IT Security News Weekly Summary – Week 21

1 year ago 72
BOOK THIS SPACE FOR AD
ARTICLE AD

IT Security News Daily Summary 2022-05-29

3 most common — and dangerous — holes in companies’ cyber defenses

Pro-Russian hacker group KillNet plans to attack Italy on May 30

Report: Facebook Profited Off Ads Promoting White Supremacist Content

SQL Injection & the BillQuick Attack: Best Practices to Protect your Org

Securing the data ecosystem

Expanding U.S. Counterterrorism in Somalia Is Necessary but Insufficient

New Variant of Magniber Ransomware is Targeting Windows 11 Users

Security Affairs newsletter Round 367 by Pierluigi Paganini

US man sentenced to 4 years in prison for his role in Infraud scheme

Hacker Steals Database of Verizon Employees

Facebook :”Is that you?” 500,000 People Were Victims of this Phishing Scam

New Snake Keylogger Campaign Drops Malware Via Malicious PDF Files

The Future of MFA

Yik Yak Anonymous Message Platform Had An Information Disclosure Bug

Week in review: Account pre-hijacking, Sigstore, ransomware still winning

Calling All College Women: Exabeam Announces Third-annual Cybersecurity Scholarship Program

Stories from the SOC – Persistent malware

MGM Resorts (2022 Update) – 24,842,001 breached accounts

Weekly Update 297

Abhishek Priya joins Hypernet Labs as VP of Engineering

DocuSign expands its leadership team with new appointments

IT Security News Daily Summary 2022-05-28

ChromeLoader Malware Hijacks Chrome Browser via Malicious Extension

Sophos MTR to Compete in 2022 ‘ASTORS’ Homeland Security Awards

Threats in the shadows: Combatting RF attacks with geofencing

Meet “ZTNA Anywhere,” Powered by Genians #1 Proven NAC, at RSAC 2022

How to stay ahead of the Cybersecurity labor crisis and keep growing your business

Experts believe that Russian Gamaredon APT could fuel a new round of DDoS attacks

The strange link between Industrial Spy and the Cuba ransomware operation

New York Man Sentenced to 4 Years in Transnational Cybercrime Scheme

Critical OAS Bugs Open Industrial Systems to Takeover

Reuters: Russia-linked APT behind Brexit leak website

DuckDuckGo Isn’t as Private as You Think

Million Times Downloaded Android Apps Exposed to High-severity Vulnerabilities

GitHub: Nearly 100,000 NPM Users’ credentials stolen in the April OAuth token attack

Suspected Phishing Email Fraudster Arrested in Nigeria

Over 467 Apps Hit by the ERMAC 2.0 Android Banking Trojan

Microsoft Finds Critical Bugs in Pre-Installed Apps on Millions of Android Devices

Strategy to Implementation with the Zero Trust Advisory Service

Sourcepass Names New Chief Information Security Officer

Rapidly evolving IoT malware EnemyBot now targeting Content Management System servers and Android devices

Cybersecurity: A global problem that requires a global answer

Scams targeting NFT investors – Week in security with Tony Anscombe

Laird Connectivity releases Summit Suite to simplify the process of protecting devices

Microchip introduces Arm Cortex-M23 based microcontroller

How to implement AWS Sustainability Pillar principles

10 Application Security Best Practices To Follow In 2022

Optiv appoints Josh Locker as EVP of Sales

Stolen university credentials up for sale by Russian crooks, FBI warns

Kroll expands recovery service for clients to manage vulnerabilities in their security posture

Android pre-installed apps are affected by high-severity vulnerabilities

IT Security News Daily Summary 2022-05-27

Zoom Flaws Can Be Exploited By Hackers by Sending Specially Crafted Messages

Space Force Expands Cyber Defense Operations

Exposed Kubernetes Clusters, Kubelet Ports Can Be Abused in Cyberattacks

Massachusetts’ Highest Court Upholds Cell Tower Dump Warrant

This Mental Health Awareness Month, take care of your cybersecurity staff

DevSecOps glossary: 24 terms security professionals need to know

New Open-source Security Initiative Aimed at Supply Chain Attacks

From ITops to NoOps: Automox CEO on why organizations need to rethink the concept of automation

DevSecOps glossary: 24 terms for security professionals

Defense against file-based malware

New York to battle senior loneliness with robot companions

DevSecOps glossary: Important terms for security professionals

Cloud security unicorn cuts 20% of staff after raising $1.3b

What are the security risks of open sourcing the Twitter algorithm?

Talos names eight deadly sins in widely used industrial software

Exploitation of VMware Vulnerability Imminent Following Release of PoC

Microsoft Finds Major Security Flaws in Pre-Installed Android Apps

CISA Publishes 5G Security Evaluation Process Plan

Scammer Behind $568M International Cybercrime Syndicate Gets 4 Years

The Effects of Digital Transnational Repression and the Responsibility of Host States

Patent Troll Uses Ridiculous “People Finder” Patent to Sue Small Dating Companies

Roadside objects can trick driverless cars

New Chaos Malware Variant Ditches Wiper for Encryption

Personal Data of More than 142 million MGM Hotel Customers Leaked on Telegram

Millions of Loan Applicant’s Data is Leaked via an Anonymous Server

Members Worldwide Gather at 55th General Meeting of the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) in London to Address Current and Emerging Issues in Messaging, Malware and Cybersecurity

Microsoft is rolling out these security settings to protect millions of accounts. Here’s what’s changing

12 most in-demand cybersecurity jobs in 2022

Twitter to Pay $150m Fine to Resolve Data Privacy Violations

Experts Detail New RCE Vulnerability Affecting Google Chrome Dev Channel

Android apps with millions of downloads exposed to high-severity vulnerabilities

UK populace should know about Ofgem Phishing Attacks

Russian Hackers Believed to Be Behind Leak of Hard Brexit Plans

ChromeLoader Malware Hijacks Browsers With ISO Files

Nearly 100,000 NPM Users’ Credentials Stolen in GitHub OAuth Breach

Malware Uses PowerShell To Inject Malicious Extension Into Chrome

GitHub Saved Plaintext Passwords Of npm Users In Log Files, Post Mortem Reveals

Critical Flaws In Popular ICS Platform Can Trigger RCE

Surveillance Tech Didn’t Stop The Uvalde Massacre

Companies need to get rid of legacy security systems, says Zscaler CEO Jay Chaudhry

Hottest cybersecurity jobs

How Secure Is Video Conferencing?

CISA adds 75 actively exploited bugs to its must-patch list in just a week

GhostTouch: how to remotely control touchscreens with EMI

Join Our #BetheResource Challenge

AI and machine learning are improving weather forecasts, but they won’t replace human experts

‘Psychological and Emotional War’: The Effects of Digital Transnational Repression and the Responsibility of Host States

Microsoft Executive Indicates Departmental Hiring Slowdown

Physical Security Teams’ Impact Is Far-Reaching

Toward error-free quantum computing

There are systems ‘guarding’ your data in cyberspace – but who is guarding the guards?

