-
Cyber Defense Magazine – January 2022 has arrived. Enjoy it!
-
US NCSC and DoS share best practices against surveillance tools
-
Flubot Malware Targeting Users by Masquerading as Adobe Flash Player
-
iProov Announces $70M Investment from Sumeru Equity Partners
-
CSI Partners with NYDIG to Provide Financial Institutions Simple, Secure Access to Bitcoin
-
January 6, the Afghanistan Withdrawal and the Future of U.S. Counterterrorism
-
Swiss army asks its personnel to use the Threema instant-messaging app
-
Today Marks 15 Years Since Steve Jobs Unveiled the Original iPhone
-
Gurman: New iPhone SE and More Likely at Apple Event in March or April
-
Russian submarines threatening undersea cables, UK defence chief warns
-
SonicWall’s Email Security and Firewall Products Were Hit by the Y2K22 Bug
-
Week in review: Discussing cybersecurity with the board, APT-style attacks, Patch Tuesday forecast
-
Experts predict the disappearance of passwords before the end of the decade
-
Avira Antivirus Introduces Crypto Mining To Its 500M Customers
-
Report: 45% of all federal employees teleworked in fiscal 2020
-
Digital Tool Estimates Software Firewall Credits for Your Environment
-
15 Features the Original iPhone Didn’t Have When First Announced
-
Top Stories: iPhone 14 Pro Without Notch, AirPods Pro 2, and More for 2022
-
North Korea-linked APT group Konni targets Russian Federation’s Ministry of Foreign Affairs
-
LucidLink announces leadership appointments to support company’s growth
-
Unauthenticated RCE in H2 Database Console is similar to Log4Shell
-
Lawsuit: Facebook Promoted Violent Content And Helped Extremists Plan Murder
-
An Optimistic Outlook for 2022: Cloud Security Vulnerabilities Are 100% Preventable
-
$50 Million Lost to Fraudsters Impersonating as Broker-Dealers
-
Crypto Firm Arbix Identified as a Rug Pull After Scamming $10 Million From Investors
-
FBI warns of hackers mailing malicious USB drives to spread ransomware
-
FluBot malware continues to evolve. What’s new in Version 5.0 and beyond?
-
Tesla owner says he mines up to $800 a month in cryptocurrency with his car
-
Alfer Microsoft, also SonicWall confirmed that its products were affected by Y2K22 bug
-
WebSpec, a formal framework for browser security analysis, reveals new cookie attack
-
NHS Warns of Hackers Targeting Log4j Flaws in VMware Horizon
-
Facebook Launches ‘Privacy Center’ to Educate Users on Data Collection and Privacy Options
-
You Might Be A Victim Of Google Voice Scam, Here’s How To Protect Your Account
-
Medical Review Institute of America Notifies Patients of Data Breach
-
Dun & Bradstreet Announces Conditional Notice of Redemption for Existing Senior Secured Notes
-
Honda cars in flashback to 2002 – “Can’t Get You Out Of My Head”
-
Fuze enhances productivity and collaboration across distributed teams
-
NetApp appoints Elizabeth O’Callahan to Chief Legal Officer and General Counsel
-
Datadog and AWS join forces to develop and deliver tighter product alignment in the future
-
“Owning Your Identity” Through Biometric and Passwordless Innovations
-
FIN7 group continues to target US companies with BadUSB devices
-
Kirk A. Law joins Cohesity as SVP of research and development
-
Ransomware attacks Finalsite, renders 8,000 school sites unreachable for days
-
FlexBooker apologizes for breach of 3.7 million user records, partial credit card information
-
NHS Warns of Attackers Targeting Log4j Flaws in VMware Horizon
-
The Importance of Physical Security to Safeguard Your Cybersecurity
-
Skimmer Supply Chain Attack On 100 Sotheby’s Real Estate Sites
-
Preventing Hackers From Pilfering Another Million Business Customers
-
Attackers Hitting VMWare Horizon Servers With Log4j Exploits
-
Iranian immigrant lost $53,000 in crypto hack, says he faces ruin if BitMart doesn’t pay him back
-
Ransomware attack on FinalSite still disrupting email services at thousands of schools
-
Norton 360 wants to pay you a pittance to mine Ethereum cryptocurrency
-
Codex Exposed: Exploring the Capabilities and Risks of OpenAI’s Code Generator
-
Norton antivirus installs cryptominer on devices but there is a way out
-
Protect Your Privacy & Improve Your Pentesting in 2022 with Predator-OS>
-
Why You Need an Adversary-focused Approach to Stop Cloud Breaches
-
2022: The threat landscape is paved with faster and more complex attacks with no signs of stopping
-
Victims of the $200 million BitMart hack say the crypto exchange still hasn’t paid them back
-
Sophisticated phishing scheme spent years robbing authors of their unpublished work
-
Log4Shell-like security hole found in popular Java SQL database engine H2
-
Bitcoin Prices Fall To Lowest In Months After US Fed Remarks
-
Google and Facebook fined $240 million for making cookies hard to refuse
-
Russian IT business will increase spending on data protection in the new year
-
Ransomware attack on Finalsite shuts down numerous Universities and Schools in US
-
Army to Deploy Virtual Reality Capabilities to Combat Sexual Assault
-
Log4j flaw: Attackers are targeting Log4Shell vulnerabilities in VMware Horizon servers, says NHS
-
Threat actor targets VMware Horizon servers using Log4Shell exploits, UK NHS warns
-
Purple Fox Backdoor Identified in Malicious Telegram Installers
-
Hackers Use Video Players in Websites to Steal Sensitive User Information
-
The Most Important Security Takeaway from the October Facebook Outage
-
Google acquisition of Siemplify is a knockout punch for standalone SOAR
-
Attack Misuses Google Docs Comments to Spew Out “Massive Wave” of Malicious Links
-
Cyber Ninjas Faces Fine Over Arizona Election Review Records
-
Ransomware Attack Suffered by FinalSite Shuts Down Thousands of Websites
-
New Report Shows that Threat Actors Use Google Docs Comment Feature to Send Malicious Links
-
Polish Leader Admits Country Bought Powerful Israeli Spyware
-
California Man Pleads Guilty Over Role in $50 Million Fraud Scheme
-
Thousands of School Websites Go Offline Due to Ransomware Attack on Finalsite
-
Norton Crypto, the controversial cryptomining feature of Norton 360
-
Application Control 101: Definition, Features, Benefits, and Best Practices
-
Transferring Quantum Maestro Knowledge and Delivering Real-World Experience
-
Chinese scientist pleads guilty to stealing US agricultural tech
-
Thousands of Schools Impacted After IT Provider Hit by Ransomware
-
Log4Shell-like Critical RCE Flaw Discovered in H2 Database Console
-
Over 3.7 million accounts were compromised in the FlexBooker data breach
-
Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows ?
-
France Fines Google, Facebook €210 Million Over Privacy Violating Tracking Cookies
-
Countries that were less affected than U.S. by cyberattacks could see more of them in 2022: Analyst
-
Data of 1.1m accounts from 17 companies compromised in Cyber Attacks
-
China’s next regulatory target — algorithms, the secret of many tech giants’ success
-
Elephant Beetle Hacking Group Attack Organizations To Steal Financial Data
-
Night Sky, a new ransomware operation in the threat landscape
-
Network and security teams must collaborate to successfully deliver digital transformation
-
More Than 1.3 Million People Affected by Broward Health Data Breach
-
C5 Acquisition Corporation Announces Pricing of $250 Million Initial Public Offering
-
Spok Rated as #1 Secure Healthcare Provider Communications Platform for the Fifth Consecutive Year
-
Approov Named CyberSecured Award Winner for Best-In-Class Mobile API Threat Protection
-
Enterprise PKI automation: The modern approach to certificate lifecycle management
-
2022-01-05 – TA551 (Shathak) pushes IcedID (Bokbot) with Cobalt Strike
-
Rights Group Verifies Polish Senator Was Hacked With Spyware
-
Illinois fertility clinic, online pharmacy giant Ravkoo report data breaches
-
Log4Shell log4j Remote Code Execution – The COVID of the Internet
-
Appeals court deals another blow to Biden’s contractor vaccine mandate
-
JFrog researchers find JNDI vulnerability in H2 database consoles similar to log4shell
-
Facebook Restores Account Of Conservative Book Publisher After Permanently Banning It
-
Cybersecurity Outlook 2022: Third-party, Ransomware and AI Attacks Will Get Worse
-
North Korea-linked Konni APT targets Russian diplomatic bodies
