Tag: Daily Summary

IT Security News Daily Summary 2022-03-08

With Mandiant, Google can challenge Microsoft’s security dominance How states can streamline broadband grant administration Water, power utilities, hospitals get free access to zero-trust tools Utah inches closer to becoming fourth state to pass privacy law Microsoft Addresses 3 Zero-Days…

IT Security News Daily Summary 2022-03-07

Why You Must Shine a Light on the Data Lurking in the Shadows BEST ENDPOINT SECURITY SOLUTIONS FOR 2022 Anonymous hacked Russian TV and streaming services with Ukraine war footage I Can Probably Hack Your Password in MINUTES! Layered defenses,…

IT Security News Daily Summary 2022-03-06

Enhance Your Safety and Security Operations with Valor IMS See a Quick Demo of N2WS Backup & Recovery on AWS Marketplace CVE-2022-0492 flaw in Linux Kernel cgroups feature allows container escape Chrome Skype Extension Flaw Threatened User Privacy Imperva Mitigates…

IT Security News Daily Summary 2022-03-05

Secure your OT and IoT devices with Microsoft Defender for IoT and Quzara Cybertorch™ Why Changing Classified Document Status Can Affect Risk Levels and How Proactive Cybersecurity Methods Can Help The Fragility of a GPS Centric World and the Importance…

IT Security News Daily Summary 2022-03-04

Report: 9% of security incidents caused by USBs and other removable media IRS announces new office focusing on taxpayer experience NRO official examines commercial ISR challenges Cyberattack Knocks Thousands Offline in Europe Most Cybersecurity Vendors at Risk Due to Internet-Exposed…

IT Security News Daily Summary 2022-03-03

KeePassXC 2.7.0 Beta adds support for Windows Hello, Touch ID, Apple Watch, improves Auto-Type, and more 10 ways analytics improves endpoint security and asset management How AI protects machine identities in a zero-trust world Complex ARPA reporting calls for streamlined,…

IT Security News Daily Summary 2022-03-02

An in-Depth Guide to Lateral Movement in Cybersecurity Biden announces new anti-fraud measures covering COVID relief ‘Limited’ progress made on the Pentagon’s plan to deliver real-time acquisition data, report says Digital services delivery relies on better broadband Biden tries to…

IT Security News Daily Summary 2022-03-01

NVIDIA says employee credentials, proprietary information stolen during cyberattack Apple pauses all product sales in Russia, stops exports and limits Apple Pay OMB: This is the year for security clearance reform RCE Bugs in WhatsApp, Other Hugely Popular VoIP Apps:…

IT Security News Daily Summary 2022-02-28

Why IaC Security Should Matter to CISOs Viasat says ‘cyber event’ is causing broadband outages across Europe Will Apple Keep the Old iPhone SE Around at a Lower Cost? NGA eyes down selection to speed acquisitions Twitter to Label Tweets…

IT Security News Daily Summary 2022-02-27

Meet SockDetour fileless backdoor targeting U.S. Defense contractors See Why US Air Force Selects Orolia’s CRPA Testing Solution (Multi-Video) Ukraine’s Volunteer ‘IT Army’ Is Hacking in Uncharted Territory Russia may use SolarWinds-like hacks in cyberwar over Ukraine rian Rea (DeviantOllum…

IT Security News Daily Summary 2022-02-25

Friday Squid Blogging: Squid Videos Potential cybersecurity impacts of Russia’s invasion of Ukraine New laws to strengthen UK cybersecurity provisions Biden’s Supreme Court pick comes with experience on federal employee issues Nvidia investigating potential cyber attack How to protect your…

IT Security News Daily Summary 2022-02-24

Cost overruns and delays for OPM’s trust fund modernization FirstNet should be reauthorized before it sunsets, GAO says On Fire! CRN Names PAN One of the 10 Hottest XDR Security Companies Pave a path to cybersecurity and physical security convergence…