Critical Microsoft vulnerabilities decreased 47% in 2021

The Myths of Ransomware Attacks and How To Mitigate Risk

FBI: Compromised US academic credentials available on various cybercrime forums

Threat Hunting Journal May 2022 Edition

Shareholders Sue Twitter, Elon Musk For Stock ‘Manipulation’

Ownership Of The API Security Lifecycle

Microsoft is rolling out these security settings to protect millions of accounts. Here’s what’s changing

What Do Those Pesky ‘Cookie Preferences’ Pop-Ups Really Mean?

Attackers Can Use Electromagnetic Signals to Control Touchscreens Remotely

What & Who You Know: How to get a job in cybersecurity with no experience

Black Hat Asia 2022 Continued: Cisco Secure Integrations

Zyxel Issued a Security Warning

Twitter fined $150M after using 2FA phone numbers for marketing

GitHub saved plaintext passwords of npm users in log files, post mortem reveals

Programming languages: How Google is improving C++ memory safety

S3 Ep84: Government demand, Mozilla velocity, and Clearview fine [Podcast]

Survey Evidences Leaders Lack Confidence in Cyber-Risk Management

UK Government Seeks Views to Bolster the Nation’s Data Security

Google Announces New Chrome and Chrome OS Security Features for Enterprises

FBI: Higher Education Credentials Sold on Cybercrime Forums

Taking the Danger Out of IT/OT Convergence

Firefox, Thunderbird, receive patches for critical security issues

This Windows malware uses PowerShell to inject malicious extension into Chrome

The IaC Showdown: Terraform vs. Ansible

Trofi Security Defends U.S. Memorial Museum’s Priceless Assets with Check Point

Critical Flaws in Popular ICS Platform Can Trigger RCE

Hundreds Stranded After Ransomware Attack on Indian Airline

Google Faces Second UK Probe Over Ad Practices

Zyxel Issues Patches for 4 New Flaws Affecting AP, API Controller, and Firewall Devices

Drones And the Battlefield

Privileged Access Management as a Key Technology for Critical Environments

NCSC Report Reveals Phishing Lures Increasingly Disguised as Vaccine Appointments

ERMAC 2.0 Android Banking Trojan targets over 400 apps

Ed tech illegally tracked school children during pandemic

Oil and gas companies take cyber resilience pledge

TSP preps for its transition to a new service provider

IT threat evolution in Q1 2022. Non-mobile statistics

IT threat evolution Q1 2022

IT threat evolution in Q1 2022. Mobile statistics

Let’s play everyone’s favorite game: REvil? Or Not REvil?

Pre-Hijacking Attacks on Social Media Accounts | Avast

Zyxel Issues Patches for 4 New Flaws Affecting AP, API Controller and Firewall Devices

Singapore touts need for AI transparency in launch of test toolkit

Ransomware news headlines trending on Google

Twitter to pay $150m penalty for user data protection failure

NRO finalizes imagery contract worth ‘billions of dollars’

Experts released PoC exploit code for critical VMware CVE-2022-22972 flaw

Ed tech wrongfully tracked school children during pandemic: Human Rights Watch

ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit

Popular Python and PHP LIbraries Hijacked to Steal AWS Keys

HHS establishes Advanced Research Projects Agency for Health

New infosec products of the week: May 27, 2022

SentinelOne Global Culture Named To Leading Workplaces Lists

MDT Credit Unions Live with DeepTarget Integration into Jack Henry’s Banno Digital Platform

Security Compass Releases Report: 2022 Application Security in the Mid-Market

SCYTHE Names Webster as Director of Federal Research & Development

OT Network Defenders Experience SynSaber’s ICS Visibility & Detection Software at RSAC

Meta updates privacy policy with more detail about what data it collects

How to eliminate the weak link in public cloud-based multi-party computation

What is keeping automotive software developers up at night?

China offering ten nations help to run their cyber-defenses and networks

80% of consumers prefer ID verification when selecting online brands

Sungard AS Cyber Incident Recovery strengthens customers’ ability to recover data after a cyberattack

LiveAction announces long-term behavioral analytics capabilities in its ThreatEye NV platform

Hunters SOC Platform enhancements enable users to prioritize incidents based on their urgency

Entrust CloudControl 6.5 improves enterprise security and control for multi-cloud deployments

Corelight Investigator allows security teams to accelerate their threat hunting and investigations

Alteryx Designer-FIPS automates analytic insights and operational processes for government agencies

Uptycs enhances container and Kubernetes capabilities to minimize risk for security teams

USB Device Redux, with Timelines

How to reprogram Apple AirTags, play custom sounds

CyberPeace Institute and Partisia Blockchain protect humanitarian organizations against cyber threats

Linksys announces new series of WiFi 6 mesh solutions for all at-home needs

Samsung partners with Red Hat to develop next-generation memory-related software

Weaveworks integrates with Microsoft to increase developer productivity

SOOS collaborates with CircleCI to help developers identify and remediate open source vulnerabilities

ChromeLoader Browser Malware Spreading Via Pirated Games and QR Codes

Ransomware encrypts files, demands three good deeds to restore data

Report: Healthcare industry remains top target for cyberattacks

Michael Orozco joins MorganFranklin Consulting as Managing Director and Advisory Services Leader

Aviatrix appoints Michael Welts as CMO

Ravi Kumaraswami joins Riskified as President of Worldwide Field Operations

Microsoft Unveils Dev Box, a Workstation-as-a-Service

Broadcom Snaps Up VMware in $61B Deal

Avocado Systems hires James Sortino as CRO

U.S. Senate report calls out lack of ransomware reporting

The Legal Challenges Presented by Seizing Frozen Russian Assets

IT Security News Daily Summary 2022-05-26

Best File & Disk Encryption Tools for Linux

Maryland launches Mobile ID for Apple Wallet

How GDPR Is Failing

Why it’s hard to sanction ransomware groups

Broadcom’s play to acquire VMware could strengthen its enterprise focus

Fake Windows exploits target infosec community with Cobalt Strike

UK privacy watchdog fines Clearview AI £7.5m and orders UK data to be deleted

Cheers ransomware hits VMware ESXi systems

Crypto Scammers Exploit: Elon Musk Speaks on Cryptocurrency

Agencies aren’t hitting disconnection targets under EIS

Third-Party Scripts on Websites Present a ‘Broad & Open’ Attack Vector

Lacework Announces Layoffs, Restructuring

Exposed: the threat actors who are poisoning Facebook

How ‘cultural artifacts’ impede DOD’s ability to go big on AI

The infrastructure buildout will be paperless

How to encrypt your email and why you should

Twitter fined $150M for misusing 2FA data

Hacktivists Expanding DDoS Attacks as Part of International Cyber Warfare Strategy

Zyxel addresses four flaws affecting APs, AP controllers, and firewalls

How to Make Your Phone Impossible to Track: 11 Strategies for Privacy

UK Begins National Security Probe Of Altice’s Stake In BT

Wristband tracks firefighters’ chemical exposure

Enterprise data is like air: Here’s how you can secure it

Twitter Fined $150M for Security Data Misuse

Cybercrime Syndicate Leader Behind Phishing and BEC Scams Arrested in Nigeria

The Influence of VPN on Software Development

Black Basta Besting Your Network?

Facebook Updates Its Privacy Policy And Releases New Tools

Google Urged to Stop Tracking Location Data Ahead of Roe Reversal

The Chatter Podcast: The Movie “Casablanca” in Myth and Reality with Meredith Hindley

Retrofitting Temporal Memory Safety on C++

Cybersecurity is a corporate social responsibility, especially in times of war

Why government should do more to drive down the cost of prison calls

11th Circuit’s Ruling to Uphold Injunction Against Florida’s Social Media Law is a Win Amid a Growing Pack of Bad Online Speech Bills

Cyber Risk Management Strategies from Arjo CIO

Elon Musk Raises His Contribution To Twitter Acquisition

Biden’s executive order on policing could help spur local reforms

Google is adding these IT security integrations to Chrome

The FDA’s New Cybersecurity Guidance for Medical Devices Reminds Us That Safety & Security Go Hand in Hand

California Bill Would Make New Broadband Networks More Expensive

Ransomware Attack Disrupt the Operations of SpiceJet Flight

Detecting Phishing Emails with Email Headers, Attachments, and URLs

Spain to Tighten Control Over Secret Services After Spying Scandal

India’s SpiceJet Strands Planes After Being Hit By Ransomware Attack

Report Explores Child’s Data Safety Legislation Across 50 Countries

Salt Security Helps bpLaunchpad Reimagine energy by Enabling API Based Innovation

Best way to write a resume for cybersecurity roles

Global oil companies take Cyber Resilience Pledge

Google releases new data controls for Chrome browser and OS

SYN Ventures Closes $300M Fund for Cybersecurity Bets

Drupal Releases Security Updates

Hacker Steals Database Of Hundreds Of Verizon Employees

Some QCT Servers Vulnerable To Pantsdown Flaw

Twitter Fined $150m For Handing Users’ Contact Details To Advertisers

Suspected Phishing Email Crime Boss Cuffed In Nigeria

Hacker Steals $1.4 Million In NFTs From Collector In One Sweep

When Blockchain Companies Get Hacked

Ways to protect your intellectual property in 2022

Broadcom Confirms VMware Acquisition For $61 Billion

The Benefits of Bug Bounty Programs

Cloud Security Firm Lacework Lays Off 20% of Workforce

Drupal Releases Security Updates

8 ways to avoid NFT scams

Experts warn of a new malvertising campaign spreading the ChromeLoader

Security Orchestration Automation and Response (SOAR) Basics: Definition, Components, and Best Practices

Greg Johnson to Take Reins as McAfee CEO

VMware to Absorb Broadcom Security Solutions Following $61 Billion Deal

Big Cyber Hits on GM, Chicago Public Schools, & Zola Showcase the Password Problem

CISA and DoD Release 5G Security Evaluation Process Investigation Study

Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report

Ransomware demands acts of kindness to get your files back

Campaigners warn of legal challenge against Privacy Shield enhancements

Old Python package comes back to life and delivers malicious payload

Quanta Servers Caught With Pantsdown BMC Vulnerability

Act Now: Leveraging PCI Compliance to Improve Security

Big Hits on GM, Chicago Public Schools, & Zola Showcase the Password Problem

CISA and DoD Release 5G Security Evaluation Process Investigation Study

The Evolving Face of Cyber Conflict and International Law: A Futurespective

Nuclear Brinkmanship: U.S. Sanctions Against Iran Explained

Broadcom to acquire VMware for $61 billion in cash and stock

Tesla Researchers Tout 100 Year Battery Design

What Is a CSRF Token?

Some QCT servers vulnerable to ‘Pantsdown’ flaw say security researchers

How to stop spam messages on your iPhone with this almost-secret hidden switch

QCT Servers Affected by ‘Pantsdown’ BMC Vulnerability

Critical ‘Pantsdown’ BMC Vulnerability Affects QCT Servers Used in Data Centers

Comment: DuckDuckgo Browser Allows Microsoft Trackers Due To Search Agreement

Microsoft Defender vs Trellix: EDR software comparison

‘Pantsdown’ BMC vulnerability still present in Quanta servers

Who’s watching your webcam? The Screencastify Chrome extension story…

The 2022 Verizon Data Breach Investigations Report (DBIR) Is Out

How Software Architects Can Manage Technical Debt in a Microservice Architecture

Time to update: Google Chrome 102 arrives with 32 security fixes, one critical

NordLayer makes it easy for businesses to add VPN technology to remote workers

18 Oil and Gas Companies Take Cyber Resilience Pledge

Most Common Threats in DBIR

Black Hat Asia 2022: Building the Network

Broadcom to acquire VMware for $61 billion in a cash and stock deal

ChromeLoader targets Chrome Browser users with malicious ISO files

Managed detection and response in 2021

Malware-Infested Smart Card Reader

Twitter Fined $150 Million For Sharing User Telephone Numbers

Microsoft: Here’s how to defend Windows against these new privilege escalation attacks

Critical Vulnerabilities Found in Open Automation Software Platform

The Mystery of China’s Sudden Warnings About US Hackers

Experts Warn of Rise in ChromeLoader Malware Hijacking Users’ Browsers

GM, Zola customer accounts compromised through credential stuffing

A New Ransomware Variant Dubbed ‘Cheers’ Was Discovered

Buy these software stocks as cyberattacks climb, Stephens says

The Difference Between a Vulnerability Assessment and Penetration Testing

The Added Dangers Privileged Accounts Pose to Your Active Directory

Hackers Increasingly Using Browser Automation Frameworks for Malicious Activities

What Are the Benefits of Hiring Professional Essay Writing Help

Watch out! Tinder and Grinder users targeted by cruel scammers using real abuse photos

Country Extortion: Ransomware expands business to include the government sector

Cybergang Claims REvil is Back, Executes DDoS Attacks

Enjoy greater online freedom with Atlas VPN

Multi-Continental Operation Leads to Arrest of Cybercrime Gang Leader

‘How Are They Weapons? That’s Only a Flashlight!’

