NEWS: Fevereiro (21/02 - 27/02) - 8 Semana de 2021
Cybersecurity News !!! Day by Day !!!
27/02/2021
Avoiding the bait of a phishing expedition - Business Mirror
NSA, Microsoft promote a Zero Trust approach to cybersecurity - Bleeping Computer
Why Do Chief Security Officers Leave Jobs So Often? - Government Technology
26/02/2021
Closing the data divide: How to create harmony among data scientists and privacy advocates - Help Net Security
Comparing different AI approaches to email security - Information Age
Data breach investigation in Indian Army - The Telegraph India
FBI Investigating Michigan School District Hack - InfoSecurity
Govt must help business tackle ransomware - Innovation AUS
Hackers hold jeweller’s Instagram account to ransom - Retail Jeweller
Hackers Leaked Secret Details of This Military Spy Plane - Popular Mechanics
ICS threat landscape highlights - Help Net Security
Malicious Firefox extension allowed hackers to hijack Gmail accounts - Bleeping Computer
Massive rise in threats across expanding attack surfaces - Help Net Security
North Dakota hospital informs 1,500 patients of data breach - Becker's Health IT
Notices to go out to 1.3 million Washingtonians affected by unemployment data breach - The Seattle Times
Npower Ditches App After Credential Stuffing Attacks - InfoSecurity
Npower shuts down mobile app following data breach - Computing CO UK
Npower takes down app after customer data breach - Dorset Echo
One in four people use work passwords for consumer websites - Help Net Security
Ransomware gang hacks Ecuador's largest private bank, Ministry of Finance - Bleeping Computer
Ryuk ransomware now self-spreads to other Windows LAN devices - Bleeping Computer
The rise of non-English language spear phishing emails - Help Net Security
USA Third Most Affected by Stalkerware - InfoSecurity
25/02/2021
Attackers are looking to exploit critical VMware vCenter Server RCE flaw, patch ASAP! - Help Net Security
Attackers disrupting COVID-19 efforts and critical supply chains - Help Net Security
C-level executives driving the adoption of MACH across their organizations - Help Net Security
Five factors driving investment in IDV - Help Net Security
Hacking for Dollars: North Korean Cybercrime - Security Boulevard
Most Security Pros Think a WAF is High Maintenance - Security Boulevard
The Top Free Tools for Sysadmins in 2021 - The Hacker News
Users largely unaware of the privacy implications of location tracking - Help Net Security
XDR: Next-Level Prevention and Detection - Security Boulevard
Why enterprises need rugged devices with integrated endpoint management systems - Help Net Security
24/02/2021
2021 will be the year of hybrid working: How can CTOs keep staff secure and productive? - Help Net Security
Airplane manufacturer Bombardier has disclosed a security breach, data leaked online - Security Affairs
Bitcoin Slips 17% to $45,000 as Caution Sweeps Over Crypto - E Hacking News
Breach Clarity Data Breach Report: Week of Feb. 22 - Security Boulevard
Everything You Need to Know About Evolving Threat of Ransomware - The Hacker News
FedEx and DHL Express Hit with Phishing Attacks - E Hacking News
Heavily used Node.js package has a code injection vulnerability - Bleeping Computer
LazyScripter hackers target airlines with remote access trojans - Bleeping Computer
Legal Firm Leaks 15,000 Cases Via the Cloud - InfoSecurity
Medical Data of 500,000 French Residents Leaked Online - InfoSecurity
Most businesses see state-sponsored cyberattacks as a major threat - Help Net Security
NASA and the FAA were also breached by the SolarWinds hackers - Bleeping Computer
NPC probes data breach in lending app - Business Mirror
Over 8 million COVID-19 test results leaked online - Bleeping Computer
Ransomware Attacks Double Against Global Universities - InfoSecurity
Ransomware gang extorts jet maker Bombardier after Accellion breach - Bleeping Computer
Researchers propose more secure and private mobile contact tracing - Help Net Security
