Tag: Daily Summary

IT Security News Daily Summary 2022-10-12

US Targets China Semiconductor Industry With Raft Of Measures Binance Hit By $570m Crypto Theft Iran State-Run TV’s Live Transmission Hacked by Edalate Ali Hackers openSUSE: 2022:10144-1 important: gdcm, orthanc, orthanc-gdcm, orthanc-webviewer I’m now a Microsoft Most Valuable Professional!! Endor…

IT Security News Daily Summary 2022-10-11

Verimatrix Recognized as a Sample Vendor in 2022 Gartner® Hype Cycle™ for Application Security RedHat: RHSA-2022-6890:01 Important: OpenShift Virtualization 4.8.7 Images New Ubuntu Linux Kernel Security Updates Fix 16 Vulnerabilities, Patch Now Service Threat Engineering: Taking a Page From Site…

IT Security News Daily Summary 2022-10-10

Zoom Phishing Scam Steals Microsoft Exchange Credentials Ubuntu 5665-1: PCRE vulnerabilities The best Ring & Blink deals for October Prime Day Emotet Rises Again With More Sophistication, Evasion Business Owner Says Facebook Unnecessarily Blocking Ads For Charity US Airports in…

IT Security News Daily Summary 2022-10-09

The Best Open Source Tools to Secure Your Linux Server Enterprise Encryption for Linux New MSSQL Backdoor ‘Maggie’ Infects Hundreds of Servers Worldwide VPN use skyrockets in Iran as citizens navigate internet censorship under Tehran’s crackdown 2022-10-06 – HTML smuggling…

IT Security News Daily Summary 2022-10-08

Binance-Linked Network Hacked, Over $570 Million in Losses Recorded Fedora 36: python-joblib 2022-c0bfe37ae5 Slackware: 2022-281-01: libksba Security Update Russian Hackers Shut Down US State Government Websites Fedora 36: dotnet3.1 2022-980d492c98 Fedora 35: dotnet3.1 2022-847c67b3cd Watch out, a bug in Linux…

IT Security News Daily Summary 2022-10-07

Biden Administration implements data protection framework U.S.-EU data sharing CHIPS grants focus on seeding tech ecosystems How to protect your Firefox saved passwords with a Primary Password Report: Big U.S. Banks Are Stiffing Account Takeover Victims CISA plans local events…

IT Security News Daily Summary 2022-10-06

RedHat: RHSA-2022-6850:01 Important: openvswitch2.11 security update RedHat: RHSA-2022-6839:01 Important: squid security update SUSE: 2022:3545-1 important: python-PyJWT Location Privacy: What and Why? Securiti creates a command center for AI-driven cloud data protection Innovation that widens the social safety net This sneaky fraud…

IT Security News Daily Summary 2022-10-05

Northern Irish NHS threatened by malware attack Apache Pulsar Vulnerability Could Allow MiTM Attacks US Hosts Initial ‘Chip 4’ Meeting In Taiwan Hackers Compromise Corporate Chat Software Ride-Hailing Firm Bolt Protests Barcelona Rules RedHat: RHSA-2022-6819:01 Important: Red Hat AMQ Streams…

IT Security News Daily Summary 2022-10-04

RedHat: RHSA-2022-6777:01 Important: squid:4 security update RedHat: RHSA-2022-6776:01 Important: squid:4 security update RedHat: RHSA-2022-6775:01 Important: squid:4 security update RedHat: RHSA-2022-6774:01 Important: squid:4 security update SUSE: 2022:3523-1 moderate: libjpeg-turbo Microsoft Updates Mitigation for Exchange Server Zero-Days Ubuntu 5655-1: Linux kernel (Intel…

IT Security News Daily Summary 2022-10-03

Multiple Vulnerabilities Found In Canon Medical Vitrea View Software RedHat: RHSA-2022-6764:01 Important: bind security update Ubuntu 5614-2: Wayland vulnerability The Impact of Open Source on Cybersecurity Hackers leak data online in escalation of LA schools ransomware attack Supreme Court To…

IT Security News Daily Summary 2022-10-02

PRODUCT REVIEW: Nisos OSINT Monitoring and Analysis Debian LTS: DLA-3131-1: linux security update Debian: DSA-5245-1: chromium security update The Top 5 Cloud Vulnerabilities You Should Know Of Parrot OS 5.1 Brings a Host of Updates and New Docker Repo How…

IT Security News Daily Summary 2022-10-01

Mageia 2022-0350: python-mako security update Mageia 2022-0353: libjpeg security update Mageia 2022-0354: nodejs security update Enterprise Encryption for Linux Mageia 2022-0351: squid security update Mageia 2022-0352: expat security update Mageia 2022-0355: thunderbird security update SolarMarker Using Watering Hole Attacks and…

IT Security News Daily Summary 2022-09-29

Panel votes up House modernization plan Report finds women are declining CISO/CSO roles Unit 42 finds polyglot files delivering IcedID malware Palo Alto Networks and Deutsche Telekom Offer Secure Service Edge Scylla Ad Fraud Attack on iOS and Android Users…

IT Security News Daily Summary 2022-09-28

Skybox Security Reduces the Risk of Data Breach by 55%, Total Economic Impact™ Study Reveals SUSE: 2022:3455-1 important: libostree SUSE: 2022:3457-1 important: vsftpd SUSE: 2022:3456-1 important: libostree Cryptojacking, DDoS attacks increase in container-based cloud systems What the zero-trust security market…

IT Security News Daily Summary 2022-09-27

Debian: DSA-5239-1: gdal security update SUSE: 2022:3440-1 important: MozillaFirefox SUSE: 2022:3441-1 important: MozillaFirefox MITRE’s FiGHT Focuses on 5G Networks Lessons From the GitHub Cybersecurity Breach FBI Helping Australian Authorities Investigate Massive Optus Data Breach: Reports Amid Sweeping Change, Cyber Defenders…

IT Security News Daily Summary 2022-09-26

MITRE and the Office of the Under Secretary of Defense Announce FiGHT™ Framework to Protect 5G Ecosystem openSUSE: 2022:10130-1 important: opera Can Cloud Telephony Services with Military Grade Security Enable Organizations to Create High Brand Value? Crack The Code Archivist…

IT Security News Daily Summary 2022-09-25

OSINT and Top 15 Open-source Intelligence Tools QUAD Nations to Assist Each Other in Taking Action Against Malicious Cyber Activities Attackers impersonate CircleCI platform to compromise GitHub accounts How to Overcome the Pitfalls of the Saudi-Iran Dialogue Gentoo: GLSA-202209-11: HarfBuzz:…

IT Security News Daily Summary 2022-09-24

Avoiding the Risks of Ransomware Strikes in Life Sciences Building A Layered Plan for Battling Cybercrime UK Teen Arrested Amid Uber and GTA 6 Hacking Saga The Web2 problem: How the power to create has gone astray The Apple security…

IT Security News Daily Summary 2022-09-23

Chinese Media Allege NSA Tapped Into Telecom Network SUSE: 2022:3355-1 important: puppet SUSE: 2022:3356-1 important: dpdk The software supply chain: New threats call for new security measures Report: 90% of orgs believe cybersecurity risk isn’t being addressed One city’s proposed…

IT Security News Daily Summary 2022-09-20

What enterprises can learn about collaboration app weaknesses from the GTA VI breach ChromeLoader Malware Evolves into Prevalent, More Dangerous Cyber Threat Protect Small Businesses from Ransomware Critically Important Organization? 3 Cybersecurity Solutions Likely to Gain Traction In 2022 And…

IT Security News Daily Summary 2022-09-19

Cyber modernization too complex for quick fixes, in-house solutions, report says 2021 ‘ASTORS’ Government Innovator Confirmed by Senate for Second Term Top Cybersecurity Podcasts 2022 Beware of Queen Elizabeth II phishing scams, warns Kaspersky NYC plan would connect public housing…

IT Security News Daily Summary 2022-09-18

Information Warfare and What Infosec Needs to Know Poor Identity Management Amplifies Ransomware Akeyless Empowers Enterprise Code Security with Comprehensive Secrets Management The Importance of Terrorist Founders and the Role of Safe Havens LastPass Hacked, Customer Data and Vaults Secure…

