top of page

NEWS: Abril (01/05 - 07/05) - 18 Semana de 2022

Cyber Security and Information Security News - Daily Updates !!


Canada on high alert for ransomware attacks amid Russia’s invasion of Ukraine

Cryptocurrency related crimes decreased in 2020: Report

False-flag cyberattacks a red line for nation-states, says Mandiant boss

FBI: Business Email Compromise Scams Cost $43 billion

Hackers target NIMHANS, but data remains safe

One year on from the HSE cyber attack, could it happen again?

Protect yourself by using a strong and secure passwords

Ransomware: Fake Windows 10 Updates Might Get You In Trouble

Residents still feeling consequences of council cyber attack more than four months on

US offers $15 million reward for info on Conti ransomware gang

What Data Do VPNs Need to Send to the Indian Government?


5 hacks to keep your phone safe against viruses, malware, ransomware

69% of Philippines organizations experienced ransomware attacks in 2021

85% of Australian Organisations Suffered a Ransomware Incident in the Past Five Years; 72% Tried to Keep it Quiet: ExtraHop report

A Loan App, Morphed Obscene Images & Sextortion: A New Phishing Crime That Could Strip You of Money

A Year After Colonial Pipeline, Threat of Ransomware Attacks Looms

Action Fraud warn people about fake McAfee scam emails

AGCO Announces Ransomware Attack

As Ransomware Threats Mount, Focus Should be on Data-Centric Security

Attempted cyber-attack delays healthcare reimbursements in France

China-backed Winnti APT siphons reams of U.S. trade secrets in sprawling cyber-espionage attack

Customer Passwords are a Target for Cybercriminals: How to Address the Threat

Cyberespionage: New Mustang Panda campaign targets Europe

Data breach Discovered at IKEA Canada impacts 95,000 Customers

DDoS Attacks by Hacktivists Disrupted Russian Alcohol Supply Chain

Experts Uncover New Espionage Attacks by Chinese 'Mustang Panda' Hackers

From 'rug pulls' to counterfeits, here are the biggest scams in the NFT space

Hackers Using PrivateLoader PPI Service to Distribute New NetDooka Malware

How AI Can Save The Day

IKEA Canada hit by internal data breach

India Orders VPN Companies to Log & Hand Over User Data

Landmark amendments to international cyber crime treaty set to be signed next week

Log4j, ProxyLogon Top 2021 Exploitable Vulnerabilities List

New Third-Party Risk Management (TPRM) study shows that organizations are not equipped to handle increasing third-party security incidents

NIST updates guidance for cybersecurity supply chain risk management

Norton finds deepfakes and crypto scams rising in Australia

Nothing personal: Training employees to identify a spear phishing attack

'Once they have access to your screen, they have complete control'. Watch out for these screen-sharing scams

Online frauds: Do not scan QR code to ‘receive’ the money

Password management needs a rethink

Potential Russian cyberattacks demonstrate the need for heightened security

QNAP fixes critical QVR remote command execution vulnerability

Researchers Warn of 'Raspberry Robin' Malware Spreading via External Drives

Responding To a Healthcare Ransomware Attack: A Step-By-Step Guide

Security researchers: Here's how the Lazarus hackers start their attacks

Social engineering, exfiltration and espionage activities by Chinese hackers unveiled

Travellers warned of British Airways scam emails that could infect computers

Ukrainians DDoS Russian Vodka Supply Chains

US agricultural machinery maker AGCO hit by ransomware attack

USB-based Wormable Malware Targets Windows Installer

Voyager, Amazon, Costco, Walmart, and Louis Vuitton — Top Phishing Scams of the Week

What A Cybersecurity Shift-Left Means For SaaS Companies And Their Customers

What Are Dark Web Search Engines and How to Find Them?

What are the most expensive cyber attacks of all time?

What SMBs are getting wrong about cyber security

When it comes to security, is IoT the new OT?

Which Country Has the Most Cybercrime Per Capita? It's Not the US

Why it's so hard to protect the Texas power grid

Wind turbine maker Nordex delays Q1 financial report after cyber attack


7 threat detection challenges CISOs face and what they can do about it

$43 billion stolen through Business Email Compromise since 2016, reports FBI

71% of Nigerian Organisations Suffered Ransomware Attacks in 2021

Australia: New South Wales transport authority suffers second network attack

Benefit Recovery Specialists Data Breach Class Action Settlement

Beware Facebook users, don't fall for this devious phishing scam

China-linked APT Caught Pilfering Treasure Trove of IP

Chinese APT group Mustang Panda targets European and Russian organizations

Chinese hackers have been running riot on unsecured Windows devices

CIA Wants Russians to Share Secret Info with the Agency via its Darknet Site

CISA urges F5 users to address ‘critical’ vulnerability in BIG-IP software

Cloudflare Successfully Thwarted One of The Largest DDoS Attacks

Coles issues urgent warning about an email scam encouraging shoppers to fill out a survey for an 'exclusive reward'

