Category: daily summary

IT Security News Daily Summary 2024-03-01

NIST Cybersecurity Framework: A Cheat Sheet for Professionals Friday Squid Blogging: New Extinct Species of Vampire Squid Discovered Air National Guardsman Teixeira to admit he was Pentagon files leaker USENIX Security ’23 – Vivek Nair, Dawn Song – Multi-Factor Key…

IT Security News Daily Summary 2024-02-29

Fulton County, Security Experts Call LockBit’s Bluff Researchers found a zero-click Facebook account takeover ALPHV Blackcat, GCP-Native Attacks, Bandook RAT, NoaBot Miner, Ivanti Secure Vulnerabilities, and More: Hacker’s Playbook Threat Coverage Round-up: February 2024 A leaky database spilled 2FA codes…

IT Security News Daily Summary 2024-02-28

Speedify VPN Free vs. Premium: Which Plan Is Right For You? Best Secure Access Service Edge Platforms in 2024 High-risk open source vulnerabilities on the rise, Synopsys reports Wireless and the CiscoLive Network Operations Center Navigating the Waters of Generative…

IT Security News Daily Summary 2024-02-27

USENIX Security ’23 – ClepsydraCache – Preventing Cache Attacks with Time-Based Evictions Synopsys Report Exposes Extent of Open Source Software Security Risks Black Basta and Bl00dy ransomware gangs exploit recent ConnectWise ScreenConnect bugs EFF to D.C. Circuit: The U.S. Government’s…

IT Security News Daily Summary 2024-02-26

Latest Research Reveals Rise in API Attacks in 2023, Putting Businesses at Risk in 2024 Malicious Packages in npm, PyPI Highlight Supply Chain Threat From Indiana Jones to Cybersecurity: The Inspiring Journey of Devin Nevada sues to deny kids access…

IT Security News Daily Summary 2024-02-25

Safeguarding Children in the Era of Big Data Securing Space Infrastructure for US And Allied Collaboration Understand Cyber Insurance: Rising Risks and How to Right-Size Policies Cell Service Restored Following Extensive AT&T Outage A cyber attack hit the Royal Canadian…

IT Security News Daily Summary 2024-02-24

A Vending Machine Error Revealed Secret Face Recognition Tech White House Wades Into Debate on ‘Open’ Versus ‘Closed’ Artificial Intelligence Systems USENIX Security ’23 – Dawei Wang, Ying Li, Zhiyu Zhang, Kai Chen – CarpetFuzz: Automatic Program Option Constraint Extraction…

IT Security News Daily Summary 2024-02-23

Hackers Leak 2.5M Private Plane Owners’ Data Linked to LA Intl. Airport Breach Microsoft released red teaming tool PyRIT for Generative AI EFF Urges Ninth Circuit to Reinstate X’s Legal Challenge to Unconstitutional California Content Moderation Law February 2024 Web…

IT Security News Daily Summary 2024-02-22

Identify Weak Links in Your Application Stack – Part 2, Anomaly Detection Cyberattack downs pharmacies across America USENIX Security ’23 – Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen – FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler…

IT Security News Daily Summary 2024-02-21

Discord took no action against server that coordinated costly Mastodon spam attacks Biden asks Coast Guard to create an infosec port in a stormy sea of cyber threats US GOV OFFERS A REWARD OF UP TO $15M FOR INFO ON LOCKBIT…

IT Security News Daily Summary 2024-02-20

ConnectWise fixed critical flaws in ScreenConnect remote access tool Menlo Security Adds SaaS Platform to Manage Secure Browsers Vulnerability Summary for the Week of February 12, 2024 U.S. Joins U.K. to Seize LockBit Site, Disrupt Massive Ransomware Variant Authentic or…

IT Security News Daily Summary 2024-02-19

Do you need antivirus on Linux? Wyze camera breach let 13,000 strangers look into other people’s homes Anatsa Android banking Trojan expands to Slovakia, Slovenia, and Czechia Israeli El Al Alleges Hackers Targeted Flights in Mid-Air Hijack Attempt NSO Group…