Do not use Tails OS until a flaw in the bundled Tor Browser will be fixed

Security pros believe cybersecurity strategies will soon be obsolete

Verizon: Ransomware sees biggest jump in five years

Chinese Acquisition Of Newport Wafer Fab Under National Security Review

Three-quarters of Security Pros Believe Current Cybersecurity Strategies Will Shortly Be Obsolete

Insider threats caused 68% of legal sector breaches

If you get an email saying “Item stopped due to unpaid customs fee”, it’s a fake

Tails OS Users Advised Not to Use Tor Browser Until Critical Firefox Bugs are Patched

Italy announced its National Cybersecurity Strategy 2022/26

Microsoft: Credit Card Stealers are Switching Tactics to Conceal the Attack

Using Blatant Code, a New Nokoyawa Variant Sneaks up on Peers

Ellie’s Data Auction – Intego Mac Podcast Episode 241

State of Cybersecurity Report 2022 Names Ransomware and Nation-State Attacks As Biggest Threats

How is AI Being Put to Good Use in the Gambling Industry

Smart Locks Provide Security and Enhanced Accessibility in One Package

Twitter Fined $150 Million for Misusing Users’ Data for Advertising Without Consent

Hijacking of popular ctx and phpass packages reveals open source security gaps

When it comes to remote work, 71% of IT leaders say security is the main challenge

Suspected phishing email crime boss cuffed in Nigeria

XONA raises $7.2 million to provide secure remote access control systems for critical infrastructure

Ex-spymaster and fellow Brexiteers’ emails leaked by suspected Russian op

Sigstore: Signature verification for protection against supply chain attacks

Russian Ransomware hackers getting frustrated by sanctions

Samsung introduced Knox Guard for Enterprise Mobile Security

Encryption: How It Works, Types, and the Quantum Future

Review: Hornetsecurity 365 Total Protection Enterprise Backup

Ransomware grounds some flights at Indian budget airline SpiceJet

Pentera Named ‘Most Promising Unicorn’ Award Finalist by SC Media

New OneStream Research Finds Economic Disruption Poses Largest Threat to Business in 2022

You Can Join the (ISC)² Board of Directors

Why are current cybersecurity incident response efforts failing?

Most organizations do not follow data backup best practices

A Problem Like API Security: How Attackers Hack Authentication

How confident are companies in managing their current threat exposure?

YouTube remains in Russia to be an independent news source: CEO

Interpol Arrests Leader of SilverTerrier Cybercrime Gang Behind BEC Attacks

Onfido Real Identity Platform enhancements optimize user experience for organizations

Netenrich Resolution Intelligence platform allows analysts to view security status of critical assets

OneTrust Trust Intelligence Platform enables organizations to build trust in enterprise environments

Thales releases CipherTrust Tokenization to protect data in numerous SAP applications

Twitter to Pay $150M Penalty Over Privacy of Users’ Data

ServiceNow introduces Procurement Service Management to improve procurement processes

Preen.Me – 236,105 breached accounts

Food For Files: GoodWill Ransomware demands food for the poor to decrypt locked files

Oracle selects Palo Alto Networks to protect their cloud applications and data against emerging threats

BlackBerry partners with NXP Semiconductors to help companies prepare for post-quantum cyber attacks

Amart Furniture – 108,940 breached accounts

Millions of people’s info stolen from MGM Resorts dumped on Telegram for free

Semperis raises over $200 million to drive innovation in the identity system defense market

Hornetsecurity acquires IT-Seal to add security training services to its portfolio

Unknown APT group is targeting Russian government entities

Greg Johnson joins McAfee as President and CEO

Redpoint Global promotes Ron Sanderson to CISO

LogicMonitor appoints Nitin Navare as CTO

WhiteSource rebrands as Mend to focus on the prevention of application security issues

Binary Defense names Bob Meindl as CEO

Feds say Twitter used contact info collected for security purposes to target ads

IT Security News Daily Summary 2022-05-25

Graduation dashboard shows how education spending pays off

Visualizing vulnerability: County maps show areas of greatest need

App eases public transit for blind riders

$756M still left in TMF

Nava looks to APIs to standardize federated benefits programs

Hearing examines human side of telecom bills

When self-driving cars crash, who’s responsible? Courts and insurers need to know what’s inside the ‘black box’

Forescout Launches Forescout Frontline to Help Organizations Tackle Ransomware and Real Time Threats

Detecting and preventing privilege escalation attacks leveraging Kerberos relaying (KrbRelayUp)

Interpol’s Massive ‘Operation Delilah’ Nabs BEC Bigwig

Is Your Data Security Living on the Edge?

Amazon Drivers Risk Increasing Number Of Injuries

Seven Tips for Protecting Your Internet-Connected Healthcare Devices

Advancing our Secure Home Platform with DNS over HTTPS

Corelight Announces New SaaS Platform for Threat Hunting

Qualys to Unveil VMDR 2.0 at Qualys Security Conference in San Francisco

Mastercard Launches Cybersecurity “Experience Centre”

JFrog Launches Project Pyrsia to Help Prevent Software Supply Chain Attacks

Is Your Email Security Built to Withstand Determined Intruders?

Federal call center workers strike over pay, healthcare costs

Brexit Leak Site Linked to Russian Hackers

Meet the 10 Finalists in the RSA Conference Innovation Sandbox

Vishing Attacks Reach All Time High, According to Latest Agari and PhishLabs Report

Cybersecurity-Focused SYN Ventures Closes $300 Million Fund II

Eerie GoodWill ransomware forces victims to publish videos of good deeds on social media

The state of the GDPR in 2022: why so many orgs are still struggling

Internationa police operation led to the arrest of the SilverTerrier gang leader

The State of Identity at Work: What IT Leaders Need to Know

WhiteSource, now Mend, unveils automated remediation to reduce app security burden

DuckDuckGo Allows Microsoft Trackers Despite No Tracking Policy – Researcher

IDS & IPS Remain Important Even as Other Tools Add IDPS Features

Bad Bots and the Commoditization of Online Fraud

MSSP’s Mitigation Responsibilities Against Ransomware

Agencies lack data on ransomware payments

OT Remote Access Firm Xona Raises $7.2 Million in Series A Funding

Prepare for deepfake phishing attacks in the enterprise

Verizon DBIR: Stolen credentials led to nearly 50% of attacks

How Policymakers Can Build a Better Doomsday Clock

Expert Comment: CISA Adds 41 Vulnerabilities To Catalogue Of Exploited Flaws

Developers targeted by poisoned Python library

CLOP Ransomware Activity Spiked in April

Spring Cleaning Checklist for Keeping Your Devices Safe at Work

Platform Liability Trends Around the Globe: Taxonomy and Tools of Intermediary Liability

HOT CYBERSECURITY TECHNOLOGIES

Veteran Cybersecurity Expert, Michael Orozco Joins MorganFranklin Consulting

Suspicious behavior: OTX Indicator of Compromise – Detection & response

What to look for in a vCISO as a service

Nokia CEO Predicts 2030 Arrival For 6G, But Not On Smartphone

Biden administration official offers tips for tapping broadband funds

Organizations Urged to Fix 41 Vulnerabilities Added to CISA’s Catalog of Exploited Flaws

CISA Adds 34 Known Exploited Vulnerabilities to Catalog

Google Releases Security Updates for Chrome

How Cisco Duo Is Simplifying Secure Access for Organizations Around the World

Secure communication with light particles

Eerie GoodWill ransomware forces victims to publish videos of “good” deeds on social media

