December 2023 Articles

Depth of Coverage

Of the 5000+ stories appearing during December 2023, these are the 160 looked at in depth. 11 were covered on the Breaking News page.

Updated Jan 2nd, 2024

Jaron Lanier Looks into AI’s Future | AI IRL – YouTube
10 Essential Cybersecurity Tips For Your Organization This Holiday Season | Tripwire
2023 Business Communication Risk Report | SafeGuard Cyber
2023 in Review: The State of Salesforce Cybersecurity | Salesforce Ben
5 Major Cybersecurity Trends to Know for 2024
5 pivotal cybersecurity trends for 2024 – Help Net Security
6 Predictions About Cybersecurity Challenges In 2024
60 credit unions facing outages due to ransomware attack on popular tech provider
7 Cybersecurity Stocks to Exit ASAP | InvestorPlace
75% of the Industrial Sector Experienced a Ransomware Attack in the Past Year, Claroty Study Finds
8 Biggest Small Business Cybersecurity Misconceptions – National Cybersecurity Alliance
A Look at Four Areas of Emerging Cybersecurity Risk | Marcum LLP | Accountants and Advisors
A quiet cybersecurity revolution is touching every corner of the economy as U.S., allies ‘pull all the levers’ to face new threats | Fortune
A Reference Guide for Complying with the SEC’s New Cybersecurity Reporting Requirements – O’Melveny
AI Deepfake | Concerning Rise in Usage of ‘Undress’ Apps and Websites | Cybersecurity Alerts Rise – YouTube
Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey | CSO Online
Almost half of businesses plan cyber security cuts
AlphV ransomware site is “seized” by the FBI. Then it’s “unseized.” And so on. | Ars Technica
AlphV/BlackCat allegedly calls for ransomware gang ‘cartel’ to stand up to police | IT World Canada News
Another hospital cyberattack highlights security weaknesses
Apple Shares Cybersecurity Breach Report Amid Push for Encryption – CNET
Army moving away from compliance-based cybersecurity | DefenseScoop
At a Glance: The Year in Cybersecurity 2023 – Security Boulevard
Atsign Technology for IoT Security & Simplicity — Atsign
Breaches by Iran-affiliated hackers spanned multiple U.S. states, federal agencies say – ABC News
California Privacy Protection Agency Publishes New Draft CPRA Cybersecurity and Automated Decisionmaking Regulations in Advance of December Board Meeting | WilmerHale – JDSupra
Challenging the ‘good enough’ cybersecurity mindset | Cybersecurity Dive
CISA says U.S. has a ‘failed model’ for cybersecurity detection and response | SC Media
Cisco goes all in on AI to strengthen its cybersecurity strategy | VentureBeat
Cisco unveils AI assistant for enhanced cybersecurity in Security Cloud platform – SiliconANGLE
Citrix Bleed Vulnerability Requires Urgent Action as Ransomware Groups Scale Up Attacks
Citrix Netscaler patch for critical CVE bypassed by malicious hackers | Cybersecurity Dive
Cloud security: the cybersecurity blind spot – Verdict
Combatting Rogue URL Tricks: Quickly Identify and Investigate the Latest Phishing Attacks
Comcast’s Xfinity discloses massive data breach linked to CitrixBleed vulnerability | Cybersecurity Dive
Committee advances “paradigm shift” cybersecurity bill | WWLP
CSU leads effort to study cybersecurity of supply chain
Curious about how you all deal with security vendors? : r/cybersecurity
CyberCatch Launches Innovative Solution To Enable Compliance with Secure AI Cybersecurity Controls Guidelines Jointly Issued by Agencies of United States, United Kingdom and 16 Other Nations
Cybersecurity AI Trends to Watch in 2024 – Unite.AI
Cybersecurity Asset Management is Critical for CMDB Validation — Redjack
Cybersecurity Certifications Open Doors to New Career Opportunities | Fortinet Blog
Cybersecurity for Protecting Sensitive Employee Data – iTMunch
Cybersecurity Insurance: Once Optional, Now Essential
Cybersecurity Regulation Overview
Cybersecurity: Why do websites want me to accept privacy permissions? · The Badger Herald
DARPA-Funded Research Leads to Quantum Computing Breakthrough
