Cybernews Newsletter

Threat actors use Google Cloud to spoof Best Buy.

Views expressed in this cybersecurity and cybercrime update are those of the reporters and correspondents.

Accessed on 18 August 2022, 1334 UTC.

Content provided by email subscription to "Cybernews Newsletter."


Please click link or scroll down to read your selections.

Thanks for joining us today.

Russ Roberts (machine learning, artificial intelligence, IoT, and information security)

CyberNews Unsubscribe

3:02 AM (35 minutes ago)
to me



Threat actors use Google Cloud to spoof Best Buy 

A phishing scam appears to be spoofing the multinational retailer – and though fairly easy to spot, it may be working because it uses Google’s trusted reputation to bypass email security, says analyst Avanan. 
Learn More

Get the best deals for online security products

Looking to upgrade your personal and business security, without breaking the bank? Cybernews can help you out. We collected the latest deals for VPN, antivirus, password manager, and secure hosting products: with discounts up to 83%. Protect your data – and your wallet!
Learn more

Top articles for you:

Users soon won’t be able to buy books on five Kindle models: security is to blame 
Five models of Kindle – popular e-reader devices – are becoming outmoded, losing support from their manufacturer, and essentially being prevented from downloading new books. 
Cybersecurity firm Cisco admits to being hacked 
Cisco has confirmed that it was hacked earlier this year, in a breach that reportedly saw it stripped of 2.75GB 
Prepare to feel old as we celebrate 50 Years of Atari 
t’s hard to believe, but 50 years had passed since the moment when Atari taught people how to think symbolically by daring to visualize tennis through the medium of two rectangles and a square. 
Cybersecurity veteran urges to learn from cybercriminals' mistakes 
A cybersecurity expert with 20 years of experience, says attackers sometimes make critical mistakes, letting defenders take a peek into their operations. 

Most shut-down ransomware groups are expected to re-emerge in 2022 

It takes a ransomware group, on average, 17 months to either rebrand or seize operations. But even after a complete shutdown, they are never really gone, with the majority expected to resurface in 2022. 
Learn More

Have any pressing questions about tech and cybersecurity? Send them my way at Each month, I’ll select one and answer it here. So, keep ‘em coming. And remember: there are no stupid questions.

And if you are enjoying what you are reading, please consider recommending it to friends. They can sign up here. 
Thanks for reading!
CyberNews Editor Anna Zhadan 
Follow us:
You can unsubscribe (but we're going to miss you).


Popular posts from this blog

SecurityWeek Briefing.

Cyber War Newswire

SecurityWeek Briefing.