In record year for vulnerabilities, Microsoft actually had fewer

Complete Guide to Keylogging in Linux: Part 1

CISA Adds 34 Known Exploited Vulnerabilities to Catalog

Google Releases Security Updates for Chrome

The Verizon 2022 DBIR

Massive increase in XorDDoS Linux malware in last six months

Vehicle owner data exposed in GM credential stuffing attack

PayPal Bug Enables Attackers to Exfiltrate Cash from Users’ Account

Protecting Consumer IoT Devices from Cyberattacks

Ransomware Attack disrupts airlines services of Spice Jet

How to Find a Vulnerability in a Website

Alleged Cybercrime Ringleader Arrested in Nigeria

Manipulating Machine-Learning Systems through the Order of the Training Data

Part 1: Historic To 2022 – The Threat Of Malevolence

Mark Zuckerberg Sued By DC AG Over Cambridge Analytica Scandal

Tidelift Raises $27 Million to Tackle Open Source Supply Chain Security

Tapping Neurodiverse Candidates Can Address Cybersecurity Skills Shortage

Webinar Today: Missing Links for Managing OT Cyber Risk

USB Devices Redux

Microsoft Warned That Hackers Are Using More Advanced Techniques to Steal Credit Card Data

How license plate scanners challenge our data privacy

Data on ransomware attacks is ‘fragmented and incomplete’ warns Senate report

5 reasons why GDPR was a milestone for data protection

Interpol Arrest Leader of SilverTerrier Cybercrime Gang Behind BEC Attacks

When Do We Call Russia’s Atrocities a Genocide?

Supply Chain Risk Management (SCRM) Explained

8 things you need to know about cloud-native applications

Multiple Vulnerabilities In Facebook Could Allow Account Takeover

Top 5 Benefits of Office 365 Advanced Threat Protection

Web scraping: What is it and why is it needed?

How to develop competency in cyber threat intelligence capabilities

WhiteSource Becomes Mend, Adds Automatic Code Remediation

Industry 4.0 Points Up Need for Improved Security for Manufacturers

Lumos System Can Find Hidden Cameras and IoT Devices in Your Airbnb or Hotel Room

Top 6 Awwwards Websites and Tools They Are Built With

New Linux-Based Ransomware ‘Cheerscrypt’ Targets EXSi Devices

Samsung To Create 80,000 New Jobs, Plans $356 Billion Investment

Pro-Iran Group ALtahrea Hits Port of London Website by DDoS Attack

Microsoft research reveals the changing face of skimming campaigns

AMD unveils Epyc confidential computing on Google cloud

Report: Average time to detect and contain a breach is 287 days

Verizon Report: Ransomware, Human Error Among Top Security Risks

Zoom Patches ‘Zero-Click’ RCE Bug

Link Found Connecting Chaos, Onyx and Yashma Ransomware

Is REvil having a resurgence, or is there a copycat hacking group?

Chrome 102 Patches 32 Vulnerabilities

Notorious Vietnamese Hacker Turns Government Cyber Agent

Two Cybersecurity Companies Offering Free Risk Assessments

UK Government Cybersecurity Advisory Board Applications Now Open

Messages Sent Through Zoom Can Expose People to Cyber-Attack

DBIR Makes a Case for Passwordless

‘Tough to Forge’ Digital Driver’s Licenses Are—Yep—Easy to Forge

Learn How Hackers Can Hijack Your Online Accounts Even Before You Create Them

How Secrets Lurking in Source Code Lead to Major Breaches

Revisiting the Session: The Potential for Shared Signals

Chaining Zoom bugs is possible to hack users in a chat by sending them a message

Zoom Patches XMPP Vulnerability Chain That Could Lead To Remote Code Execution

Quad Nations Pledge Deeper Collaboration On Infosec And More

Beijing Needs The Ability To Destroy Starlink, Say Chinese Researchers

Web App Attacks On The Rise In Healthcare

2022 Verizon Data Breach Investigations Report, Cyber Security Experts Reactions

SpiceJet Suffers Ransomware Attack

More and More Companies Are Getting Hit with Ransomware [2021-2022]

How the Saitama backdoor uses DNS tunnelling

Beijing needs the ability to ‘destroy’ Starlink, say Chinese researchers

(ISC)2 Supports Members with Thoughtful Response to SEC Proposed Rule on Cybersecurity Reporting

Cybersecurity for banks – How Global Banks enable the secure remote workforce

Google Discloses Details of Zoom Zero-Click Remote Code Execution Exploit

GoodWill Ransomware Demands People Help the Most Vulnerable

EUS Car Giant General Motors Hit By Credential Stuffing Attack

Privacy focused browser allows Microsoft trackers

Update now! Multiple vulnerabilities patched in Google Chrome

Silicon UK In Focus Podcast: The Future of SaaS

Global Digital Tax Law Not Ready Until 2024, Says OECD

Trend Micro Patches Vulnerability Exploited by Chinese Cyberspies

[Template] Incident Response for Management Presentation

Researchers Find New Malware Attacks Targeting Russian Government Entities

What’s wrong with automotive mobile apps?

US government lacks ransomware data

Ethical AI – How is AI Redefining the Insurance Industry?

Cybersecurity’s New Frontier: Space

Hacking The Cybersecurity Field: How To Get Into Cyber As A Young Adult

Small Businesses Remain Vulnerable, With Rising Cyberattacks

Running to the Cloud: Why Enterprise Companies Need a Cloud-based Payroll

68% of Legal Sector Data Breaches Caused by Insider Threats

Proton Is Trying to Become Google—Without Your Data

Verizon 2022 DBIR: External attacks and ransomware reign

Goodbye cookies, hello digital fingerprints

Spain Approves $13.1bn To Attract Chip Sector Investment

SpiceJet Suffered a Ransomware Attack

CISA adds 41 flaws to its Known Exploited Vulnerabilities Catalog

How CISOs are adjusting in the wake of two years of pandemic disruption

What is threat hunting?

Quad nations pledge deeper collaboration on infosec, data-sharing, and more

7 ways to protect your network from wardriving attacks

About half of popular websites tested found vulnerable to account pre-hijacking

Indian stock markets given ten day deadline to file infosec report, secure board signoff

Over 380 000 Kubernetes API Servers are Exposed to a Range of Attacks

Oracle bolsters its Cloud Security capabilities

IBM takes initiative to improve Ransomware Protection in Public Schools

Detecting and Responding to a Ransomware Attack

Threat Intelligence: The Key to Higher Security Operation Performance

New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message

Where is attack surface management headed?

How to navigate GDPR complexity

ISACA Helps Enterprises Navigate China’s Personal Information Protection Law in New Resource

How to counter smart home device breaches

How to Prevent Burnout Among Cybersecurity Professionals Before, During and After a Breach

Building trust in a Zero-Trust security environment

Stories from the SOC – Command and Control

Elevation of Privilege is the #1 Microsoft vulnerability category

Can we trust the cybersecurity of the energy sector?

How Can OEMs Reduce Their Risk of Cyberattacks?

