyber Resilience Resolutions for a Safer 2022
Over $300 Million in Cryptocurrency Stolen in Wormhole Hack
Hackers Went Wild in 2021 — Every Company Should Do These 5 Things in 2022
Critical Flaws Discovered in Cisco Small Business RV Series Routers
As major winter storm descends on Texas, bitcoin miners are helping the power grid brace for impact
Keeper Security acquires Glyptodon to enhance privileged access management platform
Fraudsters set to pounce on massive infrastructure money
Cybersecurity: Many managers just don’t want to understand the risks
A New Cyber Insurance Model: Continuous Control Validation
Deals: AirPods Pro With MagSafe Drop to $179.99 ($69 Off)
Apple Did Not Mislead Customers About iPhone Water Resistance, Federal Judge Rules
Cyber Signals: Defending against cyber threats with the latest research, insights, and trends
Microsoft: ‘Dangerous mismatch’ in security due to slow MFA adoption
PowerPoint Files Abused to Take Over Computers
Cisco plugs critical flaws in small business routers
Ransomware Attack Against KP Snacks
10 Best Laptops Under $200 in 2022 – Review and Buying Guide
Codex Exposed: Helping Hackers in Training?
Questions Raised About Future Of Microsoft HoloLens
Privacy in Practice: Securing Your Data in 2022 and Beyond
Microsoft: This Mac malware is getting smarter and more dangerous
Ransomware Attack Disrupts Manufacturing at KP Snacks
CISA Adds Eight More Flaws To Its Exploited Vulnerabilities Catalogue
New SEO Poisoning Campaign Is Wreaking Havoc on the Cyberthreat Landscape
10 Best Laptops Under $700 – 2022 Buying Guide & Reviews
3D printed guns, underground markets, bomb manuals: police crackdown continues
More than $8 million made from NFT wash trading: Chainalysis
Critical Vulnerabilities Found in Sealevel Device Used in ICS Environments
Interview with the Head of the NSA’s Research Directorate
Execs keep flinging money at us instead of understanding security, moan infosec pros
Shuckworm Group uses Weaponized Word Document to Infect Victims Computer
European Oil Port Terminals Hit by Cyberattack
Cisco Patches Critical Vulnerabilities in Small Business RV Routers
FBI Admits Procurement Of NSO’s Pegasus For ‘Product Testing’
Ransomware Often Hits Industrial Systems, With Significant Impact: Survey
9 out of 10 Security Leaders Warn of Skills Shortage
KP snacks hit with ransomware attack
China condemns US ban on telco, urges need for fair treatment
Home Improvement Firm Fined £200k for Nuisance Calls
Growing Number of Phish Kits Bypass MFA
They Were ‘Calling to Help.’ Then They Stole Thousands
New SEO Poisoning Campaign Distributing Trojanized Versions of Popular Software
Heimdal CyberSecurity & Threat Intelligence Report 2021
Online Thieves Steal $320m from Crypto Firm Wormhole
How SSPM Simplifies Your SOC2 SaaS Security Posture Audit
CARROT Weather Gets Redesigned Maps With 3D Globe View, Forecast Layers, and More
Hackers steal $326 million from blockchain platform Wormhole
[updated]Cyberattack on fuel supplier causes supply chain disruption
Welsh home improvement biz fined £200,000 over campaign of 675,478 nuisance calls
Financially Motivated Hackers Use Leaked Conti Ransomware Techniques in Attacks
Obrela acquires Encode to become one of Europe’s largest MDR players
New Variant of UpdateAgent Malware Infects Mac Computers with Adware
Apple’s Privacy Measures to Cost Facebook $10 Billion in 2022
Stolen Netflix Accounts | Avast
Over 100,000 Files with Student Records from the British Council were Discovered Online
SolarMarker Malware Utilize Cutting-Edge Techniques
Apple Awards Bounty of $100,500 for Finding Flaws in MacBook
Do you know what your supply chain is and if it is secure?
New Wave of Cyber Attacks Target Palestine with Political Bait and Malware
Building confidence in your system’s security with chaos engineering
eSafety worried proposed anti-trolling laws may be used in vigilante-style justice
Trend Micro fixed 2 flaws in Hybrid Cloud Security products
AI technology is redefining surveillance
How organizations are arming themselves to combat threats
FBI says more cyber attacks come from China than everywhere else combined
Apple Inc pays $100,500 to hacker for hacking MacBook Webcam
Malware news trending on Google
DHS official to chair Biden-ordered cyber safety review board
How are collaboration apps fairing in remote work environments?