IT Security News Daily Summary 2022-02-23

The 7 critical backup strategy best practices to keep data safe Army’s data revamp hinges on APIs Advanced analytics root out COVID-19 relief fraud Millions of dollars pour into security compliance startups More cyberattacks disable Ukrainian websites Ukrainian gov’t sites…

IT Security News Daily Summary 2022-02-22

SMS PVA Part 1: Underground Service for Cybercriminals CrowdStrike Research Investigates Exploit Behavior to Strengthen Customer Protection This state plans to invest $68M in highway-centric broadband program More Orgs Suffered Successful Phishing Attacks in 2021 Than in 2020 CISA Adds…

IT Security News Daily Summary 2022-02-21

Report: 50% of all web applications were vulnerable to attacks in 2021 Xenomorph Android banking trojan distributed via Google Play Store Wiper Used in Attack on Iran National Media Network Apple Fined Another €5 Million Over Dating Apps as Dutch…

IT Security News Daily Summary 2022-02-20

Squirrelwaffle Malware Loader Exploits Vulnerable Microsoft Exchange Servers New Unredacter Tool Extracts Text From Pixelized Images What is intelligent document processing? Why IDP matters in the enterprise Kraken botnet bypass Windows Defender to steal crypto wallet data Brakeman – A…

IT Security News Daily Summary 2022-02-19

How assuming fraudsters are lazy can help prevent cyberattacks Versa Networks Included in Gartner® Magic Quadrant™ Millions of WordPress Sites Got a Forced Update for a Serious Bug US senators introduce the Kids Online Safety Act (KOSA) Watch out for…

IT Security News Daily Summary 2022-02-18

GSA’s Trump Hotel lease is under scrutiny again Vista modernization still a priority at VA, but funding is a question CISA posts catalog of free cyber services Linux developers patch security holes faster than anyone else, says Google Project Zero…

IT Security News Daily Summary 2022-02-17

Data Privacy Lawsuit Could Cost Meta $90m Part of Biden’s $15 contractor minimum wage order was temporarily halted Security Teams Expect Attackers to Go After End Users First Why data-driven decision making is harder than it looks Stocks will go…

IT Security News Daily Summary 2022-02-16

GSA won’t hang up on legacy telecom just yet Biden can do more to protect inspectors general, says former watchdog fired by Trump TrickBot Ravages Customers of Amazon, PayPal and Other Top Brands Apple’s 2022 iPad Pro: What to Expect…

IT Security News Daily Summary 2022-02-15

Unknown TA2541 group attacking aviation and defense sectors since 2017 Ukraine Ministry of Defense confirms DDoS attack; state banks lose connectivity VMware patches released for vulnerabilities found during China’s Tianfu Cup SquirrelWaffle Adds a Twist of Fraud to Exchange Server…

IT Security News Daily Summary 2022-02-14

Labor, USDS pilot new unemployment insurance tech Cyber primer for local leaders Outrage over Telenor Myanmar sale grows as more ties between military and new owner revealed 8 of the Biggest Cybersecurity M&As & Investment Deals in 2021 San Francisco…

IT Security News Daily Summary 2022-02-13

Google Paid $8.7 Million in Bug Bounties Last Year Twitter cans 2FA service provider over surveillance claims 3 Opportunities for Startups Interested in the Defense Marketplace Organizations paid at least $602 million to ransomware gangs in 2021 2022 Predictions on…

IT Security News Daily Summary 2022-02-12

How the metaverse could shape cybersecurity in 2022 How to frame meaningful security conversations with the corporate board CISA, FBI, NSA warn of the increased globalized threat of ransomware Decision Trees in Case of a Ransomware Attack Password Generation Using…

IT Security News Daily Summary 2022-02-11

Ransomware routed by fast-acting, info-sharing Texans Malwarebytes vs Bitdefender Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics DDoS Attacks on a Tear in Q4 2021 Microsoft, Oracle, Apache and Apple vulnerabilities added to CISA catalog Europe’s biggest car dealer…

IT Security News Daily Summary 2022-02-10

WhiteSource report warns of NPM registry risks AI engine exposes online fraud New VA CIO talks digital transformation Why StateRAMP works for state and local cloud procurements Cloudflare reports $656 million revenue in 2021, strong Q4 Sharp SIM-Swapping Spike Causes…

