NEWS: Agosto/Setembro (28/08 - 03/09) - 35 Semana de 2022

Cyber Security and Information Security News - Daily Updates !! Weekly Review

03/09


11.84GB of United States Military Contractor and Military Reserve data leak, suspecting Conti Ransomware


BiH records Increase in Number of Cyber Attacks


CodeRAT Malware Source Code Published online on GitHub


Critical state of healthcare: India had 2nd highest number of cyber attacks in the world in 2021


Google Release Urgent Chrome Update to Patch New Zero-Day Vulnerability


Hackers exploit NASA’s famous deep space image to attack computers


Hive Ransomware targets Damart clothing store, demands $2 million


How Email Encryption Protects Enterprises


Malware dev open-sources CodeRAT after being exposed


MeitY organises deep dive training programme on cyber security for CISOs


New text scam posing as Canada Revenue Agency (CRA) looks very real in Mississauga and Brampton


Parent company of Leesburg hospital reveals another major data breach


Ransomware group BlackCat behind Italy's GSE hacking, researchers say


Research Finds Nearly 1,800 iOS Apps Leaking AWS Credentials and Harming the Supply Chain


Samsung Admits Data Breach that Exposed Details of Some U.S. Customers


Samsung admits to Lapsus$ data breach that may have exposed some customers' personal information in the US.


Samsung customers: your data may have been breached


Samsung reveals cyber attack in July exposed customer data


02/09


20 Million US Health Records Breached, Mostly Due to Hacking: Why India should worry about it


A hacker attacked Yandex Taxi and sent dozens of cars to the same location


A Windows 11 Automation Tool Can Easily Be Hijacked


Account takeover fraud is a growing threat


Ahead of hackers in the holidays


Anonymous hacked Russian Yandex taxi app causing a massive traffic jam


Best practices for Kubernetes security in the enterprise market


Biggest Healthcare Data Breaches Reported This Year, So Far


Black Knight, Inc. Reports Leaked Social Security Numbers Following Recent Data Breach


Building defense proficiency in healthcare – one cybersecurity leader's tips


Chile and Montenegro Floored by Ransomware


Cibersegurança e Internet das Coisas na era do ransomware


CIOs find it most difficult to solve cybersecurity challenges


CISA, NSA and npm Release Software Supply Chain Guidance


Clarion Housing: Anger over landlord silence since cyber attack


Companies underestimate number of SaaS applications in their environment


Compromised: Singapore offshore and marine giant hit by data breach


Cyber Attacks on Western European Firms on the Rise Since Ukraine War: Italy Minister


Cyber Security Today, Week in Review for Friday, September 2, 2022


Cybersecurity guideline for testing of Internet of Things security products


Damart clothing store hit by Hive ransomware, $2 million demanded


Data worth of 3.7 GB leaked, assumed to be of Costa Rica’s Junta de Proteccion Social


Everything We Know About the Axie Infinity Breach


FBI to investigate Montenegro cyber-attacks


Feds push for developers to take lead in securing software supply chain


Former SpaceX Engineers Join Forces to Disrupt Cyber Security Industry


Fremont County Continues to Assess Losses Due to Ransomware Cyber Attack


Google Chrome Bug Lets Sites Silently Overwrite System Clipboard Content


Governo é o alvo preferido dos ataques ransomware no Brasil


Hackers gained access to Samsung customer data


Hackers invadem sistema de corretora e roubam criptomoedas


Hackers tentam vender supostos dados do governo brasileiro por R$ 440 mil em bitcoin


Healthcare Executives Concerned About Supply Chain Issues, Cyberattacks


Identity’s Role in API Security


Investigation into NHS Orkney data breach after 69 health records accessed unnecessarily by staff member


JuiceLedger Hackers Behind the Recent Phishing Attacks Against PyPI Users


JuiceLedger Hacker Linked to First Phishing Campaign Targeting PyPI Users


KeyBank class action alleges company’s negligence contributed to data breach


KyberSwap oferece recompensa, caso hacker devolva US$ 265 mil em criptomoedas roubadas


Linux systems are being hit with more ransomware than ever


LockBit 3.0 has a new target The Singapore subsidiary of “Meiji”


Medical billing service in Florida one of the latest victims of ransomware attacks


Nelnet data breach may have hit more than 2 million student loan borrowers


Netflix, Walmart, Best Buy, iPhone 14, USPS, & DHL — Top Phishing Scams of the Week


New Evidence Links Raspberry Robin Malware to Dridex and Russian Evil Corp Hackers


New Ransomware Group BianLian Activity Exploding


NSA to developers: We've got some software supply chain security tips for you


October Declared Delaware Cybersecurity Awareness Month


October is Cybersecurity Awareness Month: Are you prepared?