Companies woefully unprepared for CCPA compliance
Supply chain situation: All the numbers are working in our favor, says Port of Los Angeles
Unsecure Amazon S3 bucket Exposes IDs of Airport Security Employees
A Cybersecurity Role Has Topped List of Best Jobs
Cloud computing market to reach $287.03B by 2025
Cybersecurity in Competitive Online Gaming (Cheating, Mitigation, and Vulnerabilities)
Appgate secures Kubernetes workloads with cloud-native zero trust functionality
Codenotary Cloud identifies vulnerabilities in software development lifecycle
Mandiant Advantage Attack Surface Management allows security teams to operationalize intelligence
Limelight Layer0 Security protects against malicious website attacks
Cynamics launches cloud NDR to strengthen network monitoring and detection capabilities
UEFI firmware vulnerabilities affecting Fujitsu, Intel and more discovered
FBI Confirms It Bought Spyware From Israel’s NSO Group
Keepit for Azure AD offers protection against accidental deletions and ransomware
Qualys minimizes vulnerability risk for organizations with new remediation feature
Gretel’s privacy engineering toolkit guards synthetic data against adversarial attacks
PingOne DaVinci provides no-code identity orchestration capabilities for enterprises
Juniper Secure Edge empowers customers to protect remote workforces from anywhere
DOD debuts office to help It ‘move faster’ on AI
Linux Legend “maddog” Shares Exclusive Security Insights with LinuxSecurity>
Tell the Copyright Office Who Is Really Affected by Filters
More than $320 million stolen in latest apparent crypto hack
Worried about occasional npm malware scares? They’re more common than you may think
$324 million stolen from blockchain platform Wormhole
CoreStack collaborates with Maureen Data Systems to offer cloud governance for managed services
Contrast Security partners with GitHub to deliver pipeline-native security to developers
Cybellum integrates with Siemens Polarion to drive vulnerability management under one platform
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone
Sideloading Bill Would Allow ‘Malware, Scams and Data-Exploitation to Proliferate,’ Says Apple
DataRobot hires Debanjan Saha as COO
Aaron Ansari joins RangeForce as CRO
Arctic Wolf acquires Tetra Defense to expand incident readiness solutions
Vaultree joins Global Cyber Alliance to create a safer online community
Anjuna Security expands executive team with four industry executives
Veritas Technologies appoints Lawrence Wong as SVP and CSO
Lockheed Martin names Jay Malave as CFO
DOD health record system still faces cyber, training issues
Water Wars: Japan Focused on Defense Expansion, while U.S. Makes a Soft-Power Push
Remi Poujeaux joins Odaseva as SVP of Innovation
White House cyber office ‘expects to lead’ on workforce strategy
If My Organization Is Mostly in the Cloud, Do I Need a Firewall?
IT Security News Daily Summary 2022-02-02
KP Snacks Left with Crumbs After Ransomware Attack
Face ID With a Mask: How It Works and What You Need to Know
Microsoft adds ‘critical’ feature for GitHub security
Facebook Celebrates Data Privacy Day By Recapping Year Of Efforts
WhiteSource Threat Report Reveals Massive Uptick In Cyberattacks Related To JavaScript npm
INKY Completes Email Security Offering With Launch of Outbound Mail Protection
Cato Networks Delivers Instant Visibility and Control of Cloud Application Data Risk
The wrong data privacy strategy could cost you billions
Why Security Pros Are Frustrated With Cloud Security
Welcome to the Burner Phone Olympics
Russia May Employ Cyberattacks For Destablisation, US Warns
NordVPN and Surfshark announce merger
Purple Teaming Security Management Firm PlexTrac Raises $70 Million
Top cybersecurity leadership challenges and how to solve them
A day in the life of a cybersecurity manager
Google One Disappears From App Store a Day After VPN Launch
Emerging NFT frauds: ‘Wash trading’ and money laundering
Defense industry struggles with capacity, report says
NY spearheads regional, data-driven approach to tracing illegal guns
How agencies propel decision-making with data
Thousands of Data Center Management Apps Exposed to Internet
Threating hunting: Your best defense against unknown threats
Market research & conferencing service Civicom exposed 8TB of Data
Supply-Chain Security Is Not a Problem…It’s a Predicament
Managing Detections is Not the Same as Stopping Breaches
Researcher found an Information Disclosure in the Brave browser
The Flawed Claims About Bias in Facial Recognition
Japan Focused on Defense Expansion, while U.S. Makes a Soft-Power Push
KP Snacks hit with ransomware attack
Orange County Launches Cybercrime Initiative
Sugar Ransomware, a new RaaS in the threat landscape
Cyber Defense Media Group – 10 Year Anniversary – Daily Celebration in 2022
Alphabet Posts Record Results, Announces 20 for 1 Stock Split
TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware
Report: 75% of security leaders seek to implement edge use cases
Paying for the shift to zero trust
SolarMarker malware spread through advanced SEO poisoning
Fake Influencer Flags Hacking Tactics
The Real-World Impact of the Global Cybersecurity Workforce Gap on Cyber Defenders
Remote code execution vulnerability in Samba due to macOS interop module
Over 100 Million android users fall under Dark Herring Trap
The definition of modern Zero Trust
Elementor WordPress plugin has a gaping security hole – update now
Online Ad Association Fined for Privacy Violation
Google Releases Security Updates for Chrome
Metaverse tech could exacerbate today’s privacy problems, says Superset’s Tom Chavez
The evolution of a Mac trojan: UpdateAgent’s progression
Cyberattack on fuel supplier causes supply chain disruption
North Korea Hacked Him. So He Took Down Its Internet
Google Releases Security Updates for Chrome
German Petrol Company Oiltanking Suffers Cyberattack
Salt Security brings API security to the channel
AI-powered tools to fend off ransomware attacks
Tribal broadband effort gets $1.5 million federal investment
AT&T completes first 5G demonstration for ‘smart warehouse’ effort
Meet CoinStomp: New cryptojacking malware targets Asian cloud service providers
Trend Micro Patches Vulnerabilities in Hybrid Cloud Security Products
Charming Kitten Sharpens Its Claws With PowerShell Backdoor
DMCA-dot-com XSS Flaw Ignored For Over A Year
Notorious Spyware Firm Reportedly Offered Bags Of Cash For Access To US Networks
Samba Fruit Bug Allows RCE, Full Root User Access
Deals: Get Up to $50 Off Apple Watch Series 7 Models on Amazon
UK think tank proposes Online Safety Bill reviewer to keep tabs on Ofcom decisions
Insider Threat Alert as employees take data while leaving a Job
Amazon To Create 1,500 Apprenticeships In UK
Security automation startup Cerby raises $12M to secure non-IT-managed apps
BlackCat ransomware implicated in attack on German oil companies
1,300 Malicious Packages Found in Popular npm JavaScript Package Manager
Finding Vulnerabilities in Open Source Projects
Shadow Sanctions for Immigration Violations
What’s ‘Politicizing’ the 2022 Winter Olympics?
Ransomware Attackers Are The Modern Day Bank Robbers
Alexa Chung’s Twitter Account Hacked By NFT Community
Expert Insights: SAP & Yale Team Up To Promote Diversity In Cybersecurity Hiring
2,77,000 Routers Vulnerable to ‘Eternal Silence’ Assaults via UPnP
Iranian APT MuddyWater Targets Turkish Public and Government Entities
Introduction to Overhide-Ledger and Ledger-Based Authentication
Thousands of Malicious npm Packages Threaten Web Apps
Tennessee Community College Suffers Ransomware Attack
Olympic Athletes Advised by FBI to Bring ‘Burner’ Phones to Beijing
8 Security Dinosaurs and What Filled Their Footprints
Walmart Dissects New ‘Sugar’ Ransomware
TikTok’s Roland Cloutier: How CISOs Can Foster a Culture of Security & Transparency
More Than Half Of Ransomware Attacks Target Three Industries
What You Need to Do Today to Protect Against Account Takeover Attacks
Cloudflare launches paid public bug bounty program
Meet CoinStomp: new cryptojacking malware targets Asian cloud service providers
More than 1,000 malware packages found in NPM repository
Tens of Thousands of Websites Vulnerable to RCE Flaw in WordPress Plug-in
Telegram Gains Better Reactions, Video Stickers, Interactive Emoji, and More
REvil took a hit by Russia’s FSB but may not be shut down yet
Lacework expands capabilities for fixing Log4j flaw
Arid Viper hackers strike Palestine with political lures – and Trojans
Charming Kitten Sharpens Its Claws with PowerShell Backdoor
Announcing the public preview of Microsoft Azure Payment HSM service
FTC To Review Microsoft Activision Buy, As Sony Acquires Bungie
4 Essential Facets of Brand Protection
Passage Emerges From Stealth With Biometric User Authentication Platform
#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information
ESET releases fixes for local privilege escalation bug in Windows Applications
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk
Security Through Obscurity. It Doesn’t Work.
PlexTrac lands $70M to automate mundane tasks for security teams
More than 100,000 Files Containing Student Records Exposed
In 2021, Ransomware Threats were Self-Installed
SureMDM Vulnerabilities Expose Organizations to Supply Chain Attacks
FBI warning: Scammers are posting fake job ads on networking sites to steal your money and identity
Microsoft Defender for Endpoint now spots unpatched bugs in iOS and Android devices
Cloudflare Launches Public Bug Bounty Program
Third of Employees Admit to Exfiltrating Data When Leaving Their Job
Out-of-Control Cybercrime Will Cause More Real-World Harm
New Malware Used by SolarWinds Attackers Went Undetected for Years
WhatsApp Readies Message Reactions for iPhone and Android
Citrix Merges With Tibco In $16.5bn Deal
Samba Patches Critical Flaws That Earned Researchers Big Rewards
FBI Warns of Potential Cyberattacks Targeting 2022 Winter Olympics
Cynet’s Keys to Extend Threat Visibility
Experts warn of a spike in APT35 activity and a possible link to Memento ransomware op
4 Top Cyber Threats to the Finance and Insurance Industries
ESET Patches High-Severity Vulnerability in Windows Applications
FBI warns of scam job listings
Samba Vulnerability Can Trigger RCE and Complete Root User Access
German Fuel Supplier Oiltanking Hit with Cyberattack
How to speed up your computer or laptop
The 2022 Workforce Security Report
CVSS 9.9-Rated Samba Bug Requires Immediate Patching
Samba bug may allow code execution as root on Linux machines, NAS devices (CVE-2021-44142)
FBI Urges Olympic Athletes To Use Burner Phones
Scottish Agency Still Recovering from 2020 Ransomware Attack
Ninety Percent of Security Leaders Warn of Skills Shortage
DMCA-dot-com XSS vuln reported in 2020 still live today and firm has shrugged it off
How To Ensure Your Kubernetes Cloud OS Security
Google Patches 27 Vulnerabilities With Release of Chrome 98
Business leaders are confident in their defences, despite over half falling victim to ransomware
How Dangerous Is Log4Shell and How it Affects the Java Industry?
