NEWS: Setembro (05/09 - 11/09) - 36 Semana de 2021
Cyber Security and Information Security News - Daily Updates !!!
11/09
Cisco released security patches for High-Severity flaws in IOS XR software - Security Affairs
Mēris Botnet Hit Russia's Yandex With Massive 22 Million RPS DDoS Attack - The Hacker News
New SOVA Android Banking trojan is rapidly growing - Security Affairs
REvil ransomware is back in full attack mode and leaking data - Bleeping Computer
WhatsApp to Finally Let Users Encrypt Their Chat Backups in the Cloud - The Hacker News
10/09
A zero-trust future: Why cybersecurity should be prioritized for the hybrid working world - Help Net Security
Application Security a Growing Priority Among Security Pros - Dark Reading
AZ Ransomware Attack Leads to Unrecoverable EHRs, Data Loss - Health IT Security
Building a Unified BCDR Strategy to Protect Data - Security Boulevard
Colorado County Clerk Charged with Cybercrime - InfoSecurity Magazine
DEF CON 29 Main Stage – Guillaume Fournier’s, Sylvain Afchain’s and Sylvain Baubeau’s ‘eBPF, I Thought We Were Friends!’ - Security Boulevard
DEF CON 29 Main Stage – Yuhao Weng’s, Steven Seeley’s & Zhiniang Peng’s ‘An Attack Surface Tour Of SharePoint Server’ - Security Boulevard
Employee Email Misuse Puts Patient PHI in Jeopardy in CA, Florida - Health IT Security
Four critical data storage security questions CIOs must ask - Intelligent CIO
Hackers get data trove in U.N. breach - Northwest Arkansas Online
Incident Of The Week: Medical data of more than 73,000 patients shared in Singapore breach - Cyber Security Hub
IoT interest is growing, but so are cybersecurity concerns - Help Net Security
KrebsOnSecurity Hit By Huge New IoT Botnet “Meris” - Security Boulevard
National cyber director says hospitals under attack have no choice but to pay ransom - Becker's Health IT
Personal Information of Nearly 80,000 MyRepublic Customers Accessed After Breach - InfoSecurity Magazine
Phishing attempts: Employees can be the first line of defense - Help Net Security
Protecting businesses from ransomware at the edge - Continuity Central
Ransomware: Hot or Not? Here's Attackers' Ideal Target - Bank Info Security
The impact of ransomware on cyber insurance driving the need for broader cybersecurity knowledge - Help Net Security
UN Data Breach: Expert Commentary on a High-Profile Attack - Solutions Review
09/09
Avoid Third-Party Breaches with DLP - Security Boulevard
Berners-Lee Joins ProtonMail Following Privacy Debacle - InfoSecurity Magazine
BlackMatter Ransomware Attacks Threaten Healthcare, HC3 Says - Health IT Security
Breach Clarity Data Breach Report: Week of Sept. 6 - Security Boulevard
Business Associate Ransomware Attack Impacts 115K in CA - Health IT Security
Compliance failures caused by lack of embedded controls into employee processes - Help Net Security
Department of Justice victim of latest security breach - Bollyinside
Fighting the Rogue Toaster Army: Why Secure Coding in Embedded Systems is Our Defensive Edge - The Hacker News
Hackers Steal Data from United Nations - Info Security Magazine
Howard University’s Devastating Ransomware Attack Can Teach Other Colleges a Valuable Lesson - Slate
Manufacturers face a significant cybersecurity risk from ransomware - The Manufacture
New Mēris botnet breaks DDoS record with 21.8 million RPS attack - Bleeping Computer
Organizations struggling to develop cloud applications that meet security requirements - Help Net Security
Protecting your company from fourth-party risk - Help Net Security
Ransomware Attack Disrupts Online, Hybrid Classes at Howard University - Campus Technology
Ransomware attack wipes out Arizona clinic's EHR, corrupts 35,000 patients' records - Becker's Health IT
Ransomware attacks up by 518% in the last year - Today's Conveyancer
Russian Ransomware Group REvil Back Online After 2-Month Hiatus - The Hacker News
SANSA breach: International hacker group claims responsibility for Space Agency leak - News Chant South Africa
Sophos Releases Phishing Insights 2021 Report - Solution Review
The role of automation in staying on top of the evolving threat landscape - Help Net Security
When a scammer calls: 3 strategies to protect customers from call spoofing - Help Net Security
Yandex is battling the largest DDoS in Russian Internet history - Bleeping Computer
08/09
3 Ways to Secure SAP SuccessFactors and Stay Compliant - The Hacker News
Attackers are exploiting zero-day RCE flaw to target Windows users (CVE-2021-40444) - Help Net Security
Crypto exchanges and their customers must protect themselves as attacks continue - Help Net Security
Data Breach Lawsuit Against Sonic Will Proceed - InfoSecurity Magazine
Experts Uncover Mobile Spyware Attacks Targeting Kurdish Ethnic Group - The Hacker News
