Thursday, August 4, 2022

SecurityWeek Briefing: Cybersecurity News, Insights, and Analysis

Disruptive cyberattacks on NATO member Albania.

Views expressed in this cybersecurity, cybercrime, and cyberespionage update are those of the reporters and correspondents.

Accessed on 05 August 2022, 0311 UTC.

Content supplied by email subscription to "SecurityWeek Briefing."

Source:  https://mail.google.com/mail/u/0/#inbox/FMfcgzGqPpbfMLFqJSqxFZChbrwsQtss

Please click link or scroll down to read your selections.

Thanks for joining us today.

Russ Roberts

https://www.hawaiicybersecurityjournal.net

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security)

SecurityWeek Daily Briefing - New Beta Format

SecurityWeek Briefing | Thursday, August 4, 2022 [Beta]

ICS Cybersecurity Conference 2022

Latest Cybersecurity News Headlines

CISO Converstations

Netenrich, Malwarebytes CISOs Discuss Security Vendor CISOs

In this edition of CISO Conversations, SecurityWeek talked to two vendor CISOs: Chris Morales, CISO at security and analytics firm Netenrich; and Laura Whitt-Winyard, CISO at EDR firm Malwarebytes. The purpose is to explore the differences introduced into the role of CISO when the business sells cybersecurity to other businesses. (Read the Feature by Kevin Townsend)

Marc Solomon

The Secret to Automation? Eat the Elephant in Chunks.


The goal of security automation is to accelerate detection and response, but you’ll waste a lot of time if you try to eat the elephant all at once.

Read the Column by Marc Solomon

Laurence Pitt

The Benefits of ZTNA Make it Hard to Ignore

Ensuring that the right people have access to the proper resources when they need them whilst maintaining security and access controls across multiple data centers and cloud environments is one of the biggest technical challenges any organization faces.


Read the Column by Laurence Pitt 

Securing the Metaverse and Web3

Securing the Metaverse and Web3

Security must be built into the metaverse as it moves from science fiction to science reality. With users concerned about the misuse, abuse and commercialization of their personal data, they are likely to welcome the additional privacy offered by web3.

(Read the Feature by Kevin Townsend)

ICS/OT Security Conference

Applied ICS Security Training Lab


2022 ICS Cybersecurity Conference - October 24th - Atlanta


This full-day lab course gives participants hands-on experience attacking and hardening a simulated power plant network to learn about common ICS vulnerabilities and defenses.

Learn More

More Headlines


Cybersecurity Financing Declined in Q2 2022, But Investors Optimistic Cybersecurity financing declined in Q2 2022, but investors are optimistic and some believe the economic downturn can be an opportunity.


Cybersecurity M&A Roundup: 39 Deals Announced in July 2022 - 39 cybersecurity-related mergers and acquisitions were announced in July 2022.


RSS Feed | Webcasts | Virtual Events

© 2022 Wired Business Media

CyberNews Newsletter

Doge community follows crumbs to uncover Ponzi scheme.

Views expressed in this cybersecurity and cybercrime update are those of the reporters and correspondents.

Accessed on 04 August 2022, 1328 UTC.

Content provided by email subscription to "CyberNews Newsletter."

Source: https://mail.google.com/mail/u/0/#inbox/FMfcgzGqPpbdkLVqncpQVkjtxmVnrFdB

Please click link or scroll down to read your selections.

Thanks for joining us today.

Russ

https://www.hawaiicybersecurityjournal.net

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security

Weekly news roundup, 04/08/2022 - kh6jrm@gmail.com

Doge community follow crumbs to uncover a Ponzi scheme 

Unusual transactions on the Dogecoin blockchain led the community to discover an alleged Ponzi scheme. Exclusive CyberNews interview with the Doge community members.  

Get the best deals for online security products

Looking to upgrade your personal and business security, without breaking the bank? Cybernews can help you out. We collected the latest deals for VPN, antivirus, password manager, and secure hosting products: with discounts up to 83%. Protect your data – and your wallet!

Report: You need a college degree to understand Facebook's terms of service 

You have to be at least a junior in high school to understand the terms of service for all ten major social media platforms. 