IT Security News Daily Summary 2022-09-17

LastPass revealed that intruders had internal access for four days during the August hack Latest Cyberthreats and Advisories – September 9, 2022 Credential theft food chain—What is Ransomware-as-a-Service Serious Breach at Uber Spotlights Hacker Social Deception Hacker Couple Deleted Hotel…

IT Security News Daily Summary 2022-09-16

Local gov keeps project knowledge from walking out the door Discover the benefits and challenges of bug bounty programs Friday Squid Blogging: Mayfly Squid New Research Reveals Network Attacks at Highest Point Over the Last Three Years Omnibus Spending Bill…

IT Security News Daily Summary 2022-09-15

Crash data analysis gets $1M infusion Use shadow IT discovery to find unauthorized devices and apps Best Fraud Management Systems & Detection Tools in 2022 Critical Vulnerabilities Found in Devices That Provide WiFi on Airplanes 10 top malware protection solutions:…

IT Security News Daily Summary 2022-09-14

Report: Only 27% of orgs have observability over their full stack How integrated city data ensures social services delivery White House to tech world: Promise you’ll write secure code – or Feds won’t use it Microsoft Support Diagnostic Tool Vulnerability:…

IT Security News Daily Summary 2022-09-13

AutoRABIT unveils security tools for Salesforce ecosystems GPS jammers are being used to hijack trucks and down drones: How to stop them Microsoft Releases September 2022 Security Updates State pulls in $9M to improve public safety, justice IT systems Rethinking…

IT Security News Daily Summary 2022-09-12

Apple iOS 16: Passkeys brings passwordless authentication mainstream 5 actions to help state and local agencies gain visibility and improve IT hygiene Best Bluetooth trackers of 2022: AirTag and alternatives Hate Windows 11? Here’s how to make it work more…

IT Security News Daily Summary 2022-09-11

Lazarus Hackers are Using Log4j to Hack US Energy Companies Conti Gang Doppelganger Adopts Recycled Code Meta Disbands Team Studying Negative Impacts Of Facebook, Instagram Bangsamoro Peace and the U.S.-Philippines Alliance Threat Actors Exploit WeTransfer to Spread Lampion Malware Security Affairs…

IT Security News Daily Summary 2022-09-10

How Zero Trust and Secure Identities Can Help You Prevent Ransomware Attacks Integrated Risk Modeling Rapid7 Finds Four Flaws in SIGMA Spectrum Infusion Pump and WiFi Battery New Zero-day Flaw in BackupBuddy Plugin Leaves WordPress Users at Risk Traffic Safety…

IT Security News Daily Summary 2022-09-09

Friday Squid Blogging: Colossal Squid in New Zealand Museum State takes quantum tech from theory to business Sample CompTIA CASP+ practice questions with answers What is a VPN? A Beginner’s Guide to Virtual Private Networks Building back better with robotics…

IT Security News Daily Summary 2022-09-08

Open source security gets a boost with new scorecard and best practices Cloud-based 911 for faster emergency response How To Design and Build Longer Lasting Drones How To Increase User and Executive Participation In Security Awareness Training Programs ZTNA and…

IT Security News Daily Summary 2022-09-07

Golang adds vulnerability management tooling Dashboard, sensors report real-time data on city flooding Zyxel Patches Critical Vulnerability in NAS Firmware Cymulate Closes $70M Series D Funding Round FTC Sues Location Data Broker Profiling DEV-0270: PHOSPHORUS’ ransomware operations Health info exchange’s…

IT Security News Daily Summary 2022-09-06

White House to tap DOD weapons testing lead for Navy acquisition role 5G and cloud can work together to improve government operations, experts say Worok Hackers Target High-Profile Asian Companies and Governments Global Shipping Industry Faces Wave of Cyber Threats…

IT Security News Daily Summary 2022-09-05

QNAP warns new Deadbolt ransomware attacks exploiting zero-day Honoring Peter Eckersley, Who Made the Internet a Safer Place for Everyone How development data security operations can benefit the enterprise Keybank’s Customer Information Stolen By Hackers Via Third-party Provider Samsung Data…

IT Security News Daily Summary 2022-09-04

GDPR: Four Years After Its Enactment, Where Do We Stand? Google Fix Another Chrome Zero-Day With An Emergency Update The Prynt Stealer Malware Includes a Secret Backdoor, Hackers Steal Data from Credentials Anonymous Attacks Russian Taxi Company, Causes Traffic Jam…

IT Security News Daily Summary 2022-09-03

Security Affairs newsletter Round 382 Snake Keylogger is Back, Targets IT Corporates Anomaly Detection In Cybersecurity For Dummies The Future of Cybersecurity in SaaS Google Chrome Flaw Enables Sites to Copy text to Clipboard A New Ransomware Gang BianLian on a…

IT Security News Daily Summary 2022-09-02

Why Your Success Depends on Your IAM Capability Getting the word out on election security Convicted felon busted for 3D printing gun parts National Cyber Director’s office elevates key personnel Hackers gained access to Samsung customer data Crook busted after…

IT Security News Daily Summary 2022-09-01

State, local agencies to test geographic accuracy of emergency alerts Traffers threat: The invisible thieves Threat Actor Phishing PyPI Users Identified Neopets Hackers Had Network Access for 18 Months The Chatter Podcast: Leadership, Sports, and Intelligence Innovation with Sue Gordon,…

IT Security News Daily Summary 2022-08-31

Twitter and TikTok’s data privacy controversies show the dangers of third-party apps NASCIO selects 31 finalists for state IT recognition awards Google Fixes 24 Vulnerabilities With New Chrome Update Malicious Google Chrome extensions affect 1.4 million users CVSS Vulnerability Scores…

IT Security News Daily Summary 2022-08-30

Audit finds trouble in SSA’s agile software development Lawmakers Press Facebook For More Information On Communication With The FBI Text to Give v/s Mobile Giving Apps: Which One is Better? New Security for a World Where Everyone and Everything Are…

IT Security News Daily Summary 2022-08-29

Control insider threats with data loss prevention and user activity monitoring Collaboration, training key to local gov cyber defense, officials say corporate governance US FTC sued US data broker Kochava for selling sensitive and geolocation data Defense Department Finally Prioritizes…

IT Security News Daily Summary 2022-08-28

How to protect your business from cyberattacks with XDR DoorDash Data Breach Linked with Twilio Hackers Ransomware Resiliency for Storage & Backup: Trends, Threats & Tips USMC Cyberspace Ops Redesignated to Information Maneuver OCCFLD Atlassian Bitbucket: Vulnerability Spotted Inside Data Center…

IT Security News Daily Summary 2022-08-27

Product Review: NISOS Executive Shield Collective Resilience in an Era of Data Traps, Digital Borders, and Techtonic Geopolitical Shifts DoorDash Data Breach -Third Party Vendor Blamed Over Phishing Attack Facebook Parent Settles Suit in Cambridge Analytica Scandal Why owning your…

IT Security News Daily Summary 2022-08-26

DHS looks to cyber self-assessments over CMMC model Autonomous receiver tracks fish to improve hydropower dam operations Cloud modernization requires ‘whole of government’ effort Could Your Company Survive a Ransomware Attack? Facebook Removes Pro-U.S. Disinformation Campaign Why the Twilio Breach…

IT Security News Daily Summary 2022-08-25

Should You Use DNS Data to Drive Better Security Decisions? Lloyds refuses to cover nation-state attacks: What it means to enterprise Baltimore police to upgrade cell phone tracking tech LastPass source code, blueprints stolen by intruder Ransomware defies seasonal trends…

IT Security News Daily Summary 2022-08-24

How to stop social engineering tactics homomorphic encryption California corrections department hit by cyberattack CISA: Just-Disclosed Palo Alto Networks Firewall Bug Under Active Exploit 80,000 internet-connected cameras still vulnerable after critical patch offered PCI DSS v4.0 is coming, here’s how…

