-
December 2021 Patch Tuesday: AppX Installer Zero-day, Multiple Critical Vulnerabilities
-
Ransomware affects the entire retail supply chain this holiday season
-
Log4j: Conti ransomware attacking VMware servers and TellYouThePass ransomware hits China
-
Friday Squid Blogging: UK Recognizes Squid as Sentient Beings
-
Spider-Man: No Way Home exploited to push phishing and malware scams
-
Kronos ransomware attack impacting government employee paychecks
-
Conti ransomware gang exploits Log4Shell bug in its operations
-
Apple Seeds First Betas of iOS 15.3 and iPadOS 15.3 to Developers
-
NDAA requires DOD to report on prospects for a ‘cyber academy’
-
The US is making plans to replace all of its lead water pipes from coast to coast
-
Deals: Take $300 Off 21.5-Inch iMac and Get $10 Amazon Credit When Buying $100 Apple Gift Card
-
Spider-Man Movie Release Frenzy Bites Fans with Credit-Card Harvesting
-
Citizen Lab Exposes Cytrox as Vendor Behind ‘Predator’ iPhone Spyware
-
Trend Micro Spots Chinese Hackers Targeting Transportation Sector
-
Facebook Bans Surveillance-For-Hire Companies From Its Platforms
-
Malicious Joker App Scores Half-Million Downloads on Google Play
-
‘Notchmeister’ Lets You Decorate the Notch on Your MacBook Pro
-
New Mobile App Security GitHub Action Enables Devs To Easily Test Security
-
Russian Cyberspy Groups Start Exploiting Log4Shell Vulnerability
-
Executive Partnerships Are Critical for Cybersecurity Success
-
As Log4j sent defenders scrambling, this startup made its threat data free
-
Google unleashes security ‘fuzzer’ on Log4Shell bug in open source software
-
CISA: Federal agencies must immediately mitigate Log4J vulnerabilities
-
Security firm Blumira discovers major new Log4j attack vector
-
Best robot toys for kids: LEGO, Raspberry Pi, and other awesome STEM gift ideas
-
Serious Security: OpenSSL fixes “error conflation” bugs – how mixing up mistakes can lead to trouble
-
Timely Questions for Log4j Response Now — And for the Future
-
EFF Continues Legal Fight to Release Records Showing How Law Enforcement Uses Cell-site Simulators
-
Gumtree exposed users’ personal and GPS location via source code
-
Tech woes and fraud top the list of unemployment system issues
-
CISA orders federal agencies to mitigate Log4J vulnerabilities in emergency directive
-
How password troubles could cost your online business potential sales
-
PseudoManuscrypt Malware Targeted Government & ICS Systems in 2021
-
CISA Issues ED 22-02 Directing Federal Agencies to Mitigate Apache Log4j Vulnerabilities
-
Apple Bringing Native Apple Music Experience to Music App for macOS
-
MacRumors Giveaway: Win a Leather City Backpack From Harber London
-
Nozomi Networks and BT Team to Deliver Advanced OT and IoT Cybersecurity to Enterprises Worldwide
-
CISA Issues ED 22-02 Directing Federal Agencies to Mitigate Apache Log4j Vulnerabilities
-
RAF shoots down ‘terrorist drone’ over US-owned special ops base in Syria
-
VMware fixes critical SSRF flaw in Workspace ONE UEM Console
-
Deals: Apple TV HD With New Siri Remote Drops to Record Low Price of $124.98 ($24 Off)
-
Software Patching Statistics: Common Practices and Vulnerabilities [Updated 2021]
-
Is Data Security Worthless if the Data Life Cycle Lacks Clarity?