IT Security News Daily Summary 2022-02-09

Rapid7 reports 2021 revenue of $535 million, beats Wall Street estimates CISA warns to address SAP ICMAD flaw immediately Microsoft acted too late on major security threat, Okta exec says Decryptor released for Maze, Egregor, and Sekhmet ransomware strains Telstra…

IT Security News Daily Summary 2022-02-08

Report: 80% of security pros report their org suffered from ransomware attacks in 2021 Multibillion Army headset program is ‘alive and well’ despite delays, secretary says Facebook Oversight Board Tells Company To Crack Down Harder On Doxxing Google Cuts User…

IT Security News Daily Summary 2022-02-07

LockBit, BlackCat, Swissport, Oh My! Ransomware Activity Stays Strong Medusa Malware Joins Flubot’s Android Distribution Network UpdateAgent macOS Malware Becoming Stealthier, More Menacing High-Severity Flaw in Argo CD is Information Leak Risk FBI Publishes Indicators of Compromise for LockBit 2.0…

IT Security News Daily Summary 2022-02-06

Breach of Washington State Database May Expose Personal Information How to stop the spread of ransomware attacks Popular VPNs NordVPN And Surfshark Announce Merger Israeli surveillance firm QuaDream emerges from the dark Cyber Defense Media Group Launches CyberDefenseCon 2022 The…

IT Security News Daily Summary 2022-02-05

LockBit ransomware gang claims to have stolen data from PayBito crypto exchange FBI issued a flash alert on Lockbit ransomware operation Walmart Dissects New ‘Sugar’ Ransomware Trend Micro Patches Critical Bugs in its Security Products Convergint Announces Acquisition of Dramis…

IT Security News Daily Summary 2022-02-04

How to Protect Cloud Workloads from Zero-day Vulnerabilities Microsoft discloses new details on Russian hacker group Gamaredon As IRS grapples with ID.me, what’s next for Login.gov? Argo CD releases patch for 0-day vulnerability Friday Squid Blogging: Are Squid from Another…

IT Security News Daily Summary 2022-02-03

GSA, DOD seek clean electricity to meet emissions targets Silo-busting software closes benefits gaps in Philadelphia Low-Detection Phishing Kits Increasingly Bypass MFA Research From Quantum and ESG Reveals Top Challenges in Data Management Tenable Launches Suite of New Features to…

IT Security News Daily Summary 2022-02-02

KP Snacks Left with Crumbs After Ransomware Attack Google One Disappears From App Store a Day After VPN Launch [Update: Google One is Back in the App Store] Face ID With a Mask: How It Works and What You Need…

IT Security News Daily Summary 2022-02-01

GAO audit again shines light on problems in VA’s health records rollout Army Materiel Command looks to advanced manufacturing to improve readiness ShiftLeft CORE ‘Velocity Update’ Streamlines Triage, Automates Build Security Controls Disclosure, Panic, Patch: Can We Do Better? Digital…

IT Security News Daily Summary 2022-01-31

2022-01-27 – Contact Forms Campaign IcedID (Bokbot) with Cobalt Strike Getting facial recognition right No, a researcher didn’t find Olympics app spying on you Labor Department announces grants for states to expand UI access No-cost cybersecurity tools for state, local…

IT Security News Daily Summary 2022-01-30

Expert releases PoC for CVE-2022-21882 Windows local privilege elevation issue Germany’s White Supremacist Problem—and What It Means for the United States Latest Proof of Concept Details How iOS Malware May Snoop on Our Devices SLTT Organizations Targeted by Jupyter Malware…

IT Security News Daily Summary 2022-01-29

Hey Siri, How Old Am I? Some iPhone Users Given the Wrong Age Fake Investor John Bernard Sinks Norwegian Green Shipping Dreams 5 Reasons Why Email Is the Top Attack Vector Apple Warns macOS Catalina Users About Installing macOS 12.3…

