DAILY NEWS: Agosto (27/08 - 02/09) - 35 Semana de 2023
Cyber Security and Information Security News --- Daily Updates !! Week Resume

02/09
Ataques cibernéticos se multiplicam na América Latina
Chinese Smishing Triad Gang Hits US Users in Extensive Cybercrime Attack
Chrome extensions can steal plaintext passwords from websites
‘Cyber attack’ forces London school to delay pupils’ return
Dis-Chem issued with enforcement notice
Easy-to-Follow Checklist & Tips for Secure Remote Working
Fake YouPorn extortion scam threatens to leak your sex tape
FBI Successfully Executes Operation To Take Down Qakbot Botnet
Financial scammers reap huge amounts of cash in thefts from Eden Prairie businesses and individuals
Freecycle users told to change passwords after data breach
FTX Bankruptcy Claims Agent Kroll Faces Data Breach, Sensitive Information Leaked
Hacker Group Anonymous Sudan Targets X To Force Elon Musk's Hand On Starlink
Hackers force shutdown of 2 of the world’s most advanced telescopes
How to prevent credit card information theft while shopping online?
HSHS, Prevea confirm systemwide outage was caused by cyber attack
International authorities seize domain host used for ransomware, arrest 5
Kerala actor suffers cyber attack for highlighting farmers' plight
Maker of ‘smart’ chastity cage left users’ emails, passwords, and locations exposed
Okta Warns of Social Engineering Attacks Targeting Super Administrator Privileges
PSNI data breach: Two men released following arrest in Portadown
Ransomware que evita roubo de dados na internet chega ao Brasil
Snake Ransomware Endangers Your Data: How Can You Stop It?
These Scammers Have Defrauded Consumers of $65 Million Worldwide
01/09
4th Circuit Vacates Class Certification in Consumer Data Breach Case
15 Security Best Practices For Companies
Adobe ColdFusion Critical Vulnerabilities Exploited Despite Patches
Ataque hacker teria sequestrado 500 GB de dados sensíveis da Fiocruz
Classiscam Scam-as-a-Service Raked $64.5 Million During the COVID-19 Pandemic
Common Cloud Misconfigurations That Lead to Data Breaches
Contas do Facebook visadas por grupos de hackers vietnamitas
Cyber softens, ransomware attacks renew concerns
Cyber threats aimed at the insurance sector: Are you prepared?
Cybercriminals use research contests to create new attack methods
Cyberinsurance Takes Longer to Obtain, Costs More
Cybersecurity startups to watch for in 2023
Cybersecurity Tools Are New Targets For Nation-State Hackers
Debenham High School IT system hit by cyber attack
Deepfake Scams Are Becoming So Sophisticated, They Could Start Impersonating Your Boss And Coworkers
Dis-Chem hits back at privacy watchdog over data breach findings
Education Sector Heavily Targeted as the School Year Begins
Enforcement Notice Issued To Dis-Chem For Violating POPIA
EPA Cybersecurity Rule Challenged by States and Water Systems Associations
Ex-INM senior executives settle alleged data breach case
Experts Urge Immediate Juniper Firewall and Switch Patching
Exploit released for critical VMware SSH auth bypass vulnerability
Exploring the traits of effective chief audit executives
Fighting Back Against Synthetic Identity Fraud
Forever 21 data breach: Over half a million customers and employees at risk
Free Decryptor Available for ‘Key Group’ Ransomware
FTX, BlockFi, Genesis bankruptcy claimant data exposed in data breach
Gamaredon Hackers Amplified Hacks Amid Kyiv Counteroffensive
Golf club maker Callaway says 1 million affected by data breach
Golf gear giant Callaway data breach exposes info of 1.1 million
Google Mandiant Adds Additional Cybersecurity Services Using AI
Hacker group compromises MSSQL servers to deploy FreeWorld ransomware
Hackers Abuse Windows Container Isolation Framework to Bypass Security Defences
Hackers roubaram R$ 78 milhões do mercado cripto em agosto, aponta relatório
Hackers Target Twitter (X) in Cyber Attack to Pressure Elon Musk Over Starlink in Sudan
Highgate Wood School delays term by 6 days after cyber attack
