Tag: Daily Summary

IT Security News Daily Summary 2022-06-21

Biden signs bill creating federal cybersecurity rotational program President Biden nominates OSTP director Heimdal™ Security Researchers Discover Massive Surge in DDoS Attacks RIG Exploit Kit Replaces Raccoon Stealer Trojan With Dridex China-Linked ToddyCat APT Pioneers Novel Spyware Heimdal™ Security Researchers…

IT Security News Daily Summary 2022-06-20

Report: Orgs with zero-trust segmentation avoid 5 major cyberattacks annually Capital One Attacker Exploited Misconfigured AWS Databases Google Stops Allowing Username And Passwords On Third-party Email Apps Client-side Magecart attacks still around, but more covert What is the American Data…

IT Security News Daily Summary 2022-06-19

USB Forensics – Reconstruction of Digital Evidence from USB Drive Overturning Roe: What Might This Mean for Military Culture? Meet “Universal ZTNA,” Powered by Genians #1 Proven NAC, at Infosecurity Europe 2022 DevSecOps deploy and operate processes Police Linked To…

IT Security News Daily Summary 2022-06-18

What You Need to Know About The Role of Patch Management For Cyber Security How to Discover Exploitable Intelligence with Attack Surface Management Microsoft Launches New Privacy Features for Windows 11 US DoJ announced to have shut down the Russian…

IT Security News Daily Summary 2022-06-17

Jit aims to simplify product security for developers Friday Squid Blogging: Signature Steamed Giant Squid with Thai Lime Sauce Ransomware and Phishing Remain IT’s Biggest Concerns Abortion rights: US senators seek ban on sale of health location data Judiciary’s zero-trust…

IT Security News Daily Summary 2022-06-16

Report: 59% of SMEs say cybersecurity is the top IT challenge of the past year House Oversight Committee advances legislation encouraging telework at agencies Rampant ID theft targets pandemic benefits, watchdogs say Voxlens makes interactive data more accessible for screen…

IT Security News Daily Summary 2022-06-15

Identity and Access: The Game is the Same – It Just Got Fiercer Defense topline funding could see a bump, panel chairman says ‘Hertzbleed’ Side-Channel Attack Threatens Cryptographic Keys for Servers 7 Ways to Bring AI to Cybersecurity What is…

IT Security News Daily Summary 2022-06-14

Citrix Releases Security Updates for Application Delivery Management WiFiDuck BadUSB Tester Infrastructure investments should focus on ‘cyber smart’ projects 3 ways governments can regain citizens’ trust Citrix Releases Security Updates for Application Delivery Management Ransomware Group Debuts Searchable Victim Data…

IT Security News Daily Summary 2022-06-13

The intelligent way to detect fraud Industroyer: A cyber‑weapon that brought down a power grid Inglis says infrastructure outlays should focus on ‘cyber smart’ investments Kaiser Permanente Breach Exposes Data on 70K Patients Everything you need to know about zero-trust…

IT Security News Daily Summary 2022-06-12

The attacker’s toolkit: Ransomware-as-a-service The United Nations’ List of “Not Listed” Terrorist Entities Security Bug Detected in Apple M1 Processor Chipsets Companies Continue to Pay Multiple Ransom Demands Convergint Expands STEP Up Program, Prioritizes School Safety as Part of Annual,…

IT Security News Daily Summary 2022-06-11

New Emotet Variant Capturing Users’ Credit Card Data from Google Chrome Carrier’s Industrial Access Control System has Critical Flaws Entrepreneur Struggles To Regain Access To Hacked Facebook Accounts Bluetooth Signals Can Be Abused To Detect and Track Smartphones Iran-linked Lyceum…

IT Security News Daily Summary 2022-06-10

Report: Over 1B Google Play downloads for financial apps targeted by malware In search of a more energy-efficient blockchain How CISOs can Find and Retain Security Staff During the Great Resignation World Economic Forum wants a global map of online…