DoD’s New Year Resolution: A Cybersecurity Maturity Model Certification Program (CMMC) Proposed Rule – Lexology
DOJ & FBI Issue New Guidelines for Delayed Reporting of Cyber Incidents to the SEC | Faegre Drinker Biddle & Reath LLP – JDSupra
Enterprises Can’t Get Enough SASE as Spending Grows 33 Percent in 3Q 2023, According to Dell’Oro Group
Ericsson Cybersecurity Consulting – Ericsson
EU agrees on cybersecurity safeguarding regulations
Every CEO should be a cybersecurity advocate: 5 considerations to prom
FBI Offers Pathway to Request Delay of SEC Cybersecurity Incident Disclosures | Data Law Insights
FBI to Evaluate Bids to Delay Reporting Cybersecurity Events
FBI, CISA, and ASD’s ACSC Release Advisory on Play Ransomware | CISA
Financial Companies Should Update Their Cybersecurity Incident Response Plans | BizTech Magazine
First American discloses a ‘cybersecurity incident,’ a few years after its major leak
Get the AT&T Cybersecurity Insights Report: Focus on Transportation
Getting the Board on Board: Explaining Cybersecurity ROI | Tripwire
Good SIEM + SOAR solutions : r/cybersecurity
Google Android And Apple iPhone Users Need To Delete These Apps Now
Hackers predict: The biggest cybersecurity worries in 2024 – Electronic Products & TechnologyElectronic Products & Technology
Healthcare Organisations Embrace New Technologies to Fortify Cyber Defences – Express Computer
Holiday scams: How thieves can steal your money and identity through fake websites, phishing texts and emails and porch piracy – ABC7 Chicago
Home closing delayed after title company ‘cybersecurity incident’ | KXAN Austin
How 23andMe has responded, post breach
How CMMC 2.0 Differs from the Original | CMMC 1.0 vs. 2.0 | FedTech Magazine
How to assess cybersecurity for small businesses
How to Avoid and Prevent Identity Theft | Tripwire
How to Manage Cybersecurity Automation Challenges
Huge surge in malicious phishing emails attributed to AI tools like ChatGPT
ICYMI: The top scams of 2023 and how to avoid them | News |
Impact of 5G Technology on Cybersecurity | by Global Cybersecurity Association | Dec, 2023 | Medium
Implementing a Zero Trust Architecture | NCCoE
Insomniac Has Issued A Statement On That Devastating Ransomware Attack
Is Cybersecurity as a Service (CSaaS) the Answer?
Is Your Company Ready for the New SEC Cybersecurity Disclosure Requirements? Lessons Learned From the SEC Complaint Against Solarwinds and Its CISO | Advisories | Arnold & Porter
It’s December 18, 2023: Do You Know Where Your Cybersecurity Disclosure Controls and Procedures Are? | WilmerHale
Joint Cybersecurity Advisory (“CSA”) Issued Regarding IRGC-Affiliated Cyber Threats to Multiple Sectors, including U.S. Water and Wastewater Systems Facilities | Balch & Bingham LLP – JDSupra
Kansas City Hospital Ransomware Attack Consequences – Security Boulevard
Key Takeaways From 20 Biggest Cyberattacks In Recent Past
KnowBe4’s Security Masterminds Podcast Tackles Today’s Hottest Cybersecurity Issues
LockBit Remains Top Global Ransomware Threat – Infosecurity Magazine
Logical quantum processor based on reconfigurable atom arrays | Nature
Lowe’s CIO Explains Current Cybersecurity Concerns From A Retailer Perspective
Massive Cybersecurity Breach Exposes Personal Health Data Of Over One Million Michigan Residents | WGRT
Microsoft warns of Cactus ransomware actors using malvertising to infect victims
Millions of Patients Affected in Double-Extortion Attack
Navigating an AI-Enhanced Landscape of Cybersecurity in 2024: A Proactive Approach to Phishing Training in Enterprises – Security Boulevard
Navigating The Cybersecurity Landscape In 2024
Navigating The Unpredictable: The Reality Of Cyber Threats
New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices : r/cybersecurity
New Electronics – The biggest cybersecurity worries in 2024
New Rules on Cybersecurity Reporting Come Into Force Next Week | ARIA – Security Boulevard
New York hospitals face new cybersecurity rules. Will other states follow?
