-
Ransomware Persists Even as High-Profile Attacks Have Slowed
-
Clop ransomware gang is leaking confidential data from the UK police
-
CVE-2021-44228: Log4j2 Exploitability and Attack Path Mitigation
-
Blurry Ideologies and Strange Coalitions: The Evolving Landscape of Domestic Extremism
-
TellYouThePass ransomware resurges and exploits Log4Shell in recent attacks
-
Singapore holds emergency meetings with CII sectors over Log4j
-
Week in review: Log4Shell updates, Kronos ransomware attack, unused identities threat
-
HSBC partners with IBM to improve security for transactions between banks
-
Apptio collaborates with Microsoft to deliver insights and business management applications for IT
-
It’s About Time: The Unappreciated Fundamental Metric for Security
-
German audio tech giant Sennheiser exposed 55GB of customers’ data
-
Western Digital customers have to update their My Cloud devices to latest firmware version
-
Visualize Attack Paths in Production Environments With ThreatMapper
-
Apache releases new 2.17.0 patch for Log4j to solve denial of service vulnerability
-
2022 Trends In The Convergence Of Cyber And Physical Security
-
So, Your Kids Have Left School. Do You Still Need To Worry About Their Online Safety?
-
Report: IT security teams struggle to mitigate vulnerabilities
-
Rising volume of email fatigue opens doors for Cybercriminals
-
Top Stories: What’s New in iOS 15.2, Universal Control Delayed, and More
-
New Local Attack Vector Expands the Attack Surface of Log4j Vulnerability
-
US distrust of Huawei linked in part to malicious software update in 2012
-
Apache Issues 3rd Patch to Fix New High-Severity Log4j Vulnerability
-
1.8 Million customers of four sports gear sites impacted by credit cards breach
-
Log4Shell Vulnerability Risks for OT Environments — and How You Can Better Protect Against Them
-
Why authorization and authentication are important to API security – and why they’re not enough
-
The State of Security in the UK: Lessons from the NCSC Report
-
Log4j vulnerability opened the door to the ransomware operators
-
SANBlaze SBExpress-RM5 delivers latest-generation validation and compliance testing
-
BehavioSec announces partnership with leading enterprise technology providers
-
HITRUST i1 Assessment addresses information security risks and emerging cyber threats
-
December 2021 Patch Tuesday: AppX Installer Zero-day, Multiple Critical Vulnerabilities
-
Ransomware affects the entire retail supply chain this holiday season
-
Log4j: Conti ransomware attacking VMware servers and TellYouThePass ransomware hits China
-
Friday Squid Blogging: UK Recognizes Squid as Sentient Beings
-
Spider-Man: No Way Home exploited to push phishing and malware scams
-
Kronos ransomware attack impacting government employee paychecks
-
Conti ransomware gang exploits Log4Shell bug in its operations
-
Apple Seeds First Betas of iOS 15.3 and iPadOS 15.3 to Developers
-
NDAA requires DOD to report on prospects for a ‘cyber academy’
-
The US is making plans to replace all of its lead water pipes from coast to coast
-
Deals: Take $300 Off 21.5-Inch iMac and Get $10 Amazon Credit When Buying $100 Apple Gift Card
-
Spider-Man Movie Release Frenzy Bites Fans with Credit-Card Harvesting
-
Citizen Lab Exposes Cytrox as Vendor Behind ‘Predator’ iPhone Spyware
-
Trend Micro Spots Chinese Hackers Targeting Transportation Sector
-
Facebook Bans Surveillance-For-Hire Companies From Its Platforms
-
Malicious Joker App Scores Half-Million Downloads on Google Play
-
‘Notchmeister’ Lets You Decorate the Notch on Your MacBook Pro
-
New Mobile App Security GitHub Action Enables Devs To Easily Test Security
-
Russian Cyberspy Groups Start Exploiting Log4Shell Vulnerability
-
Executive Partnerships Are Critical for Cybersecurity Success
-
As Log4j sent defenders scrambling, this startup made its threat data free
-
Google unleashes security ‘fuzzer’ on Log4Shell bug in open source software
-
CISA: Federal agencies must immediately mitigate Log4J vulnerabilities
-
Security firm Blumira discovers major new Log4j attack vector
-
Best robot toys for kids: LEGO, Raspberry Pi, and other awesome STEM gift ideas
-
Serious Security: OpenSSL fixes “error conflation” bugs – how mixing up mistakes can lead to trouble
-
Timely Questions for Log4j Response Now — And for the Future
-
EFF Continues Legal Fight to Release Records Showing How Law Enforcement Uses Cell-site Simulators
-
Gumtree exposed users’ personal and GPS location via source code
-
Tech woes and fraud top the list of unemployment system issues
-
CISA orders federal agencies to mitigate Log4J vulnerabilities in emergency directive
-
How password troubles could cost your online business potential sales
-
PseudoManuscrypt Malware Targeted Government & ICS Systems in 2021
-
CISA Issues ED 22-02 Directing Federal Agencies to Mitigate Apache Log4j Vulnerabilities
-
Apple Bringing Native Apple Music Experience to Music App for macOS
-
MacRumors Giveaway: Win a Leather City Backpack From Harber London
-
Nozomi Networks and BT Team to Deliver Advanced OT and IoT Cybersecurity to Enterprises Worldwide
-
CISA Issues ED 22-02 Directing Federal Agencies to Mitigate Apache Log4j Vulnerabilities
-
RAF shoots down ‘terrorist drone’ over US-owned special ops base in Syria
-
VMware fixes critical SSRF flaw in Workspace ONE UEM Console
-
Deals: Apple TV HD With New Siri Remote Drops to Record Low Price of $124.98 ($24 Off)
-
Software Patching Statistics: Common Practices and Vulnerabilities [Updated 2021]
-
Is Data Security Worthless if the Data Life Cycle Lacks Clarity?