IT Security News Daily Summary 2022-06-09

UAS network expands operational drone testing Replacing lead pipes first depends on being able to find them Rob Joyce: China represents biggest long-term cyberthreat #RSAC: NSA Outlines Threats from Russia, China and Ransomware Lacework Blends Artificial Intelligence and Automation to…

IT Security News Daily Summary 2022-06-08

MakeMoney malvertising campaign adds fake update template States try incentive-based cybersecurity 0Patch released unofficial security patch for new DogWalk Windows zero-day Radio waves for the detection of hardware tampering CISA director promotes collaboration and trust at RSAC 2022 TSP participants…

IT Security News Daily Summary 2022-06-07

AppOmni raises $70M to secure orgs’ SaaS apps Smart cameras automate recording, boost police transparency Smart edge infrastructure expands capacity, real-time data access How to use AI in cybersecurity? Lawmakers want to know how much bad software costs DOD Microsoft…

IT Security News Daily Summary 2022-06-06

FBI warns of scammers soliciting donations for Ukraine RecoLabs hopes to secure enterprise collaboration Brush up on phishing detection to prevent ransomware Ransomware attacks may be tough to stop, but here’s how to recover Speech-Related Offenses Should be Excluded from…

IT Security News Daily Summary 2022-06-05

A New Paradigm for Absolute Zero Trust and Infrastructure Resiliency Secure access for a connected world Alert Fatigue Puts Your Organization at Risk; Here’s What to do about it How SD-WAN Enables Digital Transformation Need Micro-segmentation Superpowers? Visit ColorTokens at…

IT Security News Daily Summary 2022-06-04

Anonymous Hacktivists Leak 1TB of Top Russian Law Firm Data LuoYu APT Delivers WinDealer Malware Via Man-on-the-side Attacks Android Trojans are After Financial Apps With Over a Billion Downloads Why hybrid work is leading to cybersecurity mistakes GigNet Chairman and…

IT Security News Daily Summary 2022-06-03

Friday Squid Blogging: More on the “Mind Boggling” Squid Genome Accessing Ethereum Archive Nodes With Infura How to Prevent Software Supply Chain Attacks An Actively Exploited Microsoft Zero-Day Flaw Still Has No Patch Atlassian Releases New Versions of Confluence Server…

IT Security News Daily Summary 2022-06-02

May ransomware attacks strike municipal governments, IT firms Cerberus Sentinel Completes Acquisition of Creatrix, Inc. Remotely Controlling Touchscreens This dangerous botnet has found a new way to infect your endpoints New Microsoft Office zero-day used in attacks to execute PowerShell…

IT Security News Daily Summary 2022-06-01

Database for a secure EV battery supply chain FluBot Android Malware Operation Disrupted, Infrastructure Seized Hunting for Threats Using Network Traffic Flows Feds Seize Domains Dealing Stolen Personal Data Darktrace’s David Masson on What Attacks on Critical Infrastructure Look Like…

IT Security News Daily Summary 2022-05-31

How process mining uncovers workflow bottlenecks 3.6M MySQL Servers Found Exposed Online Biometric Data Offers Added Security — But Don’t Lose Sight of These Important Risks New Microsoft Zero-Day Attack Underway Surefire Cyber Launches to Help Cyber Insurance Ecosystem from…

IT Security News Daily Summary 2022-05-30

10K Followers on LinkedIn and Heimdal™’s LinkedIn Giveaway 10K Followers on LinkedIn and Heimdal™’s LinkedIn Giveaway Three Nigerian men arrested in INTERPOL Operation Killer Bee 10K Followers on LinkedIn and Heimdal™’s LinkedIn Giveaway Researchers Warn of New Microsoft Office 0-Day…

IT Security News Daily Summary 2022-05-29

3 most common — and dangerous — holes in companies’ cyber defenses Pro-Russian hacker group KillNet plans to attack Italy on May 30 Report: Facebook Profited Off Ads Promoting White Supremacist Content SQL Injection & the BillQuick Attack: Best Practices…

IT Security News Daily Summary 2022-05-28

ChromeLoader Malware Hijacks Chrome Browser via Malicious Extension Sophos MTR to Compete in 2022 ‘ASTORS’ Homeland Security Awards Threats in the shadows: Combatting RF attacks with geofencing Meet “ZTNA Anywhere,” Powered by Genians #1 Proven NAC, at RSAC 2022 How…

IT Security News Daily Summary 2022-05-27

Zoom Flaws Can Be Exploited By Hackers by Sending Specially Crafted Messages Space Force Expands Cyber Defense Operations Exposed Kubernetes Clusters, Kubelet Ports Can Be Abused in Cyberattacks Massachusetts’ Highest Court Upholds Cell Tower Dump Warrant This Mental Health Awareness…

IT Security News Daily Summary 2022-05-26

Best File & Disk Encryption Tools for Linux Maryland launches Mobile ID for Apple Wallet How GDPR Is Failing Why it’s hard to sanction ransomware groups Broadcom’s play to acquire VMware could strengthen its enterprise focus Fake Windows exploits target…

IT Security News Daily Summary 2022-05-25

Graduation dashboard shows how education spending pays off Visualizing vulnerability: County maps show areas of greatest need App eases public transit for blind riders $756M still left in TMF Nava looks to APIs to standardize federated benefits programs Hearing examines…

IT Security News Daily Summary 2022-05-24

Is it really technology that makes a city smart? MFA technology is rapidly evolving — are mandates next? New Attack Shows Weaponized PDF Files Remain a Threat Get More from Your Cybersecurity Spend When Inflation Rates Climb Netskope releases new…

IT Security News Daily Summary 2022-05-23

$13.5M in new TMF awards to NARA, USDA Veeam data protection aids users with secure restores Malicious Python Repository Package Drops Cobalt Strike on Windows, macOS & Linux Systems Multiple Governments Buying Android Zero-Days for Spying: Google AdvIntel: Conti rebranding…

IT Security News Daily Summary 2022-05-22

Web Tracker Caught Intercepting Online Forms Even Before Users Hit Submit New MITRE Framework For Supply Chain Security Global Food Supply Chain Threatened By Hackers Evasive Bots Driving Online Fraud: 2022 Report Conti Ransomware Shuts Down Operation, Rebrands Into Smaller…

IT Security News Daily Summary 2022-05-21

5 Casual Games You Can Play on Your Mobile Browser Now Pwn2Own 2022: Windows 11, Ubuntu, Firefox, Safari, Tesla and more hacked Payment Gateway Firm Razorpay Loses ₹7.3 Crore in Cyber Fraud Incident (Saas): What Is It And What Are…

IT Security News Daily Summary 2022-05-20

Schools should prep for ransomware with response and comms plans, experts say Friday Squid Blogging: Squid Street Art Large-Scale Attack Targeting Tatsu Builder WordPress Plugin What the U.S. government’s security testing protections mean for enterprises SentinelOne vs Palo Alto: Compare…

IT Security News Daily Summary 2022-05-19

Report: Only 13.6% of tech leaders believe they’ve ‘mastered’ cloud security Senators push for $300M boost to TMF US Justice Department won’t prosecute white-hat hackers under the CFAA Jupiter Plugin Flaws Enable Hackers to Hijack Websites Pentagon wants to take…

IT Security News Daily Summary 2022-05-18

Crypto Trading Safety Tips To Keep In Mind Uncovering a Kingminer Botnet Attack Using Trend Micro™ Managed XDR Report: 88% of business leaders would pay the ransom if hit by a cyberattack 5 ways to proactively protect government networks Higher…

IT Security News Daily Summary 2022-05-17

Pentagon closing in on ‘ethical’ AI implementation How mainframes fit into hybrid environments What You Need to Know about the Sysrv-K Cryptomining Botnet in Less than a Minute> ISPs offering low-cost wireless broadband get free access to DC rooftops Vulnerabilities…

IT Security News Daily Summary 2022-05-16

Maryland ramps up cybersecurity 50% of Orgs Rely on Email to Manage Security How cryptocurrencies enable attackers and defenders iPhones Open to Attack Even When Off, Researchers Say Critical bug in Zyxel firewalls, VPNs exploited in the wild Apple fixes…

IT Security News Daily Summary 2022-05-15

Car hack attacks: It’s about data theft, not demolition How to spot the signs of a virtual kidnap scam May 08 – May 14 Ukraine – Russia the silent cyber conflict Nearly 15 Million People Impacted by ElasticSearch Misconfiguration Praetorian…

IT Security News Daily Summary 2022-05-14

Women in cybersecurity: Shattering the myths, once and for all Telegram is Selling the Eternity Malware Kit, Which Offers Malicious Services Hired ‘Hackers’ Try, and Fail, to Invade Brazil Vote System The LEGION collective calls to action to attack the…

IT Security News Daily Summary 2022-05-13

GSA’s new thinking for evaluating Polaris bids Understanding Data Sources and File Formats SonicWall urges customers to fix SMA 1000 vulnerabilities Citrix exec explains why orgs are using DaaS to secure hybrid workspaces White House joins OpenSSF and the Linux…

IT Security News Daily Summary 2022-05-12

Google launches ‘open-source maintenance crew’ Report: 44% decrease in average amount paid after ransomware attacks 3 Predictors of Cybersecurity Startup Success If you’ve got Intel inside, you probably need to get these security patches inside, too How to counter smart…

IT Security News Daily Summary 2022-05-11

Real win vs. privacy theater: Google’s new personal information removal policy How Radiflow helps CISOs secure operational technology environments PlainID Debuts Authorization-as-a-Service Platform ICE has assembled a ‘surveillance dragnet’ with facial recognition and data, report says Ready, IAM, Fire: How…

IT Security News Daily Summary 2022-05-10

Federal CIO talks customer experience Signals along ‘Smart Spines’ optimize traffic flow VERT Threat Alert: May 2022 Patch Tuesday Analysis US, Europe formally blame Russia for data wiper attacks against Ukraine, Viasat As important as bulletproof vests: Yubico sends 20,000…

IT Security News Daily Summary 2022-05-09

EV infrastructure vulnerabilities put cars, the grid at risk Cryptocurrency hype spawns email attacks, FBI says Costa Rica Declares State of Emergency Under Sustained Conti Cyberattacks How lightweight encryption can protect critical infrastructure for smart cities Number ‘100’ And Scams…

IT Security News Daily Summary 2022-05-08

India’s ongoing outrage over Pegasus malware tells a bigger story about privacy law problems Conti ransomware claims to have hacked Peru MOF – Dirección General de Inteligencia (DIGIMIN) OpenSea Warns of Discord Channel Hack Russian Group Attack on Bulgarian Refugee…

IT Security News Daily Summary 2022-05-07

Post-Quantum Cryptography Set to Replace RSA, ECC Heroku Admits to Customer Database Hack after OAuth Token Theft SEEQC’s Statement in Support of President Biden’s Executive Order and National Security Memorandum on Quantum Computing Blackpoint Cyber Announces Launch of New Podcast,…

IT Security News Daily Summary 2022-05-06

Do Macs Need Antivirus Software? How to Remove Personal Information From Data Broker Sites The Pentagon wants to prevent personnel data tracking, breaches NIST’s supply chain security guidance tells agencies to look to FedRAMP EV charging station map highlights infrastructure…

IT Security News Daily Summary 2022-05-05

Google, Apple, Microsoft promise end to passwords, courtesy of your mobile phone How to use KDE Plasma’s Konsole SSH plugin CrowdStrike vs FireEye: Compare EDR software Check Point vs Palo Alto: Comparing EDR software How to manage your Alexa voice…

IT Security News Daily Summary 2022-05-04

2022-05-03 – Contact Forms campaign –> Bumblebee –> Cobalt Strike Senator calls on Biden to fill OSTP leadership role Space Force to bring data scientists, coders on board this summer City, state cybersecurity programs follow Washington’s lead IRS leader explains…

IT Security News Daily Summary 2022-05-03

NIST is building a 5G network to model cybersecurity for operators Cloud authorization ecosystem to expand, StateRAMP predicts Trend Micro discovers AvosLocker can disable antivirus software SolarWinds Attackers Gear Up for Typosquatting Attacks Ridiculous Ransomware Kill Switch RCE vulnerabilities found…