Germany protests to Russia over attacks ahead of the upcoming election - Security Affairs
Hackers leak passwords for 500,000 Fortinet VPN accounts - Bleeping Computer
HAProxy Found Vulnerable to Critical HTTP Request Smuggling Attack - The Hacker News
How do I select a container security solution for my business? - Help Net Security
Howard University shuts down network after ransomware attack - Bleeping Computer
Ransomware attacks: The power of adaptation - Help Net Security
Ransomware: Take these three steps to protect yourself from attacks and make it easier to recover - ZDNet
Report: The State of Password Security in the Enterprise - Help Net Security
Researchers pinpoint ransomware gangs’ ideal enterprise victims - Help Net Security
Russian communications watchdog Roskomnadzor blocks access to 6 VPNs - Security Affairs
The Guide for Speeding Time to Response for Lean IT Security Teams - The Hacker News
Top tips for preventing SQL injection attacks - Help Net Security
Zoho patches actively exploited critical ADSelfService Plus bug - Bleeping Computer
07/09
39% of all internet traffic is from bad bots - Help Net Security
Alexa, OK Google, Siri—Sued for Spying - Security Boulevard
Audit effectiveness and talent retention at risk as hybrid auditing becomes the new norm - Help Net Security
Cyber-Attack on Washington DC University - InfoSecurity Magazine
Cybersecurity Student Scams Senior Out of $55K - InfoSecurity Magazine
DEF CON 29 Main Stage – Adam Zabrocki’s & Alex Matrosov’s ‘Glitching RISC-V Chips: MTVEC Corruption For Hardening ISA’ - Security Boulevard
DEF CON 29 Main Stage – Agent X’s ‘A Look Inside Security At The New York Times’ - Security Boulevard
Germany Accuses Russia of Election Meddling Through Cyber-Attacks - InfoSecurity Magazine
Hacker claims to have stolen information of 7 million Israelis - The Jerusalem Post
Home security: ADT vs Ring - ZDNet
ICO Requests International Support to Tackle Cookie Pop-Ups - InfoSecurity Magazine
ID Theft Couple on the Run - InfoSecurity Magazine
Jenkins project's Confluence server hacked to mine Monero - Bleeping Computer
McDonald's leaks password for Monopoly VIP database to winners - Bleeping Computer
Microsoft shares temp fix for ongoing Office 365 zero-day attacks - Bleeping Computer
Personal Details of 8,700 French Visa Applicants Exposed by Cyber-Attack - InfoSecurity Magazine
ProtonMail logged IP address of French activist after foreign request approved by Swiss authorities - Security Affairs
Ragnar Locker gang threatens to leak data if victim contacts law enforcement - Security Affairs
Ransomware gang threatens to leak data if victim contacts FBI, police - Bleeping Computer
REvil ransomware's servers mysteriously come back online - Bleeping Computer
Securing Networks in a Perimeterless World - Security Boulevard
Securing your WordPress website against ransomware attacks - Help Net Security
Traditional SIEM platforms no longer meet the needs of security practitioners - Help Net Security
06/09
3 ways to protect yourself from cyberattacks in the midst of an IT security skill shortage - Help Net Security
Consumers satisfied with mobile security, yet account privacy and protection concerns remain - Help Net Security
Enterprises are missing the warning signs of insider threats - Help Net Security
Enterprising criminals are selling direct access to cloud accounts - Help Net Security
FBI IC3 warns of a spike in sextortion attacks - Security Affairs
Healthcare cybersecurity under attack: How the pandemic affected rural hospitals - Help Net Security
Netgear addresses severe security flaws in 20 of its products - Security Affairs
Netgear fixes severe security bugs in over a dozen smart switches - Bleeping Computer
New Chainsaw tool helps IR teams analyze Windows event logs - Bleeping Computer
Ransomware attacks increased by 288% in H1 2021 - Help Net Security
Ransomware gangs target companies using these criteria - Bleeping Computer
The healthcare cybersecurity market to grow steadily by 2026 - Help Net Security
TrickBot gang developer arrested at the Seoul international airport - Security Affairs
TrickBot gang developer arrested when trying to leave Korea - Bleeping Computer
WhatsApp Flaw Casts Doubt on End-to-End Encryption - Security Boulevard
05/09
Back-to-School internet safety - OA Online
Dark Web vs. Deep Web: What's the Difference? - Make Use Of
EDR Reaches Wide Adoption Paving Way for XDR, SASE - SDX Central
Google's TensorFlow drops YAML support due to code execution flaw - Bleeping Computer
Irony at its peak, Marketo gang claims to have bids on stolen data of an IT service company, Fujitsu - The Digital Hacker
Source code of extortion trojan “Babuk Locker” leaked - Market Research Telecast
コメント