How Ducktail capitalizes on compromised business, ad accounts
How to create a password-protected PDF with LibreOffice
How to Respond to a Data Breach
If you like your Flipper Zero, then you'll love this
Information Regulator pursues Dis-Chem over data breach
It's a Zero-day? It's Malware? No! It's Username and Password
Junos OS Flaw Allows a Network-based Attacker to Launch DoS Attack
Kroll Sheds Further Light on BlockFi Customer Data Breach
Kyrgyzstan improves rankings in National Cyber Security Index
Microsoft retires Visual Studio for Mac, support ends in a year
Nearly 540,000 people have SSNs leaked after cyberattack on retailer Forever 21
New SuperBear Trojan Emerges in Targeted Phishing Attack on South Korean Activists
Norman Public Schools tells media, families it will strive to communicate better
North Alabama International Trade Association talks cyber security at recent roundtable
North Korea-linked APT Labyrinth Chollima behind PyPI supply chain attacks
Okta forecasts quarterly revenue above expectations
Open-Source Malware SapphireStealer Expands
Orrick, Herrington & Sutcliffe Sued Over Ransomware Attack and Data Breach
Over 500K affected by Forever 21 data breach
Pathways into Cyber: Transitioning from Healthcare to the Cybersecurity Frontier
Payroll provider cyber-attack – how resilient are you?
Pennymac, RoundPoint report data breach
Poster with PSNI officers' details found in bus shelter after major data leak
Researchers released a free decryptor for the Key Group ransomware
Russian State-Backed 'Infamous Chisel' Android Malware Targets Ukrainian Military
Securing IoT and OT Devices Amid Ransomware Threats
Smishing Triad: China-Based Fraud Network Exposed
Sophisticated Cyber-Espionage Group Earth Estries Exposed
The Downside of DevOps: Stress and Burnout of Engineers
Threat Actors Targeting Microsoft SQL Servers to Deploy FreeWorld Ransomware
Understand the fine print of your cyber insurance policies
UNRAVELING EternalBlue: inside the WannaCry’s enabler
31/08
13% of employees admit to falling for phishing attacks working at home
500k Impacted by Data Breach at Fashion Retailer Forever 21
AI chatbots pose risk for business operations, warn UK cyber authorities
Apple offers security researchers specialized iPhones to tinker with
Businesses grappling with volatile and complex security landscape
BYOD Security Gap: Survey Finds 49% of European Firms Unprotected
ChatGPT on the chopping block as organizations reevaluate AI usage
Chevron Federal Credit Union says MOVEit Transfer hack impacted over 90k customers
Cisco VPNs with no MFA enabled hit by ransomware groups
Classiscam fraud-as-a-service expands, now targets banks and 251 brands
Classiscam Spreads: $64.5M Scheme Targets 79 Countries
Cyber crooks target Airbnb for fraudulent activities
Do you need an anti-spy camera finder and bug detector? How they work
Duolingo data breach impacted close to 3 million email addresses
Earth Estries' Espionage Campaign Targets Governments and Tech Titans Across Continents
Facebook Accounts Targeted by Vietnamese Threat Groups
Falmouth dog care business suffers 'traumatic and upsetting' hacker attack
Fitbit may face €11B fine for alleged GDPR violations
From disaster to digital resilience
From Simple Beginnings, ‘Classiscam’ Fraud Campaigns Go Global
G20 Summit: Agencies on alert against cyber attack by hackers in Delhi
Gamaredon hackers target Ukrainian military orgs amid counteroffensive efforts
Greater Amman Municipality (GAM) deals with Cyber attack that cut off Internet
GRU Blamed for Infamous Chisel Malware Targeting Ukraine's Military Phones
GRU hackers attack Ukrainian military with new Android malware
Hacker Attack Against a Vital Slovakian-Hungarian Advocacy Group
Hacker Group Anonymous Sudan Shuts Down X, Demanding Elon Musk’s Starlink in Their Homeland
Hackers Target Czech Banks, Demand Ukraine Funding Cuts
How to add a custom problematic site block list in Opera
How to ensure DNS records don’t become a security hazard
Kroll loses clients' bankruptcy claims data to a SIM-swapping attack