IT Security News Daily Summary 2022-05-02

Ransomware attacks more frequent, damaging and costly Cybersecurity and supply chain essential for building tomorrow’s digital infrastructure Google Offers $1.5M Bug Bounty for Android 13 Beta New Bumblebee Malware Loader Emerges To Replace IcedID and BazaLoader NJ combats vehicle theft…

IT Security News Daily Summary 2022-05-01

Cybersecurity and the Pareto Principle: The future of zero-day preparedness 5 key industries in need of IoT security Researchers Claim RCE Vulnerability Could Affect VirusTotal Platform – VirusTotal Denies Multiple “Nimbuspwn” Vulnerabilities Allowed Linux Privilege Escalation A New Malware “Prynt”…

IT Security News Daily Summary 2022-04-30

Microsoft Azure flaws could allow accessing PostgreSQL DBs of other customers The case for data-centric security in 2022 Identifying Ransomware’s Stealthy Boot Configuration Edits Emotet tests new attack chain in low volume campaigns Black Basta Ransomware Hits American Dental Association…

IT Security News Daily Summary 2022-04-29

Report: 95% of IT leaders say Log4shell was ‘major wake-up call’ for cloud security Smart pavement powers data collection, EV charging, wireless access, edge computing Friday Squid Blogging: Ten-Foot Long Squid Washed onto Japanese Shore — ALIVE As satellite images…

IT Security News Daily Summary 2022-04-28

Can your mobile phone get a virus? Yes – and you’ll have to look carefully to see the signs Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021 Cisco Releases Security Updates for Multiple Products The Subject Of Trusting ‘Russian’…

IT Security News Daily Summary 2022-04-27

The data states need to improve digital equity Russia Coordinating Cyberattacks With Military Strikes in Ukraine: Microsoft How to conduct Linux privilege escalations The Role IaaS Providers Play in Elevating Security Posture Explaining User and Entity Behavior Analytics: Enhanced Cybersecurity…

IT Security News Daily Summary 2022-04-26

Agriculture Department offers grants to improve SNAP Practice makes perfect when it comes to recovering from a cyberattack US Offers $10 Million in Rewards for Russian Intelligence Officers Behind NotPetya Cyberattacks Tenable Shells Out $45 Million to Acquire Bit Discovery…

IT Security News Daily Summary 2022-04-25

Report: More than 1B IoT attacks in 2021 Choosing the right mobile tech to enhance first responder workflows CISA Adds Seven Known Exploited Vulnerabilities to Catalog Trend Micro launches new attack surface management platform DOD IG says Army could waste…

IT Security News Daily Summary 2022-04-24

Sensitive Data: Securing Your Most Important Asset Spain Vows to be Transparent in Probe of Pegasus Spyware Use New iPhone Zero-Click Bug Exploited In Pegasus Attacks Against Catalans Watch Out For This Fake Windows 11 Upgrade Lure AWS, and Alibaba…

IT Security News Daily Summary 2022-04-23

[Video] Exploiting Windows RPC – CVE-2022-26809 Explained | Patch Analysis T-Mobile confirms Lapsus$ had access its systems Dangerous malware is up 86%: Here’s how AI can help Are you using Java 15/16/17 or 18 in production? Patch them now! To…

IT Security News Daily Summary 2022-04-22

Unethical vulnerability disclosures ‘a disgrace to our field’ An introduction to binary diffing for ethical hackers US DOJ probes Google’s $5.4b Mandiant acquisition Sophos Buys Alert-Monitoring Automation Vendor 5 reasons the U.S. could lose its quantum leadership Report: Facebook Posts…

IT Security News Daily Summary 2022-04-06

Forrester names Microsoft a Leader in 2022 Enterprise Detection and Response Wave™ report Congressional chair asks Google and Apple to help stop fraud against U.S. taxpayers on Telegram Eliminating Passwords: One Way Forward Forrester names Microsoft a Leader in 2022…

