DAILY NEWS: Junho (25/06 - 01/07) - 26 Semana de 2023
Cyber Security and Information Security News --- Daily Updates !! Weekly Resume

01/07
$135K worth of Rugged App NFTs stolen by prolific phishing thief
$656M Lost In Crypto Scams During H1 2023: Beosin Reports
Account Takeover Risks: How to Safeguard Your Digital Assets
Avast released a free decryptor for the Windows version of the Akira ransomware
Avoiding Insider Threats When Layoffs Occur
Beware: New 'RustBucket' Malware Variant Targeting macOS Users
BlackCat ransomware pushes Cobalt Strike via WinSCP search ads
Bored Ape NFTs Worth $135K Stolen by Prolific Phishing Thief
Breach Victims Have Standing When Data Misused, 1st Circuit Says
Crimeware services for criminals are fueling the rise in cybercrime
Cyber Security For Businesses: How Malware Works And How To Fight It
Cyber-concerns - How to combat them with a VPN
Cybercriminals are circumventing email security with image-based scams
Essential Tips To Protect Yourself From Identity Theft
ESXi Servers are Targeted by Linux-Based Akira Ransomware
Financial impact of a cyber security breach remains highest for SA ‒ expert
Freedom from fraud: Protecting your identity and finances
Google, Apple, Paytm called to discuss rising cyber crimes in India
Hackers Exploiting Unpatched WordPress Plugin Flaw to Create Secret Admin Accounts
Increasing attacks on manufacturers using data encryption – Report
Iranian APT Group Charming Kitten Updates Powerstar Backdoor
It’s easy to be blasé about cybercrime but we need to be extra vigilant
Millions affected by MOVEit mass-hacks as list of casualties continues to grow
Mobile Cyberattacks Soar, Especially Against Android Users
More sensitive Optus data leaked in major cyberattack on law firm
Most common causes of health data breaches in the last three months
RBI fines Mahesh Bank Rs 65 L over cybercrime
Rising Cyber Crimes in India: Summon to Google, Apple, and Paytm
Text scam targets Golden 1 customers on heels of data theft from CalPERS, CalSTRS members
The Surge of Cybercrime: Crimeware Services Empower Criminals
These are the most dangerous software security flaws of the year - are you at risk?
Understanding common internet-facing footholds exploited by bad actors
30/06
3 Reasons SaaS Security is the Imperative First Step to Ensuring Secure AI Usage
5 Patch Management Best Practices for Success in 2023
8Base Ransomware Group Emerges as Major Threat
Add HHS to List of Victims of Massive MOVEit Data Breach by Ransomware Gang
Amazon Issues Lawsuits Targeting Fake Review Brokers
AQA also hit by exam paper cyber attack
Businesses are ignoring third-party security risks
Chipmaker TSMC confirms data leak after a cyberattack targeted its supplier
City of Fort Worth in Texas acknowledges hacker group's claims of stealing 180 GB of government data
Clop Ransomware Continues to Exploit MOVEit Vulnerability
Critical Flaw Exposes ArcServe Backup to Remote Code Execution
Cyber cover uptick as firms cushion against financial losses
Cyber Threat Prevention And Board-Worthy Reporting
Cyberattack Hits Paracetamol Maker's Revenue And Profit, Shares Fall
Cybercriminals Hijacking Vulnerable SSH Servers in New Proxyjacking Campaign
Cybercriminals exploiting AI, persistence in ransomware
Cybersecurity company INKY sheds light on emerging QR code phishing threats
Cybersecurity in Precision Agriculture: Safeguarding America’s Connected Fields
E-wallet phishing scams seen getting more sophisticated
Employees worry less about cybersecurity best practices in the summer
First state-sponsored cyberattack against UK government revealed two decades later
French, UK watchdogs say hackers-for-hire are targeting law firms
GCHQ reveals British government was hacked by foreign cyber spies 20 years ago
GCHQ Reveals Details of State-Backed Breach
Grupo hacker afirma que sequestrou dados da TSMC através de ataque contra fornecedora
Hackers Claim $70 Million Ransomware Attack on TSMC, Hits Supplier Instead
How Adversaries Exploit Generative AI in Cyber Attacks and How to Counter Them
Illegal access to data a serious threat to Africa
Introducing 8Base, the new, highly active ransomware kid on the block
Iranian Hackers Charming Kitten Utilize POWERSTAR Backdoor in Targeted Espionage Attacks
Keeping Cybercriminals Guessing: The Rise of Automated Moving Target Defense
Kenyan businesses experience 82pc increase in cyber-attacks
Lehigh Valley Health Network hit by cyber attack. Here's the patient info hackers stole
LetMeSpy phone tracking app suffers data breach, exposing user information
LockBit Claims TSMC Hack, Demands $70m Ransom
LockBit Ransomware Gang Takes $70M Chip Shot At TSMC After Alarming Security Breach
MITRE Announces Most Dangerous Software Weaknesses
MITRE Unveils Top 25 Most Dangerous Software Weaknesses of 2023: Are You at Risk?
More than 2 months after ransomware attack, Harvard Pilgrim Health Care's site back online
NCSC Reveals Info on GCHQ’s First Response to State Cyber-attack
New Ransomware Actor 8Base Rivals LockBit in Extortion
NHS data leak raises ‘serious questions’ about Manchester University cyber attack
NHS data reportedly compromised in University of Manchester cyberattack
NHS data stolen in Manchester Uni ransomware attack
NHS patient data compromised in university cyber attack – report
North Korea-linked Andariel APT used a new malware named EarlyRat last year
Over a million NHS users have data leaked following ransomware attack
Perfis regionais da PF e da PRF são suspensos após ataque hacker
Police investigate stolen exam papers after cyber attack
Rethinking cybersecurity strategies for the AI era
Schneider Electric confirms being affected by MOVEit hack, denies data breach
Seven Things To Include In Your Anti-Phishing Policy
Suncor Energy could see significant losses following cyber attack – expert
Terrorism victims among those caught up in UK health data breach affecting 1.1m
The healthcare sector needs better defence against phishing
The Virtual Digital Stranger: What ChatGPT Means for Network Security
Torrent of image-based phishing emails are harder to detect and more convincing
TSMC confirms data breach after LockBit cyberattack on third-party supplier
TSMC denies LockBit hack as ransomware gang demands $70 million
Understanding common internet-facing footholds exploited by bad actors
Understanding the Growing Professionalism of Cyber-Criminals
US health department, law firms latest hit in wide-ranging hack
US Patent and Trademark Office suffers years-long data leak
WhatsApp Upgrades Proxy Feature Against Internet Shutdowns
29/06
31% of breaches are being identified later
Akira Ransomware Expanded its Toolkit to Attack Linux Machines
Android Spy App LetMeSpy Suffers Major Data Breach, Exposing Users' Personal Data
Atomic Crypto wallet facing criticism, after giving security update
Beware of Atmos Energy scammers, spoofed websites
Businesses count the cost of network downtime
Charming Kitten’s PowerStar Malware Evolves with Advanced Techniques
ChatGPT Becomes Target for Hackers
CISA working with agencies to pull exposed network tools from public internet
Clop's MOVEit Campaign Affects Over 16 Million Individuals
Critical Security Flaw in Social Login Plugin for WordPress Exposes Users' Accounts
Data Breach: Nigeria Data Protection Commission (NDPC) investigates banks, varsity, others
Data Centers Can Fend Off DoS Attacks by Taking a Layered Approach
Department of Health and Human Services (HHS) among targets in government hacking attack
England and Wales Introduce Stricter Laws on Revenge Porn and Deepfakes, But Are They Strong Enough?
Enterprise SIEMs miss 76% of all MITRE ATT&CK techniques used
Enterprises Unprepared to Defend Against MITRE ATT&CK Techniques
Experts published PoC exploits for Arcserve UDP authentication bypass issue
Fluhorse: Flutter-Based Android Malware Targets Credit Cards and 2FA Codes
From MuddyC3 to PhonyC2: Iran's MuddyWater Evolves with a New Cyber Weapon
Global rise in DDoS attacks threatens digital infrastructure
Granules India faces significant revenue loss following cyber security attack
Great Valley Cardiology Sued over 181,000-Record Data Breach
Guide: Attack Surface Management (ASM)
Hacker invade canal no Youtube do Ministério Público de MG e apaga vídeos
Hacker sets up Tor-based online shop to sell access to firms
Hackers claim to take down Russian satellite communications provider
Health IT vendor fined $75K for violating HIPAA
How advanced AI threatens banking security systems
How Financial Institutions Can Protect Themselves From Digital Transformation Data Security Risks
How the new deepfake reality will impact cyber insurance
How threat actors are weaponizing social media, from phishing to AI-powered deepfakes
Indigo ransomware attack cost millions, company says
IP Address Tracking and How To Protect Yourself
Is AI ready to handle cyber-economic warfare?
Is Your Data Insider-Proof? Five Steps To Keep Your Secrets Safe
Japan in the Crosshairs of Many State-Sponsored Threat Actors New Report Finds
Japanese companies exposed to increased ransomware risk
Kenya experienced an 82% increase in cyber attacks in 2022, Liquid report
LetMeSpy: aplicativo de espionagem sofre ataque hacker e expõe dados e mensagens de usuários
LockBit Dominates Ransomware World, New Report Finds
LockBit expands its reach, targets macOS
Lumberton ISD cyberattacked, personal information stolen
Manifest Confusion Threat Undermines Trust in Entire Npm Registry
Micropatches: What they are and how they work
MITRE releases new list of top 25 most dangerous software bugs
More than a million NHS patients’ details compromised after cyberattack
MOVEit hackers may have found simpler business model beyond ransomware
New EarlyRAT malware linked to North Korean Andariel hacking group
Newly Uncovered ThirdEye Windows-Based Malware Steals Sensitive Data
No consensus on creating a unified US cyber incident reporting framework
North Korean Hacker Group Andariel Strikes with New EarlyRat Malware
Over 130 Organizations, Millions of Individuals Believed to Be Impacted by MOVEit Hack
Personal data leaks as Perpetual hit by ransomware attack
Phone-Tracking App LetMeSpy Says It Has Been Hacked
Popular generative AI projects pose serious security threat
Pro-Russia DDoSia hacktivist project sees 2,400% membership increase
Proof-of-Concept (PoC) for Arcserve UDP authentication bypass flaw published (CVE-2023-26258)
Quishing on the rise: How to prevent QR code phishing
Ransom Payments by Companies Are Creating an Industry for Middlemen
Re/insurance alone cannot absorb all risks from cyber incidents: Munich Re’s Kreuzer
Research reveals significant increase in sophisticated attacks against mobile devices
Rise of the script kiddie: a tenth of children say they can hack websites
Russian satellite telecom Dozor hit by hackers
Social engineering scams on the rise in APAC region
Suncor cyberattack likely to cost company millions of dollars, expert says
The latest victim of the MOVEit data breach is the Department of Health and Human Services
The top five cyber security incidents in June 2023
There’s no need for providers to ban ChatGPT use in healthcare
These taxpayers are being targetted by criminals in South Africa
Third-Party Data Breach at Law Firm Impacts Snack Giant Mondelēz International
Three of the world's most expensive phishing attacks... and how they could have been prevented
Trellix fixes bug breaking Office apps after June Windows updates
To Be Cyber Resilient, It's Best To Layer Up
UCLA among victims of worldwide cyber attack
Unmasking HMRC Self-Assessment Phish: How Attackers Outsmart Secure Email Gateways (SEGs)
US health dept, law firms join list of MOVEit victims
US health department, several companies affected by hacking campaign
US Prosecutors Line Up Charges in $2.5bn Healthcare Fraud Cases
VPN and RDP Exploitation the Most Common Attack Technique
Zimperium Research Reveals Significant Increase In Sophisticated Attacks Against Mobile Devices
Zscaler uncovers increasing complexity and sophistication of ransomware
WatchGuard Threat Lab report reveals new browser-based social engineering trends
WatchGuard Threat Lab Report reveals new security threats
What Is Virtual Desktop Infrastructure (VDI) and Is It a Safe Way to Work Online?
