top of page

DAILY NEWS: Agosto (20/08 - 26/08) - 34 Semana de 2023

Cyber Security and Information Security News --- Daily Updates !! Week Resume


96% of Companies Are Using AI to Fight AI Based Cyber Threat Emails

Advanced persistent threats and their impact on cybersecurity

Answers sought on apparent SA defence ICT ransomware attack

Connecticut Hospitals Targeted in Ransomware Attack: Stolen Data Being Sold

Cyber hacks lurking near EV chargers

Data Breach Gives Byju’s Another Knock

Derby City Council urges vigilance after data breach

Discord starts notifying users affected by March data breach

Every 11 minutes there is a cyber attack in the financial or healthcare sector worldwide

Fortinet observes dip in ransomware detection within organizations

Halston Media Recently Fell Prey to Cyber Theft

Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack

LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants

Massive Data Breach Exposes Personal Details of 100 Million Job Seekers in France

New Revelation in Connecticut Hospital Ransomware Attack

Portugal "não fez absolutamente nada para tentar o regresso" do jovem hacker português que arrisca 52 anos de prisão nos EUA

Ransom gang claims attack on Prince George County school district

Safeguarding power systems: The Importance of cybersecurity in deregulated electricity markets

Understanding Phishing Attacks: How to Spot and Defend Against

What is the Average Cost of a Data Breach in Latin America?


3 things you need to know about spear phishing

5 Huge Problems With Not Having Company Data Backed Up

A Beginner’s Guide to Adversary Emulation with Caldera

Advocate Aurora Health to Pay $12.25 Million Settlement for Data Breach Class Action

AI and supply chain visibility key to mitigating OT security threats

Artificial Intelligence In Cybersecurity: Unlocking Benefits And Confronting Challenges

Asia Pacific Businesses Do Not Believe They Are Fully Prepared as Cybersecurity Incidents Continue to Rise

Baghdad Shuts Down Electronic Billboards After Hacker Uses One To Show ‘Pornographic Film’

Bankrupt crypto platforms FTX and BlockFi warn customers of data breach

Becoming unstoppable against ransomware

Beyond Cold Calls: Ringless Voicemail As A Personalized Customer Engagement Tool

Brave New World: Understanding India's Digital Personal Data Protection Act, 2023

BSides Cheltenham 2023 – Welcome And Announcements By BSides Cheltenham Orga

Building cyber resilience in an age of AI

Building Resilience through Cooperation for Cybersecurity and Climate Change at SOUTHDEC 2023

Catastrophic data breach means a watershed looms for Northern Irish policing

ChatGPT Data Policy: A Look at Security Enhancements by OpenAI To Protect User Data

China-linked Flax Typhoon APT targets Taiwan

China-Linked Flax Typhoon Cyber Espionage Targets Taiwan's Key Sectors

Clop passa a liderar ‘mercado’ de ransomware após hack ao MOVEit

CoC Asks SEC for More Time to Implement Cyber Reporting Rule

Council hit by suspected ransomware attack

Creative QakBot Attack Tactics Challenge Security Defenses

Cyber attack forced Belgium's Public Centre for Social Action to take computer systems offline

Cyber Security Summit Brasil 2023 anuncia tema e primeiros palestrantes confirmados em sua sétima edição

Cybercriminals’ new target: Your medical records

Cybersecurity insurance is missing the risk

Data breach at French govt agency exposes info of 10 million people

Data of 300K+ Standard Insurance customers exposed in MOVEit-related NTT DATA attack

Data Protection: One of These Incidents Is Not Like the Other

Defending the Virtual Kingdom: Exploring Modern Cybersecurity Landscapes

Elevating Data Security: Key Considerations When Transferring Your Digital Workspace

Evolving Cybersecurity: Embrace an Infinite Defense Strategy

Falha no software Cisco NX-OS permite ataque DoS

FBI: Barracuda Appliances Still Being Exploited By China

FBI: Patches for Barracuda ESG Zero-Day CVE-2023-2868 are ineffective

FBI warns of new ransomware and sextortion threats targeting medical facilities and young men in Nevada

Flax Typhoon Group Abusing Built-in Operating System Tools to Deploy Malware

French national employment agency Pôle Emploi faces cyberattack impacting millions

Generative AI biggest weapon and tool for cybersecurity

Gmail Adds Extra Checks, Thwarting Sneaky Hackers

Google Workspace: New account security, DLP capabilities announced

GTA 6 leaker Arion Kurtaj: Everything found by the UK court about the 18-year old hacker

GTA 6 New Leaks Flood the Internet, Teenage Hacker Who Hacked Rockstar Games, Also Exposed Nvidia and Uber

Hacks ao setor da saúde incidem mais sobre registros de pacientes

Health hackers: why are medical device and patient platforms cybercrime hotbeds?

How AI can improve cybersecurity by harnessing diversity, according to Microsoft Security's Vasu Jakkal

How to setup wazuh as your SIEM with Debian & proxmox

ICO calls social media firms to protect people's data from scraping

IEEE 802.11az provides security enhancements, solves longstanding problems

Illinois Department of Public Health announces major breach that impacted 126k individuals

Just three malware loaders used in 80% of attacks

Kroll data breach exposes info of FTX, BlockFi, Genesis creditors

Lazarus Group Exploiting ManageEngine Flaw to Deploy MagicRAT Malware

Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure

Lazarus Group Targets Internet Infrastructure and Healthcare with 'QuiteRAT' Malware

Lazarus invade ManageEngine para hackear provedor de internet

Leaseweb is restoring ‘critical’ systems after security breach

LendInvest Flags Customer Data Breach

Making It Personal: SEC Issues Wells Notices Against SolarWinds’ CFO and CISO

Making Sense of Ransomware Attack Statistics in 2023

Metro Bank Warns Against Rising Malware Attacks

Micro-Segmentation: A Key Element Of Zero-Trust Planning

Microsoft acusa hackers na China de ataques cibernéticos ao governo de Taiwan

Microsoft: Stealthy Flax Typhoon hackers use LOLBins to evade detection

MSI: Recent wave of Windows blue screens linked to MSI motherboards

Multi-hospital ransom attack in US claimed by Rhysida gang

Navigating Legacy Infrastructure: A CISO's Actionable Strategy for Success

Navigating The Global Data Privacy Landscape What Multinational Corporations Should Consider When Doing Business

Nearly 1,000 Organizations, 60 Million Individuals Impacted by MOVEit Hack

Neurodata, Neurotechnology and Data Protection in the UK

Not right to keep blaming employees

Online Banking Security: How to Safeguard Your Online Banking Data

Paving a Path to Security by Design Across the Industry

Prime Minister Pham Minh Chinh stresses technological self-reliance to ensure cyber security

Privacy Regulator Warns of Surge in “Text Pest” Cases

Proposed UN Cybercrime Treaty Threatens to be an Expansive Global Surveillance Pact

Ransomware Attack Key Factor in H1 Operating Losses of $102.6 Million for Point32 Health

Ransomware dwell time hits new low

Researchers Discover Reply URL Takeover Issue in Azure

Roblox developers targeted with malware

Rotherham Council apologises for plans meeting data error

SASE Integration Amid the Evolving Cybersecurity Landscape

Seven States Have Upcoming Privacy Laws

Shifting Cybersecurity: The Impact and Implications of LLMs

Singing River Health System took systems offline to deal with a cyber attack

Six steps for preparing a manufacturing organization for a ransomware attack

Snow Software Survey Identifies SaaS Management Struggles

South African website subjected to cyber attack from India for publishing truth about Modi’s reception

Spain to Launch Europe's First AI Regulatory Agency

Telegram hacker sentenced to 20 years in Brazil

The Pareto data breach: What has actually been published and why data retention is such an issue

The Third-Party Realm: Where the Risk Is

Thousands have SSNs leaked after ransomware attack on Ohio state archive org

Top cybersecurity M&A deals for 2023

Trojanized Advertisements: Russian Hackers' New Move

Twelve nations urge social media giants to tackle illegal data scraping

Two LAPSUS$ Hackers Convicted in London Court for High-Profile Tech Firm Hacks

Unrealistic expectations exacerbate the cybersecurity talent shortage

Urgent FBI Warning: Barracuda Email Gateways Vulnerable Despite Recent Patches

Versa Networks Adds Generative AI to SASE Platform

XLoader Malware Variant Targets MacOS Disguised as OfficeNote App

XWorm Malware Attacks Windows To Take RDP Control and Drop Ransomware

What is the Geek Squad scam?

What the SEC’s Investigation of SolarWinds Means for CISOs and Cybersecurity Disclosures

Whiffy Recon malware triangulates the position of infected systems via Wi-Fi

Why DevOps Engineers are the Superheroes of the Tech World

WinRAR users update your software as 0-day vulnerability is found


91% of security pros say cybercriminals are using AI in email attacks

A simple idea that could make Android more secure

AI and the evolution of surveillance systems

Attack Dwell Times Fall but Threat Actors Are Moving Faster

AWS unveils local cloud zones for exclusive customer use

Bitwarden launches E2EE Secrets Manager

Christie’s website bug exposed collectors’ locations

Cloud hosting firms hit by devastating ransomware attack

CloudNordic Faces Severe Data Loss After Ransomware Attack

Critical Insight Reports Fewer Cybersecurity Breaches in Health Care, Yet Victim Numbers Are Up in 2023

Danish Hosting Firms Lose All Customer Data in Ransomware Attack

Data of 2.6 Million Duolingo Users Leaked on Hacking Forum

Does a secure coding training platform really work?

English council warns residents after suspected ransomware attack

Exploit released for Ivanti Sentry bug abused as zero-day in attacks

FBI Flags $40M Crypto Cash-Out Plot By North Korean Hackers

FBI warns of patched Barracuda ESG appliances still being hacked

Flax Typhoon using legitimate software to quietly access Taiwanese organizations

Fraudsters can bypass biometric facial recognition

Hackers use public ManageEngine exploit to breach internet org

How digital identity protects connected cars

ImmuniWeb releases Mobile Neuron to scan for OWASP Mobile Top 10 vulnerabilities, iOS/Android weaknesses

Jupiter X Core WordPress plugin could let hackers hijack sites

Kali Linux 2023.3 released: Kali NetHunter app redesign, 9 new tools, and more!

Lack of visibility into cloud access policies leaves enterprises flying blind

Last call for mWISE, the security conference for frontline practitioners.

Lazarus Group Exploits Critical Zoho ManageEngine Flaw to Deploy Stealthy QuiteRAT Malware

Malicious web application transactions increased by 500% in 2023

New Study Sheds Light on Adhubllka Ransomware Network

New Telegram Bot "Telekopye" Powering Large-scale Phishing Scams from Russia

New "Whiffy Recon" Malware Triangulates Infected Device Location via Wi-Fi Every Minute

New Whiffy Recon malware uses WiFi to triangulate your location

New Windows updates cause UNSUPPORTED_PROCESSOR blue screens

NIST begins rollout of quantum-proof algorithms

NIST Publishes Draft Post-Quantum Cryptography Standards

NIST publishes draft post-quantum cryptography standards, calls for industry feedback

Privacy regulators tell social media companies to fear the scrapers

Ransomware ecosystem targeting individuals, small firms remains robust

Ransomware hackers dwell time drops to 5 days, RDP still widely used

Russian Hackers Employ Telekopye Toolkit in Broad Phishing Attacks

Sensitive Data of 10 Million at Risk After French Employment Agency Breach

Sextortion Scams Surge 178% in a Year

Site da Prefeitura de Dourados sofre ataque hacker considerado superficial

Smoke Loader Botnet Drops Location Tracker Whiffy Recon Malware

Social Security Numbers were exposed in 69% of breaches in 2023

South Yorkshire Police lost data includes body worn footage, 69 cases affected

Specialized third-party solutions prove effective against malicious bots, ATO attacks, script risks

St Helens Council Warns of Phishing After Ransomware Breach

Teens Found Responsible For Lapsus$ Cyber-Attacks

The Hidden Dangers of Public Wi-Fi

Thousands of Unpatched Openfire XMPP Servers Still Exposed to High-Severity Flaw

TMX crisis lender data breach exposes 5M people

Tornado Cash Founders Charged in Billion-Dollar Crypto Laundering Scandal

Trulioo enhances identity verification with “person match” intelligent routing

UK court finds teenagers guilty of carrying out LAPSUS$ hacking spree

Webinar: The external attack surface & AI’s role in proactive security

WinRAR Security Flaw Exploited in Zero-Day Attacks to Target Traders


Agile Approach to Mass Cloud Credential Harvesting and Crypto Mining Sprints Ahead

Anticipating the next wave of IoT cybersecurity challenges

Artificial Intelligence and USBs Drive 8% Rise in Cyber-Attacks

Attackers exploited WinRAR zero-day for months to steal money from brokers (CVE-2023-38831)

Banco Central comunica novo vazamento de dados de chaves Pix

Banco Central registra vazamento de dados de 238 chaves Pix

Barracuda Networks Report Details Benefits of Cybersecurity AI

BC informa vazamento de dados pessoais vinculados a 238 chaves Pix

Bogus OfficeNote app delivers XLoader macOS malware

Brasil sofreu 603 mil ataques de ransomware nos últimos 12 meses

Brazil’s Top Escort Service Exposes Millions of Escort and Client Data

BSidesTLV 2023 – Ariel Szarf, Doron Karmi – Google Workspace Forensics — Insights From Real-World Hunts & IR

BSidesTLV 2023 – Ido Veltzman – (Lady|)Lord Of The Ring

Carderbee APT targets Hong Kong orgs via supply chain attacks

Chave Pix: Banco Central comunica vazamento de dados

Container security probes provide continuous penetration testing

CVE-2023-35150: Arbitrary Code Injection in XWiki

Cybercriminals turn to AI to bypass modern email security measures

Cybersecurity Startup That Protects Software App Data Raises $41M

Cybersecurity's Crucial Role Amidst Escalating Financial Crime Risks

Discord starts notifying users affected by March data breach

Dope Security wants to help CISOs get a handle on shadow IT

Doubling of Identity Theft Victims With Suicidal Thoughts

Enterprises Eyeing More Proactive Cybersecurity Strategies, Survey Finds

Experian Pays $650,000 to Settle Spam Claims

Falha Zero Day no WinRAR permitiu ataque de hackers por quatro meses

FBI identifies wallets holding cryptocurrency funds stolen by North Korea

FBI: Lazarus hackers readying to cash out $41 million in stolen crypto

Fi: Helsinki and Uusimaa Hospital District confirms data breach by ex-staff member, 900 patients’ data compromised

Generative AI fueling significant rise in cyberattacks

Google introduces 11 new security features for Workspace (some AI-powered)

Google Workspace to gain AI-enabled security, digital sovereignty controls

Google Workspace will require two admins to sign off on critical changes

Hacker dá exemplo prático em evento com centenas de visitantes do porquê precisamos deixar Bluetooth desligado

Healthcare Cyber Security Market 2022, Research Report Covers Updated Data Share, Size and Future Demand

Hosting firm says it lost all customer data after ransomware attack

How API authentication vulnerabilities are at the center of cloud security concerns

How the downmarket impacted enterprise cybersecurity budgets

HP Report Details Tactics Used to Evade Detection Tools

IA generativa é risco e solução para combater o crime financeiro

Ie: Data protection breach at military medical facility

IFMA partners with BCS to offer members cyber protections

Justice Signs Bills Funding Marshall University Cybersecurity Center, Volunteer Fire Departments

Kali Linux 2023.3 released with 9 new tools, internal changes

Lapsus$: court finds teenagers carried out hacking spree

Laptop containing confidential data stolen from blood bank of Gurugram hospital

Large-scale breaches overshadow decline in number of healthcare data incidents

Meta Set to Enable Default End-to-End Encryption on Messenger by Year End

MyCISO and Cyber Leadership Institute partner on indigenous cyber leaders program

National intelligence office issues cyber warning for government and commercial satellites

New Report Quantifies Hospitals’ IoT and IoMT Cybersecurity Risk

New stealthy techniques let hackers gain Windows SYSTEM privileges

North Korean Affiliates Suspected in $40M Cryptocurrency Heist, FBI Warns

Open redirect flaws increasingly exploited by phishers

Over a Dozen Malicious npm Packages Target Roblox Game Developers

Ransomware Attack on CloudNordic paralyzes company and customers

Ransomware attacks broke records in July, mainly driven by this one group

SEC Cybersecurity Rule Leans on Materiality and Reasonableness

Security Onion 2.4: Free, open platform for defenders gets huge update

Spacecolon Toolset Fuels Global Surge in Scarab Ransomware Attacks

Surge in identity crime victims reporting suicidal thoughts

Syrian Threat Actor EVLF Unmasked as Creator of CypherRAT and CraxsRAT Android Malware

The MOVEit hack and what it taught us about application security

Thousands of High-Risk Incidents Neutralized Using AI

TP-Link Tapo L530E smart bulb flaws allow hackers to steal user passwords

TP-Link Smart Bulb Spills Wi-Fi Passwords

US charges founders of Tornado Cash mixer used by Lazarus hackers

US keen on boosting cyber security ties with Cambodia

XLoader MacOS Malware Variant Returns With OfficeNote Facade

WinRAR zero-day exploited since April to hack trading accounts

WinRAR Vulnerability Affects Traders Worldwide


8 open-source OSINT tools you should try

10 benefits of security performance metrics for CISOs

42dot gets vehicle cybersecurity certification

A cyber attack hit the Australian software provider Energy One

Akira ransomware gang spotted targeting Cisco VPN products to hack organizations

Akira ransomware targets Cisco VPNs to breach organizations

Balancing risk and compliance: implications of the SEC’s new cybersecurity regulations

Brazilian Court sentences hacker to 20 years in prison

BSidesTLV 2023 – Yuval Adam – Decoding The Black Magic Of Radio Waves

Building Security In Podcast: New strategies for managing risk

Carderbee Attacks: Hong Kong Organizations Targeted via Malicious Software Updates

Carderbee hacking group hits Hong Kong orgs in supply chain attack

Chinese Hackers Using Stolen Ivacy VPN Certificate To Sign Malware

CISA adds critical Adobe ColdFusion flaw to its Known Exploited Vulnerabilities catalog

CISOs Tout SaaS Cybersecurity Confidence, But 79% Admit to SaaS Incidents, New Report Finds

Continued MOVEit Exploitation Drives Record Ransomware Attacks

Critical Adobe ColdFusion Flaw Added to CISA's Exploited Vulnerability Catalog

Critical Insight Report: 15% Drop in Breaches, 31% Surge in Victims

Customer-configured rules now the biggest contributor to mitigated traffic

Cyber-Attack on Australian Utility Firm Energy One Spreads to UK Systems

Cyberattack on Belgian social service centers forces them to close

Cyberattack on UK IT Firm Swan Retail Affects 300 Retailers

Cybersecurity Heats Up in the Summer

Defense contractor Belcan leaks admin password with a list of flaws

eSentire introduces LLM Gateway to help businesses secure generative AI

How to attract and retain cyber security talent-Cyber Revolution

How to Choose the Right Risk Management Software

How to Quickly Give Users sudo Privileges in Linux

IT’s rising role in physical security technology

Ivanti fixed a new critical Sentry API authentication bypass flaw

Ivanti Sentry zero-day vulnerability fixed, patch ASAP! (CVE-2023-38035)

Ivanti Warns of Critical New Zero-Day Bug

Ivanti Warns of Critical Zero-Day Flaw Being Actively Exploited in Sentry Software

Juniper Networks fixes flaws leading to RCE in firewalls and switches

Legitimate software tainted in attacks on Hong Kong organizations, report says

Like Any Other Software, AI Needs Security Built In, CISA Says

Luna Grabber Malware Hits Roblox Devs Through npm Packages

Maintaining consistent security in diverse cloud infrastructures

Major Mississippi hospital system takes services offline after cyberattack

Microsoft Excel to let you run Python scripts as formulas

New APT Group Launches Supply Chain Campaign

New HiatusRAT malware attacks target US Defense Department

New Variant of XLoader macOS Malware Disguised as 'OfficeNote' Productivity App

New Windows 11 policy lets admins control optional updates installation

North Korean Attackers Penetrated Russian Rocket Designer’s Systems

One simple way to cut ransomware recovery costs in half

Products for Software Supply Chain Security

Prospect Medical making progress in restoring systems after ransomware attack

Putting a Stop to Ransomware Spread in the Healthcare

Scarab Ransomware Deployed Worldwide Via Spacecolon Toolset

Seiko joins growing list of ALPHV/BlackCat ransomware victims

Snatch gang claims the hack of the Department of Defence South Africa

St Helens Council hit by suspected Ransomware cyber attack

Terra freezes domains to combat phishing schemes

Tesla Data Breach – 75,000+ Users Information Details Exposed

Tesla: Insiders Responsible For Major Data Breach

Tesla Says Massive Data Breach was an Inside Job

The Three Main Cloud Delivery Services and Security Models

TP-Link Smart Bulb Users at Risk of WiFi Password Theft

UK industries are least trained in cyber security

Understanding how attackers exploit APIs is more important than ever

Understanding the Fragility of Digital Identities

US ARPA-H Initiative Counters Healthcare Cyber-Threats

Windows 11 KB5029351 preview update released with Search fixes


3 Ways to Prevent Cyber Attacks and Improve Healthcare Outcomes

5 Signs Your Clients’ Need a Cyber Security Makeover

7 Types of Identity Fraud That Organizations Can’t Afford to Ignore

41% of organizations said they can enforce consistent access policies

A Guide For Businesses To Secure Your Web Application In Five Steps

AI in Cybersecurity: 3 Questions CISOs Should be Asking

Are you prepared for the rise of the artificial intelligence CISO?

Aussies feeling increasingly unsafe online in the face of scams and AI

Australian Lender Latitude Financial Reports AU$76 Million Cyberattack Costs

Australian software provider Energy One hit by cyberattack

Benefits of Using an Anonymous Bitcoin Wallet in 2023

British intelligence is tipping off ransomware targets to disrupt attacks

Central Bank admits to data breach in its credit register

Chrome will tell users when extensions they use are removed from Chrome Web Store

Cuba Ransomware Group Exploiting Veeam Flaw in Latest Campaign

Cuba Ransomware Group Steals Credentials Via Veeam Exploit

Cyber attack on Aussie energy services firm may hit UK CNI

Cyber attacks in healthcare can be deadly. Here are 3 ways to prevent them

Cybersecurity at feed mills: Why it matters and what steps to take

Data breach under investigation involving Gadsden County court records

Data of Over 100,000 FriendTech Users Exposed – But Should Users Be Worried?

Deceptive AI Bots Spread Malware, Raise Security Concerns

El Salvadoran database raises questions of possible political intrigue

EvilProxy Phishing Campaign Targets Over 120,000 Microsoft 365 Users

Exploring the Potential Impact of a Bitcoin Spot ETF Approval

Finance Scams To Watch Out For In 2023 targeted by phishing scam as its volumes grow

Government Urges More Students to Be Cyber Explorers

HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under Attack

How EU lawmakers can make mandatory vulnerability disclosure responsible

How to add exceptions to ad blocking in Opera

How to Investigate an OAuth Grant for Suspicious Activity or Overly Permissive Scopes

How to Securely Manage the Data of Vulnerable Group

Interpol arrests 14 in cyber crime crackdown across Africa

Iraq switches off electronic billboards after hacker broadcasts porn to Baghdad passers-by

Israel and US to Invest $3.85 Million in projects for critical infrastructure protection through the BIRD Cyber Program

Ivanti: Customers ‘impacted’ by new zero-day vulnerability

Ivanti warns of new actively exploited MobileIron zero-day bug

Japanese watchmaker Seiko breached by BlackCat ransomware gang

Kansai Nerolac reports ransomware indicent on Sunday, financial impact undisclosed

LOL WinRAR: Serious One-Click Bug (Patch NOW)

