SELECTIONS FROM TOP CYBERSECURITY NEWS SOURCES
Extensive Portal for NSO Group Malware Research
Linux Kernel Vulnerability Threatens Systems Across the Linux Landscape - Dark Reading
2022 LastPass Breach Leads to Millions in Crypto Thefts - Krebs on Security
EU unveils "revolutionary" laws to curb deceptive powers of big tech - The Guardian
Spyware Vendor Hacked - Schneier on Security
Google warns of novel social engineering method used to hack security researchers - The Verge
NSA and FBI: Kimsuky hackers pose as journalists to steal intel - Bleeping Computer
Hackers have breached organizations in defense and other sensitive sectors, security firm says - CNN
Meta disrupted two influence campaigns from China and Russia - Security Affairs
Blinking Red Light of Death for Surveillance Cameras - Hacker Combat
China-linked hackers used VPN flaw to target U.S. defense industry -researchers - Reuters
U.S. anti-hacking laws pose a risk to national security
Recent legal developments bode well for security researchers, but challenges remain - CS Online
Ethical hackers and the economics of security research - Help Net Security
Getting Online (Or NOT) in North Korea
The Impregnability of the Piratebay Fortress
Wolfgang Brings US the "Perfect" Home Server Configuration..
India Hosting Extensive Secret Hacking-for-Hire Industry
What's Up with ChatGPT's Conversation History Feature: Privacy Breach!!
Russian Spy Network Dismantled by Polish Security
Critical (Nuclear) U.S. Infrastructure Targeted by Russia-Linked APT Group in 2022
Five Guys H.R. Data Breach Highlights Dangers To Job Applicants. Company Faces Lawsuits.
ChatGPT - AI That Can Write Malware (And Just About Anything Else...On Demand!)
FBI Email Servers Hacked: Fake Malware Warnings Widely Distributed to Government and Industry
Russian APT Groups Infiltrate U.S. Defense Contractors
Chinese APT Groups Infiltrate U.S. Defense Contractors
Are We FINALLY Gonna Be Rid of the Plague of Facebook? Meta Stocks PLUMMET
The Latest in Russia/Ukraine Cyber War - NATO-designed Command and Control Servers Targeted
The Pegasus Project: The Guardian and Washington Post Surveilling Israeli Surveillance Malware
Trickbot Leveraging Reputations of Major Brands
NSA Mass Surveillance Undermines the Security of the United States, at Great Cost
Federal Secure-Identiry Cards Foiled by Personal Reader Devices Infected with Malware
Log4j vulnerability alive and well on VMWare Horizon Servers - North Korean Hackers Getting Inside!
Conti CyberCrime Gang Responds to REvil Takedown
Russian "Conti" (now under old name "Ryuk") Ransomware Group's Impact on U.S. Healthcare
Timeline Review of the Ukraine-Russia Cyber-conflict
Massive Russian Pipeline Company Breach
Satellite System Hack Spills Across Europe
Banking Trojan Targets Official AppStores to Gain Access Even to 2-Factor Authentication Tokens!
India Anti-Hacktivist Group Plants False Evidence Leading to Arrests
Apple Hands All User Data and Control of Data Centers in China to the CCP
Malicious Python packages Found in the PyPI Repo
Linux Kernel Z-Day Vulnerability Reported
Initial Access Market is Booming for Critical Shipping Infrastructure
Trojan Source Bug Threatens Security of ALL CODE...
Russia's Nobelium APT Group Continues to Target Critical Global Supply Chain Actors
Entire Twitch Website Hacked and Displayed: Phase One
Cloudflare Gives a Detailed Accounting of the Facebook Network Outage
Facebook, WhatsApp, and Instagram are down worldwide, it’s panic online
Stuxnet-Like Viruses Remain a Top U.S. Security Risk
Another Zero Day Exposes Countless Microsoft Business Customers to Targeted Attacks
Industrial Switches from different Vendors Impaired by Similar Exposures
Al Jazeera Hunts Bangladeshi Criminals Using Their Own Israeli-purchased Spyware
North Korea Linked Konny Rat Updated Malware Aimed at Russian Targets
Another Ransomeware Gang Goes Down, Releasing Private Decryption Keys...
Supply Chain Attacks Destined to Escalate
Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years
Researchers Discover Android Surveillance Malware Built by U.S. Sanctioned Russian Firm
HTTP-Botnets: The Dark Side of a Standard Protocol!