Why an Illinois law is at the center of Congress’ debate on new data privacy legislation
28/06
5 Things CISOs Need to Know About Securing OT Environments
6 steps companies can take to protect themselves from a cyber attack
8Base ransomware gang escalates double extortion attacks in June
8Base ransomware group leaks data of 67 victim organizations
8Base Ransomware Spikes in Activity, Threatens U.S. and Brazilian Businesses
Alert: New Electromagnetic Attacks on Drones Could Let Attackers Take Control
Amid cyber attacks hike, 'Israel' developing cyber Iron Dome: Media
Andariel’s Mistakes Uncover New Malware in Lazarus Group Campaign
Attackers Using Social Engineering to Capitalize on the ChatGPT Buzz
Brave Browser boosts privacy with new local resources restrictions
California Official Urges Meetings After Large Data Breach
Community Health Systems sued again over data breach affecting 1 million patients
Critical SQL Injection Flaws Expose Gentoo Soko to Remote Code Execution
CryptosLabs Scam Ring Targets French-Speaking Investors, Rakes in €480 Million
Cybersecurity incident at Suncor knocks Canadian gas stations offline
Economic volatility drives businesses to MSPs
EMEA in Cyber Crosshairs As Retail Attacks Shift Focus to Region
EncroChat Bust Leads to 6500 Arrests in Three Years
Experts Unconvinced by Upskill in UK Cyber Program
Exposed Interfaces in US Federal Networks: A Breach Waiting to Happen
Good Samaritan Hospital Settles Class Action Data Breach Lawsuit
Hacker que roubou contas de Joe Biden e Elon Musk no Twitter é condenado a 5 anos de prisão
Indigo lost $50M last year, in large part due to February cyberattack
Indigo ransomware attack cost millions, company says
Kazakhstan detains Russian cyber expert wanted by both Washington and Moscow
LG and Solar Service Guys Respond to Data Breach Allegations
Microsoft fixes Windows bug causing File Explorer freezes
Microsoft Teams outage blocks access to web and desktop clients
Mobile Malware and Phishing Surge in 2022
Newly Surfaced ThirdEye Infostealer Targeting Windows Devices
NPM ecosystem at risk from “Manifest Confusion” attacks
Op-Ed: Cyber Security is a Team Sport
Preparing health systems for cyber risks and insurance coverage
Ransomware is on the rise, what can telcos do about it?
Ransomware: Your Security Insurance Will No Longer Save You
Research reveals rise in sophisticated attacks against mobile devices
Rezilion Report Finds World’s Most Popular Generative AI Projects Present High Security Risk
Securing Your Computer: Essential Tips and Tools for Protecting Against Malware and Cyber Attacks
Spot Fake Extortion Attacks Without Wasting Time and Money
Standing up to the ransomware issue with Artificial Intelligence
Suncor Energy Responds to Cybersecurity Incident
The 3am call: how one senior leader responded to a serious cyber attack
The Current State of Business Email Compromise Attacks
The magic formula for big data companies to outshine the competition
The ransomware gang behind the sweeping MOVEit hack
The Risk of Generative AI and Large Language Models
ThirdEye Infostealer Poses New Threat to Windows Users
Top 5 cyber threat actors of 2023
UK Cyber Security Agency to Law Firms: You Are Hacking Targets
UPS working with experts after phishing attack on some shippers, customers
Zurich Insurance Group secures data leak
Wagner ransomware wants to recruit its victims
Who is 8BASE? A deep dive into the "newish" ransom gang
27/06
5 ways to improve employee cybersecurity awareness
95% fear inadequate cloud security detection and response
A deep-dive demo of NetSPI’s Attack Surface Management (ASM) platform
AI ethics toolkit updated to include more assessment components
Altoona Water Authority (AWA) official recounts ransomware attack
Anatsa Banking Trojan Targeting Users in US, UK, Germany, Austria, and Switzerland
Anatsa Banking Trojan Targets Banks in US, UK and DACH Region
Are GPT-Based Models the Right Fit for AI-Powered Cybersecurity?
Atlantic General Hospital Increases Ransomware Victim Count to Almost 140,000 Individuals
Australia Regulator Tells Medibank to Set Aside $167M After Major Cyber Attack
Beyond Asset Discovery: How Attack Surface Management Prioritizes Vulnerability Remediation
BlackCat Claims Reddit Hack, Threatens to Leak Damaging Info Stolen During the February Data Breach
Brunswick provides operations update following cyber attack
CalSTRS Notifies Members of Third-Party Data Breach Related to Vendor’s Use of Hacked Software
ComDciber: é preciso saber reagir quando o ataque hacker vencer as suas estruturas de defesa
Conner Strong & Buckelew Notifies 15,064 Consumers of Data Breach That Leaked Their SSN
Cyber Attack Targets SPD Party Executive Email Accounts
Data protection and security: strengthening defences, redefining collaboration
Desert Physicians Management Announces Data Breach on Behalf of Multiple Providers
Employees notified of data breach at Sweetwater Union High School District
EncroChat Bust Leads to 6,558 Criminals' Arrests and €900 Million Seizure
EncroChat dismantling lead to 6500 arrests, EUR 900 million seized
EncroChat takedown led to 6,500 arrests and $979 million seized
Enhancing data security in the defence industry through encryption
Flipper Zero hacking tool is a big hit
Google removes trojan-laden Android apps from Play Store: How they affected users
Hacker Gains Access To Southwest Airlines And American Airlines Pilot Applications
Hacker violou dados de mais de 8 mil pilotos
How Application Allowlisting Combats Ransomware Attacks
How better cyber sense, zero trust can help overcome the new 'CEO scam'
How cyber insurance empowers CISOs
How does your board measure cyber resilience?