Critical F5 BIG-IP flaw allows device takeover, patch ASAP! (CVE-2022-1388)

Cybersecurity Without Automation Is A Losing Game

Decade-old bugs discovered in Avast, AVG antivirus software

Education Sector Continues to Get Hit with Ransomware Attacks

Exploring Challenges, Benefits of Cyber Insurance in Healthcare

F5 Warns of Critical Bug Allowing Remote Code Execution in BIG-IP Systems

FBI: Email fraud keeps getting worse. Here's how to protect yourself

FBI: Thailand and Hong Kong Banks Used Most in BEC

FBI warns workers to beware of BEC scams that have stolen $43 billion in five years

Federal Court finds RI Advice failed to manage cybersecurity risks in landmark decision

Four Data Privacy Missteps to Avoid in 2022 and Beyond

Google, Apple, Microsoft Commit to Eliminating Passwords

Google, Apple, Microsoft make a new commitment for a "passwordless future"

Google fixes actively exploited Android kernel vulnerability

Google to Add Passwordless Authentication Support to Android and Chrome

Heroku admits that customer credentials were stolen in cyberattack

Heroku Forces User Password Resets Following GitHub OAuth Token Theft

How Ransomware Complacency Could Cost Your Company

Illuminate Data Breach Impacts More School Districts

In the Event of a Cyberattack, Secure Your Data First

India to Collect User Data from VPNs, Data Centers, and Cloud Service Providers

Internal data breach discovered at Ikea Canada impacts 95,000 Canadians

It's World Password Day! Here's the one simple tip you need to keep your accounts secure online

Ledger Breach Leaves Shopify Facing Another Crypto-Focused Class Action

Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

Microsoft, Apple, and Google to support FIDO passwordless logins

National Cyber Security Centre (NCSC) calls on tech firms to tackle rogue apps, but has the ‘horse already bolted’?

National Institute of Standards and Technology (NIST) Releases Updated Cybersecurity Guidance for Managing Supply Chain Risks

NIST Updates Cybersecurity Guidance for Supply Chain Risk Management

New fraud emails plague verified accounts on Twitter, user accounts may be in danger

New NetDooka malware spreads via poisoned search results

NHS Inboxes Hijacked to Send 1000+ Malicious Emails

Passwords aren't going away any time soon

Please stop giving bad password advice

Ransomware attack: “BlackByte” hacks Swiss logistics group

Ransomware Payments: Just 46% of Victims Now Pay a Ransom

Ransomware researchers are being targeted by the criminals they track

Serious Snipe-IT bug exploitable to send password reset email traps

Tackling the threats posed by shadow IT

Telenor warns customers in Norway of new scam

Terrifying ransomware threat ‘a cat-and-mouse game’

The 10 largest data breaches ever reported in healthcare

The Importance of Defining Secure Code

This Study Shows How Woefully Underprepared Small Businesses Are for Ransomware Attacks

Thousands of Borrowers' Data Exposed from ENCollect Debt Collection Service

Top 10 Cybersecurity Challenges in the Healthcare Industry

Top Ransomware Attack Targets: Telecom Leapfrogs Healthcare

Trinidad & Tobago under attack

UNC3524: The nearly invisible cyberespionage threat sitting on network appliances

Upstart NFT Drops Scam Alert: Bored Ape Yacht Club & Moonbirds

US data compromises affected over 20 million people in Q1 2022

VHD Ransomware Linked to North Korea’s Lazarus Group

Wandering the dark web: What hackers can do with your data

WannaCry showed the world how not to write ransomware

White House: Quantum computers could crack encryption, so here's what we need to do

Why You Should Care About World Password Day

Will FIDO Replace OTP Multi-Factor Authentication?


3 Orgs Fall Victim to Separate Phishing, Email Security Incidents

A checklist to help healthcare organizations respond to a serious cyberattack

Anonymous Leak 82GB of Police Emails Against Australia’s Offshore Detention

Ape-themed airdrop phishing scams are on the rise, experts warn

Attackers Use Event Logs to Hide Fileless Malware

Australian state transport agency hit by cyber attack

Business Email Compromise (BEC) Attacks Explained: Are You at Risk?

