Cybersecurity

Cybersecurity Threats & Attacks News

Given the sophistication of cyber-attacks, cybersecurity has become a central focus to protect people and their personal data. Learn more about the common cyber threats we all face in an age when companies are undergoing a digital transformation.

Top news of the week: 03.02.2022.

#cybersecurity
#hacking
#infosec
#Palestinian
#phishing
#ICS
#malware
#security
#securitynews
#infosecurity

Threats And Attacks

@unix_root shared
On Feb 3, 2022
A new wave of cyberattacks is targeting #Palestinian activists and entities with politically-themed #phishing emails and decoy documents. Details: https://t.co/JpimMjTJey #infosec #cybersecurity #hacking #malware
Open
New Wave of Cyber Attacks Target Palestine with Political Bait and Malware

New Wave of Cyber Attacks Target Palestine with Political Bait and Malware

A new wave of cyberattacks is targeting Palestinian activists and entities with politically-themed phishing emails and decoy documents.

@EduardKovacs shared
On Feb 2, 2022
The FBI has warned entities associated with the 2022 Winter Olympics and Paralympic games of potential cyberattacks. https://t.co/wN3Mr0J3tY
Open
FBI Warns of Potential Cyberattacks Targeting 2022 Winter Olympics

FBI Warns of Potential Cyberattacks Targeting 2022 Winter Olympics

The FBI has warned entities associated with the 2022 Winter Olympics and Paralympic games of potential cyberattacks.

@EduardKovacs shared
On Feb 3, 2022
Ransomware attacks in many cases hit #ICS or OT environments, and impact is often significant, according to a survey commissioned by Claroty. https://t.co/s7lIDvLnUo
Open
Ransomware Often Hits Industrial Systems, With Significant Impact: Survey

Ransomware Often Hits Industrial Systems, With Significant Impact: Survey

Ransomware attacks in many cases hit ICS/OT environments, and impact is often significant, according to a survey commissioned by Claroty.

@EduardKovacs shared
On Jan 31, 2022
CISA’s Known Exploited Vulnerabilities Catalog puts the spotlight on ​​vulnerability management processes. https://t.co/2DJlU3Kt3e
Open
CISA's 'Must Patch' List Puts Spotlight on Vulnerability Management Processes

CISA's 'Must Patch' List Puts Spotlight on Vulnerability Management Processes

CISA’s Known Exploited Vulnerabilities Catalog puts the spotlight on ​​vulnerability management processes.

@paulsparrows shared
On Feb 2, 2022
The Lazarus Group (AKA HIDDEN COBRA) is the latest state-sponsored group to exploit a #cloud service for a command and control infrastructure. Read more on my latest Cloud Threats Memo for the @Netskope blog https://t.co/s7KDOIETFo #cloudsecurity #cloudnative #threats
Open
Cloud Threats Memo: New Malicious Campaign Using GitHub for Command and Control

Cloud Threats Memo: New Malicious Campaign Using GitHub for Command and Control

State-sponsored threat actors continue to exploit legitimate cloud services. In their latest campaign, uncovered by Malwarebytes during January 2022, the

@helpnetsecurity shared
On Feb 1, 2022
Infosec products of the month: January 2022 - https://t.co/50mq0AJBxf - @penterasec @Samsung @SpyCloudCo @SureCloud @tac_security @ZyxelUK #cybersecurity #security #infosecurity #itsecurity #cybersecuritynews #securitynews https://t.co/ZQEgiflVv9
Open
Infosec products of the month: January 2022

Infosec products of the month: January 2022

The featured infosec products this month are from: Avast, Axonius, Borderless Security, CyberRes, Deepfence, GrammaTech, and more.

@Treadstone71LLC shared
On Jan 28, 2022
UK warned to bolster defences against cyber attacks as Russia threatens Ukraine "The National Cyber Security Centre (NCSC) issued new guidance, vital companies stay ahead of a potential threat. Of course, Russia denies this as they always deny everything https://t.co/DXDyQLqq8q
Open
UK warned to bolster defences against cyber attacks as Russia threatens Ukraine

UK warned to bolster defences against cyber attacks as Russia threatens Ukraine

The National Cyber Security Centre fears threats linked to the potential conflict in Ukraine could move beyond its borders.

@SCMagazine shared
On Feb 2, 2022
RT @msspalert: Data Center Infrastructure Management (DCIM) Software: Prime #Cyberattack target? Source: #Cybersecurity #research from Cyble https://t.co/4Hhq3ms0Ku
Open
Data Center Infrastructure Management (DCIM) Software: Prime Cyberattack Target?

Data Center Infrastructure Management (DCIM) Software: Prime Cyberattack Target?

Many organizations are prone to cyberattacks across their DCIM (Data Center Infrastructure Management) software, according to Cyble research.