Build your own Android security product
The Samba Vulnerability: What is CVE-2021-44142 and How to Fix It
Experts found 23 flaws in UEFI firmware potentially impact millions of devices
68K People Who Received Services from Advocates were Affected by Data Theft
How to measure security efforts and have your ideas approved
What are real organisations doing with zero trust?
Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors
Two initiatives that can move the needle for cybersecurity in 2022
Hacker Group ‘Moses Staff’ Using New StrifeWater RAT in Ransomware Attacks
Top concerns for operating cloud-native technologies
Product showcase: Cybellum’s Product Security Lifecycle Platform
Cyber Attack affects fuel supply in Germany
NSO Group of Pegasus Spyware wanted to access global signaling network
Rush to remote work left sysadmins struggling to keep businesses safe
Critical Bug Found in WordPress Plugin for Elementor with Over a Million Installations
What is driving NaaS adoption?
Persistent data breaches fueling developer interest in cybersecurity
No Excuses: Get Your (ISC)² Certification Done in 2022
Three ways banks can ensure a sustainable future
Stories from the SOC – Inactive Account Exploitation
Automotive cybersecurity market size to reach $5.3 billion by 2026
Forescout Acquires Healthcare Cybersecurity Firm CyberMDX
Cymulate Amplify helps companies eliminate critical security blind spots
DrawnApart – A New Fingerprinting Technique Used to Track Your Activities Online
Guardsquare extends protection offering for Flutter to prevent tampering and reverse engineering
Cato CASB protects enterprises against data breach and cloud-delivered threats
GuidePoint Security unveils Zero Trust Workshops to improve zero trust adoption for customers
RIPTA Data Breach Affected About 22,000 People
Quantifind Graphyte platform now available on Microsoft Azure
Picus Security joins MISA to protect critical data and assets against cyber attacks
Eseye and Armis launch a solution to secure connected devices on cellular networks
Accenture names Manish Sharma as COO and Yusuf Tayob as Group Chief Executive of Operations
Talon Cyber Security raises $43 million to support the high demand for secure hybrid work
Pixm raises $4.3 million to protect enterprises from phishing attacks
Cengage Group acquires Infosec to expand into the cybersecurity professional training market
Update now: Samba prior to 4.13.17 hit with remote root code execution bug
Secure Web Browsers Tackle Ransomware, Insider Threat in Enterprises
Noname Security appoints Filip Verloy as Technical Evangelist for EMEA
Eric Guerin joins Skyworks Solutions Board of Directors
SecurID names Laura Marx as CMO
Cadence appoints Mary Louise Krakauer to Board of Directors
Joe Sexton joins Aqua Security Board of Directors
FBI: Use a Burner Phone at the Olympics
Former Facebook Executive Warns The Company Isn’t Ready For Election Hate Speech And Misinformation
Nucleus Security Forms Strategic Partnership with Mandiant
ThycoticCentrify Renamed Delinea
OpenSSF announces Alpha-Omega Project to improve global OSS supply chain security
Hal Pomeranz joins Spyderbat Advisory Board
Hunting pwnkit Local Privilege Escalation in Linux (CVE-2021-4034)
Next-gen contact centers demand cloud infrastructure, AI
Fending off ransomware attacks using AI-powered tools
Ransomware attacks continue to plague public services
Massive social engineering waves have impacted banks in several countries
IT Security News Daily Summary 2022-02-01
GAO audit again shines light on problems in VA’s health records rollout
Army Materiel Command looks to advanced manufacturing to improve readiness
ShiftLeft CORE ‘Velocity Update’ Streamlines Triage, Automates Build Security Controls
Disclosure, Panic, Patch: Can We Do Better?
Digital Shadows Launches New Vulnerability Intelligence Module
Ping Identity Launches PingOne DaVinci
Forescout Acquires CyberMDX to Expand Healthcare Cybersecurity Focus
Universal Control vs. Sidecar: What’s the Difference?
