top of page

DAILY NEWS: Outubro/Novembro (30/10 - 05/11) - 44 Semana de 2022

Cyber Security and Information Security News - Daily Updates !! Weekly Review


27% Of Global Companies Suffer Data Breaches In 3 Years – PwC

Amazon Data Breaches History and Complete Timeline up to 2022

‘Cyber security must be preventive’

Cybersecurity Is Collective Responsibility, Says Stanbic IBTC

Hackers Abusing Microsoft Dynamics 365 Customer Voice to Steal Credentials

Hackers sending govt officials phishing mails for T-20 World Cup bets, claims cybersecurity firm

'It's a nightmare.' Expert weighs in on ransomware attack facing Norman Public Schools

Microsoft Warns of Uptick in Hackers Leveraging Publicly-Disclosed 0-Day Vulnerabilities

NHS cyber attack still believed to be affecting patients’ records three months on

Password attacks rise to 921 per second: Microsoft

Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP Stealer

Technology group providing services to Victorian government departments hit by cyber attack

TechWyse director Nuno Soares presenting seminar on cyber security at The Business Show at London's Excel


5 use cases for MDR to fight ransomware

Action Steps to Enhance 911 System Cybersecurity

Argentina recebe conferência de hackers para debater guerra cibernética na Ucrânia e como invadir a Nasa

As Twitter brings on $8 fee, phishing emails target verified accounts

At $2 mn-plus, manufacturing sector paid the biggest ransom after cyberattacks

Ataque hacker derruba telescópio mais poderoso do mundo

Attackers leverage Microsoft Dynamics 365 to phish users

Australia sees rise in cybercrimes on back of 'destructive' ransomware, state actors

Black Basta Ransomware Attacks Linked to FIN7 Threat Actor

Black Basta Ransomware Linked to FIN7 Cybercrime Group

Business Email Compromise (BEC) Group Crimson Kingsnake Linked to 92 Malicious Domains

CISA Warns of Critical Vulnerabilities in 3 Industrial Control System Software

Cisco addressed several high-severity flaws in its products

Cyber attack disrupts Norman school district

Cyber Insurance and Cybersecurity Policy: An Interconnected History

Cyber security experts reveal the most common password misconceptions

Defensics adds gRPC support for distributed web and mobile application security testing

“Disturbing” Rise in Nation State Activity, Microsoft Reports

Dropbox Data Breach Another Multifactor Fail

Eight Best Practices For Ransomware Threat Hunting

Hacker volta a atacar e rouba R$ 4 milhões em NFTs

Hacking Google: Lessons From the Security Team, Part Two

Honeywell weighs in on OT cybersecurity challenges, evolution

ICO Slashes Government Data Breach Fine

Investigadores usaram um satélite desativado para transmitir TV hacker

Iran poses major cyber-security threat to Gulf

Is Monkey Drainer Contract the Biggest Phishing Business in Crypto Right Now?

LockBit Claims Ransomware Attack on Continental

Microsoft says “it’s just too difficult” to effectively disrupt ransomware

National Guard Leaders Warn More Cyber Security Spending Needed to Help Protect Elections

New CISA Goals Tackle Critical Infrastructure Cybersecurity

NHS cyber attack hits patient care with records left in ‘chaos’ three months on

November 2022 Patch Tuesday forecast: Wrapping up loose ends?

OakBend Medical Center Provides Healthcare Data Breach Notice

One-third of organizations changed leadership after a cyberattack

Outmaneuvering cybercriminals by recognizing mobile phishing threats’ telltale markers

Path traversal in Java web applications – announcing the Invicti technical paper

Phishers Abuse Microsoft Voicemail Service to Trick Users

Prep for a career in cybersecurity with this $49 CompTIA boot camp

Privacy, compliance challenges businesses face after Roe v. Wade repeal

Ransomware and CISOs’ balancing act

Ransomware Group Threatens to Leak Data Stolen From Car Parts Giant Continental

Red Cross Wants Shielding from Hacks via Digital Emblem

Researchers Detail New Malware Campaign Targeting Indian Government Employees

Robin Banks phishing service returns to steal banking accounts

RomCom RAT campaigns abuses popular brands like KeePass and SolarWinds NPM

St. Luke's suffers 3rd-party data breach

The 10th edition of the ENISA Threat Landscape (ETL) report is out!