IT Security News Daily Summary 2024-02-18

Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Sensitive Data Corporate Accountability: Tech Titans Address the Menace of Misleading AI in Elections Changing How Healthcare Works: Big News in Communication ESET fixed high-severity local privilege escalation bug in…

IT Security News Daily Summary 2024-02-17

USENIX Security ’23 – Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li – Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation Enhancing PCI DSS Compliance: The Urgent Need for Risk-Based Prioritization How…

IT Security News Daily Summary 2024-02-16

Friday Squid Blogging: Vegan Squid-Ink Pasta OpenAI’s Sora Generates Photorealistic Videos 6 Best Intrusion Detection & Prevention Systems for 2024 Reviewed New York City Sues Facebook For Allegedly Harming Kids State Government Organization Network Breach: SafeBreach Coverage for US-CERT Alert…

IT Security News Daily Summary 2024-02-15

Don’t Fall for the Latest Changes to the Dangerous Kids Online Safety Act Feds dismantle Russian GRU botnet built on 1,000-plus home, small biz routers FBI Shuts Down Warzone RAT; Cybercriminals Arrested Feds Disrupt Botnet Used by Russian APT28 Hackers…

IT Security News Daily Summary 2024-02-14

Menlo Security report: Cybersecurity risks surge with AI adoption Microsoft, OpenAI warn nation-state hackers are abusing LLMs 200,000 Facebook Marketplace User Records Leaked Online Abusing the Ubuntu ‘command-not-found’ utility to install malicious packages C can be memory safe, part 2…

IT Security News Daily Summary 2024-02-13

How AI is strengthening XDR to consolidate tech stacks IBM, ISC2 Offer Free Cybersecurity Certificate Fat Patch Tuesday, February 2024 Edition Don’t Understand RADIUS and TACACS+? Cisco has You Covered A ransomware attack took 100 Romanian hospitals down JFK Airport…

IT Security News Daily Summary 2024-02-12

US Takes Down Notorious Warzone RAT Malware Operation, Arrests 2 Hackers uncover new TheTruthSpy stalkerware victims: Is your Android device compromised? 5 reasons why I use Firefox when I need the most secure web browser CISA warns Fortinet zero-day vulnerability…

IT Security News Daily Summary 2024-02-11

Raspberry Robin spotted using two new 1-day LPE exploits USENIX Security ’23 – Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor – Are Consumers Willing to Pay for Security and Privacy of IoT Devices? The Impact of Open-Source Software…

IT Security News Daily Summary 2024-02-10

CISA adds Fortinet FortiOS bug to its Known Exploited Vulnerabilities catalog Mozilla Firefox’s Premium Dark Web Monitoring Solution Smart Helmets Flaw Exposed Millions to Risk of Hacking and Surveillance More than 800 False “Temu” Domains Trick Customers Into Losing Their…

IT Security News Daily Summary 2024-02-09

Friday Squid Blogging: A Penguin Named “Squid” Shim vulnerability exposes most Linux systems to attack Apple defends parts pairing as Oregon mulls right-to-repair bill cyberterrorism Ivanti discloses fifth vulnerability, doesn’t credit researchers who found it Tax Season Alert: Common scams…

IT Security News Daily Summary 2024-02-08

Critical Vulnerability Could Allow Mastodon Account Takeover The Linux Foundation and its partners are working on cryptography for the post-quantum world US offers $10 million reward for info on Hive ransomware group leaders Fake LastPass lookalike made it into Apple…

IT Security News Daily Summary 2024-02-07

Google will block Android users from installing ‘unsafe’ apps in fraud protection test Info-Tech report outlines 5 GenAI initiatives CIOs must key in on China group may have been hiding in IT networks for five years, says Five Eyes warning…

IT Security News Daily Summary 2024-02-06

How Does Automated API Testing Differ from Manual API Testing: Unveiling the Advantages Patch Management and Container Security MuleSoft unveils policy development kit for API gateway Confirmed: Entrust is buying AI-based ID verification startup Onfido, sources say for more than…

