top of page

DAILY NEWS: Maio - Junho (28/05 - 03/06) - 22 Semana de 2023

Cyber Security and Information Security News --- Daily Updates !! Weekly Resume


9 Ways to Prevent Supply Chain Attacks

500 email addresses of ABP pensioners accidentally leaked

A Startup’s Guide To Navigating Data Privacy & Security Regulations In India

Australia Post customers warned over dodgy notification

Cloud Security Tops Concerns for Cybersecurity Leaders: EC-Council's Certified CISO Hall of Fame Report 2023

Cyber Risks: Secure Yourself Now Before It’s Too Late!

Cybersecurity in Education: Protecting Student Data in the Age of EdTech

FBI warns all Wi-Fi users over bank-draining mistake they must never make in public or risk ‘stranger danger’ hackers

Fear Data Breaches? 7 Steps To Safeguard Your Financial Transactions In The Cyber Age

Federal Trade Commission (FTC) Slams Amazon with $30.8M Fine for Privacy Violations Involving Alexa and Ring

Hacker que ostentava luxo na web e agrediu namoradas é 'complicado', diz delegado

How AI Protects (and Attacks) Your Inbox

How to Keep Malware Out of Your Hotmail and Gmail Accounts

ICRI Invites Applications For BCA In Cyber Security

India's shift towards digitization in healthcare makes it an attractive target for cybercriminals: Siddharth Gandhi, 1Kosmos

New Linux Ransomware Strain BlackSuit Shows Striking Similarities to Royal

Online sellers targeted by new information-stealing malware campaign

Phishing Attack Strikes Pepe Holder, Causing $450K Loss

Polícia Civil identifica hacker que invadiu o sistema de empresa catarinense

RBI proposes cyber security framework for payment system operators, seeks feedback by June 30

Russian firm says staff's iPhones hacked by malware

Russian official detained for accepting record bribe of $28M BTC

Social Security: 10 ways to protect personal information

Swiss Administration Hit By Cyber Attack

The Growing Importance of Cybersecurity in Proptech

The iPhone Browsing Mistakes You Should Avoid At All Costs If You Want To Protect Your Personal Data

Vietnam: New draft Cybersecurity Administrative Sanctions Decree

Vulnerability Scanning, Vulnerability Assessments, and Vulnerability Management: What You Need to Know

Zyxel shares tips on protecting firewalls from ongoing attacks

What is incident response and how it can safeguard MSMEs in cybersecurity

Why is Identity Security Awareness Becoming the Need of the Hour?


6th Edition of Cyber Security Innovation Series and Awards on 6 – 7 June 2023: Exploring Next-Generation Cybersecurity for the Digital Era

A New Ransomware Scam: Fraud by the Incident Responders

Abu Dhabi Police warn residents against online scams, phishing

Amazon é multada em US$ 30 mi por violações de privacidade

Building an Effective Managed Threat Detection and Response Program

Burton Snowboards discloses data breach after February attack

Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering

Canada implements cyber security certification to safeguard defence industry

Capita Cyber Attack: A Wake-Up Call for the Pensions industry

Check Point’s Interactive Cyber Center Teaches Thousands of Young People to Be Safe Online

Chinese Phishing Gang "PostalFurious" Expands Campaign

Coreia do Sul impõe sanções contra grupo de hackers norte-coreanos

Cyber Security Headlines: Amazon Ring privacy violations, Kaspersky triangulation APT, Cybercommand Hartman

Cyber Security Headlines Week in Review: Amazon Ring privacy violations, Gigabyte firmware problems, AI extinction threat

Cyber Shield: Strengthening National Defense through Advanced Cyber Security

Cybercriminals use legitimate websites to obfuscate malicious payloads

Cybersecurity-as-a-service to dominate security solutions soon – Jimi Falaiye

Cybersecurity Certification Framework for Defense Contractors in the Works

Cybersecurity experts explain how password managers can help you to stay safe online

Data Breaches: Mitigating Cyber Risks in the Evolving Digital Age

Data Security Council of India (DSCI) released cybersecurity skilling report with EY

