top of page

DAILY NEWS: Julho (16/07 - 22/07) - 29 Semana de 2023

Cyber Security and Information Security News --- Daily Updates !! Weekly Resume


5 signs of a hacked webcam

10 Essential Cybersecurity Tips for Small Businesses

10 most ‘copied’ brands by hackers to steal your personal, financial data

AI being used for hacking and misinformation, top Canadian cyber official says

AI scam calls imitating familiar voices – here’s how they work

Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands

Beware of nasty Facebook recovery code email scam that will steal your info

Black Basta e Big Head: Atenção a estes ataques de ransomware

Class action lawsuit targets Johns Hopkins Univ. after health system data breach

CoWIN Portal Data Breach: Indian Health Ministry Registers FIR, Vows Serious Action

Cyber Crime and Cyber Security

Descubra como se proteger da nova tendência entre os hackers: o sequestro virtual

Emails Of US Envoy To China, Senior State Department Official Accessed In Chinese Cyber Attack: Report

Google Docs phishing scams are on the rise - here's what you need to know

GTA 6 | Julgamento do hacker de 90 gameplays de Grand Theft Auto VI tem desfecho

Here Is The Dank & Offensive AI

Microsoft Dominates as the Most Impersonated Brand for Phishing Scams in Q2 2023

Mito ou Verdade: Desligar o celular durante 5 minutos Protege Contra Hacker?

NTT Docomo data breach: Ex employee steals millions of user info

Over 15K Citrix servers likely vulnerable to CVE-2023-3519 attacks

Phishers Exploiting Google Docs to Harvest Crypto Credentials

Practical Ways to Prevent Your Home Security Cameras From Being Hacked

Roblox Data Leak Resurfaced With The Personal Details Of Nearly 4,000 Employees

SECP and PTA pledge to enhance cyber security in Pakistan’s digital landscape

Sob ataque, STF vai reforçar segurança armada e monitoramento anti-hacker

Strengthening European Cybersecurity with Advanced Data Diode Technology

Tech lead of Google-owned virus database apologises for leak

The Evolution of Passwordless Authentication Methods in Internet Security

Phishing threats loom as SIM registration deadline nears

Unlocking Security Success: The Power of an Adversary-Focused Approach for Organizations

What is Dynamic Application Security Testing (DAST)?


8 Best Enterprise Password Managers for 2023

Airlines are wargaming worst-case cyber scenarios

Apache OpenMeeting Flaw Allows Server Hijacks and Command Execution

Attackers intensify DDoS attacks with new tactics

Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports

Bologna Sandwich Or Crown Jewels: What’s Your Zero Trust Approach To Cybersecurity?

BSides Sofia 2023 – Alexander Nedelchev – Unencrypted Malware, The Invisible Threat

Chinese Hackers Breached Ambassador’s Email – Report

CISA sees CDM program entering ‘new era’ with focus on cyber defense operations

CISOs are making cybersecurity a business problem

Citrix ADC zero-day exploitatation: CISA releases details about attack on CI organization (CVE-2023-3519)

Citrix NetScaler ADC and Gateway Devices Under Attack: CISA Urges Immediate Action

Cleantech and Quantum Computing: Critical Infrastructure Cybersecurity

Clop Drives Record Ransomware Activity in June

Clop gang to earn over $75 million from MOVEit extortion attacks

Code42 adds customizable insider risk alerts to Incyder

DDoS Botnets Hijacking Zyxel Devices to Launch Devastating Attacks

Dell Adds Orchestration Capabilities to Data Protection Platform

DevOps Automation with AWS CodePipeline and AWS CodeDeploy

Embaixador dos EUA tem conta de e-mail invadida por hackers chineses

European Parliament Backs Draft Cyber Resilience Act for Secure Digital Products

Experts believe North Korea behind JumpCloud supply chain attack

GitHub Warns Devs of North Korean Attacks

'Hacker do bem' recebe R$ 28 mil por identificação de falha em sistema de empresa

Hackers Exploiting Artificial Intelligence for Malicious Activities, Says Canadian Cybersecurity Official

Hackers Fraudulent Job offers to target University Students

HotRat: New Variant of AsyncRAT Malware Spreading Through Pirated Software

How Can Passengers' Personal Devices Potentially Pose Cyber Threats To Aircraft?