Chinese Hackers Caught Stealing Intellectual Property from Multinational Companies

Chinese hackers perform 'rarely seen' Windows mechanism abuse in three-year campaign

Coca-Cola at center of new Stormous hacking claims

Critical RCE Bug Reported in dotCMS Content Management Software

Cybersecurity continues to be a top priority in Canada

Ethiopia ‘foils’ cyber-attack on Nile dam, financial institutions

FBI says business email compromise is a $43 billion scam

Good end user passwords begin with a well-enforced password policy

Google Assistant can now automatically change your stolen passwords

Graham and Brown targeted in 'brutal' cyber attack

Hackers stole data undetected from US, European orgs since 2019

Healthcare and Education Sectors Most Susceptible to Cyber Incidents

Heroku to begin user password reset almost a month after GitHub OAuth token theft

HHS Information Security Program 'Not Effective'

How to enhance your cyber defense program with CIS SecureSuite

Hundreds of students affected by data breach at University of Essex

India faced over 18 million cyber threats in Q1 2022: Norton

Insurance Companies Start Refusing to Ransom Coverage As Average Amounts Demanded Cross $800,000

Kubernetes taps Sigstore to thwart open-source software supply chain attacks

Less than one-third of APAC organisations publicly reveal ransomware attacks

Mozilla privacy survey finds mental health and prayer apps fail privacy test pretty spectacularly

National Cyber Security Centre (NCSC) Updates Code of Practice for Smart Building Security

New Ransomware Variant Linked to North Korean Cyber Army

NIMHANS files complaint over a month after ransomware attack

Overcoming the data breach requires security practices with purpose

Phishers taking advantage of Gmail’s SMTP relay service to impersonate brands

Pro-Ukraine hackers use Docker images to DDoS Russian sites

Protect Users and Networks from Malware Hidden in Images and Attached Files

Quantum computing and risk to data security for enterprises

Rhode Island Public Transit Authority (RIPTA) releases note from hackers in ransomware attack

Russian cyber attack targeting Bulgarian post

Salusive Health Shuts Doors, Provides Data Breach Notification

Securities and Exchange Commission (SEC) Doubles Cyber and Crypto Assets Team

Securities and Exchange Commission (SEC) nearly doubles size of crypto and cyber enforcement unit

Security and compliance rank as the top challenges for deploying cloud-native apps

Self-promotion in cybersecurity: Why you should do it, and how

South Africa ranked 6th country most affected by cybercrime, research finds

State Bar of Georgia reels from cyber-attack

Stealthy APT group plunders very specific corporate email accounts

Texas power grid under constant Russian cyber threats while also facing peak demand as temps rise

The 6 steps to a successful cyber defense

The Rise Of Web3: What Cybersecurity Concerns Should We Look Out For?

This sneaky hacking group hid inside networks for 18 months without being detected

This unpatched DNS bug could put 'well-known' IoT devices at risk

Transport for NSW struck by cyber attack

Twitter Blue Badge Phishing Scams Are Targeting Verified Accounts

Ukraine cyberthreat activity ramps up against critical infrastructure, governments

Unpatched DNS Bug Puts Millions of Routers, IoT Devices at Risk

Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption

What is Cyber Insurance and Does Your Small Business Need It?

World Password Day 2022 – Password Tips and Best Practices


A DNS flaw impacts a library used by millions of IoT devices

A Romanian, involved in the Russian cyber attacks of the last days on some Romanian sites has been arrested by UK police

Alleged docket dumping probed (South African Police Service)

Aruba and Avaya network switches are vulnerable to RCE attacks

Car Rental Giant Sixt Hit by Cyber-Attack

China-linked Moshen Dragon abuses security software to sideload malware

CMS-based sites under attack: The latest threats and trends

Critical TLStorm 2.0 Bugs Affect Widely-Used Aruba and Avaya Network Switches

Dell Service Automates Recovery in Event of Cyberattack

Discover your public cloud exposure with Recon.Cloud

Excellus Health Plan Settles Data Breach Suit With Policyholders

Experts Analyze Conti and Hive Ransomware Gangs' Chats With Their Victims

Five Security Lessons From the Lapsus$ Attacks

Former eBay Exec Pleads Guilty to Cyber Stalking

Google: Chinese state hackers keep targeting Russian govt agencies

Hackers used the Log4j flaw to gain access before moving across a company's network, say security researchers

Here's how hackers used the Log4j flaw to gain access before moving across a company's network

How to implement a best-in-class SASE architecture

Internal chats of ransomware cybercriminals reveal ways to avoid becoming a victim

Learn ethical hacking from a certified instructor with this affordable training

Mental Health and Prayer Apps Fail the Privacy Test

Microsoft PowerShell lets you track Windows Registry changes

Motorola Creates Hub for Sharing Cyberthreat Intelligence

Nobody Knows Where the Red Line Is for Cyberwarfare

North Carolina Becomes First State to Prohibit Public Entities from Paying Ransoms

NortonLifeLock Willfully Infringed Malware Patents

Open-source security: It's too easy to upload 'devastating' malicious packages, warns Google

Package Analysis dynamic analyzes packages in open-source repositories

Password tips to keep your accounts safe

Phishers exploit Google’s SMTP Relay service to deliver spoofed emails

Ponzi Scheme Suspect Deported to China After $36m Bust

Ransomware Attack Closes Michigan College

REvil ransomware returns: New malware sample confirms gang is back

RSAC Innovation Sandbox Contest finalists announced

Security is a pain for American Dental Association: Ransomware infection feared

Spanish Govt. Hacked by NSO Pegasus Spyware (or was it?)

