Category: daily summary

IT Security News Daily Summary 2023-07-07

Truebot Malware Variants Abound, According to CISA Advisory Meta’s Rush to Topple Twitter Sets Up Looming Privacy Debate Friday Squid Blogging: Giant Squid Nebula A man has been charged with a cyber attack on the Discovery Bay water treatment facility…

IT Security News Daily Summary 2023-07-06

StackRot Linux Kernel Bug Has Exploit Code on the Way Microsoft puts out Outlook fire, says ‘everything’s fine’ with Teams malware flaw New court ruling may hinder federal information sharing efforts, experts warn CISA: Truebot malware infecting networks in U.S.,…

IT Security News Daily Summary 2023-07-05

Resource constraints led to EPA’s failure to address critical vulnerabilities in air and radiation data Thales: For Data Breaches, Cloud Assets are Biggest Cybersecurity Headache Wall Streets sees even more upside for these 2 tech names — and we agree…

IT Security News Daily Summary 2023-07-04

ChatGPT’s Bing Browsing Feature Disabled for Paywall Article Access Court Rules That Cops Must Get A Wiretap To Snoop On Facebook Posts Ghostscript bug could allow rogue documents to run system commands How to Boost Cybersecurity in Your E-commerce Business…

IT Security News Daily Summary 2023-07-03

Police Bust International Phone Scam Gang Targeting Elderly TechRepublic Premium Editorial Calendar: IT Policies, Checklists, Hiring Kits and Research for Download How to Add the Docker Scout Feature to the Docker CLI Researchers Develop Exploit Code for Critical Fortinet VPN…

IT Security News Daily Summary 2023-07-02

Security Affairs newsletter Round 426 by Pierluigi Paganini – International edition Kick: The New Streaming Platform Making Headlines Canadian Government Hit by Hackers 2,300,000,000,000 Times Last Year Operation Cookie Monster: FBI Seizes Genesis Market Involved in Identity Theft Google’s 6…

IT Security News Daily Summary 2023-07-01

Wagner Hackers Disrupt Russian Satellite Internet Provider LockBit gang demands a $70 million ransom to the semiconductor manufacturing giant TSMC Army Combat Veteran to Take Over Key Election Security Role Working With State, Local Officials Generative AI Projects Can Lead…

IT Security News Daily Summary 2023-06-30

Facebook Bans World Leader For Threats Of Violence External vs Internal Vulnerability Scans: Difference Explained EFF Urges Supreme Court to Make Clear That Government Officials Have First Amendment Obligations When They Use Their Social Media Accounts for Governmental Purposes Chip…

IT Security News Daily Summary 2023-06-29

2023-06-28 – IcedID (Bokbot) activity Democrats, civic tech orgs back IRS plans to pilot e-filing service Researchers Detail 4 SAP Bugs, Including Flaw in ABAP Kernel Apple Objects to UK Bill That Would Break Encrypted Messaging IEC Standardization Leaders Convene…

IT Security News Daily Summary 2023-06-28

Critical cyber threats persist on federal networks despite recent directives 6 Ways Cybersecurity is Gut-Checking the ChatGPT Frenzy State expands streamlined, automated licensing LetMeSpy Phone-Tracking App Hacked, Revealing User Data Submarine Cables Face Escalating Cybersecurity Threats, Report Congress must use…

IT Security News Daily Summary 2023-06-27

Multiagency plan aims to boost biotechnology workforce Flipper Zero hacking tool is a big hit Cops’ total pwnage of ‘secure’ EncroChat nets 6,500+ arrests, €740m in funds – so far House, Senate China hawks concerned White House will let TikTok…

IT Security News Daily Summary 2023-06-26

Legislation would expand and extend government’s counterdrone authority More than $42 billion in broadband funding allocations announced Boston looks to boost employee productivity with generative AI guidance How to use Tor browser (and why you should) Privacy-minded browser DuckDuckGo lands…

IT Security News Daily Summary 2023-06-25

A New Era Of Security: Are Passwords No Longer Fit For Purpose? The Role Of Impactful Penetration Testing Amid Rise Of AI-Powered Threat Actors How Can Manufacturers Stop Being The Top Target For Cyber Crime? Twitter hacker sentenced to five…

IT Security News Daily Summary 2023-06-24

DFIR Core Principles Someone is sending mysterious smartwatches to the US Military personnel Web Application Security: A 2023 Guide Android Users Beware: Glitch in 999 Call Feature Raises Concerns Remote Work and the Cloud Create Various Endpoint Security Challenges Malaysia…

IT Security News Daily Summary 2023-06-23

Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023 ITDR Combines and Refines Familiar Cybersecurity Approaches NSA: BlackLotus BootKit Patching Won’t Prevent Compromise House Oversight members want Login.gov documents outlining $187M modernization award Public transit systems remain…

IT Security News Daily Summary 2023-06-22

Dangerous driving, poorly designed roadways accelerate pedestrian traffic deaths Growing SaaS Usage Means Larger Attack Surface LockBit Developing Ransomware for Apple M1 Chips, Embedded Systems US ‘can’t PSA our way out’ of cyber vulnerability, CISA director says Australia gives Twitter…

IT Security News Daily Summary 2023-06-21

House panel zeros out TMF funding for 2024 fiscal year How a data-centric approach can lift agencies above the cybersecurity poverty line Apple just released iOS 16.5.1 with security fixes Ransomware Misconceptions Abound, to the Benefit of Attackers Avast, Norton…

IT Security News Daily Summary 2023-06-20

Passwords out, passkeys in: are you ready to make the switch? Netskope Enables Secure Enterprise Use of ChatGPT and Generative AI Applications Cymulate Announces Security Analytics for Continuous Threat Exposure Management eSentire’s AI Investigator Chatbot Aids Human Response to Security…

IT Security News Daily Summary 2023-06-19

Asus Patches Highly Critical WiFi Router Flaws Experts found components of a complex toolkit employed in macOS attacks Unlocking the Secrets of Smooth Domain Transfers: A Step-by-Step Guide These are the most hacked passwords. Is yours on the list? Cloud…

IT Security News Daily Summary 2023-06-18

Reddit Files: BlackCat/ALPHV ransomware gang claims to have stolen 80GB of data from Reddit How generative AI is creating new classes of security threats Companies Targeted by Clop Ransomware Gang Face Extortion of Stolen Data Ransomware Actors are Using Crypto…

IT Security News Daily Summary 2023-06-17

Zero Trust Framework: A Paradigm Shift in Identity Theft Prevention 11 Free and Affordable SaaS Tools to Set Up and Run Your Business Effectively Law enforcement shutdown a long-standing DDoS-for-hire service LockBit Digital Gang Named Top Ransomware Threat by World…

IT Security News Daily Summary 2023-06-16

19 Top Breach and Attack Simulation (BAS) Tools in 2023 Clop Hacking Rampage Hits US Agencies and Exposes Data of Millions Friday Squid Blogging: Squid Can Edit Their RNA Palo Alto is shifting into ‘its next gear of growth’, says…

IT Security News Daily Summary 2023-06-14

New report identifies over $100B in potential government services savings 2023-06-14 – 30 days of Formbook: Day 10, Wednesday 2023-06-14 – “J0C7” The Future of Cloud Security: Trends and Predictions DOD needs more diverse emerging tech investment, Democratic caucus argues…

IT Security News Daily Summary 2023-06-13

Spy agencies acquire commercial data with little coordination and few controls CISA’s new directive targets devices that can be configured over public internet VERT Threat Alert: June 2023 Patch Tuesday Analysis Cyberattacks surge to 61% of small and medium-sized businesses,…

IT Security News Daily Summary 2023-06-12

Facebook Accused Of Discrimination In Job Ads Around The World Use of Multifactor Authentication (MFA) Nearly Doubles Since 2020, Okta Secure Sign-in Trends Reports Finds Fortinet squashes hijack-my-VPN bug in FortiOS gear Use of Multi-Factor Authentication (MFA) Nearly Doubles Since…