Hundreds of devices found violating new CISA federal agency directive
Instagram do governo é alvo de hackers e fica fora do ar temporariamente
Invasão ao GPS e ataque sem fio: como hackers roubam carros conectados
Lackawanna County, Pa., Lawsuit Filed Over Data Breach
Lawsuit filed against Commonwealth Health cardiology following patient data breach
Manchester University students threatened by ransomware gang
Maryland Department of Human Services, Johns Hopkins University affected by data breach
Meta’s Data Practices Are in the Spotlight: Brands Should Pay Close Attention
NCSC Launches Cyber Risk Management Toolbox
New Fortinet's FortiNAC Vulnerability Exposes Networks to Code Execution Attacks
New Mockingjay Process Injection Technique Could Let Malware Evade Detection
New Mockingjay process injection technique evades EDR detection
New Ongoing Campaign Targets npm Ecosystem with Unique Execution Chain
New York City Public Schools among MOVEit data breach victims
Outlook for the web outage impacts users across America
Over Half of UK Banks Are Exposing Customers to Email Fraud
Payments Lobby: Anti-APP Fraud Policies Could Increase Scams
Petro-Canada stations hit by Suncor cyberattack
Rise in phishing and smishing attempts
School cyber teams go back to the drawing board
Seizure of EncroChat Enables Police Access to 115 Million Conversations
Siemens Energy confirms data breach after MOVEit data-theft attack
Siemens Energy Investigating Dark Web Ransomware Claim
Study Reveals Alarming Gap in SIEM Detection of Adversary Techniques
Study shows a 54% increase in ransomware incidents in Singapore
Submarine Cables at Growing Risk of Cyber-Attacks
Swiss intelligence warns of fallout in cyberspace as West clamps down on spies
The ChatGPT-powered cyber threats you should absolutely know about
The rise and fall of the Conti ransomware group
There’s no winning the cyber war — but that’s OK
Third-Party Vendor Hack Exposes Data at American, Southwest Airlines
UCLA, Siemens Energy latest MOVEit victims to confirm breaches
Ultimate Guide to Optimizing Android Privacy and Security Settings
What is Data Loss Prevention (DLP)?
What is RepoJacking and How Organizations are Vulnerable to It?
Widespread BEC attacks threaten European organizations
Windows 10 KB5027293 update released with 3 new features, 14 changes
Windows 11 KB5027303 preview update enables new Moment 3 features
26/06
3 erros que te tornam alvo fácil para hackers na internet
3 Steps to Successfully & Ethically Navigate a Data Breach
5 free online cybersecurity courses you should check out
10 Cybersecurity Steps That Every Startup Must Use
52% of reported breaches came through third-party partners
81% of organizations have implemented policies around generative AI
Activision Blizzard games crippled by hours-long DDoS attack
Anatsa Android trojan now steals banking info from users in US, UK
Anonymous Sudan’s Attack of European Investment Bank: Money, Politics and PR
April’s Harvard Pilgrim Health Care Data Breach May Impact 200,000 in New Hampshire
Be safe inside your cyber fortress
Beware! Mallox Ransomware Attacks IT Industries With a New Attack Pattern
BlackCat ransomware gang publishes 1.4TB of data stolen from Australian law firm HWL Ebsworth
Blizzard Entertainment hit by DDoS attack
British Twitter Hacker Sentenced to Prison in US
Brunswick Operations Normal Again After Cyber Attack
Calgary-based Suncor Energy says it suffered a cyber security incident
Canadian oil & gas player runs into cyber security incident
ChatGPT’s phishing ‘problem’ may not be overstated
Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks
CISOs are More Concerned with Lawsuits, and API Security (Survey Report)
Companies Call for Changes to UK’s Cyber Essentials Scheme
Cyber Attack Causes Problems for Fort Worth, Texas
Cybersecurity audits and 5 common mistakes to avoid