Lawsuit Accuses University of Minnesota of Not Doing Enough to Prevent Data Breach
MalDoc in PDF Attack: Hackers Hiding Malicious Word Files within PDFs
Mass Exploitation of MOVEit Transfer Software Targets Millions
Maximus health data breach hits 110K Pima County residents
Microsoft lashes out at UN over cybercrime treaty
New Research Exposes Airbnb as Breeding Ground For Cybercrime
North Korean Hackers Deploy New Malicious Python Packages in PyPI Repository
Numbers Don't Lie: Exposing the Harsh Truths of Cyberattacks in New Report
One month later, Ranhill still hasn’t fully recovered from cyberattack
Online shopping scammers extend global reach
Operation Duck Hunt: A cybersecurity milestone in ransomware takedown
Optus requests Deloitte cyber attack investigation not be released by Federal Court
Phishing attack on the Supreme Court of India website, SC issues alert
Ransomware Attacks: Analyzing Recent High-Profile Incidents and Their Implications
Remote Workforce Still Vulnerable In 2023– How Can SMEs Help Stay Secure?
Rhysida ransomware group claims major cyber attack on Maryland's Prince George's County school
Romanian prosecutors, police at US demand dismantled part of Qakbot malware infrastructure
Russian APT Intensifies Cyber Espionage Activities Amid Ukrainian Counter-Offensive
Russia’s spies using new crude malware to target Android devices in Ukraine
SapphireStealer Malware: A Gateway to Espionage and Ransomware Operations
Should you be worried? AI’s risks, dangers, and concerns
Strengthening Brand Reputation: The Urgency Of DMARC Adoption In Cybersecurity
Supreme Court Registry issues advisory against phishing attack impersonating Supreme Court website
The Less-Obvious Fallout From a Cyber Attack
The Lure of Subject Lines in Phishing Emails
The Massive Hack of MOVEit Transfer Software: A Clop Ransomware Attack
The power of passive OS fingerprinting for accurate IoT device identification
The secret habits of top-performing CISOs
Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store
Two of The World's Most Advanced Telescopes Remain Closed Following Cyberattack
UBS Slows Digitalization After Significant Cyberattack
University of Sydney caught up in third-party data breach
What does optimal software security analysis look like?
Why Are Healthcare Data Breaches So Expensive?
30/08
58% of malicious emails contained spoof content
A closer look at the RFI on open-source software security
Alert: Juniper Firewalls, Openfire, and Apache RocketMQ Under Attack from New Exploits
Alogent Holdings MOVEit Data Breach Affects Personal Information of Approximately 454,3850
AlphV group takes credit for ransomware attack on Georgia county
China-Linked BadBazaar Android Spyware Targeting Signal and Telegram Users
Chinese APT Group GREF Use BadBazaar in Android Espionage
Chinese Hackers Target US, Other Govts With Barracuda Flaw
Cost of a data breach 2023: Financial industry impacts
Credentials of NASA, Tesla, DoJ, Verizon, and 2K others leaked by workplace safety organization
Critical RCE flaw impacts VMware Aria Operations Networks
Critical Vulnerability Alert: VMware Aria Operations Networks at Risk from Remote Attacks
Cyber defense makes up majority of cybersecurity budgets
DDoS attacks rise 40% in Q2 2023, affecting banks, gaming & e-commerce
FBI Dismantles QakBot Malware, Frees 700,000 Computers, Seizes $8.6 Million
FBI-Led Operation Duck Hunt Shuts Down QakBot Malware
FBI: Operation ‘Duck Hunt’ dismantled the Qakbot botnet
Flaw Exposes WP Migration Plugin to Hacks
Forever 21 discloses data breach: 500K+ affected
GDPR used by new ransom gang to extort victims
GhostSec Claim Breaching Iranian Govt Surveillance Software Tool
Google launches tool to identify AI-generated images
Hackers Can Exploit Windows Container Isolation Framework to Bypass Endpoint Security
Hacking campaign bruteforces Cisco VPNs to breach networks
How CISOs can shift from application security to product security
How did Clop get its hands on the MOVEit zero day?