IT Security News Daily Summary 2023-06-11

Why It Will Take Sophisticated AI Solutions to Fight AI Security Attacks 1020 Cyber Security Professionals’ Actions and Experiences When Applying for A New Role. Closing The Cyber Marketing Gap with Investors Unmasking the Multi-Stage AiTM Phishing and BEC Attack…

IT Security News Daily Summary 2023-06-10

Experts found new MOVEit Transfer SQL Injection flaws The University of Manchester suffered a cyber attack and suspects a data breach PoC Published for Windows Win32k Flaw Exploited in Assaults Atomic Wallet Hit by North Korean Hackers Neurotech: ICO Raises…

IT Security News Daily Summary 2023-06-09

Duo vs Microsoft Authenticator (2023): In-depth comparison Brand-New Security Bugs Affect All MOVEit Transfer Versions DOS Attacks Dominate, but System Intrusions Cause Most Pain Russians charged with hacking Mt. Gox exchange and operating BTC-e ‘Asylum Ambuscade’ Cyberattackers Blend Financial Heists…

IT Security News Daily Summary 2023-06-08

ChatGPT’s False Information Generation Enables Code Malware Security Headers is joining Probely! 🎉 Researchers published PoC exploit code for actively exploited Windows elevation of privilege issue Security Headers is joining Probely! 🎉 Barracuda tells its ESG owners to ‘immediately’ junk…

IT Security News Daily Summary 2023-06-07

Security Headers is joining Probely! 🎉 Cl0p Claims the MOVEit Attack; Here’s How The Gang Did It VMware fixes a command injection flaw CVE-2023-20887 in VMware Aria Operations for Networks Security Headers is joining Probely! 🎉 Stay Focused on What’s…

IT Security News Daily Summary 2023-06-06

2023-06-05 – 30 days of Formbook: Day 1, Monday 2023-06-05 – “HE2A” 2023-06-06 – 30 days of Formbook: Day 2, Tuesday 2023-06-06 – “CG62” How to Implement Istio in Multicloud and Multicluster ILTA and Conversant Group Release Cybersecurity Benchmarking Survey…

IT Security News Daily Summary 2023-06-05

Gigabyte Slams Backdoor Shut With Attack-Killing BIOS Update 2.5M Impacted by Enzo Biochem Data Leak After Ransomware Attack Microsoft Links MOVEit Attack to Cl0p as British Airways, BBC Fall Mental Health Charities Share Sensitive Data With Facebook JD Group –…

IT Security News Daily Summary 2023-06-04

Friday Squid Blogging: Squid Chromolithographs The Unintended Consequences of Netflix’s Password Sharing Ban Security Affairs newsletter Round 422 by Pierluigi Paganini – International edition Music Streaming Royalties To Be Examined by The UK Government Which Country Ranked the Highest in…

IT Security News Daily Summary 2023-06-03

Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech SAS Airlines Faces $3 Million Ransom Demand After DDoS Attacks Kimsuky APT poses as journalists and broadcast writers in its attacks Harvard Pilgrim Health Care Hit by Ransomware Attack Upsurge in…

IT Security News Daily Summary 2023-06-02

AI in the workplace: Local officials explore responsible use PyPI’s 2FA Requirements Don’t Go Far Enough, Researchers Say Cybersecurity standards gain ground in counties Kaspersky Reveals iPhones of Employees Infected with Spyware Agencies issue rule to ban TikTok on contractor…

IT Security News Daily Summary 2023-06-01

Cyversity and United Airlines to Provide Cybersecurity Training Scholarships to Cyversity Members DNB Strengthens its Network Security Posture and Productivity With Ericsson Security Manager Solution How To Reduce Cost Overruns For AI Implementation Projects New bill proposes ‘made in China’…

IT Security News Daily Summary 2023-05-31

Crypto Discord Communities Targeted by Malicious Bookmarks & JavaScript Never Use Credentials in a CI/CD Pipeline Again US deploys tech diplomacy to cultivate leadership in emerging fields DHS faces slow disaster response burdened by legacy systems, officials warn 8 best…