Keeping pace with emerging threats: The roundup

HYAS Confront uncovers anomalies hiding in the production network

Zoom patches XMPP vulnerability chain that could lead to remote code execution

XM Cyber announces new capability to detect exposures in Microsoft Active Directory

Zilla Universal Sync allows enterprises to integrate any cloud platform or application without security API support

PIXM Mobile provides real-time protection from phishing attacks on mobile devices

FortiNDR identifies cyberattacks based on anomalous network activity and limits threat exposure

Forescout Frontline helps organizations tackle ransomware and real time threats

F5 NGINX for Microsoft Azure enables enterprises to extend workloads to the cloud

Oracle expands cloud security capabilities to help customers protect their applications and data

Censornet introduces integrated IDaaS to enhance context-based security

SafeGuard Cyber adds email protection for Microsoft 365 to defend customers against sophisticated attacks

Thales Cinterion MV32 modem card enables manufacturers to build high-performance 5G devices

Astadia FastTrack Factory accelerates mainframe migration projects for enterprises

Wendy’s – 52,485 breached accounts

Broadcom Software Shows How the Cyber Defence Centre Will Help in 2022

Predator spyware sold with Chrome, Android zero-day exploits to monitor targets

NightDragon partners with Coalfire to accelerate portfolio compliance and cybersecurity readiness

Arcanna.ai collaborates with MNEMO to drive security operations using AI/ML

Poisoned Python and PHP packages purloin passwords for AWS access

Tidelift raises $27 million to improve open source software supply chain security

Clearwater acquires CynergisTek to address growing cybersecurity and compliance needs

T-Mobile and Ericsson join forces to bring 5G network solutions to enterprises

‘There’s No Ceiling’: Ransomware’s Alarming Growth Signals a New Era, Verizon DBIR Finds

LambdaTest hires Maneesh Sharma as COO

John Vecchi joins Phosphorus Cybersecurity as CMO

PKWARE promotes Matt Zomboracz to CFO

NYC rips out last pay phones

IBM amnnounces multi-million dollar in-kind grants to help schools fight off cyberattacks

Tanium’s free risk assessment provides customers with a complete view of their risk posture

CoreStack appoints Robert Ford as VP of Enterprise Strategy

Kellie Snyder joins Onapsis as Chief Customer Officer

The Navy has saved $150 million by consolidating IT systems, official says

Microsoft Elevation-of-Privilege Vulnerabilities Spiked Again in 2021

Patch now: Zoom chat messages can infect PCs, Macs, phones with malware

IT Security News Daily Summary 2022-05-24

Is it really technology that makes a city smart?

MFA technology is rapidly evolving — are mandates next?

New Attack Shows Weaponized PDF Files Remain a Threat

Get More from Your Cybersecurity Spend When Inflation Rates Climb

Netskope releases new data loss prevention solution

DeFi Is Getting Pummeled by Cybercriminals

OneTrust releases ‘first’ trust intelligence platform for compliance

142 Million MGM Resorts Records Leaked on Telegram for Free Download

New Connecticut Privacy Law Makes Path to Compliance More Complex

Emulating impossible ‘unipolar’ laser pulses paves the way for processing quantum information

Voice phishing attacks reach all-time high

As remote work persists, cities struggle to adapt

Video: Fireside Chat With Shane Huntley, Director at Google’s Threat Analysis Group

XM Cyber Adds New Security Capability for Microsoft Active Directory

Trend Micro addressed a flaw exploited by China-linked Moshen Dragon APT

DOD to debut virtual desktops for certain highly classified programs

Strong Password Policy Isn’t Enough, Study Shows

Safeguarding Android Users From Zero-Day Attacks

Bad Bot Traffic is Significantly Contributing to Rise of Online Scam

PDF Smuggles Microsoft Word Doc to Deliever Snake Keylogger Malware

Swagger UI Library Vulnerability Potentially Affects Multiple Services

2022-05-23 – IcedID infection with DarkVNC traffic

This crafty tool can eavesdrop on 6G wireless signals

Zuckerberg Sued By DC Attorney General Over Cambridge Analytica Data Scandal

GDPR Anniversary, Expert Insight On What Lead To GDPR Fines

Chicago Public Schools Data Breach – Expert Comments

Facial Recognition Company Clearview Ai Fined £7.5m For Illegally Using Images Of Brits Scraped From Online

The 8 Design Principles Of A Zero Trust Network

Why do hackers keep coming back to attack you? Because they can

Organizations are More Susceptible to Known Vulnerabilities in Comparison to Zero-Day Flaw

Ransomware Attacks Increasing at “Alarming” Rate

Senate Report: US Government Lacks Comprehensive Data on Ransomware

New Statistics Confirm the Continuing Decline in the Use of National Surveillance Authorities

Opportunity to Reform the Department of Homeland Security’s Biodefense Operations and Governance

CCSP Exam – Many Changes on the Way!

Morse Code: How did it change communication?

How DNS filtering can help protect your business from Cybersecurity threats

Cybersecurity and resilience: board-level issues

Facebook opens political ad data vaults to researchers

Netskope Expands Data Protection Capabilities to Endpoint Devices and Private Apps

How to Develop Machine Learning Skills for Every Employee in Your Company

Cyber Attack on General Motors exposes customer details

Personal Data of Tens of Millions of Russians and Ukrainians Exposed Online

How to create a Docker secret and use it to deploy a service

Crypto Hacks Aren’t a Niche Concern; They Impact Wider Society

Nisos Announces $15 Million in Series B Funding Round

CISA Adds 20 Known Exploited Vulnerabilities to Catalog

Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys

PyPI Served Malicious Version of Popular ‘Ctx’ Python Package

CISA Adds 20 Known Exploited Vulnerabilities to Catalog

These are the flaws that let hackers attack blockchain and DeFi projects

Semperis Banks $200 Million to Scale Enterprise ID Protection Tech

What Is Ping of Death?

Instagram verification services: What are the dangers?

A favorite of cybercriminals and nation states, ransomware incidents increase again

LimaCharlie Banks $5.45 Million in Seed Funding

Red Access Raises $6 Million for Secure Browsing Tech

BNP Paribas Joins JP Morgan Blockchain Trading Network

How to Analyze Phishing Email Files

Cybersecurity Tips for a Safer Vacation

Fronton IOT Botnet Packs Disinformation Punch

Account pre-hijacking attacks possible on many online services

Tidelift raises $27M to secure open-source supply chain

Hackers Can ‘Pre-Hijack’ Online Accounts Before They Are Created by Users

Microsoft warns of new highly evasive web skimming campaigns

The Incredible Shrinking FISA: CY 2021 Statistics Confirm the Continuing Decline in the Use of National Surveillance Authorities

Introducing Autocomplete for VirusTotal Intelligence queries

SEC Held Off Elon Musk Enforcement ‘Due To Court Fears’

General Motors suffers credential stuffing attack

New Chaos Ransomware Builder Variant “Yashma” Discovered in the Wild

SIM-based Authentication Aims to Transform Device Binding Security to End Phishing

Anonymous Declares Cyber-War On Pro-Russian Hacker Gang Killnet

GDPR Anniversay, Expert Insight On What Lead To GDPR Fines

Tidelift raises $27M to secure open source supply chain

Snap Earnings Warning Triggers Tech Sell-Off

Microsoft: Credit card skimmers are switching techniques to hide their attacks

Cabinet Office Reports 800 Missing Electronic Devices in Three Years

Open Source Intelligence May Be Changing Old-School War

Malware Analysis: Trickbot

The Justice Department Will No Longer Charge Security Researchers with Criminal Hacking

The Fault in Our kubelets: Analyzing the Security of Publicly Exposed Kubernetes Clusters

Russian Operator Discounts Smartphones As Sanctions Bite

Twisted Panda: Chinese APT Launch Spy Operation Against Russian Defence Institutes

Cybersecurity Community Warned of Fake PoC Exploits Delivering Malware

Conti Ransomware Operation Shut Down After Splitting into Smaller Groups

RansomHouse: Bug bounty hunters gone rogue?