-
There’s massive opportunity for cybersecurity, says Crowdstrike CEO
-
Forest Service partners on development of handheld spectrometer
-
Counties in New Mexico, Arkansas begin 2022 with ransomware attacks
-
Hackers are sending malicious links through Google Doc comment emails
-
There are some opportunities in security and cloud stocks, says Stephanie Link
-
White House Developing Digital, Community-Oriented Health Care Service
-
Tech use in courts skyrockets, challenging those without internet access, study finds
-
Maintaining zero trust over time: Why set-it and forget-it won’t work
-
Counties in New Mexico, Arkansas dealing with ransomware attacks to start 2022
-
Biometric Face Authentication Firm iProov Takes $70M Investment
-
New Mexico’s Bernalillo County Investigates Ransomware Attack
-
Activision Files Unusual Lawsuit over Call of Duty Cheat Codes
-
Convergence Zone: CNAPP Aids in Integrated Cloud-Native Security
-
Threat actors stole 1.1 million customer accounts from 17 well-known companies
-
The Chatter Podcast: Violence on Capitol Hill with Joanne Freeman
-
Report: $2.2 billion in cryptocurrency stolen from DeFi platforms in 2021
-
Report: $2.2 Billion In Cryptocurrency Stolen From DeFi Platforms In 2021
-
iPhone Malware Tactic Causes Fake Shutdowns To Enable Spying
-
Hacking Group Targets Old Java Applications To Break Into Networks
-
Warning: Log4j Still Lurks Where Dependency Analysis Can’t Find It
-
Your backups can save you from ransomware. But how do you protect your backups?
-
Mafia Fugitive Captured After 20 Years, Thanks To Google Street View
-
GAO uses uses covert testing scheme to assess SBA screening processes
-
$2.2 billion in cryptocurrency stolen from DeFi platforms in 2021: report
-
Rethinking Cybersecurity Jobs as a Vocation Instead of a Profession
-
Log4j flaw hunt shows how complicated the software supply chain really is
-
Partially Unpatched VMware Bug Opens Door to Hypervisor Takeover
-
North Korean Hackers Start New Year with Attacks on Russian Foreign Ministry
-
France hits Google, Facebook with fines over ‘Cookies’ management
-
Apple iPhone Malware Tactic Causes Fake Shutdowns to Enable Spying
-
Assessing Domestic Violent Extremism One Year After the Capitol Siege
-
Hackers take over 1.1 million accounts by trying reused passwords
-
Securing Web Applications and APIs With Confidence [Webinar Sign-up]
-
This sneaky hacking group targets old Java applications to break into networks
-
Senators Ask DHS, DOT About Transportation Infrastructure Cybersecurity
-
Microsoft Announces Zero-Touch Onboarding for ‘Defender for Endpoint’ on iOS
-
IoT ethics must factor into privacy and security discussions
-
Hybrid Multicloud Strategies Are Keeping the Public Sector at the Forefront of Threat Mitigation
-
The Second Building Block for the SOC of the Future: An Open Integration Framework
-
S3 Ep64: Log4Shell again, scammers keeping busy, and Apple Home bug [Podcast + Transcript]
-
Integrating Perimeter and Internal Defenses: 5 Facts That May or May Not Surprise
-
Intercepting 2FA: Over 1200 man-in-the-middle phishing toolkits detected
-
Researcher Detects 70 Web Cache Poisoning Vulnerabilities, Gets $40k in bug bounty rewards
-
Purple Fox Rootkit Discovered In Malicious Telegram Installers
-
Hackers Hit Major Portuguese Media Group, Take Down Websites
-
Customer Accounts from 17 Firms Were Stolen by Hackers in Credential Stuffing Attacks
-
‘Elephant Beetle’ Threat Actor Is Stealing Money from Companies
-
Card skimmers strike Sotheby’s in Brightcove supply chain attack
-
Look-Alike Letters Lead Users to Lose Moola – Intego Mac Podcast Episode 221
-
Chemicals Company Element Solutions Discloses Cybersecurity Incident
-
NIST Cybersecurity Framework: A Quick Guide for SaaS Security Compliance
-
Your cybersecurity training needs improvement because hacking attacks are only getting worse
-
New Trick Could Let Malware Fake iPhone Shutdown to Spy on Users Secretly
-
Wells Fargo initiates CrowdStrike at overweight, says struggling stock can jump 50%
-
Crypto Firm Pulls the Rug from Under Investors with $10m Scam