-
Using Intelligence to Defend Two of the World’s Largest Cities
-
Anubis malware resurfaces targeting crypto wallets and banking apps
-
Facebook Bans 7 ‘Cyber Mercenary’ Companies for Spying on 50,000 Users
-
Backdoor Gives Hackers Complete Control Over Federal Agency Network
-
Facebook Exposes Mercenary Spy Firms That Targeted 50,000 People
-
How COVID-19 made the Zero Trust model the right approach to modernise networks
-
Log4j: Major IT vendors rush out fixes for this flaw and more ahead of Christmas
-
Google unleashes security ‘fuzzer’ on Log4Shell bug in open-source software
-
Hive Ransomware Wreaked Havoc in Four Months: Hundreds of Organizations Breached
-
China Orders Microsoft Bing To Suspend Auto-suggest Function
-
Hackers Using Weaponized IIS Module to Stealing Credentials & Enabling RCE
-
MobileIron Users Targeted in Log4Shell Attacks as Exploit Activity Surges
-
Meta says 50,000 Facebook users may have been spied on by private surveillance firms
-
Encrypt your emails from end to end for a lifetime with this software
-
Cybersecurity: Go from novice to expert with this course bundle
-
Phorpiex botnet is back, in 2021 it $500K worth of crypto assets
-
London Classified Ads Site Gumtree Experiences Data Breach Due to F12 Key
-
Michigan posts statewide dashboard for COVID-19 wastewater monitoring
-
How the bipartisan infrastructure bill could jumpstart mobility on demand
-
This company was hit with ransomware, but didn’t have to pay up. Here’s how they did it
-
How to Prevent Customer Support Help Desk Fraud Using VPN and Other Tools
-
New PseudoManuscrypt Malware Infected Over 35,000 Computers in 2021
-
Feral’s ‘Alien: Isolation’ for iPhone and iPad ‘One of the Best iOS Conversions Ever’
-
Mobile App Developers Keep Fraudulent Traffic at Bay with Anti-Fraud API
-
Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows ?
-
PseudoManuscrypt, a mysterious massive cyber espionage campaign
-
New Phorpiex Botnet Variant Steals Half a Million Dollars in Cryptocurrency
-
Australia and United States enter a Data Sharing CLOUD Agreement
-
Credential stuffing cyber attacks to double up in UK during Christmas
-
Want to assemble a cyber Dream Team? Look back at the ‘92 Olympics
-
Digital IDs don’t have to impinge on civil liberties and privacy
-
Why is a well thought-out approach to cloud migration imperative?
-
ISG Presents 2021 ISG Star of Excellence Awards to Hexaware, Infosys and Rackspace Technology
-
Acuity International Celebrates the Holiday Season with $10,000 Donation to Toys for Tots
-
The “Office of the CISO”: A New Structure for Cybersecurity Governance
-
SAIC Rugged Apps delivers secure commercial applications to government users
-
ForgeRock announces two features to serve all identity types from one platform
-
ShiftLeft’s features identify attackable JavaScript and TypeScript vulnerabilities
-
HUB Security Docker Digital Twin authenticates and verifies incoming Docker traffic
-
Fugue Organization Management streamlines security oversight for large cloud operations
-
Extreme Trusted Delivery protects critical network infrastructure
-
Over Log4j? VMware has another critical flaw for you to patch
-
US Senate passes Bill to ban goods produced from Uyghur forced labour
-
ioSafe 1520+ NAS device offers disaster recovery capabilities for businesses
-
Verifyle partners with NYSIA to protect members from the growing threat of hackers
-
Endace collaborates with LinkShadow to enhance SOC team productivity and reduce threat exposure
-
MSP360 adds Wasabi Object Lock to help MSPs protect cloud-based backups
-
Meta removes accounts of spyware company Cytrox after Citizen Lab report on gov’t hacks
-
MobileIron customers urged to patch systems due to potential Log4j exploitation
-
Anomali appoints Justin Coker as VP and General Manager for EMEA
-
Noname Security raises $135M to help customers mitigate the risk of deploying APIs
-
Cequence Security raises $60M to enhance its API security solutions
-
Wipro acquires LeanSwift Solutions to expand its cloud transformation business
-
Telstra expands its network infrastructure in the United States
-
Honeywell opens security operations center in Europe, based in Romania
-
NSA and CISA Release Final Part IV of Guidance on Securing 5G Cloud Infrastructures
-
Log4Shell (Log4j RCE): Detecting Post-Exploitation Evidence is Best Chance for Mitigation
-
Firefox: Ad blockers are 2021’s most popular browser extensions
-
NSA and CISA Release Final Part IV of Guidance on Securing 5G Cloud Infrastructures