No estimated return to operations after First American ‘cybersecurity incident’ | News | The Title Report
No Weak Links: Think About Your Human Firewall – National Cybersecurity Alliance
Norton Healthcare: Summer cyber security breach was ransomware attack
NSA Blocked 10 Billion Connections to Malicious and Suspicious Domains – SecurityWeek
NuHarbor Security launches Zero Trust Services to support Zscaler products | Vermont Business Magazine
Ooops, your files have been encrypted! | by MATE | Dec, 2023 | Medium
Optics & Photonics News – Logical Qubits Herald Large-Scale Quantum Computing
Pentagon releases proposed rule on cybersecurity standards for contractors | DefenseScoop
Press Release: Special Report: Common Cybersecurity Weaknesses Related to the Protection of DoD Controlled Unclassified Information on Contractor Networks (DODIG-2024-031) > Department of Defense Office of Inspector General > In the Spotlight
Proposed rule would allow DOD program managers to request waivers for CMMC requirements | DefenseScoop
Protecting Controlled Unclassified Information in Nonfederal Systems
PTaas Platform and Cybersecurity Services – SecureLayer7
Ransomware Attack Impacts Roughly 60 Credit Unions
Ransomware attack impacts several Las Vegas valley hospitals | KLAS
Ransomware Attackers Abuse Multiple Windows CLFS Driver Zero-Days
Ransomware ramps up against private sector in November | TechTarget
Readout from CISA’s 2023 Fourth Quarter Cybersecurity Advisory Committee Meeting   | CISA
RFC Indicators of Compromise for IETF – NCSC.GOV.UK
Russian FSB cyber actor Star Blizzard continues worldwide… – NCSC.GOV.UK
SEC Heightens Focus on Companies Failing to Properly Disclose Cybersecurity Incidents and Risks | Akin Gump Strauss Hauer & Feld LLP
SEC’s Cybersecurity Rules – SEC Issues Guidance and DOJ Establishes Processes for the National Security or Public Safety Exception | Alston & Bird – JDSupra
Secure by Design | CISA
Securing Identities: Leveraging Zero Trust to Enhance IAM Systems | SC Media
Security Update: The Most Significant Cybersecurity Trends for ISVs
Senate votes to confirm Lt. Gen. Timothy Haugh to lead CYBERCOM and NSA/CSS > National Security Agency/Central Security Service > Press Release View
Sierra:21 – Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks
Silent but deadly: The rise of zero-click attacks
SLAM Attack Hits Intel, Arm, and AMD CPUs – Spiceworks
Sophisticated attacks, changing authentication and quantum threats — cybersecurity predictions for 2024
Special Report: Common Cybersecurity Weaknesses Related to the Protection of DoD Controlled Unclassified Information on Contractor Networks (Report No. DODIG-2024-031)
Strengthening OT Cybersecurity: European Market Perspective
Survey Surfaces Wasted Efforts Collecting Cybersecurity Data – Security Boulevard
TCS+ | KnowBe4 looks at cybersecurity trends for 2024 – YouTube
The 7 Windows Event IDs Every Cybersecurity Analyst MUST Know! | by Paritosh | Dec, 2023 | Medium
The Danger of Overreliance on Automation in Cybersecurity
The Evolution of Cybersecurity in the Age of IoT and Cloud Computing
The Good, the Bad and the Ugly in Cybersecurity – Week 49 – SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 50 – SentinelOne
The Perils of Over-Consolidation in Cybersecurity: Lessons from Tolkien’s Middle-Earth – Securonix
The Smart Home Cybersecurity Stories That Mattered This Year – CEPRO
The year in cybersecurity: 6 stories to read from 2023 | World Economic Forum
Threat modeling: the future of cybersecurity or another buzzword⎥Derek Fisher (author of The Application Security Handbook) – Security Boulevard
Top 10 Cyber Security Tools You Must Know to be a Pro
Top 16 Cyber Security tools You Must Know in 2024 – Sprinto
Top 2023 Federal Cybersecurity Trends to Follow
Top ten cybersecurity tips for organizations during the holiday season | Constangy, Brooks, Smith & Prophete, LLP – JDSupra
Trustwave SpiderLabs Uncovers Critical Cybersecurity Vulnerabilities Exposing Manufacturers to Costl | DC Velocity
Two Bald Nerds CyberSecurity Analyst Tools – YouTube
U.S. and International Partners Issue Recommendations to Secure Software Products Through Memory Safety > National Security Agency/Central Security Service > Press Release View
Unlocking Cybersecurity’s Secret Weapon: Zero Trust Security | by Leo G. | Dec, 2023 | Medium
Unveiling the power of external attack surface management | Security Magazine
US Security Testing Market to See Major Growth by 2028: Cybersecurity Framework 2.0 Enhances Application and Network Safeguards
Veeam unveils ‘radical resilience’ update for stronger enterprise data protection
Voting experts warn of ‘serious threats’ for 2024 from election equipment software breaches – WABE
Watch Cybersecurity Threats Are On The Rise In the US – Bloomberg
Web3 isn’t taking cybersecurity seriously enough – Blockworks
Webinar: Understanding Recently Adopted… | Fenwick & West LLP
WH Cybersecurity Advisor: Companies should consider the recent cyber attacks ‘a wake-up call’ – YouTube
What Is A Virtual CISO? (& When You Should Hire One)
What the SEC weighed in finalizing the cyber disclosure rules | Cybersecurity Dive
Why Cybersecurity Is A Competitive Advantage: Reaching Digital Success
Yet again, threat actors exploit a critical file-transfer service CVE | Cybersecurity Dive
Zero Trust Transforming Cybersecurity Planning and Implementing a Zero Trust Architecture |