-
Attack on UK’s Defence Academy Compelled a Rebuild of the IT System
-
Artificial Intelligence cuts down packaging issues for Amazon
-
VMware Patches Important Bug Affecting ESXi, Workstation and Fusion Products
-
Five tips on how to stay (cyber)secure in a hybrid work world
-
Federal agencies highlight security improvements a year after Capitol attack
-
Google Releases New Chrome Update to Patch Dozens of New Browser Vulnerabilities
-
The Log4j debacle showed again that public disclosure of 0-days only helps attackers
-
Bridging the “front and back of the house”: A lesson in risk management
-
Key Considerations for Canada’s Forthcoming National Cyber Security Strategy
-
Mobile security software market to reach $2.75 billion by 2025
-
Experts uncover Elephant Beetle, an organized financial-theft operation
-
The Best of Both Worlds: Pairing Tripwire ExpertOps with Technical Account Management
-
Ivanti Neurons for IIoT automates and optimizes supply chain operations
-
VanDyke Software increases productivity with beta releases of SecureCRT 9.2 and SecureFX 9.2
-
Signal Foundation owner says Telegram is not as secure as it claims
-
Attivo Identity Detect & Response Wins Triple 2021 Platinum ‘ASTORS’
-
HUB Security provides quantum security solution for Israeli Ministry of Defense
-
NETSCOUT partners with AWS to help migrate ENGIE IT’s workloads
-
Linksys Hydra Pro 6 offers improved network efficiency for hybrid work era
-
VMware fixed CVE-2021-22045 heap-overflow in Workstation, Fusion and ESXi
-
Miro raises $400M to accelerate innovation through visual collaboration
-
Movandi collaborates with Doosan Group to meet growing global demand for 5G mmWave connectivity
-
StrikeForce and Aite-Novarica develop a framework for secure video conferencing
-
Jesper Frederiksen joins Lacework as General Manager for EMEA
-
What You Need to Know About the Predator-OS 20.04 LTS Release>
-
Season’s cheatings: Online scams against the elderly to watch out for
-
You better have patched those Log4j holes or we’ll see what a judge has to say – FTC
-
Amazon Partners With Stellantis For Vans, Rivian Stock Plunges
-
Facebook Restores Account Of Conversative Book Publisher After Permanently Banning It
-
New Attack Campaign Exploits Microsoft Signature Verification
-
Cloud video platform abused in web skimmer attack against real estate sites
-
Uber Bug, Ignored for Years, Casts Doubt on Official Uber Emails
-
NY AG: 1.1M Online Consumer Accounts Found Compromised in Credential-Stuffing Attacks
-
Cybersecurity pullback a result of high valuations, still great fundamentals, says Jefferies’ Thill
-
The Battle to Keep PvP Games Fair and Out of the Hands of Hackers
-
Kazakhstan leaders shut down internet amid gas price protests
-
Which Cloud Strategy Is Right For My Organization’s Security Needs?
-
FTC: Companies Could Face Legal Action for Failing to Patch Log4j
-
US Army journal’s top paper from 2021 says Taiwan should destroy TSMC if China invades
-
NY AG notifies 17 companies of breaches, says 1.1 million accounts compromised in attacks
-
Zloader Banking Malware Exploits Microsoft Signature Verification
-
Watch CNBC’s full interview with BlackBerry CEO John Chen on expanding into cybersecurity
-
Behind the scenes: A day in the life of a cybersecurity curriculum director
-
MalSmoke attack: Zloader malware exploits Microsoft’s signature verification to steal sensitive data
-
MicroStrategy enhances security, embedded analytics features
-
Activision Sues And Unmasks Alleged Call Of Duty: Warzone Cheat Sellers
-
9-year-old Windows flaw abused to drop ZLoader malware in 111 countries
-
FTC threatens “legal action” over unpatched Log4j and other vulns
-
Researcher Release Report on Internet of Things and Malware Security
-
Hackers exploit old Microsoft Vulnerability to drop Zloader Malware
-
Alphabet Senior Management Awarded Stock Options, Salary Rises
-
2022-01-04 – Remcos RAT infection from Excel file with macros
-
Web Application Security Driven by WAF is Favoring Organizations
-
Do the Legal Rules Governing the Confidentiality of Cyber Incident Response Undermine Cybersecurity?