-
Gathering security data for container images using the Pyxis API
-
MacBook Pro Owners Noticing Smoother ProMotion Safari Scrolling After Installing macOS Monterey 12.2
-
EFF to Court: Deny Foreign Sovereign Immunity to DarkMatter for Hacking Journalist
-
LogMeIn To Spin Off LassPass As Separate Cloud Security Firm
-
Anubis Android Malware Found Targeting Nearly 400 Financial Apps
-
CISA director says the LOG4J security flaw is the “most serious” she’s seen in her career
-
CISA adds Log4Shell Log4j flaw to the Known Exploited Vulnerabilities Catalog
-
December 2021: Cyber Deception Month Continues…Halting Holiday Hackers…
-
Crooks injects e-skimmers in random WordPress plugins of e-stores
-
Turn your basic networking and coding skills into in-demand cybersecurity qualifications
-
Meta Ousts 7 Surveillance-for-Hire Operations From Its Platforms
-
LOG4J vulnerability the most serious I’ve seen in my decades-long career, says CISA director
-
Flaws in Lenovo laptops allow escalating to admin privileges
-
Apple Building Chip Team to Bring More Wireless Component Production In-House
-
Privacy, Identity, and Device Protection: Why You Need to Invest in All Three
-
‘PseudoManuscrypt’ Mass Spyware Campaign Targets 35K Systems
-
How organizations should prioritize security vulnerabilities
-
Google Says NSO Pegasus Zero-Click ‘Most Technically Sophisticated Exploit Ever Seen’
-
Ransomware, Trojans, DDoS Malware and Crypto-Miners Delivered in Log4Shell Attacks
-
NSO zero-click iMessage exploit hacks iPhone without need to click links
-
CISA, White House urge organizations to get ready for holiday cyberattacks
-
Microsoft Launch Vulnerable And Malicious Driver Reporting Center
-
Hillrom Addressed A Zero-Day Vulnerability Affecting Its Cardiac Devices
-
Microsoft December Patch Tuesday Out With 67 Bug Fixes Including A Zero-Day Patch
-
Microsoft Teams End-to-End Encryption Now ‘Generally Available’
-
Why ransomware attacks happen out of hours or during the holidays
-
S3 Ep63: Log4Shell (what else?) and Apple kernel bugs [Podcast+Transcript]
-
60% of UK Workers Have Been Victim of a Cyber-Attack, Yet Awareness Remains Low
-
Corellium Lands $25 Million Investment for Virtualization Tech
-
Thousands of Industrial Systems Targeted With New ‘PseudoManuscrypt’ Spyware
-
Grindr fined £5.5m for selling user data to advertising companies
-
Apache Kafka in the Public Sector – Part 5: National Security and Defense
-
Brazil investigates use of staff credentials in cyberattacks against government bodies
-
How to install the ConfigServer and Security Firewall combo on Ubuntu Server
-
Online Shoppers Could Face Eight Million Credential Stuffing Attacks Per Day Over Christmas
-
Panda Security: top rated in AV-Comparatives performance test
-
Another Apache Log4j Bug Discovered – Patch Released – Update (Once Again!)
-
Top 4 cloud misconfigurations and best practices to avoid them
-
Deals: Year’s Best Prices Hit AirPods 2 ($90) and AirPods 3 ($140), But Will Arrive After Christmas
-
SiriusXM Platinum VIP Tier Now Includes 12 Months of Free Apple Music
-
SecurityWeek Announces Virtual Cybersecurity Event Schedule for 2022
-
Dear Congress: It’s Complicated. Please Consider This When Crafting New Cybersecurity Legislation
-
Botnet steals half a million dollars in cryptocurrency from victims
-
While attackers begin exploiting a second Log4j flaw, a third one emerges
-
Apple Rumored to Launch Lower-Priced 24-Inch and 27-Inch External Displays: What to Expect
-
The Collapsed Bridge Loan: Israel’s Shin Bet Location Tracking of Omicron Carriers
-
The Chatter Podcast: From National Security Blogger to Editor of Rolling Stone with Noah Shachtman
-
Log4j flaw: This new threat is going to affect cybersecurity for a long time
-
What Retailers Should Know About Cybersecurity This Holiday Season
-
North American Propane Distributor ‘Superior Plus’ Discloses Ransomware Attack
-
Researchers Uncover New Coexistence Attacks On Wi-Fi and Bluetooth Chips
-
Security awareness gaps identified in the UK according to new Armis study
-
State-sponsored Threat Actors Steal Airline Data Using the Slack API
-
Comprehensive Phishing Study Shows Who Is More Prone to Fall Victim to Phishing Attacks
-
Ory lands $22.5M for zero trust security powered by open source
-
The DHS is inviting hackers to break into its systems, but there are rules of engagement
-
The Guide to Automating Security Training for Lean Security Teams
-
Algorithms are everywhere – what should you know about them?