IT Security News Daily Summary 2022-04-05

Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely Smarter Homes & Gardens: Protecting the Smart Devices in Your Home Avast releases new features to stop phishing and online scams US State Department opens cyberspace policy bureau 5…

IT Security News Daily Summary 2022-04-04

What is Metatrader4? Can small businesses keep up with defense cyber requirements? Millions of Installations Potentially Vulnerable to Spring Framework Flaw The NDO Fairness Act Is an Important Step Towards Transparency Just Because You’re Small, Doesn’t Mean You’re Safe –…

IT Security News Daily Summary 2022-04-03

Three Ways IP Data Enhances Cyber Security Your Guide to the NIST Cybersecurity Framework Info Stealing BlackGuard Malware is Advertised for Sale on Russian Hacking Forums Viasat: Acid Rain Virus Disable Satellite Modems Adversarial AI and the dystopian future of tech…

IT Security News Daily Summary 2022-04-02

UK Police charges two teenagers for their alleged role in the Lapsus$ extortion group Spring4Shell Zero-Day Vulnerability After 17 years, the Zlib Crash-An-App Flaw Has Been Patched Pune Police Recover Over Rs. 84 Crore Worth of Bitcoins From Two Cyber…

IT Security News Daily Summary 2022-04-01

Report: One in four employees who made security mistakes lost their job Blockchain can power up government processes, GAO says Login.gov plans to scale up without facial recognition tech – for now New Subscription: Learn Fundamentals Agencies can accelerate AI…

IT Security News Daily Summary 2022-03-31

authentication server As digital life gets cloudy, effective backups clear the sky for business continuity Air Force software factory looks to unleash ‘chaos’ on civilian IT shops Ransomware: Should Companies Ever Pay Up? Royal Enfield – 420,873 breached accounts SSA…

IT Security News Daily Summary 2022-03-30

Cyber Command’s acquisition growing pains New cyber bill calls for shadow IT assessment at VA Tracking transaction data on the ‘pseudo-anonymous’ blockchain The Total Economic Impact™ of Cisco Secure Firewall Viasat confirms cyber attack on Ukraine customers The Total Economic…

IT Security News Daily Summary 2022-03-29

CYE launches new group to provide advanced cyber architecture Hackers Steal Over $600M in Major Crypto Heist Former Facebook Exec Warns Of “Privacy And Security Nightmare” For WhatsApp Private Equity Firm Led by Mnuchin Acquires Mobile Security Vendor Zimperium My…

IT Security News Daily Summary 2022-03-28

Severe XSS Vulnerability Found In Microweber CMS Senators look to root out contractor conflicts of interest Illinois joins states setting up cyber units New Lapsus$ Hack Documents Make Okta’s Response Look More Bizarre Welcoming the Bulgarian Government to Have I…

IT Security News Daily Summary 2022-03-27

Latest Google Chrome Update Fixed Another Zero-Day Flaw Prepare Your Business for the Future of Cyberwar: A Review of The Art of Cyberwarfare> Ransomware as a Service: The Trending Business Model for Attacks How To Add a Social Login to…

IT Security News Daily Summary 2022-03-26

Azurite – An Azure AD Enumeration Tool How to Fix Mid-Market Security Using Intelligent Automation and AI 5 Ways Cybersecurity Will Change In 2022 Milliseconds matter: The business impact of data responsiveness 5-Step Cyber Threat Hunting Process Anonymous Plan to…

IT Security News Daily Summary 2022-03-25

Anonymous leaked 28GB of data stolen from the Central Bank of Russia DOJ Indicts Russian Gov’t Employees Over Targeting Power Sector Indictment of Russian National Offers Glimpse Into Methodical Targeting of Energy Firm CISA Adds 66 Known Exploited Vulnerabilities to…

IT Security News Daily Summary 2022-03-24

Will Okta recover its cred after Lapsus$ breach? We’ll see New bill looks to modernize 50-year-old rulebook for federal-state cooperation Experts explained how to hack a building controller widely adopted in Russia British cops arrest seven in Lapsus$ crime gang…