IT Security News Daily Summary 2022-01-28

Best Practices: 5 Risks To Assess for Secure CI Pipeline How agencies can prepare for 5G DARPA explores electronics recycling to extract critical elements Friday Squid Blogging: Cephalopods Thirty Million Years Older Than Previously Thought Lawmakers ask Biden to make…

IT Security News Daily Summary 2022-01-27

Increasing visibility into municipal water systems Apple Reports Record 1Q 2022 Results: $34.6B Profit on $123.9B Revenue [Live Coverage] Apple Reports All-Time Quarterly Revenue Records for iPhone, Mac, Wearables, and Services Supplies of Apple Products to Improve in March Quarter…

IT Security News Daily Summary 2022-01-26

BERT Embeddings: A New Approach for Command Line Anomaly Detection New DazzleSpy malware attacks macOS Apple Fixes 2 Zero-Day Security Bugs, One Exploited in the Wild Build a strong cyber resilience strategy with existing tools Apple fixed the first two…

IT Security News Daily Summary 2022-01-25

ProtonMail Launches Email Tracking Protection For Web-Based Systems Microsoft Restricts Excel 4.0 Macros By Default To Contain Malware Attacks Via Malicious Documents Cyber-Partisans hackers hit Belarus railroad system with ransomware attack CISA preps update to the zero trust maturity model…

IT Security News Daily Summary 2022-01-24

Report: Cloud adoption grew 25% in the past year DC, 3 States Sue Google Saying it Invades Users’ Privacy Monero and the complicated world of privacy coins European Privacy Regulator Calls For Ban On Facebook Political Microtargeting DHS Sounds Alarm…

IT Security News Daily Summary 2022-01-23

The Threat Landscape and Attribution OpenSubtitles data breach impacted 7 million subscribers How to Deal with Exchange Server Security Challenges? Gurman: Apple Preparing ‘Widest Array of New Hardware Products in Its History’ for Fall Ethics and ownership of AI-powered identities…

IT Security News Daily Summary 2022-01-22

OpenSubtitles Hacked-  Data Breach Affected 7 Million Subscribers Pay attention to Log4j attacks, Dutch National Cybersecurity Centre (NCSC) warns Crypto.com CEO responds to complaints of login issues after $31 million hack How to Detect and Defeat the Log4j2 Vulnerability With…

IT Security News Daily Summary 2022-01-21

OPM issues guidance to ensure 67,000 feds make at least $15 per hour Can chatbots make reporting suspicious activity easier? How to start implementing passwordless authentication today A bug in McAfee Agent allows running code with Windows SYSTEM privileges Friday…

IT Security News Daily Summary 2022-01-20

Microsoft beefs up Edge’s security against zero-day attacks Zero-trust trends for 2022 CISA releases finalized IPv6 guidance for agencies Georgia moves voter registration to cloud macOS Monterey 12.2 and iOS 15.3 Release Candidates Fix Safari Bug That Leaks Browsing Activity…

IT Security News Daily Summary 2022-01-19

Report: U.S. is top target of phishing attacks worldwide Think twice before scanning that QR code, FBI warns Google announces Scorecard V4 in partnership with GitHub and OpenSSF New DDoS IRC Bot distributed through Korean webHard platforms Red Cross Falls…

IT Security News Daily Summary 2022-01-18

HHS releases long-awaited electronic health info sharing framework VA seeks dashboard to coordinate $21B health record project Ransomware actors increasingly demand payment in Monero 4 software supply chain security best practices Take ‘Urgent’ Steps to Secure Systems From Damaging Attacks,…

IT Security News Daily Summary 2022-01-17

Oracle Critical Patch Update for January 2022 will fix 483 new flaws Crypto.com confirms suspicious activity after users report stolen funds Device42 aims to identify Log4j vulnerabilities Zoho fixes a critical vulnerability (CVE-2021-44757) in Desktop Central solutions Singapore cautions against…