-
WhiteSource Log4j Detect scans projects to find vulnerable Log4j versions
-
Cobalt Strike Is Being Installed by Emotet for Faster Attacks
-
Variant of Phorpiex botnet used for cryptocurrency attacks in Ethopia, Nigeria, India and more
-
Google: This zero-click iPhone attack was incredible and terrifying
-
Phorpiex botnet is back with a new Twizt: Hijacking Hundreds of crypto transactions
-
Regulator: Venues Must Protect User Privacy During #COVID19 Checks
-
Does the Log4j Vulnerability Affect You? – Intego Mac Podcast Episode 218
-
New Fileless Malware Uses Windows Registry as Storage to Evade Detection
-
Digital Security by Design reinforced through new Government National Cyber Strategy
-
New Scam Emails Purport to Come from NSO Group Hacker – Intego Mac Podcast Episode 218
-
Move fast, break security: Why CISOs must push back against Agile IT
-
Rise in API-Based Attacks Underscore Investments in New Tools
-
National Cyber Strategy will lead to BritChip for mobile devices by 2025, claims UK.gov
-
Owowa, a malicious IIS Server module used to steal Microsoft Exchange credentials
-
Victims awarded $18 million in GirlsDoPorn online video case, boss on the run
-
How to implement security into software design from the get-go
-
Japan draws a LINE: web giants must reveal where they store user data
-
Hackers Begin Exploiting Second Log4j Vulnerability as a Third Flaw Emerges
-
Europe’s quantum communication plans: Defending against state-sponsored cyber attacks
-
Ransomware Attack halts Christmas 2021 paychecks and bonuses
-
Online shopping at risk: Mobile application and API cyber attacks at critical high
-
Microsoft confirms new ransomware family deployed via Log4j vulnerability
-
Digital ID age verification trials for online alcohol purchases in Australia underway
-
(ISC)² Ransomware Study: Collaboration and Communication are Essential for Ransomware Readiness
-
DMARC and the prevention of World Health Organization phishing scams
-
Security priorities are geared toward ongoing remote and hybrid work
-
Hackers Exploiting Log4j2 Vulnerability in The Wild To Deploy Ransomware
-
OAIC determines AFP interfered with privacy of Australians after using Clearview AI
-
Cybersecurity Standards, Ransomware, and Zero Trust: 3 Key Considerations for the UK Government
-
Adoption of private 5G networks accelerates, as organizations look to improve security and speed
-
MobileSphere SLYGuard secures communications on popular messaging applications
-
MetricStream’s software release measures cyber risk in monetary terms
-
Syxsense Secure protects businesses against the Log4j vulnerability
-
MicroAI Security offers asset protection from cyber security intrusions
-
Stratodesk NoTouch LTS helps IT teams ensure their VDI/DaaS deployment
-
Cobalt Iron Compass EOS allows users to search the entire enterprise backup landscape
-
Home Affairs releases second Critical Infrastructure Bill with leftover obligations
-
Checkmarx KICS integrates into GitLab 14.5 to manage IaC vulnerabilities
-
Teradata releases integrations for Dataiku to speed data and AI initiatives
-
US Senate passes $768 billion defense bill without cyber incident reporting provisions
-
Lightbits Labs partners with Define Tech to accelerate cloud-native deployments
-
Elliptic Labs collaborates with Intel to deliver platform for PC and IoT manufacturers
-
NICE Actimize partners with Sparkling Logic to offer financial crime management strategies
-
Theta Lake introduces free archiving capability for Zoom customers
-
NetWitness partners with Datashield to protect customers from Log4j Java security vulnerability
-
Lightview Capital invests in CyberSheath to protect the federal government supply chain
-
Unisys acquires CompuGain to expand cloud and infrastructure capabilities
-
Workiva acquires AuditNet to empower internal auditors with more technology and resources
-
Kroll acquires Security Compass Advisory to enhance its managed security solutions portfolio
-
ITC Secure and Cassava Technologies bring cloud security solutions to the African market
-
How CrowdStrike Protects Customers from Threats Delivered via Log4Shell
-
Cybersecurity experts debate concern over potential Log4j worm
-
US and Australia enter CLOUD Act agreement for cross-border access to electronic evidence
-
Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft
-
Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft
-
Appaegis raises $7.7M to deliver data-centric zero trust by federating identity and authorization
-
Relentless Log4j Attacks Include State Actors, Possible Worm
-
Build successful data security evaluation criteria with help from your peers
-
Drata announces automated HIPAA compliance to safeguard protected health information
-
Datadobi appoints Charlie Collins as Americas Channel Sales Director
-
AirPods Max 2: Everything We Know One Year After the High-End Headphones Launched
-
Microsoft Spots Multiple Nation-State APTs Exploiting Log4j Flaw
-
After theft of $77.7 million, victim AscendEX to reimburse customers
-
Initial access brokers: How are IABs related to the rise in ransomware attacks?
