-
Log4Shell (Log4j RCE): Detecting Post-Exploitation Evidence is Best Chance for Mitigation
-
Firefox: Ad blockers are 2021’s most popular browser extensions
-
NSA and CISA Release Final Part IV of Guidance on Securing 5G Cloud Infrastructures
-
Gathering security data for container images using the Pyxis API
-
MacBook Pro Owners Noticing Smoother ProMotion Safari Scrolling After Installing macOS Monterey 12.2
-
EFF to Court: Deny Foreign Sovereign Immunity to DarkMatter for Hacking Journalist
-
LogMeIn To Spin Off LassPass As Separate Cloud Security Firm
-
Anubis Android Malware Found Targeting Nearly 400 Financial Apps
-
CISA director says the LOG4J security flaw is the “most serious” she’s seen in her career
-
CISA adds Log4Shell Log4j flaw to the Known Exploited Vulnerabilities Catalog
-
December 2021: Cyber Deception Month Continues…Halting Holiday Hackers…
-
Crooks injects e-skimmers in random WordPress plugins of e-stores
-
Turn your basic networking and coding skills into in-demand cybersecurity qualifications
-
Meta Ousts 7 Surveillance-for-Hire Operations From Its Platforms
-
LOG4J vulnerability the most serious I’ve seen in my decades-long career, says CISA director
-
Flaws in Lenovo laptops allow escalating to admin privileges
-
Apple Building Chip Team to Bring More Wireless Component Production In-House
-
Privacy, Identity, and Device Protection: Why You Need to Invest in All Three
-
‘PseudoManuscrypt’ Mass Spyware Campaign Targets 35K Systems
-
How organizations should prioritize security vulnerabilities
-
Google Says NSO Pegasus Zero-Click ‘Most Technically Sophisticated Exploit Ever Seen’
-
Ransomware, Trojans, DDoS Malware and Crypto-Miners Delivered in Log4Shell Attacks
-
NSO zero-click iMessage exploit hacks iPhone without need to click links
-
CISA, White House urge organizations to get ready for holiday cyberattacks
-
Microsoft Launch Vulnerable And Malicious Driver Reporting Center
-
Hillrom Addressed A Zero-Day Vulnerability Affecting Its Cardiac Devices
-
Microsoft December Patch Tuesday Out With 67 Bug Fixes Including A Zero-Day Patch
-
Microsoft Teams End-to-End Encryption Now ‘Generally Available’
-
Why ransomware attacks happen out of hours or during the holidays
-
S3 Ep63: Log4Shell (what else?) and Apple kernel bugs [Podcast+Transcript]
-
60% of UK Workers Have Been Victim of a Cyber-Attack, Yet Awareness Remains Low
-
Corellium Lands $25 Million Investment for Virtualization Tech
-
Thousands of Industrial Systems Targeted With New ‘PseudoManuscrypt’ Spyware
-
Grindr fined £5.5m for selling user data to advertising companies
-
Apache Kafka in the Public Sector – Part 5: National Security and Defense
-
Brazil investigates use of staff credentials in cyberattacks against government bodies
-
How to install the ConfigServer and Security Firewall combo on Ubuntu Server
-
Online Shoppers Could Face Eight Million Credential Stuffing Attacks Per Day Over Christmas
-
Panda Security: top rated in AV-Comparatives performance test
-
Another Apache Log4j Bug Discovered – Patch Released – Update (Once Again!)
-
Top 4 cloud misconfigurations and best practices to avoid them
-
Deals: Year’s Best Prices Hit AirPods 2 ($90) and AirPods 3 ($140), But Will Arrive After Christmas
-
SiriusXM Platinum VIP Tier Now Includes 12 Months of Free Apple Music
-
SecurityWeek Announces Virtual Cybersecurity Event Schedule for 2022
-
Dear Congress: It’s Complicated. Please Consider This When Crafting New Cybersecurity Legislation
-
Botnet steals half a million dollars in cryptocurrency from victims
-
While attackers begin exploiting a second Log4j flaw, a third one emerges
-
Apple Rumored to Launch Lower-Priced 24-Inch and 27-Inch External Displays: What to Expect
-
The Collapsed Bridge Loan: Israel’s Shin Bet Location Tracking of Omicron Carriers
-
The Chatter Podcast: From National Security Blogger to Editor of Rolling Stone with Noah Shachtman
-
Log4j flaw: This new threat is going to affect cybersecurity for a long time
-
What Retailers Should Know About Cybersecurity This Holiday Season
-
North American Propane Distributor ‘Superior Plus’ Discloses Ransomware Attack
-
Researchers Uncover New Coexistence Attacks On Wi-Fi and Bluetooth Chips
-
Security awareness gaps identified in the UK according to new Armis study
-
State-sponsored Threat Actors Steal Airline Data Using the Slack API
-
Comprehensive Phishing Study Shows Who Is More Prone to Fall Victim to Phishing Attacks
-
Ory lands $22.5M for zero trust security powered by open source
-
The DHS is inviting hackers to break into its systems, but there are rules of engagement
-
The Guide to Automating Security Training for Lean Security Teams
-
Algorithms are everywhere – what should you know about them?