IT Security News Daily Summary 2022-08-23

County assessor’s code repository powers transparent government 7 guidelines to secure network storage DevSecOps Gains Traction — But Security Still Lags Mobile app aims to reduce work zone-related crashes Thoma Bravo Buying Spree Highlights Hot Investor Interest in IAM Market…

IT Security News Daily Summary 2022-08-22

Why getting endpoint security right is crucial Palo Alto shares jump, after revenue and earnings beat estimates Microsoft recognized as a Leader in the 2022 Gartner® Magic Quadrant™ for Unified Endpoint Management Tools Why Apple products are more vulnerable than…

IT Security News Daily Summary 2022-08-21

Ring App Vulnerability Could Expose User’s Phone Data 3 Ways Asset Management Companies Can Reduce Cyber Risk A Modern Cybersecurity Fight Requires a Modern Approach to Regulatory Oversight Mimecast: Mitigating Risk Across a Complex Threat Landscape Spanish Banking Trojan Attacks…

IT Security News Daily Summary 2022-08-20

Cyemptive Technologies CEO Named “Cybersecurity CEO of the Year” DeepSurface Adds Risk-Based Approach to Vulnerability Management Infrastructure as code and your security team: 5 critical investment areas Gurucul Returns to Compete in 5th ‘ASTORS’ Homeland Security Awards Become a Cybersecurity…

IT Security News Daily Summary 2022-08-19

Friday Squid Blogging: The Language of the Jumbo Flying Squid How to strengthen the human element of cybersecurity Google Fended Off Largest Ever Layer 7 DDoS Attack 8 secure file transfer services for the enterprise Zero Trust: Security Model for…

IT Security News Daily Summary 2022-08-18

What Web3 and the blockchain revolution mean for law enforcement D-Fend and Syzygy to Optimize C-UAS Communications & Data Management The Advantages of Breach and Attack Simulation for Data Security Business Email Compromise Attack Tactics 20% of developers and IT…

IT Security News Daily Summary 2022-08-17

How to Stop Local Governments From Being Attractive Cyber Attack Targets Understanding ransomware trends to combat threats Are deleted files really gone? New threat intelligence solution launched by Google Cloud Build a culture of action to improve diversity, equity, inclusion…

IT Security News Daily Summary 2022-08-16

SEC says brokerage accounts hijacked for $1.3m pump-and-dump scam ONCD seeks a lead for U.S. defensive cyber planning and operations New missile defense tech comes with acquisition risks DomainKeys Identified Mail (DKIM) For cyber insurance, some technology leads to higher…

IT Security News Daily Summary 2022-08-15

DEF CON 30: Hackers Come Home to Vibrant Community Best SIEM Tools & Software for 2022 CI/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers Thoughts on the Mar-a-Lago Search and the President’s Classification and Declassification Authority EFF…

IT Security News Daily Summary 2022-08-14

The problem with our cybersecurity problem Cisco Confirms Network Breach After Employee’s Google Account was Hacked A flaw in Xiaomi phones using MediaTek Chips could allow to forge transactions Responsible use of machine learning to verify identities at scale Upcoming…

IT Security News Daily Summary 2022-08-13

Flaw in the VA Medical Records Platform May Put Patients at Risk The Need for Automated Remediation in Saas Security Protect Your Executives’ Personal Digital Lives to Protect Your Company Google Fined $60M+ for Misleading Australians About Collecting Location Data…

IT Security News Daily Summary 2022-08-12

Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders The Most Relevant Ransomware Statistics and Facts of 2022 Intel increases its arsenal against physical hardware attacks Patch Madness: Vendor Bug Advisories Are Broken, So Broken Zoom’s Auto-Update…

IT Security News Daily Summary 2022-08-11

NSF invests $26M for smart city engineering research AI-powered cameras to enforce bus lanes The 4 best VPN services for iPhone and iPad in 2022 How credential phishing attacks threaten a host of industries and organizations SentinelOne discusses the rise…