IT Security News Daily Summary 2023-05-30

Clean energy advancements hinge on steady funding, Energy official says Unmonitored networks put US nuclear arsenal at risk, GAO finds Windows 11: Enforcing password resets for local group users 421M Spyware Apps Downloaded Through Google Play Go Phish: How Attackers…

IT Security News Daily Summary 2023-05-29

Lockbit ransomware attack on MCNA Dental impacts 8.9M individuals GitLab Released Emergency Fix For Critical Vulnerability – Update Now! Android Phone Hacked by ‘Daam’ Virus, Government Warns Chinese-Sponsored Hacking Group Targeting Critical U.S. Infrastructure, Microsoft Claims The Media & Entertainment…

IT Security News Daily Summary 2023-05-28

Best Practices For Website Design In 2023 Industrial automation giant ABB disclosed data breach after ransomware attack What you need to know about the mindset and motivation of ethical hackers padre – Padding Oracle Attack Exploiter Tool OpenAI, the Maker…

IT Security News Daily Summary 2023-05-27

Is the BlackByte ransomware gang behind the City of Augusta attack? Stealing From Wallets to Browsers: Bandit Stealer Hits Windows Devices Safeguarding Your Data: 10 Best Practices to Prevent a Data Breach Man Accuses Facebook Of Censoring Harmless Religious Post…

IT Security News Daily Summary 2023-05-26

If Businesses Are To Get A Grip On Cybersecurity, They Need To Close Gender Gap 2 Lenses for Examining the Safety of Open Source Software US govt pushes spyware to other countries? Senator Wyden would like a word Gaming Firms…

IT Security News Daily Summary 2023-05-25

DHS’ cyber agency seeks small biz support for strategic planning Building better maps with open data on building heights Lazarus Group Striking Vulnerable Windows IIS Web Servers Chinese state-sponsored hackers infiltrated U.S. naval infrastructure, Secretary of the Navy says Spotted:…

IT Security News Daily Summary 2023-05-24

FDA seeks industry support to develop standardized data ‘supersets’ Netwrix Report: Enterprises Suffer More Ransomware and Other Malware Attacks Than Smaller Organizations Appdome Launches Build-to-Test, Automated Testing Option for Protected Mobile Apps Technology Veterans James Wickett and Ken Johnson Launch…

IT Security News Daily Summary 2023-05-23

Email Spoofing: What it Is & How to Prevent It SuperMailer Abuse Bypasses Email Security for Super-Sized Credential Theft Most Organizations Expect Ransomware Attack Within a Year 8 Data Anonymization Techniques to Safeguard User PII Data DOD aims to leverage…

IT Security News Daily Summary 2023-05-22

Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations PyPI Shuts Down Over the Weekend, Says Incident Was Overblown EFF to Court: California’s Public Records Law Must Remain a Check on Police Use of Drones Follow a 6-phase roadmap to…

IT Security News Daily Summary 2023-05-21

Guerilla Malware Shipped With Roughly 9 Million Android Devices How to Handle Secrets in Kubernetes The Infamous Cybercrime Marketplace Now Offers Pre-order Services for Stolen Credentials PyPI Repository temporarily suspends user sign-ups and package uploads due to ongoing attacks Malware…

IT Security News Daily Summary 2023-05-20

Royal Mail’s £1bn Losses: Strikes, Cyber Attack, and Online Shopping Crash 2021 data breach exposed data of 70 Million Luxottica customers Hackers and Cybercriminals Use Dark Web Data to Train DarkBert AI Balancing Industrial Secure Remote Access: Essentiality and Risk…

IT Security News Daily Summary 2023-05-19

When does an old iPhone become unsafe to use? OpenAI Launches ChatGPT App for iOS, Bolstering Accessibility and Safety Federal grants could boost whole-of-state cyber defense Russian IT guy sent to labor camp for DDoSing Kremlin websites Pentagon outlines upcoming…

IT Security News Daily Summary 2023-05-18

How To Check IP Addresses for Known Threats and Tor Exit Node Servers in Java Change Control Doesn’t Work: When Regulated DevOps Goes Wrong Should governments ban TikTok? Can they? KeePass 2.X Master Password Dumper allows retrieving the KeePass master…

