DAILY NEWS: Agosto (20/08 - 26/08) - 34 Semana de 2023
Cyber Security and Information Security News --- Daily Updates !! Week Resume

26/08
96% of Companies Are Using AI to Fight AI Based Cyber Threat Emails
Advanced persistent threats and their impact on cybersecurity
Answers sought on apparent SA defence ICT ransomware attack
Connecticut Hospitals Targeted in Ransomware Attack: Stolen Data Being Sold
Cyber hacks lurking near EV chargers
Data Breach Gives Byju’s Another Knock
Derby City Council urges vigilance after data breach
Discord starts notifying users affected by March data breach
Every 11 minutes there is a cyber attack in the financial or healthcare sector worldwide
Fortinet observes dip in ransomware detection within organizations
Halston Media Recently Fell Prey to Cyber Theft
Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack
LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants
Massive Data Breach Exposes Personal Details of 100 Million Job Seekers in France
New Revelation in Connecticut Hospital Ransomware Attack
Ransom gang claims attack on Prince George County school district
Safeguarding power systems: The Importance of cybersecurity in deregulated electricity markets
Understanding Phishing Attacks: How to Spot and Defend Against
What is the Average Cost of a Data Breach in Latin America?
25/08
3 things you need to know about spear phishing
5 Huge Problems With Not Having Company Data Backed Up
A Beginner’s Guide to Adversary Emulation with Caldera
Advocate Aurora Health to Pay $12.25 Million Settlement for Data Breach Class Action
AI and supply chain visibility key to mitigating OT security threats
Artificial Intelligence In Cybersecurity: Unlocking Benefits And Confronting Challenges
Baghdad Shuts Down Electronic Billboards After Hacker Uses One To Show ‘Pornographic Film’
Bankrupt crypto platforms FTX and BlockFi warn customers of data breach
Becoming unstoppable against ransomware
Beyond Cold Calls: Ringless Voicemail As A Personalized Customer Engagement Tool
Brave New World: Understanding India's Digital Personal Data Protection Act, 2023
BSides Cheltenham 2023 – Welcome And Announcements By BSides Cheltenham Orga
Building cyber resilience in an age of AI
Building Resilience through Cooperation for Cybersecurity and Climate Change at SOUTHDEC 2023
Catastrophic data breach means a watershed looms for Northern Irish policing
ChatGPT Data Policy: A Look at Security Enhancements by OpenAI To Protect User Data
China-linked Flax Typhoon APT targets Taiwan
China-Linked Flax Typhoon Cyber Espionage Targets Taiwan's Key Sectors
Clop passa a liderar ‘mercado’ de ransomware após hack ao MOVEit
CoC Asks SEC for More Time to Implement Cyber Reporting Rule
Council hit by suspected ransomware attack
Creative QakBot Attack Tactics Challenge Security Defenses
Cyber attack forced Belgium's Public Centre for Social Action to take computer systems offline
Cybercriminals’ new target: Your medical records
Cybersecurity insurance is missing the risk
Data breach at French govt agency exposes info of 10 million people
Data of 300K+ Standard Insurance customers exposed in MOVEit-related NTT DATA attack
Data Protection: One of These Incidents Is Not Like the Other
Defending the Virtual Kingdom: Exploring Modern Cybersecurity Landscapes
Elevating Data Security: Key Considerations When Transferring Your Digital Workspace
Evolving Cybersecurity: Embrace an Infinite Defense Strategy
Falha no software Cisco NX-OS permite ataque DoS
FBI: Barracuda Appliances Still Being Exploited By China
FBI: Patches for Barracuda ESG Zero-Day CVE-2023-2868 are ineffective
Flax Typhoon Group Abusing Built-in Operating System Tools to Deploy Malware
French national employment agency Pôle Emploi faces cyberattack impacting millions
Generative AI biggest weapon and tool for cybersecurity
Gmail Adds Extra Checks, Thwarting Sneaky Hackers
Google Workspace: New account security, DLP capabilities announced
GTA 6 leaker Arion Kurtaj: Everything found by the UK court about the 18-year old hacker
Hacks ao setor da saúde incidem mais sobre registros de pacientes
Health hackers: why are medical device and patient platforms cybercrime hotbeds?
How to setup wazuh as your SIEM with Debian & proxmox
ICO calls social media firms to protect people's data from scraping
IEEE 802.11az provides security enhancements, solves longstanding problems
Illinois Department of Public Health announces major breach that impacted 126k individuals
Just three malware loaders used in 80% of attacks
Kroll data breach exposes info of FTX, BlockFi, Genesis creditors
Lazarus Group Exploiting ManageEngine Flaw to Deploy MagicRAT Malware
Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure
Lazarus Group Targets Internet Infrastructure and Healthcare with 'QuiteRAT' Malware
Lazarus invade ManageEngine para hackear provedor de internet
Leaseweb is restoring ‘critical’ systems after security breach
LendInvest Flags Customer Data Breach
Making It Personal: SEC Issues Wells Notices Against SolarWinds’ CFO and CISO
Making Sense of Ransomware Attack Statistics in 2023
Metro Bank Warns Against Rising Malware Attacks
Micro-Segmentation: A Key Element Of Zero-Trust Planning
Microsoft acusa hackers na China de ataques cibernéticos ao governo de Taiwan
Microsoft: Stealthy Flax Typhoon hackers use LOLBins to evade detection
MSI: Recent wave of Windows blue screens linked to MSI motherboards
Multi-hospital ransom attack in US claimed by Rhysida gang
Navigating Legacy Infrastructure: A CISO's Actionable Strategy for Success
Nearly 1,000 Organizations, 60 Million Individuals Impacted by MOVEit Hack
Neurodata, Neurotechnology and Data Protection in the UK
Not right to keep blaming employees
Online Banking Security: How to Safeguard Your Online Banking Data
Paving a Path to Security by Design Across the Industry
Prime Minister Pham Minh Chinh stresses technological self-reliance to ensure cyber security
Privacy Regulator Warns of Surge in “Text Pest” Cases
Proposed UN Cybercrime Treaty Threatens to be an Expansive Global Surveillance Pact
Ransomware Attack Key Factor in H1 Operating Losses of $102.6 Million for Point32 Health
Ransomware dwell time hits new low
Researchers Discover Reply URL Takeover Issue in Azure
Roblox developers targeted with malware
Rotherham Council apologises for plans meeting data error
SASE Integration Amid the Evolving Cybersecurity Landscape
Seven States Have Upcoming Privacy Laws
Shifting Cybersecurity: The Impact and Implications of LLMs
Singing River Health System took systems offline to deal with a cyber attack
Six steps for preparing a manufacturing organization for a ransomware attack
Snow Software Survey Identifies SaaS Management Struggles
Spain to Launch Europe's First AI Regulatory Agency
Telegram hacker sentenced to 20 years in Brazil
The Pareto data breach: What has actually been published and why data retention is such an issue
The Third-Party Realm: Where the Risk Is
Thousands have SSNs leaked after ransomware attack on Ohio state archive org
Top cybersecurity M&A deals for 2023
Trojanized Advertisements: Russian Hackers' New Move
Twelve nations urge social media giants to tackle illegal data scraping
Two LAPSUS$ Hackers Convicted in London Court for High-Profile Tech Firm Hacks
Unrealistic expectations exacerbate the cybersecurity talent shortage
Urgent FBI Warning: Barracuda Email Gateways Vulnerable Despite Recent Patches
Versa Networks Adds Generative AI to SASE Platform
XLoader Malware Variant Targets MacOS Disguised as OfficeNote App
XWorm Malware Attacks Windows To Take RDP Control and Drop Ransomware
What the SEC’s Investigation of SolarWinds Means for CISOs and Cybersecurity Disclosures
Whiffy Recon malware triangulates the position of infected systems via Wi-Fi
Why DevOps Engineers are the Superheroes of the Tech World
WinRAR users update your software as 0-day vulnerability is found
24/08
91% of security pros say cybercriminals are using AI in email attacks
A simple idea that could make Android more secure
AI and the evolution of surveillance systems
Attack Dwell Times Fall but Threat Actors Are Moving Faster
AWS unveils local cloud zones for exclusive customer use
Bitwarden launches E2EE Secrets Manager
Christie’s website bug exposed collectors’ locations
Cloud hosting firms hit by devastating ransomware attack
CloudNordic Faces Severe Data Loss After Ransomware Attack
Danish Hosting Firms Lose All Customer Data in Ransomware Attack
Data of 2.6 Million Duolingo Users Leaked on Hacking Forum
Does a secure coding training platform really work?
English council warns residents after suspected ransomware attack
Exploit released for Ivanti Sentry bug abused as zero-day in attacks
FBI Flags $40M Crypto Cash-Out Plot By North Korean Hackers
FBI warns of patched Barracuda ESG appliances still being hacked
Flax Typhoon using legitimate software to quietly access Taiwanese organizations
Fraudsters can bypass biometric facial recognition
Hackers use public ManageEngine exploit to breach internet org
How digital identity protects connected cars
Jupiter X Core WordPress plugin could let hackers hijack sites
Kali Linux 2023.3 released: Kali NetHunter app redesign, 9 new tools, and more!
Lack of visibility into cloud access policies leaves enterprises flying blind
Last call for mWISE, the security conference for frontline practitioners.
Lazarus Group Exploits Critical Zoho ManageEngine Flaw to Deploy Stealthy QuiteRAT Malware
Malicious web application transactions increased by 500% in 2023
New Study Sheds Light on Adhubllka Ransomware Network
New Telegram Bot "Telekopye" Powering Large-scale Phishing Scams from Russia
New "Whiffy Recon" Malware Triangulates Infected Device Location via Wi-Fi Every Minute
New Whiffy Recon malware uses WiFi to triangulate your location
New Windows updates cause UNSUPPORTED_PROCESSOR blue screens
NIST begins rollout of quantum-proof algorithms
NIST Publishes Draft Post-Quantum Cryptography Standards
NIST publishes draft post-quantum cryptography standards, calls for industry feedback
Privacy regulators tell social media companies to fear the scrapers
Ransomware ecosystem targeting individuals, small firms remains robust
Ransomware hackers dwell time drops to 5 days, RDP still widely used
Russian Hackers Employ Telekopye Toolkit in Broad Phishing Attacks
Sensitive Data of 10 Million at Risk After French Employment Agency Breach
Sextortion Scams Surge 178% in a Year
Site da Prefeitura de Dourados sofre ataque hacker considerado superficial
Smoke Loader Botnet Drops Location Tracker Whiffy Recon Malware
Social Security Numbers were exposed in 69% of breaches in 2023
South Yorkshire Police lost data includes body worn footage, 69 cases affected
Specialized third-party solutions prove effective against malicious bots, ATO attacks, script risks
St Helens Council Warns of Phishing After Ransomware Breach
Teens Found Responsible For Lapsus$ Cyber-Attacks
The Hidden Dangers of Public Wi-Fi
Thousands of Unpatched Openfire XMPP Servers Still Exposed to High-Severity Flaw
TMX crisis lender data breach exposes 5M people
Tornado Cash Founders Charged in Billion-Dollar Crypto Laundering Scandal
Trulioo enhances identity verification with “person match” intelligent routing
UK court finds teenagers guilty of carrying out LAPSUS$ hacking spree
Webinar: The external attack surface & AI’s role in proactive security
WinRAR Security Flaw Exploited in Zero-Day Attacks to Target Traders
23/08
Agile Approach to Mass Cloud Credential Harvesting and Crypto Mining Sprints Ahead
Anticipating the next wave of IoT cybersecurity challenges
Artificial Intelligence and USBs Drive 8% Rise in Cyber-Attacks
Attackers exploited WinRAR zero-day for months to steal money from brokers (CVE-2023-38831)
Banco Central comunica novo vazamento de dados de chaves Pix
Banco Central registra vazamento de dados de 238 chaves Pix
Barracuda Networks Report Details Benefits of Cybersecurity AI
BC informa vazamento de dados pessoais vinculados a 238 chaves Pix
Bogus OfficeNote app delivers XLoader macOS malware
Brasil sofreu 603 mil ataques de ransomware nos últimos 12 meses
Brazil’s Top Escort Service Exposes Millions of Escort and Client Data
BSidesTLV 2023 – Ido Veltzman – (Lady|)Lord Of The Ring
Carderbee APT targets Hong Kong orgs via supply chain attacks
Chave Pix: Banco Central comunica vazamento de dados
Container security probes provide continuous penetration testing
CVE-2023-35150: Arbitrary Code Injection in XWiki.org XWiki
Cybercriminals turn to AI to bypass modern email security measures
Cybersecurity Startup That Protects Software App Data Raises $41M
Cybersecurity's Crucial Role Amidst Escalating Financial Crime Risks
Discord starts notifying users affected by March data breach
Dope Security wants to help CISOs get a handle on shadow IT