IT Security News Daily Summary 2022-01-16

Microsoft Uncovers Destructive Malware Used in Ukraine Cyberattacks A Cybersecurity Conversation with Vince Moore – Senior Network Engineer at OPSWAT European Union simulated a cyber attack on a fictitious Finnish power company Gurman: Apple Considered a Battery-Powered ‘HomePod’ Years Ago…

IT Security News Daily Summary 2022-01-15

Six Rumored Apple Products You’re Unlikely to See This Year Ukraine Hacks Add to Worries of Cyber Conflict With Russia Prominent Carding Marketplace UniCC announced it’s shutting down NFT Minting Platform Lympo Got Compromised for $18.7M How to evolve your…

IT Security News Daily Summary 2022-01-14

January 2022 Patch Tuesday: Multiple Critical Vulnerabilities and Microsoft Exchange Remote Code Execution Who is the Network Access Broker ‘Wazawaka?’ Russia Takes Down REvil Ransomware Operation, Arrests Key Members Friday Squid Blogging: The Evolution of Squid Eyes VA delays EHR…

IT Security News Daily Summary 2022-01-13

Is there a path forward in Congress for mandatory cyber incident reporting? Maryland Health Department hit with ransomware To improve corporate security, employers need to make personal security a priority BlueNoroff Threat Group Targets Cryptocurrency Startups How to Protect Your…

IT Security News Daily Summary 2022-01-12

TransCredit exposed financial data of half a million Americans and Canadians Defense officials press lawmakers for a 2022 appropriation Fortinet: Cybercriminals are exploiting Omicron news to distribute RedLine malware Maryland officials confirm ransomware attack shut down department of health New…

IT Security News Daily Summary 2022-01-11

As security issues dominate, use the right plans and metrics to thrive Wyoming heath IT modernization nears completion CISA: Russian state-sponsored groups exploited vulnerabilities in Microsoft, Cisco, Oracle tools Here’s REALLY How to Do Zero-Trust Security ‘Wormable’ Flaw Leads January…

IT Security News Daily Summary 2022-01-10

OPM prods agencies to name chief diversity officers Breach Response Shift: More Lawyers, Less Cyber-Insurance Coverage Apple Reportedly Looking to Broadcast Major League Baseball Games Next Season Finalsite says no data stolen during ransomware attack affecting 3,000 US public schools…

IT Security News Daily Summary 2022-01-09

Cyber Defense Magazine – January 2022 has arrived. Enjoy it! US NCSC and DoS share best practices against surveillance tools How To Secure the Linux Kernel > Flubot Malware Targeting Users by Masquerading as Adobe Flash Player iProov Announces $70M…

IT Security News Daily Summary 2022-01-08

The positive side of ransomware for data transformation Unauthenticated RCE in H2 Database Console is similar to Log4Shell Why your organization needs a software bill of materials 500M Avira Antivirus Users Introduced to Cryptomining Lawsuit: Facebook Promoted Violent Content And…

IT Security News Daily Summary 2022-01-07

NIST measures trees’ impact on 5G networks FlexBooker apologizes for breach of 3.7 million user records, partial credit card information Cyberattackers Hit Data of 80K Fertility Patients NHS Warns of Attackers Targeting Log4j Flaws in VMware Horizon How agencies are…

IT Security News Daily Summary 2022-01-06

Streamlining delivery at USDA Forest Service partners on development of handheld spectrometer Counties in New Mexico, Arkansas begin 2022 with ransomware attacks Hackers are sending malicious links through Google Doc comment emails There are some opportunities in security and cloud…

IT Security News Daily Summary 2022-01-05

Amazon Partners With Stellantis For Vans, Rivian Stock Plunges FTC warns of legal risks of failing on Log4j mitigation Broward Breach Highlights Healthcare Supply-Chain Problems Facebook Restores Account Of Conversative Book Publisher After Permanently Banning It New Attack Campaign Exploits…

IT Security News Daily Summary 2022-01-04

What to Do If You’re Caught Up in a Data Breach LA Secure app protects mobile users from security threats Google Buys Siemplify to Get Ahead in Cloud Security UScellular discloses the second data breach in a year EFF Condemns…

