top of page

DAILY NEWS: Julho (16/07 - 22/07) - 29 Semana de 2023

Cyber Security and Information Security News --- Daily Updates !! Weekly Resume

22/07


5 signs of a hacked webcam


10 Essential Cybersecurity Tips for Small Businesses


10 most ‘copied’ brands by hackers to steal your personal, financial data


AI being used for hacking and misinformation, top Canadian cyber official says


AI scam calls imitating familiar voices – here’s how they work


Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands


Beware of nasty Facebook recovery code email scam that will steal your info


Black Basta e Big Head: Atenção a estes ataques de ransomware


Class action lawsuit targets Johns Hopkins Univ. after health system data breach


CoWIN Portal Data Breach: Indian Health Ministry Registers FIR, Vows Serious Action


Cyber Crime and Cyber Security


Descubra como se proteger da nova tendência entre os hackers: o sequestro virtual


Emails Of US Envoy To China, Senior State Department Official Accessed In Chinese Cyber Attack: Report


Google Docs phishing scams are on the rise - here's what you need to know


GTA 6 | Julgamento do hacker de 90 gameplays de Grand Theft Auto VI tem desfecho


Here Is The Dank & Offensive AI


Microsoft Dominates as the Most Impersonated Brand for Phishing Scams in Q2 2023


Mito ou Verdade: Desligar o celular durante 5 minutos Protege Contra Hacker?


NTT Docomo data breach: Ex employee steals millions of user info


Over 15K Citrix servers likely vulnerable to CVE-2023-3519 attacks


Phishers Exploiting Google Docs to Harvest Crypto Credentials


Practical Ways to Prevent Your Home Security Cameras From Being Hacked


Roblox Data Leak Resurfaced With The Personal Details Of Nearly 4,000 Employees


SECP and PTA pledge to enhance cyber security in Pakistan’s digital landscape


Sob ataque, STF vai reforçar segurança armada e monitoramento anti-hacker


Strengthening European Cybersecurity with Advanced Data Diode Technology


Tech lead of Google-owned virus database apologises for leak


The Evolution of Passwordless Authentication Methods in Internet Security


Phishing threats loom as SIM registration deadline nears


Unlocking Security Success: The Power of an Adversary-Focused Approach for Organizations


What is Dynamic Application Security Testing (DAST)?


21/07


8 Best Enterprise Password Managers for 2023


Airlines are wargaming worst-case cyber scenarios


Apache OpenMeeting Flaw Allows Server Hijacks and Command Execution


Attackers intensify DDoS attacks with new tactics


Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports


Bologna Sandwich Or Crown Jewels: What’s Your Zero Trust Approach To Cybersecurity?


BSides Sofia 2023 – Alexander Nedelchev – Unencrypted Malware, The Invisible Threat


Chinese Hackers Breached Ambassador’s Email – Report


CISA sees CDM program entering ‘new era’ with focus on cyber defense operations


CISOs are making cybersecurity a business problem


Citrix ADC zero-day exploitatation: CISA releases details about attack on CI organization (CVE-2023-3519)


Citrix NetScaler ADC and Gateway Devices Under Attack: CISA Urges Immediate Action


Cleantech and Quantum Computing: Critical Infrastructure Cybersecurity


Clop Drives Record Ransomware Activity in June


Clop gang to earn over $75 million from MOVEit extortion attacks


Code42 adds customizable insider risk alerts to Incyder


DDoS Botnets Hijacking Zyxel Devices to Launch Devastating Attacks


Dell Adds Orchestration Capabilities to Data Protection Platform


DevOps Automation with AWS CodePipeline and AWS CodeDeploy


Embaixador dos EUA tem conta de e-mail invadida por hackers chineses


European Parliament Backs Draft Cyber Resilience Act for Secure Digital Products


Experts believe North Korea behind JumpCloud supply chain attack


GitHub Warns Devs of North Korean Attacks


'Hacker do bem' recebe R$ 28 mil por identificação de falha em sistema de empresa


Hackers Exploiting Artificial Intelligence for Malicious Activities, Says Canadian Cybersecurity Official


Hackers Fraudulent Job offers to target University Students


HotRat: New Variant of AsyncRAT Malware Spreading Through Pirated Software


How Can Passengers' Personal Devices Potentially Pose Cyber Threats To Aircraft?


