Category: weekly summary

IT Security News Weekly Summary – Week 17

Alert! Zero-day Exploit For WhatsApp Advertised On Hacker Forums Has the ever-present cyber danger just got worse? Sharp-Project: New Stealer Family on the Market Researchers Find Dozens of Fake E-Zpass Toll Websites After FBI Warning Ransomware Double-Dip: Re-Victimization in Cyber…

IT Security News Weekly Summary – Week 16

IT Security News Daily Summary 2024-04-21 Akira ransomware received $42M in ransom payments from over 250 victims DuneQuixote campaign targets the Middle East with a complex backdoor Cyberattackers Employ Elusive “CR4T” Backdoor to Target Middle Eastern Governments New AI Speed…

IT Security News Weekly Summary – Week 15

IT Security News Daily Summary 2024-04-14 Facebook Testing Tools To Auto-Blur Nudity In Teens’ DMs Deciphering Metrics: From NCAA Women’s Basketball to Cyber Trends USENIX Security ’23 – How to Bind Anonymous Credentials to Humans Apple Alerts iPhone Users of…

IT Security News Weekly Summary – Week 14

IT Security News Daily Summary 2024-04-07 A Breakthrough Online Privacy Proposal Hits Congress Conn. CISO Raises Security Concerns Over BadGPT, FraudGPT Privnote Secure Messaging App Is Under Phishing Threat US Environmental Protection Agency Allegedly Hacked, 8.5M User Data Leaked The…

IT Security News Weekly Summary – Week 13

IT Security News Daily Summary 2024-03-31 PyPI Halts New User Registrations to Combat Malware Campaign XZ Utils backdoor update: Which Linux distros are affected and what can you do? Checking CSV Files, (Sun, Mar 31st) Security Affairs newsletter Round 465…

IT Security News Weekly Summary – Week 12

IT Security News Daily Summary 2024-03-24 Some 300,000 IPs vulnerable to this Loop DoS attack Controversy Surrounds Flipper Zero Amid Car Theft Concerns Security Affairs newsletter Round 464 by Pierluigi Paganini – INTERNATIONAL EDITION USENIX Security ’23 – Jinwen Wang,…

IT Security News Weekly Summary – Week 08

IT Security News Daily Summary 2024-02-25 Safeguarding Children in the Era of Big Data Securing Space Infrastructure for US And Allied Collaboration Understand Cyber Insurance: Rising Risks and How to Right-Size Policies Cell Service Restored Following Extensive AT&T Outage A…

IT Security News Weekly Summary – Week 07

IT Security News Daily Summary 2024-02-18 Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Sensitive Data Corporate Accountability: Tech Titans Address the Menace of Misleading AI in Elections Changing How Healthcare Works: Big News in Communication ESET fixed…

IT Security News Weekly Summary – Week 04

IT Security News Daily Summary 2024-01-28 Simplifying Access: The Role of Single Sign-On (SSO) in Cloud Computing Multiple PoC exploits released for Jenkins flaw CVE-2024-23897 Crypto Stealing PyPI Malware Hits Both Windows and Linux Users Failing Upwards (or not) (Pt1)…

IT Security News Weekly Summary – Week 03

IT Security News Daily Summary 2024-01-21 USENIX Security ’23 – Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner – Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality Evolution of AI Assistants: Navigating Breakthroughs in…

IT Security News Weekly Summary – Week 02

IT Security News Daily Summary 2024-01-14 Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms Microsoft is named a…

IT Security News Weekly Summary – Week 01

IT Security News Daily Summary 2024-01-07 A cyber attack hit the Beirut International Airport USENIX Security ’23 – Oshrat Ayalon, Dana Turjeman, Elissa M. Redmiles – ‘Exploring Privacy And Incentives Considerations In Adoption Of COVID-19 Contact Tracing Apps’ North Korean…

IT Security News Weekly Summary – Week 52

IT Security News Daily Summary 2023-12-31 Microsoft Disables App Installer After Feature is Abused for Malware USENIX Security ’23 – Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo ‘Near-Optimal Oblivious Key-Value Stores For Efficient PSI, PSU And Volume-Hiding Multi-Maps’…