-
US, Australia Agree to Share Phone, Text Records in Criminal Probes
-
Report: Facebook Could Struggle To Stop Harassment On Its Virtual Reality Platforms
-
Log4j: How to protect yourself from this security vulnerability
-
Analysis: Log4j Vulnerability Highlights the Value of Defense-in-Depth, Accurate Inventory
-
FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine
-
Cyber attack would be most significant financial stability risk, says Fed chair Powell
-
Malicious Exchange Server Module Hoovers Up Outlook Credentials
-
Cybereason Announces Availability of AI-Driven Cybereason XDR and EDR on Google Cloud Marketplace
-
LG Possibly Developing Three New Apple Displays, Including Pro Display XDR With Apple Silicon Chip
-
Checklist for Thinking About Cybersecurity in Connected Vehicles
-
Google Warns That NSO Hacking Is On Par With Elite Spy Groups
-
Apple Releases Swift Playgrounds 4 With Support for Creating Apps on iPad
-
Data privacy and consent engagement platform provider raises $5M
-
New “Hack DHS” program will pay up to $5,000 for discovered vulnerabilities
-
Meta targets user information, database scraping in bug bounty expansion
-
Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw
-
Google Warns That NSO Hacking Rivals Elite Nation State Spies
-
Government Unveils National Cyber Strategy To Protect UK Plc
-
The final report on NOBELIUM’s unprecedented nation-state attack
-
Facebook to Pay Hackers for Reporting Data Scraping Bugs and Scraped Datasets
-
Microsoft: Ransomware ‘access brokers’ now exploiting Log4j vulnerability
-
Just in time for Christmas, Kronos payroll and HR cloud software goes offline due to ransomware
-
Kodachi is the operating system for those who value privacy but don’t want to learn Linux
-
Disney+ Gains SharePlay Support for Watching With Friends on FaceTime Calls
-
Deals: Apple’s 256GB 27-Inch iMac Discounted to Year’s Best Price of $1,399.99 ($399 Off)
-
Here Are All the Apple Deals You Can Still Take Advantage of in Time for Christmas
-
Another US Oil and Gas Company suffers from Ransomware Attack
-
Irani and Chinese State Hackers Exploiting Log4j Vulnerability
-
Quizzes and Other Identity Theft Schemes to Avoid on Social Media
-
Relevant and Extended Detection with SecureX, Part Two: Endpoint Detections
-
Microsoft December 2021 Patch Tuesday fixes an actively exploited zero-day
-
Oregon Medical Group Notifies 750,000 Patients Of Data Breach
-
Pen Test Partners: Anyone could view Gumtree users’ GPS location by pressing F12
-
UK’s New Cyber Strategy Designed to Boost Position as “Global Cyber Power”
-
Grindr Fined €6.5m for Selling User Data Without Explicit Consent
-
Immediate Steps to Strengthen Critical Infrastructure against Potential Cyberattacks
-
Cynet’s MDR Offers Organizations Continuous Security Oversight
-
Patch Tuesday December 2021 – Microsoft Fixes 67 Flaws, Including 6 Zero-Day Vulnerabilities
-
Anubis Android Malware Is Back and It Is Focusing on Financial Institutions
-
Immediate Steps to Strengthen Critical Infrastructure against Potential Cyberattacks
-
What Does the Defense Department Inspector General Report About Jan. 6 Actually Say?
-
Starting From Scratch: How to Build a Small Business Cybersecurity Program
-
Kryptowire Collaborates With Orange and Finds Vulnerabilities in Mobile Devices
-
Apple TV Just Got More Screen Savers, Here’s How to Get Them on Your Mac
-
Accelerate Troubleshooting, Forensics and Response With Fast and Efficient Search
-
CrowdStrike Falcon Detects 100% of Attacks in New SE Labs EDR Test, Winning Highest Rating
-
Recent Ransomware Trends Reinforce the Need for Cyber Hygiene, Collaboration
-
Volatile and Adaptable: Tracking the Movements of Modern Ransomware
-
UK’s New Cyber Strategy Designed to Boost Position as ‘Global Cyber Power’
-
The Biggest Deepfake Abuse Site Is Growing in Disturbing Ways
-
Hackers Using Malicious IIS Server Module to Steal Microsoft Exchange Credentials
-
Iran-linked Seedworm APT targets Telecoms organizations across the Middle East and Asia
-
IIS Extensible Web Server Used to Steal Microsoft Exchange Credentials
-
Problematic Log4j Functionality Disabled as More Security Issues Come to Light
-
Log4Shell: A new fix, details of active attacks, and risk mitigation recommendations
-
Nation State Threat Group Targets Airline with Aclip Backdoor
-
Log4j flaw: Now state-backed hackers are using bug as part of attacks, warns Microsoft
-
Apple Releases ‘Tracker Detect’ For Android AirTag Detection
-
Sysdig lands $350M for ‘end-to-end’ cloud and container security
-
Product showcase: Is Crystal Eye XDR the most comprehensive security platform on the market?
-
Apple Removes All References to Controversial CSAM Scanning Feature From Its Child Safety Webpage
-
iOS 15.2 Makes It Easier to Reset Your Locked Device Without Needing a Computer
-
Opening Of Email Attachment Led To HSE Cyber Attack, Report Finds
-
Singapore-South Korea digital economy deal to sync up on data, payments
-
Microsoft Issues Windows Update to Patch 0-Day Used to Spread Emotet Malware
-
Leveraging AIOps for a holistic view of network performance and security
-
Meet the Karakurt hacking group that is into data exfiltration and extortion
-
Ransomware Affiliate Arrested for Selling Stolen Data of 300 Million People
-
How healthcare providers handle safeguards to protect payment and PII
-
Second Log4j Vulnerability (CVE-2021-45046) Discovered — New Patch Released
-
Why are data professionals investing in data governance programs?