IT Security News Daily Summary 2022-01-03

Cyber vulnerabilities could impact municipal finance How combining human expertise and AI can stop cyberattacks OPM faces uncertain future NWS seeks machine learning to translate hurricane warnings Ohio adopts single sign-on for unemployment claims How to install the CSF firewall…

IT Security News Daily Summary 2022-01-02

Exclusive: NASA Director Twitter account hacked by Powerful Greek Army Fighting For You From Coast to Coast: 2021 In Review Fighting For A More Open, Balanced Patent System: 2021 in Review Lapsus$ ransomware gang hits Impresa, Portugal’s largest media conglomerate…

IT Security News Daily Summary 2022-01-01

Report: 60% of U.S. infosec professionals believe ransomware is as serious as terrorism Apple Celebrates Chinese New Year With Special-Edition AirPods Pro and More Y2k22 bug in Microsoft Exchange causes failure in email delivery Police Use of Artificial Intelligence: 2021…

IT Security News Daily Summary 2021-12-31

Friday Squid Blogging: Deep-Dwelling Squid The Have I Been Pwned service now includes 441K accounts stolen by RedLine malware Types of Tools To Use for Application Security Error prompted LastPass to send false breach alerts to users The Chatter Podcast:…

IT Security News Daily Summary 2021-12-30

Ohio launches platform to match foster children with families Confusing data breach in Rhode Island leads to AG investigation Flaws in DataVault encryption software impact multiple storage devices MSP vs MSSP: What’s The Difference? Rhode Island AG opens investigation into…

IT Security News Daily Summary 2021-12-29

LastPass VPs confirm ‘no indication’ of compromised accounts after security alerts Happy 12th Birthday, KrebsOnSecurity.com! T-Mobile suffered a new data breach cryptographic checksum LastPass VPs say ‘no indication’ of accounts compromised or credentials harvested after reports Patching Log4j to version…

IT Security News Daily Summary 2021-12-28

LastPass investigated recent reports of blocked login attempts 2021 in Review, Part 1: 5 Cybersecurity Topics that Made News Facebook Investors Call For More Oversight To Avoid Safety, Privacy Scandals 7 Latest Cybersecurity News 10 of the biggest ransomware attacks…

IT Security News Daily Summary 2021-12-27

2021: A year in open source Vulnerability Summary for the Week of December 20, 2021 Apple to Offer Limited-Edition AirTag as Part of Japanese New Year Promotion Kubernetes security will have a breakout year in 2022 Apple Store Closures Surpass…

IT Security News Daily Summary 2021-12-26

What to Buy With the Apple Gift Card You Unwrapped French IT services provider Inetum hit by BlackCat ransomware attack Tips and Tricks for New iPhone 13 Owners 2021 Was the Year Lawmakers Tried to Regulate Online Speech Top 5…

IT Security News Daily Summary 2021-12-25

New Rook Ransomware borrows code from Babuk 10 Things You Need to Know About Your New iPad Stalkerware: 2021 in Review Omicron-themed phishing attacks spread Dridex and taunt with funeral helpline Six Useful Tips for New AirPods Owners Albania’s Prime…

IT Security News Daily Summary 2021-12-24

Attackers bypass Microsoft security patch to drop Formbook malware SFW! The Top N Cyber­security Stories of 2021 (for small positive integer values of N) Pushing Back on Police Surveillance: 2021 Year in Review The Future is in Interoperability Not Big…

IT Security News Daily Summary 2021-12-23

Microsoft informs customers of ‘NotLegit’ Azure bug Multiple Log4j scanners released by CISA, Crowdstrike Russian Hacker’s $1.7M Restitution Order Overturned NSO spyware used to hack Polish politicians, Khashoggi’s wife, others Meta Appeals Against UK Order To Sell Giphy Grinch bots…

IT Security News Daily Summary 2021-12-22

CrowdStrike Launches Free Targeted Log4j Search Tool Monitoring File Changes with Falcon FileVantage Cincinnati maps food insecurity gaps Microsoft Customer Source Code Exposed via Azure App Service Bug CISA releases a scanner to identify web services affected by Apache Log4j…

