Security News > 2022 > June

As its revenues continue to decline, Netflix has announced that it is cracking down on password sharing. An April 2022 study found that of 2209 American households surveyed, 17% admitted to sharing a Netflix password, and 11% of those respondents claimed to be sharing a password with people outside of their household.

How to install Maltrail for malicious traffic detection on your network We may be compensated by vendors who appear on this page through methods such as affiliate links or sponsored partnerships. One such tool is the open-source Maltrail traffic detection system.

Pure IR retainers typically don't offer security leaders flexibility to maximize their investment, but by being permitted to use credits toward preparedness, testing, simulations and so forth, cyber risk can be mitigated. There are three key elements to achieving an effective cyber risk retainer: negotiation, structure and execution.

Google has released the June 2022 security updates for Android devices running OS versions 10, 11, and 12, fixing 41 vulnerabilities, five rated critical. The security update is separated into two levels, released on June 1 and June 5.

We must remain mindful of the perils of contacting users during an insider risk investigation. As Insider Risk Analysts, our goal is to seek understanding; to assemble a set of facts from disparate sources to generate a clear picture of an event.

Researchers have added state-sponsored hackers to the list of adversaries attempting to exploit Microsoft's now-patched Follina vulnerability. According to researchers at Proofpoint, state-sponsored hackers have attempted to abuse the Follina vulnerability in Microsoft Office, aiming an email-based exploit at U.S. and E.U. government targets via phishing campaigns.

At WWDC 2022, Apple has announced and previewed iOS 16 and iPad OS 16, macOS 13, watchOS 9, their new M2 chips, new MacBook Air and Pro, as well as new tools, technologies, and APIs for developers focusing on Apple's platforms. Apple extends passwordless authentication with passkeys.

Threat actors are using public exploits to pummel a critical zero-day remote code execution flaw that affects all versions of a popular collaboration tool used in cloud and hybrid server environments and allows for complete host takeover. Researchers from Volexity uncovered the flaw in Atlassian Confluence Server and Data Center software over the Memorial Day weekend after they detected suspicious activity on two internet-facing web servers belonging to a customer running the software, they said in a blog post published last week.

What characteristics do companies possess that tend to attract cyberattacks, and why do hackers target them? Many hackers may try to steal your passwords or bank accounts to make money by taking off with your hard-earned cash.

Attackers aren't slowing down; in fact, ransomware attacks are almost ubiquitous. In nearly every case, the victim had already been compromised by one or more threats on the way to becoming a ransomware victim.