Blog Digest February 2022

Blog Digest February 2022

These are the Changes of Cybersecurity Springtime

Marc Ruef
by Marc Ruef
on February 25, 2022
time to read: 4 minutes

The scip Blog Digest is a monthly released summary of the most important, thrilling and crazy posts from the international blogosphere. While reading this digest it remains very easy to keep up to date with the events of cybersecurity and advanced technology. Follow our team on 𝕏 and the company on LinkedIn, to get the most recent news.

coin bitcoin standing side

$3.6 billion bitcoin seizure shows how hard it is to launder cryptocurrency

fish side blue green

‘Ice phishing’ on the blockchain

steps concrete closeup gray green

‘Silent AirTags’ With Speakers Removed Pop Up on Etsy, eBay

surface raindrops reflection

3D printed guns, underground markets, bomb manuals: police crackdown continues

golf putting green

2021 Trends Show Increased Globalized Threat of Ransomware

apple mouse

Apple now allows unlisted apps on the App Store

conference room table long tv front

A walk through Project Zero metrics

catacombs skulls closeup yellow

Dark Web Vendors: Who They Are and Who They Serve

laptop smartphone social media blue

Emoji Frequency

nature ocean beach clouds

Fake faces created by AI look more trustworthy than real people

firefox lego

Firefox and Chrome reaching major versions 100 may break some websites

coin bitcoin pile closeup

From Initial Access to Ransomware Attack – 5 Real Cases Showing the Path from Start to End

forest trees high up

Gay/Bi Dating App, Muslim Prayer Apps Sold Data on People’s Location to a Controversial Data Broker

hardware video cards

GPU Acceleration On The Cheap: Using Affordable Video Cards to Break Passwords Faster

windows facade

Microsoft: Windows needs at least 8 hours online to update reliably

windows facade

Microsoft Defender will soon block Windows password theft

coin bitcoin standing side

NFT marketplace halts most transactions due to proliferation of fake and plagiarized tokens

tesla coil flash blue

Nuclear-fusion reactor smashes energy record

conference room table long tv front

OpenSSF’s Alpha-Omega Project to target vulnerabilities from beginning to end

coin bitcoin pile closeup

Ransomware extortion doesn’t stop after paying the ransom

hacker hands on laptop

Russian Govt. Continues Carding Shop Crackdown

landscape winter alps mountain snow cabinet white sky blue

Stop pixelating! New tool reveals the secrets of “redacted” documents

hacker hands on laptop

Technical analysis of Wordpress hack with PHP script as running process (reading PHP code from memory)

farmhouse old broken

Their Bionic Eyes Are Now Obsolete and Unsupported

skyline newyork

This company says it’s developing a system that can recognize your face from just your DNA

beach wave clouds gray

Tired of the Modern Web? Try the ‘Gemini’ protocol

suits hanging boutique blue

UK government security center, i100 publish NMAP scripts for vulnerability scanning

About the Author

Marc Ruef

Marc Ruef has been working in information security since the late 1990s. He is well-known for his many publications and books. The last one called The Art of Penetration Testing is discussing security testing in detail. He is a lecturer at several faculties, like ETH, HWZ, HSLU and IKF. (ORCID 0000-0002-1328-6357)

You want to evaluate or develop an AI?

Our experts will get in contact with you!

×
Specific Criticism of CVSS4

Specific Criticism of CVSS4

Marc Ruef

scip Cybersecurity Forecast

scip Cybersecurity Forecast

Marc Ruef

Voice Authentication

Voice Authentication

Marc Ruef

Bug Bounty

Bug Bounty

Marc Ruef

You want more?

Further articles available here

You need support in such a project?

Our experts will get in contact with you!

You want more?

Further articles available here