top of page

DAILY NEWS: Agosto (13/08 - 19/08) - 33 Semana de 2023

Cyber Security and Information Security News --- Daily Updates !! Week Resume


Akamai report: LockBit, Cl0P expand ransomware efforts

Binance Bridge Hacker Hit By $30M Liquidation On Venus

Bunker Hill Community College discloses May ransomware attack

CISA Releases Cyber Defense Plan For Remote Monitoring And Management (RMM) Software

Cloudflare's Report Unveils Phishing Trends & The Most Impersonated Brands

Credit Card: Credit Card Information Compromised? Follow these precautionary steps

Estée Lauder Cos. Says Cyberattack Is Contained

Hacker Exploits Optimism-Based Decentralized Credit Market for $7,200,000 Worth of Ethereum (ETH)

Hackers use VPN provider's code certificate to sign malware

Has Your Wi-Fi Been Hacked? Here’s How to Know and How to Prevent It

Luxair customer information compromised in data breach

Malvertising Menace: Cyber Crooks Thrive in the Weakened Ad Realm

Man charged with ‘possessing documents likely to be useful to terrorists’ after PSNI data breach

Man charged with terrorism offences after Northern Ireland police data breach

Meet FraudGPT: The Dark Side Twin of ChatGPT

New Juniper Junos OS Flaws Expose Devices to Remote Attacks - Patch Now

New phishing campaign recognized in Europe and South America

Nigeria among countries with high rate of online scam activities globally – Report

Police data breach: man charged with possession of documents ‘likely to be useful to terrorists’

Six privacy and security questions and answers to clear up once and for all

Synthetic identity fraud fastest growing financial crime in U.S.

Tesla begins notifying workers who were affected by data breach

Thousands of Android Malware Apps Using Stealthy APK Compression to Evade Detection

Two more attacks involving sensitive data: a plastic surgery center in Brazil and a psychiatric hospital in Lithuania

University of Missouri warns students of potential data breach to administrative software

WoofLocker Toolkit Hides Malicious Codes in Images to Run Tech Support Scams


4 ways simulation training alleviates team burnout

5 common types of phishing and how to prevent being a victim

30% of phishing threats involve newly registered domains

A closer look at the new TSA oil and gas pipeline regulations

AC Generators Maker TD Power Systems' Website Hacked

Arrest made by detectives investigating the PSNI data breach following searches in Co Londonderry

BNB hacker loses over $53M after getting liquidated in market crash

China Blames US Intelligence Agencies for Earthquake Centre Cyber Attack

Chinese Hackers Use DLL Hijacking to Target Asian Gamblers

Cyber attack forces American cleaning products giant Clorox to switch to manual operations

Data breach at the Liquor Control Board of Ontario compromised customers' personal information

Fears for Fermanagh officers caught in PSNI data breach

Federal agencies gear up for zero trust executive order deadline

Flashpoint report shows Australia among ‘most targeted countries’ for ransomware attacks in July

Google Chrome's New Feature Alerts Users About Auto-Removal of Malicious Extensions

Hacker group attacks Japan nuclear websites over Fukushima water plan

Haggling With Hackers: Surprising Lessons From 50 Negotiations With Ransomware Gangs

Health care industry hit hardest by data breaches, CT data shows

Indies ‘in standstill’ after cyber attack hits IT supplier

John Taylor High School shares pupils' exam results in data breach

Key Takeaways From Verizon’s 2023 Data Breach Investigation

LockBit’s persistence in Australia and the region is a wake-up call for least privilege

Man arrested under Terrorism Act in connection with PSNI data breach

Massive phishing campaign targets Zimbra users

More potential victims of data breach notified

Morris Hospital attack impacts 250k individuals, medical data exposed

Multi-nation operation nabs cybercriminals behind $40M loss

New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools

New Wave of Attack Campaign Targeting Zimbra Email Users for Credential Theft

NHS Tayside staff ‘raging’ after personal details shared in data breach

Northern Irish police make another arrest after data breach

Not even a quantum computer should be able to crack new Google keys

Optimum Health Solutions hit by cyber breach

Orrick Law Firm’s Security Mishap Leads to Healthcare Data Breach Lawsuit

Proxyjacking and Cryptomining Campaign Targets GitLab

PSNI arrests 39-year-old following a significant breach that leaked sensitive police records

PSNI data breach: Further arrest made after search in Dungiven

PwC data breach compromised the data of 82k Banco Popular de Puerto Rico customers