Doubling of Identity Theft Victims With Suicidal Thoughts
Enterprises Eyeing More Proactive Cybersecurity Strategies, Survey Finds
Experian Pays $650,000 to Settle Spam Claims
Falha Zero Day no WinRAR permitiu ataque de hackers por quatro meses
FBI identifies wallets holding cryptocurrency funds stolen by North Korea
FBI: Lazarus hackers readying to cash out $41 million in stolen crypto
Generative AI fueling significant rise in cyberattacks
Google introduces 11 new security features for Workspace (some AI-powered)
Google Workspace to gain AI-enabled security, digital sovereignty controls
Google Workspace will require two admins to sign off on critical changes
Hosting firm says it lost all customer data after ransomware attack
How API authentication vulnerabilities are at the center of cloud security concerns
How the downmarket impacted enterprise cybersecurity budgets
HP Report Details Tactics Used to Evade Detection Tools
IA generativa é risco e solução para combater o crime financeiro
Ie: Data protection breach at military medical facility
IFMA partners with BCS to offer members cyber protections
Justice Signs Bills Funding Marshall University Cybersecurity Center, Volunteer Fire Departments
Kali Linux 2023.3 released with 9 new tools, internal changes
Lapsus$: court finds teenagers carried out hacking spree
Laptop containing confidential data stolen from blood bank of Gurugram hospital
Large-scale breaches overshadow decline in number of healthcare data incidents
Meta Set to Enable Default End-to-End Encryption on Messenger by Year End
MyCISO and Cyber Leadership Institute partner on indigenous cyber leaders program
National intelligence office issues cyber warning for government and commercial satellites
New Report Quantifies Hospitals’ IoT and IoMT Cybersecurity Risk
New stealthy techniques let hackers gain Windows SYSTEM privileges
North Korean Affiliates Suspected in $40M Cryptocurrency Heist, FBI Warns
Open redirect flaws increasingly exploited by phishers
Over a Dozen Malicious npm Packages Target Roblox Game Developers
Ransomware Attack on CloudNordic paralyzes company and customers
Ransomware attacks broke records in July, mainly driven by this one group
SEC Cybersecurity Rule Leans on Materiality and Reasonableness
Security Onion 2.4: Free, open platform for defenders gets huge update
Spacecolon Toolset Fuels Global Surge in Scarab Ransomware Attacks
Surge in identity crime victims reporting suicidal thoughts
Syrian Threat Actor EVLF Unmasked as Creator of CypherRAT and CraxsRAT Android Malware
The MOVEit hack and what it taught us about application security
Thousands of High-Risk Incidents Neutralized Using AI
TP-Link Tapo L530E smart bulb flaws allow hackers to steal user passwords
TP-Link Smart Bulb Spills Wi-Fi Passwords
US charges founders of Tornado Cash mixer used by Lazarus hackers
US keen on boosting cyber security ties with Cambodia
XLoader MacOS Malware Variant Returns With OfficeNote Facade
WinRAR zero-day exploited since April to hack trading accounts
WinRAR Vulnerability Affects Traders Worldwide
22/08
8 open-source OSINT tools you should try
10 benefits of security performance metrics for CISOs
42dot gets vehicle cybersecurity certification
A cyber attack hit the Australian software provider Energy One
Akira ransomware gang spotted targeting Cisco VPN products to hack organizations
Akira ransomware targets Cisco VPNs to breach organizations
Balancing risk and compliance: implications of the SEC’s new cybersecurity regulations
Brazilian Court sentences hacker to 20 years in prison
BSidesTLV 2023 – Yuval Adam – Decoding The Black Magic Of Radio Waves
Building Security In Podcast: New strategies for managing risk
Carderbee Attacks: Hong Kong Organizations Targeted via Malicious Software Updates
Carderbee hacking group hits Hong Kong orgs in supply chain attack
Chinese Hackers Using Stolen Ivacy VPN Certificate To Sign Malware
CISA adds critical Adobe ColdFusion flaw to its Known Exploited Vulnerabilities catalog
CISOs Tout SaaS Cybersecurity Confidence, But 79% Admit to SaaS Incidents, New Report Finds
Continued MOVEit Exploitation Drives Record Ransomware Attacks
Critical Adobe ColdFusion Flaw Added to CISA's Exploited Vulnerability Catalog
Critical Insight Report: 15% Drop in Breaches, 31% Surge in Victims
Customer-configured rules now the biggest contributor to mitigated traffic
Cyber-Attack on Australian Utility Firm Energy One Spreads to UK Systems
Cyberattack on Belgian social service centers forces them to close
Cyberattack on UK IT Firm Swan Retail Affects 300 Retailers
Cybersecurity Heats Up in the Summer
Defense contractor Belcan leaks admin password with a list of flaws
eSentire introduces LLM Gateway to help businesses secure generative AI
How to attract and retain cyber security talent-Cyber Revolution
How to Choose the Right Risk Management Software
How to Quickly Give Users sudo Privileges in Linux
IT’s rising role in physical security technology
Ivanti fixed a new critical Sentry API authentication bypass flaw
Ivanti Sentry zero-day vulnerability fixed, patch ASAP! (CVE-2023-38035)
Ivanti Warns of Critical New Zero-Day Bug
Ivanti Warns of Critical Zero-Day Flaw Being Actively Exploited in Sentry Software
Juniper Networks fixes flaws leading to RCE in firewalls and switches
Legitimate software tainted in attacks on Hong Kong organizations, report says
Like Any Other Software, AI Needs Security Built In, CISA Says
Luna Grabber Malware Hits Roblox Devs Through npm Packages
Maintaining consistent security in diverse cloud infrastructures
Major Mississippi hospital system takes services offline after cyberattack
Microsoft Excel to let you run Python scripts as formulas
New APT Group Launches Supply Chain Campaign
New HiatusRAT malware attacks target US Defense Department
New Variant of XLoader macOS Malware Disguised as 'OfficeNote' Productivity App
New Windows 11 policy lets admins control optional updates installation
North Korean Attackers Penetrated Russian Rocket Designer’s Systems
One simple way to cut ransomware recovery costs in half
Products for Software Supply Chain Security
Prospect Medical making progress in restoring systems after ransomware attack
Putting a Stop to Ransomware Spread in the Healthcare
Scarab Ransomware Deployed Worldwide Via Spacecolon Toolset
Seiko joins growing list of ALPHV/BlackCat ransomware victims
Snatch gang claims the hack of the Department of Defence South Africa
St Helens Council hit by suspected Ransomware cyber attack
Terra freezes domains to combat phishing schemes
Tesla Data Breach – 75,000+ Users Information Details Exposed
Tesla: Insiders Responsible For Major Data Breach
Tesla Says Massive Data Breach was an Inside Job
The Three Main Cloud Delivery Services and Security Models
TP-Link Smart Bulb Users at Risk of WiFi Password Theft
UK industries are least trained in cyber security
Understanding how attackers exploit APIs is more important than ever
Understanding the Fragility of Digital Identities
US ARPA-H Initiative Counters Healthcare Cyber-Threats
Windows 11 KB5029351 preview update released with Search fixes
21/08
3 Ways to Prevent Cyber Attacks and Improve Healthcare Outcomes
5 Signs Your Clients’ Need a Cyber Security Makeover
7 Types of Identity Fraud That Organizations Can’t Afford to Ignore
41% of organizations said they can enforce consistent access policies
A Guide For Businesses To Secure Your Web Application In Five Steps
AI in Cybersecurity: 3 Questions CISOs Should be Asking
Are you prepared for the rise of the artificial intelligence CISO?
Aussies feeling increasingly unsafe online in the face of scams and AI
Australian Lender Latitude Financial Reports AU$76 Million Cyberattack Costs
Australian software provider Energy One hit by cyberattack
Benefits of Using an Anonymous Bitcoin Wallet in 2023
British intelligence is tipping off ransomware targets to disrupt attacks
Central Bank admits to data breach in its credit register
Chrome will tell users when extensions they use are removed from Chrome Web Store
Cuba Ransomware Group Exploiting Veeam Flaw in Latest Campaign
Cuba Ransomware Group Steals Credentials Via Veeam Exploit
Cyber attack on Aussie energy services firm may hit UK CNI
Cyber attacks in healthcare can be deadly. Here are 3 ways to prevent them
Cybersecurity at feed mills: Why it matters and what steps to take
Data breach under investigation involving Gadsden County court records
Data of Over 100,000 FriendTech Users Exposed – But Should Users Be Worried?