The biggest threat to America’s election system? Ourselves

The Dark Web Economy

The most frequently reported vulnerability types and severities

‘Wake-up call for real estate agencies’: Harcourts hit by data breach

Web3 Domain Alliance Emerges to Address Cybersecurity Concerns

What the Growth of Ransomware Variants Says About the Evolving Cybercrime Ecosystem

White House Convenes Ransomware Summit as Reported Incidents Soar By Over 50%

Windows 11 22H2 blocked on systems using Xbox Game Bar Capture

World's Most Expensive Observatory Floored by Cyber-Attack

Your OT Is No Longer Isolated: Act Fast to Protect It


ALMA Observatory shuts down operations due to a cyberattack

An iPhone VPN can secure your connection and unlock streaming content

Black Basta ransomware gang linked to the FIN7 hacking group

BWX subsidiary Flora & Fauna hit with data breach

Bot Warning for Retailers Ahead of Busy Shopping Season

Businesses want technologies that allow for passwordless workflows

Cyber Threat Landscape Shaped by Ukraine Conflict, ENISA Report Reveals

Cybersecurity recovery is a process that starts long before a cyberattack occurs

Cyberwar is Changing – is Your Organization Ready?

Danish train standstill on Saturday caused by cyber attack

From Online Fraud to DDoS and API Abuse: The State of Security Within eCommerce in 2022

Global coalition reaffirms commitment to fight ransomware

Hacker Charged With Extorting Online Psychotherapy Service

Hackers teriam pirateado beta do The Sims 5 e criado tokens de acesso

Hackers Using Rogue Versions of KeePass and SolarWinds Software to Distribute RomCom RAT

Healthcare data breach affects millions; Google releases security patch for Chrome

How to manage data lifecycle: Data retention for compliance

IoT cybersecurity is slowly gaining mainstream attention

LockBit repeats 'PR stunt' as Thales ransomware investigation reveals no breach

Low-Code, Citizen Development Will Lead to Major Data Breach in 2023

Malware, Ransomware, IoT Pose Major IT Security Challenges

Manufacturing sector pays highest average ransomware payment

Melbourne real estate agency data breach leaves details of renters and landlords exposed

New clipboard hijacker replaces crypto wallet addresses with lookalikes

New TikTok Privacy Policy Confirms Chinese Staff Can Access European Users' Data

Open-source software fosters innovation, but only with the right controls in place

OPERA1ER APT Hackers Targeted Dozens of Financial Organizations in Africa

Optus promises to pay cost of replacing foreign passports compromised in data breach

Ransomware attack on Osaka General's network stalls critical surgeries & daily operations

Ransomware attack strikes US hospital's legacy network, impacts over 77,000 patients

Researchers Find Links b/w Black Basta Ransomware and FIN7 Hackers

RomCom Weaponized KeePass and SolarWinds Instances to Target Ukraine, Maybe UK

Royal Mail customer data leak shutters online Click and Drop

See Tickets Suffers Credit Card Skimming Data Breach

The metaverse ushers in a new era of cyber threats

Threat Actor "OPERA1ER" Steals Millions from Banks and Telcos

TikTok Confirms Chinese Staff Can Access UK and EU User Data

Top 4 priorities for cloud data protection

UK Security Agency to Scan the Country for Bugs

US Banks should prepare to spend big on cyberdefenses as ransomware payments reach record levels

Zurich and Mondelez Reach NotPetya Settlement, but Cyber-Risk May Increase

What is a phishing attack?

Why Identity & Access Management Governance is a Core Part of Your SaaS Security


32% of cybersecurity leaders considering quitting their jobs

130 Dropbox code repos plundered after successful phishing attack

A Third of Security Leaders Considering Quitting Their Current Role

Alma radio telescope in Chile taken down by cyber attack

Almost half of phishing attacks target gov employees, research says

Alternatives to a lift-and-shift cloud migration strategy

Android Apps With a Million Downloads Led Users to Phishing Sites

Are Mobile Phones Becoming A Hacker's Dream?