-
WhiteSource Log4j Detect scans projects to find vulnerable Log4j versions
-
Cobalt Strike Is Being Installed by Emotet for Faster Attacks
-
Variant of Phorpiex botnet used for cryptocurrency attacks in Ethopia, Nigeria, India and more
-
Google: This zero-click iPhone attack was incredible and terrifying
-
Phorpiex botnet is back with a new Twizt: Hijacking Hundreds of crypto transactions
-
Regulator: Venues Must Protect User Privacy During #COVID19 Checks
-
Does the Log4j Vulnerability Affect You? – Intego Mac Podcast Episode 218
-
New Fileless Malware Uses Windows Registry as Storage to Evade Detection
-
Digital Security by Design reinforced through new Government National Cyber Strategy
-
New Scam Emails Purport to Come from NSO Group Hacker – Intego Mac Podcast Episode 218
-
Move fast, break security: Why CISOs must push back against Agile IT
-
Rise in API-Based Attacks Underscore Investments in New Tools
-
National Cyber Strategy will lead to BritChip for mobile devices by 2025, claims UK.gov
-
Owowa, a malicious IIS Server module used to steal Microsoft Exchange credentials
-
Victims awarded $18 million in GirlsDoPorn online video case, boss on the run
-
How to implement security into software design from the get-go
-
Japan draws a LINE: web giants must reveal where they store user data
-
Hackers Begin Exploiting Second Log4j Vulnerability as a Third Flaw Emerges
-
Europe’s quantum communication plans: Defending against state-sponsored cyber attacks
-
Ransomware Attack halts Christmas 2021 paychecks and bonuses
-
Online shopping at risk: Mobile application and API cyber attacks at critical high
-
Microsoft confirms new ransomware family deployed via Log4j vulnerability
-
Digital ID age verification trials for online alcohol purchases in Australia underway
-
(ISC)² Ransomware Study: Collaboration and Communication are Essential for Ransomware Readiness
-
DMARC and the prevention of World Health Organization phishing scams
-
Security priorities are geared toward ongoing remote and hybrid work
-
Hackers Exploiting Log4j2 Vulnerability in The Wild To Deploy Ransomware
-
OAIC determines AFP interfered with privacy of Australians after using Clearview AI
-
Cybersecurity Standards, Ransomware, and Zero Trust: 3 Key Considerations for the UK Government
-
Adoption of private 5G networks accelerates, as organizations look to improve security and speed
-
MobileSphere SLYGuard secures communications on popular messaging applications
-
MetricStream’s software release measures cyber risk in monetary terms
-
Syxsense Secure protects businesses against the Log4j vulnerability
-
MicroAI Security offers asset protection from cyber security intrusions
-
Stratodesk NoTouch LTS helps IT teams ensure their VDI/DaaS deployment
-
Cobalt Iron Compass EOS allows users to search the entire enterprise backup landscape
-
Home Affairs releases second Critical Infrastructure Bill with leftover obligations
-
Checkmarx KICS integrates into GitLab 14.5 to manage IaC vulnerabilities
-
Teradata releases integrations for Dataiku to speed data and AI initiatives
-
US Senate passes $768 billion defense bill without cyber incident reporting provisions
-
Lightbits Labs partners with Define Tech to accelerate cloud-native deployments
-
Elliptic Labs collaborates with Intel to deliver platform for PC and IoT manufacturers
-
NICE Actimize partners with Sparkling Logic to offer financial crime management strategies
-
Theta Lake introduces free archiving capability for Zoom customers
-
NetWitness partners with Datashield to protect customers from Log4j Java security vulnerability
-
Lightview Capital invests in CyberSheath to protect the federal government supply chain
-
Unisys acquires CompuGain to expand cloud and infrastructure capabilities
-
Workiva acquires AuditNet to empower internal auditors with more technology and resources
-
Kroll acquires Security Compass Advisory to enhance its managed security solutions portfolio
-
ITC Secure and Cassava Technologies bring cloud security solutions to the African market
-
How CrowdStrike Protects Customers from Threats Delivered via Log4Shell
-
Cybersecurity experts debate concern over potential Log4j worm
-
US and Australia enter CLOUD Act agreement for cross-border access to electronic evidence
-
Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft
-
Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft
-
Appaegis raises $7.7M to deliver data-centric zero trust by federating identity and authorization
-
Relentless Log4j Attacks Include State Actors, Possible Worm
-
Build successful data security evaluation criteria with help from your peers
-
Drata announces automated HIPAA compliance to safeguard protected health information
-
Datadobi appoints Charlie Collins as Americas Channel Sales Director
-
AirPods Max 2: Everything We Know One Year After the High-End Headphones Launched
-
Microsoft Spots Multiple Nation-State APTs Exploiting Log4j Flaw
-
After theft of $77.7 million, victim AscendEX to reimburse customers
-
Initial access brokers: How are IABs related to the rise in ransomware attacks?