IT Security News Daily Summary 2021-12-21

93% of Tested Networks Vulnerable to Breach, Pen Testers Find Meta Files Federal Lawsuit Against Phishing Operators UK Security Agency Shares 225M Passwords With ‘Have I Been Pwned’ Zillow Adds FaceTime SharePlay Feature for Collectively Browsing Homes Ubisoft confirms Just…

IT Security News Daily Summary 2021-12-20

Securing the Supply Chain During Shipping Challenges 2022 Cybersecurity Trends for DevSecOps USAID plans new ‘Digital Front Door’ portal for contractors Climate data tools win NOAA challenge Conti Ransomware Gang Has Full Log4Shell Attack Chain Restrict remote users to a…

IT Security News Daily Summary 2021-12-19

Grim Finance hacked – $30 million worth of tokens stolen Ransomware Persists Even as High-Profile Attacks Have Slowed Clop ransomware gang is leaking confidential data from the UK police Overcoming 5 Challenges to Shifting AppSec Left CVE-2021-44228: Log4j2 Exploitability and…

IT Security News Daily Summary 2021-12-18

Reasons to go looking in the Registry StayHackFree – Don’t Be Barry It’s About Time: The Unappreciated Fundamental Metric for Security German audio tech giant Sennheiser exposed 55GB of customers’ data Western Digital customers have to update their My Cloud…

IT Security News Daily Summary 2021-12-17

December 2021 Patch Tuesday: AppX Installer Zero-day, Multiple Critical Vulnerabilities Ransomware affects the entire retail supply chain this holiday season Log4j: Conti ransomware attacking VMware servers and TellYouThePass ransomware hits China Friday Squid Blogging: UK Recognizes Squid as Sentient Beings…

IT Security News Daily Summary 2021-12-16

Log4Shell (Log4j RCE): Detecting Post-Exploitation Evidence is Best Chance for Mitigation Firefox: Ad blockers are 2021’s most popular browser extensions NSA and CISA Release Final Part IV of Guidance on Securing 5G Cloud Infrastructures Gathering security data for container images…

IT Security News Daily Summary 2021-12-15

How government can use better outreach to aid constituents AirPods Max 2: Everything We Know One Year After the High-End Headphones Launched Apple Delays Corporate Return to Offices Indefinitely Microsoft Spots Multiple Nation-State APTs Exploiting Log4j Flaw CISA Adds Two…

IT Security News Daily Summary 2021-12-14

Log4j exploits attempted on 44% of corporate networks; ransomware payloads spotted Tax identity theft: How to protect your credit and finances Actively Exploited Microsoft Zero-Day Allows App Spoofing, Malware Delivery Log4Shell: Experts warn of bug’s severity, reach Microsoft Patch Tuesday,…

IT Security News Daily Summary 2021-12-13

password salting Kronos hit with ransomware, warns of data breach and ‘several week’ outage Experts say log4shell exploits will persist for ‘months if not years’ iOS 15.2 Features: Everything New in iOS 15.2 What’s needed for the future of software…

IT Security News Daily Summary 2021-12-12

How Log4j Vulnerability Could Impact You The Best Ways to Secure Communication Channels in The Enterprise Environment Report: IT automation to drive tech spending in 2022 Quebec shuts down thousands of sites as disclosure of the Log4Shell flaw Critical ‘Log4Shell’…

IT Security News Daily Summary 2021-12-11

Canadian Citizen Charged for Ransomware Attacks in Alaska Cyber Pandemic Update – Protect yourself against a widely exploited vulnerability CVE-2021-44228 (Apache Log4j 2 versions 2.14.1) Update on Apache Log4j Zero-Day Vulnerability US Wins Appeal to Extradite Julian Assange (ISC)² Cybersecurity…

IT Security News Daily Summary 2021-12-10

Security Experts Sound Alarm on Zero-Day in Widely Used Log4j Tool Volvo Cars suffers a data breach. Is it a ransomware attack? Friday Squid Blogging: The Far Side Squid Comic Nobelium APT targets French orgs, French ANSSI agency warns Cuba…