OMB’s Shalanda Young talks TMF, CX and improper payments
Newly Detected “StrifeWater” RAT Linked to Iranian APT
OMB’s Zero Trust strategy: Government gets good
Unpatched Security Bugs in Medical Wearables Allow Patient Tracking, Data Theft
Apple Releases watchOS 8.4.1 With Bug Fixes for Apple Watch Series 4 and Later
NAPA report backs shift in leadership for cyber workforce development
Next-gen contact centers demand upgraded infrastructure, automation, human-centered design
The Account Takeover Cat-and-Mouse Game
DOD opens two fresh facilities to field next-gen supercomputers
Me on App Store Monopolies and Security
YouTube Still Testing Picture-in-Picture on iOS With Premium Subscribers
Google One VPN Now Available for iPhone and iPad Users
Researchers Devise “DrawnApart” – A GPU Fingerprinting Technique
Governments turning to data to find solutions to equity issues
Samba ‘Fruit’ Bug Allows RCE, Full Root User Access
Think Big, Start Small, Move Fast: Applying Lessons From The Mayo Clinic to Cybersecurity
Israeli Police: Possible Improper Surveillance by Our Own
7 Red Flags That Can Stop Your Company From Becoming a Unicorn
British Council exposed 144,000 files containing student details
Specters of Fear and Executive Power
The power of chaos: A robust and low-cost cryptosystem for the post-quantum era
Civil rights groups launch effort to stop IRS use of ‘flawed’ ID.me facial recognition
OpenSSF Alpha-Omega Project Tackles Supply Chain Security
How Passwordless can Help us Win the Ransomware War
How to Protect All Five Stages of the IoT Security Lifecycle
DeepDotWeb Operator Sentenced to Eight Years for Role in $8.4 million Kickback Scheme
Cyber Attackers Exploiting Microsoft Excel add-in Files
BRATA Android malware factory resets phones after stealing funds
Mozilla adding multi-account containers to VPN offering
Two Dozen UEFI Vulnerabilities Impact Millions of Devices From Major Vendors
Linux kernel patches “performance can be harmful” bug in video driver
Apple TV+ Shares First Look at ‘Foundation’ Season 2 With New Cast Member Reveal
iOS 15.4 Beta Adds Option to Hide iCloud Keychain Security Recommendations
Improve your security defenses for ransomware attacks with Azure Firewall
Congratulations to the Top MSRC 2021 Q4 Security Researchers!
Ransomware means your database IS the front line. How are you defending it?
British Council Student Data Found in Unprotected Database
Complexity vs. Capability: How to Bridge the Security Effectiveness Gap
SolarMarker Malware Uses Novel Techniques to Persist on Hacked Systems
Expanding the Microsoft Researcher Recognition Program
German Fuel Supplier Offline After Cyberattack
Most Reliable Hosting Company Sites in January 2022
Firewalla launches Purple: Its must-have network security device
Shell forced to reroute supplies after cyberattack on two German oil companies
FBI Releases PIN on Potential Cyber Activities During the 2022 Beijing Winter Olympics and Paralympics
Unreleased iPhone, Entry-Level iPad, and iPad Air Imported Into India Ahead of Rumored Spring Launch
Hackers are now using ransomware in attempt to remain undetected
Germany: 2 Oil Storage and Supply Firms Hit by Cyberattack
Social Security Numbers Most Targeted Sensitive Data
Samba Releases Security Updates
FBI Releases PIN on Potential Cyber Activities During the 2022 Beijing Winter Olympics and Paralympics
FBI Urges Temporary Phones For Olympic Athletes
NSO Group Pegasus Spyware Aims At Finnish Diplomats
Apple Pays $100.5K Bug Bounty For Mac Webcam Hack
Cyber Attack Strikes German Fuel Supplies
U.S. State Department Picks Apart PRC’s South China Sea Customary Law Claim
Four-day Working Week IS Possible For Cybersec Too!
Brits Lost Over £96 Million To Dating Scams In 2021
The High Stakes Of Network Security In 2022
600K WordPress Sites Impacted By Critical Plugin RCE Vulnerability
Cyber Hacking Soars During Home Working, Research Suggests
Why is cybersecurity one of the best fields for young people to enter?
Quantum computing brings new security risks: How to protect yourself
FBI says no smart phones, computers and tablets at Beijing Winter Olympics
India To Launch Digital Currency In 2022
Report: Enterprises expect remote work to take permanent hold
Check Point acquires ‘developer-first’ security startup to boost CloudGuard platform
Delinea Emerges as a Leading PAM (Privileged Access Mgmt) Provider
Iranian Hackers Using New PowerShell Backdoor Linked to Memento Ransomware
Qualys Adds Advanced Remediation Capabilities to Minimize Vulnerability Risk
Samba Releases Security Updates
Armis and Eseye joint solution reliably secures connected devices on cellular networks
Andreas Deliandreadis announced as Kiteworks VP of Sales, EMEA
Comment From Cybersecurity Expert: The Dangers Of Dating Apps As Valentine’s Day Approaches
Samba patches critical vulnerability that allows remote code execution as root
Cyberattacker hits German service station petrol terminal provider
ESET: Criminals will be Able to Steal Personal Data Using Smartwatches
CRTC Inquiry Targets Dark Web Marketplace Sellers and Administrator
British Council Students’ Data Exposed in Major Breach
Mastercard Launches Global Cybersecurity Alliance Program to Further Secure The Digital Ecosystem
A cyber attack severely impacted the operations of German petrol distributor Oiltanking GmbH
Deals: AirPods Max on Sale for $449.99 in Every Color ($99 Off)
Elon Musk Offers Teenager $5,000 To Stop Tracking Bot
Identity Fraud: 9 Consumer Scams (and How to Stop Them)
Critical Log4j Vulnerabilities Are the Ultimate Gift for Cybercriminals
Gucci Releases $980 Case for $549 AirPods Max
One in seven ransom extortion attempts leak key operational data
THE STAKES HAVE NEVER BEEN HIGHER: HOW TO EXPAND THE CYBER WORKFORCE
These hackers are hitting victims with ransomware in an attempt to cover their tracks
Forescout acquires healthcare cybersecurity provider CyberMDX
Living Off the Land: How to Defend Against Malicious Use of Legitimate Utilities
Critical Flaw Impacts WordPress Plugin With 1 Million Installations
Duo of Android dropper and payload target certain countries and app users
Twitter Sues Over German Online Reporting Rule
Cymulate Launches Service to Augment In-House Security Teams
Coalition Launches Executive Risks Products With Personalized Risk Assessment
Solarmarker Malware Uses Novel Techniques to Persist on Hacked Systems
Black Unity Braided Solo Loop Available at Select Apple Stores Starting Today
OneDrive Mac Users Unhappy With Buggy and Enforced New ‘Files On-Demand Experience’
Google and Microsoft back the Alpha-Omega Project to bolster software supply chain
Cybersecurity M&A Roundup: 31 Deals Announced in January 2022
Virgin Media O2 Mulls Fibre Network Expansion With New Venture – Report
One in seven ransomware extortion attempts leak key operational tech records
FBI warn olympians to leave devices at home
Critical WordPress Plugin RCE Impacts 600K WordPress Sites
Island unveils secure browser to give enterprises ‘full control’ over data
Inside Trickbot, Russia’s Notorious Ransomware Gang
Android malware BRATA can wipe devices
Apply those updates now: CVE bypass offers up admin privileges for Windows 10
Ransomware: Is the party almost over for the cyber crooks?
CISA Adds Recent iOS, SonicWall Vulnerabilities to ‘Must Patch’ List
Iran-linked MuddyWater APT group campaign targets Turkish entities
iOS 15.4 Beta Suggests Apple to Support Push Notifications From Web-Based Apps
AI-powered anti-phishing solution provider Pixm offers last line of defense
State-sponsored Iranian hackers attack Turkish government, private organizations
Apple Trolls Spotify Over Neil Young
FBI: Olympic Athletes Should Leave Devices at Home
Data Leak Exposes IDs of Airport Security Workers
Iranian Hackers Using New PowerShell Backdoor in Cyber Espionage Attacks
Tripwire Patch Priority Index for January 2022
‘White Tur’ Hacking Group Borrows Techniques From Multiple APTs
Telehealth: A New Frontier in Medicine—and Security
14 Best Gaming Laptops Under $1000 2022 – Reviews & Buying Guide
During a Live Stream Ceremony, the Nobel Foundation Disclosed a DDoS attack
Cyber Attack: North Korea Suffers Internet Outage
Making Progress Securing Our Nation’s Water Supply
Russia’s naval exercise near Ireland unlikely to involve cable-tapping shenanigans
Ukraine Continues to Face Cyber Espionage Attacks from Russian Hackers
Apple Offering $25 Extra Credit During Apple Watch Trade-In in Celebration of Heart Month
Looking for adding new detection technologies in your security products?
Reasons Why Every Business is a Target of DDoS Attacks
7 Best Gaming PC under $500 That Can Run Any Game 2022 – Prebuild
Ransomware Groups are Enlisting Breached Individuals to Persuade Firms to Pay Up
Researchers Uncover New Iranian Hacking Campaign Targeting Turkish Users
Review: Group-IB Threat Intelligence & Attribution (TI&A)
Podcast Episode: Saving Podcasts from a Patent Troll
Home Affairs singles out Meta as most reluctant to stop online abuse
How ready are federal agencies for zero trust implementation?
New SureMDM Vulnerabilities Could Expose Companies to Supply Chain Attacks
RCE in WordPress plugin Essential Addons for Elementor impacts hundreds of thousands of websites
Top attack trends every organization should build resilience against
Microsoft stops 3.7 Tbps DDoS Cyber Attack in history
Cengage to acquire Cybersecurity training company InfoSec
North Korean Hacker Group Deliver KONNI Rat Malware Using Weaponized Office Document
Understaffing persistently impacting enterprise privacy teams
Organizations neglecting Microsoft 365 cybersecurity features
Armor Unlocks the Constraints Companies Face with Traditional Cybersecurity Providers
Verimatrix Key Shield Wins Cybersecurity Excellence Award
REGISTER TODAY FOR THE (ISC)² ENTRY-LEVEL CYBERSECURITY CERTIFICATION PILOT EXAM
How can home security be improved with IoT?
New Samba Bug Allows Remote Attackers to Execute Arbitrary Code as Root
Infosec products of the month: January 2022
IoT in smart cities market to reach $132.2 billion by 2026
Imperva is on Top of the World as it Announces New PoP in Bogotá
eBook: Anomaly Detection in Cybersecurity for Dummies
Quantum Star Technologies Starpoint detects zero-day threats at the binary level
Magnet AUTOMATE Enterprise provides parallel processing of multiple target endpoints
Google Removed Fake Authenticator App From Play Store That Dropped Vultur Malware
New Phishing Campaign Delivers AsyncRAT Malware
Google Launched Differential Privacy Tool for Python Developers
UK NCSC Rolls Out SME NMAP Scripts To Detect Vulnerabilities
FBI urges athletes to keep personal devices at home, use burners during Beijing Winter Olympics
Apple Targeting Indie Director Over ‘Apple-Man’ Film Title Trademark
Researchers develop automated approach to extract security policies from software
SoftBank-backed Cybereason reportedly files confidential paperwork to go public
Apple, SonicWall, Internet Explorer vulnerabilities added to CISA list
How to tell if your phone has been hacked
Vista and Evergreen to acquire Citrix for $16.5 billion
Updates released for multiple vulnerabilities found in 42 Gears’ SureMDM products
Vulnerability Summary for the Week of January 24, 2022
What Hackers Know About Your Software Supply Chain (That You Don’t)
CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit
Free cybersecurity tools for state, local governments
IaC security options help reduce software development risk
Mandiant: One in 7 Ransomware Extortion Attacks Expose OT Data
Security Service Edge Boosters Form New Forum to Encourage Adoption
Vulnerability Summary for the Week of January 24, 2022
Wasabi opens Paris storage region to enhance the availability of its services
BigBear.ai appoints Carla Fitzgerald as CMO
SaaS Security Guide: How to Protect Your SaaS Business
3 Ways to Save Incident Response Time
State Department confirms ‘defect’ led to resolved global IT outage
Edge, public cloud, security drive network transformation
IT Security News Monthly Summary – February
IT Security News Daily Summary 2022-01-31
2022-01-27 – Contact Forms Campaign IcedID (Bokbot) with Cobalt Strike
Getting facial recognition right
No, a researcher didn’t find Olympics app spying on you
Labor Department announces grants for states to expand UI access
No-cost cybersecurity tools for state, local governments
Include defensive security in your cybersecurity strategy
How to prepare for malicious insider threats
Aggressive BlackCat Ransomware on the Rise
BlackBerry Agrees to Sell Legacy Patents for $600M
Samba fixed CVE-2021-44142 remote code execution flaw
Popular Browser Game ‘Wordle’ Sold to The New York Times, Will Remain Free ‘Initially’
DIU boasts more rapid acquisition agreements, fewer transitioned tech in 2021
Dashburgh: Pittsburgh’s open data portal
Public Exploit Released for Windows 10 Bug
2022-01-27 – Contact Forms Campaign IcedID (Bokbot) with Cobalt Strike
Getting facial recognition right
Facebook Messenger Will Now Notify You If Someone Screenshots Your Disappearing Message
CISA adds 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog
Sports Scores and Favorite Team Selection Likely Coming to Apple News App
Apple TV+ Subscribers Who Join for Major Releases Like ‘Greyhound’ Don’t Stick Around
No, a researcher didn’t find Olympics app spying on you
Phishing Campaign Registers Attacker’s Device With Victim Network
Apple Stops Providing EarPods With iPhones Sold in France
IG report points to weaknesses in the Commerce Department’s infosec program
Cengage to Buy Cybersecurity Training platform, Infosec
Hundreds of thousands of routers exposed to Eternal Silence campaign via UPnP
Mini-LED iMac Pro to Launch in Mid-2022, Not Expected at Spring Event
Deals: Apple’s M1 iMac (8-Core GPU, 256GB) Drops to New Low of $1,349.99 in Several Colors
Top 9 Best Laptop for Adobe Creative Cloud 2022 – Photoshop, Illustrator
Security giant exposed 3TB of sensitive airport & employees data
Apple Pays $100.5K Bug Bounty for Mac Webcam Hack
Cyber Insights 2022: Improving Criminal Sophistication
Conti Ransomware Targets Taiwanese Apple and Tesla Supplier Delta Electronics
Zscaler CEO: Network security firms have ‘hijacked’ zero trust
The deadline is here for federal contractors to start paying at least $15 an hour
OT Data Stolen by Ransomware Gangs Can Facilitate Cyber-Physical Attacks
8 best practices for blockchain security
Emsisoft releases DeadBolt ransomware decryption tool
Website operator fined for using Google Fonts “the cloudy way”
Aussie Tech Entrepreneur Extradited Over SMS Fraud
iMac Pro to Launch in Mid-2022, Not Expected at Spring Event
Prepublication Review and the Quicksand Foundation of Snepp
An Important Development in the Law of Diplomatic Appointments
The top reasons countries ask Google to remove content
NSO Group Pegasus Spyware Aims at Finnish Diplomats
Prison for Dark Overlord Collaborator
Apple Patched Two Zero-Day Bugs And Other Flaws With iOS 15.3, Safari 15.3
This Phishing Attack Meddles With Your Emails – Alerts Microsoft