How healthcare organizations should measure their device security success

How to Access Your iPhone if You Forget Your Passcode

IA está sendo usada para ataques hackers, alerta Canadá

Kevin Mitnick: Morreu o hacker mais procurado do mundo

Kevin Mitnick, o hacker mais famoso do mundo, morre aos 59 anos

Leveraging Adversarial Machine Learning for Enhanced Cybersecurity

Life sciences leaders act to counter insider-driven data loss

Local Governments Targeted for Ransomware – How to Prevent Falling Victim

Managed Security Services Provider (MSSP) Market News: 21 July 2023

Managing cross-cloud complexity as a cybersecurity stumbling block

Maritime Cyber Security Concerns

MiDO Academy and Nclose: Educating students about cyber security from grassroots level

Morre hacker mais famoso de todos os tempos

Navigating the Cyber Threat Landscape in the Aerospace Industry

Netscaler ADC bug exploited to breach US critical infrastructure org

New CISO appointments 2023

Nice Suzuki, sport: shame dealer left your data up for grabs

Nicholas Burns, Other US Officials Fall Prey To Chinese Hackers; Email Accounts Breached

North Korean hackers targeted tech companies through JumpCloud and GitHub

Plurilock Launches Generative AI 'Guardrails' Product for Workforces

Resilience in a Cyber World—Three Critical Steps Towards a Mature Cyber Security Program

R.I.P. Kevin Mitnick, 1963–2023

Russia Seeks 18 Years in Jail for Founder of Cybersecurity Firm

Russian medical lab Helix hit by cyberattack, leaving customers without test results

Russian Prosecutor Asks for 18 Years in Jail for Group-IB Founder

Rutgers, Stony Brook Among Colleges Warning of Data Exposure From MOVEit Hack

Safeguarding workspaces from escalating cyber attacks: A comprehensive guide

Software Supply Chain Attackers Targeting Banks, Checkmarx Says

Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities

The Future of Smart Grid Cybersecurity: Challenges and Solutions

The growing impact of generative AI on cybersecurity and identity theft

Top Threatening Network Vulnerability in 2023

US diplomat's email account caught in Chinese hackers' crosshairs

US DoJ Announces Plan to Shakeup Cybercrime Investigations

VirusTotal apologizes for data leak affecting 5,600 customers


1st Source Bank attack exposes 450,000 people

67% of daily security alerts overwhelm SOC analysts

97% of organizations report plans to use generative AI by 2025

260,000 dating app accounts exposed in enormous 340GB data breach

A Few More Reasons Why RDP is Insecure (Surprise!)

A fresh look at the current state of financial fraud

Activists target Ontario hog farm with ransomware

Adobe Rolls Out New Patches for Actively Exploited ColdFusion Vulnerability

Adobe out-of-band update addresses an actively exploited ColdFusion zero-day

AI, Ransomware Remain Prevalent in Evolving Cybersecurity Landscape

Akamai Survey: API-Specific Controls are Lacking

ALPHV/BlackCat and Clop gangs claim to have hacked cosmetics giant Estée Lauder

Apache OpenMeetings Web Conferencing Tool Exposed to Critical Vulnerabilities

APT41 hackers target Android users with WyrmSpy, DragonEgg spyware

As online engagement rises, Indian firms vulnerable to cyber attacks

Attention-seeking KillNet hacktivists becoming more dangerous

AV cyber security depends on open communication

Bangladesh Bank (BB) issued cyber-attack warning for banks, financial institutions

Biden-Harris administration initiates cybersecurity labelling for smart devices

CDN Service Exposes Users to Malicious Packages for Phishing Attacks Invisible to Security Tools

Chrome 115 Update for Windows, MacOS, and Linux – 20 Vulnerabilities Patched

CISA and Microsoft partner to expand access to logging capabilities

Clop lists ten more organisations as victims of the MOVEit Transfer hack

CNI Firms: Climate Tech is Increasing Cyber Risk

Critical AMI MegaRAC bugs can let hackers brick vulnerable servers

Critical Flaws in AMI MegaRAC BMC Software Expose Servers to Remote Attacks

Cyber Fortresses: Building Trust and Ensuring a Safe Shopping Journey in E-commerce

Cyber insurers adapting to data-centric ransomware threats

Cyberattack on GitHub customers linked to North Korean hackers, Microsoft says

Cybersecurity Best Practices: Strengthening Defenses to Mitigate the Risk of Cybercrime

Cybersecurity must evolve to tackle rising phishing trends

Eight Steps To Negotiating With Ransomware Hackers

Email attacks skyrocket by 464% in H1 2023, reveals Acronis report

Estee Lauder Breached by Two Ransomware Groups

Expert warns Barbie and Oppenheimer fans to watch out for scammers that may drain your bank account

Exploring the macro shifts in enterprise security

FIN8 Group Using Modified Sardonic Malware for Deployment of BlackCat Ransomware

First search result leads to malware: crooks now paying for ads

FTX Users Potentially Targeted in Possible Phishing Attack as Bankruptcy Claims Deadline Nears

Global Ransomware Attacks in June up 221% Year-on-year

GuidePoint Research and Intelligence Team’s (GRIT) 2023 Q2 Ransomware Report Highlights a 100% Year-Over-Year Increase in Public Ransomware Victims

Hacker steals 4 MAYC NFTs using less than $15

Hackers da Coreia do Norte invadem empresa de TI dos EUA em tentativa de roubar criptomoedas

Hacking the Las Vegas MSG Sphere: Is It Possible?

Half of AI Open Source Projects Reference Buggy Packages

How municipalities are dealing with being low-hanging targets for hackers

How to strengthen data security for Office 365

Human Cyber-Risk Can Be Demonstrably Mitigated by Behavior Changing Training: Analysis

Infamous hacker Kevin Mitnick dead at 59

‘It feels like a digital hurricane’: Coastal Mississippi county recovering from ransomware attack

JumpCloud breach traced back to North Korean state hackers

June 2023 Healthcare Data Breach Report

Kevin Mitnick, Hacker Who Once Eluded Authorities, Is Dead at 59

Mallox Ransomware Exploits Weak MS-SQL Servers to Breach Networks

Mass hack at BBC, British Airways, Boots and DHL sparks class action lawsuit probe

Microsoft Exchange servers compromised by Turla APT

Microsoft Expands Cloud Logging to Counter Rising Nation-State Cyber Threats

Microsoft libera ferramentas gratuitas de segurança cibernética após ataque hacker

Microsoft Strengthens Cloud Logging Against Nation-State Threats

Morreu Kevin Mitnick, o “hacker mais procurado da América”

MOVEit Data Breach Hits 30 Colleges via TIAA, Other Vendors

My go-to cleaning app for Mac just got a major security upgrade

National Cyber Security Centre chief warns AI must improve cyber security

Never skip ‘backup day’ …

New P2PInfect worm malware targets Linux and Windows Redis servers

New P2PInfect Worm Targeting Redis Servers on Linux and Windows Systems

New Ransomware With RAT Capabilities Impersonating Sophos

New Study Highlights Critical Infrastructure's Resilience

Nice Suzuki, sport: shame dealer left your data up for grabs

North Korean State-Sponsored Hackers Suspected in JumpCloud Supply Chain Attack

Norwegian recycling giant TOMRA forced to take systems offline following a cyber attack

Old Roblox Data Leak Resurfaces, 4000 Users' Personal Information Exposed

Only Fans hacked by Anonymous Sudan

OpenSSH vulnerability uncovered by researchers, RCE exploit developed

P2PInfect, a Rusty P2P worm targets Redis Servers on Linux and Windows systems

P2PInfect: Self-Replicating Worm Hits Redis Instances

Philippines ranks 5th in SEA for highest phishing incidents

Phoenician Medical Center said March cyber attack compromised the data of 162k patients