How healthcare organizations should measure their device security success


How to Access Your iPhone if You Forget Your Passcode


IA está sendo usada para ataques hackers, alerta Canadá


Kevin Mitnick: Morreu o hacker mais procurado do mundo


Kevin Mitnick, o hacker mais famoso do mundo, morre aos 59 anos


Leveraging Adversarial Machine Learning for Enhanced Cybersecurity


Life sciences leaders act to counter insider-driven data loss


Local Governments Targeted for Ransomware – How to Prevent Falling Victim


Managed Security Services Provider (MSSP) Market News: 21 July 2023


Managing cross-cloud complexity as a cybersecurity stumbling block


Maritime Cyber Security Concerns


MiDO Academy and Nclose: Educating students about cyber security from grassroots level


Morre hacker mais famoso de todos os tempos


Navigating the Cyber Threat Landscape in the Aerospace Industry


Netscaler ADC bug exploited to breach US critical infrastructure org


New CISO appointments 2023


Nice Suzuki, sport: shame dealer left your data up for grabs


Nicholas Burns, Other US Officials Fall Prey To Chinese Hackers; Email Accounts Breached


North Korean hackers targeted tech companies through JumpCloud and GitHub


Plurilock Launches Generative AI 'Guardrails' Product for Workforces


Resilience in a Cyber World—Three Critical Steps Towards a Mature Cyber Security Program


R.I.P. Kevin Mitnick, 1963–2023


Russia Seeks 18 Years in Jail for Founder of Cybersecurity Firm


Russian medical lab Helix hit by cyberattack, leaving customers without test results


Russian Prosecutor Asks for 18 Years in Jail for Group-IB Founder


Rutgers, Stony Brook Among Colleges Warning of Data Exposure From MOVEit Hack


Safeguarding workspaces from escalating cyber attacks: A comprehensive guide


Software Supply Chain Attackers Targeting Banks, Checkmarx Says


Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities


The Future of Smart Grid Cybersecurity: Challenges and Solutions


The growing impact of generative AI on cybersecurity and identity theft


Top Threatening Network Vulnerability in 2023


US diplomat's email account caught in Chinese hackers' crosshairs


US DoJ Announces Plan to Shakeup Cybercrime Investigations


VirusTotal apologizes for data leak affecting 5,600 customers


20/07


1st Source Bank attack exposes 450,000 people


67% of daily security alerts overwhelm SOC analysts


97% of organizations report plans to use generative AI by 2025


260,000 dating app accounts exposed in enormous 340GB data breach


A Few More Reasons Why RDP is Insecure (Surprise!)


A fresh look at the current state of financial fraud


Activists target Ontario hog farm with ransomware


Adobe Rolls Out New Patches for Actively Exploited ColdFusion Vulnerability


Adobe out-of-band update addresses an actively exploited ColdFusion zero-day


AI, Ransomware Remain Prevalent in Evolving Cybersecurity Landscape


Akamai Survey: API-Specific Controls are Lacking


ALPHV/BlackCat and Clop gangs claim to have hacked cosmetics giant Estée Lauder


Apache OpenMeetings Web Conferencing Tool Exposed to Critical Vulnerabilities


APT41 hackers target Android users with WyrmSpy, DragonEgg spyware


As online engagement rises, Indian firms vulnerable to cyber attacks


Attention-seeking KillNet hacktivists becoming more dangerous


AV cyber security depends on open communication


Bangladesh Bank (BB) issued cyber-attack warning for banks, financial institutions


Biden-Harris administration initiates cybersecurity labelling for smart devices


CDN Service Exposes Users to Malicious Packages for Phishing Attacks Invisible to Security Tools


Chrome 115 Update for Windows, MacOS, and Linux – 20 Vulnerabilities Patched


CISA and Microsoft partner to expand access to logging capabilities


Clop lists ten more organisations as victims of the MOVEit Transfer hack


CNI Firms: Climate Tech is Increasing Cyber Risk


Critical AMI MegaRAC bugs can let hackers brick vulnerable servers


Critical Flaws in AMI MegaRAC BMC Software Expose Servers to Remote Attacks


Cyber Fortresses: Building Trust and Ensuring a Safe Shopping Journey in E-commerce


