Plus: U.K. cybersecurity leaders are pro children's screen scanning
Part of Network | |
Presented by |
Ukrainian radio stations were hacked and broadcasted fake news about the health of Volodymyr Zelenskyy. The fake news stated that Zelensky was in intensive care and in critical condition. More: - The primary victim was radio station TAVR Media, which serves as a network with nine other radio channels under it.
- To dispute the claim, Zelensky posted a video where he seems to be in good health, blaming Russian hackers for breaching the stations and causing panic among Ukrainians.
- So far, it is not known how the hackers managed to breach the radio network, but the attack is a continued pattern of breaching key Ukrainian organizations by the Russian government and its state-backed hackers.
| |
U.K. cybersecurity leaders have stated that they are in favor of scanning children's phone screens. The process has raised privacy concerns, as similar initiatives have failed in the past. More: - The two individuals responsible for carrying this process through, National Cybersecurity Centre technical director Ian Levy and Crispin Robinson of the Government Communications Headquarters, favor scanning children's screens. They claim that this procedure would be beneficial for their safety.
- While this research paper does not mean that it will be implemented as a policy by the government, it is a sign that the cybersecurity community is taking note of the geopolitical changes that are happening, which have resulted in governments treating cybersecurity as a priority.
- Companies such as Apple recently proposed similar features but faced criticism from privacy advocates who claim there needs to be a line between companies and the amount of private data they collect.
| |
A message from LAIKA If you’re trying to close deals, SOC 2 is probably a thorn in your side. What is it, and who cares? Your business needs SOC 2. But building compliance from scratch is complicated, time-consuming, and the cost can be crippling. Laika has you covered. Uncomplicate SOC 2 with our guide for growth-minded founders. In the guide by Laika you’ll learn: - What is SOC 2 compliance and why it matters for your startup
- How to close more deals faster by becoming SOC 2 compliant
- How to prepare for SOC 2 compliance
- What to expect in terms of time and cost
- What to do after the report is in
What makes Laika the authority on SOC 2? They’re the only compliance automation solution that was built by compliance experts. Learn how to turn compliance from a pain point into a secret edge over your competitors. Download Now | |
Microsoft has warned that temporary mitigating for Windows Server printing issues on non-compliant devices will be removed, potentially causing printing issues. The flaw is present in multiple Windows server versions. More: - The issue affects devices that have not updated their systems to adhere to the new security protocols directed by the CVE-2021-33764 bug.
- While Microsoft had created a temporary fix for the issue, the company has now stated that it is removing the fix, which will cause printing issues.
- As the company works toward fixing the issue, system admins can check if their devices are vulnerable to this flaw by checking the Active Directory and updating their devices.
| |
Atlassian has stated that its customers are vulnerable to being breached. The warning comes after Confluence servers were hacked and login credentials were reported as stolen. More: - This recent Confluence flaw affected thousands of users, forcing the companies to quickly find a solution.
- The company has released a new update that it claims will solve the issues, and now Atlassian is urging its users to update their accounts to avoid being hacked.
- Atlassian Confluence servers were hacked by taking advantage of a zero-day flaw, while it believes that the threat actors are based in China.
| |
A message from COX EDGE Assets are getting larger, and end users have you stuck between the cloud and a hard place. While today’s websites and apps are still largely run out of one location, your users are everywhere. Cox Edge’s CDN steps in to help you deliver content more efficiently. Our extensive network of POPs delivers content to your end users based on location, co-locating site and app assets closer to where your users are. Learn how Cox Edge’s CDN can help you: - Quickly scale up during heavy traffic
- Decrease costs
- Deliver an enhanced experience to end users with faster load times
- Increased performance more stability
Get started | |
SonicWall has stated that companies using Analytics-on-Prem products may be at risk of being hacked. The flaw is being tracked as CVE-2022-22280. More: - The flaw has a security risk rating of 9.4, deployed as an SQL injection.
- SQL injection attacks take advantage of the fact that SQL runs on many of the databases used on the internet, manipulating them and using flaws to breach victims.
- SonicWall stated that there are no known hacking campaigns taking advantage of this flaw at the moment, but companies should update their security protocols to avoid being hacked. Since the flaw is relatively unknown, dealing with this possible breach may be more difficult than usual for companies.
| |
Quick Hits - The right metrics make a difference. Read our fact sheet and learn what you should be measuring to prove marketing impact.*
- A new report conducted by cybersecurity executives claims that over 70% of organizations believe they are wasting their cybersecurity budget.
- Coinbase's former product manager, who was accused of frauding users by committing insider trading, has been officially charged with wire fraud conspiracy.
- Hackers have managed to steal the data of over 69 million users who visited Neopets. The data was sold on the dark web for 4 BTC.
- Twitter has been reportedly breached. The threat actor is offering the data of over 5 million users for $30,000, as they claim that they own emails, names, addresses, and other information about these users.
- See how to make sense of the security industry's infamous "alphabet soup" of acronyms and complex technical tools.*
*This is a sponsored post. | |
Upcoming events at Inside: | |
| | Arbër is an Inside writer who also has experience in entrepreneurship. He has experience covering Consumer Tech, Venture Capital, NFTs, Crypto, etc. Arbër holds a Bachelor's degree in Business from XAMK University in Finland. When he is not reading(and writing) business news, he chooses to watch sports or anime...and then read news about sports or anime. | | Editor | Aaron Crutchfield is based in the high desert of California. Over the last two decades, he has spent time writing and editing at various local newspapers and defense contractors in California. When he's not working, he can often be found looking at the latest memes with his kids or working on his 1962 Ford. | |
Laika is a unified compliance platform that automates workflows for audits, infosec monitoring, and vendor due diligence in a single, collaborative space. | |
Cox Edge’s CDN — Exceed user expectations and streamline content delivery. | |
767 Bryant St. #203, San Francisco, CA 94107 Copyright © 2022 Inside.com | |
|