IT Security News Weekly Summary – Week 51

IT Security News Daily Summary 2023-12-24 All I really need to know about cybersecurity, I learned in kindergarten Corporate Spy Tech and Inequality: 2023 Year in Review Protecting Encryption And Privacy In The US: 2023 Year in Review USENIX Security…

IT Security News Weekly Summary – Week 50

IT Security News Daily Summary 2023-12-17 MongoDB Confirms Hack, Says Customer Data Stolen What is trending in the API economy? MongoDB investigates a cyberattack, customer data exposed Securing the code: navigating code and GitHub secrets scanning Utilizing CRQ to empower…

IT Security News Weekly Summary – Week 49

IT Security News Daily Summary 2023-12-10 DEF CON 31 XR Village – Whitney Phillips’ ‘Augmented Reality And Implications On Mobile Security’ Protecting against new Kubernetes threats in 2024 and beyond Fake hotel reservation phishing scam uses PDF links to spread…

IT Security News Weekly Summary – Week 47

IT Security News Daily Summary 2023-11-26 Facebook Approves Ads Calling For Genocide, Assassination, And More DEF CON 31 – Ricky Lawshae’s ‘Fantastic Ethertypes and Where to Find Them’ Taj Hotels Faces Data Breach, Revealing Data of 1.5 Million Customers Private…

IT Security News Weekly Summary – Week 37

IT Security News Daily Summary 2023-09-17 MetaStealer Emerges As The New Malware Threat For Mac Devices Israeli Cyber Firms Unveil Groundbreaking Spyware Tool Researchers Say Facebook’s Fake News Policies Are Weak Billionaire Mark Cuban Falls Victim to Crypto Hack Again,…

IT Security News Weekly Summary – Week 36

IT Security News Daily Summary 2023-09-10 Powerful Ethnic Militia in Myanmar Repatriates 1,200 Chinese Suspected of Involvement in Cybercrime Microsoft and Google’s Approach to Replace Obsolete TLS Protocols Rhysida Ransomware gang claims to have hacked three more US hospitals New…

IT Security News Weekly Summary – Week 35

IT Security News Daily Summary 2023-09-03 Why CISOs Should Prioritize Cloud Security and Access Management During Digital Transformation Initiatives Default Passwords Lead to Hacking Incidents Among LogicMonitor Customers PoC exploit code released for CVE-2023-34039 bug in VMware Aria Operations for…

IT Security News Weekly Summary – Week 34

IT Security News Daily Summary 2023-08-27 Rhysida Ransomware Group: Social Security Numbers, Passport Data Compromised in Recent Hospital Attack IT Contractor Data Breach Affects 47,000 Met Police Personnel Why generative AI is a double-edged sword for the cybersecurity sector Security…

IT Security News Weekly Summary – Week 33

IT Security News Daily Summary 2023-08-20 Cyber Security & Cloud Expo Europe 2023 – Less Than Two Months To Go Implement Machine Learning to Secure Your IoT Network Hybrid Mesh Firewall Management N. Korean Kimsuky APT targets S. Korea-US military…

IT Security News Weekly Summary – Week 32

IT Security News Daily Summary 2023-08-13 Multiple flaws in CODESYS V3 SDK could lead to RCE or DoS How businesses and governments can work together to stop cyberattacks before they start Edge computing’s role in healthcare EvilProxy Phishing Campaign Targets…

IT Security News Weekly Summary – Week 31

IT Security News Daily Summary 2023-08-06 Hospitals Paralyzed by Cyberattack, Emergency Services Diverted NIS2: 1. Perform a gap analysis Amazon Executive Lacks Data for Return-to-Office Mandate Worldcoin’s Iris-Scanning Technology: A Game-Changer or a Privacy Concern VMCONNECT: Malicious PyPI Package Mimicking…

IT Security News Weekly Summary – Week 30

IT Security News Daily Summary 2023-07-30 Unleashing FreedomGPT on Windows How CISOs can engage the C-suite and Board to manage and address cyber risk In 2022, more than 40% of zero-day exploits used in the wild were variations of previous…

