ICYMI: 2022-09-13
Latest Headlines
How GRC protects the value of organizations — A simple guide to data quality and integrity
Asian Governments and Organizations Targeted in Latest Cyber Espionage Attacks
Iranian Hackers Target High-Value Targets in Nuclear Security and Genomic Research
Apple Releases iOS and macOS Updates to Patch Actively Exploited Zero-Day Flaw
3 Considerations When Aligning Organizational Structure to IT/OT Governance
Twitter Ex-Security Chief Tells US Congress of Security Concerns
Cloud Data Security Startup Theom Emerges From Stealth With $16 Million in Funding
ICS Patch Tuesday: Siemens, Schneider Electric Fix High-Severity Vulnerabilities
Lorenz Ransomware Gang Exploits Mitel VoIP Appliance Vulnerability in Attacks
Trend Micro Patches Another Apex One Vulnerability Exploited in Attacks
iOS 16 Rolls Out With Passwordless Authentication, Spyware Protection
Spyware, Ransomware, Cryptojacking Malware Increasingly Detected on ICS Devices
U-Haul Says Customer Data Accessed Using Compromised Credentials
Peiter ‘Mudge’ Zatko: The Wild Card in Musk’s Clash With Twitter
Lorenz Ransomware Group Breach Enterprise Networks Using Their Phone Systems
Let’s Encrypt builds infrastructure to support browser-based certificate revocation revival
Hackers now use ‘sock puppets’ for more realistic phishing attacks
Windows 11 KB5017328 update fixes USB printing, audio headset issues
Zero-day in WPGateway Wordpress plugin actively exploited in attacks
Microsoft September 2022 Patch Tuesday fixes zero-day used in attacks, 63 flaws
Tax fraud ring leader jailed for selling children’s stolen identities
Police arrest man for laundering tens of millions in stolen crypto
Hackers breach software vendor for Magento supply-chain attacks
Trend Micro warns of actively exploited Apex One RCE vulnerability
New PsExec spinoff lets hackers bypass network security defenses
Cyberspies drop new infostealer malware on govt networks in Asia
– MTZ