Tag: monthly summary

IT Security News Monthly Summary – May

IT Security News Daily Summary 2024-04-30 USENIX Security ’23 – Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning UnitedHealth CEO: ‘Decision to pay ransom was mine’ FCC Fines Verizon, AT&T and T-Mobile for Sharing User Location Data 5…

IT Security News Monthly Summary – April

IT Security News Weekly Summary – Week 13 IT Security News Daily Summary 2024-03-31 PyPI Halts New User Registrations to Combat Malware Campaign XZ Utils backdoor update: Which Linux distros are affected and what can you do? Checking CSV Files,…

IT Security News Monthly Summary – September

IT Security News Daily Summary 2023-08-31 UN: Southeast Asia Gangs Are Trafficking Cybercrime Workers 3 out of 4 Cyberattacks in the Education Sector Are Associated With a Compromised On‑Premises User or Admin Account Insurance Costs Rise, Coverage Shrinks, But Policies…

IT Security News Monthly Summary – August

IT Security News Daily Summary 2023-07-31 Experts discovered a previously undocumented initial access vector used by P2PInfect worm Understanding Data Protection: Best Practices for Keeping Your Information Safe MIT CSAIL unveils PhotoGuard, an AI defense against unauthorized image manipulation Reducing…

IT Security News Monthly Summary – June

IT Security News Daily Summary 2023-05-31 Crypto Discord Communities Targeted by Malicious Bookmarks & JavaScript Never Use Credentials in a CI/CD Pipeline Again US deploys tech diplomacy to cultivate leadership in emerging fields DHS faces slow disaster response burdened by…

IT Security News Monthly Summary – May

IT Security News Weekly Summary – Week 17 IT Security News Daily Summary 2023-04-30 Crooks broke into AT&T email accounts to empty their cryptocurrency wallets The Evolving Threat From Terrorist Drones in Africa Enhance Employee Productivity by Adopting a Modern…

IT Security News Monthly Summary – April

IT Security News Daily Summary 2023-03-31 Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help. Dependency Poker for Scrum Teams The best travel VPNs of 2023: Expert tested Pro-Islam ‘Anonymous Sudan’ Hacktivists Likely a Front for…

IT Security News Monthly Summary – March

IT Security News Daily Summary 2023-02-28 How can Vault Vision help secure your company with passwordless login? Top benefits of SOAR tools, plus potential pitfalls to consider Exfiltrator-22: The Newest Post-Exploitation Toolkit Nipping at Cobalt Strike’s Heels Security Architecture Review…

IT Security News Monthly Summary – February

IT Security News Daily Summary 2023-01-31 House lawmakers want VA’s $20 billion-plus electronic health record program to improve or else NASA SEWP director echoes concerns over looming deadlines for software providers Risk & Repeat: The FBI’s Hive ransomware takedown The…

IT Security News Monthly Summary – October

Amazon Unveils Sleep Tracking Device, Updates Echo, Kindle Hackers Deliver Erbium Password-Stealing Malware Through Fake Cracks and Cheats openSUSE: 2022:10134-1 critical: connman SUSE: 2022:3483-1 moderate: python36 Why developers hold the key to cloud security Ignorance isn’t bliss: How tech users…

IT Security News Monthly Summary – September

IT Security News Daily Summary 2022-08-31 Twitter and TikTok’s data privacy controversies show the dangers of third-party apps NASCIO selects 31 finalists for state IT recognition awards Google Fixes 24 Vulnerabilities With New Chrome Update Malicious Google Chrome extensions affect…

IT Security News Monthly Summary – August

IT Security News Weekly Summary – Week 30 IT Security News Daily Summary 2022-07-31 Businesses Will Suffer Cyber-Attacks; But Do They Know the Real Cost? aiXDR Brief Novel Phishing Campaign Employs Countdown Timer to Pressurize Victims (ISC)² and Others Commit…

IT Security News Monthly Summary – July

IT Security News Daily Summary 2022-06-30 Officers’ smart cards foster transparency, community trust EFF to File Amicus Brief in First U.S. Case Challenging Dragnet Keyword Warrant OpenSea phishing threat after rogue insider leaks customer email addresses NFT Marketplace OpenSea Suffers…

IT Security News Monthly Summary – June

IT Security News Daily Summary 2022-05-31 How process mining uncovers workflow bottlenecks 3.6M MySQL Servers Found Exposed Online Biometric Data Offers Added Security — But Don’t Lose Sight of These Important Risks New Microsoft Zero-Day Attack Underway Surefire Cyber Launches…

IT Security News Monthly Summary – May

IT Security News Daily Summary 2022-04-30 Microsoft Azure flaws could allow accessing PostgreSQL DBs of other customers The case for data-centric security in 2022 Identifying Ransomware’s Stealthy Boot Configuration Edits Emotet tests new attack chain in low volume campaigns Black…

IT Security News Monthly Summary – April

IT Security News Daily Summary 2022-03-31 authentication server As digital life gets cloudy, effective backups clear the sky for business continuity Air Force software factory looks to unleash ‘chaos’ on civilian IT shops Ransomware: Should Companies Ever Pay Up? Royal…