IT Security News Weekly Summary – Week 29

IT Security News Daily Summary 2023-07-23 VirusTotal issues apology for recent sensitive data leak The Next Step API Security Checklist: A Must Read Guide 2023 Web Development Revolution: Chrome’s Cookie-Free Tools North Korea-Backed Hackers Breach US Tech Company to Target…

IT Security News Weekly Summary – Week 27

IT Security News Daily Summary 2023-07-09 OSINT Tool ‘Illicit Services’ Shuts Down Amidst Exploitation Concerns Introduction to Cloud Database Russian Dark Net Markets Dominate the Global Illicit Drug Trade: Report Two spyware sending data of more than 1.5M users to…

IT Security News Weekly Summary – Week 26

IT Security News Daily Summary 2023-07-02 Security Affairs newsletter Round 426 by Pierluigi Paganini – International edition Kick: The New Streaming Platform Making Headlines Canadian Government Hit by Hackers 2,300,000,000,000 Times Last Year Operation Cookie Monster: FBI Seizes Genesis Market…

IT Security News Weekly Summary – Week 25

IT Security News Daily Summary 2023-06-25 A New Era Of Security: Are Passwords No Longer Fit For Purpose? The Role Of Impactful Penetration Testing Amid Rise Of AI-Powered Threat Actors How Can Manufacturers Stop Being The Top Target For Cyber…

IT Security News Weekly Summary – Week 24

IT Security News Daily Summary 2023-06-18 Reddit Files: BlackCat/ALPHV ransomware gang claims to have stolen 80GB of data from Reddit How generative AI is creating new classes of security threats Companies Targeted by Clop Ransomware Gang Face Extortion of Stolen…

IT Security News Weekly Summary – Week 23

IT Security News Daily Summary 2023-06-11 Why It Will Take Sophisticated AI Solutions to Fight AI Security Attacks 1020 Cyber Security Professionals’ Actions and Experiences When Applying for A New Role. Closing The Cyber Marketing Gap with Investors Unmasking the…

IT Security News Weekly Summary – Week 22

IT Security News Daily Summary 2023-06-04 Friday Squid Blogging: Squid Chromolithographs The Unintended Consequences of Netflix’s Password Sharing Ban Security Affairs newsletter Round 422 by Pierluigi Paganini – International edition Music Streaming Royalties To Be Examined by The UK Government…

IT Security News Weekly Summary – Week 21

IT Security News Daily Summary 2023-05-28 Best Practices For Website Design In 2023 Industrial automation giant ABB disclosed data breach after ransomware attack What you need to know about the mindset and motivation of ethical hackers padre – Padding Oracle…

IT Security News Weekly Summary – Week 20

IT Security News Daily Summary 2023-05-21 Guerilla Malware Shipped With Roughly 9 Million Android Devices How to Handle Secrets in Kubernetes The Infamous Cybercrime Marketplace Now Offers Pre-order Services for Stolen Credentials PyPI Repository temporarily suspends user sign-ups and package…

IT Security News Weekly Summary – Week 19

IT Security News Daily Summary 2023-05-14 The latest variant of the RapperBot botnet adds cryptojacking capabilities XWorm Malware Exploits Critical Follina Vulnerability in New Attacks Hackers Come up With Innovative Methods to Enforce Ransomware Payment ChatGPT is about to revolutionize…

IT Security News Weekly Summary – Week 18

IT Security News Daily Summary 2023-05-07 Global Ransomware Attack Targets VMware ESXi Servers San Bernardino County Sheriff’s Department paid a $1.1M ransom TikTok Tracked UK Journalist via her Cat’s Account Dragon Breath’s Latest Double-Clean-App Technique Targeting Gambling Industry This New…

IT Security News Weekly Summary – Week 17

IT Security News Daily Summary 2023-04-30 Crooks broke into AT&T email accounts to empty their cryptocurrency wallets The Evolving Threat From Terrorist Drones in Africa Enhance Employee Productivity by Adopting a Modern Approach to Password Security Complexity is Still the…

IT Security News Weekly Summary – Week 16

IT Security News Daily Summary 2023-04-23 Zero Trust Network for Microservices With Istio What is Single Sign-on (SSO) ? – Solution to Ensure Your Company Data Security Linux Malware Set to Be Deployed by North Korean APT Group Experts spotted…