IT Security News Daily Summary 2022-03-23

Okta names Sitel in Lapsus$ security incident impacting up to 366 customers BitLocker Guide: How to use this Windows encryption tool to protect your data A Closer Look at the LAPSUS$ Data Extortion Group Threat-resilient workforce key to preventing cyberattacks…

IT Security News Daily Summary 2022-03-22

Lapsus$ Data Kidnappers Claim Snatches From Microsoft, Okta F-Secure splits in two as WithSecure launches Apple Music, App Store and Other Apple Services Again Experiencing Outage DEV-0537 criminal actor targeting organizations for data exfiltration and destruction Zoom’s new security authorization…

IT Security News Daily Summary 2022-03-21

iOS 15.4 Adds New ‘Scan Text’ Shortcut in Notes App ForAllSecure Raises $21M to Secure the World’s Software ‘Unique Attack Chain’ Drops Backdoor in New Phishing Campaign Anti-War Hacktivism is Leading to Digital Xenophobia and a More Hostile Internet The…

IT Security News Daily Summary 2022-03-20

How to Use JWT Securely We are headed for an ecosystem of cyber haves and cyber nots: Cisco advisory CISO 5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem Directed Analytics – The Future of Data Management Phishing…

IT Security News Daily Summary 2022-03-19

Anonymous Leaks 79GB of Russian Oil Pipeline Giant’s Email Data Avoslocker ransomware gang targets US critical infrastructure Ghostwriter in the Shell: Expanding on Mandiant’s Attribution of UNC1151 to Belarus Gh0stCringe Malware Recently Attacked Insecure Microsoft SQL and MySQL Servers DirtyMoe…

IT Security News Daily Summary 2022-03-18

2022-03-16 – Pcap and malware for an ISC diary (Qakbot) Half of Orgs Use Web Application Firewalls to Paper Over Flaws This Week in Security News – March 18, 2022 Code-Sabotage Incident in Protest of Ukraine War Exposed Open Source…

IT Security News Daily Summary 2022-03-17

Facebook Removes Viral Deepfake Video Of Ukrainian President Strengthening Cybersecurity of SATCOM Network Providers and Customers Apple Using Streamlined Purchase Process for T-Mobile and AT&T iPhone SE Buyers First Mac Studio and Studio Display Orders Begin Arriving to Customers in…

IT Security News Daily Summary 2022-03-16

4 Critical Capabilities for a SaaS Security Posture Management (SSPM) Solution Google I/O to Take Place in May, Will Once Again Be Online CafePress fined for covering up 2019 customer info leak IOCs vs. IOAs — How to Effectively Leverage…

IT Security News Daily Summary 2022-03-15

Russian hackers exploited MFA and ‘PrintNightmare’ vulnerability in NGO breach, U.S. says White House order covers contractor pay equity Twitter concerned Australia’s anti-trolling Bill leaves minority communities vulnerable No rational basis: Defamation law expert says Australia’s anti-trolling Bill should be…

IT Security News Daily Summary 2022-03-14

States must expand data sources for strategic flood resilience Report: Facebook Has A Problem With Child Predation Groups Denso ransomware attack – Pandora gang claims to steal 1.4 TB of data Funding for DOD’s software pilots holds strong in 2022…

IT Security News Daily Summary 2022-03-13

Five Tips for Ensuring Communications Security in Your Organization Q&A on Network Detection and Response (NDR) The Cybersecurity Job Shortage Won’t Continue to Decline without Enhanced Hiring Creativity The Foilies 2022 Multiple Security Bugs Identified in Software Package Managers The…

IT Security News Daily Summary 2022-03-12

Water Wars: Biden Administration Releases New Indo-Pacific Strategy Supplying Arms to Ukraine is Not an Act of War The Fourth Amendment and Geofence Warrants: A Critical Look at United States v. Chatrie Have We Learned from Our Past Mistakes to…

IT Security News Daily Summary 2022-03-11

Blunting RDP brute-force attacks with rate limiting Report: Cybersecurity teams need nearly 100 days to develop threat defenses Rethinking a ‘lift and shift’ approach to cloud migration When IT Spending Plans Don’t Reflect Security Priorities Friday Squid Blog: 328-million-year-old Vampire…