Dental insurer experiences data breach affecting nearly 9M patients

Despite cutbacks, IT salaries expected to rise

Empresa sofre com ação e extorsão realizada por hacker em Rio Preto

Estúdio de Stalker 2 atribui vazamentos recentes a um grupo hacker russo

Fenz IT supplier hit by cyberattack, emergency services not affected

Finery Markets’ security goes beyond best practices, cybersecurity firm UnderDefense finds

Firm launches digital training for cybersecurity

Fraud Alert: 'Professional' Cyber Attacks Are Increasing, So Is Malware, Ransomware

Ghost Sites – Hackers May Steal Corporate Data From Deactivated Salesforce Communities

Google triples reward for Chrome full chain exploits

Group-IB exposes Chinese-speaking phishing gang behind scams impersonating UAE public bodies

Hacker que ostentava nas redes sociais é procurado em São Paulo

Hackers, Fraudsters and Thieves: Understanding Cybersecurity in the Gaming Industry

Hackers invadem Twitter de diretor do ChatGPT e divulgam golpe com criptomoedas

Has Lloyd’s really banned underwriters from insuring state-backed cyber attacks?

HMRC warns Britons to watch out for new scam that ‘harvests’ people’s financial details

How defense contractors can move from cybersecurity to cyber resilience

Idaho hospitals working to resume full operations after cyberattack

Insurers Predict $33bn Bill for Catastrophic "Cyber Event"

Introducing the book: Cybersecurity First Principles

ISACA announces pledge to grow European cyber workforce

JD Group advises customers take precautions following data breach

Kaspersky Says it is Being Targeted By Zero-Click Exploits

Legal tech firm Casepoint investigates data breach following hacker claims

Major data breach at UL Hospitals Group exposes patient info

Malicious Chrome extensions with 75M installs removed from Web Store

Microsoft joins Indian govt to train 6K students, 200 educators in cybersecurity skills

Middlesex Co. Public Schools confirms ransomware attack

MOVEit Transfer software zero-day actively exploited in the wild

MOVEit Transfer Under Attack: Zero-Day Vulnerability Actively Being Exploited

MOVEit Transfer vulnerability is being exploited widely

MOVEit Transfer zero-day attacks: The latest info

New Botnet Malware 'Horabot' Targets Spanish-Speaking Users in Latin America

New Zero-Click iOS Malware Actively Attacks iPhone Through iMessage

NFT hacker’s new technique introduces new feature to Blur market

NHS Facebook data breach: Buckinghamshire Healthcare NHS Trust apologises for leak

North Korea's Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks

Oakland Faces Potential Lawsuits in the Aftermath of Ransomware Attack

OpenAI Wants You to Fix Their Cybersecurity Problems

Orbiter Finance Discord Server Hacked

Over 1,000 Midwest Patients Affected By UL Hospitals Group Data Breach

Patients’ info accidentally sent to unidentified individual by UL Hospitals Group

Point32Health ransomware attack exposed info of 2.5M people

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

Qakbot: The trojan that just won’t go away

RaidForums: O hacker menor que pode ser extraditado para os EUA

Ransomware Attack Prevention Checklist – 2023

Ransomware breach hits US dental insurance giant, personal information of 9 million people compromised

Recovering from a data breach and the role of legal experts

Rússia diz que EUA usaram bug do iOS para hackear iPhones

Russia says US hacked thousands of Apple phones in spy plot

Russian Hacker Sells Terminator Tool That Is Allegedly Able to Bypass Any Antivirus Programs

Russia’s FSB blames the US intelligence for Operation Triangulation

S. Korea, US craft 1st cybersecurity guidance

Salvador Technologies Announces Expansion of its Channel Partner Network in Europe

Secureworks unifies industrial cybersecurity with the first integrated MDR solution for OT and IT

Security Recruiter Directory

SimpleTire loses 1 million customer records in data breach

Super Alert - 2 June 2023: cyber security; consumer data right; modern slavery; updated reporting standards

The Growing Importance of IoT Security in Cybersecurity Technologies

The Importance of Managing Your Data Security Posture

The Role of Cryptography in Modern Cybersecurity Technologies

Top cybersecurity M&A deals for 2023

Two Years After Colonial Pipeline, What Have We Learned?

