Information Security News
- Tariffs May Prompt Increase in Global Cyberattacks
Dark Reading – Robert Lemos - US Comptroller Cyber ‘Incident’ Compromises Org’s Emails
Dark Reading – Kristina Beek - Wyden Blocks Trump’s CISA Boss Nominee, Blames Cyber Agency for ‘Actively Hiding Info’ About Telecom Insecurity
The Register – Jessica Lyons - Trump Signs Order Stripping Chris Krebs of Security Clearance
Cyberscoop – Greg Otto - Hackers Target SSRF Bugs in EC2-Hosted Sites to Steal AWS Credentials
BleepingComputer – Bill Toulas - Sensitive Financial Files Feared Stolen From US Bank Watchdog
The Register – Iain Thomson - National Social Security Fund of Morocco Suffers Data Breach
Security Affairs – Pierluigi Paganini - BadBazaar and Moonshine Malware Targets Taiwanese, Tibetan and Uyghur Groups, U.K. Warns
Cyberscoop – Tim Starks - Critical FortiSwitch Flaw Lets Hackers Change Admin Passwords Remotely
BleepingComputer – Sergiu Gatlan - Fake Microsoft Office Add-in Tools Push Malware via SourceForge
BleepingComputer – Bill Toulas - Privacy Fights Over Expiring Surveillance Law Loom After House Hearing
Cyberscoop – Tim Starks - UK Orgs Pull Back Digital Projects With Looming Threat of Cyberwarfare
Dark Reading – Kristina Beek - Adobe Calls Urgent Attention to Critical ColdFusion Flaws
SecurityWeek – Ryan Naraine - 2 Android Zero-Day Bugs Under Active Exploit
Dark Reading – Kristina Beek - Treasury Department Bank Regulator Discloses Major Hack
Cybersecurity Dive – Elizabeth Montalbano - Inside a Powerful Database ICE Uses to Identify and Deport People
404 Media – Jason Koebler - Dangerous, Windows-Hijacking Neptune RAT Scurries Into Telegram, YouTube
Dark Reading – Elizabeth Montalbano - SAP Patches Critical Code Injection Vulnerabilities
SecurityWeek – Ionut Arghire - WhatsApp Vulnerability Could Facilitate Remote Code Execution
SecurityWeek – Eduard Kovacs - ESET Vulnerability Exploited for Stealthy Malware Execution
SecurityWeek – Ionut Arghire - UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine
The Hacker News – Ravie Lakshmanan - Meta Blocks Livestreaming by Teenagers on Instagram
The Guardian – Dan Milmo - EVEREST Ransomware Group’s TOR Leak Site Offline After a Defacement
Security Affairs – Pierluigi Paganini - Russian Bots Hard at Work Spreading Political Unrest on Romania’s Internet
Bitdefender – Graham Cluley - Six Arrested for AI-Powered Investment Scams That Stole $20 Million
BleepingComputer – Bill Toulas - As CISA Braces for More Cuts, Threat Intel Sharing Takes a Hit
The Register – Jessica Lyons - Counterfeit Android Devices Found Preloaded with Triada Malware
BleepingComputer – Bill Toulas - Joint Letter on Swedish Data Storage and Access to Electronic Information Legislation
Global Encryption Coalition – Ryan Polk
Analysis
- Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy
SecurityWeek – Joshua Goldfarb - How Democratized Development Creates a Security Nightmare
Dark Reading – Fernando José Karl - Experts Optimistic About Secure by Design Progress
Dark Reading – Arielle Waldman - Machine Identity a Key Priority for Organisations’ Security Strategies
itNews
CyAN Members Op Eds, Articles, etc.
- 🔐 End-to-End Encryption: A Cornerstone Under Pressure?
– Peter Evans - CyAN Member Spotlight: Łukasz Gawron – Advancing Cybersecurity in Poland
🗓️ Upcoming CyAN (and CyAN Partner) Global Events:
🎉 Celebration
CyAN 10th Anniversary
(Details TBA)
🌐 Online
CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST
🌐 Online
CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT