Hawaii Cybersecurity Digest

Latest Cybersecurity Information

Cyber Crime, Cyber Intelligence, Cyber Security, Cyber War, Information Security

Security News | CSO Online

Which countries are most (and least) at risk for cybercrime?

What countries are more or less at risk for cybercrime?

Views expressed in this cybersecurity-cybercrime update are those of the reporters and correspondents. 

Accessed on 16 November 2021, 1302 UTC.

Content supplied by email subscription to “CSO Online.”

Source; https://www.csoonline.com/news/

Please click link or scroll down to read your selections.

News

cso security global breach networking hack invasion infiltrate 5g connected gettyimages 1211443622
hacker access to IoT / internet of things

Tech Spotlight   >   Cloud [IFW]   >   Conceptual image of IoT cloud services.
 

BusyBox flaws highlight need for consistent IoT updates

Some of the 14 vulnerabilities could result in remote code execution or denial of service attacks.

Unitd States cybersecurity   >   U.S. flag with a digital network of locks instead of stars
 

Pentagon announces version 2.0 of its controversial CMMC program

CMMC 2.0 simplifies the process for SMBs, but critics say the verification process relies too much on self-attestation.

ransomware breach hackers dark web
 

US DOJ recovers $6 million and indicts two REvil principals

The DOJ promises a whole of government approach to fighting ransomware groups no matter which country they operate from.

 
nycrr cybersecurity gavel regulation compliance law nyc statue of liberty
 

Infrastructure bill includes $1.9 billion for cybersecurity

Passage of the infrastructure bill includes $1.9 billion for cybersecurity, and more could be on the way with the Build Back Better and other bills working their way through Congress.

A magnifying lens exposes an exploit amid binary code.
 

Update and isolate your Nagios servers now

Recently discovered vulnerabilities in Nagios servers could give attackers broad access to systems and data if exploited.

cyber technology security protection monitoring concept advanced picture id1276687348
 

Graylog unites SIEM, AI-based anomaly detection in new security suite

Graylog is consolidating SIEM and UEBA (anomaly detection and user entity behavior analytics) in its new security package for streamlined detection and elimination of enterprise security threats .

A broken link in a digital chaing / weakness / vulnerability
 

CISA releases directive to remediate dangerous vulnerabilities across civilian agencies

While the move is applauded, a short timeframe to address vulnerabilities will be a challenge for security resource-strapped agencies.

Smishing, an SMS phishing attack / Vishing, a voice phishing attack by phone
 

Stealthy Trojan that roots Android devices makes its way on app stores

The criminals behind the Trojan have placed fully functional utilities that carry malicious code on the Google Play store in a way that evades detection.

cloud security
 

Enterprises with subsidiaries more prone to cyberattacks, study says

Global enterprises with numerous subsidiaries are more exposed to cybersecurity threats and have more difficulty managing risk than companies with no or fewer subsidiaries, according to an Osterman Research report.

USA / United States of America stars + stripes and binary code superimposed over The White House
 

Biden’s cybersecurity executive order, a progress report

Of the 46 tasks President Biden mandated to protect digital government assets, 19 are now completed, though not all agencies have reported their progress.

Conceptual image of a network of executives / silhouettes of executives in motion.
 

New US CISO appointments, October 2021

Keep up with news of CSO, CISO, and other senior security executive appointments.

Russian hammer and sickle / binary code
 

Russian cyberspies target cloud services providers and resellers to abuse delegated access

A new Microsoft advisory claims Russia’s Nobelium group is trying to gain long-term access to the technology supply chain and offers mitigation advice.

Cyber insurance  >  Umbrella hub protecting connected devices + online activities in binary world.
 

Decline in ransomware claims could spark change for cyber insurance

New research indicates that ransomware attack and payment claims are in decline as resiliency takes priority for organizations.

API security alert / software development / application flow chart diagram
 

Detecting anomalies with TLS fingerprints could pinpoint supply chain compromises

Researchers at Splunk outline a technique, pioneered by Salesforce, that could detect malicious activity in the software supply chain, but with some limitations.

certificate / gold seal certification
 

(ISC)2 pilots new entry-level cybersecurity certification to tackle workforce shortages

New certification aims to validate knowledge of foundational cybersecurity concepts and best practices to address skills gap. Is another cybersecurity qualification the answer?

vulnerable breach cyberattack hacker
 

How shape-shifting threat actors complicate attack attribution

Researchers explain how they identified—or failed to identify—the threat actors behind three high-profile incidents and why attribution is so difficult.

A laptop displays binary code and the flag of China.
 

Chinese APT group IronHusky exploits zero-day Windows Server privilege escalation

The attackers used the exploit to deploy a new remote shell Trojan called MysterySnail.

Team members with laptop and mobile phone are superimposed with abstract statistics, data and charts
 

Google forms Cybersecurity Action Team to support customer security transformation

Google’s initiative will offer security and compliance services to guide governments, critical infrastructure, enterprises, and small businesses through digital transformation.

LOAD MORE

 

For the latest cybersecurity and cybercrime information, please check the blog sidebar, links, and twitter posts.

Russ Roberts

https://cyber-security-intelligence.org

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: