top of page

DAILY NEWS: Fevereiro (05/02 - 18/02) - 07 Semana de 2023

Dia a Dia da Segurança da Informação !!!

Cyber Security and Information Security News

Daily Updates !! Weekly Review


Addressing Cybersecurity Concerns During the Grid Modernization Process

Águas do Porto foi alvo de ataque ransomware

Beware Fake Disney Plus Emails That Steal Your Bank Information

CGU investiga suspeita de ação hacker em cartão de vacinação de Bolsonaro

Crypto investors under attack by new malware, reveals Cisco Talos

Cybersecurity: What can you do to reduce your risk of an online attack?

Data Breach: FBI Admits ‘Malicious Cyber Incident’ on Its Computer Network

Department of Education to Enforce Revised Cybersecurity Requirements and Expands Interpretation of “Third-Party Servicer” Definition

German airport websites hit by suspected cyber attack

Gloucester’s GL1 leisure centre still suffering from city council cyber attack fallout

GoDaddy discloses a new data breach

GoDaddy Discloses Multi-Year Security Breach Causing Malware Installations and Source Code Theft

Hackers Ran Amok Inside GoDaddy for Nearly 3 Years

New WhiskerSpy malware delivered via trojanized codec installer

Oops! ‘Phishing’ scam cost small Ohio city $219,000, finance director his job

Queen’s updates cybersecurity measures to protect data

Scots cancer patient hits out after major data breach of medical records at NHS Lothian by staff member

Smishing, vishing and whaling: How phishing scams are evolving

SMS-Based 2FA Will Be Limited to Twitter Blue Users

Spain Orders Extradition of British Alleged Hacker to U.S.

Suspeita de atividade hacker em cartão de vacina de Bolsonaro é investigada

The Feds Are Launching a Hack Back Squad

Threats in the cyberspace: Critical systems at risk

Top cybersecurity trends small businesses should be paying attention to this year

Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only

Twitter will allow using the SMS-based two-factor authentication (2FA) only to its Blue subscribers

UK: Lancashire County Council has referred itself following a data breach

U.K.: NHS call center advisor found guilty of accessing medical records illegally

Unintended riot: Leading games manufacturer struck by ransomware

Vishing on phishing: messenger users will face a sharp increase in fraud

Weeklong ransomware attack on Oakland government drags on

What Role Does Mathematics Play In Cybersecurity? Check These Examples


2 Orgs Reach Settlements to Resolve Healthcare Data Breach Lawsuits

5 key cybersecurity trends for 2023

A consumer data leak involving Money Lover brings cybersecurity front and center for FIs

Admins, patch your Cisco enterprise security solutions! (CVE-2023-20032)

Aker Solutions continues to tackle Brazil cyber attack

American Civil Liberties Union (ACLA) Expands Class Action Lawsuit Against RIPTA and UnitedHealthcare New England

Armenia and Azerbaijan Hackers Use OxtaRAT to Monitor Conflict

Armenian Entities Hit by New Version of OxtaRAT Spying Tool

As cybersecurity gaps grow, consolidation takes on new meaning for hybrid cloud

Atlassian Data Breach, Company Info Stolen From Third-Party App

Authorities break up gang responsible for €38 million CEO fraud

Belgium institutes nationwide vulnerability disclosure policy

Bing Chat's secret modes turn it into a personal assistant or friend

Building trust in IoT ecosystems: A privacy-enhancing approach to cybersecurity

Can Automation Replace People? 8 Key Roles Humans Play in Cybersecurity

Cash App, USPS, Overheadusa[.]com, and iPhone 14 on Amazon – Top Scams & Phishing Attempts of the Wee

CISA adds Cacti, Office, Windows and iOS bugs to its Known Exploited Vulnerabilities Catalog

Cisco fixed critical RCE bug in ClamAV Open-Source Antivirus engine

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

Critical RCE Vulnerability Discovered in ClamAV Open Source Antivirus Software

Cryptocurrency stolen by N.Korean hackers seized in Norway

Cybercriminals Use Havoc Post-Exploitation Framework in Attack Campaigns

Cybersecurity budgets to increase by 22% over 3 years, says Kaspersky

Cybersecurity Collaborative Targets Open-Source Software

Cybersecurity jobs remain secure, despite recession fears

Data Breach Reported At Mount Pleasant Central School District

Data Leak Hits Thousands of NHS Workers

Data exposed in Des Moines schools ransomware attack that disrupted district

Digital Vigilance – Is Your Business Properly Protected Online?

DNA Testing Company Settles After Major Data Breach

EU Cybersecurity Agency Warns Against Chinese APTs

European Cyber Agencies Warn of Chinese Espionage Threat

Evolving Threat Landscape Leading to Cybersecurity Pro “Burnout,” Study Says

Experts Warn of RambleOn Android Malware Targeting South Korean Journalists

FBI detects, contains cyber attack on New York office: News reports

FBI is investigating a cybersecurity incident on its network

Firm Fined £200K For "Exploitative" Call Campaign

Five easy steps to keep your smartphone safe from hackers

For the Many, One: MSP Cybersecurity Considered

Fortinet fixes critical RCE flaws in FortiNAC and FortiWeb

Fortinet fixes critical vulnerabilities in FortiNAC and FortiWeb

German airport websites hit by DDos attacks once again

GoDaddy: Hackers stole source code, installed malware in multi-year breach

Google Ads Spreads FatalRAT Malware, Disguised As Popular Apps

Google Report Reveals Russia's Elaborate Cyber Strategy in Ukraine

Hacker group “Anonymous Sudan” claims major cyber attack on Scandinavian airline SAS

Hackers Fake Emsisoft Certificate to Hide Attack

Hackers usam anúncios do Google para espalhar malware FatalRAT disfarçado de aplicativos populares

Highmark notifies members of data breach related to malicious email phishing campaign

How hackers can cause physical damage to bridges

Indigo launches temporary website – for browsing only – after cybersecurity incident

Introducing Security Insights and Actions for Serverless-Centric Apps

Lancashire County Council has referred itself following a data breach

Lessons to be learnt from Royal Mail ransomware attack

MKS Instruments, Inc. Files Notice of Data Breach Affecting Current and Former Employees

Moroccan News Agency MAP Target of DDoS Cyber Attack

Multi-Cloud Strategy is Appealing, but Security Confidence Lags

Nation-State Actors and Cyberattacks in the Emerging 5G Ecosystem

Navigating the ever-changing landscape of digital security solutions

New AI wave will find uses and abuses in cybersecurity

New Mirai Botnet Variant 'V3G4' Exploiting 13 Flaws to Target Linux and IoT Devices

Norway finds a way to recover crypto North Korea pinched in Axie heist

Norwegian police recover $5.8M crypto from massive Axie Infinity hack

Oakland City Declares State of Emergency Following Ransomware Attack

OAS and Cisco conclude second Meeting of the Cybersecurity Innovation Councils

Oficial do FBI alerta estados dos EUA sobre ameaça de hackers chineses

Open Systems Launches MXDR Service Leveraging Microsoft AI

PayPal Scammers Using Legitimate Accounts to Send Phishing Invoices

Privacy in the US workplace – a rapidly changing landscape

Reducing the Risk of Severe Data Breaches

Report Found 98% Of Organizations Partner With Breached Third Parties

SideWinder Behind Govt Phishing Spree Across the East

Solving the cybersecurity puzzle

The Five Important Moments In History That Shaped The Modern Cybersecurity Landscape

UK NCSC Launches Recommendations on Supply Chain Mapping

Understanding Zero-Day Vulnerabilities and the Clop Ransomware Fallout

Xavier University of Louisiana says the personal data of 44,000 students leaked in a November cyberattack

XIoT vendors get serious about security, devote resources to protect cyber-physical systems

Zero Trust Presents 'Doable' Cybersecurity Goals, State Department's CIO Says

Wealth management leader Succession Wealth investigating a cyber attack

West Lothian cancer patient slams NHS Lothian for 'inappropriate' data breach

Women are an untapped resource in cybersecurity


10 Dangerous Apps You Don't Want to Find On Your Kid's Phone

A major global chipmaking supplier claims an employee stole manufacturing secrets

Acting Pennsylvania Attorney General Henry Secures $400,000 Settlement with DNA Diagnostics Center Stemming from Data Breach

Application and cloud security is a shared responsibility

Atlassian says recent data leak stems from third-party vendor hack

Audit: MySejahtera Data Breach Affected Three Million Users

BEC Groups Target Firms With Multilingual Impersonation Attacks

Breaking the Security "Black Box" in DBs, Data Warehouses and Data Lakes

Burton Snowboards cancels online orders after 'cyber incident'