Security by Design Implementation Insights - InfoSecurity
The Hidden Costs and Challenges of Log Data Storage Using a SIEM - Security Boulevard
Third-party risk management programs still largely a checkbox exercise - Help Net Security
U.S. municipalities are the perfect target for cybercriminals in 2021 - Help Net Security
Water Plant Infrastructure Hackers Go Kinetic - Security Boulevard
23/02/2021
Accellion FTA attacks, extortion attempts might be the work of FIN11 - Help Net Security
Adversaries exploit supply chains, double down on COVID-19 and ransomware - Help Net Security
Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations - Help Net Security
Experts Find a Way to Learn What You're Typing During Video Calls - The Hacker News
Firefox 86 gets a privacy boost with Total Cookie Protection - Bleeping Computer
FIN11 cybercrime group is behind recent wave of attacks on FTA servers - Security Affairs
Google adds Password Checkup support to Android autofill - Bleeping Computer
NurseryCam daycare cam service shut down after security breach - Security Affairs
PCI SSC releases PCI Secure Software Lifecycle (SLC) Standard 1.1 - Help Net Security
Physical cyber threats: What do criminals leave when they break in? - Help Net Security
Report: The Trouble With Cloud Security - Security Boulevard
Shadow Attacks Let Attackers Replace Content in Digitally Signed PDFs - The Hacker News
Top cloud infrastructure risks faced by real-world organizations - Help Net Security
Twitter removes accounts of Russian government-backed actors - Bleeping Computer
Ukraine: DDoS attacks on govt sites originated from Russia - Bleeping Computer
Worldwide zero trust security market size to reach $51.6 billion by 2026 - Help Net Security
22/02/2021
10 COVID-19-related lessons for future-ready cybersecurity - Help Net Security
An attacker was able to siphon audio feeds from multiple Clubhouse rooms - Security Affairs
BBC Reports Theft of 105 Electrical Devices - InfoSecurity
Chinese Hackers Had Access to a U.S. Hacking Tool Years Before It Was Leaked Online - The Hacker News
Chinese hackers used NSA exploit years before Shadow Brokers leak - Bleeping Computer
Criminals leveraging shift to remote work to develop targeted attacks - Help Net Security
Database encryption: Protecting the crown jewels - Help Net Security
Exploring DevOps adoption among database pros - Help Net Security
Georgetown County has yet to recover from a sophisticated cyber attack - Security Affairs
Global Accellion data breaches linked to Clop ransomware gang - Bleeping Computer
How do I select a network monitoring solution for my business? - Help Net Security
How to Fight Business Email Compromise (BEC) with Email Authentication? - The Hacker News
Microphones, smartphones, laptops among items stolen from BBC - ComputerWeekly
New Silver Sparrow malware infects 30,000 Macs for unknown purpose - Bleeping Computer
NSA Equation Group tool was used by Chinese hackers years before it was leaked online - Security Affairs
Researchers uncovered a new Malware Builder dubbed APOMacroSploit - Security Affairs
SHAREit fixes security bugs in app with 1 billion downloads - Bleeping Computer
Texas electric company warns of scammers threatening to cut power - Bleeping Computer
The state of multicloud adoption, its drivers, and the technologies enabling it - Help Net Security
21/02/2021
Got A ‘Day Of Hack’ Email With Your Password? Here’s 3 Things To Do Now - Forbes
Lakehead University shuts down campus network after cyberattack - Bleeping Computer
North Korea Accused Of Trying To ‘Hack’ Pfizer To Obtain Vaccine Data - Phil Sports News
There's a danger that hackers are becoming smarter than you - Digital Journal
Top Biden Adviser Suggests Russia Could See U.S. Response To SolarWinds Hack Within 'Weeks' - RadioFreeEurope
Warning: Google Alerts abused to push fake Adobe Flash updater - Bleeping Computer
Comentarios