IT Security News Daily Summary 2022-08-10

Why managed detection and response (MDR) adoption is growing among small businesses Carbon footprint data helps local authorities lower emissions Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds Cisco was hacked by the Yanluowang ransomware gang CISA issues cybersecurity…

IT Security News Daily Summary 2022-08-09

The best offense is a strong defense: Improve cloud security with visibility and zero trust segmentation How to move a data center Microsoft Patch Tuesday for August 2022 fixed actively exploited zero-day IRS free file figures into Senate Dems’ reconciliation…

IT Security News Daily Summary 2022-08-08

Senate Dems have joined the push to block a Schedule F revival Lawyers may be limiting threat info sharing Mobile threats prompt operational changes for government staff Top 8 in-demand cybersecurity jobs for 2022 and beyond Rise of precision agriculture…

IT Security News Daily Summary 2022-08-07

Darktrace Nominated to Compete for Double ‘ASTORS’ Awards in 2022 Twitter Confirms Data Breach as 5.4M Accounts Sold on Hacker Forum Serious cyberattack hits German Chambers of Industry and Commerce (DIHK) Neuro Practice Says 363,000 Users’ Personal Info Leaked The…

IT Security News Daily Summary 2022-08-06

Greek intelligence service used surveillance malware to spy on a journalist, Reuters reports DuckDuckGo says Hell, Hell, No to those Microsoft trackers after web revolt Slack resets passwords for about 0.5% of its users due to the exposure of salted…

IT Security News Daily Summary 2022-08-05

Hackers Can Exploit US Emergency Alert System Flaws to Fake Warnings The popularity of Dark Utilities ‘C2-as-a-Service’ rapidly increases Well-Architected Framework: Sustainability Misinformation campaigns and threats are undermining confidence in U.S. elections, official says NSF invests $25.4M into cybersecurity and…

IT Security News Daily Summary 2022-08-04

Amazon, IBM Move Swiftly on Post-Quantum Cryptographic Algorithms Selected by NIST Research Shows the Annual Cost of API Security-related Breaches is Mind-blowing Time to Patch VMware Products Against a Critical New Vulnerability Ransomware review: July 2022 How crypto tokens became…

IT Security News Daily Summary 2022-08-03

How IT Teams Can Use ‘Harm Reduction’ for Better Cybersecurity Outcomes Woody RAT: A new feature-rich malware spotted in the wild Compliance Automation Startup RegScale Scores $20 Million Investment TMF announces over $26 million for three projects Averting the next…

IT Security News Daily Summary 2022-08-02

Civic engagement takes off with digital survey and respect for community feedback Massive New Phishing Campaign Targets Microsoft Email Service Users Check Point announces its Azure Virtual WAN security solution It’s time for digital self-sovereign identity New Microsoft tools aim…

IT Security News Daily Summary 2022-08-01

IBM report shows healthcare has a growing cybersecurity gap Senators introduce bill to ensure resiliency of federal data centers National Computer Forensics Institute up for reauthorization DoJ: Foreign Adversaries Breach US Federal Court Records API Security Weekly: Issue 173 Eavesdropping…

IT Security News Daily Summary 2022-07-31

Businesses Will Suffer Cyber-Attacks; But Do They Know the Real Cost? aiXDR Brief Novel Phishing Campaign Employs Countdown Timer to Pressurize Victims (ISC)² and Others Commit to Closing the Cybersecurity Workforce Gap While at the White House Facebook Ads Push…

IT Security News Daily Summary 2022-07-30

Reading the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report Darktrace Launches ‘PREVENT’ to Proactively Protect Organizations Stop Putting Your Accounts At Risk, and Start Using a Password Manager US Government Alerts Americans of Rising SMS Phishing Attacks CISA orders to…

IT Security News Daily Summary 2022-07-29

Biden picks next Space Force chief AWS Focuses on Identity Access Management at re:Inforce Where to see UFOs Microsoft Connects USB Worm Attacks to ‘EvilCorp’ Ransomware Gang Attackers Have ‘Favorite’ Vulnerabilities to Exploit Power struggles in Data Center Alley 911…