IT Security News Daily Summary 2023-05-17

Unveiling the Power of Threat Models: Enhancing Cyber Intrusion Detection for Data Analysts IBM Security Guardium Ranked as a Leader in the Data Security Platforms Market ChatGPT can rapidly build solutions for network defense How the Wrong Content Type Introduced…

IT Security News Daily Summary 2023-05-16

The Intersection of Finance and Cybersecurity: A Closer Look at Prop Trading Firms Methods You Should Utilize When Hiring for a Tech Company Is the Internet of Things Putting Your Business at Risk?: Here’s What You Need to Know Tech…

IT Security News Daily Summary 2023-05-15

Novel Malware Strain, PIPEDREAM, Deployed by Russian-Linked Hackers Against US Energy Corporations VA seeks cyber operations help Lacework Appoints Lea Kissner As Chief Information Security Officer One city’s growing opioid crisis brings data-driven solutions to the front lines Housing authority…

IT Security News Daily Summary 2023-05-14

The latest variant of the RapperBot botnet adds cryptojacking capabilities XWorm Malware Exploits Critical Follina Vulnerability in New Attacks Hackers Come up With Innovative Methods to Enforce Ransomware Payment ChatGPT is about to revolutionize cybersecurity Capita warns customers to assume…

IT Security News Daily Summary 2023-05-13

Personal info of 90k hikers leaked by French tourism company La Malle Postale Data of more than 2M Toyota customers exposed in ten years-long data breach Mobility is a Necessity in Today’s Public Safety Software Environment ChatGPT and Data Privacy…

IT Security News Daily Summary 2023-05-12

WordPress Plugin Used in 1M+ Websites Patched to Close Critical Bug XWorm Malware Exploits Follina Vulnerability in New Wave of Attacks Leaked source code of Babuk ransomware used by 10 different ransomware families targeting VMware ESXi Ex-Ubiquiti dev jailed for…

IT Security News Daily Summary 2023-05-11

Plug-and-Play Microsoft 365 Phishing Tool ‘Democratizes’ Attack Campaigns Optimization model delivers faster emergency response CISA is growing up, CIO says Billy Corgan Paid Off Hacker Who Threatened to Leak New Smashing Pumpkins Songs GPT-3 Detected 213 Security Vulnerabilities… Or It…

IT Security News Daily Summary 2023-05-10

Tech subcommittee chairwoman plans MGT Act rewrite Lawmakers tackle VA pharmacy tech woes at hearing 5 SBOM tools to start securing the software supply chain CISOs face mounting pressures, expectations post-pandemic Global Research From Delinea Reveals That 61% of IT…

IT Security News Daily Summary 2023-05-09

With updated data profiles, opioid detectors ID latest drugs The best VPN services for iPhone and iPad in 2023 Privoro and Samsung Partner to Provide Trusted Control Over Smartphone Radios and Sensors Severe Ruckus RCE Flaws Utilized By Fresh DDoS…

IT Security News Daily Summary 2023-05-08

Bank Says That 80 Percent Of Its Fraud Cases Come From Meta Owned Sites Consilient Inc. and Harex InfoTech Partner to Fight Financial Crime in South Korea Palantir soars on earnings beat and prediction of full-year profitability Twitter admits ‘security…

IT Security News Daily Summary 2023-05-07

Global Ransomware Attack Targets VMware ESXi Servers San Bernardino County Sheriff’s Department paid a $1.1M ransom TikTok Tracked UK Journalist via her Cat’s Account Dragon Breath’s Latest Double-Clean-App Technique Targeting Gambling Industry This New Android FluHorse Malware Steals Passwords &…

IT Security News Daily Summary 2023-05-06

Twitter confirmed that a security incident publicly exposed Circle tweets DEF CON to set thousands of hackers loose on LLMs Online Predators Target Children’s Webcams, Study Finds FBI seized other domains used by the shadow eBook library Z-Library It’s 2023:…