-
HR Management Firm Kronos Needs Weeks to Recover From Ransomware Attack
-
Anomali Appoints Cybersecurity Industry Veteran Karen Buffo as Chief Marketing Officer
-
Arcfield Appoints Kevin Kelly as Chairman and CEO, Announces New Company Name
-
Open Source Tamper-Proof Database immudb Now Capable of Serving as Main Transactional Database
-
Australia to establish youth advisory council for countering online child exploitation
-
The cyber risk future doesn’t look good, but organizations are ready
-
Cohesity Security Advisor uncovers cyber exposures and blind spots in customer environments
-
PingOne Authorize delivers enhanced authorization capabilities for enterprises
-
EXPLAINER: The Security Flaw That’s Freaked Out the Internet
-
NETSCOUT UCaaS capabilities optimize WFH/hybrid workforce models
-
SynSaber announces closed beta of palm-sized threat sensors for industrial asset security
-
Tufin Security Policy Builder App automates corporate security access policies
-
Pondurance Cyber Risk Assessments analyze and visualize potential cybersecurity gaps
-
Chinese, Iranian State Hackers Exploiting Log4j Flaw: Mandiant
-
Cisco’s Ash Devata on Securing the Hybrid Workforce With Zero Trust
-
Bitwarden releases free families program for enterprise customers
-
ANNKE adds human and vehicle detection to its C800 security camera series
-
Report: 83% of IT professionals can’t guarantee infrastructure is safe from ex-employees
-
Orion Corporation selects Infosys to transform its ERP and planning platforms
-
IBM partners with Samsung to deliver vertical transistor architecture for the semiconductor industry
-
LexisNexis Risk Solutions and Shift Technology bring new tool for automating claims processing
-
Veritone collaborates with Snowflake to provide AI-powered data cloud for enterprises
-
In 2022, Expect More Supply Chain Pain and Changing Security Roles
-
FileCloud raises $30M to accelerate innovation and global market expansion
-
ClosingLock acquires SafeWire to combat fraud in real estate transactions
-
Silver Lake invests €344M in Software AG to accelerate the company’s growth
-
ActZero partners with Measured Analytics and Insurance to detect all types of cybersecurity threats
-
Apache takes off, nukes insecure feature at the heart of Log4j from orbit with v2.16
-
CISA orders federal civilian agencies to patch Log4j vulnerability and 12 others by December 24
-
Attackers Target Log4J to Drop Ransomware, Web Shells, Backdoors
-
Ground Labs Research Reveals 71% of American Consumers are Unaware of Data Protection Laws
-
Tufin Introduces Security Policy Builder (SPB) App to Marketplace
-
QuickCode.ai raises $2M to improve efficiencies and accuracy in ML development pipelines
-
Khonsari ransomware, Nemesis Kitten are exploiting Log4j vulnerability
-
Apache dusts off, nukes insecure feature at the heart of Log4j from orbit with v2.16
-
Apple Employees Have Donated $725 Million to Various Causes Over the Last 10 Years
-
Continuing to Stay Ahead of CVE-2021-44228: Addressing Your Top Questions
-
LogMeIn establishes LastPass as an independent cloud security company
-
Andrew Hill joins Arctic Wolf as Chief Legal Officer and General Counsel
-
Khonsari ransomware, Iranian group Nemesis Kitten seen exploiting Log4j vulnerability
-
Adobe addresses over 60 vulnerabilities in multiple products
-
Log4j exploits attempted on 44% of corporate networks; ransomware payloads spotted
-
Actively Exploited Microsoft Zero-Day Allows App Spoofing, Malware Delivery
-
MasterClass Adds Support for Apple’s FaceTime SharePlay Feature
-
Have an Open Records Horror Story? Shine a Light by Nominating an Agency for The Foilies 2022
-
Propaganda-as-a-service may be on the horizon if large language models are abused
-
New Microsoft Exchange credential stealing malware could be worse than phishing
-
Victory! Federal Court Blocks Texas’ Unconstitutional Social Media Law
-
All-New Golf GTI and Golf R Headline VW’s 2022 Lineup With Wireless CarPlay on Many Trims
-
Second Log4j vulnerability discovered, patch already released
-
Hackers exploit Log4Shell to drop Khonsari Ransomware on Windows systems
-
Adobe Adds New Smudge and Sponge Tools to Photoshop for iPad
-
Microsoft patches spoofing vulnerability exploited by Emotet (CVE-2021-43890)
-
Google’s Manifest V3 Still Hurts Privacy, Security, and Innovation
-
Researcher Spotlight: Dr. Nestori Syynimaa’s Constant Mission Protecting Identities
-
2021-12-14 – Pcap from web server with log4j attempts and lots of other probing/scanning
-
Get a year of PlayStation Plus, a lifetime of learning and maximum VPN protection for $64
-
Why Is Application Security (AppSec) Important For Business?
-
Microsoft December 2021 Patch Tuesday: Zero-day exploited to spread Emotet malware
-
Microsoft Patches 67 Security Flaws, Including Zero-Day Exploited by Emotet
-
Log4Shell: How It’s Being Exploited and How to Mitigate Damage
-
Full Spectrum Detections for 5 Popular Web Shells: Alfa, SharPyShell, Krypton, ASPXSpy, and TWOFACE
-
Apple Plans ‘Ring in the New Year’ Activity Challenge for Apple Watch Users
-
Microsoft is rolling out end-to-end Teams call encryption to business users
-
E-commerce: How to build customer trust without sacrificing security
-
Apple Patches Vulnerabilities That Earned Hackers $600,000 at Chinese Contest
-
Xcode 13.2 Update Downloaded From Mac App Store Causing Errors for Developers
-
New research reveals that one third of all log-in attempts on eCommerce sites are malicious
-
Empowering the next generation of Android Application Security Researchers
-
Google’s Manifest V3 still hurts privacy, security, and innovation
-
Billion-dollar natural gas supplier Superior Plus hit with ransomware
-
LogMeIn announces plan to spin off LastPass into its own company
-
Source Code Leaks: The Real Problem Nobody Is Paying Attention To
-
Government Wins Key Ruling on Issue Affecting Hundreds of Capitol Riot Cases
-
State CIOs focusing on cyber, digital services, connectivity in 2022
-
4 API authentication methods to better protect data in transit
-
Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat
-
Securing Multicloud Environments with Cisco Secure Firewall Threat Defense on Alkira Cloud
-
Popular password manager LastPass to be spun out from LogMeIn
-
Top workforce management firm Kronos hit by ransomware attack
-
Apple Patches Vulnerabilities That Earned Hackers $500,000 at Chinese Contest
-
How the iPhone 14 Pro’s Upgraded 48-Megapixel Camera is Expected to Work
-
Reposify gets $8.5M to secure customers’ internet-facing assets
-
iOS 15.2’s App Privacy Report: How to turn it on, and what it all means
-
US CISA orders federal agencies to fix Log4Shell by December 24th
-
Gathering security data for container images using the Pyxis API
-
Log4Shell (Log4j RCE): Detecting Post-Exploitation Evidence is Best Chance for Mitigation
-
Hackers Steal $140 Million From Users Of Crypto Gaming Company
-
Brazilian Ministry Of Health Hit By Second Attack In Same Week
-
Log4Shell Tools and Resources for Defenders – Continuously Updated
-
Guardio nabs $47M for an AI-powered browser extension that protects from cyberthreats
-
Iranian APT Targets Middle East Telecoms Operators in Espionage Campaign
-
Most Recent iOS Updates from Apple Fix Remote Jailbreak Exploit for iPhones
-
Hackers Attacked 1.6 Million WordPress Sites Via Four Different Vulnerable Plugins
-
Log4j flaw puts hundreds of millions of devices at risk, warns cybersecurity agency
-
Brazilian Ministry of Health hit by second cyberattack in less than a week
-
Apple security updates are out – and not a Log4Shell mention in sight
-
Karakurt: Another Threat Actor Group on the Cyberthreat Landscape
-
UncommonX adds $9.5M as enterprises continue to prioritize cybersecurity
-
Dazz, from ex-Microsoft team, gets $60M to automate cloud security
-
Collecting In the Dark: Tropic Trooper Targets Transportation and Government
-
Ransomware, Trojans, DDoS Malware and Crypto-Miners Delivered in Log4Shell Attacks
-
The Ransomware Attack Suffered by Kronos May Cause Weeks of Downtime
-
Log4j flaw puts hundreds of millions of devices at risk, says US cybersecurity agency
-
How Extended Security Posture Management Optimizes Your Security Stack
-
Hackers Exploit Log4j Vulnerability to Infect Computers with Khonsari Ransomware
-
French Users and Orgs Targeted by TinyNuke Info-Stealing Malware
-
Owowa: the add-on that turns your OWA into a credential stealer and remote access panel
-
‘Vaccine’ For Apache Log4j Vulnerability Released Amidst Active Exploits
-
Christmas Payroll Fears After Ransomware Hits Software Provider
-
Ransomware hits HR solutions provider Kronos, locking customers out of vital services
-
Log4j Vulnerability and Cloud Guard AppSec Machine Learning based Approach for Preemptive Prevention
-
Volvo Cars Servers Hacked – Attackers stolen Research and Development Information
-
Looking for adding new detection technologies in your security products?
-
Google fixed the 17th zero-day in Chrome since the start of the year
-
Ransomware Affiliate Arrested in Romania; 51 Stolen Data Brokers Arrested in Ukraine
-
Enterprise email encryption without friction? Yes, it’s possible
-
Latest Apple iOS Update Patches Remote Jailbreak Exploit for iPhones
-
Employees think they’re safe from cyberthreats on company devices
-
How organizations analyze data to source insights that inform business decisions
-
How Building a Solid Foundation Will Help Grow Your Cybersecurity Program
-
Update Google Chrome to Patch New Zero-Day Exploit Detected in the Wild
-
Execs upping the ante on technology investment for 2022, acquiring talent a major focus
-
AwareGO Human Risk Assessment for Enterprise measures employees’ cybersecurity behavior
-
Virginia legislative agencies and commissions hit with ransomware attack
-
BrightVPN allows users to protect their IP from being tracked for commercial reason
-
iPhone 14 Pro Models Rumored to Feature 48-Megapixel Camera and 8GB of RAM
-
Innodisk launches EGPL-T101 M.2 2280 10GbE LAN module for various high-speed scenarios
-
Security company offers Log4j ‘vaccine’ for systems that can’t be updated immediately
-
Australia’s first data strategy to create ‘one-stop shop’ for accessing government data
-
CISA Creates Webpage for Apache Log4j Vulnerability CVE-2021-44228
-
Lockheed Martin partners with Radisys to accelerate development of 5G.MIL network capabilities
-
Tales from the Dark Web: Fingerprinting Access Brokers on Criminal Forums
-
CISA Creates Webpage for Apache Log4j Vulnerability CVE-2021-44228
-
DFIN acquires Guardum to help companies tackle their risk and compliance needs
-
Blancco’s data erasure offering supports U.S. federal government CMMC accreditation efforts
-
Log4j update: Experts say log4shell exploits will persist for ‘months if not years’
-
Booz Allen Hamilton opens new office in Hawaii to support critical Indo-Pacific missions
-
Kronos hit with ransomware, warns of data breach and ‘several week’ outage
-
Experts say log4shell exploits will persist for ‘months if not years’
-
HR platform Kronos hit with ransomware, UKG warns of data breach and ‘several week’ outage
-
40% of Corporate Networks Targeted by Attackers Seeking to Exploit Log4j
-
Why Classifying Ransomware as a National Security Threat Matters
-
When the question is paying ransom, the answer isn’t always clear
-
Apple releases Tracker Detect Android app to identify AirTags, other Find My-enabled trackers
-
Cybersecurity ‘Vaccines’ Emerge as Ransomware, Vulnerability Defense
-
Practical coexistence attacks on billions of WiFi chips allow data theft and traffic manipulation
-
Practical coexistence attacks on billions of WiFi chips allows data theft and traffic manipulation
-
Apple’s 27-Inch ‘iMac Pro’ With Mini-LED Display Expected in Spring 2022
-
No Foldable iPhone Expected Until 2023 at the Earliest, But 2024 More Likely
-
Government watchdog calls out TMF for low rate of cost recovery
-
Multiple Vulnerabilities Found In GoAutoDial Call Center Software
-
Critical Log4Shell security flaw lets hackers compromise vulnerable servers
-
Apple Releases ‘Tracker Detect’ App to Prevent Android Users From Being Tracked by AirTags
-
Apple Officially Delays macOS Monterey Universal Control Until Spring 2022
-
EFF to Federal Appeals Courts: Hold Police Accountable for Violating Civilians’ Right to Record
-
New cybersecurity flaw shows vulnerability in ‘LOG4J,’ which poses risk to thousands of products
-
Log4Shell Exploitation Grows as Cybersecurity Firms Scramble to Contain Threat
-
Apple Releases watchOS 8.3 With Apple Music Voice Plan and App Privacy Report
-
Apple Releases HomePod Software 15.2 With Apple Music Voice Plan Support
-
When disaster strikes, data recovery really is a race against time
-
Ransomware suspect arrested over attacks on ‘high-profile’ organisations
-
Kaspersky Opens Doors to New Transparency Center in North America
-
Spectrum, cyber concerns surface in Grady’s nomination hearing
-
Spear phish, whale phish, regular phish: What’s the difference?
-
Is VPOTUS Bluetooth-phobic or sensible? The answer’s pretty clear
-
A Journey in Organizational Resilience: Geopolitical and Socio-Economic Trends and Threats
-
How Check Point Infinity Protects Customers from the Log4j Vulnerability
-
Multilingual Cybersecurity Awareness Training adapted for your needs
-
WooCommerce Credit Card Stealer Found Implanted in Random Plugins
-
A non-traditional IT contractor looks a gift horse in the mouth
-
Adobe Launches Creative Cloud Express App With Drag-and-Drop Content Creation
-
The Use of Gift Cards as a Scam Payment Method Has Increased Dramatically, FTC Data Shows
-
All You Need to Know About the New Zero-Day Found in the Log4j Java Library
-
Cyber Threat forces Canada to shut down 4000 government websites
-
Heimdal™ Confirms Log4J Vulnerability Does Not Impact Customers
-
Volvo Cars Data Breach Results in Theft of Proprietary Information
-
The Use of Gift Cards As a Scam Payment Method Has Increased Dramatically, FTC Data Shows
-
Patch Now: Apache Log4j Vulnerability Called Log4Shell Actively Exploited
-
Ascendex cryptocurrency exchange hacked – $77 million stolen
-
iPhone 13 Depreciates Half as Much as Flagship Android Rival
-
Deals: Apple’s 24-Inch iMac (8-Core, 256GB) Drops to New Low Price of $1,399
-
Timekeeping biz Kronos hit by ransomware and warns customers to engage biz continuity plans
-
Logistics Firm Hellmann Scrambling to Recover From Cyberattack
-
Log4j Zero Day Flaw: What You Need To Know And How To Protect Yourself
-
One-Time Password Security Might Fail 80% of the Time. IAM is Better
-
Log4j zero-day flaw: What you need to know and how to protect yourself
-
CISA adds Log4Shell Log4j flaw to the Known Exploited Vulnerabilities Catalog
-
Deals: Apple Watch Series 7 Gets New All-Time Low Prices on Amazon ($50 Off)
-
Responding to Fischerkeller on Initiative Persistence, Defend Forward and Persistent Engagement
-
Hackers Use QR Codes to Steal Banking Credentials in Recent Phishing Attempts
-
Heimdal™ Security Statement on log4j Vulnerability (CVE-2021-44228)
-
Building a Scalable Security Architecture on AWS with Cisco Secure Firewall and AWS Transit Gateway
-
CCSP vs. Microsoft Azure Certified Security Engineer Associate — How Does Vendor Focus Factor In?
-
Polymer lands $4M to bring no-code data loss prevention to SaaS apps
-
CISA Expands ‘Must-Patch’ List With Log4j, FortiOS, Other Vulnerabilities
-
Log4j flaw: Attackers are making thousands of attempts to exploit this severe vulnerability
-
Karakurt: A New Emerging Data Theft and Cyber Extortion Hacking Group
-
Log4Shell update: Attack surface, attacks in the wild, mitigation and remediation
-
Companies Respond to Log4Shell Vulnerability as Attacks Rise
-
Volvo Cars Discloses Breach And R&D Data Theft – Cyber Experts Comment
-
Mirai-Based ‘Manga’ Botnet Targets Recent TP-Link Vulnerability
-
Log4Shell was in the wild at least nine days before public disclosure
-
Ireland Health Service ‘Compromised Two Months Before Attack’
-
Trying to register your antivirus in Windows Security Center?
-
Ooh, an update. Let’s install it. What could possibly go wro-
-
Microsoft Details Building Blocks of Widely Active Qakbot Banking Trojan
-
Ultimate guide to the CCSP: Build the most needed skill in cybersecurity
Generated on 2021-12-19 23:59:17.180200