An Analysis of Software Supply Chain Attacks
https://www.forcepoint.com/blog/x-labs/analysis-software-supply-chain-attacks
https://www.forcepoint.com/blog/x-labs/software-supply-chain-attacks-part-two
Power company pays out $3 trillion compensation to astonished customer
https://nakedsecurity.sophos.com/2022/02/14/power-company-pays-out-3-trillion-compensation-to-astonished-customer/
Top Twenty Most Exploited Vulnerabilities in 2021
https://toolswatch.org/2022/02/top-twenty-most-exploited-vulnerabilities-in-2021/
Log4j Isn’t Just a Cybersecurity Threat—It Reveals Blind Spots in Our Cyber Governance
https://securityboulevard.com/2022/02/log4j-isnt-just-a-cybersecurity-threat-it-reveals-blind-spots-in-our-cyber-governance/
Critical VMware Bugs Open ESXi, Fusion & Workstation to Attackers
https://threatpost.com/critical-vmware-bugs-esxi-fusion-workstation/178461/
NSA Provides Guidance on Cisco Device Passwords
https://www.securityweek.com/nsa-provides-guidance-cisco-device-passwords
CISA compiled a list of free cybersecurity tools and services
https://securityaffairs.co/wordpress/128182/hacking/cisa-list-free-cybersecurity-tools.html
What Happens When Russian Hackers Cyberattack the US Electric Power Grid?
https://www.bloomberg.com/news/features/2022-01-26/what-happens-when-russian-hackers-cyberattack-the-u-s-electric-power-grid
No comments:
Post a Comment