IT Security News Daily Summary 2024-02-05

Enpass Review 2024: Pricing, Features, Pros, & Cons Clorox counts the cost of cyberattack The Trusted Liquid Workforce The Journey to CCDE, a Personal Story Ivanti devices hit by wave of exploits for latest security hole US to Roll Out…

IT Security News Daily Summary 2024-02-04

Facebook Whistleblower Says Hearing With Zuckerberg Could Signal Big Change For User Privacy Thousands of Stolen AnyDesk Login Credentials Sold on Dark Web Thousands of Stolen AnyDesk Logins Credentials Sold on Dark Web How to detect poisoned data in machine…

IT Security News Daily Summary 2024-02-03

Clorox estimates the costs of the August cyberattack will exceed $49 Million WebRTC vs. RTSP: Understanding the IoT Video Streaming Protocols The Role of DevOps in Enhancing the Software Development Life Cycle FIRST Launched CVSS 4.0, Revolutionizing Cybersecurity Assessment and…

IT Security News Daily Summary 2024-02-02

Botnet Attack Targeted Routers: A Wake-Up Call for Securing Remote Employees’ Hardware San Francisco Police’s Live Surveillance Yields Almost 200 Hours of Spying–Including of Music Festivals Taylor Swift is not the first victim of AI: Decoding the deepfake dilemma Botnet…

IT Security News Daily Summary 2024-02-01

Anonymous Sudan Claims DDOS Attacks on UAE’s Flydubai Airline The Mystery of the $400 Million FTX Heist May Have Been Solved Facebook Founder Zuckerberg Appears Before Congress And Apologizes For Harm To Children The $400 Million FTX Heist Mystery May…

IT Security News Daily Summary 2024-01-31

Facebook Approves Pro-Anorexia And Drug Ads Made With Its Own AI Tool Crooks stole around $112 million worth of XRP from Ripple’s co-founder Actively Exploited Vulnerability in Hitron DVRs: Fixed, Patches Available The Web Scraping Problem: Part 1 How Akamai…

IT Security News Daily Summary 2024-01-30

The Taylor Swift deepfake porn is nothing new – but that doesn’t mean we shouldn’t be concerned The WordPress 6.4.3 Security Update – What You Need to Know Top 7 Cloud Storage Security Issues & Risks (+ Mitigations) Lawmaker Sues…

IT Security News Daily Summary 2024-01-29

10 reasons why securing software supply chains needs to start with containers The best identity theft protection and credit monitoring services of 2024 Apple Begins 2024 Patching A Zero-Day Under Attack Facebook Among The Worst At Collecting Data From Apps…

IT Security News Daily Summary 2024-01-28

Simplifying Access: The Role of Single Sign-On (SSO) in Cloud Computing Multiple PoC exploits released for Jenkins flaw CVE-2024-23897 Crypto Stealing PyPI Malware Hits Both Windows and Linux Users Failing Upwards (or not) (Pt1) Failing Upwards: Put on your own…

IT Security News Daily Summary 2024-01-27

TPM Chips and the Use of TPM in Virtualization Technology Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe How Kratikal Helps Businesses Prevent Cyber Attacks? This Side of AI Might Not Be What You…

IT Security News Daily Summary 2024-01-26

Generative AI’s enterprise gamble: IT leaders bet big on tech despite security woes Shift-left Convergence with Generative AI Improves the Programmer’s Role Friday Squid Blogging: Footage of Black-Eyed Squid Brooding Her Eggs What is DMARC? Hackers Crack Tesla Twice, Rake…

IT Security News Daily Summary 2024-01-25

HP Claims Monopoly on Ink, Alleges 3rd-Party Cartridge Malware Risk Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight Yearly Intel Trend Review: The 2023 RedSense report San Francisco: Vote No on Proposition E to Stop Police from…

IT Security News Daily Summary 2024-01-24

NCSC says AI will increase ransomware, cyberthreats Global ransomware threat expected to rise with AI, U.K. cyber authority warns Patch management needs a revolution, part 3: Vulnerability scores and the concept of trust Enabling Peer Pods on IBM Z and…