Employee security awareness is key in fight against cyberattacks
Exploring the persistent threat of cyberattacks on healthcare
Fake Super Mario 3 Installers Drop Crypto Miner, Data Stealer
Fintech’s Crucial Role in Reducing Cyber Threats
Fortra GoAnywhere hack impacted the University of Toledo Medical Centre
Government Cautions ChatGPT Users Against Threat of Phishing and Malware
Growing Need for Cybersecurity in Interconnected World
Hackers steal data of 45,000 New York City students in MOVEit breach
High-Impact Attacks On Critical Infrastructure Climb 140%
How CISOs can balance the risks and benefits of AI
How hardening Microsoft 365 tenants mitigates potential cloud attacks
Indian tech retail giant Poovika leaked over 8m sensitive data records via unsecured cloud database
Inside Threat Actors: Dark Web Forums vs. Illicit Telegram Communities
Japanese Cryptocurrency Exchange Falls Victim to JokerSpy macOS Backdoor Attack
Latest MOVEit exploit hits thousands of NYC school students and staff
Latitude hit with $1 million lawsuit over data breach
Malicious Actors Utilizing QR Codes to Deploy Phishing Pages to Mobile Devices
Man charged in US for running 'Monopoly' darknet drug market
Metro Vancouver Transit Police Hit by Cyber Attack
Microsoft Warns of Widescale Credential Stealing Attacks by Russian Hackers
Millions Face RepoJacking Risk on GitHub Repositories
MOVEit compromise affects pension systems, insurers
New PindOS JavaScript dropper deploys Bumblebee, IcedID malware
NSA Releases Guide to Mitigate BlackLotus Bootkit Infections
Pilot data of American Airlines and Southwest stolen in data breach
Policy, Plan & Playbook: Preparing a Cybersecurity Incident Response
Ransomware: recovering from the inevitable
Ransomware attacks affect consumer behaviors
Reported data breach of NYC schools compromises sensitive information of 45,000 students
Researchers Find Way to Recover Cryptographic Keys by Analyzing LED Flickers
Security leaders say cloud platform misconfiguration is biggest threat
Serious IDOR Vulnerability Found In Microsoft Teams
SolarWinds executives receive Wells notice from US SEC
Southwest, American Airlines pilot data exposed
Student Sues Whitworth University for Ransomware Damages
Suncor Energy cyberattack impacts Petro-Canada gas stations
Suncor Energy Responds to Cyber Security Incident
Suncor Energy says it experienced a cyber security incident
The CISO’s toolkit must include political capital within the C-suite
The Role of 2FA in Protecting Against Phishing Attacks
Three-quarters of consumers are ready to ditch a company after a ransomware attack
Twitter Celeb Hacker Jailed For Five Years
Umbral Stealer Discovered in Trojanized Super Mario Installer
Uncovering attacker tactics through cloud honeypots
US Authorities Seize BreachForums Domain
US goading Japan to up its cybersecurity game
Vincera Institute says ransomware attack compromised the healthcare information of 25,000 patients
Why cyberattacks against Australian organisations are increasing
Why immutable backups are key in the fight against ransomware
Why you need a fresh approach to cloud security in 2023
Windows 11 is getting a built-in passkey manager for Windows Hello
25/06
Brasil registra mais de 103 bilhões de tentativas de ataques hackers em 2022
CoWIN Data Breach Reveals Security Gaps In India’s Critical Information Infrastructure
Cyberattacks on hospitals 'should be considered a regional disaster,' researchers find
Hacker PlugwalkJoe é condenado a 5 anos de prisão por roubo de US$ 794 mil
Lessons for employers following major data breach
The Anatomy of a Phishing Attack: How Anti-Phishing Technologies Work
The Importance of Data Privacy in Personalization
Three Top Tips to Battle a Cyber Attack
Trojanized Super Mario game used to install Windows malware
Twitter hack: Joseph O'Connor jailed for celebrity cyber attack
Twitter Hacker Sentenced to 5 Years in Jail for Crypto Theft