LPTIC says cyber attack against Libyan communication companies is not over

Mass Phishing Campaign Attacking Zimbra Users’ to Steal Login Credentials

Microsoft is now a cybersecurity titan. That could be a problem

Mortgage Company and Call Center Vendor Sued for Data Breach

MS: Potential cyberattack throughout Singing River Health System

MSSqlPwner - An Advanced And Versatile Pentesting Tool Designed To Seamlessly Interact With MSSQL Servers And Based On Impacket

National Cybersecurity Strategy Requires Orgs to Rethink Software Quality

Network detection and response in the modern era

New Chrome Feature Alerts Users About Malicious Extensions

New Malware Turns Windows and macOS Devices into Proxy Nodes

New NCUA Rule Requires Swift Cyber Incident Reporting

New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC

N.J. hospital warning patients after possible data breach

Office of Australian Information Commissioner (OAIC) survey reveals 84% of Australians demand greater control over personal data

Ongoing Duo outage causes Azure Auth authentication errors

Organizations invest in AI tools to elevate email security

Orrick, Herrington & Sutcliffe breach exposes over 460K people

Palo Alto Networks discovers new version of malware targeting Facebook accounts

Payoro: A Glimmer of Disruption in the Banking Sector

Police Insider Tipped Off Criminal Friend About EncroChat Bust

Protecting your finances online

PSNI data breach: Man in court on terrorism-related charges

Rubrik’s new generative AI assistant helps ease cyberattack recovery operations

Securing the Future: The Vital Role of Cybersecurity in Manufacturing Processes

SEIKO discloses data breach

Snapchat Account Hacked: Understanding the Risks and How to Avoid Them

Sneaky Amazon Google ad leads to Microsoft support scam

Social Engineering Statistics By Types, Challenges and Facts

Spike in Cyberattacks Exposes Vulnerabilities in University Security Measures

Spoofing an Apple device and tricking users into sharing sensitive data

Survey Surfaces Identity Management Challenges in Cloud Era

Tasks that bog down security teams (and what to do about them)

Terra Website Compromised; Developers Warn Against Phishing Scam

Tesla admits data breach impacting 75,000 employees was insiders' job

Tesla blames data breach affecting 75,000 on ‘insider wrongdoing’

Tesla insider breach exposes thousands of employees

The complex world of CISO responsibilities

This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers

University of Rochester faces suit over ransomware attack

Urgent warning to check for 12 phone numbers on your iPhone or Android – full list of ‘dangerous’ contacts revealed

US Space Industry Under Threat from Foreign Cyber Espionage

Weeks After Cyberattack, Systems Still Offline at 16 Hospitals, Dozens of Clinics in 6 States

What your organisation needs to combat modern cyber threats

White House Announces AI Cybersecurity Challenge

Why Digital Car Keys Are Not Safe and Secure

Why Organizations Struggle to Secure APIs

WinRAR vulnerable to remote code execution, patch now! (CVE-2023-40477)


32% Nigerian employees, others vulnerable to scams

Action Fraud warn over free Oral-B electric toothbrush scam emails

Australia’s .au domain administrator denies data breach after ransomware posting

Baghdad advertising boards turned off over porn screening

Baghdad shuts advertising screens after hacker displays explicit content

Cardholders beware: Scamsters lure with increase in limit offers

Cuba ransomware uses Veeam exploit against critical U.S. organizations

Cyber attack: Qurium uncovers DoS attack targeting SJS

Cyber-security and its priorities

Cyberattack keeps hospitals' computers offline for weeks

Cyberattack on Energy One affects corporate systems in Australia and the UK

Data Fabric: The Intricate Shield Against Evolving Cyber Threats

Don’t take the phishing bait – you may be caught hook, line and sinker

E-wallet phishing scams to look out for

Hackers da Coreia do Norte já roubaram quase R$ 1 bilhão em criptomoedas em 2023, aponta estudo

Hackers threaten patients after massive cyber attack on Israeli hospital

Interpol arrests 14 who allegedly scammed $40m from victims in 'cyber surge'

Latitude reveals impact of cyber attack in 1H23 results

North Korean hackers target US-South Korea military drills

Suffolk police to visit data breach victims in person

What Is Digital Trust and Why Is It Vital for Safe Online Transactions?

DAILY NEWS: Agosto (13/08 - 19/08) - 33 Semana de 2023

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.


Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page