-
Using Intelligence to Defend Two of the World’s Largest Cities
-
Anubis malware resurfaces targeting crypto wallets and banking apps
-
Facebook Bans 7 ‘Cyber Mercenary’ Companies for Spying on 50,000 Users
-
Backdoor Gives Hackers Complete Control Over Federal Agency Network
-
Facebook Exposes Mercenary Spy Firms That Targeted 50,000 People
-
How COVID-19 made the Zero Trust model the right approach to modernise networks
-
Log4j: Major IT vendors rush out fixes for this flaw and more ahead of Christmas
-
Google unleashes security ‘fuzzer’ on Log4Shell bug in open-source software
-
Hive Ransomware Wreaked Havoc in Four Months: Hundreds of Organizations Breached
-
China Orders Microsoft Bing To Suspend Auto-suggest Function
-
Hackers Using Weaponized IIS Module to Stealing Credentials & Enabling RCE
-
MobileIron Users Targeted in Log4Shell Attacks as Exploit Activity Surges
-
Meta says 50,000 Facebook users may have been spied on by private surveillance firms
-
Encrypt your emails from end to end for a lifetime with this software
-
Cybersecurity: Go from novice to expert with this course bundle
-
Phorpiex botnet is back, in 2021 it $500K worth of crypto assets
-
London Classified Ads Site Gumtree Experiences Data Breach Due to F12 Key
-
Michigan posts statewide dashboard for COVID-19 wastewater monitoring
-
How the bipartisan infrastructure bill could jumpstart mobility on demand
-
This company was hit with ransomware, but didn’t have to pay up. Here’s how they did it
-
How to Prevent Customer Support Help Desk Fraud Using VPN and Other Tools
-
New PseudoManuscrypt Malware Infected Over 35,000 Computers in 2021
-
Feral’s ‘Alien: Isolation’ for iPhone and iPad ‘One of the Best iOS Conversions Ever’
-
Mobile App Developers Keep Fraudulent Traffic at Bay with Anti-Fraud API
-
Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows ?
-
PseudoManuscrypt, a mysterious massive cyber espionage campaign
-
New Phorpiex Botnet Variant Steals Half a Million Dollars in Cryptocurrency
-
Australia and United States enter a Data Sharing CLOUD Agreement
-
Credential stuffing cyber attacks to double up in UK during Christmas
-
Want to assemble a cyber Dream Team? Look back at the ‘92 Olympics
-
Digital IDs don’t have to impinge on civil liberties and privacy
-
Why is a well thought-out approach to cloud migration imperative?
-
ISG Presents 2021 ISG Star of Excellence Awards to Hexaware, Infosys and Rackspace Technology
-
Acuity International Celebrates the Holiday Season with $10,000 Donation to Toys for Tots
-
The “Office of the CISO”: A New Structure for Cybersecurity Governance
-
SAIC Rugged Apps delivers secure commercial applications to government users
-
ForgeRock announces two features to serve all identity types from one platform
-
ShiftLeft’s features identify attackable JavaScript and TypeScript vulnerabilities
-
HUB Security Docker Digital Twin authenticates and verifies incoming Docker traffic
-
Fugue Organization Management streamlines security oversight for large cloud operations
-
Extreme Trusted Delivery protects critical network infrastructure
-
Over Log4j? VMware has another critical flaw for you to patch
-
US Senate passes Bill to ban goods produced from Uyghur forced labour
-
ioSafe 1520+ NAS device offers disaster recovery capabilities for businesses
-
Verifyle partners with NYSIA to protect members from the growing threat of hackers
-
Endace collaborates with LinkShadow to enhance SOC team productivity and reduce threat exposure
-
MSP360 adds Wasabi Object Lock to help MSPs protect cloud-based backups
-
Meta removes accounts of spyware company Cytrox after Citizen Lab report on gov’t hacks
-
MobileIron customers urged to patch systems due to potential Log4j exploitation
-
Anomali appoints Justin Coker as VP and General Manager for EMEA
-
Noname Security raises $135M to help customers mitigate the risk of deploying APIs
-
Cequence Security raises $60M to enhance its API security solutions
-
Wipro acquires LeanSwift Solutions to expand its cloud transformation business
-
Telstra expands its network infrastructure in the United States
-
Honeywell opens security operations center in Europe, based in Romania
-
NSA and CISA Release Final Part IV of Guidance on Securing 5G Cloud Infrastructures
-
Log4Shell (Log4j RCE): Detecting Post-Exploitation Evidence is Best Chance for Mitigation
-
Firefox: Ad blockers are 2021’s most popular browser extensions
-
NSA and CISA Release Final Part IV of Guidance on Securing 5G Cloud Infrastructures