California medical groups; Pepsi experience data breaches

Challenging cost misconceptions in STEM education

ChatGPT Empowers Millions of Potential Cyberattackers

CISA’s Recognition of Security Control Validation is a Major Milestone

CISA warns of Windows and iOS bugs exploited as zero-days

City of Oakland Declares State of Emergency After Ransomware Attack

Conheça os mais procurados hackers do mundo cibernético

Crypto giant Binance moved $400 million from U.S. partner to firm managed by CEO Zhao

Cryptocurrency users in the US hit by ransomware and Clipper malware

Cybersecurity pros less likely to be impacted by layoffs if economy slows

Denying hackers a pay day will break the ransomware business model

ESXiArgs Ransomware Hits Over 500 New Targets in European Countries

Expected advancements in quantum cryptography

Experts Warn of Surge in Multipurpose Malware

Fraudsters are using machine learning to help write scam emails in different languages

Golpe do Instagram: hackers copiam perfis de mulheres para vender pornografia

Google Ads drop FatalRAT malware from fake messenger, browser apps

Hacker que clonava cartões bancários apanhado pela PJ a comprar relógios

Hackers backdoor Microsoft IIS servers with new Frebniis malware

Hackers Leverage PayPal to Send Malicious Invoices

Hackers Using Google Ads to Spread FatalRAT Malware Disguised as Popular Apps

Helping users and organizations build an instinctive data privacy habit

High-risk users may be few, but the threat they pose is huge

How SQL Server Temp Tables Work

Hyundai and Kia to patch a flaw that allows the theft of the cars with a USB cable

Microsoft: February updates break some Windows Server 2022 VMs

Mirai Variant V3G4 Exploiting IoT Devices for DDoS Attacks

New MortalKombat ransomware employed in financially motivated campaign

New Threat Actor WIP26 Targeting Telecom Service Providers in the Middle East

Nice Try Tonto Team: How a nation-state APT attempted to attack Group-IB

Over 500 ESXiArgs Ransomware infections in one day, but they dropped the day after

Perceived Cloud Security vs. Reality: Test Yourself

Private Data Breach Litigation Comes of Age

Quarter of Crypto Tokens Linked to Pump-and-Dump

Researchers Hijack Popular NPM Package with Millions of Downloads

Researchers Link SideWinder Group to Dozens of Targeted Attacks in Multiple Countries

Researchers Warn of Critical Security Bugs in Schneider Electric Modicon PLCs

Scandinavian Airlines says cyberattack caused passenger data leak

The US Government’s Open Source Security Policy Discussed

The war in Ukraine has shaken up the cybercriminal ecosystem, Google says

UK Policing Riddled with Chinese CCTV Cameras

US, UK Join Forces to Sanction Trickbot Leaders

What Is Google's New Privacy Sandbox for Android and How Can You Join the Beta?

What is the tokenization process and why it is so important?


7 Email Security Mistakes You're Making (and How to Fix Them)

10 signs that scammers have you in their sights

A Pentester’s Guide to Strengthening Your Cloud Security Defenses

A10 Networks loses sensitive corporate data to a Play ransomware attack

AdSense fraud campaign relies on 10,890 sites that were infected since September 2022

Advent Health settles data breach suit for $500K

Aker Solutions’ Brazilian arm becomes a victim of cyber attack

Attack surface management (ASM) is not limited to the surface

Beep, a new highly evasive malware appeared in the threat landscape

Binance and Huobi freeze $1.4M in crypto linked to North Korean hackers

China Courier Shares Dip After Alleged Massive Data Breach

Chinese hacker ‘Xiao Qi-ying’ attacks 5 more domestic servers… KISA “Checking the hacking path”

Citrix fixes severe flaws in Workspace, Virtual Apps and Desktops

City of Oakland declares state of emergency after ransomware attack

Combining identity and security strategies to mitigate risks

Community Health Systems data breach caused by GoAnywhere MFT hack

CompSource Mutual Insurance Company Reports Data Breach Affecting Thousands of Claimants

Controller-level flaws can let hackers physically damage moving bridges

Crypto-Stealing Campaign Deploys MortalKombat Ransomware

Cyber-Attack Hits Greece’s ‘Documento’ After Report on Fraudster’s Wife

Cyber Warfare & National Cybersecurity in the 21st Century: Five Key Takeaways

'Cybercriminal, Cheat' Russian Hacker Guilty Of Boston Stock Conspiracy: Feds

Data protection regulations aren’t enough to safeguard your data

Defending against attacks on Azure AD: Goodbye firewall, hello identity protection

Developing a successful cyber resilience framework

Does Poor Cybersecurity Affect Healthcare?

Electromed Proposes $825,000 Class Action Data Breach Settlement

Emsisoft says hackers are spoofing its certs to breach networks

Experts Warn of 'Beep' - A New Evasive Malware That Can Fly Under the Radar

Financially Motivated Threat Actor Strikes with New Ransomware and Clipper Malware

Four cyber attack trends that mustn’t slip under your radar

Google Rolling Out Privacy Sandbox Beta on Android 13 Devices

Health data of 4,000 Garrison Women’s Health patients exposed in third-party security incident

How Can Forex Brokers Deal with Data Breaches?

How Vital is Threat intelligence Data to a Successful Cyber Strategy?

Hyundai, Kia patch bug allowing car thefts with a USB cable

Indigo Still Offline In Suspected Cyber Attack

Industrial Control Systems (ICS) Vulnerabilities Chained for Deep Lateral Movement and Physical Damage

Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube

Italy’s cyber sleuths warn of global hacking attack

January’s ‘Most Wanted’ malware

LG U+ made contact with hacker group claiming data theft

LockBit and Royal Mail Ransomware Negotiation Leaked

Management, lack of money blamed for poor cybersecurity at Canadian hospitals

Meriplex Communications Announces Data Breach Affecting Malaga Bank Customers

Microsoft fixes three zero-days in its 75-flaw February Patch Tuesday

Microsoft Patches Three Zero-Day Bugs This Month

Mobile pharmacy data breach affects 66,372 patients, including at Banner Health

Mount Saint Mary College Reports Data Breach Affecting 17,924 Students and Employees

New MortalKombat Ransomware Attack Aiming for Crypto Wallets

North Korea's APT37 Targeting Southern Counterpart with New M2RAT Malware

PHI Compromised in 4 Recent Ransomware and Malware Attacks

Philadelphia Orchestra Suffers Cyber-Attack

Ransomware attack causes Oakland to declare local state of emergency

Ransomware attacks on industrial firms jumped 87 per cent in 2022, hitting renewable energy and utilities

Ransomware gang uses new zero-day to steal data on 1 million patients

Regular Pen Testing Is Key to Resolving Conflict Between SecOps and DevOps

Russian hacker convicted of $90 million hack-to-trade charges

SAS App and Website Hit as Attacks Target Swedish Firms

Scandinavian Airlines hit by cyberattack, ‘Anonymous Sudan’ claims responsibility

Secure 5G Networks Key for Business and Society

SideWinder APT Attacks Regional Targets in New Campaign

Students and staff impacted by Munster Technological University (MTU) cyber attack to be contacted directly

The Cyber Risks Of Scaling: How To Secure Your Expanding Attack Surfaces

The end of passwords as we know it: Why experts say the future of security is passwordless

The four most intriguing cyberattacks of 2022

The return of ICEFALL: Two critical bugs revealed in Schneider Electric tech

The Rise of Cybercrime: Understanding Hacking Basics and Protecting Your Online Activities

The risks and benefits of starting a vCISO practice

Threat Analysis: VMware ESXi Attacks Soared in 2022

Update Now: iOS Devices Receive Vital Security Updates from Apple

Update Now: Microsoft Releases Patches for 3 Actively Exploited Windows Vulnerabilities

What’s known about the ESXiArgs ransomware hitting VMware servers

Will Cyber Insurance Cover Nation-State Attacks in 2023?


1Password is saying goodbye to passwords in favor of passkeys. Here's why

A CISOs Practical Guide to Storage and Backup Ransomware Resiliency

Accenture Acquires Brazil-Based Cybersecurity Firm Morphus

Accenture acquires cybersecurity company Morphus

Actionable intelligence is the key to better security outcomes

Adsense abused: 11,000 sites hacked in a backdoor attack

Apple fixes actively exploited WebKit zero-day in iOS, macOS (CVE-2023-23529)

Apple fixes the first zero-day in iPhones and Macs this year

ChatGPT and more: What AI chatbots mean for the future of cybersecurity

Chinese Hackers Infiltrate South American Diplomatic Networks

Chinese Hackers Targeting South American Diplomatic Entities with ShadowPad

Cloudflare blocked record-breaking 71 million request-per-second DDoS attack

Cloudflare Stops Largest HTTP DDoS Attack on Record

Cyber Attacks Rise by 79%, says Report

Cybersecurity guide outlines growing threat

Cybersecurity High-Risk Series: Challenges in Protecting Privacy and Sensitive Data

Employee Service Provider Personal Group Deploys LogRhythm SIEM to Proactively Fight Cybersecurity Threats

Enigma info-stealing malware targets the cryptocurrency industry

Eurostar forces 'password resets' — then fails and locks users out

Expert warns Irish universities to ‘urgently’ review cybersecurity after MTU data leaked on dark web

Experts discover over 451 clipper malware-laced packages in the PyPI repository

Financial cybersecurity expert to speak at UB

Get hired in cybersecurity: Expert tips for job seekers

Goldman Sachs says buy Palo Alto Networks as the cybersecurity company diversifies its business

Google Vertex AI Vision: Revolutionizing E-Commerce?

Hackers Breach Pepsi Bottling Ventures' Network

Healthcare giant CHS reports first data breach in GoAnywhere hacks

How companies can minimize the cybersecurity risk from their tech vendors

How to Close the Cybersecurity Skills Gap: Collaboration, Creativity, and Education

How to prevent DDoS attacks

How to Tackle Cybersecurity Threats with a Risk-Based Approach

Indigo website still offline nearly 1 week after cybersecurity incident

Malware that can do anything and everything is on the rise

Massive AdSense Fraud Campaign Uncovered - 10,000+ WordPress Sites Infected

Massive HTTP DDoS Attack Hits Record High of 71 Million Requests/Second

Measuring cybersecurity: The what, why, and how

MedCrypt Expands Cybersecurity Partnerships with Leading Diabetes Technology Companies to Bring Digital Innovations for Millions of People Worldwide

Medical Device Cybersecurity: Are you Prepared?

Microsoft Edge update starts disabling Internet Explorer 11 today

Next-Gen: How A Security Researcher Turned EDRs Into Wipers Using 0-Day Exploits

New ‘MortalKombat’ ransomware targets systems in the U.S.

New stealthy 'Beep' malware focuses heavily on evading detection

New Year, More Cybersecurity Concerns: What To Expect In 2023

NPM packages posing as speed testers install crypto miners instead

Patch Now: Apple's iOS, iPadOS, macOS, and Safari Under Attack with New Zero-Day Flaw

Plurilock Announces Multi-Year Sale Order for Flagship Cybersecurity Software with Overseas IT Solutions Provider

Python Developers Beware: Clipper Malware Found in 450+ PyPI Packages!

QCI Commences Cyber Security Launch as Patent is Awarded Addressing Unconditional Network Security

Qualys expands cloud platform, introduces all-inclusive cybersecurity packages

Resurrected Crypto-mixer Launders $100m in North Korean Funds

Rohde & Schwarz, Chemnitz University of Technology partner for R&D in cybersecurity

Russian cybersecurity expert convicted of charges in $90M hack-to-trade case

Spanish Police Bust €5m Phishing Gang

Steps CISA should take in 2023

The Tor network hit by wave of DDoS attacks for at least 7 months

Why Keeping Your Gaming Console Secure Should be a Priority in 2023

Wisconsin Resident Producers Required to Submit Annual Cybersecurity Certification By March 1, 2023


$1.3 billion lost by 70,000 Americans to romance scams last year

Accenture surpreende e adquire a empresa brasileira Morphus

All but Florida, South Dakota apply for federal cyber grants allocated by infrastructure bill

As regulations skyrocket, is compliance even possible anymore?

Binance é condenada a ressarcir cliente brasileiro que diz ter sido vítima de ataque hacker

California healthcare organizations alert 3M patients of a ransomware attack in December

Can we predict cyber attacks? Bfore.AI says they can

Chinese Tonto Team Hackers' Second Attempt to Target Cybersecurity Firm Group-IB Fails

City of Oakland, Irish and Israeli universities suffer ransomware attacks

Cyber attack forced Canada's largest bookstore chain to shut website, accept only cash payments

Cyber criminals using ChatGPT to create malware, do phishing

Cybercriminals exploit fear and urgency to trick consumers

Data Breach: Overcoming a Critical Cyber Threat as it Becomes More Common

DHL, MetaMask phishing emails target Namecheap customers

Do Retail Forex Brokers Take Cyber Security Seriously Enough?

Email, collaboration tools top targets as SA braces for new year of cyberattacks

Ensure Business Continuity with a Purpose-built Data Protection Solution for HCI (Hyperconverged Infrastructure)

Evolving cybersecurity threats require modern defences

Galway Credit Unions urges public to be vigilant following SMS phishing scam

Hacker Reveals Microsoft’s New AI-Powered Bing Chat Search Secrets

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players' Systems

Hackers target Valentino, Michael Kors, and Creed fashionistas

Hackers Targeting U.S. and German Firms Monitor Victims' Desktops with Screenshotter

Hacktivists hacked Iranian State TV during President’s speech on Revolution Day

Honeypot-Factory: The Use of Deception in ICS/OT Environments

How cybercriminals use phishing and other tricks to hack smartphones

How To: Maximize Security ROI Amid an Economic Downturn

How To Protect Against AI-Based Email Security Threat Vectors

Information overload is a key barrier to effective threat intelligence, says Mandiant

Israel’s top tech university postpones exams after ransomware attack

Kimmel Center, Philadelphia Orchestra websites hit by cyber attack

Lazarus hackers use new mixer to hide $100 million in stolen crypto

Majority of Firms Make Cybersecurity Decisions Without Attacker Insight

MetaMask users targeted in Namecheap email scam

MoneyGram Fraud Victims Get $115m in Compensation

Mount Saint Mary College confirms ransomware attack in December

Namecheap Customers Flooded with Phishing Emails

Pepsi Bottling Ventures suffers data breach after malware attack

Philadelphia Orchestra, Kimmel Center websites down after cyberattack cripples ticket sales

Play Ransomware Group Claims Attack on A10 Networks

Ransomware hits Technion university, protests tech layoffs and Israel

Reimagining zero trust for modern SaaS

Researcher says PokerBaazi exposed users’ information, platform denies data breach

Researchers Uncover 700+ Malicious Open Source Packages

Royal Ransomware Deep Dive

Several NATO websites suffer cyber attack

Social security numbers exposed in N.J. school district data breach

Spain, U.S. dismantle phishing gang that stole $5 million in a year

SynSaber Report Brings More Context to ICS Security

Trickbot Hacking Group Jointly Sanctioned By the US and Britain

Typosquatting: Legit Abquery Package Duped with Malicious Aabquerys

Uncover the Default Passwords Lurking in Your Active Directory

Under pressure – how can CISOs avoid burnout in the face of ransomware?

Vulnerabilities open Korenix JetWave industrial networking devices to attack

What was the extent of damage in a recent cyber attack on India’s top medical institute in Delhi?

Why Are Small Businesses At Highest Ransomware Risks

Wormhole hacker moves another $46M of stolen funds


4 misconceptions about data exfiltration

15 ways to spot online shopping scams

Cyber deterrence

Data breach forcing companies to hike service charge

Data leak: Social media Slick exposed children’s user data

Devs targeted by W4SP Stealer malware in malicious PyPi packages

Florida Supreme Court, US, Europe hit by ransomware attacks

Hackers create ChatGPT-driven Telegram bots that can write malware

Hackers interrompem discurso de presidente do Irã no aniversário da Revolução Islâmica

Hackers target Israel’s Technion demanding huge sum in Bitcoin

HSE data leak: Thousands waiting for letter to find out if they were impacted by HSE cyber attack

Iranian President Raisi’s Speech Briefly Hacked On 44th Anniversary Of Islamic Revolution

Irish university confirms data posted on darkweb after cyber attack

Munster Technological University (MTU) confirms data has been published on the dark web following ransomware attack

Munster Technological University (MTU) data appears on dark web after cyber attack

NameCheap's email hacked to send Metamask, DHL phishing emails

Phishing scam scares users into sharing Facebook passwords

Ransomware attacks hit US courts, European universities

Reddit hacked in sophisticated, highly-targeted phishing attack

Seoul Sanctions North Korea Over Crypto Theft

South African Hacker Group Cheats Microsoft and Salesforce of Millions of Dollars in Resources to Mine Crypto

The number of reported ransomware attacks in Calgary fell 41% last year Pipa News

Theft & Scam Alert: First they steal your iPhone and then they use Phishing to fool you into giving up your Apple ID and Password

Using the blockchain to prevent data breaches

Your online transaction may be a scam

DAILY NEWS: Fevereiro (12/02 - 11/02) - 06 Semana de 2023

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.


Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page