11 people charged in a “massive” Ponzi pyramid scheme 

The US securities watchdog charged 11 individuals for the creation and promotion of Forsage – a fraudulent crypto pyramid and Ponzi scheme which raised over $300 million. 

Apple network traffic went through Russia for 12 hours 

While neither Apple nor Russian authorities shed any light on the event, data indicates Apple traffic did go through Russia’s leading telecom company. 

Men and women equally unaware how to protect their data 

While a survey points to the existing gender gap in online privacy awareness, both men and women in the US fail to take the necessary precautions to protect their private data. 

Neom or "a civilizational revolution": here is what Saudi Arabia's city of the future will look like 

Saudi Arabia's Crown Prince Mohammed bin Salman’s grand $500 billion project will become home to nine million people in a utopian world where humans, robots, and AI co-exist. 

Over 3,000 apps leak Twitter API keys 

Threat actors could use API keys to access or take over Twitter accounts. 

# ASK CYBERNEWS

Have any pressing questions about tech and cybersecurity? Send them my way at anna.zhadan@cybernews.com. Each month, I’ll select one and answer it here. So, keep ‘em coming. And remember: there are no stupid questions.

And if you are enjoying what you are reading, please consider recommending it to friends. They can sign up here. 

Thanks for reading!

CyberNews Editor Anna Zhadan 


 

Wednesday, August 3, 2022

The Hacker News Daily Updates

VirusTotal reveals most impersonated software in malware attacks.

Views expressed in this cybersecurity and cybercrime update are those of the reporters and correspondents.

Accessed on 03 August 2022, 2355 UTC.

Content provided by email subscription to "The Hacker News Daily Updates."

Source: Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike - kh6jrm@gmail.com - Gmail (google.com)

Please click link or scroll down to read your selections.

Thanks for joining us today.

Russ Roberts

https://www.hawaiicybersecurityjournal.net

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security)

The Hacker News Daily Updates
Newsletter
cover

How Social Disruption Drives Contact Center Fraud

And, how to fight back, with stronger identity and credibility checks.

Download NowSponsored
LATEST NEWSAug 3, 2022

VirusTotal Reveals Most Impersonated Software in Malware Attacks

Threat actors are increasingly mimicking legitimate applications like Skype, Adobe Reader, and VLC Player as a means to abuse trust relationships and increase the likelihood of a successful social engineering attack. Other most impersonated legitimate apps by icon include 7-Zip, TeamViewer, ...

Read More
TwitterFacebookLinkedIn

On-Demand Webinar: New CISO Survey Reveals Top Challenges for Small Cyber Security Teams

The only threat more persistent to organizations than cyber criminals? The cyber security skills crisis.  Nearly 60% of enterprises can’t find the staff to protect their data (and reputations!) from new and emerging breeds of cyber-attacks, reports the Information Systems Security Association ...

Read More
TwitterFacebookLinkedIn

Free Video Series: Deploy Django Using a Managed MySQL Database

Learn how to release a Django project to production, in a scalable and sustainable way by using Github Actions, Docker, Terraform, and Ansible. This video series by Coding for Entrepreneurs is available on-demand and in eBook format. Start the series ...

Read More
TwitterFacebookLinkedIn

Researchers Warns of Large-Scale AiTM Attacks Targeting Enterprise Users

A new, large-scale phishing campaign has been observed using adversary-in-the-middle (AitM) techniques to get around security protections and compromise enterprise email accounts. "It uses an adversary-in-the-middle (AitM) attack technique capable of bypassing multi-factor authentication," Zscaler ...

Read More
TwitterFacebookLinkedIn

VMware Releases Patches for Several New Flaws Affecting Multiple Products

Virtualization services provider VMware on Tuesday shipped updates to address 10 security flaws affecting multiple products that could be abused by unauthenticated attackers to perform malicious actions. The issues, tracked from CVE-2022-31656 through CVE-2022-31665 (CVSS scores: 4.7 - 9.8), ...

Read More
TwitterFacebookLinkedIn
cover

What is Network Security?

And Why Do Your Need It Now

Download NowSponsored

 

Cyber War News Today.

"From trade wars to cyber wars in modern era." Views expressed in this cybersecurity, cyber espionage, and cyber crime update are ...