China lashes out at US-led Asia-Pacific trade framework

This era of big tech exceptionalism has got to end: Australian eSafety Commissioner

IBM is helping these schools build up their ransomware defenses

SolarWinds: Here’s how we’re building everything around this new cybersecurity strategy

Conti Ransomware Gang Shut Down After Splitting into Smaller Groups

Cyberattack on General Motors exposes customer data

It’s 2022 and there are still malware-laden PDFs in emails exploiting bugs from 2017

Clearview AI Fined £7.5m Over Facial Recognition Data

US Car Giant General Motors Hit by Cyber-Attack Exposing Car Owners’ Personal Info

Microsoft Warns of Web Skimmers Mimicking Google Analytics and Meta Pixel Code

Clearview AI fined £7.5m for harvesting data

GM Credential Stuffing Attack Reveals Automobile Owners’ Details

This Malware-spreading PDF Uses a Clever File Name to Fool the Unsuspecting Victims

Zero-day vulnerabilities in Chrome and Android exploited by commercial spyware

ICO Fines Clearview AI £7.5m for Collecting UK Citizens’ Data

The Surveillance State Is Primed for Criminalized Abortion

Nation-state malware could become a commodity on dark web soon, Interpol warns

Pre-hijacking Attacks of user accounts are on the rise

Airbnb To Pull Out Of China Amidst ‘Pandemic Challenges’

Unknown APT group has targeted Russia repeatedly since Ukraine invasion

Crypto Investor Arrested After Visiting Home Of TerraUSD Founder

Since organizations apply more compliance programs, proper planning is essential

Paying ransom doesn’t guarantee data recovery

Tips to defeat social engineering attacks

Can digital identity help with the world refugee crisis?

Podcast Episode: Securing the Vote

Beware of New Campaign that Delivers Sophisticated Malware Through PDF Files

Taking the right approach to data extortion

SirHurt – 90,655 breached accounts

Russia-linked Turla APT targets Austria, Estonia, and NATO platform

What does prioritizing cybersecurity at the leadership level entail?

(ISC)² Advocates for Membership – Shares Opinions on Proposed UK Standards and Pathway

Stories from the SOC – Persistent malware

Cyber Attack news headlines trending on Google

Conti Ransomware to shut down and come rebranded into multiple groups

Biden launches Indo-Pacific economic framework to counter China

Vishing cases reach all time high

How Secure is the Bitcoin Blockchain?

Key findings from the DBIR: The most common paths to enterprise estates

Verizon DBIR: Ransomware dominated threat landscape in 2021

Paying the ransom is not a good recovery strategy

Fanpass – 112,251 breached accounts

How confident are CISOs about their security posture?

CyberCube increases analytical flexibility with Portfolio Manager v4.0

Why it’s hard to sanction ransomware groups

Broadcom’s play to acquire VMware could strengthen its enterprise focus

Fake Windows exploits target infosec community with Cobalt Strike

UK privacy watchdog fines Clearview AI £7.5m and orders UK data to be deleted

DC Sues Zuckerberg Over Cambridge Analytica Privacy Breach

Eseye Infinity empowers customers to scale and evolve their IoT deployment

Kingston Digital releases external SSD with touch-screen and hardware-encryption

UK Businesses ‘Falling Behind Europe’ On AI Adoption

Screencastify fixes bug that would have let rogue websites spy on webcams

Noname Security partners with BlueFort Security to offer proactive API security

YouAttest collaborates with JumpCloud to give users access reviews for identity governance

Jungle Disk acquires ElephantDrive to extend its suite of cloud backup offerings

Data Brokers and True the Vote are the Real Villains of “2000 Mules” Movie

New Research Paper: Pre-hijacking Attacks on Web User Accounts

Authentication considerations for state and local governments

DirectDefense hires Jared Ballou as VP of Business Development

SEON appoints PJ Rohall as Head of Fraud Strategy & Education

Complete Guide to Keylogging in Linux: Part 1>

An uncomplicated introduction to Uncomplicated Firewall

signNow vs Citrix RightSignature: Electronic signature software comparison

Erez Naveh joins Bright Data as VP of Product

OneSpan appoints Michael Klieman as CPO

How to Optimize Your Database Storage in MySQL

IT Security News Daily Summary 2022-05-23

$13.5M in new TMF awards to NARA, USDA

Veeam data protection aids users with secure restores

Malicious Python Repository Package Drops Cobalt Strike on Windows, macOS & Linux Systems

Multiple Governments Buying Android Zero-Days for Spying: Google

AdvIntel: Conti rebranding as several new ransomware groups

USPS Plans to Close More Facilities and Repurpose Those That Remain

RSA Conference 2022: Adjusting to ongoing transformation

EFF to Court: California Law Does Not Bar Content Moderation on Social Media

DOD isn’t meeting some of the cybersecurity standards it set for contractors

Facebook Algorithm Reveals A Lot Of Spam In Top Shared Links

EFF Opposes Anti-Fiber, Anti-Affordability Legislation in California That Will Raise Prices on Middle Income Users

Common NFT scams and how to avoid them

DDoS attacks decreased in 2021, still above pre-pandemic levels

Linux Trojan XorDdos Attacks Surge, Targeting Cloud, IoT

Anatomy of a DDoS amplification attack

Anonymous Declares Cyber War Against Pro-Russia Hacker Group Killnet

Recovering from ransomware attacks starts with better endpoint security

Why the Employee Experience Is Cyber Resilience

New DeadBolt Ransomware Attacks Have Been Reported by QNAP

Labor Department wants to staff up worker protection agencies

Russia-linked Fronton botnet could run disinformation campaigns

How to improve risk management using Zero Trust architecture

Nearly Half of Security Enterprises Store Passwords in Office Documents

UK’s Most Innovative Cyber SME 2022 Finalists Announced

Mark Zuckerberg Sued Over Cambridge Analytica Data Breach

Russian Sberbank: Facing Massive Waves of DDoS Attacks

How to stay ahead of the Cybersecurity labor crisis and keep growing your business

Experts highlight how automated decision-making can violate GDPR

CISA Adds 21 Known Exploited Vulnerabilities to Catalog

Mozilla Releases Security Products for Multiple Firefox Products

Is the United States Totalitarian?

