Cybernews Newsletter

Threat actors use Google Cloud to spoof Best Buy.

Views expressed in this cybersecurity and cybercrime update are those of the reporters and correspondents.

Accessed on 18 August 2022, 1334 UTC.

Content provided by email subscription to "Cybernews Newsletter."

Source:   https://mail.google.com/mail/u/0/#inbox/FMfcgzGqPzJRDLbNBtQpnMnjLSvvFBzh

Please click link or scroll down to read your selections.

Thanks for joining us today.

Russ Roberts

https://www.hawaiicybersecurityjournal.net

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security)


CyberNews no-reply@cybernews.com Unsubscribe

3:02 AM (35 minutes ago)
to me

Newsletter

FacebookTwitterYoutubeLinkedIn
SECURITY

Threat actors use Google Cloud to spoof Best Buy 

A phishing scam appears to be spoofing the multinational retailer – and though fairly easy to spot, it may be working because it uses Google’s trusted reputation to bypass email security, says analyst Avanan. 
Learn More

Get the best deals for online security products

Looking to upgrade your personal and business security, without breaking the bank? Cybernews can help you out. We collected the latest deals for VPN, antivirus, password manager, and secure hosting products: with discounts up to 83%. Protect your data – and your wallet!
Learn more

Top articles for you:

Users soon won’t be able to buy books on five Kindle models: security is to blame 
Five models of Kindle – popular e-reader devices – are becoming outmoded, losing support from their manufacturer, and essentially being prevented from downloading new books. 
Cybersecurity firm Cisco admits to being hacked 
Cisco has confirmed that it was hacked earlier this year, in a breach that reportedly saw it stripped of 2.75GB 
Prepare to feel old as we celebrate 50 Years of Atari 
t’s hard to believe, but 50 years had passed since the moment when Atari taught people how to think symbolically by daring to visualize tennis through the medium of two rectangles and a square. 
Cybersecurity veteran urges to learn from cybercriminals' mistakes 
A cybersecurity expert with 20 years of experience, says attackers sometimes make critical mistakes, letting defenders take a peek into their operations. 
SECURITY

Most shut-down ransomware groups are expected to re-emerge in 2022 

It takes a ransomware group, on average, 17 months to either rebrand or seize operations. But even after a complete shutdown, they are never really gone, with the majority expected to resurface in 2022. 
Learn More
# ASK CYBERNEWS

Have any pressing questions about tech and cybersecurity? Send them my way at anna.zhadan@cybernews.com. Each month, I’ll select one and answer it here. So, keep ‘em coming. And remember: there are no stupid questions.

And if you are enjoying what you are reading, please consider recommending it to friends. They can sign up here. 
Thanks for reading!
CyberNews Editor Anna Zhadan 
Follow us:
FacebookTwitterYoutubeLinkedIn
You can unsubscribe (but we're going to miss you).

Comments

Popular posts from this blog

SecurityWeek Briefing.

SecurityWeek Briefing.

Cyber War News Wire.