Public ransomware victims increase 100 percent year-on-year

Q2 observed more ransomware events than Q1

Quem foi Kevin Mitnick, o ex-hacker mais procurado do mundo

Ransomware Attack Hit Japan's Busiest Port

RIP Kevin Mitnick: Former most-wanted hacker dies at 59

Russian hacker group leaks data on 1,700 Ukrainian security servicemen

Singapore releases draft guidelines on personal data use in AI training

Sophisticated HTTP and DNS DDoS attacks on the rise

South Africa on the verge of being named the cybercrime capital of Africa

Splunk unveils Attack Analyzer to automate malware, phishing attack analysis

Tampa General reports confidential data of 1.2 million patients hacked

Tampa hospital says sensitive data of 1.2 million stolen in failed ransomware attack

Thales confirms its key role to provide cybersecurity for Galileo Second Generation to meet tomorrow's threats

Thanks Storm-0558! Microsoft to expand default access to cloud logs

The Evolving Cyber Threat Landscape: Proactive Measures

Thousands of players affected in Roblox security breach and blackout

Threat Actors are Targeting Your Web Applications – Here’s How To Protect Them

Turla's New DeliveryCheck Backdoor Breaches Ukrainian Defense Sector

Vítimas de hack ao MOVEit já são 200; hackers falam em 400

Zyxel Vulnerability Exploited by DDoS Botnets on Linux Systems

What Is an SSL Stripping Attack?

What the Government Email Account Hack Says About the Future of Cybersecurity

Why data travel is healthcare’s next big cybersecurity challenge

Why Generative AI is a Threat to API Security

Windows ransomware group Cl0P leaks some PwC files on clear web

WormGPT: What to know about ChatGPT's malicious cousin


2022 ransomware attacks declined in number but grew in sophistication

A Guide to GDPR Compliance

Adobe emergency patch fixes new ColdFusion zero-day used in attacks

An ‘Alarming Escalation’ of Sophistication in DDoS Attacks, Cloudflare Says

As digital gets stronger, India Inc remains susceptible to cyber attacks: Rubrik

Assessing the Current State of Geopolitics and Cybersecurity

Attacker ID’ed After Infecting Own Computer With Malware

Bad.Build Flaw in Google Cloud Build Raises Concerns of Privilege Escalation

BB issued cyber attack warning for banks, financial institutions

Biden-Harris Administration Unveils Smart Device Cyber Program

BlackCat and Clop gangs both claim cyber attack on Estée Lauder

BlackCat, Clop claim ransomware attack on cosmetics maker Estée Lauder

Central bank alerts banks, NBFIs to cyber-attack risks

Chinese APT41 Hackers Target Mobile Devices with New WyrmSpy and DragonEgg Spyware

Chinese APT41 Linked to WyrmSpy and DragonEgg Surveillanceware

CISA and NSA Issue New Guidance to Strengthen 5G Network Slicing Against Threats

CISA, Microsoft Partner to Expand Cloud Logging Access Following Cyberattack

Citrix NetScaler zero-day exploited in the wild, patch is available (CVE-2023-3519)

Cloudflare reports surge in sophisticated DDoS attacks

Cohesity Highlights Reliance on Legacy Tech is a “Recipe for Disaster” as Cyber Threats Rise

Critical API Security Gaps Found in Financial Services

CVE-2023-3765: Critical flaw in open source machine learning development MLflow

Cyberattack hits cosmetics giant Estee Lauder

Cybersecurity measures SMBs should implement

Dark.IoT & Custom Botnets Exploit Zyxel Flaw in DDoS Attacks

Detecting eBPF Malware with Tracee

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline

Escalating Privileges via Third-Party Windows Installers

Estée Lauder data stolen in cyberattack

Estee Lauder Hacked And Data Stolen

Estee Lauder Hit by Cyber Attack, With Some Business Operations Disrupted

Exploring the Dark Side: OSINT Tools and Techniques for Unmasking Dark Web Operations

Facebook behavioral ads banned by Norwegian privacy watchdog

Famed Hacker Kevin Mitnick Dead at 59

FBI: Tech support scams now use shipping companies to collect cash

Google is cutting off internet access for some employees. Here's why

Hacker consegue derrubar partida de CS2 após se irritar com jogadores

How Cyber Threat Intelligence Practitioners Should Leverage Automation and AI

How to Manage Your Attack Surface?

Industry Experts Urge CISA to Update Secure by Design Guidance

Malware risk in AI software packages, warns analyst

Microsoft expands access to cloud logging data for free after Exchange hacks

Microsoft: Hackers turn Exchange servers into malware control centers

NCA: Nation States Using Cybercrime Groups as Proxies

Norwegian Giant Tomra Suffers “Extensive” Attack

O Bradesco (BBDC4) informou, que sua unidade de Nova Iorque foi alvo de um ataque Hacker

Open Source Security Incidents and How Organizations Can Respond

OpenAI credentials stolen by the thousands for sale on the dark web

Ortivus' electronic patient record system are down for some United Kingdom based customers due to a cyber-attack

PCI-DSS 4.0 is Here. What Does it Mean for Online Retailers?

Rubrik unveils integration with Microsoft 365 Backup to boost cyber resilience and recovery

Scam Job Offers Target Uni Students

Stephen F. Austin State University (SFA) Cyber Attack

Supply chain executives unaware of growing customer trust issues

TomTom moves to protect data after being targeted by ransom group in cyber attack

Trends in ransomware-as-a-service and cryptocurrency to monitor

UK airports 'targeted by coordinated Russia cyber attack groups'

Ukraine takes down massive bot farm, seizes 150,000 SIM cards

U.S. Cyber Trust Mark labeling program raises the bar for smart devices’ cybersecurity

U.S. Government Blacklists Cytrox and Intellexa Spyware Vendors for Cyber Espionage

US govt bans European spyware vendors Intellexa and Cytrox

Using AI/ML to optimize your tech stack and enhance business efficiency

Zero-Day Attacks Exploited Critical Vulnerability in Citrix ADC and Gateway

What is the new Enhanced Safe Browsing for Gmail (and should you enable it)?

What to do (and what not to do) after a data breach

Windows 11 setup: Which user account type should you choose?

WormGPT: What you need to know about the cybercriminal version of ChatGPT


$8M cyber scammer gets eight years in US jail

12 open-source penetration testing tools you might not know about

70% of life sciences see a rise in insider data loss incidents

A Look at the Email Threat Landscape in Q1 2023

Adobe ColdFusion vulnerabilities exploited to deliver web shells (CVE-2023-29298, CVE-2023-38203)

Advanced AI security tools are improving security posture of cloud-driven businesses

Are Facebook Quizzes a Cybersecurity Risk?

Armis, Honeywell Uncover Vulnerabilities in Honeywell Systems

Ataques hackers: EUA querem aumentar segurança de eletrodomésticos

Broadband consumers demand security and sustainability

Business Leaders Appear Less Concerned by Cyber Risk: Report

Canadian phishing scammer Soup allegedly stole over $1m in crypto

CISA orders govt agencies to mitigate Windows and Office zero-days

Crypto Ransomware Attacks Rise in First Half of 2023: Chainalysis

Cyber Attacks at 2-Year High

Cybercriminals Exploiting WooCommerce Payments Plugin Flaw to Hijack Websites

Cybercriminals in the UAE are upping their game

Cybersecurity firm Sophos impersonated by new SophosEncrypt ransomware

Cybersecurity threatscape in the Middle East: 2022-2023

Data compromises on track to set a new record

drIBAN Fraud Operations Target Corporate Banking Customers

Email Phishing Protection Must Leave No Stone Unturned

Exploited 0-days, an incomplete fix, and a botched disclosure: Infosec snafu reigns