How to Prevent ChatGPT From Stealing Your Content & Traffic
How to Sidestep Generative AI Cybersecurity Risks
Hundreds of thousands trafficked into cyber scamming in Southeast Asia, UN says
Is the new OWASP API Top 10 helpful to defenders?
Japan Plans Counter-Cyber Attack Grid for Indo-Pacific
Lawsuit accuses University of Minnesota of not doing enough to prevent data breach
Malicious npm Packages Aim to Target Developers for Source Code Theft
Managing privacy risks: what small businesses need to know
MMRat Android Trojan Executes Remote Financial Fraud Through Accessibility Feature
NCSC Issues Cyber Warning Over AI Chatbots
Netgear releases patches for two high-severity vulnerabilities
Network technology giant Juniper warns users about denial-of-service bugs
OpenAI Promises Enterprise-Grade Security with ChatGPT for Business
PBI data breach impacted thousands of New York Life Insurance Company's customers
Phishing, smishing, the security is missing!
PurFood data breach exposes personal information of 1.2 million customers
Qakbot Botnet Disrupted, Infected 700,000 Computers Globally
Qakbot infrastructure dismantled in multinational cybercrime takedown
Rhysida ransomware group claims major cyber attack on Prospect Medical Holdings's network
Rising cyber incidents challenge healthcare organizations
Secureworks identifies malicious Qakbot ransomware campaign
Securities and Exchange Commission (SEC) cyber attack regulations prompt 10 questions for CISOs
Security leaders report need to balance human and machine identities
Some M&T Bank customer information hacked in massive data breach
Tesla notifying current and former Nevada employees about data breach. What we know
The removal of Qakbot from infected computers is just the first step
Threat actors started exploiting Juniper flaws shortly after PoC release
Trojanized Signal and Telegram apps on Google Play delivered spyware
UK cyber agency warns of potentially fundamental flaw in AI technology
US preservationist nonprofit suffers a ransomware attack; gets a ransom demand worth millions
Velociraptor: Open-source digital forensics and incident response
VMware Aria vulnerable to critical SSH authentication bypass flaw
VMware fixes critical vulnerability in Aria Operations for Networks (CVE-2023-34039)
Why are we seeing such a huge demand for AI at the moment?
Why Criminals Keep Reusing Leaked Ransomware Builders
With Phishing Getting Harder to Spot, How Can Users Stay Protected?
WordPress migration add-on flaw could lead to data breaches
Worker sues staffing firm over data breach that released info on 104,660 workers
29/08
11 search engines for cybersecurity research you can use right now
80% of organizations expect ransomware spending to increase
Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits
Advanced Engineering: Avoiding cyber attacks in a world with generative AI
AI In Cybersecurity: Harmful Or Helpful?
Akira Strikes Again: Jasper High School Data Breach Exposes 60GB
APIs Becoming a Favorite Attack Vector for Adversaries
Ataque hacker a celular: como funciona e como se proteger
Begin Your IoT Project With A Security-First Approach
Chevron Federal Credit Union Files Notice of Data Breach Affecting Over 90k Consumers
Chinese Hacking Group Exploits Barracuda Zero-Day to Target Government, Military, and Telecom
CISA Ransomware Alert Demonstrates Need to Evolve Risk Management
Citrix NetScaler Alert: Ransomware Hackers Exploiting Critical Vulnerability
CoinsPaid reveals how job offer led to $37m hack
Concerns mount over cybersecurity treaty
Cyberattacks Targeting Government Agencies on the Rise
DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates
Data breach at PurFoods affects 1.2 million: medical and financial data compromised
Defending Your Inbox: The Importance Of Effective Email Spam Filtering
DreamBus malware exploits RocketMQ flaw to infect servers
Duolingo Data Breach Exposes 3 Million User Emails
Dutch cloud provider Leaseweb halts services temporarily following cyberattack
Easy-to-exploit Skype vulnerability reveals users’ IP address
Edtech Sees Faces Highest Cyber Attacks
Evotec’s Earnings Hit by Cyber Attack, but Partially Compensated by Partnerships
FBI announces it has dismantled global network of hacked computers used in major fraud scheme
FBI Dismantles Global Malware Network Qakbot Used For Ransomware Attacks
FBI, Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown
FIN8-linked actor targets Citrix NetScaler systems
Four in Five Cyber-Attacks Powered by Just Three Malware Loaders
FTX Customers Hit by 'Withdrawal' Phishing Mails After SIM Swap Attack
Generative AI: A Boon or a Bane for Cybersecurity?
Genshin Impact dev will sue Kaveh Hacks users and developers
Google Applies Generative AI Tools to Cloud Security
Google Cloud announces Duet AI enhancements for Mandiant, Chronicle
Google debuts Duet AI to tackle new cybersecurity challenges in the cloud
Hackers exploit critical Juniper RCE bug chain after PoC release
Hackers invadem site de prefeitura e zombam: 'Guarujá caiu na hackeada'
Hacking gangs form cybercrime syndicate dubbed the Five Families
Hamilton Health Sciences says 8 employees fired for medical record 'snooping'
Healthcare Institutions Advised to Prepare for Extended Downtime Following Cyberattacks
Here's What Your Breach Response Plan Might Be Missing
How financial institutions can reduce security and other risks from MRAs
How Hackers Abusing ChatGPT Features For Their Cybercriminal Activities – Bypass Censorship
IoT Security Risks and How to Prevent Them
Iran spyware breached and exposed by GhostSec
Is the cybersecurity community’s obsession with compliance counter-productive?
IT leaders alarmed by generative AI’s SaaS security implications
Japan’s cybersecurity agency breached by suspected Chinese hackers: report
Japan’s JPCERT warns of new ‘MalDoc in PDF’ attack technique
Japanese agency discovers malicious PDF that bypasses detection
LockBit 3.0 Ransomware Variants Surge Post Builder Leak
Louis Garneau Sport customers’ cards got skimmed
Microsoft adds HSTS support to Exchange Server 2016 and 2019
Microsoft Impersonated Most in Phishing Attacks Among Nearly 350 Brands
Microsoft Warns of Adversary-in-the-Middle Uptick on Phishing Platforms
Mom’s Meals says data breach affects 1.2 million customers
More UK cops' names and photos exposed in supplier breach
New Android MMRat malware uses Protobuf protocol to steal your data
New Facebook phishing scam scares page owners into sharing their password
New Ransomware Campaign Targets Citrix NetScaler Flaw
New report quantifies hospitals’ IoT and IoMT cybersecurity risk
OpenAI Debuts ChatGPT Enterprise, Touting Better Privacy for Business
Phishing-as-a-Service Gets Smarter: Microsoft Sounds Alarm on AiTM Attacks
Phishing resistant hardware, the key to email security
Polish stock exchange, banks knocked offline by pro-Russian hackers
Privacy-enhancing technologies shouldn’t be an afterthought for startups
Qakbot botnet dismantled after infecting over 700,000 computers
Qakbot botnet disrupted, malware removed from 700,000+ victim computers
Qakbot Malware Disrupted in International Cyber Takedown
Rackspace Faces Massive Cleanup Costs After Ransomware Attack
Ransomware Attack on Danish Hosting Providers Causes Almost Complete Data Loss for Customers
Ransomware group exploits Citrix NetScaler systems for initial access
Report Reveals Growing Disparity in Cyber Insurance Landscape
Scholarship, shopping scams surge as students return to school
Security and compliance challenges remain across distributed workforces
SMEs ignore cyber security at their peril
Specialist print supplier at centre of Met data breach
Survey Provides Takeaways for Security Pros to Operationalize their Remediation Life Cycle
Suspected Met Police data breach potentially exposes sensitive officer, staff information
TD Ameritrade Hit With Class-Action Suit Over MOVEit Hack
Tesla’s Data Breach That Exposed Over 75,000 Employees Was an Inside Job
Texas Amends Data Breach Notification Law, Updates Effective September 1
The Digital Age Dilemma: Traditional Backups vs. Modern Solutions
The U.S. Is Less Prepared to Fight Cybercrime Than It Could Be
Thief loots escrow office, steals devices loaded with user data
Three Cybersecurity Tips That Could Help Prevent A Cyberattack
Time and effort to obtain cyber insurance increasing for US businesses
Trading Paints leak affected 270k users
Two lawsuits filed against Hub over data breach
Two suspects arrested following Poland railway hack
Understanding the Zero Trust API Security Model
University of Michigan shuts down network after cyberattack
US govt email servers hacked in Barracuda zero-day attacks
VIPRE Q2 Email Security Report Reveals Malspam Attacks Up, News Sectors Targeted
VNS Health Confirms Data Breach at TMG Health Resulted in Data of 103,775 Consumers Being Leaked
X And LinkedIn Are Working On Adding Passkey Access For A More Secure Login Approach
What Is GoodWill Ransomware and How Can You Stop It Infecting You?
What makes a good ASM solution stand out
What This Year’s Data Breaches Reveal About Identity
28/08
3 Malware Loaders are Responsible for 80% of Attacks, ReliaQuest Says
5 cybersecurity mistakes putting your startup at risk — and how to fix them
10 Million Likely Impacted by Data Breach at French Unemployment Agency
270k Trading Paints log-in details for sale in data breach
A whole new generation of LockBit ransomware could be here
Adapting authentication to a cloud-centric landscape
Adding Generative AI as an API Protection Tool
Ahmedabad Cyber Cops Grapple To Nix Rising Confidential Corporate Data Breach Cases
AI can combat Colonial Pipeline-like cyberattacks that cripple hospitals, critical services: expert
App de espionagem brasileiro "WebDetetive" sofre ataque hacker e usuários são comprometidos
Attacks on Citrix NetScaler systems linked to ransomware actor
Augmenting cybersecurity after Camp David
Average Indian firm hit by 2,152 cyber-attacks, 20% up YoY: Report
Balancer Drained for Almost $1M Days After Disclosing Vulnerability
Century-old technology hack brought 20 trains to a halt in Poland
Check Point Finds 48 Ransomware Groups Have Breached Some 2,200 Victims in First Half of 2023
Cisco FXOS SNMP Service Flaw Let Attacker Trigger DoS Condition
Customer data compromised in Kroll cyberattack
Customers complaining on X are latest targets of blue-tick phishing scams
Customers ‘lost all data’ after ransomware attack, says Danish cloud host
Customizing LLMs for domain-specific tasks
Cyberattacks Targeting E-commerce Applications
Developers Beware: Malicious Rust Libraries Caught Transmitting OS Info to Telegram Channel
Digital Identity 6 Tips on Managing Personal Information
Experts demand clarity as they struggle with cloud security prioritization
Experts Uncover How Cybercriminals Could Exploit Microsoft Entra ID for Elevated Privilege
Exploit released for Juniper firewall bugs allowing RCE attacks
Five ICS Security Challenges and How to Overcome Them
Five Ways Strong Cybersecurity Culture Can Thwart Human Errors
Four common password mistakes hackers love to exploit
GCHQ bosses reveal first cyber-attack and how incident changed UK and Europe
Global cybercrime treaty could be ‘disastrous for human rights,’ NGOs warn
Hackers are watching your startup. Not many are prepared for the attack
Hacking the future: Notes from DEF CON’s Generative Red Team Challenge
Health, payment info for 1.2M people feared stolen from Purfoods in IT attack
Hospitality Staffing Solutions faces class action lawsuit following data breach
How hacker stole R600K from Eastern Cape schools
How international cybersecurity frameworks can help CISOs
‘Incredible concern and anger’ among Metropolitan Police after hackers breach data
Inside GTA 6 Hacker’s Fate For Leaks: A Tale Of Cyber Crime
Investigadores suspeitam de ataque hacker russo ao sistema Radar da Receita
Is Your MS Office Suite A Silent Threat To Data Privacy?
Japan Medical organizations and IT vendors “should bear part of the cyber damage”
KmsdBot Malware Gets an Upgrade: Now Targets IoT Devices with Enhanced Capabilities
Kroll Employee SIM-Swapped for Crypto Investor Data
Kroll SIM-swap attack: FTX, BlockFi and Genesis clients’ info exposed
Kroll SIM-Swapping Attack Causes Data Breach at 3 Top Crypto Firms
MalDoc in PDFs: Hiding malicious Word docs in PDF files
Massive MOVEit campaign already impacted at least 1,000 organizations and 60 million individuals
Medically-tailored food provider, PurFoods, discloses data breach
Microsoft blames ‘unsupported processor’ blue screens on OEM vendors
Mom’s Meals discloses data breach impacting 1.2 million people
Moscow helping cybercriminals operate with 'near impunity': Canadian Cyber Centre
Navigating the Aftermath: Restoring Trust and Rebuilding Security after a Data Breach
Over 2.6 Million DuoLingo Users’ Info Exposed in a Hacker’s Forum
Phishing scam: Two of gang held in Delhi
PoC for no-auth RCE on Juniper firewalls released
Pôle emploi data breach expose data belonging to ten million users
Public Sector Cybersecurity | Why State & Local Governments Are at Risk
QR Code Phishing Attacks Spread
Ransomware Groups are Accelerating Their Attacks with Dwell Time Falling to Just 5 Days
Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?
Reply URL Flaw Allowed Unauthorized MS Power Platform API Access
Rhysida ransomware group claims the hack of Prospect Medical
Securing applications: 4 common cyber attack types WAAP can prevent
Security Threat After Cyber Attack on London Metropolitan Police Contractor
SIM swap against Kroll staffer leads to data breach
Smoke Loader Malware Locates Infected System Using Wi-Fi Access Points
Space 2023: The Final Fintech Cybersecurity Frontier?
Spain warns of LockBit Locker ransomware phishing attacks
Stolen Data In Ransomware Attack May Be Posted Online: PGCPS Official
T-Mobile SIM-swapping attack on Kroll employee caused crypto platform data breach
The Chinese Computer Connection To The 2022 Suffolk Cyber Hack
Three Persistent Data Security Challenges Organizations Need To Address Now
Two Men Arrested Following Poland Railway Hacking
UK Air Traffic Control System Collapses, Causing Travel Chaos
UK’s Metro Bank Issues Warning Against Increase in Malware Attacks
Ultimate API Security Checklist for 2023
Uncovering a privacy-preserving approach to machine learning
Understanding the role of MDR in tackling growing cyber threats
Updated Kmsdx botnet targets IoT devices
US food delivery service PurFoods discloses data breach
What true diversity in the cybersecurity industry looks like
Watch Out for This New Phishing Scam on X/Twitter
Why API Security Is Everyone’s Business
Why hospitals should prepare for a month of downtime after cyberattack
27/08
2 held for cheating bizman through email phishing
AI and ransomware: a scary combination
Chantagem e fraude: o ataque hacker de dois adolescentes contra Uber, Nvidia e GTA
Defending hospitals & healthcare against ransomware
Duolingo Suffers Massive Data Breach; Scrapped Data Lands on Hacking Forum
Hackers bring down Poland’s train network in massive cyber attack
IT Contractor Data Breach Affects 47,000 Met Police Personnel
Leaked LockBit 3.0 ransomware builder used by multiple threat actors
Met Police data breach could cause incalculable damage
Met Police investigating suspected data breach
Poland’s authorities investigate a hacking attack on country’s railways
Poland investigates cyber-attack on rail network
Prince George’s Co. Public Schools: Data stolen in ransomware attack could be posted online
Rhysida claims ransomware attack on Prospect Medical, threatens to sell data