ICYMI: 2022-12-09
Latest Headlines
Using XDR to Consolidate and Optimize Cybersecurity Technology
New Truebot Malware Variant Leveraging Netwrix Auditor Bug and Raspberry Robin Worm
Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop Resolver
What Stricter Data Privacy Laws Mean for Your Cybersecurity Policies
MuddyWater Hackers Target Asian and Middle East Countries with Updated Tactics
Lensa AI and ‘Magic Avatars’: What to Know Before Using the App
Interpres Security Emerges From Stealth Mode With $8.5 Million in Funding
Cisco Working on Patch for Publicly Disclosed IP Phone Vulnerability
LF Electromagnetic Radiation Used for Stealthy Data Theft From Air-Gapped Systems
SOHO Exploits Earn Hackers Over $100,000 on Day 3 of Pwn2Own Toronto 2022
Over 4,000 Vulnerable Pulse Connect Secure Hosts Exposed to Internet
EU Court: Google Must Delete Inaccurate Search Info If Asked
New Dark Web Website Allows Hackers to Embed Malware to Legitimate Android Apps
JSON syntax hack allowed SQL injection payloads to be smuggled past WAFs
Rackspace warns of phishing risks following ransomware attack
Australia arrests ‘Pig Butchering’ suspects for stealing $100 million
Microsoft Edge 109 is the last version to support Windows 7/8.1
Antivirus and EDR solutions tricked into acting as data wipers
Holiday 2022 deal: 20% off Zero2Automated malware analysis training
– MTZ