IT Security News Daily Summary 2024-01-23

Cybercrime’s Silent Operator: The Unraveling of VexTrio’s Malicious Network Empire CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Deep-Dive Google Chrome adds new AI features to boost productivity and creativity Uncovering the hidden superpowers of your smartphone Mother of All Breaches: 26…

IT Security News Daily Summary 2024-01-22

Facebook Will Now Let European Users Unlink Their Data Across Platforms The best VPN for streaming in 2024: Expert tested and reviewed Update your iPhone and turn on Stolen Device Protection ASAP. Here’s why Microsoft breached by Russian APT behind…

IT Security News Daily Summary 2024-01-21

USENIX Security ’23 – Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner – Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality Evolution of AI Assistants: Navigating Breakthroughs in Software Development LockBit ransomware gang claims…

IT Security News Daily Summary 2024-01-20

Microsoft Executives’ Emails Breached by Russia Hackers DHS and FBI: Chinese Drones Pose Major Threat to U.S. Security Fujitsu Bugs That Sent Innocent People to Prison Were Known ‘From the Start’ USENIX Security ’23 – Unique Identification of 50,000+ Virtual…

IT Security News Daily Summary 2024-01-19

Chinese threat group exploited VMware vulnerability in 2021 Friday Squid Blogging: New Foods from Squid Fins CISA Issues Emergency Directive on Ivanti Zero-Days Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard Five ripped off IT giant with $7M+…

IT Security News Daily Summary 2024-01-18

CISA and FBI Reveal Known Androxgh0st Malware IoCs and TTPs Akira Ransomware Attacks Surge. Finnish Companies Among Targets White House Revamps Cybersecurity Hiring Strategy Lawsuit Claims Over 100,000 Children On Facebook Are Sent Sex Abuse Material Every Day Cisco and…

IT Security News Daily Summary 2024-01-17

Threat Brief: Ivanti Vulnerabilities CVE-2023-46805 and CVE-2024-21887 (Updated) Google DeepMind’s AI system solves geometry problems like a math Olympian phishing Over 178K SonicWall Firewalls Vulnerable to DoS, Potential RCE Attacks Pro-Russia group hit Swiss govt sites after Zelensky visit in…

IT Security News Daily Summary 2024-01-16

Tokyo startup Sakana AI lands $30M to forge new path with compact AI models Netcraft Report Surfaces Spike in Online Healthcare Product Scams Google Warns of Chrome Browser Zero-Day Being Exploited A New Breed Of Security Leadership: How the Digital…

IT Security News Daily Summary 2024-01-15

Over 178,000 SonicWall next-generation firewalls (NGFW) online exposed to hack Anonymous Sudan Claims London Internet Exchange Attack Over Yemen Strikes More Than 100 Deepfake Ads Featuring British Prime Minister Spread On Facebook Thousands of Juniper Networks devices vulnerable to critical…

IT Security News Daily Summary 2024-01-14

Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms Microsoft is named a Leader in the 2023 Gartner® Magic…

IT Security News Daily Summary 2024-01-13

USENIX Security ’23 – Svetlana Abramova and Rainer Böhme – Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms Unraveling CAPTCHA:…

IT Security News Daily Summary 2024-01-12

Newly Discovered Ivanti Secure VPN Zero-Day Vulnerabilities Allow Chinese Threat Actor to Compromise Systems tunneling or port forwarding Juniper Networks fixed a critical RCE bug in its firewalls and switches Australia slams Twitter (now X) for 80% cut in trust…

IT Security News Daily Summary 2024-01-11

eBay to cough up $3M after cyber-stalking couple who dared criticize the souk Why BYOD Is the Favored Ransomware Backdoor Python’s Poisoned Package: Another ‘Blank Grabber’ Malware in PyPI FTC Bars X-Mode from Selling Sensitive Location Data eBay coughs up…

IT Security News Daily Summary 2024-01-10

Mullvad VPN Review (2023): Features, Pricing, Security & Speed Human Behavior In Digital Forensics, pt III Uncle Sam tells hospitals: Meet security standards or no federal dollars for you Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days 7 Tips for…

IT Security News Daily Summary 2024-01-09

The SEC’s Official X Account Was ‘Compromised’ and Used to Post Fake Bitcoin News Next generation digital substation WAN SEC Twitter hijacked to push fake news of hotly anticipated Bitcoin ETF approval New year, new bugs in Windows, Adobe, Android,…

IT Security News Daily Summary 2024-01-08

VulnRecap 1/8/24 – Ivanti EPM & Attacks on Old Apache Vulnerabilities Swiss Air Force sensitive files stolen in the hack of Ultra Intelligence & Communications YouTube Channels Hacked to Spread Lumma Stealer via Cracked Software Toronto Zoo hit by ransomware…

IT Security News Daily Summary 2024-01-07

A cyber attack hit the Beirut International Airport USENIX Security ’23 – Oshrat Ayalon, Dana Turjeman, Elissa M. Redmiles – ‘Exploring Privacy And Incentives Considerations In Adoption Of COVID-19 Contact Tracing Apps’ North Korean Actors Behind $600M in Crypto Thefts:…

IT Security News Daily Summary 2024-01-06

USENIX Security ’23 – “If I Could Do This, I Feel Anyone Could” *The Design And Evaluation Of A Secondary Authentication Factor Manager’ Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe…

IT Security News Daily Summary 2024-01-05

Friday Squid Blogging—18th Anniversary Post: New Species of Pygmy Squid Discovered What Is a Firewall Policy? Steps, Examples & Free Template After crippling cancer hospital with ransomware, crims threaten to swat patients How to Build a Phishing Playbook Part 2:…

IT Security News Daily Summary 2024-01-04

Facebook Suspends Then Reinstates Popular Conservative Account Ransomware gang starts leaking data stolen from Quebec university Survey Surfaces Lack of Confidence in Existing Cybersecurity Tools X-ploited: Mandiant restores hijacked Twitter account after attempted crypto heist 23andMe blames its users for…

IT Security News Daily Summary 2024-01-03

Terrapin Flaw, CVE-2023-48795, Leaves 11 million SSH Servers Vulnerable Facebook Introduces New Tool To Track The Websites You Visit Freight giant Estes refuses to deliver ransom, says personal data opened and stolen Crypto losses declined over 50% in 2023 SentinelOne…

IT Security News Daily Summary 2024-01-02

States and Congress Wrestle With Cybersecurity After Iran Attacks Small Town Water Utilities New SEC Cybersecurity Reporting Rules Take Effect Vulnerability Summary for the Week of December 25, 2023 Fake Facebook Ads Scam Tens Of Thousands Of Dollars From Small…

IT Security News Daily Summary 2024-01-01

Unlocking the Secrets of Data Privacy: Navigating the World of Data Anonymization, Part 1 Microsoft Disabled App Installer Following Malware Abuse Malware exploits undocumented Google OAuth endpoint to regenerate Google cookies Top 2023 Security Affairs cybersecurity stories What is RabbitMQ?…

IT Security News Daily Summary 2023-12-31

Microsoft Disables App Installer After Feature is Abused for Malware USENIX Security ’23 – Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo ‘Near-Optimal Oblivious Key-Value Stores For Efficient PSI, PSU And Volume-Hiding Multi-Maps’ Google agreed to settle a $5…

IT Security News Daily Summary 2023-12-30

INC RANSOM ransomware gang claims to have breached Xerox Corp The Growing Concern About School Record Hacking RingGo: Phone Parking Service Suffers Data Breach, Customer Data Stolen China Arrests 4 Who Weaponized ChatGPT for Ransomware Attacks USENIX Security ’23 –…

IT Security News Daily Summary 2023-12-29

Imperva defends customers against recent vulnerabilities in Apache OFBiz In the Trenches of Broadband Policy: 2023 Year In Review Fighting For Your Digital Rights Across the Country: Year in Review 2023 First, Let’s Talk About Consumer Privacy: 2023 Year in…

IT Security News Daily Summary 2023-12-28

I tried two passwordless password managers, and was seriously impressed by one Man Sues Facebook For Not Deactivating Deceased Veteran’s Account Used In Crypto Scam Exploring Imgly SDK Alternatives for Ultimate Flexibility Daniel Stori’s ‘Distributed Architecture Drama’ USENIX Security ’23…

IT Security News Daily Summary 2023-12-27

16 Cybersecurity leaders predict how gen AI will improve cybersecurity in 2024 Police Department Criticized For Disabling Facebook Comments After Violent Posts USENIX Security ’23 – Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin ‘Watch Your Watch: Inferring Personality Traits…

IT Security News Daily Summary 2023-12-25

Five bold cybersecurity predictions for 2024 Recent Surveillance Revelations, Enduring Latin American Issues: 2023 Year in Review The Last Mile of Encrypting the Web: 2023 Year in Review Learn Cybersecurity Skills From Scratch for Just $30 Through January 1 UK…

IT Security News Daily Summary 2023-12-24

All I really need to know about cybersecurity, I learned in kindergarten Corporate Spy Tech and Inequality: 2023 Year in Review Protecting Encryption And Privacy In The US: 2023 Year in Review USENIX Security ’23 – ‘Sneaky Spy Devices And…

IT Security News Daily Summary 2023-12-23

Mobile virtual network operator Mint Mobile discloses a data breach Sketchy and Dangerous Android Children’s Tablets and TV Set-Top Boxes: 2023 in Review Electronic Frontier Alliance Comes Back Strong: 2023 in Review Artificial Intelligence and Policing: Year in Review 2023…

IT Security News Daily Summary 2023-12-22

What do CISOs need to know about API security in 2024? Secure Password Hashing in Java: Best Practices and Code Examples Ben Rothke’s Review of A Hacker’s Mind USENIX Security ’23 ‘The Digital-Safety Risks Of Financial Technologies For Survivors Of…

IT Security News Daily Summary 2023-12-21

The 2023 Wordfence Holiday Bug Extravaganza Reaches An Exciting Conclusion! Lapsus$ teen sentenced to indefinite detention in hospital after Nvidia, GTA cyberattacks Unlocking CAPTCHAs: Moving Beyond Deterrence to Detection Stupid Patent of the Month: Selfie Contests Randall Munroe’s XKCD ‘Love…

IT Security News Daily Summary 2023-12-20

FTC’s Rite Aid Ruling Rightly Renews Scrutiny of Face Recognition BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort Cybercrooks book a stay in hotel email inboxes to trick staff into spilling credentials Attackers Finding Novel Ways to Abuse GitHub: ReversingLabs…

IT Security News Daily Summary 2023-12-19

Security first in software? AI may help make this an everyday practice Reflections from Cisco Live Melbourne: Innovation, Sustainability, and Connections FBI claims to have dismantled AlphV/Blackcat ransomware operation, but the group denies it Millions of Xfinity customers’ info, hashed…

IT Security News Daily Summary 2023-12-18

Facebook Scam Targets The Funeral Of A Popular Politician VPN for Your Phone: Key to Global Email Security While Traveling Does Less Consumer Tracking Lead to Less Fraud? Mr Cooper cyberattack laid bare: 14.7M people’s info stolen, costs hit $25M…

IT Security News Daily Summary 2023-12-17

MongoDB Confirms Hack, Says Customer Data Stolen What is trending in the API economy? MongoDB investigates a cyberattack, customer data exposed Securing the code: navigating code and GitHub secrets scanning Utilizing CRQ to empower a shared cybersecurity accountability approach |…

IT Security News Daily Summary 2023-12-16

DEF CON 31 – Ting-Yu [NiNi] Chen’s ‘Review On The Less Traveled Road – 9 Yrs of Overlooked MikroTik PreAuth RCE’ Hackers Fix Polish Train Glitch, Face Legal Pushback by the Manufacturer The CISO risk calculus: Navigating the thin line…

IT Security News Daily Summary 2023-12-14

New Hacker Group GambleForce Hacks Targets with Open Source Tools 1Password now lets you ditch the master password in favor of a passkey Russian APT exploiting JetBrains TeamCity vulnerability Unified Endpoint Management (UEM): What is it and What’s New? Microsoft…

IT Security News Daily Summary 2023-12-13

Facebook Sues FTC To Block Ban On Monetizing Kids’ Data How to Set Up a VLAN in 12 Steps: Creation & Configuration Speaking Freely: Dr. Carolina Are FLOSS for Gophers and Crabs: Extracting Strings from Go and Rust Executables NIST…

IT Security News Daily Summary 2023-12-12

cyber attack Microsoft Patch Tuesday, December 2023 Edition Bitcoin ATM company Coin Cloud got hacked. Even its new owners don’t know how. How to choose a free vulnerability scanner: Insights from an industry veteran Cyberattack Cripples Ukraine’s Largest Telcom Operator…

IT Security News Daily Summary 2023-12-11

Apple Ships iOS 17.2 With Urgent Security Patches Vulnerability Summary for the Week of December 4, 2023 Hotspot Shield VPN Review 2023: Features, Pros & Cons 2.5M patients infected with data loss in Norton Healthcare ransomware outbreak Child Safety Advocates…

IT Security News Daily Summary 2023-12-10

DEF CON 31 XR Village – Whitney Phillips’ ‘Augmented Reality And Implications On Mobile Security’ Protecting against new Kubernetes threats in 2024 and beyond Fake hotel reservation phishing scam uses PDF links to spread MrAnon Stealer Researcher discovered a new…

IT Security News Daily Summary 2023-12-08

Friday Squid Blogging: Influencer Accidentally Posts Restaurant Table QR Ordering Code Kali vs. ParrotOS: 2 versatile Linux distros for security pros Top 12 Firewall Best Practices to Optimize Network Security What Is a Privilege Escalation Attack? Types & Prevention Meta…

IT Security News Daily Summary 2023-12-07

Attacks abuse Microsoft DHCP to spoof DNS records and steal secrets Cisco goes all in on AI to strengthen its cybersecurity strategy Widespread Windows and Linux Vulnerabilities Could Let Attackers Sneak in Malicious Code Before Boot adaptive multifactor authentication (adaptive…

IT Security News Daily Summary 2023-12-06

Tor vs. VPN: What They Do and Which is Better Using Falco to Create Custom Identity Detections State Attorney General Accuses Facebook Of Creating A “Marketplace” For Child Predators Cisco Training Bootcamps: Get the Scoop from Subject Matter Experts Generative…

IT Security News Daily Summary 2023-12-05

Consumer Rights Group Files Complaint Against Facebook Alleging It’s Charging Users For Privacy Webex announces comprehensive Device Management Capabilities with Phonism integration Roblox and Twitch provider Tipalti breached by ransomware [updated] 23andMe Says Hackers Saw Data From Millions of Users…

IT Security News Daily Summary 2023-12-04

Int’l Dog Breeding Org WALA Exposes 25GB of Pet Owners Data Navigating API Governance: Best Practices for Product Managers Fancy Bear hackers still exploiting Microsoft Exchange flaw Disinformation Researcher Says She Was Fired After Pressure From Facebook How to Secure…

IT Security News Daily Summary 2023-12-03

Identifying Insider Threats: Addressing the Top Five Insider Threat Indicators New Agent Raccoon malware targets the Middle East, Africa and the US US Man Jailed 8 Years for SIM Swapping and Apple Support Impersonation Breaches happen: It’s time to stop…

IT Security News Daily Summary 2023-12-02

What to Do if You Expose a Secret: How to Stay Calm and Respond to an Incident Facebook Is Reportedly Struggling To Detect And Remove Child Abuse Content LockBit Claims Cyberattack on India’s National Aerospace lab Okta: October Data Breach…