-
Heimdal™ Security Threat-Hunting Journal: End of the Year Wrap-up in Malware
-
Remember Norton 360’s bundled cryptominer? Irritated folk realise Ethereum app is tricky to delete
-
Reserve Bank warns Aussies over punting on ‘fad driven’ cryptocurrencies.
-
Malicious Telegram Messenger App Using New Purple Fox Malware to Hack PCs
-
Welcome McAfee Forward—the Future of Online Protection Today
-
Defense Contractors Must do More to Conceal Their Attack Surface
-
CrowdStrike Incorporates Intel CPU Telemetry Into Falcon Sensor
-
FTC warns legal action against businesses who fail to mitigate Log4J attacks
-
Xage lands $30M to bring identity security to ‘real world’ infrastructure
-
Researchers Uncover Hacker Group Behind Organized Financial-Theft Operation
-
Cloud Video Platform Used By Cybercriminals to Steal Payment Information
-
$10m of funds goes missing in what appears to be a cryptocurrency rug-pull
-
Careful! Uber flaw allows anyone to send an email from uber.com
-
China Mobile Enjoys Successful Shanghai IPO After NYSE Delisting
-
China moots additional security rules for apps that influence public opinion
-
Malsmoke hackers abuse Microsoft signature verification in ZLoader cyberattacks
-
Morgan Stanley agrees to $60 million settlement in data breach lawsuit
-
Purple Fox rootkit discovered in malicious Telegram installers
-
FTC: Patch Log4j Vulnerability to Avoid Potential Legal Action
-
Google Patches 48 Vulnerabilities With First Set of 2022 Android Updates
-
The US Federal Trade Commission (FTC) Urges Companies to Secure Consumer Data
-
DatPiff Data Breach Has an Impact on Millions of People, Have I Been Pwned Warns
-
New Zloader Banking Malware Campaign Exploiting Microsoft Signature Verification
-
British Classified Ad Site Gumtree Exposed Users’ Private and GPS Location in Data Breach
-
Lapsus$ Ransomware Gang Hacked Portugal’s Largest Media Conglomerate
-
SEGA’s Europe Security : AWS S3 Bucket Exposed Provides Steam API Access
-
UK’s Information Commissioner Starts New Role Amid Major Changes
-
Threat actors continue to exploit Log4j flaws in their attacks, Microsoft Warns
-
How can SMBs extend their SecOps capabilities without adding headcount?
-
CredNinja – Test Credential Validity of Dumped Credentials or Hashes
-
Malware Reverse Engineering for Beginners – Part 1: From 0x0
-
Hackers Target Real Estate Websites with Skimmer in Latest Supply Chain Attack
-
Researchers used electromagnetic signals to classify malware infecting IoT devices
-
China says apps that could influence public opinion require a security review
-
Services Australia brushes off vulnerability concerns in COVID-19 digital certificates
-
CrowdStrike Incorporates Intel CPU Telemetry into Falcon Sensor
-
SMBs should consider new approaches for increasing their cybersecurity posture
-
Microsoft Warns of Continued Attacks Exploiting Apache Log4j Vulnerabilities
-
CynergisTek Finishes Year Strong, Closes Largest 2-Year Managed Service Contract for 2021
-
Tips, Advice, and Insights on Achieving Buy-in for Cybersecurity Projects
-
Embedded hypervisor software market to reach $1.16 billion by 2026
-
NetFay Peer-to-Peer Encrypted Private Data Platform ensures personal data privacy
-
Finite State’s binary analysis enhances automated zero-day vulnerability detection
-
CloudCover App provides executives with real-time visibility into their network security
-
The Evolution of Robotic Dogs: Where Is Cyber Fido Headed Next?