IT Security News Monthly Summary – March

IT Security News Daily Summary 2022-02-28 Why IaC Security Should Matter to CISOs Viasat says ‘cyber event’ is causing broadband outages across Europe Will Apple Keep the Old iPhone SE Around at a Lower Cost? NGA eyes down selection to…

IT Security News Monthly Summary – February

IT Security News Daily Summary 2022-01-31 2022-01-27 – Contact Forms Campaign IcedID (Bokbot) with Cobalt Strike Getting facial recognition right No, a researcher didn’t find Olympics app spying on you Labor Department announces grants for states to expand UI access…

IT Security News Monthly Summary – January

IT Security News Daily Summary 2021-12-31 Friday Squid Blogging: Deep-Dwelling Squid The Have I Been Pwned service now includes 441K accounts stolen by RedLine malware Types of Tools To Use for Application Security Error prompted LastPass to send false breach…

IT Security News Monthly Summary – December

IT Security News Daily Summary 2021-11-30 Building out Alaska’s broadband infrastructure Zscaler delivers strong Q1, sees revenue grow 62% year over year Five Features to Look Forward to in the 2022 MacBook Air walled garden Enterprise password security guidelines in…

IT Security News Monthly Summary – November

IT Security News Weekly Summary – Week 43 IT Security News Daily Summary 2021-10-31 Medical digital twins secure COVID-19 data Report: At least 25% of consumers use biometrics for online security Iranian Black Shadow hacking group breached Israeli Internet hosting…

IT Security News Monthly Summary – October

IT Security News Daily Summary 2021-09-30 GriftHorse Android malware hit 10 millions devices in 70 countries FireEye and McAfee Enterprise announce product mashup Akamai Acquires Guardicore in $600M Deal Apple Seeds macOS Big Sur 11.6.1 Beta to Developers With Security…

IT Security News Monthly Summary – September

Best Linux Backup Solutions to Prevent Data Loss in A Ransomware Attack> August 2021 Security Intelligence Roundup: Pipeline Changes, Social Engineering and Software Supply Chain Attacks Governments continue to eye data privacy, forcing CIOs to adapt Useful Mac Apps Worth…

IT Security News Monthly Summary – August

IT Security News Daily Summary 2021-07-31 Threat actors leaked data stolen from EA, including FIFA code The Silver Bullet for Ransomware’s Golden Goose BSides Vancouver 2021 – Josh Sokol’s ‘Measuring Cybersecurity Maturity With The NIST CSF’ SolarWinds hackers breached 27…

IT Security News Monthly Summary – July

IT Security News Daily Summary 2021-06-30 Colombia arrests suspect wanted by US over Gozi virus CyberRes unveils enterprise-class data security solution for Amazon Macie CISA predicts cyber EO will drive progress on zero trust PrintNightmare, the zero-day hole in Windows:…

IT Security News Monthly Summary – June

IT Security News Daily Summary 2021-05-31 Swedish Health Agency discloses hacking attempts 
Video: Cobalt Strike & DNS – Part 1, (Sun, May 30th) Quick and dirty Python: nmap, (Mon, May 31st) Vectra: 10 most common threats for Azure AD, Office…

IT Security News Monthly Summary – May

IT Security News Daily Summary 2021-04-30 Was SUNBURST really a Zero-day attack? NSF, NIST, DOD team up on resilient next-gen networking CISA tests cloud log aggregation to ID threats Data privacy demands a unified view across siloes Security awareness training…

IT Security News Monthly Summary – April

IT Security News Daily Summary 2021-03-31 BrandPost: The Journey to SASE: Cisco Eases Security Complexity BrandPost: Don’t Make This Mistake on the Journey to Passwordless Security antimalware (anti-malware) challenge-response authentication Air Force seeks ‘ubiquitous connectivity’ from telework to bases Mayorkas…

IT Security News Monthly Summary – March

IT Security News Weekly Summary – Week 08 IT Security News Daily Summary 2021-02-28 BSides Calgary 2020 – Josh Sokol’s ‘Architecting For Security In The Cloud’ BSides Calgary 2020 – Jason Maynard’s ‘Security Can Do Better: Think Security Architecture’ Robert…

IT Security News Monthly Summary – February

IT Security News Weekly Summary – Week 04 IT Security News Daily Summary 2021-01-31 Exabeam joins cybersecurity ecosystem revolving around Snowflake Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 314’ BSidesSF 2020 – Ari Eitan’s ‘Mapping The…

IT Security News Monthly Summary – January

IT Security News Daily Summary 2020-12-31 SMBs: How to find the right MSP for your cybersecurity needs SolarWinds hackers gained access to Microsoft source code A Brief History of Adobe Flash Player: From Multimedia to Malware – Intego Mac Podcast…

IT Security News Monthly Summary – December

IT Security News Daily Summary 2020-11-30 4 steps to turn CMMC compliance into a competitive advantage House chairs seek ‘full accounting’ of Schedule F conversions Budget boost would trim CISA’s risk assessment backlog Top cyber threats agencies should have on…

IT Security News Monthly Summary – November

IT Security News Daily Summary 2020-10-31 DEF CON 28 Safe Mode ICS Village – Austin Scott’s ‘5 Quick Wins For Improving ICS Cybersecurity Posture’ REvil ransomware gang hacked gaming firm Gaming Partners International The Halkbank Case Should Be a Very…