HackDig : Dig high-quality web security articles

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of June 20, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of June 20, 2022. I’ve also included some comments on these stories.Over a Dozen Flaws Found in Siemens’ Industrial Network Manag
Publish At:2022-06-27 06:20 | Read:135 | Comments:0 | Tags:VERT News Chrome critical vulnerability tracking WordPress s

How to Protect Your Remote Workforce from a Cyberattack

Earlier this year, an industry report stated that 79% of businesses remain concerned about the security risks of an increasingly remote workforce. Cyberattacks are on the rise since the COVID-19 pandemic, in part because many organizations fail to put in place adequate cybersecurity measures and procedures.In addition, there is a worldwide shortage of cybers
Publish At:2022-06-26 21:07 | Read:188 | Comments:0 | Tags:Cyber Security Featured Articles cyberattack Remote working

NetSec Goggle shows search results only from cybersecurity sites

A new Brave Search Goggle modifies Brave Search results to only show reputable cybersecurity sites, making it easier to search for and find security information.This week, Brave announced a new Goggles feature that lets anyone create their own rules and filters that override Brave Search's algorithms when displaying search results.This feature allo
Publish At:2022-06-26 13:45 | Read:238 | Comments:0 | Tags:Security security cyber cybersecurity

Automotive fabric supplier TB Kawashima announces cyberattack

TB Kawashima, part of the Japanese automotive component manufacturer Toyota Boshoku of the Toyota Group of companies, announced that one of its subsidiaries has been hit by a cyberattack.The company did not confirm but there is reason to suspect that it is dealing with an attack from the LockBit ransomware group.TB Kawashima is a manufacturer of interior fab
Publish At:2022-06-25 13:45 | Read:287 | Comments:0 | Tags:Security cyber

Fast Shop Brazilian retailer discloses "extortion" cyberattack

Fast Shop, one of Brazil's largest retailers, has suffered an 'extortion' cyberattack that led to network disruption and the temporary closure of its online store.Fast Shop is an online retailer selling a wide range of products, including computers, smartphones, gaming consoles, furniture, beauty products, and home appliances. The retailer has been active in
Publish At:2022-06-24 13:45 | Read:190 | Comments:0 | Tags:Security cyber

Cybersecurity agencies: You don’t have to delete PowerShell to secure it

Microsoft’s PowerShell is a useful, flexible tool that is as popular with criminals as it is with admins. Cybercrooks like it becasue PowerShell is powerful, available almost everywhere, and doesn’t look out of place running on a company network. In most places it isn’t practical to block PowerShell completely, which raises the question:
Publish At:2022-06-24 07:53 | Read:202 | Comments:0 | Tags:Security world amsi applocker credential protection fileless

Dial 311 for… cybersecurity emergencies?

Members of the Cybersecurity Advisory Committee of CISA (Cybersecurity and Infrastructure Security Agency) have proposed an emergency cybersecurity call line for small and medium-sized businesses (SMBs). Should the proposition be approved, SMBs would be able to call 311 in the event of a cybersecurity incident. CISA’s cyberhygiene subcommittee head,
Publish At:2022-06-23 16:01 | Read:177 | Comments:0 | Tags:Awareness 311 cisa cyber incident emergency line Cybersecuri

Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty

Retaining cybersecurity talent can be difficult. Along with our previous tips, how can you attract great workers?   Difficulties and Positive Changes   The recent ISACA State of Cybersecurity 2022 survey provides some key markers: Unfilled positions are on the rise (not good) Existing teams are understaffed (not good) Budgets are (finall
Publish At:2022-06-23 13:08 | Read:141 | Comments:0 | Tags:CISO Risk Management Security Services ai security zero trus

Johnson Controls Acquires Tempered Networks to Shield Buildings From Cyberattacks

Acquisition allows Johnson Controls to bring zero trust security to connected buildings Smart building infrastructure and technology giant Johnson Controls (NYSE: JCI) announced on Thursday that it has acquired zero trust cybersecurity provider Tempered Networks for an undisclosed sum.Technology from Seattle, Washington-based Tempered will allow custome
Publish At:2022-06-23 12:02 | Read:227 | Comments:0 | Tags:ICS/OT NEWS & INDUSTRY cyber

Chinese APT 'Bronze Starlight' Uses Ransomware to Disguise Cyberespionage

A China-linked state-sponsored hacking group named Bronze Starlight was observed deploying various ransomware families to hide the true intent of its attacks.In attacks observed as early as mid-2021, the threat group started using the HUI Loader to drop ransomware such as AtomSilo, LockFile, Night Sky, Pandora, and Rook.The short lifespan of each ransomware
Publish At:2022-06-23 12:02 | Read:214 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Malware Malware

Biden Signs Two Cybersecurity Bills Into Law

Two bipartisan cybersecurity bills were signed into law on Tuesday, June 21, 2022, by US President Joe Biden: the Federal Rotational Cyber Workforce Program Act of 2021, and the State and Local Government Cybersecurity Act of 2021.The Federal Rotational Cyber Workforce Program Act, which has been around since 2018, proposes a program under which certain fede
Publish At:2022-06-23 12:02 | Read:248 | Comments:0 | Tags:NEWS & INDUSTRY Training & Certification Management

Chinese hackers use ransomware as decoy for cyber espionage

Two Chinese hacking groups conducting cyber espionage and stealing intellectual property from Japanese and western companies are deploying ransomware as a decoy to cover up their malicious activities.Threat analysts from Secureworks say that the use of ransomware in espionage operations is done to obscure their tracks, make attribution harder, and create a p
Publish At:2022-06-23 09:47 | Read:228 | Comments:0 | Tags:Security cyber ransomware hack

Exclusive: Lithuania under cyber-attack after the ban on Russian railway goods

Cyber Spetsnaz is targeting government resources and critical infrastructure in Lithuania after the ban of Russian railway goods Cyber Spetsnaz is targeting Lithuanian government resources and critical infrastructure – the recent ban on Russian railway goods has caused a new spike of hacktivist activity on the Dark Web. Today the group has announced mult
Publish At:2022-06-22 17:31 | Read:284 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Hacktivism Cyber Spetsna

Microsoft: Russian Cyber Spying Targets 42 Ukraine Allies

Coinciding with unrelenting cyberattacks against Ukraine, state-backed Russian hackers have engaged in “strategic espionage” against governments, think tanks, businesses and aid groups in 42 countries supporting Kyiv, Microsoft said in a report Wednesday.“Since the start of the war, the Russian targeting (of Ukraine’s allies) has been successful 29 percent o
Publish At:2022-06-22 16:12 | Read:243 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY cyber

Microsoft: Russia stepped up cyberattacks against Ukraine’s allies

Microsoft said today that Russian intelligence agencies have stepped up cyberattacks against governments of countries that have allied themselves with Ukraine after Russia's invasion.Since the start of the war, threat actors linked to several Russian intelligence services (including the GRU, SVR, and FSB) have attempted to breach entities in dozens of countr
Publish At:2022-06-22 14:20 | Read:222 | Comments:0 | Tags:Security Microsoft cyber


Share high-quality web security related articles with you:)
Tell me why you support me <3