Does American Law Currently Authorize the President to Seize Sovereign Russian Assets?

Military-made cyberweapons could soon become available on the dark web, Interpol warns

I think there are more cyber attacks to come, says Palo Alto Networks CEO

Beneath the surface: Uncovering the shift in web skimming

Ransomware Attack Leads to a data breach at Chicago Public Schools

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of May 16, 2022

CISA Adds 21 Known Exploited Vulnerabilities to Catalog

Mozilla Releases Security Products for Multiple Firefox Products

Become a Cybersecurity Hero: An Interview with a White Hat Hacker

Yes, Containers Are Terrific, But Watch the Security Risks

(ISC)2 certification counts – how many CSSLP are out there?

Hunting down your data with Whitney Merrill: Lock and Code S03E11

Report: 654 Cybersecurity Startups Raised VC Funding in 2020 and 2021, Only 22 Are Led by Women CEOs

Valeo Networks Acquires Next I.T.

This malware-spreading PDF uses a sneaky file name to trick the unwary

New phishing technique lures users with fake chatbot

Kingston Digital Releases Touch-Screen Hardware-Encrypted External SSD for Data Protection

Automating firewall configuration with RHEL System Roles

Navigating The Cyber Arms Race, Expert Weighs In

Deep Fakes of Elon Musk Promote BitVex Fraud

Rivian Eyes Profitability Amidst Market Pressure

How to Respond to Non-Malicious Data Breaches

Conti Ransomware Operation Shut Down After Brand Becomes Toxic

After the Okta Breach, Diversify Your Sources of Truth

A flaw in PayPal can allow attackers to steal money from users’ account

On Increased Cyber Attack Risk

The Shield Of Identity-first Security

Chicago students lose data to ransomware attackers

Multiple Vulnerabilities Found In Jupiter WordPress Theme

Protection Tips: How to Prevent Phone Hacking

My Instagram account was hacked and two-factor authentication didn’t help

Facial Recognition Firm Clearview AI Fined $9.4 Million by UK Regulator

Clearview AI face-matching service fined a lot less than expected

Experts highlight how automated decision making can violate the GDPR

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

Snake Keylogger Spreads Through Malicious PDFs

Journey Into Cybersecurity – Conversations with Cyber Newcomers, Part 1

New York Comptroller Calls For Votes Against Twitter, Meta Directors

Predator Spyware Using Zero-day to Target Android Devices

Over $1.1 Million Awarded at Pwn2Own Vancouver 2022 for 25 Zero-Day Vulnerabilities

Davos Forum Sees Major Influx Of Crypto Firms

How GDPR Is Failing

500,000 Chicago Students’ Data Exposed in Ransomware Attack

Update now! Nvidia released fixes for 10 flaws in Windows GPU drivers

New Unpatched Bug Could Let Attackers Steal Money from PayPal Users

Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns

ISaPWN – research on the security of ISaGRAF Runtime

Top 5 Data Integration Challenges and Ways to Navigate them

Top financial scams: Imposter scams, romance scams, and prizes

Cisco Warns of Exploitation Attempts Targeting New IOS XR Vulnerability

A week in security (May 16 – 22)

Has the UK government been hacked

Ericsson, Deutsche Telekom Test Wind Power For 5G Site

Ransomware Hackers Steal Personal Data of 500,000 Students and Staff in Chicago

Chinese hackers caught spying on Russian defence institutes

Cloudflare joins EU Cloud Code of Conduct, the path to trusted cloud services

Broadcom ‘In Talks’ To Acquire VMware

IBM Dives Into TrickBot Gang’s Malware Crypting Operation

PayPal Pays a Hacker $200,000 for Discovering ‘One-Click-Hack’ Vulnerability

Cytrox’s Predator spyware used zero-day exploits in 3 campaigns

Cryptocurrency scammers use Elon Musk deep fake

Hackers Distribute Vidar Malware By Tricking Users with Fake Windows 11 Downloads

Anonymous Declares Cyber-War on Pro-Russian Hacker Gang Killnet

WhatsApp Adds Customised Business Chats

8 Reasons Manpower Tracking Is Important In Construction

Top Tips for Businesses to Increase Operational Efficiency

Should the FDA have done more months ago about an impending baby formula shortage?

Regulatory Compliance in the Cloud: What you Need to Know

How to find NPM dependencies vulnerable to account hijacking

Threat actors target the infoSec community with fake PoC exploits

Microsoft sounds the alarm on — wait for it — a Linux botnet

Chinese “Twisted Panda” Hackers Caught Spying on Russian Defense Institutes

You should be able to trust organizations that handle your personal data

South Korean and US presidents gang up on North Korea’s cyber-offensives

Kaspersky confirms SMBs are sureshot targets for Hackers

Goodwill Ransomware making victims donate to poor

3 key elements to protect a Kubernetes cluster

Ransomware still winning: Average ransom demand jumped by 45%

The Best Cyber Security Jobs in The UK According to Data

Why And How to Eliminate Security’s Biggest Blind Spot: Transport Layer Security (TLS)

By streamlining compliance, companies can focus more on security

Why the Cybersecurity Industry Needs to Change Its Siloed Perception

#TripwireBookClub – Go H*ck Yourself

Security has become more difficult, IT leaders say

Breach Exposed Data of Half-Million Chicago Students, Staff

Misinformation needs tackling and it would help if politicians stopped muddying the water

IT Security News Weekly Summary – Week 20

IT Security News Daily Summary 2022-05-22

Web Tracker Caught Intercepting Online Forms Even Before Users Hit Submit

New MITRE Framework For Supply Chain Security

Global Food Supply Chain Threatened By Hackers

Evasive Bots Driving Online Fraud: 2022 Report

Conti Ransomware Shuts Down Operation, Rebrands Into Smaller Units

Ubuntu Desktop & Windows 11 Hacked – Pwn2Own Day 3

Security Affairs newsletter Round 366 by Pierluigi Paganini

Dragos CEO Robert M. Lee to Address Global Audience on Criticality of Industrial Cybersecurity at the World Economic Forum Annual Meeting in Davos, Switzerland

Evolv Technology Appoints New Chief Financial Officer

Socure Reports Hypergrowth with 236% Increase in Customers, Rapid Scale Across web3, Online Gaming, FinTech, Marketplaces, and Public Sector

NATO Must Get Resilience Right to Withstand Russia and China

North Korea-linked Lazarus APT uses Log4J to target VMware servers

Even When Switched Off, iPhones are Vulnerable to Attack

Microsoft Reveals Massive Surge in XorDdos Attacks on Linux Devices

How to Limit Who Can Contact You on Facebook

Media giant Nikkei Suffers Ransomware Attack

Mozilla Releases Firefox 100.0.2 With Critical Security Fixes

The Pwn2Own Vancouver 2022: Trend Micro and ZDI awarded $1,155,000

Week in review: VMware critical fixes, Bluetooth LE flaw unlocks cars, Kali Linux 2022.2

Read Entire Article