IT Security News Daily Summary 2021-12-09

Lack of Patching Leaves 300,000 Routers at Risk for Attack Paddle Postpones Launch of In-App Purchase Alternative After Apple Wins Reprieve Microsoft Was Willing to Bring Xbox-Exclusive Games to iPhone via xCloud How a Florida county’s election office solved authentication…

IT Security News Daily Summary 2021-12-08

Report: Despite optimism, 65% of orgs can’t achieve mature cybersecurity programs You can’t stop the ‘next SolarWinds’—but you can slow it down Cyber in the 2022 defense bill GAO: Justice needs better use-of-force data Malicious npm Code Packages Built for…

IT Security News Daily Summary 2021-12-07

Zero trust network access should be on every CISO’s SASE roadmap Quantum computing is reality, not fiction. Here’s how agencies can prepare BadgerDAO users’ cryptocurrency stolen in cyber attack Facebook Sued For $150 Billion Over Hate Speech Virtual-Network Vulnerability Found…

IT Security News Daily Summary 2021-12-06

Losses from BitMart breach reach $200 million Crypto-Exchange BitMart to Pay Users for $200M Theft Microsoft Seizes Malicious Websites Used by Prolific Chinese APT Group Zoho Releases Security Advisory for ManageEngine Desktop Central and Desktop Central MSP Nobelium APT targets…

IT Security News Daily Summary 2021-12-05

Report: Phishing campaign is actively targeting U.S. military families BitMart Exchange hacked as hackers steal $150 million First Apple Mixed Reality Headset Rumored to Focus on Gaming, Media, and Communication The Historian’s Approach to Understanding Terrorism iPad Pro With Wireless…

IT Security News Daily Summary 2021-12-04

VA exploring emerging health care tech Weekly Update 272 Be Cybersmart: 4 ERP Best Practices to Prioritize Security Researchers: Facebook Is Still Failing To Remove Medical Misinformation Cuba ransomware gang hacked 49 US critical infrastructure organizations Malvertising attack distributes malicious…

IT Security News Daily Summary 2021-12-03

Report: Ransomware victims increase security budgets due to surge in attacks Who Is the Network Access Broker ‘Babam’? Utility biz Delta-Montrose Electric Association loses billing capability and two decades of records after cyber attack Analyzing The Security Challenge of Hybrid…

IT Security News Daily Summary 2021-12-02

re:Invent recap: Amazon showcases cloud computing innovation DHS releases new rules for rail companies, forces CISA incident reporting in 24 hours and mandates cybersecurity position Security Analytics Startup Panther Labs Scores $120M Investment Former Ubiquiti engineer arrested for inside threat…

IT Security News Daily Summary 2021-12-01

Reimagining mobile security for the way we live our lives today, tomorrow, and beyond. Connolly presses for legislation on telework, internships and OPM CrowdStrike beats estimates for Q3, sees revenue increase 63% compared to 2020 CrowdStrike chosen by CISA for…

IT Security News Daily Summary 2021-11-30

Building out Alaska’s broadband infrastructure Zscaler delivers strong Q1, sees revenue grow 62% year over year Five Features to Look Forward to in the 2022 MacBook Air walled garden Enterprise password security guidelines in a nutshell What’s the Difference Between…

IT Security News Daily Summary 2021-11-29

How Hiya taps AI to kill phone spam Amazon Web Services unveils enhanced cloud vulnerability management CISA mulls plan to safeguard federal civilian email Over 1,000 Individuals Arrested in Global Cybercrime-Fighting Operation Phishing Remains the Most Common Cause of Data…

IT Security News Daily Summary 2021-11-28

Tech Expert Devises Test To See If Facebook Is Eavesdropping On Users Google warns crypto miners are using compromised cloud accounts Ongoing Phishing Attack Targets IKEA Employee Mailboxes To Spread Trojan Anatomy of a Linux Ransomware Attack> RATDispenser, a new…