Paralysed French hospital fights cyber attack as hackers lower ransom


Pesquisadores descobrem ransomware para Linux provavelmente em desenvolvimento ativo


Phishing for Honor: 9/11, online donations and scammers


Protocolo de empréstimos Babylon Finance encerrará atividades após prejuízo com ataque hacker


Prynt Stealer Contains a Backdoor to Steal Victims' Data Stolen by Other Cybercriminals


RagnarLocker Ransomware Gang Claims TAP Air Portugal as Its Second Victim in Two Weeks


Ransomware as a Service: Unravelling this Ecosystem


Ransomware: Backup é uma das maneiras mais eficientes de garantir a continuidade das operações


Research shows importance of people-centric security


Samsung confirms new data breach – now customer data is affected


Samsung discloses data breach after July hack


San Francisco 49ers: Blackbyte ransomware gang stole info of 20K people


SMBs Finally Investing More in Cybersecurity


St. Amant victim of cyber attack


Stricter UK cyber duties on online accounts and data explored


The basics of identity theft protection


The Good, the Bad and the Ugly in Cybersecurity – Week 36


The Ultimate Security Blind Spot You Don't Know You Have


UK Government Releases New AI Security Guidance


US Police Deployed Obscure Smartphone Tracking Tool With No Warrants


Warning: PyPI Feature Executes Code Automatically After Python Package Download


What the Tech? FBI Issues Warning about Cyber Attacks


01/09


5 Common Phishing Attacks to Watch Out for


Apple just delivered an important security patch for these older iPhones


Apple Releases iOS Update for Older iPhones to Fix Actively Exploited Vulnerability


Apple Releases Update for iOS 12 to Patch Exploited Vulnerability


Book distributor Baker & Taylor suffers a ransomware attack, perpetrators unknown


Bridgestone Americas, Inc. Releases Additional Details About February 2022 Ransomware Attack


CorrectHealth Suffers Email Account Data Breach, 54K Impacted


Dealing with cyber threats in the energy sector: Are we on the right path?


Detected Cyber-Threats Surge 52% in 1H 2022


Food Delivery Company DoorDash Latest Name Added to Data Breach Spree Conducted by Twilio Hackers


Hackers target politicians with fake news website


How Government Regulations Can Aid Cybersecurity Defenses


How Just-in-Time privilege elevation prevents data breaches and lateral movement


Infra Used in Cisco Hack Also Targeted Workforce Management Solution


List of Data Breaches and Cyber Attacks in August 2022 – 97 Million Records Breached


Long Island schools boost cyber security efforts


Microsoft: This bug in TikTok's Android app could have allowed one-click account hijack


Microsoft will disable Exchange Online basic auth next month


Montenegro hit by ransomware attack, hackers demand $10 million


Neopets says hackers had access to its systems for 18 months


New ransomware hits Windows, Linux servers of Chile govt agency


Over 1,800 Android and iOS Apps Found Leaking Hard-Coded AWS Credentials


Ragnar Locker ransomware responsible for an attack on Portugal's flag carrier, 'Hundreds of Gigabytes' of Customer Data Stolen


Ragnar Locker Ransomware Targets Energy Sector, Cybereason Suggests


Ransomware Attacks Target Government Agencies in Latin America


RedAlert and Monster: multiplatform ransomware gains steam


Researchers Detail Emerging Cross-Platform BianLian Ransomware Attacks


Semcorp Marine hit by cyber attack


Sephora Fined $1.2 Million for Breaching CCPA and Selling User Data


Snake Keylogger Returns with New Malspam Campaign Targeting IT Firms


Student Loan Data Breach Left Personal Details of over 2 Million People Exposed


Thousands lured with blue badges in Instagram phishing attack


Threat Actor Phishing PyPI Users Identified


Traffers threat: The invisible thieves


Why Should You Care About In-Memory Attacks?