IT Security News Daily Summary 2022-07-28

Lawmakers call for DHS inspector general to ‘step aside’ from Secret Service probe AI can be a first line of defense in fielding 988 calls Election info must be more accessible to disabled, survey says Akamai blocked the largest DDoS…

IT Security News Daily Summary 2022-07-27

With $11.5M In Funding, Naoris Protocol Will Use Blockchain & Decentralization To Plug Web3 Security Gaps Bill aims to create one disaster recovery assistance application Preventing wildfires could start with data from controlled burns Nuki Smart Lock Vulnerabilities Allow Hackers…

IT Security News Daily Summary 2022-07-26

Pass the CHIPS Act Vulnerability Summary for the Week of July 18, 2022 Culture shock: Ransomware gang sacks arts orgs’ email lists (ISC)² and Others Commit to Closing the Cybersecurity Workforce Gap While at the White House Digital hub finds…

IT Security News Daily Summary 2022-07-25

PrestaShop Confirms Zero Day Attacks Hitting eCommerce Servers The awkward state of the remote vs. in-person work debate T-Mobile US to cough up $550m after info stolen on 77m customers Rare ‘CosmicStrand’ UEFI Rootkit Swings into Cybercrime Orbit Supercharged Version…

IT Security News Daily Summary 2022-07-24

Most Important Security Tools For Security Researchers & Malware Analyst Hacker Offers 5.4 million Twitter Account Details for $30,000 (ISC)² Pledges 1 Million Certified in Cybersecurity Microsoft Hit by Huge Service Outage T-Mobile Agrees to Pay $350M to Users in…

IT Security News Daily Summary 2022-07-23

Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware ⚡ Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware ⚡ Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware ⚡ Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware ⚡…

IT Security News Daily Summary 2022-07-22

Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware ⚡ TSA revises cyber rules for pipelines Surveillance is pervasive: Yes, you are being watched, even if no one is looking for you Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware…

IT Security News Daily Summary 2022-07-21

Critical Vulnerability in Popular GPS Tracker Lets Hackers Remotely Control Vehicles Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware ⚡ Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware ⚡ Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware…

IT Security News Daily Summary 2022-07-20

Forrester’s best practices for zero-trust microsegmentation Keep your data safe forever with these two apps for only $30 In Defense of the Justice Department Is the Justice Department Meeting the Moment? Apple Ships Urgent Security Patches for macOS, iOS Google:…

IT Security News Daily Summary 2022-07-19

Ransomware preparation and response: Develop a cyber kill chain Want to block third-party trackers on your Android device? Try DuckDuckGo’s new feature Ongoing Magecart Campaign Targets Online Ordering at Local Restaurants Tech companies pledge free cybersecurity training at White House…

IT Security News Daily Summary 2022-07-18

Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate Best practices for legal hold storage NACo adds risk ratings tool to its community portal FBI: Beware of Scam Cryptocurrency Investment Apps MAR-10382580-r2.v1 – RAT API Security Weekly: Issue…

IT Security News Daily Summary 2022-07-17

Lenovo UEFI Firmware Vulnerabilities Risk Numerous Laptop Models Hackers can spoof commit metadata to create false GitHub repositories Crooks stole $375k from Premint NFT, it is one of the biggest NFT hacks ever Acquiring Actionable Knowledge Through Collaboration Darkweb Monitoring…

IT Security News Daily Summary 2022-07-16

Critical flaw in Netwrix Auditor application allows arbitrary code execution Homeland Security Warns Log4j’s ‘Endemic’ Threats for Years to Come 5 data privacy imperatives for enterprise leaders North Korean Hackers Employ H0lyGh0st Ransomware to Target Businesses ISG to Publish Report…

IT Security News Daily Summary 2022-07-15

DevSecOps: What enterprises need to know E-bike pilots deliver micromobility travel insights, CO2 savings Friday Squid Blogging: Squid Inks Fisherman Digital ID bill sees action in the House and Senate CISA pulls the fire alarm on Juniper Networks bugs Brave…

IT Security News Daily Summary 2022-07-14

5 of the Most Commonly Overlooked Security Measures Security and Compliance Considerations for the Public Cloud Cryptocurrency crash triggers crisis for dark web exchanges Uniswap V3 LPs Lose Millions in Fake Token Phishing Attack EEOC: Women still lag far behind…