Virginia School System Hit by Ransomware Attack: Investigation Underway

Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations

Zipper manufacturer YKK Group allegedly breached by LockBit

Why teaching schools about cybersecurity must be top priority

Windows Users Beware: Crooks Relying on SeroXen RAT to Target Gamers

You might have been phished by the gang that stole North Korea’s lousy rocket tech


Active Mirai Botnet Variant Exploiting Zyxel Devices for DDoS Attacks

After Ransomware Attack, Oakland Faces Data Breach Lawsuit

Amazon to Pay $31m After FTC's Security and Privacy Allegations

Anonymous Sudan doubles ransom demand to $3m as SAS struggles to restore operations

ANPD divulga lista de processos de fiscalização em andamento

Automotive Cybersecurity: Enhancing Automotive Cybersecurity in a Connected World

Beware of New Cryptomining Malware Delivered Using TeamViewer Accounts

BigID wants to let you tweak your data classifications manually

BlackCat claims the hack of the Casepoint legal technology platform used by US agencies

Bratislava faced massive cyber-attack during GLOBSEC conference

Breach at Major Dental Insurer Exposes Data of 9 Million People

Cipherpoint Signs Agreement with Trend Micro

Cisco adquire Armorblox, empresa de segurança de e-mail por IA

Cisco Cybersecurity Academy arranca em Portugal no fim do Verão

Combatting the ever-changing cyber threats in banking

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!

CrowdStrike & AWS accelerate development of cybersecurity AI

Cyber security major sees big cloud tech push in banks, SMBs

DDoS-For-Hire Services Used by Hacktivists in 2023

Developing An Unbreakable Cybersecurity System

Disaster recovery challenges enterprise CISOs face

Dollar Bank Files Notice of Data Breach Impacting Standard Bank Customers

E-Discovery Company Casepoint Investigates Data Breach After Files Found On Dark Web

Effective cyber security in a crisis

Enzo Biochem Announces Ransomware Attack Resulted in Data Breach Impacting Nearly 2.5 Million Consumers

Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks

Fighting ransomware: Perspectives from cybersecurity professionals

Florida County Election Breach Exposes 58K Voters’ Data

Generative AI – the next biggest cyber security threat?

Google triples rewards for Chrome sandbox escape chain exploits

Hacker de Santos que Ostenta Vida de Luxo é Procurado por Desviar Milhões de Bancos

Harvard Pilgrim Health Care ransomware attack hits 2.5 million people

HMRC in New Tax Credits Scam Warning

Horabot Campaign Targets Spanish-Speaking Users in the Americas

How MFA phishing compromises large company networks

How Wazuh Improves IT Hygiene for Cyber Security Resilience

Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics

Improved Cybersecurity By Itself Isn’t Enough To Stop Fraudsters

Insider Threats in the Work from Home Age

Is cyber training all the same old? Shift your perspective and get stuck in

ISACA Pledges to Boost Cybersecurity Skills In Europe

ISACA pledges to help grow cybersecurity workforce in Europe

Justice department loses millions in yet another cyber attack

Lab Testing Firm Says Ransomware Breach Affects 2.5 Million

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection

MCTI e Embrapii investirão R$ 60 mi em centro de cibersegurança

Minimizing Cybersecurity Risks With ISO/SAE 21434

Mitigating ransomware attacks in SA organisations

N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT

Narcotics, cyber security bureaus launched in state

Navigating cybersecurity in the age of remote work

New MOVEit Transfer zero-day mass-exploited in data theft attacks

New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware

Phishing campaigns thrive as evasive tactics outsmart conventional detection

Potential Backdoor in Gigabyte PCs Exposes Supply Chain Risks

President Karis: Cyber security must involve whole of society

Qbic Fortify+ Wins 2023 Fortress Cyber Security Award

Russia says US hacked thousands of iPhones in iOS zero-click attacks

Seacom clients complain of post-attack billing errors

Senate Abraham Accords Caucus pushes for cybersecurity cooperation

Setor de governo é o segundo que mais sofre ataques no Brasil

The Growing Importance of Endpoint Security in Cybersecurity Technologies

The Role of Cyber Threat Intelligence in Cybersecurity Technologies

Threat actors can exfiltrate data from Google Drive without leaving a trace

UI Community HomeCare Files Notice of Data Breach Affecting 67,897 Individuals

Ukrainian hackers target Russia's high-tech hub, Skolkovo Foundation, in a cyberattack

Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin

Urgent WordPress Update Fixes Critical Flaw in Jetpack Plugin on Million of Sites

Void Rabisu's RomCom Backdoor Reveals Shifting Threat Actor Goals

Zyxel Customers Urged to Patch Exploited Bug

Zyxel firewalls under attack by Mirai-like botnet

What is the Cybercrime Atlas? How it can help disrupt cybercrime

What’s New In Cybersecurity For Physical Security Systems?

Whitman-Hanson Regional School District Notifies Past and Present Employees of July 2022 Data Breach

Why organizations should adopt a cloud cybersecurity framework

Widespread exploitation by botnet operators of Zyxel firewall flaw

Windows 11 will let you view phone photos in File Explorer


3 ways to spot a malware-infected app on your smartphone

6 Steps to Effectively Threat Hunting: Safeguard Critical Assets and Fight Cybercrime

AI definitely has a role to play in cyber security

AI in cybersecurity: Friend or foe?

Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months

As Cybercrime Keeps Upping Its Game, Cybersecurity Must Answer With Strategic Unified Force

Attackers leave organizations with no recovery option

Barracuda patches zero-day vulnerability exploited since October

Barracuda Zero-Day Exploited to Deliver Malware for Months Before Discovery

Beware of Ghost Sites: Silent Threat Lurking in Your Salesforce Communities

Cado Security Wins 2023 Fortress Cyber Security Award

Can Organizations Combat Malicious Password-Protected File Attacks?

Canada Aids Defence Industry in Cybersecurity Protection

Canada to set up cyber security certification for defence contractors - minister

Cisco lança Cybersecurity Academy em setembro

Cloud Range Wins 2023 Fortress Cyber Security Award

ConnectSecure enhances its cybersecurity platform with deep attack surface scanning and EPSS

Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices

Cyber Security Market Analysis by Current Status, Business Scope, Drivers and Challenges for next 5 years

Cybersecurity Standards in the Banking Industry

Cybersecurity Technologies: The Next Generation of Defense

Daam Malware Warning Issued: Targets Android Smartphones To Steal User Data, Encrypts Devices

Dark Pink APT Group Expands Tooling and Targets

Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks

Dark Pink hackers continue to target govt and military organizations

Data of more than 470,000 hacking site members leaked

Data Theorem’s Leading AppSec Solution Wins 2023 Fortress Cyber Security Award for Application Security

Danni Brooke to Spotlight the Role of Women in Cyber at Infosecurity Europe 2023

Deepwatch Wins 2023 Fortress Cyber Security Award

Gendering Cybersecurity through Women, Peace and Security: Gender and Human Rights in National-level - Approaches to Cybersecurity

Greece Orders Probe Into Massive School Exam Cyber-Attack

Greece's Education Ministry Faces Unprecedented Cyber Attack Targeting High School Exam Platform

Hackers white hat descobrem vulnerabilidade de US$ 500 milhões na rede TRON

How APTs target SMBs

How Asset Management Bolsters Cybersecurity

Impact of Cyber- Security in the Digital Era

Interest in Cybersecurity Career Opportunities is Surging

Jimbos Protocol Takes Stand Against Hacker, Demands Stolen Funds or Legal Pursuit

Kali Linux 2023.2 released: New tools, a pre-built Hyper-V image, a new audio stack, and more!