Bed Bath & Beyond reviewing data breach

Câmara do Rio inicia debates sobre orçamento de 2023 após ataque hacker impedir fiscalização dos recursos

Chester, Pa., Lost $400K to Phishing Scheme Over Summer

Countries band together to better fight ransomware, set ‘priority targets’

Cyber Security Today, Nov. 2, 2022 – Unhappy infosec leaders, a list not to be on and more

Dozens of PyPI packages caught dropping 'W4SP' info-stealing malware

Dropbox Breach: Hackers Unauthorizedly Accessed 130 GitHub Source Code Repositories

Dropbox discloses unauthorized access to 130 GitHub source code repositories

Dropbox Suffers Breach, 130 GitHub Repositories Compromised

Emotet botnet starts blasting malware again after 5 month break

Experts Warn of SandStrike Android Spyware Infecting Devices via Malicious VPN App

Eye Care Leaders Data Breach Impacts 15K at Oklahoma Eye Care Practice

French defense firm denies ransomware attack after leak site posting

GitHub Flaw Underscores Risks of Open Source, RepoJacking

Group indicted for breaching CPA, tax preparation firms via stolen credentials

Hackers Stole 130 Source Code GitHub Repos In Dropbox Data Breach

Harcourts Melbourne City real estate agency advises customers of data breach

How to deal with burnout when you’re the CISO

How to Prevent Ransomware Attacks

Huawei Malaysia wins CyberSecurity Malaysia special award

Hundreds of U.S. news sites push malware in supply-chain attack

ID Authentication Bypass and the Next Evolution in Phishing Campaigns

IDC Analyst Brief reveals how passwords aren’t going away

IIT-K offers eMasters degree program on cyber security

Inside Raccoon Stealer V2

IoT Cyber Security Certification Programs Are Becoming More Prevalent. What Does It Mean For Canadian Organizations?

IoT devices can undermine your security. Here are four ways to boost your defences

Macros could be the key to a cyber attack

Meet fundamental cybersecurity needs before aiming for more

Mobile Phishing Attacks on Government Staff Soar

MODE Global, LLC Reports Data Breach Affecting 11k Individuals

Multi-Color Corporation Reports Data Breach Affecting Sensitive Employee and Dependent Information

Multiple Vulnerabilities Reported in Checkmk IT Infrastructure Monitoring Software

New London Hospital data breach class action lawsuit settlement

New research shows that next generation phishing attacks use unexpected delivery methods to steal data

Next Generation of Phishing Attacks Uses Unexpected Delivery Methods to Steal Data

OakBend Medical Center Confirms Data Breach Following Encryption Event

OpenSSL fixed two high-severity vulnerabilities

OpenSSL Security Advisory Downgraded to High Severity

Osaka hospital hit by ransomware: report

Osaka Hospital services disrupted after a ransomware attack

Phishing attacks aimed at government personnel up 30% in 2021

Presidential Cybersecurity Education Award given to Lakota teacher

Public and private sector cooperation is vital in controlling cybersecurity threats

Ransomware Attack Disrupts Japanese Hospital for 2nd Day

Ransomware cost US banks $1.2 billion last year

Ransomware Remains Top Cyber Threat To Businesses, Deep Instinct Finds

Royal Mail Admits Data Breach After IT Glitch

SandStrike Spyware Infecting Android Devices through VPN Apps

SHELT responds to cybersecurity problems of Nigerian businesses with SOC

Somnia Pain Management of Kentucky Announces Data Breach Stemming from Incident at Unnamed Management Services Organization

These Android Apps with a Million Play Store Installations Redirect Users to Malicious Sites

Top malware and ransomware trends and tactics from the first half of 2022: Report

Twitter Verified Status Users Flooded with Scams

UK NCSC responded to 63 “nationally significant” cyber incidents in past year

US Hacker Group Indicted For Million-Dollar RICO Conspiracy

Vodafone Italy discloses data breach after reseller hacked

WakeMed Faces Data Breach Lawsuit Over Meta Pixel Use

Whitepaper: Shared responsibility model for cloud security

Workshop on Digital Literacy and Cyber Security held for media personnel

Yanluowang ransomware leaks suggest pseudo Chinese persona, REvil links


86% of cloud attacks in healthcare result in financial consequences

Bed Bath & Beyond Investigating Data Breach After Employee Falls for Phishing Attack

Chinese Hackers Using New Stealthy Infection Chain to Deploy LODEINFO Malware

CISA Publishes Multi-Factor Authentication Guidelines to Tackle Phishing

Confusion Over Twitter’s Blue Tick Verification Badges Gives Rise to Phishing Scams

Critical RCE Vulnerability Reported in ConnectWise Server Backup Solution

Federal Trade Commission (FTC) Takes Enforcement Action Against EdTech Giant Chegg

Following Log4j: Supporting the developer community to secure IT

Fraudulent Instruction Losses Spike in 2022

Google ad for served info-stealing malware via lookalike site

High-severity OpenSSL vulnerabilities fixed (CVE-2022-3602, CVE-2022-3786)

Hospital de Osaka sofre ataque hacker: pacientes não podem ser atendidos

Interactive Malware Sandbox in Your Security System

Last Years Open Source - Tomorrow's Vulnerabilities

List of Data Breaches and Cyber Attacks in October 2022 – 9.9 Million Records Breached

LockBit Dominates Ransomware Campaigns in 2022: Deep Instinct

Microsoft fixes critical RCE flaw affecting Azure Cosmos DB

Most missed area of zero trust: Unmanageable applications

National Cyber Security Centre (NCSC) Issued 34 Million Cyber Alerts in Past Year

New SandStrike spyware infects Android devices via malicious VPN app

One in 42 Healthcare Organizations are Impacted by Ransomware

OpenSSL fixes two high severity vulnerabilities, what you need to know

OpenSSL Releases Patch for 2 New High-Severity Vulnerabilities

Osaka Hospital Halts Services After Ransomware Attack

Outubro bate recorde com quase R$ 4 bilhões roubados em ataques hackers

Phishing Attacks Increase by 61 Percent in 2022

Public Wi-Fi safety tips: Protect yourself against malware and security threats

Quantum ransomware group targeted Australian Clinical Labs, posted stolen data on the Dark Web

Ransomware activity and network access sales in Q3 2022

Ransomware: Not enough victims are reporting attacks, and that's a problem for everyone

Ransomware Research: 17 Leaked Databases Operated by Threat Actors Threaten Third Party Organizations

Researchers Disclose Details of Critical 'CosMiss' RCE Flaw Affecting Azure Cosmos DB

Royal Mail Data Breach: Here’s What You Need to Know

Student Suspected of Running Germany’s Largest Dark Web Market DiDW

Thales Probes Data-Leak Threat by Hacker Group

Twilio admits to falling victim to a second cyber attack in the Summer

Unofficial fix emerges for Windows bug abused to infect home PCs with ransomware

US banks report more than $1 billion in potential ransomware payments in 2021

U.S. Treasury thwarted attack by Russian hacker group last month-official

What developers want and how to keep them on your team

You can up software supply chain security by implementing these measures


A dangerous game of hide and seek

Active Raspberry Robin Worm Launch a ‘Hands-on-Keyboard’ Attacks To Hack Entire Networks

Analysis-In Australia, a hacking frenzy spurred by an undersized cybersecurity workforce

Another White Hat Hacker Returns Funds From Platform Exploit

Australian Defence Force confirm data breach hack

Australian Defence Department caught up in ransomware attack

Australian Federal Police (AFP) urge victims to report cybercrime following ransomware disruption

Australia's Department of Defence becomes latest victim of regional ransomware attacks

Azov Ransomware Runs Riot, Calls for Cyber Security Recheck

Be Alert! HTML Email Attachments Used in Phishing

Bed Bath & Beyond Are Currently Reviewing their Possible Data Breach

Bed Bath & Beyond reviewing data breach

Case study: Why cybersecurity insurance is essential for your business

Chartered Insurance Institute (CII) issues apology after data breach

Chegg sued by FTC after suffering four data breaches within 3 years

CISA, FBI, MS-ISAC Publish Guidelines For Federal Agencies on DDoS Attacks

CISA Releases Guidance on Phishing-Resistant and Numbers Matching Multifactor Authentication

ConnectWise backup solutions open to RCE, patch ASAP!

Cyber minister needed as attacks ramp up, says security expert

Cyberattacks in healthcare sector more likely to carry financial consequences

Data Breach of Missile Maker MBDA May Have Been Real: CloudSEK

Don’t Fall for This Yahoo Mail Phishing Scam

European defense contractor allegedly hit with ransomware

Europe's Biggest Copper Producer Hit by Cyber-Attack

FBI and CISA: Here's what you need to know about DDoS attacks

Five of the most dangerous RansomOps attacks

Fodcha DDoS Botnet Resurfaces with New Capabilities

German copper smelter Aurubis in cyber attack

GitHub Repojacking Bug Could've Allowed Attackers to Takeover Other Users' Repositories

Gold Coast Based Strata Management Firm SSKB Becomes Australia’s Latest Ransomware Attack Victim

Hacker da Team Finance devolve US$ 7 milhões para projetos associados após exploração

Hacker vendem acessos de 576 empresas por 4 milhões de dólares

Hackers selling access to 576 corporate networks for $4 million

Hackers strike a major Australian Defence Force communications platform in latest chaos after Optus and Medibank breaches

Hackers Target Australian Defense Communications Platform With Ransomware

Hacking group abuses antivirus software to launch LODEINFO malware

How to fortify elections and electoral campaigns against human hacking

How To Respond To A Business Data Breach In Under 60 Minutes

Instagram confirms outage following stream of user suspensions

Investigation Launched Into Ransomware Attack On Australian Defence Force

Keystone Health Faces Lawsuit Over Healthcare Data Breach

King’s Seafood data breach $350K class action settlement

Malicious dropper apps on Play Store totaled 30.000+ installations

Manufacturing sector has highest ransomware payments

Microsoft Warns Attackers Now Leveraging Raspberry Robin to Distribute Clop Ransomware

Most Online Shoppers Would Leave Retailer Following Breach

Mozilla Firefox fixes freezes caused by new Windows 11 feature

NSA shares supply chain security tips for software suppliers

OT/ICS cybersecurity threats remain high

PF busca financiadores de jovem apontado como hacker que atacou ConecteSus

Phishing volumes increase 31% in third quarter : Report

Queenslanders at risk of increased scam attacks

Ransomware: 'Amateur' Tactics Lead Fewer Victims to Pay

Ransomware attack on Dialog also took down defence app ForceNet

Ransomware hackers hit Australian defence communications platform

Russia Suspected in Truss Phone Hacking Scandal

Samsung Galaxy Store Bug Could've Let Hackers Secretly Install Apps on Targeted Devices

Scams targeting cryptocurrency enthusiasts are getting more prevalent

Serious breach of cellphone users’ data

State of Incident Response: APAC

Team Finance hacker returns $7M to associated projects after exploit

Telefonica suffers cyber-attack and tells its customers to do this urgently

This stealthy hacking campaign uses a new trick to deliver its malware

Tips for Choosing a Pentesting Company

Unofficial Patch Released for New Actively Exploited Windows MotW Vulnerability

U.S. Bank data breach impacts 11K customers

US convenes over 30 countries to address ransomware as hacks of hospitals, critical infrastructure continue

White House invites dozens of nations for ransomware summit

Will cyber saber-rattling drive us to destruction?

Will deepfake cybercrime ever go mainstream?

World’s Leading Copper Producer Aurubis Suffers Crippling Cyberattack

Young Finnish man detained in absentia over data breach at Vastaamo


5 cybersecurity mistakes that will haunt you

10 Ways to Take a Security-First Approach to Database Management

Actively exploited Windows MoTW zero-day gets unofficial patch

Air New Zealand warns of an ongoing credential stuffing attack

Binance Hacked; Nearly $600 Million in BNB Stolen

BlackByte ransomware group hit Asahi Group Holdings, a precision metal manufacturing and metal solution provider

Cost of living scams warning - the common ploys fraudsters are using to steal thousands

Drinik banking malware returns: Things you can do to keep your data safe

Driver licences with additional security measures to be issued in Victoria after Optus data breach

Former Army boss blasts Liz Truss 'ill discipline' over Kremlin phone hack

Former British Prime Minister Liz Truss ‘s phone was allegedly hacked by Russian spies

How AI can protect water and electricity networks

How to protect yourself from identity fraud during Cybersecurity Awareness Month

Inside a US military cyber team’s defence of Ukraine

Interpol Issues Security Warning Against Metaverse Being Unsafe For Children

Malware: A Problematic Evolution

Ministers creating ‘wild west’ conditions with use of personal phones

Multi-factor authentication fatigue attacks: How to shield your users?

New Azov data wiper tries to frame researchers and BleepingComputer

Sacked Sky employee demanded £40,000 or he would post details of 11,000 customer

Status of Pendragon’s data unclear after hackers issue revised ultimatum

The 13 Most Common Website Security Attacks

The Rise of CyberCrime Today

This New List Of Malware Dropper Apps On The Play Store Needs To Be Deleted Now, Claim Security Experts

Two days before elections, security breach in Shas database exposes personal details of millions of Israeli citizens

VicRoads says issuing new licences for Optus data breach victims

Weakness: Employees – the reason they are vulnerable to cyber attacks

What Is an Infostealer? Is It Dangerous?

What Is Riskware? Here's Everything You Need to Know

What Is Zero-Knowledge Encryption and Why Should You Use It?

DAILY NEWS: Outubro (23/10 - 29/10) - 43 Semana de 2022

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.


Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page