IT Security News Daily Summary 2023-05-05

Friday Squid Blogging: “Mediterranean Beef Squid” Hoax It’s generative AI models vs. hackers at DEF CON’s AI Village Army wants help with safeguarding datasets for AI use Cloud move takes city’s GIS from rough to ready How local governments can…

IT Security News Daily Summary 2023-05-04

DISA wants to take Thunderdome pilot to full production in ’30 to 60 days,’ director says OneTrust Enhances Data Discovery and Governance by Introducing AI-Powered Document Classification InsightCyber Launches Platform to Provide Cyber Threat Management and Security to Global Critical…

IT Security News Daily Summary 2023-05-03

Secure SD-WAN Solution for Communication over Satellite and Networks in Adverse and DDIL Conditions Goodbye, old friend 👋🔒 Smarter local airports via digital twins Google Chrome Drops Browser Lock Icon Give NotPetya-hit Merck that $1.4B, appeals court tells insurers Goodbye,…

IT Security News Daily Summary 2023-05-02

Report: New Facebook Malware Campaign Infects Half A Million Users In Three Months PrivateGPT Tackles Sensitive Info in ChatGPT Prompts Unraveling the Mystery: What Did the Turbo Button Do on Old Computers? Apple, Google propose anti-stalking spec for Bluetooth tracker…

IT Security News Daily Summary 2023-05-01

Understanding and Minimizing the Security Risks of the Quantum Revolution in Computing DISA seeks toolkit to implement a key piece of its zero trust framework AI project targets hidden tax shelters Twitter turmoil prompts agencies to plan for social media…

IT Security News Daily Summary 2023-04-30

Crooks broke into AT&T email accounts to empty their cryptocurrency wallets The Evolving Threat From Terrorist Drones in Africa Enhance Employee Productivity by Adopting a Modern Approach to Password Security Complexity is Still the Enemy of Security Fake Reviews and…

IT Security News Daily Summary 2023-04-29

CyberSec Community Rolls Out ETHOS – An Open Early Warning System Apache Superset Shipped With Unpatched RCE Vulnerability Atomic macOS Stealer is advertised on Telegram for $1,000 per month The future of Red Hat security data Google Takes Down Cryptbot…

IT Security News Daily Summary 2023-04-28

Appeals Court Should Reconsider Letting The FBI Block Twitter’s Surveillance Transparency Report Cowen’s Shaul Eyal breaks down headwinds facing cybersecurity stocks EVs rev up cybersecurity challenges Patch Management vs Vulnerability Management: What’s the Difference? ‘BellaCiao’ Showcases How Iran’s Threat Groups…

IT Security News Daily Summary 2023-04-27

Critical VMware Vulnerabilities Let Attackers Execute Arbitrary Code Q1 marked lowest VC funding for security in a decade, but there’s a silver lining DHS R&D arm to drive climate change response under new bill City pilots sensors that track street…

IT Security News Daily Summary 2023-04-26

Maine Gets Another (Necessary) Opportunity to Defund Its Local Intelligence Fusion Center Et esse laboriosam At consequatur nemo eum quibusdam voluptatum? Accelerated FAA modernization will suffer under stopgap funding, says agency head Urban-rural collaborations help eliminate transit deserts and improve…

IT Security News Daily Summary 2023-04-25

Mobile device security policy Top 10 Cloud Access Security Broker (CASB) Solutions for 2023 ReliaQuest Adds AI Capabilities to GreyMatter Intelligent Analysis NetWitness Partners With Palo Alto Networks, Broadcom to Launch SASE Packet Integrations at RSA Conference 2023 Forcepoint Delivers…

IT Security News Daily Summary 2023-04-24

Analysis paralysis: When too much data reduces decision-making Security Experts Warn About New Scam Involving Hackers Who Impersonate Facebook California Bill to Stop Dragnet Surveillance of People Seeking Reproductive and Gender-Affirming Care Passes Key Committees ZScaler and Robrik CEOs on…

IT Security News Daily Summary 2023-04-23

Zero Trust Network for Microservices With Istio What is Single Sign-on (SSO) ? – Solution to Ensure Your Company Data Security Linux Malware Set to Be Deployed by North Korean APT Group Experts spotted first-ever crypto mining campaign leveraging Kubernetes…