IT Security News Daily Summary 2022-07-13

🚀 Launching Autonomous SecOps (Your Virtual, Algorithm-Driven Tier 1 SOC Team) DDR: Comprehensive enterprise data security made easy Video games can change your brain for the better Report: Financial Institutions Overly Complacent About Current Authentication Methods CyberRatings.org Issues AAA Rating…

IT Security News Daily Summary 2022-07-12

🚀 Launching Autonomous SecOps (Your Virtual, Algorithm-Driven Tier 1 SOC Team) CISA Adds One Known Exploited Vulnerability to Catalog  Citrix Releases Security Updates for Hypervisor SAP Releases July 2022 Security Updates Microsoft Releases July 2022 Security Updates 🚀 Launching Autonomous…

IT Security News Daily Summary 2022-07-11

🚀 Launching Autonomous SecOps (Your Virtual, Algorithm-Driven Tier 1 SOC Team) Labor Department seeks leader for digital transformation CISA flags election system threats ahead of midterms Revamped UI interface streamlines processes for businesses, unemployed FBI, LA County target rogue drones…

IT Security News Daily Summary 2022-07-10

✨ Happy Birthday to EFF! How the FBI quietly added itself to criminals’ instant message conversations ✨ Happy Birthday to EFF! ✨ Happy Birthday to EFF! Microsoft Defender for Endpoint Launches Mobile Network Protection Google Patched One More Chrome Zero-Day…

IT Security News Daily Summary 2022-07-09

Shadow Code 101: A Quick Look at the Risks Emsisoft Releases Free Decryptor For AstraLocker and Yashma Ransomware Does “Autostart” Really Mean “Autostart”? Firewalls Aren’t Enough to Protect Against Evolving Cyber Threats Mitigate Risk by Securing Third Party Software and Environments…

IT Security News Daily Summary 2022-07-08

Kaseya, one year later: What have we learned? The cyber strategies CISOs depend on Friday Squid Blogging: Fishing for Squid House bill tasks CISA with SolarWinds report Best Disaster Recovery Solutions for 2022 Microsoft Reverses Course on Blocking Office Macros…

IT Security News Daily Summary 2022-07-07

CFPB expands technologist hiring program For the Love of the Wild Web 🖤 Early detection crucial in stopping BEC scams For the Love of the Wild Web 🖤 RSS Testing Large-scale cryptomining campaign is targeting the NPM JavaScript package repository…

IT Security News Daily Summary 2022-07-06

Right-wing activist tees up successor to Schedule F Apple previews “Lockdown Mode,” a new extreme security feature Meta Sues Chinese Company For Scraping Facebook And Instagram User Data North Korean State Actors Deploy Surgical Ransomware in Ongoing Cyberattacks on US…

IT Security News Daily Summary 2022-07-05

Cloud spending continues to climb HackerOne Employee Fired for Stealing and Selling Bug Reports for Personal Gain GSA looks to help get LGBTQI-owned small businesses in the contracting mix DOD rings in Independence Day with bug bounties Supply Chain Attack…

IT Security News Daily Summary 2022-07-04

Vulnerability Summary for the Week of June 27, 2022 Google fixes the fourth Chrome zero-day in 2022 HackerOne insider fired for trying to claim other people’s bounties Emergency Chrome 103 Update Patches Actively Exploited Vulnerability Vulnerability Summary for the Week…

IT Security News Daily Summary 2022-07-03

Tens of Jenkins plugins are affected by zero-day vulnerabilities ZuoRAT Malware Targets SOHO Routers In North America, Europe – Expert Comment What Expert Says On Marqeta Expanding Credit Platform With 40 New APIs ATC Healthcare, Community of Hope & The…

IT Security News Daily Summary 2022-07-02

Experts shared PoC exploit code for RCE in Zoho ManageEngine ADAudit Plus tool The role of Social Media in modern society – Social Media Day 22 interview Why you should care about privacy computing technologies Why more regulation of connected…