State Bar of Georgia investigating cyberattack

Think Like an Attacker: How to Add Security Into API and App Development

TLStorm 2.0: Critical bugs in widely-used Aruba, Avaya network switches

UNC3524 APT uses IP cameras to deploy backdoors and target Exchange

Unpatched DNS bug affects millions of routers and IoT devices

U.S. DoD tricked into paying $23.5 million to phishing actor

What Developers Need to Know About the Strategy of Security


55% of people rely on their memory to manage passwords

Ataque hacker atinge empresa que trabalhava para o BC

Australia Post scam joins AusPost SMS, how to tell

Bad Actors Are Maximizing Remote Everything

Bored Ape Yacht Club (BAYC) Experiences Phishing Attack: Hackers Targeted Their Instagram Account

Californian Phished $23.5m from Department of Defense (DoD)

Car rental giant Sixt facing disruptions due to a cyberattack

Chinese "Override Panda" Hackers Resurface With New Espionage Attacks

Cyberattacks could affect planting season

Cybersecurity a crucial component of blockchain ecosystem: CEO of QuillAudits

Cyberspies use IP cameras to deploy backdoors, steal Exchange emails

Don’t panic! (Almost) everything you need to know about cyber risks, resilience and responsibilities

Google SMTP relay service abused for sending phishing emails

Hacker ético lança plataforma de cursos com foco em tecnologia

Hacker invade site do governo de Goiás e ironiza: 'Abraço para a TI'

How Log4j Reshaped Cloud Security Thinking

How ransomware shut down an English council

How to avoid security blind spots when logging and monitoring

India mandates data breach notification within six hours

Indian education sector biggest target of cyber threats, remote learning among key triggers: Report

Kellogg Community College in Kalamazoo Victim of Ransomware Attack; Classes Cancelled

Making Zero Trust security a frictionless experience for the users

Mozilla finds mental health apps fail 'spectacularly' at user security, data policies

New 'Bumblebee' Malware Loader Used by Several Cybercrime Groups

New OWASP Top 10: Beware of Poor Security Practices

Otherside Phishing Scams Successfully Steal Blue-Chip NFTs

Ransomware Study 2022: attacks are up, ransom payments are increasing

Romania under cyberattack coming from Russia's Killnet

Russian Hackers Targeting Diplomatic Entities in Europe, Americas, and Asia

Site do Governo de Goiás é hackeado. “Abraço pro TI”, escreveu hacker

Solve the Machine Identity Crisis

Spain’s Prime Minister mobile phone infected by Pegasus spyware

The Art Of Phishing: Bait The Hook, Sit And Wait

U.S. Department of Defense (DoD) tricked into paying $23.5 million to phishing actor

What You Don’t Know About Cyber Insurance Can Cost You


Austin Peay students feel effects of ransomware attack during final exams

Bangladesh CIRT warns of possible cyber-attack during Eid

Carteira de criptomoedas tem backdoor de famoso grupo hacker, cuidado

Creating protection from cyber attacks in a virtual world

Cyberwar Is a Two-Way Street for Russia

DeFi Exploits Continue to Plague Industry as Saddle Finance Hack Sees $10M Stolen

Hacking Russia was off-limits, but the Ukraine war made it a free-for-all

Hampshire police warn of Gmail phishing scam about vouchers

Here's a New Tool That Scans Open-Source Repositories for Malicious Packages

How Hackers Get Your Passwords & How to Defend Yourself

Indian education sector biggest target of cyber threats

Intel Report States FBI Conducted Nearly 2 Million Searches of Us Data Related to Cyberattacks in 2021

Na guerra, se proteger de ataque hacker também é uma forma de salvar vidas

NB65 Hackers Reportedly Stole Credit Card Data of QIWI Clients

Open source 'Package Analysis' tool finds malicious npm, PyPI packages

Phishing Sites Steal $6 Million From Bored Ape NFT Fans

Random Text Messages May Be Phishing Scams or Worse

Ransomware attack shuts down Kellogg Community College

REvil ransomware returns: New malware sample confirms gang is back

Russian hackers compromise embassy emails to target governments

Trinidad and Tobago: Held to ransom by cyber attacks

Trinidad and Tobago: Ministry of National Security warns of increase malicious cyber-activity

Vladimir Putin's army of saboteurs to 'sow chaos and panic' in UK, expert warns

Why Email Security Is an Asset for Every Business

NEWS: Abril (24/04 - 30/04) - 17 Semana de 2022

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.


Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page