Fair Work Ombudsman caught up in HWL Ebsworth breach

FIA World Endurance Championship driver passports leaked

FIN8 deploys ALPHV ransomware using Sardonic malware variant

FIN8 Group Using Modified Sardonic Backdoor for BlackCat Ransomware Attacks

From Colonial Pipeline to JBS, how ransomware gangs negotiate ransom payments

Generative AI Tool Without Ethical Restrictions Offered on Hacking Forums

Go Beyond the Headlines for Deeper Dives into the Cybercriminal Underground

Google Bard found to have some serious security flaws

Google Cloud Build bug lets hackers launch supply chain attacks

Google exposes intelligence and defense employee names in VirusTotal leak

Google fixes ‘Bad.Build’ vulnerability affecting Cloud Build service

Governo Biden anuncia selo para aparelhos menos vulneráveis a hackers

GTA 6 teenage hacker deemed unfit to appear in trial

'Hacker do bem' identifica falha em site de empresa e ganha R$ 28 mil

Hacker Infected & Foiled by Own Infostealer

Hackers que desviaram R$ 1 milhão de banco são condenados a 326 anos

Healthcare organizations in the crosshairs of cyberattackers

Henry Ford Health notifies 168,000 patients of data breach

Herts County Council subject to ‘targeted phishing attack’

Hillsborough County notifies over 70,000 individuals of potential data breach

How low payment demands keep fraudsters invisible

How Massive Phishing Campaigns Abuse Decentralized Web Hosting To Scam Victims

How to Protect and Secure Your Data in 10 Ways

HTML Attachments Used in Malicious Phishing Campaigns Skyrocket: Increase 168% from 2022 and 450% from 2021

Imagine360 Suffers Third-Party Data Breach, 112K Impacted

Indian Organisations Targeted 2146 Times Per Week, Double The Global Average

Iron ore giant Fortescue Metals targeted by Russian ransomware group

IT Security Pro Jailed for Attempted Extortion

JumpCloud Blames 'Sophisticated Nation-State' Actor for Security Breach

JumpCloud Confirms Data Breach By Nation-State Actor

JumpCloud revealed it was hit by a sophisticated attack by a nation-state actor

Kaspersky: Malaysia remains top three phishing targets in SE Asia

Key cybersecurity risks to consider during custom apps and software development

Linux Ransomware Poses Significant Threat to Critical Infrastructure

LockBit expands its reach, now targeting macOS

Major government hack a wake-up call for agencies

Malicious ChatGPT Clone WormGPT Used to Launch Email Attacks

‘Man-in-the-Middle’ Cyber Heist: How Change Of One Letter Cost Pune Engineering Firm Rs 22 Lakh

Manga App Shonen Jump+ Apologises for Data Breach

Maritime cyber attacks database launched

Microsoft Dominates as the Most Impersonated Brand for Phishing Scams in Q2 2023

New critical Citrix ADC and Gateway flaw exploited as zero-day

New Vulnerabilities Found in Adobe ColdFusion

Norwegian Refugee Council says thousands affected in online database breach

Odessa, Texas, Mayor Says City Hit by Data Breach

Owner of BreachForums Pleads Guilty to Cybercrime and Child Pornography Charges

Pakistani Entities Targeted in Sophisticated Attack Deploying ShadowPad Malware

Phoenician Medical Center notifying 162,500 patients of attack that “disrupted” IT systems

Ransomware on the rise: Cohesity’s research exposes UK firms’ security vulnerabilities

Safeguarding mobile health patients from the threat of ransomware

Six steps to protect your organisation from a cyber attack

Sogu, SnowyDrive Malware Spreads, USB-Based Cyberattacks Surge

Stephen F. Austin State University (SFA) reports some personal student info stolen in June cyber hack

Suspected Scareware Fraudster Arrested After Decade on the Run

The growing need for business communication security

The Two Faces of AI in Identity Management

This is why personal encryption is vital to the future of business

Threat Intelligence & The Cyber Kill Chain: The Complete Guide

TJ Maxx parent company named in MOVEit hack

Two more foreign spyware firms blacklisted by US

Typo directs millions of US military emails to Mali by mistake

UKG agrees to pay up to $6M in lawsuit tied to 2021 breach

Ukraine cops crack down on pro-Russian bot farm

Ukraine police bust another bot farm accused of pro-Russia propaganda, internet fraud