Deceptive AI Bots Spread Malware, Raise Security Concerns
El Salvadoran database raises questions of possible political intrigue
EvilProxy Phishing Campaign Targets Over 120,000 Microsoft 365 Users
Exploring the Potential Impact of a Bitcoin Spot ETF Approval
Finance Scams To Watch Out For In 2023
Friend.tech targeted by phishing scam as its volumes grow
Government Urges More Students to Be Cyber Explorers
HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under Attack
How EU lawmakers can make mandatory vulnerability disclosure responsible
How to add exceptions to ad blocking in Opera
How to Investigate an OAuth Grant for Suspicious Activity or Overly Permissive Scopes
How to Securely Manage the Data of Vulnerable Group
Interpol arrests 14 in cyber crime crackdown across Africa
Iraq switches off electronic billboards after hacker broadcasts porn to Baghdad passers-by
Ivanti: Customers ‘impacted’ by new zero-day vulnerability
Ivanti warns of new actively exploited MobileIron zero-day bug
Japanese watchmaker Seiko breached by BlackCat ransomware gang
Kansai Nerolac reports ransomware indicent on Sunday, financial impact undisclosed
LOL WinRAR: Serious One-Click Bug (Patch NOW)
LPTIC says cyber attack against Libyan communication companies is not over
Mass Phishing Campaign Attacking Zimbra Users’ to Steal Login Credentials
Microsoft is now a cybersecurity titan. That could be a problem
Mortgage Company and Call Center Vendor Sued for Data Breach
MS: Potential cyberattack throughout Singing River Health System
National Cybersecurity Strategy Requires Orgs to Rethink Software Quality
Network detection and response in the modern era
New Chrome Feature Alerts Users About Malicious Extensions
New Malware Turns Windows and macOS Devices into Proxy Nodes
New NCUA Rule Requires Swift Cyber Incident Reporting
New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC
N.J. hospital warning patients after possible data breach
Ongoing Duo outage causes Azure Auth authentication errors
Organizations invest in AI tools to elevate email security
Orrick, Herrington & Sutcliffe breach exposes over 460K people
Palo Alto Networks discovers new version of malware targeting Facebook accounts
Payoro: A Glimmer of Disruption in the Banking Sector
Police Insider Tipped Off Criminal Friend About EncroChat Bust
Protecting your finances online
PSNI data breach: Man in court on terrorism-related charges
Rubrik’s new generative AI assistant helps ease cyberattack recovery operations
Securing the Future: The Vital Role of Cybersecurity in Manufacturing Processes
Snapchat Account Hacked: Understanding the Risks and How to Avoid Them
Sneaky Amazon Google ad leads to Microsoft support scam
Social Engineering Statistics By Types, Challenges and Facts
Spike in Cyberattacks Exposes Vulnerabilities in University Security Measures
Spoofing an Apple device and tricking users into sharing sensitive data
Survey Surfaces Identity Management Challenges in Cloud Era
Tasks that bog down security teams (and what to do about them)
Terra Website Compromised; Developers Warn Against Phishing Scam
Tesla admits data breach impacting 75,000 employees was insiders' job
Tesla blames data breach affecting 75,000 on ‘insider wrongdoing’
Tesla insider breach exposes thousands of employees
The complex world of CISO responsibilities
This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers
University of Rochester faces suit over ransomware attack
US Space Industry Under Threat from Foreign Cyber Espionage
Weeks After Cyberattack, Systems Still Offline at 16 Hospitals, Dozens of Clinics in 6 States
What your organisation needs to combat modern cyber threats
White House Announces AI Cybersecurity Challenge
Why Digital Car Keys Are Not Safe and Secure
Why Organizations Struggle to Secure APIs
WinRAR vulnerable to remote code execution, patch now! (CVE-2023-40477)
20/08
32% Nigerian employees, others vulnerable to scams
Action Fraud warn over free Oral-B electric toothbrush scam emails
Australia’s .au domain administrator denies data breach after ransomware posting
Baghdad advertising boards turned off over porn screening
Baghdad shuts advertising screens after hacker displays explicit content
Cardholders beware: Scamsters lure with increase in limit offers
Cuba ransomware uses Veeam exploit against critical U.S. organizations
Cyber attack: Qurium uncovers DoS attack targeting SJS
Cyber-security and its priorities
Cyberattack keeps hospitals' computers offline for weeks
Cyberattack on Energy One affects corporate systems in Australia and the UK
Data Fabric: The Intricate Shield Against Evolving Cyber Threats
Don’t take the phishing bait – you may be caught hook, line and sinker
E-wallet phishing scams to look out for
Hackers da Coreia do Norte já roubaram quase R$ 1 bilhão em criptomoedas em 2023, aponta estudo
Hackers threaten patients after massive cyber attack on Israeli hospital
Interpol arrests 14 who allegedly scammed $40m from victims in 'cyber surge'
Latitude reveals impact of cyber attack in 1H23 results
North Korean hackers target US-South Korea military drills
Suffolk police to visit data breach victims in person
What Is Digital Trust and Why Is It Vital for Safe Online Transactions?