31/08


1 in 3 organizations don’t know if their public cloud data was exfiltrated


5 open-source vulnerability assessment tools to try out


40% of Zero Day Exploits From the Last Decade Happened in 2021


A data breach involving 7.5 million subscribers has been confirmed by a Russian streaming provider 'START'


Apple backports fix for actively exploited iOS zero-day to older iPhones


Até o James Webb: hackers usam imagem do telescópio para espalhar malware


Beyond Zeros and Ones: When Cyber Attacks Become Physical


Chinese Hackers Used ScanBox Framework in Recent Cyber Espionage Attacks


Como os jogos online têm lidado com hackers


Cost of a Data Breach: Retail Costs, Risks and Prevention Strategies


Cost of Cyber Attacks vs. Cost of Cyber Security


Cuba ransomware group claims attack on Montenegro government


Cybercrime Targeting Gaming Sector up 167% in One Year


Data of 800 mn Chinese people exposed, 2nd massive data breach in 2 months


Doordash customers personal information exposed in data leak


European Spyware Vendor Offering Android and iOS Device Exploits


Evil Corp and Conti Linked to Cisco Data Breach, eSentire Suggests


Experts Find Malicious Cookie Stuffing Chrome Extensions Used by 1.4 Million Users


Fraudsters Target Loyalty Programs To Collect Personal Information: Cyber-Forensics Explains About Loyalty Scam


Gloucester Council planning site still disrupted from cyber attack


Golang-based Malware Campaign Relies on James Webb Telescope's Image


Google invites bug hunters to scrutinize its open source projects


Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks


Grupo hacker diz ter invadido governo brasileiro


Grupo hacker russo diz ter atacado sistemas do governo brasileiro


Hackers Hide Malware in Stunning Images Taken by James Webb Space Telescope


Hackers spreading malware through images taken by James Webb Space Telescope


ICO Pursues Traffic Accident Data Thieves


Initiative Aims to Encourage Diverse Talent into Cyber


Intel Selects Check Point Quantum IoT Protect for RISC-V Platform


Iraqi hackers knock offline four major ports in Israeli-occupied territories


James Webb Space Telescope Images are Being Used by Hackers to Hide Malware


LastPass: When the Password Manager Gets Owned


Looking East: Japanese Credit Card Customers Targeted With Phishing Attacks


Malicious Google Chrome extensions affect 1.4 millions users


Microsoft: Take these three steps to protect your systems from ransomware


NHS Orkney apologises after data breach


Organizations security: Highlighting the importance of compliant data


Phishing in the metaverse and how to protect your brand identity


Prefeitura do Rio retoma serviços on-line de IPTU após ataque hacker


Ragnar Locker ransomware claims attack on Portugal's flag airline


Rakesh Jhunjhunwala-backed Akasa Air Suffers Data Breach In Its First Month Of Operation


Ransomware gangs’ favorite targets


Rede de computadores da gigante italiana de petróleo Eni é invadida por hackers


Russian streaming platform Start discloses a data breach impacting 7.5M users


Should ransomware payments be banned? A few considerations


Student Loan Breach Exposes 2.5M Records


TikTok's Android app had a vulnerability giving attackers undetectable access to accounts


Trend Micro Warns of 75% Surge in Ransomware Attacks on Linux as Systems Adoptions Soared


UF Health announces it is working with patients after small data breach


UK Imposes Tough New Cybersecurity Rules for Telecom Providers


Ukrainian Police Bust Crypto Fraud Call Centers


What Healthcare Professionals Can Learn From the Latest Meta Scandal


30/08


Akasa Air Suffers Data Leak on First Day of Operation


Ataque hacker: polícia recebe as primeiras informações sobre invasão da prefeitura do Rio


Baker & Taylor's Systems Remain Offline a Week After Ransomware Attack


Beware Ransomware-as-a-Service


Can your passwords withstand threat actors’ dirty tricks?


Capital One Customers Can Claim Part of a $190 Million Data Breach Settlement: Here's How to Get Your Share


China urged to invest more on cyber security


Crooks are increasingly targeting DeFi platforms to steal cryptocurrency


Cryptominer Disguised as Google Translate Targeted 11 Countries


Cyber Security Managed Services 101


Cybersecurity market worth USD 266 billion by 2027: Report


Cyber stress surveyed


DoorDash: 'Sophisticated phishing campaign' exposed some customer data


Duas semanas após ataque hacker à Prefeitura do Rio, Paes diz que novos serviços podem voltar nesta semana


EmergeOrtho Reports Data Breach Leaking Social Security Numbers of Up to 75,200 Individuals


ESET: malware no Android cresce 8% em 2022


Exclusive: Bitdefender on ensuring cyber safety in today's threat landscape


Facebook Pixel Healthcare Data Leak: Understanding Third-Party Risk for Sensitive Data


FBI: Crooks are using these DeFi flaws to steal your money


FBI: Hackers Are Exploiting DeFi Bugs to Steal Funds


FBI Warns Investors to Take Precautions with Decentralized Financial Platforms


FTC Sues Data Broker Over Selling Location Data for Hundreds of Millions of Phones