-
US, Australia Agree to Share Phone, Text Records in Criminal Probes
-
Report: Facebook Could Struggle To Stop Harassment On Its Virtual Reality Platforms
-
Log4j: How to protect yourself from this security vulnerability
-
Analysis: Log4j Vulnerability Highlights the Value of Defense-in-Depth, Accurate Inventory
-
FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine
-
Cyber attack would be most significant financial stability risk, says Fed chair Powell
-
Malicious Exchange Server Module Hoovers Up Outlook Credentials
-
Cybereason Announces Availability of AI-Driven Cybereason XDR and EDR on Google Cloud Marketplace
-
LG Possibly Developing Three New Apple Displays, Including Pro Display XDR With Apple Silicon Chip
-
Checklist for Thinking About Cybersecurity in Connected Vehicles
-
Google Warns That NSO Hacking Is On Par With Elite Spy Groups
-
Apple Releases Swift Playgrounds 4 With Support for Creating Apps on iPad
-
Data privacy and consent engagement platform provider raises $5M
-
New “Hack DHS” program will pay up to $5,000 for discovered vulnerabilities
-
Meta targets user information, database scraping in bug bounty expansion
-
Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw
-
Google Warns That NSO Hacking Rivals Elite Nation State Spies
-
Government Unveils National Cyber Strategy To Protect UK Plc
-
The final report on NOBELIUM’s unprecedented nation-state attack
-
Facebook to Pay Hackers for Reporting Data Scraping Bugs and Scraped Datasets
-
Microsoft: Ransomware ‘access brokers’ now exploiting Log4j vulnerability
-
Just in time for Christmas, Kronos payroll and HR cloud software goes offline due to ransomware
-
Kodachi is the operating system for those who value privacy but don’t want to learn Linux
-
Disney+ Gains SharePlay Support for Watching With Friends on FaceTime Calls
-
Deals: Apple’s 256GB 27-Inch iMac Discounted to Year’s Best Price of $1,399.99 ($399 Off)
-
Here Are All the Apple Deals You Can Still Take Advantage of in Time for Christmas
-
Another US Oil and Gas Company suffers from Ransomware Attack
-
Irani and Chinese State Hackers Exploiting Log4j Vulnerability
-
Quizzes and Other Identity Theft Schemes to Avoid on Social Media
-
Relevant and Extended Detection with SecureX, Part Two: Endpoint Detections
-
Microsoft December 2021 Patch Tuesday fixes an actively exploited zero-day
-
Oregon Medical Group Notifies 750,000 Patients Of Data Breach
-
Pen Test Partners: Anyone could view Gumtree users’ GPS location by pressing F12
-
UK’s New Cyber Strategy Designed to Boost Position as “Global Cyber Power”
-
Grindr Fined €6.5m for Selling User Data Without Explicit Consent
-
Immediate Steps to Strengthen Critical Infrastructure against Potential Cyberattacks
-
Cynet’s MDR Offers Organizations Continuous Security Oversight
-
Patch Tuesday December 2021 – Microsoft Fixes 67 Flaws, Including 6 Zero-Day Vulnerabilities
-
Anubis Android Malware Is Back and It Is Focusing on Financial Institutions
-
Immediate Steps to Strengthen Critical Infrastructure against Potential Cyberattacks
-
What Does the Defense Department Inspector General Report About Jan. 6 Actually Say?