Cyber insurers adapting to data-centric ransomware threats


Cyberattack on GitHub customers linked to North Korean hackers, Microsoft says


Cybersecurity Best Practices: Strengthening Defenses to Mitigate the Risk of Cybercrime


Cybersecurity must evolve to tackle rising phishing trends


Eight Steps To Negotiating With Ransomware Hackers


Email attacks skyrocket by 464% in H1 2023, reveals Acronis report


Estee Lauder Breached by Two Ransomware Groups


Expert warns Barbie and Oppenheimer fans to watch out for scammers that may drain your bank account


Exploring the macro shifts in enterprise security


FIN8 Group Using Modified Sardonic Malware for Deployment of BlackCat Ransomware


First search result leads to malware: crooks now paying for ads


FTX Users Potentially Targeted in Possible Phishing Attack as Bankruptcy Claims Deadline Nears


Global Ransomware Attacks in June up 221% Year-on-year


GuidePoint Research and Intelligence Team’s (GRIT) 2023 Q2 Ransomware Report Highlights a 100% Year-Over-Year Increase in Public Ransomware Victims


Hacker steals 4 MAYC NFTs using less than $15


Hackers da Coreia do Norte invadem empresa de TI dos EUA em tentativa de roubar criptomoedas


Hacking the Las Vegas MSG Sphere: Is It Possible?


Half of AI Open Source Projects Reference Buggy Packages


How municipalities are dealing with being low-hanging targets for hackers


How to strengthen data security for Office 365


Human Cyber-Risk Can Be Demonstrably Mitigated by Behavior Changing Training: Analysis


Infamous hacker Kevin Mitnick dead at 59


‘It feels like a digital hurricane’: Coastal Mississippi county recovering from ransomware attack


JumpCloud breach traced back to North Korean state hackers


June 2023 Healthcare Data Breach Report


Kevin Mitnick, Hacker Who Once Eluded Authorities, Is Dead at 59


Mallox Ransomware Exploits Weak MS-SQL Servers to Breach Networks


Mass hack at BBC, British Airways, Boots and DHL sparks class action lawsuit probe


Microsoft Exchange servers compromised by Turla APT


Microsoft Expands Cloud Logging to Counter Rising Nation-State Cyber Threats


Microsoft libera ferramentas gratuitas de segurança cibernética após ataque hacker


Microsoft Strengthens Cloud Logging Against Nation-State Threats


Morreu Kevin Mitnick, o “hacker mais procurado da América”


MOVEit Data Breach Hits 30 Colleges via TIAA, Other Vendors


My go-to cleaning app for Mac just got a major security upgrade


National Cyber Security Centre chief warns AI must improve cyber security


Never skip ‘backup day’ …


New P2PInfect worm malware targets Linux and Windows Redis servers


New P2PInfect Worm Targeting Redis Servers on Linux and Windows Systems


New Ransomware With RAT Capabilities Impersonating Sophos


New Study Highlights Critical Infrastructure's Resilience


Nice Suzuki, sport: shame dealer left your data up for grabs


North Korean State-Sponsored Hackers Suspected in JumpCloud Supply Chain Attack


Norwegian recycling giant TOMRA forced to take systems offline following a cyber attack


Old Roblox Data Leak Resurfaces, 4000 Users' Personal Information Exposed


Only Fans hacked by Anonymous Sudan


OpenSSH vulnerability uncovered by researchers, RCE exploit developed


P2PInfect, a Rusty P2P worm targets Redis Servers on Linux and Windows systems


P2PInfect: Self-Replicating Worm Hits Redis Instances


Philippines ranks 5th in SEA for highest phishing incidents


Phoenician Medical Center said March cyber attack compromised the data of 162k patients


Public ransomware victims increase 100 percent year-on-year


Q2 observed more ransomware events than Q1


Quem foi Kevin Mitnick, o ex-hacker mais procurado do mundo


Ransomware Attack Hit Japan's Busiest Port


RIP Kevin Mitnick: Former most-wanted hacker dies at 59


Russian hacker group leaks data on 1,700 Ukrainian security servicemen


Singapore releases draft guidelines on personal data use in AI training


Sophisticated HTTP and DNS DDoS attacks on the rise


South Africa on the verge of being named the cybercrime capital of Africa


Splunk unveils Attack Analyzer to automate malware, phishing attack analysis


Tampa General reports confidential data of 1.2 million patients hacked


Tampa hospital says sensitive data of 1.2 million stolen in failed ransomware attack


Thales confirms its key role to provide cybersecurity for Galileo Second Generation to meet tomorrow's threats


Thanks Storm-0558! Microsoft to expand default access to cloud logs


The Evolving Cyber Threat Landscape: Proactive Measures


Thousands of players affected in Roblox security breach and blackout


Threat Actors are Targeting Your Web Applications – Here’s How To Protect Them


Turla's New DeliveryCheck Backdoor Breaches Ukrainian Defense Sector


Vítimas de hack ao MOVEit já são 200; hackers falam em 400


Zyxel Vulnerability Exploited by DDoS Botnets on Linux Systems


What Is an SSL Stripping Attack?


What the Government Email Account Hack Says About the Future of Cybersecurity


Why data travel is healthcare’s next big cybersecurity challenge


Why Generative AI is a Threat to API Security


Windows ransomware group Cl0P leaks some PwC files on clear web


WormGPT: What to know about ChatGPT's malicious cousin


19/07


2022 ransomware attacks declined in number but grew in sophistication


A Guide to GDPR Compliance


Adobe emergency patch fixes new ColdFusion zero-day used in attacks


An ‘Alarming Escalation’ of Sophistication in DDoS Attacks, Cloudflare Says


As digital gets stronger, India Inc remains susceptible to cyber attacks: Rubrik


Assessing the Current State of Geopolitics and Cybersecurity


Attacker ID’ed After Infecting Own Computer With Malware


Bad.Build Flaw in Google Cloud Build Raises Concerns of Privilege Escalation


BB issued cyber attack warning for banks, financial institutions


Biden-Harris Administration Unveils Smart Device Cyber Program


BlackCat and Clop gangs both claim cyber attack on Estée Lauder


BlackCat, Clop claim ransomware attack on cosmetics maker Estée Lauder


Central bank alerts banks, NBFIs to cyber-attack risks


Chinese APT41 Hackers Target Mobile Devices with New WyrmSpy and DragonEgg Spyware


Chinese APT41 Linked to WyrmSpy and DragonEgg Surveillanceware


CISA and NSA Issue New Guidance to Strengthen 5G Network Slicing Against Threats


CISA, Microsoft Partner to Expand Cloud Logging Access Following Cyberattack


Citrix NetScaler zero-day exploited in the wild, patch is available (CVE-2023-3519)


Cloudflare reports surge in sophisticated DDoS attacks


Cohesity Highlights Reliance on Legacy Tech is a “Recipe for Disaster” as Cyber Threats Rise


Critical API Security Gaps Found in Financial Services


CVE-2023-3765: Critical flaw in open source machine learning development MLflow


Cyberattack hits cosmetics giant Estee Lauder


Cybersecurity measures SMBs should implement


Dark.IoT & Custom Botnets Exploit Zyxel Flaw in DDoS Attacks


Detecting eBPF Malware with Tracee


eBook: 9 Ways to Secure Your Cloud App Dev Pipeline


Escalating Privileges via Third-Party Windows Installers


Estée Lauder data stolen in cyberattack


Estee Lauder Hacked And Data Stolen


Estee Lauder Hit by Cyber Attack, With Some Business Operations Disrupted


Exploring the Dark Side: OSINT Tools and Techniques for Unmasking Dark Web Operations


Facebook behavioral ads banned by Norwegian privacy watchdog


Famed Hacker Kevin Mitnick Dead at 59


FBI: Tech support scams now use shipping companies to collect cash


Google is cutting off internet access for some employees. Here's why


Hacker consegue derrubar partida de CS2 após se irritar com jogadores


How Cyber Threat Intelligence Practitioners Should Leverage Automation and AI


How to Manage Your Attack Surface?


