Cybersecurity

Cybersecurity Threats & Attacks News

Given the sophistication of cyber-attacks, cybersecurity has become a central focus to protect people and their personal data. Learn more about the common cyber threats we all face in an age when companies are undergoing a digital transformation.

Top news of the week: 27.01.2022.

#cybersecurity
#infosec
#cryptocurrecy
#security
#vulnerabilities
#cyberattacks
#Log4j
#megabreaches
#ransomware
#securitynews

Threats And Attacks

@unix_root shared
On Jan 24, 2022
Hackers are creating fraudulent crypto tokens to trick victims into buying the tokens, and then abusing misconfigurations in smart contracts to steal funds as part of the rug pull scam. Read details: https://t.co/INx9K44Ur8 #infosec #cryptocurrecy
Open
Hackers Creating Fraudulent Crypto Tokens as Part of 'Rug Pull' Scams

Hackers Creating Fraudulent Crypto Tokens as Part of 'Rug Pull' Scams

Hackers are creating fraudulent crypto tokens to trick victims into buying the tokens, and then abusing misconfigurations in smart contracts.

@EduardKovacs shared
On Jan 25, 2022
RT @SecurityWeek: Belarus Hacktivists Hit Railway in Anti-Russia Effort - https://t.co/y2HnLZ2Shc
Open
Belarus Hacktivists Target Railway in Anti-Russia Effort

Belarus Hacktivists Target Railway in Anti-Russia Effort

A Belarusian hacktivist group says it has launched a limited cyberattack on the national railway company, aimed at impeding the movement of Russian troops and freight inside the ...

@EduardKovacs shared
On Jan 21, 2022
Industry professionals comment on the cybersecurity-focused national security memorandum signed this week by U.S. President Joe Biden. https://t.co/SgPe236W79
Open
Industry Reactions to Biden Cybersecurity Memo: Feedback Friday

Industry Reactions to Biden Cybersecurity Memo: Feedback Friday

Industry professionals comment on the cybersecurity-focused national security memorandum signed this week by U.S. President Joe Biden.

@KimZetter shared
On Jan 23, 2022
RT @JordanKlara: If you want to know when a cyber attack amounts to warfare read how Act of War is interpreted in courts ruling on insurance policy exclusions—- Merck wins cyber-insurance lawsuit related to NotPetya attack https://t.co/1YEUTCWHxE
Open
Merck wins cyber-insurance lawsuit related to NotPetya attack

Merck wins cyber-insurance lawsuit related to NotPetya attack

A New Jersey court has ruled in favor of Merck in a lawsuit the pharmaceutical company filed against its insurer, Ace American, which declined to cover the losses caused by the NotPetya ...

@paulsparrows shared
On Jan 26, 2022
The first #cyberattacks timeline of 2022 is out! Unsurprisingly #ransomware continues to dominate the scene. The impact of #vulnerabilities seems to decrease, but a new concerning wave of #megabreaches is emerging. https://t.co/AX0pPSo5Jj https://t.co/KuUE9xUBnw
Open
1-15 January 2022 Cyber Attacks Timeline

1-15 January 2022 Cyber Attacks Timeline

Let’s start this 2022 with the first cyber attacks timeline. The new year begins with...

@Reuters shared
On Jan 26, 2022
N.Korean internet downed by suspected cyber attacks -researchers https://t.co/PFzBmBaLSz https://t.co/K6NktXx4t5
Open
N.Korean internet downed by suspected cyber attacks -researchers

N.Korean internet downed by suspected cyber attacks -researchers

North Korea's internet appears to have been hit by a second wave of outages in as many weeks, possibly caused by a distributed denial-of-service (DDoS) attack, researchers said on Wednesday.

@DarkReading shared
On Jan 26, 2022
Cybersecurity Is Broken: How We Got Here & How to Start Fixing It https://t.co/fTE6g9DQFN by @davidhratner #Log4j #cybersecurity
Open
Cybersecurity Is Broken: How We Got Here & How to Start Fixing It

Cybersecurity Is Broken: How We Got Here & How to Start Fixing It

It's not just your imagination — malicious threats have exponentially increased organizational risk.

@helpnetsecurity shared
On Jan 25, 2022
Beware of fake tax apps pushing malware - https://t.co/zrbvcNdOBZ - @Promon_Shield #cybersecurity #security #infosecurity #itsecurity #CISO #cybersecuritynews #securitynews https://t.co/9Z5I9I823o
Open
Beware of fake tax apps pushing malware

Beware of fake tax apps pushing malware

When it comes to fake tax apps, the crooks’ main approach is sleight of hand. Often, bad actors will reverse engineer legitimate apps.