IT Security News Weekly Summary – Week 15

IT Security News Daily Summary 2023-04-16 Experts found the first LockBit encryptor that targets macOS systems Keeper Security Newest Competitor in 2023 Homeland Security Awards Urgent Update: Chrome, Edge, Brave browsers patch zero-day vulnerability Dridex malware, the banking trojan How…

IT Security News Weekly Summary – Week 14

IT Security News Daily Summary 2023-04-09 Researchers disclose critical sandbox escape bug in vm2 sandbox library How to Create a Mobile Application for Android OS Step by Step? Security Affairs newsletter Round 414 by Pierluigi Paganini – International edition Russia’s…

IT Security News Weekly Summary – Week 13

IT Security News Daily Summary 2023-04-02 Lawmakers Propose Bill To Break Up Facebook For “Taking Advantage Of Their Customers” Intelligent Automation: The New Cybersecurity Essential These APT Hackers Install Malware by Impersonating Antivirus Scans The Origin of SARS-CoV-2: Animal Transmission…

IT Security News Weekly Summary – Week 12

IT Security News Daily Summary 2023-03-26 Host Hack Attempt Detection Using ELK Microsoft Offers Guidelines on Detecting Outlook Zero-day Exploits Security Affairs newsletter Round 412 by Pierluigi Paganini – International edition NCA Infiltrates Cybercrime Market With Fake DDoS Sites Afghanistan’s…

IT Security News Weekly Summary – Week 11

IT Security News Daily Summary 2023-03-19 Security Affairs newsletter Round 411 by Pierluigi Paganini Cybersecurity startups to watch for in 2023 Two Patch Tuesday flaws you should fix right now Twitter’s fraud problem isn’t too hard to solve EV Charging…

IT Security News Weekly Summary – Week 10

IT Security News Daily Summary 2023-03-12 Security Affairs newsletter Round 410 by Pierluigi Paganini On Using Tools Lessons From the Uber Hack Our Nation Needs Comprehensive AI Legislation, And Soon Facebook AI Leaks Online And Gets Used To Create Offensive…

IT Security News Weekly Summary – Week 09

IT Security News Daily Summary 2023-03-05 Credential Stuffing attack on Chick-fil-A impacted +71K users How to avoid billion-dollar fines due to unsecured messaging apps New CISO appointments, February 2023 Iron Tiger updates malware to target Linux platform BrandPost: It’s Time…

IT Security News Weekly Summary – Week 08

IT Security News Daily Summary 2023-02-26 Integrating AWS Secrets Manager With Spring Boot Understanding Static Code Analysis Dynatrace Perform: Day One Ransomware attack on food giant Dole Food Company blocked North America production HTTP 1 vs. HTTP 1.1 vs. HTTP…

IT Security News Weekly Summary – Week 07

IT Security News Daily Summary 2023-02-19 ⚡Top Cybersecurity News Stories This Week — Cybersecurity Newsletter ⚡Top Cybersecurity News Stories This Week — Cybersecurity Newsletter Frebniis malware abuses Microsoft IIS feature to create a backdoor ⚡Top Cybersecurity News Stories This Week…

IT Security News Weekly Summary – Week 06

IT Security News Daily Summary 2023-02-12 The Israel Institute of Technology Technion suffered a ransomware attack Top cybersecurity M&A deals for 2023 Flaws in industrial wireless IoT solutions can give attackers deep access into OT networks Using the blockchain to…

IT Security News Weekly Summary – Week 05

IT Security News Daily Summary 2023-02-05 Dark Web Hitman Paid with BTC to Murder Teen Victim Horizon3.ai Unveils: ‘Year in Review: Thru the Eyes of the Attacker 2022’ Cloud Computing Penetration Testing Checklist – 2023 Top 5 cyber-threats and how…

IT Security News Weekly Summary – Week 04

IT Security News Daily Summary 2023-01-29 Doctor Paid $60k in Bitcoin to Hire Dark Web Hitmen Facebook Scams, Account Takeovers Are On The Rise Alleged member of ShinyHunters group extradited to the US, could face 116 years in jail Pro-Russia…