VirusTotal Data Leak Exposes Some Registered Customers' Details

VirusTotal leaked data of 5,600 registered users

What happens when our data gets leaked: Here's how concerned you should be

WooCommerce Bug Exploited in Targeted WordPress Attacks

WordPress WooCommerce Payments bug exploited in the wild


95% of patients fear they will face data breach

A single Indian firm facing 2,146 cyber attacks a week on average: Report

Accreditation Commission for Education in Nursing reveals data breach

Adobe warns of critical ColdFusion RCE bug exploited in attacks

Addressing the Mobile Malware Threat With Zero-Trust

Admins of Genesis Market marketplace sold their infrastructure on a hacker forum

Advanced Medical Management Experiences Data Breach That Leaked PHI and SSNs

AMC Theatres Files Notice of Data Breach That Leaked an Unknown Number of Social Security Numbers

APT Group Red Menshen is Rapidly Evolving its BPFDoor Malware

Barts Health NHS Trust faces ransomware threats from Russian organisation BlackCat

Beware of AI-generated phishing attacks; they are so real!

BreachForums Admin Pleads Guilty to Hacking Charges

By criminals, for criminals: AI tool easily generates ‘remarkably persuasive’ fraud emails

Canadian Phishing Scammer Exposed For Stealing Over $1 Million In Crypto And NFTs

CERT-UA Uncovers Gamaredon's Rapid Data Exfiltration Tactics Following Initial Compromise

Cisco Nexus 9000 Users Must Disable Encryption to Dodge Vuln

CISOs under pressure: Protecting sensitive information in the age of high employee turnover

Confidence in the cloud: why cloud security matters more than ever

Criminals launch subscription-based WormGPT without ethical constraints

Critical XSS vulnerability in Zimbra exploited in the wild (CVE-2023-34192)

Crypto Hackers Net Nearly $480 Million Year-to-Date

Cyberattack compromised JumpCloud customer environments

Cyberattacks are Warfare

Cybercriminals Exploit Microsoft Word Vulnerabilities to Deploy LokiBot Malware

Cybercriminals in the UAE are upping their game

Cybersecurity Report: Growing Risks in Healthcare

Data Breach Exposes Student, Staff Info at 7 Idaho Colleges

Data breaches on pace for a new record in 2023

Database Mess Up Exposed PII and Photos of 2.3M Dating App Users

Dating App That Claims 50 Million Users Suffered a Data Breach

Digital maturity is a growing factor in cybersecurity practices

EU Urged to Prepare for Quantum Cyber-Attacks

Facebook and Microsoft are the Most Impersonated Brands in Phishing Attacks

Fake Ads Manager Software and Malicious Extensions Target Facebook Accounts

F.B.I., C.I.S.A. Confirm Collaboration To Address Cyberattack On U.S.

FBI: Texas, Rest of U.S. Experiencing More Cyber Attacks

Fostering growth in the digital era through cyber resilience

Global Internet Breach May Impact Hillsborough Residents, Businesses

Google Bard security flaw could be attracting scammers to its services

Google Removes Swing VPN Android App Exposed as DDoS Botnet

Grand Theft Auto 'hacker' from Oxford is 'not fit to stand trial'

Growing scam activity linked to social media and automation

Hacker rouba perfil do Instagram, ameaça vítima e utiliza inteligência artificial para aplicar golpes financeiros

'Hacker's dream': Threads gobbling up sensitive information on its millions of users

Hacker's Latest Target: The Electric Vehicle

Hackers Exploit WebAPK to Deceive Android Users into Installing Malicious Apps

Hackers Target Multichain Users With Fake Twitter Account

Healthcare organizations hesitant to adopt new software patches

HMRC issues urgent warning over ‘money stealing’ text ahead of deadline in weeks

Hospitals, health systems facing lawsuits for data breaches

How AI is Tightening Cybersecurity for Businesses

How popular AI apps are invading your privacy

How Threat Actors Leverage AI to Advance Healthcare Cyberattacks

How To: Prevent Ransomware Attackers Striking Again

Hyderabad companies scramble to firewall hackers as ransomware holds data hostage

Indian researchers remove 3K malicious content targeting firms across sectors

Insights from BDO & AusCERT Cyber Security Survey

IT worker jailed for impersonating ransomware gang to extort employer

JumpCloud discloses breach by state-backed APT hacking group

Kent County's website and citizen services impacted by a significant cyber attack