IT Security News Daily Summary 2023-04-22

The Current State of Wireless (In)security, by Bastille CTO ChatGPT Can be Tricked To Write Malware When You Act as a Developer Mode CISA adds MinIO, PaperCut, and Chrome bugs to its Known Exploited Vulnerabilities catalog DNS Malware Toolkit Discovered…

IT Security News Daily Summary 2023-04-21

Friday Squid Blogging: More on Squid Fishing Most multicloud troubles are self-inflicted, security researchers say How local governments can rise to the infrastructure complexity challenge Shields Health Breach Exposes 2.3M Users’ Data American Bar Association (ABA) suffered a data breach,1.4…

IT Security News Daily Summary 2023-04-20

New Google Chrome Zero-Day Bug Actively Exploited in Wide – Emergency Update! One city’s unexpected open-data benefits International Law Enforcement Agencies Condemn Facebook Encryption Plans ChatGPT’s other risk: Oversharing confidential data Cyberattack accelerates county’s modernization, cloud push Fortra completes GoAnywhere…

IT Security News Daily Summary 2023-04-19

GlobalFoundries Sues IBM, Again Coro raises $75M for all-in-one platform to tackle SOC complexity Portnox Cloud: NAC Product Review European Union Finalises €43bn Chips Act The top 20 zero-trust startups to watch in 2023 Inside one state’s decade-long effort to…

IT Security News Daily Summary 2023-04-18

NSO Group is Back in Business With 3 New iOS Zero-Click Exploits Marlinspike Adds Charles Carmakal to its Advisory Board KnowBe4 Phishing Test Results Reveal IT and Online Services Emails Drive Dangerous Attack Trend Giving a Face to the Malware…

IT Security News Daily Summary 2023-04-17

The best travel VPNs of 2023: Expert tested lockr Raises $2.5M Microsoft Azure Key Vault OPSWAT MetaAccess: NAC Product Review NSA’s National Centers for Academic Excellent (NCAE) Cyber Games to Hold National Finals on April 22 Google Issues Emergency Chrome…

IT Security News Daily Summary 2023-04-16

Experts found the first LockBit encryptor that targets macOS systems Keeper Security Newest Competitor in 2023 Homeland Security Awards Urgent Update: Chrome, Edge, Brave browsers patch zero-day vulnerability Dridex malware, the banking trojan How Can You Identify and Prevent Insider…

IT Security News Daily Summary 2023-04-15

HIPAA Compliance Testing in Software Applications GitHub Exposed a Private SSH Key: What You Need to Know Paint by Numbers: The Perfect Therapy for Stress, Anxiety, and Boredom New Android malicious library Goldoson found in 60 apps +100M downloads New…

IT Security News Daily Summary 2023-04-14

How mass layoffs can create new risks for corporate security Russian SolarWinds Culprits Launch Fresh Barrage of Espionage Cyberattacks US extradites Nigerian charged in $6m email fraud scam Short, sweet, simple: Tips for effective government communications Why is ‘Juice Jacking’…

IT Security News Daily Summary 2023-04-13

How to use the John the Ripper password cracker New Mirai Variant Employs Uncommon Tactics to Distribute Malware Google Proposes More Transparent Vulnerability Management Practices Remcos RAT Targets Tax Pros to Scurry Off With Workers’ Filing Info Why the US…

IT Security News Daily Summary 2023-04-12

83% of organizations paid up in ransomware attacks Better ID management could help DMVs become ‘departments of citizen engagement’ When Banking Laws Don’t Protect Consumers From Cybertheft IARPA’s plan to hack the brains of hackers Were you caught up in…

IT Security News Daily Summary 2023-04-11

State grounds Chinese-made drones over security concerns NextGen TV to deliver data-rich emergency alerts Stakeholders wonder how to sustain CX momentum long-term Virtual Event Tomorrow: Zero Trust Strategies Summit Researchers Discover Well-Known Malware Hidden In Facebook Ads Microsoft Azure Shared…