Ransomware 2023: 1,500 Victims Already Claimed in H1

Ransomware attack on Cleveland City Schools prompts investigation

Reinventing OT security for dynamic landscapes

Safeguards must be high enough to stave off cyber attacks

ShopBack fined $74,400 over data leak that affected more than 1.4 million users

Siemens Healthineers responds to alleged data theft by LockBit ransomware gang

The Role of AI in Cybersecurity: Current Limitations and Future Possibilities

The Vulnerability of Zero Trust: Lessons from the Storm 0558 Hack

Zimbra users in Europe, Latin America face phishing threat

Why it’s Time to Kick the Password Habit


6 best practices to defend against corporate account takeover attacks

300 independent retailers affected by cyber attack

Alarming lack of cybersecurity practices on world’s most popular websites

AnonFiles Shuts Down After Massive User Abuse

Banks defending their right to security are missing the point about consumer trust

Bitdefender Completes Acquisition of Horangi Cyber Security

Bitdefender snaps up Singapore-based Horangi Cyber Security

British Army Struggling to Recruit Cybersecurity Experts

BSidesTLV 2023 – Shaked Klein Orbach & Arik Nachmias – Sealing The Leaks

CentroMed data breach affected 350,000 people, San Antonio health care provider tells state AG

China-Linked Bronze Starlight Group Targeting Gambling Sector with Cobalt Strike Beacons

CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks

CISA Launches Joint Initiative to Secure RMM Software

CISA posts remote monitoring & management systems cyber defense plan

CISA Unveils Plan to Slow the Hacker Abuse of RMM Tools

CISA Urges Patching of Actively Exploited Citrix Bug

Cisco Duo Device Health App Flaw Allows Directory Traversal Attacks

Citrix ShareFile vulnerability actively exploited (CVE-2023-24489)

Cleaning Products manufacturer Clorox Company took some systems offline after a cyberattack

Critical Flaws in PowerShell Gallery Enable Malicious Exploits

Cyber attack on Prince George's County Public Schools compromised 4,500 staff accounts

Cyber security researchers become target of criminal hackers

CyberEPQ grades reflect a positive first year for new cybersecurity qualification

Cynomi Report Reveals Number of MSPs Providing Virtual CISO Services Will Grow Fivefold By Next Year

Data breach by Norfolk and Suffolk police 'shouldn't have happened' Hack Was Due to a Flaw in the Website’s Code

DSCI and SISA launched ‘Cyber for YOUth’ – a Cyber Security Awareness Program in Schools for a Secure Digital Future

Experts devise an exploit for Apple iOS 16 that relies on fake Airplane Mode

Findlargedir: Find all “blackhole” directories with a huge amount of filesystem entries

Funding awarded to help small businesses improve cyber security

Google Fixes 26 Bugs Amid Fake Update Warning

Google paves way for FIDO2 security keys that can resist quantum computer attacks

Gozi strikes again, targeting banks, cryptocurrency and more

Heavy workloads driving IT professionals to resign

Hospital officials warn of possible data breach at Jefferson Health in Cherry Hill

How CIEM Offers a Clear Path to Cloud Security

How poor cybersecurity policies disrupt business continuity

How to Mitigate the Damage Caused by Deepfake Technology

IBM Security Guardium Flaw Let Attacker to Execute Arbitrary Commands

In Northern Ireland, even a data breach can be deadly – and the ripple effects could be disastrous

Industry partnership wins National Cyber Security Centre public service awards

Ivanti Avalanche Flaw Let Attackers Execute Remote Code

Jefferson Health warns 4,100 patients of possible data breach at Cherry Hill hospital

Kubernetes clusters face widespread attacks across numerous organizations

Latin Americans Fall Prey to More Online Scams, Cyber Attacks

Missouri grappling with effects of data breach of medical records, student info

MOVEit Breach Notifications Continue to Roll In, Impacting Health Data

New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode

New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities

New Phishing Attack Exploits Cloudflare R2 Hosting Service to Steal Cloud Passwords

New technology centre in Cumbria paves way for pioneering cyber security cluster

NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security

Phishers use QR codes to target companies in various industries

Phishing campaign exploiting QR codes targets a major US energy company

Phishing campaign steals accounts for Zimbra email servers worlwide

Phishing Spree Targets Zimbra Collaboration Account Holders

PSNI data breach: Man released after arrest

Radius Global Solutions said MOVEit Transfer exploitation compromised the data of 600k individuals

