January's Almost List

This was the list of articles that almost made the January Breaking News page.
Some were referenced in the Breaking News page

Updated Jan 31st, 2024.

10 cybersecurity frameworks you need to know about – Help Net Security
10 Essential Features of Antivirus Software in 2024 | Technology For You
15 open-source cybersecurity tools you’ll wish you’d known earlier – Help Net Security
1st January – Threat Intelligence Report – Check Point Research
219 DBS customers lose S$446,000 to scams in span of 2 weeks – Mothership.SG – News from Singapore, Asia and around the world
23andMe admits it didn’t detect cyberattacks for months : r/cybersecurity
5 Cybersecurity Strategies You Must Embrace to Protect Your Business | Inc.com
5 cybersecurity trends to watch in 2024 | Cybersecurity Dive
5 expert cybersecurity tips for leaders to consider in 2024
6-The Power of AI in Cybersecurity: A Simple Guide | by emrah alpaslan | Jan, 2024 | Medium
7 Cybersecurity Myths Debunked: A Closer Look at Misunderstandings and Realities
After Aliquippa hack, Congress looks at water utility cybersecurity | 90.5 WESA
AI and rising cybersecurity threats in 2024
AI in Cybersecurity: Detecting and Countering Cyber Threats with AI Technology
AI’s Impact on Cybersecurity: Benefits and Challenges
Applying “Secure By Design” Thinking to Events in the News  | CISA
As cybersecurity threats continue to escalate in 2024, what should insurers do? – Digital Journal
axios.com/2024/01/19/russian-hackers-breach-microsoft-leaders-email-accounts
Bell study reveals 5 key factors that Canadian businesses need to keep organizations secure | BCE Inc.
Bitcoin Compromises SEC, Cybersecurity Stocks, Boeing’s Mess, Cautious Markets – TheStreet’s Real Money Pro
Boards Must Adapt as Tech Advances Show Cyber Training Gap | Technology Magazine
Boosting cybersecurity with continuous authentication | Biometric Update
Certificate of Competence in Zero Trust (CCZT)
China claims it has cracked Apple Airdrop’s encryption to identify senders | CNN Business
Chinese Drones Pose Threat to US Infrastructure, CISA Warns
CISA Adds 9.8 ‘Critical’ Microsoft SharePoint Bug to its KEV Catalog
CISA and FBI Release Known IOCs Associated with Androxgh0st Malware | CISA
CISA Joins ACSC-led Guidance on How to Use AI Systems Securely | CISA
Credential Stuffing vs Password Spraying – Security Boulevard
Credential Stuffing vs Password Spraying | LinkedIn
Critical infrastructure in the energy sector and cyber risks
CSA Data Security Glossary 20240119.pdf
Cyber Toufan goes Oprah mode, with free Linux system wipes of over 100 organisations | by Kevin Beaumont | Dec, 2023 | DoublePulsar
Cybersecurity / Encryption
Cybersecurity in Review: The Alarming Trend of Unsupported Systems – Security Boulevard
Cybersecurity is the new foundation of financial services
Cybersecurity Predictions for 2024 – Security Boulevard
Davos 2024: Global Cyber Risk and GDP Closely Linked, New SecurityScorecard Research Reveals
Department of Defense Cybersecurity Maturity Model Certification
Despite A Rise in Cyber Attacks, Many Users Still Do Not Use Cyber Security Tools
DHS & NGA Reps Share Distinct Approaches to Zero Trust, Cybersecurity
District Court confirms that noncompliance with cybersecurity requirements may lead to False Claims Act liability | DLA Piper
Elevated Cybersecurity: Privilege Identity Management and Zero Trust
Embracing identity: a glimpse into the future of cybersecurity – TechCentral
Evolving BianLian ransomware attack strategies detailed | SC Media
Facts and misconceptions about cybersecurity budgets – Help Net Security
FBI, DOJ, and SEC Publish Guidance on Requesting Delayed Reporting of Item 1.05, Material Cybersecurity Incidents, on Form 8-K | Paul Hastings LLP – JDSupra
Few consumers adopt cybersecurity tools, despite privacy concerns – Insider Intelligence Trends, Forecasts & Statistics
Four-Key Aspects of Implementing Zero Trust Architecture
Gary Gensler Breaks His Silence on the SEC’s X Account Hack – DailyCoin
How SEC Action Could Shake Up Cybersecurity
How SMBs are tailoring their cybersecurity programs [Q&A]
How the FBI is fighting an increasing number of ransomware attacks
How to Create a Cybersecurity Policy Document – Security Boulevard
HP Enterprise discloses hack by suspected state-backed Russian hackers | AP News
HPE hit by a monthslong cyberattack on its cloud-based email | Cybersecurity Dive
Hstoday Joint Advisory by FBI, CISA, Treasury, and FinCEN Sheds Light on Karakurt Data Extortion Group’s Evolving Tactics – HS Today
InfoSec: Phishing Attack Alerts
IoT’s Evolution: Cybersecurity in the Connectivity Era
ISMG Editors: Why Are Ransomware Victims Still Paying?
ISMG Editors: Will We Ever Get a Handle on API Security?