-
Starting From Scratch: How to Build a Small Business Cybersecurity Program
-
Kryptowire Collaborates With Orange and Finds Vulnerabilities in Mobile Devices
-
Apple TV Just Got More Screen Savers, Here’s How to Get Them on Your Mac
-
Accelerate Troubleshooting, Forensics and Response With Fast and Efficient Search
-
CrowdStrike Falcon Detects 100% of Attacks in New SE Labs EDR Test, Winning Highest Rating
-
Recent Ransomware Trends Reinforce the Need for Cyber Hygiene, Collaboration
-
Volatile and Adaptable: Tracking the Movements of Modern Ransomware
-
UK’s New Cyber Strategy Designed to Boost Position as ‘Global Cyber Power’
-
The Biggest Deepfake Abuse Site Is Growing in Disturbing Ways
-
Hackers Using Malicious IIS Server Module to Steal Microsoft Exchange Credentials
-
Iran-linked Seedworm APT targets Telecoms organizations across the Middle East and Asia
-
IIS Extensible Web Server Used to Steal Microsoft Exchange Credentials
-
Problematic Log4j Functionality Disabled as More Security Issues Come to Light
-
Log4Shell: A new fix, details of active attacks, and risk mitigation recommendations
-
Nation State Threat Group Targets Airline with Aclip Backdoor
-
Log4j flaw: Now state-backed hackers are using bug as part of attacks, warns Microsoft
-
Apple Releases ‘Tracker Detect’ For Android AirTag Detection
-
Sysdig lands $350M for ‘end-to-end’ cloud and container security
-
Product showcase: Is Crystal Eye XDR the most comprehensive security platform on the market?
-
Apple Removes All References to Controversial CSAM Scanning Feature From Its Child Safety Webpage
-
iOS 15.2 Makes It Easier to Reset Your Locked Device Without Needing a Computer
-
Opening Of Email Attachment Led To HSE Cyber Attack, Report Finds
-
Singapore-South Korea digital economy deal to sync up on data, payments
-
Microsoft Issues Windows Update to Patch 0-Day Used to Spread Emotet Malware
-
Leveraging AIOps for a holistic view of network performance and security
-
Meet the Karakurt hacking group that is into data exfiltration and extortion
-
Ransomware Affiliate Arrested for Selling Stolen Data of 300 Million People
-
How healthcare providers handle safeguards to protect payment and PII
-
Second Log4j Vulnerability (CVE-2021-45046) Discovered — New Patch Released
-
Why are data professionals investing in data governance programs?
-
HR Management Firm Kronos Needs Weeks to Recover From Ransomware Attack
-
Anomali Appoints Cybersecurity Industry Veteran Karen Buffo as Chief Marketing Officer
-
Arcfield Appoints Kevin Kelly as Chairman and CEO, Announces New Company Name
-
Open Source Tamper-Proof Database immudb Now Capable of Serving as Main Transactional Database
-
Australia to establish youth advisory council for countering online child exploitation
-
The cyber risk future doesn’t look good, but organizations are ready
-
Cohesity Security Advisor uncovers cyber exposures and blind spots in customer environments
-
PingOne Authorize delivers enhanced authorization capabilities for enterprises
-
EXPLAINER: The Security Flaw That’s Freaked Out the Internet
-
NETSCOUT UCaaS capabilities optimize WFH/hybrid workforce models
-
SynSaber announces closed beta of palm-sized threat sensors for industrial asset security
-
Tufin Security Policy Builder App automates corporate security access policies
-
Pondurance Cyber Risk Assessments analyze and visualize potential cybersecurity gaps
-
Chinese, Iranian State Hackers Exploiting Log4j Flaw: Mandiant
-
Cisco’s Ash Devata on Securing the Hybrid Workforce With Zero Trust
-
Bitwarden releases free families program for enterprise customers
-
ANNKE adds human and vehicle detection to its C800 security camera series
-
Report: 83% of IT professionals can’t guarantee infrastructure is safe from ex-employees
-
Orion Corporation selects Infosys to transform its ERP and planning platforms
-
IBM partners with Samsung to deliver vertical transistor architecture for the semiconductor industry
-
LexisNexis Risk Solutions and Shift Technology bring new tool for automating claims processing
-
Veritone collaborates with Snowflake to provide AI-powered data cloud for enterprises
-
In 2022, Expect More Supply Chain Pain and Changing Security Roles
-
FileCloud raises $30M to accelerate innovation and global market expansion
-
ClosingLock acquires SafeWire to combat fraud in real estate transactions
-
Silver Lake invests €344M in Software AG to accelerate the company’s growth
-
ActZero partners with Measured Analytics and Insurance to detect all types of cybersecurity threats
-
Apache takes off, nukes insecure feature at the heart of Log4j from orbit with v2.16
-
CISA orders federal civilian agencies to patch Log4j vulnerability and 12 others by December 24
-
Attackers Target Log4J to Drop Ransomware, Web Shells, Backdoors
-
Ground Labs Research Reveals 71% of American Consumers are Unaware of Data Protection Laws
-
Tufin Introduces Security Policy Builder (SPB) App to Marketplace
-
QuickCode.ai raises $2M to improve efficiencies and accuracy in ML development pipelines
Generated on 2021-12-16 23:55:25.058108