Ransomware attack on Rapattoni disrupts real estate listings in the US

Ransomware Surges With 1500 Confirmed Victims This Year

Researchers Observe 59% Spike in Medical Device Security Vulnerabilities

Risk-Based Authentication in the Modern Digital Landscape

Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks

SecurityGen Study Uncovers Risk of GTP-Based Cyber-Attacks on 5G Mobile Networks

Segurança da informação tem salário de R$ 38 mil, mas não encontra profissionais; veja como entrar

The 8 most common anti-phishing solutions for your business to utilize

The Cost of a Data Breach Reaches an All-Time High

The great Flipper Zero shortage of 2023 has finally come to end

The Next Step in the IMDSv1 Redemption Journey

The road ahead for ecommerce fraud prevention

The Temple Terrace Fire Department (Fla. FD's ambulance) billing hit by data breach

The Zero Trust Clock is Ticking: Are Your SecOps Teams Ready?

Thousands of Android APKs use compression trick to thwart analysis

Top marks for graduates of CIISec vocational cyber course

Triple Extortion Ransomware and the Cybercrime Supply Chain

U.S. role in Wuhan cyberattack drives global cybersecurity imperative

Veteran-Owned Cybersecurity Company Empowers Businesses Against Rising Cyber Crime Threats

What Is Blagging in Cybersecurity?

White House tells federal agencies to bolster cybersecurity in memo

Why Technology, Not More Legislation, Is The Answer For Cybersecurity

Why You Need Continuous Network Monitoring?

Why you should be revamping your cybersecurity strategy – now

Windows Task Manager refresh can be paused using CTRL key


3 strategies that can help stop ransomware before it becomes a crisis

10 Biggest Crypto Heists of All Time – How Much Money Was Stolen?

10 Ways to Keep Your Passwords Safe from Hackers

15,000 cyberattacks detected per second in Taiwan: Software provider

A Third of UK University Students Targeted By Fraud

Aeroplan numbers, personal information leaked in LCBO data breach

Aon Survey Reveals Major Cyber Incidents

Bangladesh's NID server shut for 38 hours for hacking threat

Barracuda Networks Ransomware Report Surfaces Attack Surge

BBC's MasterChef Pookie has Instagram hacked at 60k followers and held for ransom

Beware the Emergence of Shadow AI

British Columbia businesses all just one click away from being hacked

Businesses all just one click away from being hacked

CertiK drops findings on alleged scammer who stole $1M in crypto

ChatGPT’s badboy brothers for sale on dark web

Clorox Operations Disrupted By Cyber-Attack

Concerns of Sensitive Data Leak Following Cyber Attack on Israeli Hospital

Connecticut school district lost more than $6 million in cyber attack, so far gotten about half back

Cost of a data breach 2023: Healthcare industry impacts

Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations

Crowd2Fund phishing scam: Hackers had access for less than one hour

Cyber threat risks reach three-year high – Avast

Cyberattacks Are On The Up: What Are The Risks & Remedies For Aviation?

Digital Safety Advice is Not Getting Through to Women suffers data breach, goes offline

Experts Uncover Weaknesses in PowerShell Gallery Enabling Supply Chain Attacks

Four in 10 UK adults targeted by scammers

Gigabud RAT Attacking Android Users to Steal Banking Credentials

Google Eyes Quantum with New Security Key Implementation

Google Introduces First Quantum Resilient FIDO2 Security Key Implementation

Hacker Creates Memecoin Using Funds Stolen From Base Network DEX

Here’s what you need to do after your personal data is breached

How AI has increased risk of businesses falling victim to cyber attacks

How CISOs break down complex security challenges

How Google Workspace-based Organizations can leverage Chrome to improve Security

How MSSPs can leverage dark web intelligence to counter emerging threats

How to Protect Your Cryptocurrency with a Cold Wallet

How to Stay Safe on Threads: 6 Tips

If You Have These 6 Personality Traits, You're More Vulnerable to Phishing Scams

Iran and the Rise of Cyber-Enabled Influence Operations

Is it Time for a Cybersecurity Rethink?

Ivanti Avalanche vulnerable to attack by unauthenticated, remote attackers (CVE-2023-32560)

Jefferson Cherry Hill warns of possible data breach. What info may have been exposed?