IT and OT cybersecurity: A holistic approach
Kaspersky discloses iPhone hardware feature vital in Operation Triangulation case | Kaspersky
Major cybersecurity layoffs of 2023 revisited | SC Media
Microsoft Battles Cybersecurity Issues on GitHub with AI Solutions – WinBuzzer
Microsoft Word – AA22-152A-Karakurt-Data-Extortion-Group
Microsoft’s Top Execs’ Emails Breached in Sophisticated Russia-Linked APT Attack
Most Popular Cybersecurity Blogs from 2023
New JinxLoader Targeting Users with Formbook and XLoader Malware
New year, familiar threats: Cybersecurity experts warn of the threats to come for 2024 | The Star
NIST Creates Cybersecurity Playbook for Generative AI
NVD – CVE-2023-38606
Outsmarting Ransomware’s New Playbook – SecurityWeek
Over 4k Solana users lost more than $4 million to phishing attacks last month
Partnering on cybercrime is taking the fight against cyber threats to new levels | World Economic Forum
PLAY Ransomware Attack Targets US Organizations
President approves measure to strengthen nuclear cybersecurity – Paso Robles Daily News
PwC survey: 77% of CEOs concerned about AI cybersecurity risks | VentureBeat
Ransomware attack hits Veolia North America | SC Media
Ransomware payment ban: Wrong idea at the wrong time • The Register
Release Cybersecurity Guidance on Chinese-Manufactured UAS for Critical Infrastructure Owners and Operators  | CISA
Secure by Design | CISA
Secure by Design Alert: How Manufacturers Can Protect Customers by Eliminating Default Passwords | CISA
Security Now! #955 – 01-02-24 – The Mystery of CVE-2023-38606
Senators want to know why the SEC’s X account wasn’t secured with MFA
Session Token Theft: The Growing Threat of Cybersecurity – Spiceworks
Shocking Revelation: Report Finds 45% of Advertised Cybersecurity Positions Are Deceptive
Strategies to Defend Against APT | IEEE Computer Society
Survey Surfaces Lack of Confidence in Existing Cybersecurity Tools – Security Boulevard
Ten Things Phishing Criminals do to Decieve You – Abadata Computer Corporation
The Best, The Worst and The Ugliest in Cybersecurity | 2023 Edition – SentinelOne
The Case for Memory Safe Roadmaps | CISA
The Crossroads of Cybersecurity and National Security: Delaying Disclosure of Incidents under the SEC’s New Cybersecurity Rule
The Crossroads of Cybersecurity and National Security: Delaying Disclosure of Incidents under the SEC’s New Cybersecurity Rule | Pillsbury Winthrop Shaw Pittman LLP – JDSupra
The dangers of quadruple blow ransomware attacks | TechRadar
The Good, the Bad and the Ugly in Cybersecurity – Week 1 – SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 2 – SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 3 – SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 4 – SentinelOne
The Imperative of Cybersecurity in the Era of AI
The Importance of Cybersecurity Insurance | Business Journal Daily
The link between stressed employees and cybersecurity risks | Cybernews
The Search for Cyber-Sanity | ISEMAG
The Three Keys to Success in Cybersecurity – Security Boulevard
The Urgent Need for Memory Safety in Software Products | CISA
Top 7 Authentication Providers for Building Apps With JWT (2022)
Top 8 ways to improve cybersecurity for your organization | CIO
Top legal firm specializing in data breaches…hit by data breach | TechRadar
TOP MILITARY, INTEL LEADERS URGE QUICK SENATE ACTION ON CYBERSECURITY LEGISLATION – Committee on Homeland Security & Governmental Affairs
Understanding root causes of material weaknesses in internal controls
Unveiling Tomorrow’s Most Likely Cybersecurity Challenges – TFOT
US CISA Must Improve Water Sector Assistance, Says Watchdog
US cybersecurity gaps exposed as water utilities targeted by hackers
US lawmakers urge SEC to fix cybersecurity after X account hack | Reuters
US SEC says breach of X account did not lead to breach of its broader systems | Reuters
Use AI in insurance — without compromising cybersecurity | Grant Thornton
View of Phishing Website Detection Using Advanced Machine Learning Techniques
VPNs and ZTNA: Out With the Old, in With the New
Water utilities hacking in Pennsylvania raises cybersecurity alarms – CSMonitor.com
What are Indicators of Compromise (IOC)? – Check Point Software
What do hackers reveal about key cybersecurity worries for 2024?
What we can learn about preventative cybersecurity from mass hacking incidents
What You Should Do When You Start in Cybersecurity Marketing
Why Cyber Resilience Matters More Than Cybersecurity | by dparente | Daniel Parente | Jan, 2024 | Medium
Why is cybersecurity essential to utilities companies? | Energy Magazine
Wigan-based technology company launches cybersecurity solution
Will Ransomware Become Extinct?