Industry Experts Urge CISA to Update Secure by Design Guidance


Malware risk in AI software packages, warns analyst


Microsoft expands access to cloud logging data for free after Exchange hacks


Microsoft: Hackers turn Exchange servers into malware control centers


NCA: Nation States Using Cybercrime Groups as Proxies


Norwegian Giant Tomra Suffers “Extensive” Attack


O Bradesco (BBDC4) informou, que sua unidade de Nova Iorque foi alvo de um ataque Hacker


Open Source Security Incidents and How Organizations Can Respond


OpenAI credentials stolen by the thousands for sale on the dark web


Ortivus' electronic patient record system are down for some United Kingdom based customers due to a cyber-attack


PCI-DSS 4.0 is Here. What Does it Mean for Online Retailers?


Rubrik unveils integration with Microsoft 365 Backup to boost cyber resilience and recovery


Scam Job Offers Target Uni Students


Stephen F. Austin State University (SFA) Cyber Attack


Supply chain executives unaware of growing customer trust issues


TomTom moves to protect data after being targeted by ransom group in cyber attack


Trends in ransomware-as-a-service and cryptocurrency to monitor


UK airports 'targeted by coordinated Russia cyber attack groups'


Ukraine takes down massive bot farm, seizes 150,000 SIM cards


U.S. Cyber Trust Mark labeling program raises the bar for smart devices’ cybersecurity


U.S. Government Blacklists Cytrox and Intellexa Spyware Vendors for Cyber Espionage


US govt bans European spyware vendors Intellexa and Cytrox


Using AI/ML to optimize your tech stack and enhance business efficiency


Zero-Day Attacks Exploited Critical Vulnerability in Citrix ADC and Gateway


What is the new Enhanced Safe Browsing for Gmail (and should you enable it)?


What to do (and what not to do) after a data breach


Windows 11 setup: Which user account type should you choose?


WormGPT: What you need to know about the cybercriminal version of ChatGPT


18/07


$8M cyber scammer gets eight years in US jail


12 open-source penetration testing tools you might not know about


70% of life sciences see a rise in insider data loss incidents


A Look at the Email Threat Landscape in Q1 2023


Adobe ColdFusion vulnerabilities exploited to deliver web shells (CVE-2023-29298, CVE-2023-38203)


Advanced AI security tools are improving security posture of cloud-driven businesses


Are Facebook Quizzes a Cybersecurity Risk?


Armis, Honeywell Uncover Vulnerabilities in Honeywell Systems


Ataques hackers: EUA querem aumentar segurança de eletrodomésticos


Broadband consumers demand security and sustainability


Business Leaders Appear Less Concerned by Cyber Risk: Report


Canadian phishing scammer Soup allegedly stole over $1m in crypto


CISA orders govt agencies to mitigate Windows and Office zero-days


Crypto Ransomware Attacks Rise in First Half of 2023: Chainalysis


Cyber Attacks at 2-Year High


Cybercriminals Exploiting WooCommerce Payments Plugin Flaw to Hijack Websites


Cybercriminals in the UAE are upping their game


Cybersecurity firm Sophos impersonated by new SophosEncrypt ransomware


Cybersecurity threatscape in the Middle East: 2022-2023


Data compromises on track to set a new record


drIBAN Fraud Operations Target Corporate Banking Customers


Email Phishing Protection Must Leave No Stone Unturned


Exploited 0-days, an incomplete fix, and a botched disclosure: Infosec snafu reigns