Latin Americans fall prey to more online scams as cybersecurity lags

LinkedIn accounts hacked in global campaign

LinkedIn users targeted in account hijacking campaign

Major LinkedIn Account Takeover Campaign Underway

Major U.S. energy org targeted in QR code phishing attack

Man arrested in Co Armagh in relation to PSNI's data breach

Mass-Exploitation Campaign Targets Citrix NetScalers With Backdoors

Massachusetts health officials warn of data breach involving more than 134K people

Massive 400,000 proxy botnet built with stealthy malware infections

Monti ransomware targets legal and gov’t entities with new Linux-based variant

National Cyber Security Centre (NCSC) expands Cyber Incident Response service more widely

Nearly 2,000 Citrix NetScaler Instances Hacked via Critical Vulnerability

New Database of Maritime Cyber Incidents Aims to Improve Awareness and Response

Norfolk and Suffolk police admit to data breach impacting 1,230 people

Orrick Law Firm Under Fire Over Client Data Breach

Over 100,000 Hackers Have Details Exposed By Malware

Over half of health and social care businesses hit by cyber attacks

Passwordless is more than a buzzword among cybersecurity pros

Phishing for personal data a threat to everyone's security

Progressive class action claims data breach allegedly affects 347,100 customers

PSNI data breach: Man arrested and released after searches in Lurgan

Ransomware down 57%, Secureworks warns against complacency

Ransomware groups attack victims with similar patterns

(Re)check your patched NetScaler ADC and Gateway appliances for signs of compromise

Report finds exposed sensitive data in more than 30% of cloud assets

Scammers Exploit Hacked Websites For Phishing

Seven ways you can step-up your cybersecurity

Sixteen-year-old among five arrested for HK$300,000 phishing scams

Stimulus Scam: Do Not Open IRS Emails About a Third Round of Checks

The Dallas ransomware attack exposed private data for thousands of people. Now what?

The “Made by Apes” Data Breach: A Closer Look

The New Frontline of Geopolitics | Understanding the Rise of State-Sponsored Cyber Attacks

The Risk of Accidental Data Exposure by Generative AI is Growing

Think twice before accepting notifications on Chrome: threats on the rise

This subscription malware can steal your private data from 60+ popular apps — how to avoid it

Three reasons why your smartphone needs security protection

University of Missouri (UM) System employee, student personal information impacted in global data breach

Users of cybercrime forums often fall victim to info-stealers, researchers find

Victims charity calls for changes after police data breach

Web app warning: 74% of apps with PII are vulnerable to a ‘major exploit’, report

Wellington City Council unable to contact those worst-affected by privacy breach

What's the State of Credential theft in 2023?

Why Device Microsegmentation is Important for OT and IT


1.5 Million Impacted by Ransomware Attack at Canadian Dental Service

10 Unexpected Ways Your Android Phone Could Be Hacked

19 Common Cyberthreats To Retailers (And How To Defend Against Them)

67% of government agencies claim confidence in adopting zero trust

42,000 Vermonters Affected by MOVEit Data Breach

100,000 Hacker Credentials Exposed From Info-stealer Malware

A ‘Cyber Pearl Harbor’ is a myth—daily cyberattacks are the real problem

AI a Top Risk and the Preferred Solution to Financial Crime

AI can steal passwords with 95% accuracy by ‘listening’ to keystrokes, alarming study finds

Almost 2,000 Citrix NetScaler servers backdoored in hacking campaign

Another US Congressman reveals emails hacked by China

China email hacks included accounts of House member

City of Dallas data breach affects 26K Texans

Clorox takes servers offline, notifies law enforcement after ‘unauthorized activity’

Crime victims’ data accidentally released by two police forces

Cryptography Attacks: 6 Types And Prevention Measures

Cummins Behavioral Health Systems, Inc. Announces Data Breach Following Ransomware Attack

Cyber attacks: a real security threat

Cybercriminals Abusing Cloudflare R2 for Hosting Phishing Pages, Experts Warn Halts All Operations After Massive Data Breach

Email phishing still the main way in for hackers: report

FBI: Mobile Beta-Testing Apps Are Major Security Risk

FBI just issued warning over new hacker scam — don’t fall for this

Gigabud RAT Android Banking Malware Targets Institutions Across Countries

Global IoT Trust Survey Reveals Security Concerns

Golpes online atingem 'níveis recordes' na América Latina com falta de segurança digital