IT Security News Daily Summary 2023-04-10

Apps for Sale: Cybercriminals Sell Android Hacks for Up to $20K a Pop API Governance: Best Practices and Strategies for Effective API Management VA paid for but didn’t deploy an emergency communications system How an AI tool could crack your…

IT Security News Daily Summary 2023-04-09

Researchers disclose critical sandbox escape bug in vm2 sandbox library How to Create a Mobile Application for Android OS Step by Step? Security Affairs newsletter Round 414 by Pierluigi Paganini – International edition Russia’s Far-Right Campaign in Europe Estonian National…

IT Security News Daily Summary 2023-04-08

What is phishing? Everything you need to know to protect yourself from scammers Tesla Employees Allegedly Shared Customers’ Private Videos and Photos Organizations Struggle with Data Breach Disclosure How to stay safe on public Wi-Fi: 5 tips you need to…

IT Security News Daily Summary 2023-04-07

VA delays rollout of new electronic health record system again UN Cybercrime Treaty Timeline Texas may dial back bitcoin mining incentives Almost Half of Former Employees Say Their Passwords Still Work Decoding the U.N. Cybercrime Treaty National Park Service considers…

IT Security News Daily Summary 2023-04-06

Cyber Academy’s inaugural class to bolster city defenses Pentagon lags on software buying reforms, GAO says DDoS attacks rise as pro-Russia groups attack Finland, Israel CISA director details plan to address security risks in open source software Twitter ‘Shadow Ban’…

IT Security News Daily Summary 2023-04-05

Beware of new YouTube phishing scam using authentic email address A mobile-first approach enhances police operations post-quantum cryptography New “Lily Collins” Hack Is Locking People Out Of Their Facebook Accounts Garage Door Openers Open to Hijacking, Thanks to Unpatched Security…

IT Security News Daily Summary 2023-04-04

Spring into action and tidy up your digital life like a pro eFile Tax Return Software Found Serving Up Malware New York Trump Indictment Unsealed Police Capture Genesis Market, Biggest Venue For Online Fraud Watchdog dings Energy Dept over cloud…

IT Security News Daily Summary 2023-04-03

Data to help communities get ahead of water shortages DoJ Recovers $112M in Crypto Stolen With Romance Scams New VPN Malvertising Attack Drops OpcJacker Crypto Stealer Zero trust for web and application access: Developing a cybersecurity playbook for BYOD and…

IT Security News Daily Summary 2023-04-02

Lawmakers Propose Bill To Break Up Facebook For “Taking Advantage Of Their Customers” Intelligent Automation: The New Cybersecurity Essential These APT Hackers Install Malware by Impersonating Antivirus Scans The Origin of SARS-CoV-2: Animal Transmission or Lab Leak? Cyberwarfare Leaks Reveal…

IT Security News Daily Summary 2023-04-01

How microservices have transformed enterprise security Italy’s Data Protection Authority temporarily blocks ChatGPT over privacy concerns Zimbra email platform vulnerability exploited to steal European govt emails Behavior-Based Security Training to Stem Tide of Cybersecurity Breaches CISA adds bugs exploited by…

IT Security News Daily Summary 2023-03-31

Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help. Dependency Poker for Scrum Teams The best travel VPNs of 2023: Expert tested Pro-Islam ‘Anonymous Sudan’ Hacktivists Likely a Front for Russia’s Killnet Operation Mimecast Report Reveals…

IT Security News Daily Summary 2023-03-30

Lessons from the metaverse Facebook Will Finally Allow Users To Opt Out Of Data Tracking In Europe Super FabriXss vulnerability in Microsoft Azure SFX could lead to RCE IRS tax forms W-9 email scam drops Emotet malware Compress File Using…

IT Security News Daily Summary 2023-03-29

Mélofée: The Latest Malware Targeting Linux Servers Malware Hunters Spot Supply Chain Attack Hitting 3CX Desktop App Top Tech Talent Warns on AI’s Threat to Human Existence in Open Letter QNAP fixed Sudo privilege escalation bug in NAS devices Trojan-Rigged…