Fair Work Ombudsman caught up in HWL Ebsworth breach


FIA World Endurance Championship driver passports leaked


FIN8 deploys ALPHV ransomware using Sardonic malware variant


FIN8 Group Using Modified Sardonic Backdoor for BlackCat Ransomware Attacks


From Colonial Pipeline to JBS, how ransomware gangs negotiate ransom payments


Generative AI Tool Without Ethical Restrictions Offered on Hacking Forums


Go Beyond the Headlines for Deeper Dives into the Cybercriminal Underground


Google Bard found to have some serious security flaws


Google Cloud Build bug lets hackers launch supply chain attacks


Google exposes intelligence and defense employee names in VirusTotal leak


Google fixes ‘Bad.Build’ vulnerability affecting Cloud Build service


Governo Biden anuncia selo para aparelhos menos vulneráveis a hackers


GTA 6 teenage hacker deemed unfit to appear in trial


'Hacker do bem' identifica falha em site de empresa e ganha R$ 28 mil


Hacker Infected & Foiled by Own Infostealer


Hackers que desviaram R$ 1 milhão de banco são condenados a 326 anos


Healthcare organizations in the crosshairs of cyberattackers


Henry Ford Health notifies 168,000 patients of data breach


Herts County Council subject to ‘targeted phishing attack’


Hillsborough County notifies over 70,000 individuals of potential data breach


How low payment demands keep fraudsters invisible


How Massive Phishing Campaigns Abuse Decentralized Web Hosting To Scam Victims


How to Protect and Secure Your Data in 10 Ways


HTML Attachments Used in Malicious Phishing Campaigns Skyrocket: Increase 168% from 2022 and 450% from 2021


Imagine360 Suffers Third-Party Data Breach, 112K Impacted


Indian Organisations Targeted 2146 Times Per Week, Double The Global Average


Iron ore giant Fortescue Metals targeted by Russian ransomware group


IT Security Pro Jailed for Attempted Extortion


JumpCloud Blames 'Sophisticated Nation-State' Actor for Security Breach


JumpCloud Confirms Data Breach By Nation-State Actor


JumpCloud revealed it was hit by a sophisticated attack by a nation-state actor


Kaspersky: Malaysia remains top three phishing targets in SE Asia


Key cybersecurity risks to consider during custom apps and software development


Linux Ransomware Poses Significant Threat to Critical Infrastructure


LockBit expands its reach, now targeting macOS


Major government hack a wake-up call for agencies


Malicious ChatGPT Clone WormGPT Used to Launch Email Attacks


‘Man-in-the-Middle’ Cyber Heist: How Change Of One Letter Cost Pune Engineering Firm Rs 22 Lakh


Manga App Shonen Jump+ Apologises for Data Breach


Maritime cyber attacks database launched


Microsoft Dominates as the Most Impersonated Brand for Phishing Scams in Q2 2023


New critical Citrix ADC and Gateway flaw exploited as zero-day


New Vulnerabilities Found in Adobe ColdFusion


Norwegian Refugee Council says thousands affected in online database breach


Odessa, Texas, Mayor Says City Hit by Data Breach


Owner of BreachForums Pleads Guilty to Cybercrime and Child Pornography Charges


Pakistani Entities Targeted in Sophisticated Attack Deploying ShadowPad Malware


Phoenician Medical Center notifying 162,500 patients of attack that “disrupted” IT systems


Ransomware on the rise: Cohesity’s research exposes UK firms’ security vulnerabilities


Safeguarding mobile health patients from the threat of ransomware


Six steps to protect your organisation from a cyber attack


Sogu, SnowyDrive Malware Spreads, USB-Based Cyberattacks Surge


Stephen F. Austin State University (SFA) reports some personal student info stolen in June cyber hack


Suspected Scareware Fraudster Arrested After Decade on the Run


The growing need for business communication security


The Two Faces of AI in Identity Management


This is why personal encryption is vital to the future of business


Threat Intelligence & The Cyber Kill Chain: The Complete Guide


TJ Maxx parent company named in MOVEit hack


Two more foreign spyware firms blacklisted by US


Typo directs millions of US military emails to Mali by mistake


UKG agrees to pay up to $6M in lawsuit tied to 2021 breach


Ukraine cops crack down on pro-Russian bot farm


Ukraine police bust another bot farm accused of pro-Russia propaganda, internet fraud