Cyberattacks Increasingly Hobble Pandemic-Weary US Schools
Some iPhone Users Experiencing Issues With Apple Card Payments
How a few PhD students revealed that phishing trainings might just not work: Lock and Code S03E03
Top-Ranking Banking Trojan Ramnit Out to Steal Payment Card Data
Enabling Zero Trust with Azure network security services
Multilingual Cybersecurity Awareness Training adapted for your needs
French Court Upholds 100m Euro Fine On Google Over Cookies
Looking Back at Rumors of iPhone X Design With Rear Touch ID That Never Emerged
Cyber attacks at an all time high for UK corps
North Korean Hackers Abuse Windows Update Client in Attacks on Defense Industry
7 Privacy Tips for Security Pros
Your Graphics Card Fingerprint Can Be Used to Track Your Activities Across the Web
Curated, tested and supported: How enterprise vendors mitigate open source supply chain risk
Unsecured AWS Server Exposed 3TB In Airport Employee Records
What To Do To Delete The Scary Amount Of Data Google Has On You
Smart-Chain Financial Site Qubit Hacked For $80 Million
Top US Spy Warns Too Many Government Secrets Harms National Security
Lazarus APT Cell Exploits the Windows Update Client
What data does Google store about you
Healthcare and the increasing importance of cybersecurity
PwnKit Linux Vulnerability Discovered And Fixed After 12 Years
New LockBit Ransomware Variant Evolves To Target Linux Systems
Your device’s GPU may be used for fingerprinting purposes
MoD Reported 7 Serious Data Losses To ICO
Silicon In Focus Podcast: Content Enablement
Funny and malicious server banners
Why Local Governments Remain at Risk of Cyber Crime
DARPA phase 2 of project targeting ‘quantum advantage’
Unsecured AWS server exposed 3TB in airport employee records
Ransomware: Over half of attacks are targeting these three industries
More Russian Attacks Against Ukraine Come to Light
The Looming CISO Mental Health Crisis — and What to Do About It, Part 2
Privacy And You: Take A Step Forward On Data Privacy Day
DARPA phase 2 of project targeting ‘quantum advantage’
Ransomware: Over half of attacks are targeting these three industries
The Zero Trust Timer Is on for Federal Agencies — How Ready Are They?
Hackers stole $80M worth of cryptocurrency from the Qubit DeFi platform
Deals: Get the 32GB Apple TV 4K for $159.99 ($19 Off)
Natural Silk Fibers Used by Researchers to Generate Secure Keys
9 Best Gaming Mouse Under $50 2022 – For Fortnite, CS:GO
Healthcare and the increasing importance of cybersecurity
MoD Reported 7 Serious Data Losses To ICO
Funny and malicious server banners
Why Local Governments Remain at Risk of Cyber Crime
More Russian Attacks Against Ukraine Come to Light
Crypto Agility: Solving for the Inevitable
DeepDotWeb admin sentenced to 97 months in prison for money laundering scheme
Microsoft OneDrive for macOS Local Privilege Escalation
Privacy And You: Take A Step Forward On Data Privacy Day
$770 Million Lost from Social Media Fraud Surge
PwnKit Linux Vulnerability Discovered And Fixed After 12 Years
New LockBit Ransomware Variant Evolves To Target Linux Systems
Your device’s GPU may be used for fingerprinting purposes
Unsecured AWS server exposed 3TB in airport employee records
The Looming CISO Mental Health Crisis — and What to Do About It, Part 2
Deals: iPad Air Drops to All-Time Low Price of $499.99 ($99 Off)
Apple Watch Getting New Activity Challenge for Heart Month
FAA Agrees To Switch On More 5G Towers And Masts
SureMDM Vulnerabilities Exposed Companies to Supply Chain Attacks
The Third Building Block for the SOC of the Future: Balanced Automation
HOW TO BECOME AN (ISC)² VOLUNTEER AND MAKE A DIFFERENCE IN THE CYBERSECURITY COMMUNITY
Microsoft: Here’s how we stopped the biggest ever DDoS attack
Expert earned $100,500 bounty to hack Apple MacBook webcam and microphone
Finnish Diplomats Targeted by Pegasus Spyware: Ministry
CISA’s ‘Must Patch’ List Puts Spotlight on Vulnerability Management Processes
$2m Bug Bountry offered to Hackers
Actor’s verified Twitter profile hijacked to spam NFT giveaways
How to Make Your Smartphone Secure with These 7 Apps
North Korean Hackers Leverages Windows Update Client to Execute Malicious Payload
A week in security (January 24 – 30)
Putin Orders New System To Ban ‘Toxic’ Internet Content
Crypto Finance Firm Offers $2m Bug Bounty to Hackers
US Revokes China Unicom’s License
Attackers are Using Shipment-Delivery Scams to Lure Victims to Install Trickbot
10K Victims Infested via Google Play 2FA App Loaded with Banking Trojan
Russia Recorded the Largest Botnet Attack on Retail
Priti Patel Approves Extradition Of Autonomy Founder Mike Lynch
QNAP Ransomware: Thousands Infected with DeadBolt
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of January 24, 2022
Why Do Many CISOs Prefer Incident Response over Threat Prevention?
Protecting Networks From Future Attacks | Avast
German Court Rules Websites Embedding Google Fonts Violates GDPR
Trying to register your antivirus in Windows Security Center?
China Unicom Latest To Be Banned Over National Security
Americans lost $770 million from social media fraud in 2021, FTC reports