Skynet, a Tor-powered botnet straight from Reddit
REvil Ransomware Gang Disappears from Internet
AMLBot - AML program to check crypto wallets for illicit funds
Experts Shed Light On New Russian Malware-as-a-Service Written in Rust
Hackers Obfuscating Payloads With Exotic Programming Languages
Malware developers turn to 'exotic' programming languages to thwart researchers
Dark Web Tool That Checked For Dirty Bitcoin Shuts Down
Cybercriminals Have Built Their Own Blockchain Analytics Tool
The NSA's Plan to own the Internet
Ass Hacking: An Emerging International Cybersecurity Crisis
Op Ed on Apple's New Mass Surveillance System and It's (Supposedly) Unintended Uses
Tripwire Analyzes US Pipeline Security Issues
Exposure of Thousands of Supply Chain Networks to Hackers is Likely On the Horizon
Microsoft Exchange Server flaws inspire 30,000-plus Cyber Attacks
Government Assessment of Solar Winds Breach
FireEye Discovers Solar Winds Breach While Researching Internal Compromised Systems
Microsoft Scrutinized for Role in Solar Winds Breach
Zero Logon Vulnerability Exposes Windows Domain Controllers to Ransomware Attacks
All the Ways Your Wi-Fi Router Can Spy on You
Digital Shadows Weekly Podcast Roundup Discusses Ransomware Landscape
Understanding NIST SP 800-207 - Zero Trust Security Architecture for Industrial Control Settings
International Maritime Organization Hacked
Wordpress Flaw Leverages Zerologon to attack Domain Controllers
HEH Botnet Wipes/Bricks Devices
Kraken Fileless Attack Exploits Windows Error Reporting
Attack of the Coffee Makers... lol
US DoJ charges Iranian hackers for attacks on US satellite companies
Russian Actors Use Fake N.A.T.O. Credentials to Hack Foreign Governments
Brighter Bulbs on the Amazon Christmas Tree - Drivers Hacking Trees for Better Routes
Who's Watching YOUR Six? Cryptocurrency Fraud By Russian Hackers..
What's the Fight Really About? U.S. Economic Warfare and Likely Foreign Defenses
The Real Scoop on Five Eyes, Nine Eyes, and 14 Eyes Surveillance Alliances
California Court Issues Chilling Ruling Concerning CFAA (Computer Fraud and Abuse Act)
Homeland Security Spying on Journalists Reporting on Portland Protests
Threat Intel Feed Summary from Digital Shadows
Digital Shadows Reviews Threat Model of the Remote Worker
Zero Trust - My Paradigm Exactly - U.S. Navy Finally Graduates to the Pros
Another Zero-Day from hacktress sandboxescaper!!
US Cyberconference AI Malware Discussion
Business Bigwigs Fear Hackers with AI Tools
AI Malware with Superpowers...lol
LATEST NEWS ON JULIAN ASSANGE FROM BRITAIN'S "Independent"
Excellent Review of Current State of Cyberwarfare
Japanese Cybercrime Underground On The Rise
OOOhhh.... Hexane Moves In for the Big Kill...
Captital One Data Breach...Unknown if This Data Was Actually Leaked!
Court Blabs About NSA Hacking of Foreign Governments... Then Jails Contractor for Hacking NSA
Wired Magazine takes a look at Hacker Group APT32, aka OceanLotus
Trump Orders Cyberattack Against Iranian Missile Sites
Triada Backdoor to Root Control Built Into Android Devices at Factories
Hacker GnosticPlayers: Passwords for Sale
Hackers Get Hacked! (It's About Time....)
Intezer Gets The Scoop on Hidden Wasp Linux Malware
Germany Demands an End to Working Cryptography
China APT Activity Review from US-CERT.gov
Great Scholarly Contribution from bunnie and Ed (Snowden) on Hardware Vulnerability Mitigation
Thangrycat Harware Vulnerability Compromises Cisco Trustchain at it's Root
SeedWorm APT fortifies BlackWater phishing campaign with clever anti-detection methods
Israel Responds to Hamas Cyber Attack with Lethal Military Force
(YOUR) Instagram Private Data Dumped on Public Database
Stack OVerflow's Production Servers Hacked!
Mystery Hackers Hit MegaRich Corporations
China-linked Cyber Espionage Group Targets Naval Adversaries
Israeli Prime Minister Lead Challenging Candidate Hacked By Iranian Intelligence
SimBad Malware Spreading Via Google Play Store
NSA Hacks American Router Hardware
Thomas Drake Comments on PRISM