-
Gathering security data for container images using the Pyxis API
-
MacBook Pro Owners Noticing Smoother ProMotion Safari Scrolling After Installing macOS Monterey 12.2
-
EFF to Court: Deny Foreign Sovereign Immunity to DarkMatter for Hacking Journalist
-
LogMeIn To Spin Off LassPass As Separate Cloud Security Firm
-
Anubis Android Malware Found Targeting Nearly 400 Financial Apps
-
CISA director says the LOG4J security flaw is the “most serious” she’s seen in her career
-
CISA adds Log4Shell Log4j flaw to the Known Exploited Vulnerabilities Catalog
-
December 2021: Cyber Deception Month Continues…Halting Holiday Hackers…
-
Crooks injects e-skimmers in random WordPress plugins of e-stores
-
Turn your basic networking and coding skills into in-demand cybersecurity qualifications
-
Meta Ousts 7 Surveillance-for-Hire Operations From Its Platforms
-
LOG4J vulnerability the most serious I’ve seen in my decades-long career, says CISA director
-
Flaws in Lenovo laptops allow escalating to admin privileges
-
Apple Building Chip Team to Bring More Wireless Component Production In-House
-
Privacy, Identity, and Device Protection: Why You Need to Invest in All Three
-
‘PseudoManuscrypt’ Mass Spyware Campaign Targets 35K Systems
-
How organizations should prioritize security vulnerabilities
-
Google Says NSO Pegasus Zero-Click ‘Most Technically Sophisticated Exploit Ever Seen’
-
Ransomware, Trojans, DDoS Malware and Crypto-Miners Delivered in Log4Shell Attacks
-
NSO zero-click iMessage exploit hacks iPhone without need to click links
-
CISA, White House urge organizations to get ready for holiday cyberattacks
-
Microsoft Launch Vulnerable And Malicious Driver Reporting Center
-
Hillrom Addressed A Zero-Day Vulnerability Affecting Its Cardiac Devices
-
Microsoft December Patch Tuesday Out With 67 Bug Fixes Including A Zero-Day Patch
-
Microsoft Teams End-to-End Encryption Now ‘Generally Available’
-
Why ransomware attacks happen out of hours or during the holidays
-
S3 Ep63: Log4Shell (what else?) and Apple kernel bugs [Podcast+Transcript]
-
60% of UK Workers Have Been Victim of a Cyber-Attack, Yet Awareness Remains Low
-
Corellium Lands $25 Million Investment for Virtualization Tech
-
Thousands of Industrial Systems Targeted With New ‘PseudoManuscrypt’ Spyware
-
Grindr fined £5.5m for selling user data to advertising companies
-
Apache Kafka in the Public Sector – Part 5: National Security and Defense
-
Brazil investigates use of staff credentials in cyberattacks against government bodies
-
How to install the ConfigServer and Security Firewall combo on Ubuntu Server
-
Online Shoppers Could Face Eight Million Credential Stuffing Attacks Per Day Over Christmas
-
Panda Security: top rated in AV-Comparatives performance test
-
Another Apache Log4j Bug Discovered – Patch Released – Update (Once Again!)
-
Top 4 cloud misconfigurations and best practices to avoid them
-
Deals: Year’s Best Prices Hit AirPods 2 ($90) and AirPods 3 ($140), But Will Arrive After Christmas
-
SiriusXM Platinum VIP Tier Now Includes 12 Months of Free Apple Music
-
SecurityWeek Announces Virtual Cybersecurity Event Schedule for 2022
-
Dear Congress: It’s Complicated. Please Consider This When Crafting New Cybersecurity Legislation
-
Botnet steals half a million dollars in cryptocurrency from victims
-
While attackers begin exploiting a second Log4j flaw, a third one emerges
-
Apple Rumored to Launch Lower-Priced 24-Inch and 27-Inch External Displays: What to Expect
-
The Collapsed Bridge Loan: Israel’s Shin Bet Location Tracking of Omicron Carriers
-
The Chatter Podcast: From National Security Blogger to Editor of Rolling Stone with Noah Shachtman
-
Log4j flaw: This new threat is going to affect cybersecurity for a long time
-
What Retailers Should Know About Cybersecurity This Holiday Season
-
North American Propane Distributor ‘Superior Plus’ Discloses Ransomware Attack
-
Researchers Uncover New Coexistence Attacks On Wi-Fi and Bluetooth Chips
-
Security awareness gaps identified in the UK according to new Armis study
-
State-sponsored Threat Actors Steal Airline Data Using the Slack API
-
Comprehensive Phishing Study Shows Who Is More Prone to Fall Victim to Phishing Attacks
-
Ory lands $22.5M for zero trust security powered by open source
-
The DHS is inviting hackers to break into its systems, but there are rules of engagement
-
The Guide to Automating Security Training for Lean Security Teams
-
Algorithms are everywhere – what should you know about them?
-
WhiteSource Log4j Detect scans projects to find vulnerable Log4j versions
-
Cobalt Strike Is Being Installed by Emotet for Faster Attacks
-
Variant of Phorpiex botnet used for cryptocurrency attacks in Ethopia, Nigeria, India and more
-
Google: This zero-click iPhone attack was incredible and terrifying
-
Phorpiex botnet is back with a new Twizt: Hijacking Hundreds of crypto transactions
-
Regulator: Venues Must Protect User Privacy During #COVID19 Checks
-
Does the Log4j Vulnerability Affect You? – Intego Mac Podcast Episode 218
-
New Fileless Malware Uses Windows Registry as Storage to Evade Detection
-
Digital Security by Design reinforced through new Government National Cyber Strategy
-
New Scam Emails Purport to Come from NSO Group Hacker – Intego Mac Podcast Episode 218
-
Move fast, break security: Why CISOs must push back against Agile IT
-
Rise in API-Based Attacks Underscore Investments in New Tools
-
National Cyber Strategy will lead to BritChip for mobile devices by 2025, claims UK.gov
-
Owowa, a malicious IIS Server module used to steal Microsoft Exchange credentials
-
Victims awarded $18 million in GirlsDoPorn online video case, boss on the run
-
How to implement security into software design from the get-go
-
Japan draws a LINE: web giants must reveal where they store user data
-
Hackers Begin Exploiting Second Log4j Vulnerability as a Third Flaw Emerges
-
Europe’s quantum communication plans: Defending against state-sponsored cyber attacks
-
Ransomware Attack halts Christmas 2021 paychecks and bonuses
-
Online shopping at risk: Mobile application and API cyber attacks at critical high
-
Microsoft confirms new ransomware family deployed via Log4j vulnerability
-
Digital ID age verification trials for online alcohol purchases in Australia underway
-
(ISC)² Ransomware Study: Collaboration and Communication are Essential for Ransomware Readiness
-
DMARC and the prevention of World Health Organization phishing scams
-
Security priorities are geared toward ongoing remote and hybrid work
-
Hackers Exploiting Log4j2 Vulnerability in The Wild To Deploy Ransomware
-
OAIC determines AFP interfered with privacy of Australians after using Clearview AI
-
Cybersecurity Standards, Ransomware, and Zero Trust: 3 Key Considerations for the UK Government
-
Adoption of private 5G networks accelerates, as organizations look to improve security and speed
-
MobileSphere SLYGuard secures communications on popular messaging applications
-
MetricStream’s software release measures cyber risk in monetary terms
-
Syxsense Secure protects businesses against the Log4j vulnerability
-
MicroAI Security offers asset protection from cyber security intrusions
-
Stratodesk NoTouch LTS helps IT teams ensure their VDI/DaaS deployment
-
Cobalt Iron Compass EOS allows users to search the entire enterprise backup landscape
-
Home Affairs releases second Critical Infrastructure Bill with leftover obligations
-
Checkmarx KICS integrates into GitLab 14.5 to manage IaC vulnerabilities
-
Teradata releases integrations for Dataiku to speed data and AI initiatives
-
US Senate passes $768 billion defense bill without cyber incident reporting provisions
-
Lightbits Labs partners with Define Tech to accelerate cloud-native deployments
-
Elliptic Labs collaborates with Intel to deliver platform for PC and IoT manufacturers
-
NICE Actimize partners with Sparkling Logic to offer financial crime management strategies
-
Theta Lake introduces free archiving capability for Zoom customers
-
NetWitness partners with Datashield to protect customers from Log4j Java security vulnerability
-
Lightview Capital invests in CyberSheath to protect the federal government supply chain
-
Unisys acquires CompuGain to expand cloud and infrastructure capabilities
-
Workiva acquires AuditNet to empower internal auditors with more technology and resources
-
Kroll acquires Security Compass Advisory to enhance its managed security solutions portfolio
-
ITC Secure and Cassava Technologies bring cloud security solutions to the African market
-
How CrowdStrike Protects Customers from Threats Delivered via Log4Shell
-
Cybersecurity experts debate concern over potential Log4j worm
-
US and Australia enter CLOUD Act agreement for cross-border access to electronic evidence
-
Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft
-
Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft
-
Appaegis raises $7.7M to deliver data-centric zero trust by federating identity and authorization
Generated on 2021-12-17 23:55:23.585152