IT Security News Weekly Summary – Week 03

IT Security News Daily Summary 2023-01-22 FBI Chief Says He’s ‘Deeply concerned’ by China’s AI Program Expert found critical flaws in OpenText Enterprise Content Management System Roaming Mantis uses new DNS changer in its Wroba mobile malware How Ukraine Fought…

IT Security News Weekly Summary – Week 42

IT Security News Daily Summary 2022-10-23 (ISC)² and the UK Cyber Security Council Professional Standards Pilot Program – What It Means for Members Text4Shell Vulnerability Exploitation Attempts Started Soon After Disclosure Data of 3 Million Advocate Aurora Health Patients Exposed…

IT Security News Weekly Summary – Week 41

IT Security News Daily Summary 2022-10-16 Google Announces KataOS As Security-Focused OS, Leveraging Rust & seL4 Microkernel Aruba Fixes Critical Vulnerabilities in EdgeConnect Enterprise Orchestrator How Apple’s privacy changes force social media marketing to evolve This flash drive will self-destruct…

IT Security News Weekly Summary – Week 38

IT Security News Daily Summary 2022-09-25 OSINT and Top 15 Open-source Intelligence Tools QUAD Nations to Assist Each Other in Taking Action Against Malicious Cyber Activities Attackers impersonate CircleCI platform to compromise GitHub accounts How to Overcome the Pitfalls of…

IT Security News Weekly Summary – Week 37

IT Security News Daily Summary 2022-09-18 Information Warfare and What Infosec Needs to Know Poor Identity Management Amplifies Ransomware Akeyless Empowers Enterprise Code Security with Comprehensive Secrets Management The Importance of Terrorist Founders and the Role of Safe Havens LastPass…

IT Security News Weekly Summary – Week 36

IT Security News Daily Summary 2022-09-11 Lazarus Hackers are Using Log4j to Hack US Energy Companies Conti Gang Doppelganger Adopts Recycled Code Meta Disbands Team Studying Negative Impacts Of Facebook, Instagram Bangsamoro Peace and the U.S.-Philippines Alliance Threat Actors Exploit WeTransfer…

IT Security News Weekly Summary – Week 35

IT Security News Daily Summary 2022-09-04 GDPR: Four Years After Its Enactment, Where Do We Stand? Google Fix Another Chrome Zero-Day With An Emergency Update The Prynt Stealer Malware Includes a Secret Backdoor, Hackers Steal Data from Credentials Anonymous Attacks…

IT Security News Weekly Summary – Week 34

IT Security News Daily Summary 2022-08-28 How to protect your business from cyberattacks with XDR DoorDash Data Breach Linked with Twilio Hackers Ransomware Resiliency for Storage & Backup: Trends, Threats & Tips USMC Cyberspace Ops Redesignated to Information Maneuver OCCFLD…

IT Security News Weekly Summary – Week 33

IT Security News Daily Summary 2022-08-21 Ring App Vulnerability Could Expose User’s Phone Data 3 Ways Asset Management Companies Can Reduce Cyber Risk A Modern Cybersecurity Fight Requires a Modern Approach to Regulatory Oversight Mimecast: Mitigating Risk Across a Complex…

IT Security News Weekly Summary – Week 32

IT Security News Daily Summary 2022-08-14 The problem with our cybersecurity problem Cisco Confirms Network Breach After Employee’s Google Account was Hacked A flaw in Xiaomi phones using MediaTek Chips could allow to forge transactions Responsible use of machine learning…

IT Security News Weekly Summary – Week 31

IT Security News Daily Summary 2022-08-07 Darktrace Nominated to Compete for Double ‘ASTORS’ Awards in 2022 Twitter Confirms Data Breach as 5.4M Accounts Sold on Hacker Forum Serious cyberattack hits German Chambers of Industry and Commerce (DIHK) Neuro Practice Says…

IT Security News Weekly Summary – Week 30

IT Security News Daily Summary 2022-07-31 Businesses Will Suffer Cyber-Attacks; But Do They Know the Real Cost? aiXDR Brief Novel Phishing Campaign Employs Countdown Timer to Pressurize Victims (ISC)² and Others Commit to Closing the Cybersecurity Workforce Gap While at…