-
TD SYNNEX partners with MicroStrategy to provide end-to-end enterprise analytics solutions
-
NETGEAR announces business products for SMBs and home offices
-
Comcast releases WiFi 6E Gateway to boost capacity for connected home devices
-
2022-01-03 – Pcap from web server with log4j attempts and lots of other probing/scanning
-
FTC to pursue companies that expose customer data due to not patching Log4j
-
Chinese tech companies must undergo government cyber review to list overseas
-
Instagram and teens: A quick guide for parents to keep their kids safe
-
2021 in Review, Part 4: 5 Cybersecurity Topics to Watch in 2022
-
(ISC)² appoints John Giddings as VP of Global Customer Experience
-
HUMAN Security raises $100M to accelerate expansion into new markets
-
Blackbaud acquires EVERFI to offer innovation and data-driven social impact for customers
-
CompuGain collaborates with Rafay Systems to enhance secure Kubernetes implementations
-
OPM disputes 2021 court ruling on firing feds for poor performance
-
VIQ Solutions hires Jayne Perry as Managing Director for United Kingdom and EMEA
-
Avoid being held captive by ransomware with secure, reliable backups
-
Google makes the perfect case for why you shouldn’t use Chrome
-
Report: Facebook Allowed Misinformation To Flourish Ahead Of Jan. 6 Attack
-
Attackers Exploit Log4j Flaws in Hands-on-Keyboard Attacks to Drop Reverse Shells
-
EFF Condemns the Unjust Conviction and Sentencing of Activist and Friend Alaa Abd El Fattah
-
Bug in backup software results in loss of 77 terabytes of research data at Kyoto University
-
Over 20 years of employee data leaked during McMenamins ransomware attack
-
SEGA’s Sloppy Security Confession: Exposed AWS S3 Bucket Offers Up Steam API Access & More
-
Persistence without “Persistence”: Meet The Ultimate Persistence Bug – “NoReboot”
-
White House renews efforts to improve integrity of federal payments
-
Google acquires Israeli cybersecurity company Siemplify for $500 million
-
Upskilling, better training keys to increasing cyber talent pool
-
Driverless Car Trial For Milton Keynes By Month End – Report
-
First Microsoft Pluton-powered Windows 11 PCs to start rolling out this year
-
EFF Condemns the Unjust Conviction and Sentencing of Activist and Friend Alaa Fatttah
-
What you need to know about how cryptography impacts your security strategy
-
SlimPay fined €180k after 12 million customers’ bank data publicly accessible for 5 years
-
China Data Security Law bars online companies with 1 million users
-
Google Cloud acquires Siemplify for boosting security operations
-
Cyber Insurance Firm Corvus Expands With Acquisition of UK-Based Tarian
-
Saltzer Health Informs Patients of Personal Information Exposure
-
Vinnie Liu Has a Mission: Keeping People Safe Online and Offline
-
Attackers abused cloud video platform to inject an e-skimmer into 100 Real Estate sites
-
Microsoft Fixes Y2K22 Exchange Bug That Crashed Servers Worldwide
-
John Edwards Takes The Reins At The UK’s Data Protection Watchdog
-
Japanese Organizations Are Now the Targets of BlackTech APT Group
-
Twitter Permanently Suspends Republican Marjorie Taylor Greene
-
Online privacy: DuckDuckGo just finished a banner year and looks for an even better 2022
-
Palo Alto Networks Appoints Helmut Reisinger to Leadership Team
-
Log4j Remediation Rules Now Available for WhiteSource Renovate and Enterprise
-
SAILFISH System to Find State-Inconsistency Bugs in Smart Contracts
-
Rethinking “Rules of the Road” to Stabilize U.S.-China Competition
-
Malicious Telegram Installers Used to Spread Purple Fox Rootkit
-
Serious Vulnerability Allows Phishing Emails to Be Sent From Uber.com Domain
-
Log4j flaw attacks are causing lots of problems, Microsoft warns
-
Unpatched HomeKit Vulnerability Exposes iPhones, iPads to DoS Attacks
-
John Edwards takes the reins at the UK’s data protection watchdog
-
Purple Fox backdoor spreads through fake Telegram App installer
-
Broward Health data breach exposes data of 1,357,879 individuals
-
Skimmer Injected Into 100 Real Estate Websites via Cloud Video Platform
-
Researchers Detail New HomeKit ‘doorLock’ Bug Affecting Apple iOS
-
Watch Out! You Might Get Hacked When Copy-Pasting Commands from Webpages
-
China to make some firms undergo a data security review before listing overseas
-
Cyberattack against UK Ministry of Defence training academy revealed
-
The Best Cyber Security Blogs You Should Follow [Updated 2022]
-
Implementing Cloud Governance as a Code Using Cloud Custodian
-
Hospitality Chain McMenamins discloses data breach after ransomware attack
-
Looking for adding new detection technologies in your security products?
-
Parliamentary security committee review backs the operation of controversial TOLA Act
-
Beware of Fake Telegram Messenger App Hacking PCs with Purple Fox Malware
-
Broward Health suffered a data breach that impacted +1.3 million people
-
Insider threat does not have to be malicious, so how do you protect your organization?
