SecurityWeek.com: Daily Briefing

Latest cybersecurity news, insights, and analysis.

Views expressed in this cybersecurity-cyber crime update are those of the reporters and correspondents.

Accessed on 22 June 2022, 1924 UTC.

Content provided by email subscription to "SecurityWeek.com."

Source:  https://mail.google.com/mail/u/0/#inbox/FMfcgzGpGdftvNwzxgjkdBXrCvwWkPTr

Please click link or scroll down to read your selections.

Thanks for joining us today.

Russ Roberts

https://www.hawaiicybersecurityjournal.net

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security)

 Your SecurityWeek BriefingWebcasts
RSS Feed
06.22.22


Wednesday, June 22, 2022


TXOne Whitepaper


Cyber Safe Green Energy

In our new white paper “Cyber Safe Green Energy”, we share experience from collaborating with industry leaders in green energy to secure work sites with the OT zero trust approach.

Get White Paper



Hybrid Networks Require an Integrated On-prem and Cloud Security Strategy
Digital acceleration, user demand, and shifting business strategies add new edges to the network, making it increasingly difficult to manage and even harder to secure.
Read the Full Column
 by John Maddison



Using the Defense Readiness Index to Improve Security Team Skills
The Defense Readiness Index is a reliable alternative for assessing a security team’s skill level, developing a roadmap for improving cyber competencies, and reaching the optimal level of cyber security readiness.
Read the Full Column
 by Jeff Orloff



Lessons for Better Fraud Decision-Making
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.
Read the Full Column
 by Joshua Goldfarb






Malware's Destruction Trajectory and How to Defeat It
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.
Read the Full Column
 by Derek Manky



Facilitating Convergence of Physical Security and Cyber Security With Open Source Intelligence
Fusion centers are able to converge cyber and physical security, close gaps in coverage, and scale security to protect facilities and hundreds of thousands of employees.
Read the Full Column
 by Landon Winkelvoss






TXOne Whitepaper


Cyber Safe Green Energy

In our new white paper “Cyber Safe Green Energy”, we share experience from collaborating with industry leaders in green energy to secure work sites with the OT zero trust approach.

Get White Paper




See All Recent Articles at SecurityWeek.Com

Industry Reactions to 'OT:Icefall' Vulnerabilities Found in ICS Products: Industry professionals comment on the disclosure of OT:Icefall, a collection of 56 vulnerabilities affecting ICS products from 10 major companies. Read More

Microsoft: Russian Cyber Spying Targets 42 Ukraine Allies: State-backed Russian hackers have engaged in “strategic espionage” against governments, think tanks, businesses and aid groups in 42 countries supporting Kyiv, Microsoft says in a new report. Read More

SMA Technologies Patches Critical Security Issue in Workload Automation Solution: A vulnerability in the SMA Technologies OpCon UNIX agent results in the same SSH key being added to all installations. Read More

Delivery Firm Yodel Scrambling to Restore Operations Following Cyberattack: The UK-based delivery service says deliveries might be delayed in some cases. Read More

Aqua Security Ships Open Source Tool for Auditing Software Supply Chain: Aqua Security releases open source tool for auditing the software supply chain to ensure compliance with newly created CIS guidelines. Read More

Belgian, Dutch Police Dismantle Cybercrime Group: Belgian and Dutch police, coordinated by Europol, dismantled a cybercrime group that made millions through phishing and other types of schemes. Read More

Google Patches 14 Vulnerabilities With Release of Chrome 103 Chrome 103 patches nine externally reported vulnerabilities, including a critical-severity use-after-free bug in Base. Read More

Adobe Acrobat Reader Shuns Security Products Due to Compatibility Issues: The behavior is linked to Acrobat Reader’s use of Chromium Embedded Framework (CEF), which has some incompatibility issues with certain security solutions. Read More

New 'ToddyCat' APT Targets High-Profile Entities in Europe, Asia: Focused on government organizations and military entities, the group is characterized by the use of two malware families: the Samurai backdoor and the Ninja trojan. Read More

Cyberint Scores $40 Million Late-Stage Investment: Cyberint, a threat intelligence startup competing in the attack surface management category, has raised $40 million in financing led by StageOne Late Stage Arm. Read More

RevealSecurity Raises $23 Million for Application Detection and Response: SYN Ventures is leading a $23 million Series A investment in RevealSecurity, a startup building technology to thwart malicious insider threats. Read More

Flagstar Bank Data Breach Affects 1.5 Million Customers: Flagstar Bank has disclosed a data breach in which threat actors accessed files containing the personal information of 1.5 million individuals. Read More





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2022 Wired Business Media

Comments

Popular posts from this blog

SecurityWeek Briefing.

SecurityWeek Briefing.

Cyber War News Wire.