IT Security News Weekly Summary – Week 29

IT Security News Daily Summary 2022-07-24 Most Important Security Tools For Security Researchers & Malware Analyst Hacker Offers 5.4 million Twitter Account Details for $30,000 (ISC)² Pledges 1 Million Certified in Cybersecurity Microsoft Hit by Huge Service Outage T-Mobile Agrees…

IT Security News Weekly Summary – Week 28

IT Security News Daily Summary 2022-07-17 Lenovo UEFI Firmware Vulnerabilities Risk Numerous Laptop Models Hackers can spoof commit metadata to create false GitHub repositories Crooks stole $375k from Premint NFT, it is one of the biggest NFT hacks ever Acquiring…

IT Security News Weekly Summary – Week 27

IT Security News Daily Summary 2022-07-10 ✨ Happy Birthday to EFF! How the FBI quietly added itself to criminals’ instant message conversations ✨ Happy Birthday to EFF! ✨ Happy Birthday to EFF! Microsoft Defender for Endpoint Launches Mobile Network Protection…

IT Security News Weekly Summary – Week 26

IT Security News Daily Summary 2022-07-03 Tens of Jenkins plugins are affected by zero-day vulnerabilities ZuoRAT Malware Targets SOHO Routers In North America, Europe – Expert Comment What Expert Says On Marqeta Expanding Credit Platform With 40 New APIs ATC…

IT Security News Weekly Summary – Week 25

IT Security News Daily Summary 2022-06-26 This Malware is Spreading Via Fake Cracks Setting the standard for digital asset security Cybersecurity and the metaverse: Identifying the weak spots Threat actors sell access to tens of vulnerable networks compromised by exploiting…

IT Security News Weekly Summary – Week 24

IT Security News Daily Summary 2022-06-19 USB Forensics – Reconstruction of Digital Evidence from USB Drive Overturning Roe: What Might This Mean for Military Culture? Meet “Universal ZTNA,” Powered by Genians #1 Proven NAC, at Infosecurity Europe 2022 DevSecOps deploy…

IT Security News Weekly Summary – Week 23

IT Security News Daily Summary 2022-06-12 The attacker’s toolkit: Ransomware-as-a-service The United Nations’ List of “Not Listed” Terrorist Entities Security Bug Detected in Apple M1 Processor Chipsets Companies Continue to Pay Multiple Ransom Demands Convergint Expands STEP Up Program, Prioritizes…

IT Security News Weekly Summary – Week 22

IT Security News Daily Summary 2022-06-05 A New Paradigm for Absolute Zero Trust and Infrastructure Resiliency Secure access for a connected world Alert Fatigue Puts Your Organization at Risk; Here’s What to do about it How SD-WAN Enables Digital Transformation…

IT Security News Weekly Summary – Week 21

IT Security News Daily Summary 2022-05-29 3 most common — and dangerous — holes in companies’ cyber defenses Pro-Russian hacker group KillNet plans to attack Italy on May 30 Report: Facebook Profited Off Ads Promoting White Supremacist Content SQL Injection…

IT Security News Weekly Summary – Week 20

IT Security News Daily Summary 2022-05-22 Web Tracker Caught Intercepting Online Forms Even Before Users Hit Submit New MITRE Framework For Supply Chain Security Global Food Supply Chain Threatened By Hackers Evasive Bots Driving Online Fraud: 2022 Report Conti Ransomware…

IT Security News Weekly Summary – Week 19

IT Security News Daily Summary 2022-05-15 Car hack attacks: It’s about data theft, not demolition How to spot the signs of a virtual kidnap scam May 08 – May 14 Ukraine – Russia the silent cyber conflict Nearly 15 Million…

IT Security News Weekly Summary – Week 18

IT Security News Daily Summary 2022-05-08 India’s ongoing outrage over Pegasus malware tells a bigger story about privacy law problems Conti ransomware claims to have hacked Peru MOF – Dirección General de Inteligencia (DIGIMIN) OpenSea Warns of Discord Channel Hack…

