Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
CuckooBees campaign stings targets for years
Health and Human Services hammered over security
Docker images used to DDoS Russian sites
Thanks to today's episode sponsor, Censys
Google claims to have blocked billions of malicious app downloads
NortonLifeLock willfully infringed malware patents
Former eBay exec pleads guilty to cyber stalking
Thanks to today's episode sponsor…
Top 15 exploited security vulnerabilities in 2021
India gives orgs 6 hours to report cyber incidents
The White House wants more powers to crack down on rogue drones
Thanks to today's episode sponsor,…
Link to Blog Post
This week’s Cyber Security Headlines - Week in Review, Apr 25-29, is hosted by Rich Stroffolino with our guest, Hadas Cassorla, CISO, M1 Financial
Thanks to our episode sponsor, F…
Global security spending set to hit $198bn by 2025
New malware loader Bumblebee adopted by known ransomware access brokers
Cloudflare thwarts record DDoS attack
Thanks to today’s episode sponsor, Fer…
Russia experiences hacks at scale
State Department puts a price on NetPetya’s head
Two-thirds of organizations hit with ransomware
Thanks to today’s episode sponsor, Feroot
Feroot secures client-si…
Elon Musk’s Twitter takeover could be bad for security and privacy
Stormous Ransomware targets Coca Cola
US offers $10 million reward for help locating Russian hackers
Thanks to today’s episode spons…
Mandiant finds record zero-days in 2021
Bored Ape Yacht Club hacked
Oracle patches critical Java vulnerability
Thanks to today’s episode sponsor, Feroot
Feroot secures client-side web applicatio…
Hackers find 122 vulnerabilities, 27 deemed critical, during first round of DHS bug bounty program
Anonymous has leaked 5.8 TB of Russian data since declaring cyber war
AWS's Log4j patches blew holes…
Critical chipset bugs open millions of Android devices to remote spying
New Five Eyes alert warns of Russian threats targeting critical infrastructure
Machine-learning models vulnerable to undetectab…
LinkedIn is now the most popular phish bait
Lenovo patches firmware vulnerabilities impacting millions of users
Ukraine war stokes internet connectivity concerns in Taiwan
And here’s a word from our …
Microsoft: Office 2013 will reach end of support in April 2023
Stolen OAuth tokens used to download data from dozens of organizations, GitHub warns
Mute button in conferencing apps may not actually m…
Data breach disclosures surge 14% in Q1 2022
Windows 11 tool to add Google Play secretly installed malware
DHS investigators say they foiled cyberattack on undersea internet cable in Hawaii
Thanks to…
Industrial cybersecurity companies form coalition
Microsoft disrupts ZLoader
T-Mobile hired someone to get their data back
Thanks to our episode sponsor, Code42
It’s not just about the data leaving …
RaidForums hacker marketplace shut down in cross-border law enforcement operation
Sandworm hackers fail to take down Ukrainian energy provider
CISA warns of Russian state hackers exploiting WatchGuar…
NSO Group spyware reportedly used against European Commission
The malware is coming from inside the phone
OpenSSH gets ready for quantum computing
Thanks to our episode sponsor, Code42
Cybersecurity…
New Meta information stealer distributed in malspam campaign
NB65 group targets Russia with a modified version of Conti’s ransomware
Elon Musk unveils vision for Twitter after joining board
Thanks to…