VirusTotal Data Leak Exposes Some Registered Customers' Details


VirusTotal leaked data of 5,600 registered users


What happens when our data gets leaked: Here's how concerned you should be


WooCommerce Bug Exploited in Targeted WordPress Attacks


WordPress WooCommerce Payments bug exploited in the wild


17/07


95% of patients fear they will face data breach


A single Indian firm facing 2,146 cyber attacks a week on average: Report


Accreditation Commission for Education in Nursing reveals data breach


Adobe warns of critical ColdFusion RCE bug exploited in attacks


Addressing the Mobile Malware Threat With Zero-Trust


Admins of Genesis Market marketplace sold their infrastructure on a hacker forum


Advanced Medical Management Experiences Data Breach That Leaked PHI and SSNs


AMC Theatres Files Notice of Data Breach That Leaked an Unknown Number of Social Security Numbers


APT Group Red Menshen is Rapidly Evolving its BPFDoor Malware


Barts Health NHS Trust faces ransomware threats from Russian organisation BlackCat


Beware of AI-generated phishing attacks; they are so real!


BreachForums Admin Pleads Guilty to Hacking Charges


By criminals, for criminals: AI tool easily generates ‘remarkably persuasive’ fraud emails


Canadian Phishing Scammer Exposed For Stealing Over $1 Million In Crypto And NFTs


CERT-UA Uncovers Gamaredon's Rapid Data Exfiltration Tactics Following Initial Compromise


Cisco Nexus 9000 Users Must Disable Encryption to Dodge Vuln


CISOs under pressure: Protecting sensitive information in the age of high employee turnover


Confidence in the cloud: why cloud security matters more than ever


Criminals launch subscription-based WormGPT without ethical constraints


Critical XSS vulnerability in Zimbra exploited in the wild (CVE-2023-34192)


Crypto Hackers Net Nearly $480 Million Year-to-Date


Cyberattack compromised JumpCloud customer environments


Cyberattacks are Warfare


Cybercriminals Exploit Microsoft Word Vulnerabilities to Deploy LokiBot Malware


Cybercriminals in the UAE are upping their game


Cybersecurity Report: Growing Risks in Healthcare


Data Breach Exposes Student, Staff Info at 7 Idaho Colleges


Data breaches on pace for a new record in 2023


Database Mess Up Exposed PII and Photos of 2.3M Dating App Users


Dating App That Claims 50 Million Users Suffered a Data Breach


Digital maturity is a growing factor in cybersecurity practices


EU Urged to Prepare for Quantum Cyber-Attacks


Facebook and Microsoft are the Most Impersonated Brands in Phishing Attacks


Fake Ads Manager Software and Malicious Extensions Target Facebook Accounts


F.B.I., C.I.S.A. Confirm Collaboration To Address Cyberattack On U.S.


FBI: Texas, Rest of U.S. Experiencing More Cyber Attacks


Fostering growth in the digital era through cyber resilience


Global Internet Breach May Impact Hillsborough Residents, Businesses


Google Bard security flaw could be attracting scammers to its services


Google Removes Swing VPN Android App Exposed as DDoS Botnet


Grand Theft Auto 'hacker' from Oxford is 'not fit to stand trial'


Growing scam activity linked to social media and automation


Hacker rouba perfil do Instagram, ameaça vítima e utiliza inteligência artificial para aplicar golpes financeiros


'Hacker's dream': Threads gobbling up sensitive information on its millions of users


Hacker's Latest Target: The Electric Vehicle


Hackers Exploit WebAPK to Deceive Android Users into Installing Malicious Apps


Hackers Target Multichain Users With Fake Twitter Account


Healthcare organizations hesitant to adopt new software patches


HMRC issues urgent warning over ‘money stealing’ text ahead of deadline in weeks


Hospitals, health systems facing lawsuits for data breaches


How AI is Tightening Cybersecurity for Businesses


How popular AI apps are invading your privacy


How Threat Actors Leverage AI to Advance Healthcare Cyberattacks


How To: Prevent Ransomware Attackers Striking Again


Hyderabad companies scramble to firewall hackers as ransomware holds data hostage


Indian researchers remove 3K malicious content targeting firms across sectors


Insights from BDO & AusCERT Cyber Security Survey


IT worker jailed for impersonating ransomware gang to extort employer


JumpCloud discloses breach by state-backed APT hacking group


Kent County's website and citizen services impacted by a significant cyber attack


Linux-friendly email program hit by zero-day bug


LockBit and Clop were responsible for almost 40% of June’s ransomware attacks


Malicious USB Drives Targetinging Global Targets with SOGU and SNOWYDRIVE Malware


Meet NoEscape: Avaddon ransomware gang's likely successor


Meet WormGPT: an expert phishing chatbot


Millions of Telekom Malaysia's broadband customers possibly impacted by data breach


MOVEit Hack: Number of Impacted Organizations Exceeds 340


Naked Patient Photos Published After Ransomware Attack on Plastic Surgery Clinic


Norwegian recycling giant Tomra dealing with ‘extensive’ cyberattack


Owner of Cybercrime Website BreachForums Pleads Guilty


Police arrests Ukrainian scareware developer after 10-year hunt


Practices for Password Security and Management


RedCurl hackers return to spy on 'major Russian bank,' Australian company


Russian cyber gang Armageddon leaves 30 minutes to react


Security researchers concerned over Google Bard's limitations


Security Teams Need to Address One of the Biggest Software Supply Chain Risks: Open Source


Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting


Steps Involved In Penetration Testing And Their Methodology In Cybersecurity


The New Cybersecurity Is Data Security


The Role of Out of Band Authentication in Enhancing Internet Security


The winning strategy for SMB ransomware protection


Things You Need To Know About Security Mobile Application Testing


Threads collects so much sensitive information it’s a ’hacker’s dream,’ experts say


Threads sees intensified scamming activity


TOMRA: Subject to cyber attack


Trustwave uncovers the truth about healthcare sector cybersecurity risks


Uganda Securities Exchange (USE) investor data was exposed to hackers, investigation finds


Ukraine's CERT-UA Exposes Gamaredon's Rapid Data Theft Methods


Using Snapshots to Improve Data Security


Vitesco Technologies among nine new MOVEit Transfer vulnerability ‘victims’ posted by Cl0p


Wearables and data security


Weekly cyber attacks reach two-year high amid ransomware resurgence


What Is Smishing? Definition, Examples & Protection


White House Should Update Cybersecurity Strategy to Consider Impact of AI


Who are the ransomware gangs wreaking havoc on the world’s biggest companies?


Why you should think twice before posting an ‘airport selfie’ this summer


Wisconsin county dealing with ‘catastrophic software failure’; California city declares ransomware emergency


WormGPT: Newest Tool in a Phishing Scammer’s Arsenal


WormGPT – A ChatGPT Themed Hacking Tool Used to Launch Cyber Attack


16/07


AI scam calls imitating familiar voices are a growing problem – here’s how they work


Are Viruses Still a Threat to Cybersecurity?


Child hacking warning for parents after boy, 8, orders AK-47 and free pizza online


Cyber Attack Hits South Korean Government Institution, Resulting in Loss of 135,000 USD to Phishing Scam


Do not download fake Anti Scam Centre app onto Android devices: Police


Email attacks up 464% – study


Fake GitHub Repos Caught Dropping Malware as PoCs AGAIN!


Hackers steal W8m from Starbucks app


Maritime Cyber Attack Database launched


Met Police ‘passed victims’ data to Facebook via online tracking tool’


Microsoft Uncertain About Hackers’ Method for Stealing Azure AD Signing Keys


National Cyber Security Center (NCSC) urges timely reporting of ransomware attacks


Parents urged to be wary of text scams this summer


The emerging cyber security scams you must be aware of


The Evolution of Industrial Cybersecurity in the Age of Internet of Things


Thousands of images on Docker Hub leak auth secrets, private keys


Threads collects so much sensitive information it’s a ‘hacker’s dream,’ experts say


UK Financial Services Sector Leverages AI and Secure Mobile Channels to Mitigate Fraud


Virgin Media issues important email alert to millions of users - ignoring it will be costly


What Is Pink WhatsApp Scam? Here’s How To Not Fall Into The Trap Of This Scam


WormGPT: The ChatGPT Alternative That Cybercriminals Are Using To Launch Advanced Phishing Attacks


DAILY NEWS: Julho (09/07 - 15/07) - 28 Semana de 2023

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.

 

Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page