IT Security News Weekly Summary – Week 17

IT Security News Daily Summary 2022-05-01 Cybersecurity and the Pareto Principle: The future of zero-day preparedness 5 key industries in need of IoT security Researchers Claim RCE Vulnerability Could Affect VirusTotal Platform – VirusTotal Denies Multiple “Nimbuspwn” Vulnerabilities Allowed Linux…

IT Security News Weekly Summary – Week 16

IT Security News Daily Summary 2022-04-24 Sensitive Data: Securing Your Most Important Asset Spain Vows to be Transparent in Probe of Pegasus Spyware Use New iPhone Zero-Click Bug Exploited In Pegasus Attacks Against Catalans Watch Out For This Fake Windows…

IT Security News Weekly Summary – Week 13

IT Security News Daily Summary 2022-04-03 Three Ways IP Data Enhances Cyber Security Your Guide to the NIST Cybersecurity Framework Info Stealing BlackGuard Malware is Advertised for Sale on Russian Hacking Forums Viasat: Acid Rain Virus Disable Satellite Modems Adversarial AI…

IT Security News Weekly Summary – Week 12

IT Security News Daily Summary 2022-03-27 Latest Google Chrome Update Fixed Another Zero-Day Flaw Prepare Your Business for the Future of Cyberwar: A Review of The Art of Cyberwarfare> Ransomware as a Service: The Trending Business Model for Attacks How…

IT Security News Weekly Summary – Week 11

IT Security News Daily Summary 2022-03-20 How to Use JWT Securely We are headed for an ecosystem of cyber haves and cyber nots: Cisco advisory CISO 5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem Directed Analytics –…

IT Security News Weekly Summary – Week 10

IT Security News Daily Summary 2022-03-13 Five Tips for Ensuring Communications Security in Your Organization Q&A on Network Detection and Response (NDR) The Cybersecurity Job Shortage Won’t Continue to Decline without Enhanced Hiring Creativity The Foilies 2022 Multiple Security Bugs…

IT Security News Weekly Summary – Week 09

IT Security News Daily Summary 2022-03-06 Enhance Your Safety and Security Operations with Valor IMS See a Quick Demo of N2WS Backup & Recovery on AWS Marketplace CVE-2022-0492 flaw in Linux Kernel cgroups feature allows container escape Chrome Skype Extension…

IT Security News Weekly Summary – Week 08

IT Security News Daily Summary 2022-02-27 Meet SockDetour fileless backdoor targeting U.S. Defense contractors See Why US Air Force Selects Orolia’s CRPA Testing Solution (Multi-Video) Ukraine’s Volunteer ‘IT Army’ Is Hacking in Uncharted Territory Russia may use SolarWinds-like hacks in…

IT Security News Weekly Summary – Week 07

IT Security News Daily Summary 2022-02-20 Squirrelwaffle Malware Loader Exploits Vulnerable Microsoft Exchange Servers New Unredacter Tool Extracts Text From Pixelized Images What is intelligent document processing? Why IDP matters in the enterprise Kraken botnet bypass Windows Defender to steal…

IT Security News Weekly Summary – Week 06

IT Security News Daily Summary 2022-02-13 Google Paid $8.7 Million in Bug Bounties Last Year Twitter cans 2FA service provider over surveillance claims 3 Opportunities for Startups Interested in the Defense Marketplace Organizations paid at least $602 million to ransomware…

IT Security News Weekly Summary – Week 05

IT Security News Daily Summary 2022-02-06 Breach of Washington State Database May Expose Personal Information How to stop the spread of ransomware attacks Popular VPNs NordVPN And Surfshark Announce Merger Israeli surveillance firm QuaDream emerges from the dark Cyber Defense…

IT Security News Weekly Summary – Week 04

IT Security News Daily Summary 2022-01-30 Expert releases PoC for CVE-2022-21882 Windows local privilege elevation issue Germany’s White Supremacist Problem—and What It Means for the United States Latest Proof of Concept Details How iOS Malware May Snoop on Our Devices…

IT Security News Weekly Summary – Week 03

IT Security News Daily Summary 2022-01-23 The Threat Landscape and Attribution OpenSubtitles data breach impacted 7 million subscribers How to Deal with Exchange Server Security Challenges? Gurman: Apple Preparing ‘Widest Array of New Hardware Products in Its History’ for Fall…