“Grab hold and give it a wiggle” – ATM card skimming is still a thing

Here Are All The Ways Your Credit Card Info Can Get Stolen

Hospital Mergers Double the Risk of a Data Breach, Study Shows

How the fledgling INC ransomware gang struck one victim

How to 'avoid the full-blown catastrophe' of a cyberattack

Information Commissioner’s Office (ICO) publicly reprimands small firm targeted by phishing attack

Malware Unleashed: Public Sector Hit in Sudden Surge, Reveals New Report

Massive Colorado Department of Higher Education (CDHE) data breach faces scrutiny and questions about data policies

Monti Ransomware Returns with New Linux Variant and Enhanced Evasion Tactics

Multiple Flaws Found in ScrutisWeb Software Exposes ATMs to Remote Hacking

Navigating the HUB International Data Breach

New CVE-2023-3519 scanner detects hacked Citrix ADC, Gateway devices

New QwixxRAT Trojan Spreads Through Messaging Apps

Norfolk and Suffolk Police data breach: Data of victims and witnesses included in FOI responses

Norfolk and Suffolk police hit by FoI-linked data breach

North Korean Hackers Suspected in New Wave of Malicious npm Packages

‘Old School RuneScape’ accounts hijacked to transfer them to hackers

Over 100,000 Users of Hacking Forums Infected With Malware

Over 120,000 Computers Compromised by Info Stealers Linked to Users of Cybercrime Forums

PDF lures aimed at NATO countries contain a Russian clue

Phishing Scammers Use WordPress, Abandoned Sites to Host Malicious Pages

Phishing the Most Dominant and Fastest Growing Internet Crime of 2023

PSNI: Leaked Data Will be Used to Target Police Officers

PwC breach spills into Banco Popular de Puerto Rico

Raccoon Stealer malware returns with new stealthier version

Ransomware Hit Disrupts Real Estate Property Listings in US

Ransomware: To pay or not to pay

Russian hackers trying to bring down Starlink

Safeguarding critical infrastructure from cyber extortion

Suburban DC school district responds to cyberattack

The Future of Cybersecurity: AI and Semiconductor Integration in Hardware

The Growing Threat of Cyber Attacks on Global Healthcare Systems

Tift Regional Health System, Inc. Notifies 187k of Data Breach Following Cyberattack

UAE warns residents against online shopping fraud, shares tips to stay safe

UK Police Data Breach Exposes Victim Information

UK police data breach exposes victim information

UK Voter Data Breach Leaked the Personal Information of 40 Million Individuals

Understanding and Preventing Bitcoin-Related Hacks on Instagram

Unearthed LockBit secrets suggest gang is faltering in bid to corner ransomware market

US lawmaker informed of email breach tied to Microsoft cloud hack

Zero-Trust in the Cloud is Hard. Here’s How to Do it Right

Why Service Mapping is Critical for Microservices Security


29% of SMBs admit to tossing IT hardware into landfills

Alberta Dental Service Corporation data breach impacts 1.5 million customers

Alberta Dental Services Security Breach Exposes 1.47M Records

Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks

APTs use of lesser-known TTPs are no less of a headache

Authorities Take Down Lolek Bulletproof Hosting Provider

Belt Railway Company of Chicago investigates data theft by Akira ransomware gang

Building a secure future without traditional passwords

Charming Kitten Targets Iranian Dissidents with Advanced Cyber Attacks

China identifies the culprits behind cyberattack on Wuhan Earthquake Monitoring Center; a secretive US global reconnaissance system to be exposed

China to disclose secret US ‘global reconnaissance system,’ claims official

China would consider attacks on US railroads, pipelines if it invades Taiwan, Easterly says

CISA expects upcoming industry rules to show ‘scope and scale’ of ransomware problem

Cloud Security Made Simple: A Beginner's Guide for Business Owners

Colorado HCPF breached via IBM attack, clinical data stolen

Colorado students' records exposed after massive data breach

Colorado warns 4 million of data stolen in IBM MOVEit breach

Complexity of APIs Make Them Harder to Secure

Connecticut School District Has Recouped Half of $6 Million Lost in Cyber Attack

Cumbria Police data breach: Staff names and salaries leaked online by error

Data center flaws spurred disruptions, espionage and malware attacks

Deception technology and breach anticipation strategies Admits Data Breach: Info of 760K Users Sold Online confirms breach after hacker steals data of 760K users

Ernst & Young says MOVEit Transfer hack impacted over 30,000 Bank of America customers