IT Security News Daily Summary 2022-03-10

Log4Shell vulnerability continues to menace developers MacBook Air and ‘MacBook’ With M2 Chips Slated for Launch Later This Year Utah: Urge Governor Cox to Veto This Weak Data Privacy Bill Fortinet says it’s all about the security ASICs USDA looks…

IT Security News Daily Summary 2022-03-09

Why the U.S. can engage Russia on cyber over Ukraine City gains real-time visibility into snow removal operations Critical Exchange Server bug fixed for March Patch Tuesday FBI Alert: Ransomware Attacks Hit Critical Infrastructure Organizations iPad Air 2022 vs. iPad…

IT Security News Daily Summary 2022-03-08

With Mandiant, Google can challenge Microsoft’s security dominance How states can streamline broadband grant administration Water, power utilities, hospitals get free access to zero-trust tools Utah inches closer to becoming fourth state to pass privacy law Microsoft Addresses 3 Zero-Days…

IT Security News Daily Summary 2022-03-07

Why You Must Shine a Light on the Data Lurking in the Shadows BEST ENDPOINT SECURITY SOLUTIONS FOR 2022 Anonymous hacked Russian TV and streaming services with Ukraine war footage I Can Probably Hack Your Password in MINUTES! Layered defenses,…

IT Security News Daily Summary 2022-03-06

Enhance Your Safety and Security Operations with Valor IMS See a Quick Demo of N2WS Backup & Recovery on AWS Marketplace CVE-2022-0492 flaw in Linux Kernel cgroups feature allows container escape Chrome Skype Extension Flaw Threatened User Privacy Imperva Mitigates…

IT Security News Daily Summary 2022-03-05

Secure your OT and IoT devices with Microsoft Defender for IoT and Quzara Cybertorch™ Why Changing Classified Document Status Can Affect Risk Levels and How Proactive Cybersecurity Methods Can Help The Fragility of a GPS Centric World and the Importance…

IT Security News Daily Summary 2022-03-04

Report: 9% of security incidents caused by USBs and other removable media IRS announces new office focusing on taxpayer experience NRO official examines commercial ISR challenges Cyberattack Knocks Thousands Offline in Europe Most Cybersecurity Vendors at Risk Due to Internet-Exposed…

IT Security News Daily Summary 2022-03-03

KeePassXC 2.7.0 Beta adds support for Windows Hello, Touch ID, Apple Watch, improves Auto-Type, and more 10 ways analytics improves endpoint security and asset management How AI protects machine identities in a zero-trust world Complex ARPA reporting calls for streamlined,…

IT Security News Daily Summary 2022-03-02

An in-Depth Guide to Lateral Movement in Cybersecurity Biden announces new anti-fraud measures covering COVID relief ‘Limited’ progress made on the Pentagon’s plan to deliver real-time acquisition data, report says Digital services delivery relies on better broadband Biden tries to…

IT Security News Daily Summary 2022-03-01

NVIDIA says employee credentials, proprietary information stolen during cyberattack Apple pauses all product sales in Russia, stops exports and limits Apple Pay OMB: This is the year for security clearance reform RCE Bugs in WhatsApp, Other Hugely Popular VoIP Apps:…

IT Security News Daily Summary 2022-02-28

Why IaC Security Should Matter to CISOs Viasat says ‘cyber event’ is causing broadband outages across Europe Will Apple Keep the Old iPhone SE Around at a Lower Cost? NGA eyes down selection to speed acquisitions Twitter to Label Tweets…

IT Security News Daily Summary 2022-02-27

Meet SockDetour fileless backdoor targeting U.S. Defense contractors See Why US Air Force Selects Orolia’s CRPA Testing Solution (Multi-Video) Ukraine’s Volunteer ‘IT Army’ Is Hacking in Uncharted Territory Russia may use SolarWinds-like hacks in cyberwar over Ukraine rian Rea (DeviantOllum…