-
Chinese Hackers Using Log4Shell Exploit Tools to Perform Post-Exploitation Attacks
-
Senate committee wants foreign interference social media reporting rules by next Australian election
-
Healthcare cloud infrastructure market size to reach $142 billion by 2028
-
NSWEC finds iVote system failure may have impacted three local election outcomes
-
Breaking the habit: Top 10 bad cybersecurity habits to shed in 2022
-
Arlo Technologies partners with Matter to provide home security solutions for customers
-
Why Assessing Security Risk in Compute Lifecycle Development Should Be a Community Effort
-
Facebook Suspends Controversial Politician For 24 Hours, Leading To Accusations Of Censorship
-
CISOs Plan What to Buy With Funds From the Infrastructure Bill
-
‘doorLock’ – A persistent denial of service flaw affecting iOS 15.2 – iOS 14.7
-
Cross-Border Access to User Data by Law Enforcement: 2021 Year in Review
-
Data breach: Broward Health warns 1.3 million patients, staff of ‘medical identity theft’
-
CrowdStrike Beefs Up Exploit Detection With Intel CPU Telemetry
-
Hospitality Chain Says Employee Data Stolen in Ransomware Attack
-
Broward Health Warns 1.3 Million Patients, Staff Of Medical Identity Theft After Data Breach
-
January 6 Committee Gets Inside Trump’s West Wing Wall Of Obstruction
-
How Data Analytics and AI Solve the Toughest Global Problems
-
Log4j Highlights Need for Better Handle on Software Dependencies
-
Jerusalem Post and Maariv hacked on Gen. Soleimani’s death anniversary
-
IoT’s Importance is Growing Rapidly, But Its Security Is Still Weak
-
Multilingual Cybersecurity Awareness Training adapted for your needs
-
Los Angeles offers security app to safeguard public WiFi users
-
Shopping Platform PulseTV Discloses Potential Breach Impacting 200,000 People
-
Israeli Media Outlets hacked on the anniversary of Soleimani killing
-
The US Healthcare Sector: Target to Multiple Breaches Last Year
-
Everything You Need To Know About Ransomware Attacks and Gangs In 2022
-
Quantum Computing Is for Tomorrow, But Quantum-Related Risk Is Here Today
-
SEGA Europe left AWS S3 bucket unsecured exposing data and infrastructure to attack
-
Backup Error Results in Kyoto University Losing 77TB of Research Data
-
Multiple Vulnerabilities Impact Netgear Nighthawk R6700 Routers
-
Vulnerabilities In ENC DataVault Software Impact Multiple Storage Devices
-
Israeli Media Outlets Hacked on Soleimani Killing Anniversary
-
Cybersecurity M&A Roundup: 35 Deals Announced in December 2021
-
Detecting Evasive Malware on IoT Devices Using Electromagnetic Emanations
-
Potential 200,000 Credit Cards’ Compromise Disclosed by PulseTV
-
How to Keep Workloads Secure in the Dynamic Threat Landscape
-
S2W collaborates with INTERPOL to identify and prevent dark web crimes
-
A Vulnerability Allowing Almost Anyone to Send Emails from Uber.com Was Discovered
-
CompuGain partners with Lumigo to strengthen modern application delivery
-
What angered us most about cybersecurity in 2021: Lock and Code S03E01
-
Trying to register your antivirus in Windows Security Center?
-
Microsoft rolled out emergency fix for Y2k22 bug in Exchange servers
-
Why the UK’s energy sector is fragile and ripe to cyber attacks
-
Microsoft Issues Fix for Exchange Y2K22 Bug That Crippled Email Delivery Service
-
Exclusive: NASA Director Twitter account hacked by Powerful Greek Army
-
Fighting For A More Open, Balanced Patent System: 2021 in Review
-
Lapsus$ ransomware gang hits Impresa, Portugal’s largest media conglomerate
-
A Linux Admin’s Getting Started Guide to Improving PHP Security>
-
How to evolve your organization into a data-centric security architecture
-
The Internet is for Everyone to Enjoy—We’re Helping See to It
-
North Korea-linked threat actors stole $1.7 billion from cryptocurrency exchanges
-
Crypto security breaches cause $4.25 billion losses worth of cryptos in 2021
-
Apple Watch’s Life-Saving Potential Highlighted in Suspenseful ‘911’ Ad
Generated on 2022-01-09 23:59:06.678611