Fake Chrome Browser Update Installs NetSupport Manager RAT

FBI warns of increasing cryptocurrency recovery scams

Health plan provider PH TECH joins MOVEit victim list, 1.7 million exposed

How manufacturers can navigate cybersecurity regulations amid NIST 2.0

How to Ensure Cyber Resilience Across the Supply Chain

How to Help Manage the Risks of Generative AI in the Enterprise

How to make your instant messages ‘unhackable’

Identity Threat Detection and Response: Rips in Your Identity Fabric

India Passes New Digital Personal Data Protection Bill (DPDPB), Putting Users' Privacy First

Intel insiders go undercover revealing fresh details into NoName hacktivist operations

LetMeSpy Android Spyware app permanently shuts down after data breach

macOS Ventura Background Task Flaws Can Be Exploited for Malware

Macs are getting compromised to act as proxy exit nodes

Major vulnerabilities discovered in data center solutions

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives

Microsoft: Critical CODESYS Flaws Could Shut Down Power Plants

Microsoft reveals severe vulnerabilities in CODESYS industrial automation software

Monti ransomware targets VMware ESXi servers with new Linux locker

Monti Ransomware Unleashes a New Encryptor for Linux

Most DDoS attacks tied to gaming, business disputes, FBI and prosecutors say

Navigating generative AI risks and regulatory challenges

New Financial Malware 'JanelaRAT' Targets Latin American Users

New York Life data exposed in third-party breach

Ongoing Xurum Attacks on E-commerce Sites Exploiting Critical Magento 2 Vulnerability

Over 100K hacking forums accounts exposed by info-stealing malware

PBI data breach impacted more than 1.2m customers of Wilton Reassurance Life Company

PSNI data breach: Details of NI police in hands of dissident republicans

QwixxRAT: New Remote Access Trojan Emerges via Telegram and Discord

Ransomware groups shift focus to return-on-investment targeting critical industries: Akamai Research

Researchers discover vulnerabilities in Moovit software allowing free subway rides

Security Researchers Publish Gigabud Banking Malware Analysis

Several Flaws Found in CyberPower and Dataprobe Products

Sophos Uncovers New Connections Between Hive, Royal, and Black Basta Ransomware

Power supplier in a Southern African country hit by DroxiDat malware

Strengthening Your Business’ Cybersecurity: Effective Strategies and Tips

Tackling Cyber Threats Head-On: Evaluating the Effectiveness of Global Enterprise Cyber Security Solutions

Threat actors use beta apps to bypass mobile app store security

Zunami Protocol lost $2.1 million to cyber attack

Who do cybersecurity laws actually protect?

Why spyware attacks are increasing in Kenya

Why the public sector still loves Capita (even though it got hacked)


AI-powered chatbots present both risk and hope

Beware of these 4 phishing phrases! They are dangerous, handle with care

Check Point Software Technologies Acquires Israeli Cybersecurity Startup Perimeter 81 for $490 Million

China closes record 36K personal data breach cases in 3 yrs

Cyber Security Act will not stop criminalising freedom of expression

Data usage and ground-rules: Inside India's new Digital Personal Data Protection framework

Hackers usam matemática para enganar inteligência artificial, que passa a repetir que 9 + 10 = 21

How businesses and governments can work together to stop cyberattacks before they start

MaginotDNS attacks exploit weak checks for DNS cache poisoning

MENA ISC 2023 to spotlight predictive cybersecurity

Navigating the Complex Landscape of Cybersecurity in Asia Pacific: The Role of MDR

PSNI Chief Constable 'deeply sorry' over data breach as worst-case scenario outlined to Policing Board

PSNI data breach: Civilian worker 'no longer feels safe in home'

Real estate industry grapples with cyberattack on Rapattoni

Rubrik Acquires Israeli Cybersecurity Startup Laminar for Up to $250 Million

Russian and Chinese cyber attacks on the Foreign Office risked national security, ex-GCHQ boss warns

Strengthening Cybersecurity: The Growing Demand for DDoS Protection in Greater China’s Internet Landscape

The Significance of Cybersecurity Automation for Startups

Third-Party Data Breach at Bellevue College Raises Account Security and Data Privacy Concerns for Students and Faculty

Urgent warning as hackers put thousands of students’ details on dark web

US Launches AI Competition to Protect Computer Systems

DAILY NEWS: Agosto (06/08 - 12/08) - 32 Semana de 2023

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.


Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page