Keyfactor Wins 2023 Fortress Cyber Security Award for Second Consecutive Year

Latitude says March cyber attack may result in £55.14m in mitigation costs

Lazarus Hacking Group Attack IIS Web Servers to Install Web Shell

Leonardo S p A : Aircraft | Cyber Security | Electronics | Helicopters Leonardo showcases its technologies for new maritime challenges at SEAFUTURE

Lessons from Denmark: Why knowledge sharing is the most important weapon against cyber threats

Managing mental health in cybersecurity

Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass

National Security Services Group Receives Prestigious Comex 2013 Cyber Security Award for 2023

Ontinue CEO Geoff Haydon Wins Leadership Award in 2023 Fortress Cyber Security Awards

Organizations are placing OT cybersecurity responsibility on CISOs

Pentagon Cyber Policy Cites Learnings from Ukraine War

Phishing remained the top identity abuser in 2022: IDSA report

Retail under attack! Why cybersecurity is important to the sector

RomCom RAT Using Deceptive Web of Rogue Software Sites for Covert Attacks

Russia’s ‘Silicon Valley’ hit by cyberattack; Ukrainian group claims deep access

Search the Instagram post location using Instagram Location Search

Segra Wins 2023 Fortress Cyber Security Award

Should paying cyber ransoms be outlawed?

Spyware Found in Google Play Apps With Over 420 Million Downloads

The cybersecurity risk of third-party vendors

The Role of Biometrics in Enhancing Cybersecurity

The strategic importance of digital trust for modern businesses

Thinking straight in the SoC: How AI erases cognitive bias

Threatening botnets can be created with little code experience, Akamai finds

Toyota Australia customers victim of data breach

Trellix, Netskope announce new Amazon Security Lake support to enhance threat detection, remediation

Zyxel patches vulnerability in NAS devices (CVE-2023-27988)

What is federated Identity? How it works and its importance to enterprise security

WordPress Rushes Out Jetpack Patch to Millions


21st Century Technologies: Predictive Analytics in Cybersecurity

68% of organizations suffered a cyberattack in past year

89% of businesses report concern over new privacy regulations

A database containing 478,000 RaidForums members leaked online

AI-automated malware campaigns coming soon, says Mikko Hyppönen

Analysis: How to navigate cyber security crisis management

Android apps with spyware installed 421 million times from Google Play

Atento SA A Leader in AI Cyber Security and Beyond

Attackers hacked Barracuda ESG appliances via zero-day since October 2022

Barracuda zero-day abused since 2022 to drop new malware, steal data

Beware of the new phishing technique “file archiver in the browser” that exploits zip domains

Billions of Facebook users warned about ‘look who just died’ scam

BrutePrint Attack allows to unlock smartphones with brute-forcing fingerprint

Capita cyber-attack: 90 organisations report data breaches

CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security

Colt, Venari Security Partner to Help Businesses Protect Against Growing Cyber Risks

Cyber Security Assessments Help Business Leaders Know Their Risk

Cyber security experts, law enforcement warn of uptick in AI scams

Dark Web Data Leak Exposes RaidForums Members

Denúncia: hacker brasileiro foragido atacava empresas com ransomware

DogeRAT Malware Impersonates BFSI, Entertainment, E-commerce Apps

Embedding Zero Trust in the DNA of public sector security

Frontegg launches entitlements engine to streamline access authorization

Generative AI: The new attack vector for trust and safety

Global Automotive Cybersecurity Market Size and Forecast | Infineon Technologies AG, Argus Cyber Security, Intel Corporation, Trilium Inc., Harman International Industries Delphi Automotive PLC, Lear Corporation, SBD Automotive & Ncc Group, Arilou Technologies, Karamba Security.

Grupo de hackers do Lazarus miram em servidores da Web do Windows IIS para acesso inicial

Hacker usou um smartphone antigo para criar um mini laptop DIY

Hacker group Anonymous Sudan demands $3 million from Scandinavian Airlines

Hackers Win $105,000 for Reporting Critical Security Flaws in Sonos One Speakers

High Wire Networks Aims To Quadruple Cybersecurity Sales This Year

Human Error Fuels Industrial APT Attacks, Kaspersky Reports

Implementing Risk-Based Vulnerability Discovery and Remediation

In the News | After a Cyber Attack: Dos and Don’ts for Higher Education IT Staff

International Cybersecurity Cooperation Looks Great on Paper, but Needs Work on Implementation

Justiça nega habeas corpus a hacker implacável que invadiu sistemas de banco público

Microsoft finds macOS bug that lets hackers bypass SIP root restrictions

Microsoft shares fix for cameras not working on Surface laptops

Nigerian Cybercrime Ring's Phishing Tactics Exposed

Nine Million MCNA Dental Customers Hit by Breach

Organizations spend 100 hours battling post-delivery email threats

Over 421,000,000 Times Installed Android Apps from Google Play Contain Malware

Penetration tester develops AWS-based automated cracking rig

Probe into 'data breach' in organ registry withdrawals

PyPI enforces 2FA authentication to prevent maintainers’ account takeover

Raidforums Database Leak: Data of 460,000 Users Dumped Online

Ransomware Gangs Adopting Business-like Practices to Boost Profits

Retailer Database Error Leaks Over One Million Customer Records

RomCom malware spread via Google Ads for ChatGPT, GIMP, more

Screen recording Android app found to be spying on users

"Script Kiddies": o que fazem estes jovens no submundo da internet?

Security Exchanges Commission (SEC), US Courts, and Department of Defense (DoD) legal platform allegedly breached

SimpleTire Database Leak: Over 2.8 Million Records Exposed

Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Android Users

Telesign Trust Index a call to action for any enterprise that’s discounting cybersecurity

The root causes of API incidents and data breaches

Top 5 Cyber Security Online Courses to Make a Good Pay

Upskilling the non-technical: finding cyber certification and training for internal hires

Vulnerability of social media in digital society: Strengthening cyber security defences

Where Hospitals Are Still More Cyber Reactive Than Proactive

Why the UK Government Must End its Senseless Encryption Demands

WordPress plugin ‘Gravity Forms’ vulnerable to PHP object injection


3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

7 Reasons to Safeguard Your Business with Robust IT Security Solutions

$8 trillion in losses

21st Century Technologies: Mobile Threat Defense

60% Increase in Cyberattacks on Irish Healthcare System

AceCryptor: Cybercriminals' Powerful Weapon, Detected in 240K+ Attacks

Android malware ‘Daam’ spreading: CERT-In issues advisory on data security and ransomware

Anonymous Sudan claims second major cyber attack on Scandinavian airline SAS

Attackers use encrypted RPMSG messages in Microsoft 365 targeted phishing attacks

Beware of gambling apps, phishing attacks targeting users on the rise

Beyond terrorists and ransomware: Contrary to popular culture, hacking isn’t cool — it’s a crime

BlackByte ransom gang claims City of Augusta, Georgia

Capita hack: 90 organisations report data breaches to watchdog

CISO-approved strategies for software supply chain security

Company size doesn’t matter when it comes to cyberattacks

Dark web unveils 47k stolen payment cards in SA

Data Breach at MCNA Dental Insurer Impacts 9 Million Users

Development Bank of South Africa (DBSA): Possible Compromise of Information Systems

Digital nomads drive changes in identity verification

Don't Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims

Encrypt (Almost) Everything and Avoid Being the Next Headline

Enhancing cybersecurity in the packaging industry

Exploring Solutions of Financial Risks in DeFi

Flash loan attack on Jimbos Protocol steals over $7.5 million

For Enterprises, Secure Data Backup Is The Only Alternative To Ransomware Payments

Hacker Transfers $1M Worth of BNB to Tornado Cash Following Level Finance’s Exploit

Hackers claim they went after Canada’s gas infrastructure. Can renewables withstand the same cyberattacks?

Hackers hold city of Augusta hostage in a ransomware attack

Hackers target Indian organisations with spear phishing

How To: Improve Your Cyber Resilience

HSE sections 60% rise in attempts at cybercrime attacks

Insurance regulators examining Point32Health data breach

Investigation Launched After London City Airport Website Hacked

Invoice and CEO Scams Dominate Fraud Impacting Businesses

It’s Time for the United States to Adopt a New Strategy to Combat Ransomware

Italian Ministry hit by “heavy cyberattack”

Jimbos Protocol Hack: $7.5 Million Lost in Latest DeFi Attack

Lazarus hackers target Windows IIS web servers for initial access

Lockbit ransomware attack on MCNA Dental impacts 8.9M individuals

Madhya Pradesh power management co’s IT system hit by ransomware attack

MCNA Dental data breach impacts 8.9 million people after ransomware attack

Mercer University data breach impacted over 93,000 students & others

Microsoft Takes The Title As The Top Spoofed Brand Two Years Running

Most CEOs now see cybersecurity as more important than economic performance

MP power mgmt co hit by ransomware

NCB Management Services says data breach impacted more than 1 million customers

New ‘Bandit Stealer’ malware siphons data from browsers, crypto wallets

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force

New GobRAT Remote Access Trojan Targeting Linux Routers in Japan

New Mirai Variant Campaigns are Targeting IoT Devices

New phishing technique poses as a browser-based file archiver

Number of new country code phishing domains dropped significantly thanks to Meta

Over 340 million accounts compromised in data breaches

Populus Financial data breach impacted more than 50,000 customers

Privacy and Cybersecurity Risks with Artificial Intelligence

PyPI Implements Mandatory Two-Factor Authentication for Project Owners

QBot malware exploits Windows WordPad EXE to take over

Ransomware attack on Point32Health compromised members' sensitive personal records

Sports Warehouse Fined $300,000 Over Payment Card Data Theft

Swiss automation giant reveals ransomware attack and data breach

The great CISO resignation: Why security leaders are quitting in droves

The Royal & BlackCat Ransomware: What you Need to Know

This new malware hijacks Windows WordPad to avoid detection

Top Cyberattacks Revealed in New Threat Intelligence Report

Top public cloud security concerns for the media and entertainment industry

Watch out - that Amazon or Microsoft ad could just be malware

Web shell attacks surpass ransomware as top threat in the first quarter of 2023

What Is a Computer Worm?

What Is Operations Security (OPSEC)? Meaning, Process, and Importance

What is SaaS Security? – Types, Challenges, Threats & Protection Guide


21st Century Technologies: Cybersecurity Technologies

AI and the Future of Cybersecurity: Predicting and Preventing Attacks

Arbitrum liquidity protocol Jimbos suffers $7.5 million ETH hack

Are We Seeing Fewer Ransomware Attacks? Not Now

Artificial Intelligence’s Risks and Rewards in Cybersecurity

Banks warn to watch out for these scams in South Africa

Central agency warns of phone virus that hacks into call logs, camera

ChatGPT phishing fantasies: will AI chatbots help fight cyberscam?

Chinese hackers seeking ways to cripple infrastructure ‘likely to have targeted UK operators’

Clever ‘File Archiver In The Browser’ phishing trick uses ZIP domains

Coláiste Chú Chulainn Dundalk student Finnian set to join national cyber security team

Confidential Report Flags Bitfinex Security Lapses in Huge 2016 Hack

'Cybercriminals are creating new ways of hacking'

Cybersecurity Consulting Services Market is Booming Worldwide | BlackBerry, Symantec, McAfee, Deloitte

Dutch watchdog investigates alleged Tesla data breach

Future of healthcare cybersecurity: Key strategies for 2023 and beyond

Ghana: Vice President Commissions Bank of Ghana’s State-of the Art Cybersecurity Infrastructure for the Financial Industry

Hacker rouba 4.090 ETH de protocolo e token do projeto vai a zero

Hackers selling access to school IT systems, cyber security firm says

India sees 31 per cent surge in malware attacks in 2022: SonicWall report

Is the gig up when it comes to cybersecurity?

ITU-ARCC and Huawei to jointly promote public-private cybersecurity collaboration

Latitude reveals the cost of its cyber attack

Medmark and Howden host Cyber Insurance Seminar to help clients hedge against rising malware attacks

Nearly 60% of firms have experienced a GDPR-related data breach in the past five years – new data published by iResearch Services

New Bandit Stealer targets web browsers and cryptocurrency wallets

PSA: para evitar malware, verifique isso antes de comprar uma Android TV

Quadrilha de hackers de games é presa com carros de luxo

Trend Micro’s Risk to Resilience: World’s largest cybersecurity roadshow reached Oman as part of global tour

Why passkeys might be the solution

DAILY NEWS: Maio (21/05 - 27/05) - 21 Semana de 2023

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.


Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page