Linux-friendly email program hit by zero-day bug

LockBit and Clop were responsible for almost 40% of June’s ransomware attacks

Malicious USB Drives Targetinging Global Targets with SOGU and SNOWYDRIVE Malware

Meet NoEscape: Avaddon ransomware gang's likely successor

Meet WormGPT: an expert phishing chatbot

Millions of Telekom Malaysia's broadband customers possibly impacted by data breach

MOVEit Hack: Number of Impacted Organizations Exceeds 340

Naked Patient Photos Published After Ransomware Attack on Plastic Surgery Clinic

Norwegian recycling giant Tomra dealing with ‘extensive’ cyberattack

Owner of Cybercrime Website BreachForums Pleads Guilty

Police arrests Ukrainian scareware developer after 10-year hunt

Practices for Password Security and Management

RedCurl hackers return to spy on 'major Russian bank,' Australian company

Russian cyber gang Armageddon leaves 30 minutes to react

Security researchers concerned over Google Bard's limitations

Security Teams Need to Address One of the Biggest Software Supply Chain Risks: Open Source

Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting

Steps Involved In Penetration Testing And Their Methodology In Cybersecurity

The New Cybersecurity Is Data Security

The Role of Out of Band Authentication in Enhancing Internet Security

The winning strategy for SMB ransomware protection

Things You Need To Know About Security Mobile Application Testing

Threads collects so much sensitive information it’s a ’hacker’s dream,’ experts say

Threads sees intensified scamming activity

TOMRA: Subject to cyber attack

Trustwave uncovers the truth about healthcare sector cybersecurity risks

Uganda Securities Exchange (USE) investor data was exposed to hackers, investigation finds

Ukraine's CERT-UA Exposes Gamaredon's Rapid Data Theft Methods

Using Snapshots to Improve Data Security

Vitesco Technologies among nine new MOVEit Transfer vulnerability ‘victims’ posted by Cl0p

Wearables and data security

Weekly cyber attacks reach two-year high amid ransomware resurgence

What Is Smishing? Definition, Examples & Protection

White House Should Update Cybersecurity Strategy to Consider Impact of AI

Who are the ransomware gangs wreaking havoc on the world’s biggest companies?

Why you should think twice before posting an ‘airport selfie’ this summer

Wisconsin county dealing with ‘catastrophic software failure’; California city declares ransomware emergency

WormGPT: Newest Tool in a Phishing Scammer’s Arsenal

WormGPT – A ChatGPT Themed Hacking Tool Used to Launch Cyber Attack


AI scam calls imitating familiar voices are a growing problem – here’s how they work

Are Viruses Still a Threat to Cybersecurity?

Child hacking warning for parents after boy, 8, orders AK-47 and free pizza online

Cyber Attack Hits South Korean Government Institution, Resulting in Loss of 135,000 USD to Phishing Scam

Do not download fake Anti Scam Centre app onto Android devices: Police

Email attacks up 464% – study

Fake GitHub Repos Caught Dropping Malware as PoCs AGAIN!

Hackers steal W8m from Starbucks app

Maritime Cyber Attack Database launched

Met Police ‘passed victims’ data to Facebook via online tracking tool’

Microsoft Uncertain About Hackers’ Method for Stealing Azure AD Signing Keys

National Cyber Security Center (NCSC) urges timely reporting of ransomware attacks

Parents urged to be wary of text scams this summer

The emerging cyber security scams you must be aware of

The Evolution of Industrial Cybersecurity in the Age of Internet of Things

Thousands of images on Docker Hub leak auth secrets, private keys

Threads collects so much sensitive information it’s a ‘hacker’s dream,’ experts say

UK Financial Services Sector Leverages AI and Secure Mobile Channels to Mitigate Fraud

Virgin Media issues important email alert to millions of users - ignoring it will be costly

What Is Pink WhatsApp Scam? Here’s How To Not Fall Into The Trap Of This Scam

WormGPT: The ChatGPT Alternative That Cybercriminals Are Using To Launch Advanced Phishing Attacks

DAILY NEWS: Julho (09/07 - 15/07) - 28 Semana de 2023

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.


Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page