IT Security News Daily Summary 2023-12-01

Cisco Live 2023 Melbourne: Cisco U. Theatre Sessions Apple slaps patch on WebKit holes in iPhones and Macs amid fears of active attacks Java 11 to 21: A Visual Guide for Seamless Migration When It Comes to January 6 Lawsuits,…

IT Security News Daily Summary 2023-11-30

DEF CON 31 – Maxime Clementz’ ‘Defeating VPN Always On’ Forrester names Microsoft Intune a Leader in the 2023 Forrester Wave™ for Unified Endpoint Management Unlocking the Full Potential of Unified SASE: An Interview with HPE’s Chris Hines 2023-11-30 –…

IT Security News Daily Summary 2023-11-29

Estante Virtual – 5,412,603 breached accounts Forrester names Microsoft Intune a Leader in the 2023 Forrester Wave™ for Unified Endpoint Management Zoom Vulnerability Allowed Hackers to Take Over Meetings, Steal Data CISA Office of Bombing Prevention Recognizes Critical Infrastructure Security…

IT Security News Daily Summary 2023-11-28

Europol, Ukraine police arrest alleged ransomware ringleader LockBit claims cyberattack on India’s national aerospace lab Threat actors started exploiting critical ownCloud flaw CVE-2023-49103 Plex gives fans a privacy complex by sharing viewing habits with friends by default Say Goodbye to…

IT Security News Daily Summary 2023-11-27

Multiple Vulnerabilities Found In ownCloud File Sharing App Threat actors targeting critical OwnCloud vulnerability IndiHome – 12,629,245 breached accounts Ardent Health Hospitals Disrupted After Ransomware Attack General Electric, DARPA Hack Claims Raise National Security Concerns CyberTalk Series: MSP and MSSP…

IT Security News Daily Summary 2023-11-26

Facebook Approves Ads Calling For Genocide, Assassination, And More DEF CON 31 – Ricky Lawshae’s ‘Fantastic Ethertypes and Where to Find Them’ Taj Hotels Faces Data Breach, Revealing Data of 1.5 Million Customers Private and Secure Web Search Engines: DuckDuckGo,…

IT Security News Daily Summary 2023-11-25

Rhysida ransomware gang claimed China Energy hack Telekopye’s tricks of the trade – Week in security with Tony Anscombe North Korea-linked APT Lazarus is using a MagicLine4NX zero-day flaw in supply chain attack DEF CON 31 – Kemba Walden’s ‘Fireside…

IT Security News Daily Summary 2023-11-24

App used by hundreds of schools leaking children’s data Hackers Leak Thousands of Idaho National Lab Employees’ PII Data KitchenPal – 98,726 breached accounts Understanding JWKS (JSON Web Key Set) Telekopye: Chamber of Neanderthals’ secrets Microsoft launched its new Microsoft…

IT Security News Daily Summary 2023-11-23

Canada’s privacy czar investigating data theft of federal employees from relocation companies Windows 11 setup: Which user account type should you choose? ClearFake campaign spreads macOS AMOS information stealer How to apply natural language processing to cybersecurity Rise of cloud…

IT Security News Daily Summary 2023-11-22

New InfectedSlurs Mirai-based botnet exploits two zero-days 2023-11-22 – AgentTesla infection with FTP data exfil US nuke reactor lab hit by ‘gay furry hackers’ demanding cat-human mutants 4 data loss examples keeping backup admins up at night What Is Cloud…

IT Security News Daily Summary 2023-11-21

Citrix Bleed Bug Inflicts Mounting Wounds, CISA Warns Exploit for Critical Windows Defender Bypass Goes Public AutoZone Files MOVEit Data Breach Notice With State of Maine DOJ Charges Binance With Vast Money-Laundering Scheme and Sanctions Violations Why less is more:…

IT Security News Daily Summary 2023-11-20

Malware Uses Trigonometry to Track Mouse Strokes Lasso Security Emerges From Stealth With $6M Seed Funding for Gen AI and Advanced LLM Cybersecurity Canadian government impacted by data breaches of two of its contractors Protecting Kids on Social Media Act:…