IT Security News Weekly Summary – Week 02

IT Security News Daily Summary 2022-01-16 Microsoft Uncovers Destructive Malware Used in Ukraine Cyberattacks A Cybersecurity Conversation with Vince Moore – Senior Network Engineer at OPSWAT European Union simulated a cyber attack on a fictitious Finnish power company Gurman: Apple…

IT Security News Weekly Summary – Week 01

IT Security News Daily Summary 2022-01-09 Cyber Defense Magazine – January 2022 has arrived. Enjoy it! US NCSC and DoS share best practices against surveillance tools How To Secure the Linux Kernel > Flubot Malware Targeting Users by Masquerading as…

IT Security News Weekly Summary – Week 52

IT Security News Daily Summary 2022-01-02 Exclusive: NASA Director Twitter account hacked by Powerful Greek Army Fighting For You From Coast to Coast: 2021 In Review Fighting For A More Open, Balanced Patent System: 2021 in Review Lapsus$ ransomware gang…

IT Security News Weekly Summary – Week 51

IT Security News Daily Summary 2021-12-26 What to Buy With the Apple Gift Card You Unwrapped French IT services provider Inetum hit by BlackCat ransomware attack Tips and Tricks for New iPhone 13 Owners 2021 Was the Year Lawmakers Tried…

IT Security News Weekly Summary – Week 50

IT Security News Daily Summary 2021-12-19 Grim Finance hacked – $30 million worth of tokens stolen Ransomware Persists Even as High-Profile Attacks Have Slowed Clop ransomware gang is leaking confidential data from the UK police Overcoming 5 Challenges to Shifting…

IT Security News Weekly Summary – Week 49

IT Security News Daily Summary 2021-12-12 How Log4j Vulnerability Could Impact You The Best Ways to Secure Communication Channels in The Enterprise Environment Report: IT automation to drive tech spending in 2022 Quebec shuts down thousands of sites as disclosure…

IT Security News Weekly Summary – Week 48

IT Security News Daily Summary 2021-12-05 Report: Phishing campaign is actively targeting U.S. military families BitMart Exchange hacked as hackers steal $150 million First Apple Mixed Reality Headset Rumored to Focus on Gaming, Media, and Communication The Historian’s Approach to…

IT Security News Weekly Summary – Week 47

IT Security News Daily Summary 2021-11-28 Tech Expert Devises Test To See If Facebook Is Eavesdropping On Users Google warns crypto miners are using compromised cloud accounts Ongoing Phishing Attack Targets IKEA Employee Mailboxes To Spread Trojan Anatomy of a…

IT Security News Weekly Summary – Week 46

IT Security News Daily Summary 2021-11-21 Eftpos added security features go-live as digital upgrades continue Report: Only 21% of remote workers say they are aware of cyberthreats Finding the Appropriate Balance of Risk in Over-the-Horizon Strikes Experts found 11 malicious…

IT Security News Weekly Summary – Week 45

IT Security News Daily Summary 2021-11-14 Updated: Hundreds of thousands of fake warnings of cyberattacks sent from a hacked FBI email server Digital Transformation Security: Guidelines for Success Why The Integration of Netops And Secops Is Here To Stay Solving…

IT Security News Weekly Summary – Week 44

IT Security News Daily Summary 2021-11-07 Over-the-Horizon Does Not Have to Mean Next Door Heap Overflow Bug Affects All Linux Kernels Via TIPC Module Experts spotted a phishing campaign impersonating security firm Proofpoint Encryption Key Lifecycle Management: Tools and Best…

IT Security News Weekly Summary – Week 43

IT Security News Daily Summary 2021-10-31 Medical digital twins secure COVID-19 data Report: At least 25% of consumers use biometrics for online security Iranian Black Shadow hacking group breached Israeli Internet hosting firm The Taliban Haven’t Changed, But U.S. Policy…

IT Security News Weekly Summary – Week 42

IT Security News Daily Summary 2021-10-24 TodayZoo phishing kit borrows the code from other kits 5 Security Concerns for Developers In Workload Protection Insights Into Proactive Threat Hunting Apple Says Notch is a ‘Smart Way’ to Give Users More Space…