Google Launches Major Open Source Bug Bounty Program


Grupo hacker da Rússia diz ter atacado sistemas do governo brasileiro


How automation can solve application development challenges


How BEC attacks on human capital management systems are increasing


India's Newest Airline Akasa Air Found Leaking Passengers' Personal Information


Investigation reveals no evidence of data breaches within Newton Falls school's network systems


KeyBank Announces Third-Party Data Breach Following Incident at Third-Party Vendor, Overby-Seawell Company


LA County supervisors move to help business owners hit by data leak


Millions of student loan accounts exposed in data breach


ModernLoader Delivers Stealers, Cryptominers and RATs Via Fake Amazon Gift Cards


More than 1.2 million new 'ransomware' cyber attacks per month


Newcourse Communications, Inc. Announces Data Breach Leaking the Social Security Numbers of as Many as 47,000 People


New Go-based Ransomware 'Agenda' Delivers Customized Attacks


NSW Gov picks CyRise to operate cyber accelerator


Outdated infrastructure not up to today’s ransomware challenges


Reported ransomware attacks increased 47% in July


That 'clean' Google Translate app is actually Windows crypto-mining malware


The rise of ransomware: steps to increase your cybersecurity


This sneaky malware hides on your PC for a month before going to work


UK Spies Fund New Course for Female Coders


Urgent WiFi cyber attack warning for millions of BT, Virgin and Sky broadband users


US-based CISOs get nearly $1 million per year


Valex Corporation Announces Data Breach Following Malware Attack


Vodafone Idea user data breached claims cyber security firm; telco says no


World’s largest distributors of books Baker & Taylor hit by ransomware


29/08


A CISO's Ultimate Security Validation Checklist


Ataque hacker: sistema da prefeitura ainda opera com restrições


Attackers changing targets from large hospitals to specialty clinics


Australia Invests AU$9.9 Billion in Cybersecurity


Bolton: Yasmine Qureshi MP appeals after Clarion 'cyber attack'


Changing cyber insurance guidance from Lloyd’s reflects a market in turmoil


CISA Adds 10 New Known Actively Exploited Vulnerabilities to its Catalog


Cloudflare CDN clients caught in Austrian fight against pirate sites


COVID-19 data put for sale on the Dark Web


Creating cyber career opportunities during the talent shortage

Cyber Security Market worth $266.2 billion USD by 2027 - Exclusive Report by MarketsandMarkets™


Cyber Security Today, August 29, 2022 – Door Dash hacked, Facebook ready to face the music and Sephora agrees to pay a $1.2 million penalty


Data security hinges on clear policies and automated enforcement


Estonia - Minister: Friday's cyberattack on private media part of consistent pattern


Experts push back on TSA’s 24-hour cybersecurity incident reporting rule for aviation industry


Global Ransomware Damages to Exceed $30bn by 2023


How Cybersecurity Policy Has Changed Since the SolarWinds Attack


Insurers must rethink handling of cyber attacks on states


Italy's GSE says gas purchases guaranteed despite cyber attack


Leading library services firm Baker & Taylor hit by ransomware


Montenegro says Russian cyberattacks threaten key state functions


Montenegro Still Assessing Damage From Mystery Cyber Attacks


NetworkManager 1.40 released, features 600 patches


New Cyber Security Centre to Protect NSW Police Network


New Golang-based 'Agenda Ransomware' Can Be Customized For Each Victim


New Hampshire Lottery website back online after experiencing a cyber attack


Nitrokod Crypto Miner Infected Over 111,000 Users with Copies of Popular Software


Nitrokod crypto miner infected systems across 11 countries since 2019


Patch critical flaw in Atlassian Bitbucket Server and Data Center! (CVE-2022-36804)


Rise in IoT vulnerability disclosures, up 57%


Scammers used a deepfake AI hologram of Binance executive to scam crypto projects


Sistema da Prefeitura não foi totalmente reestabelecido após ataque hacker


TECH BYTE: How to Step Up Cyber Security During Elections


The complexity of modern aircraft cybersecurity


Twilio Breach Also Compromised Authy Two-Factor Accounts of Some Users


Twilio breach let attackers access Authy two-factor accounts of 93 users


US Cyber Command and NSA Partner On Defence Efforts For Midterms Elections


US govt sues Kochava for selling sensitive geolocation data


What we have learned from the most severe supply chain cyberattacks this past year


Windows malware delays coinminer install by a month to evade detection


Your DevOps Process Needs to Integrate API Security


28/08


5 Signs your WordPress Site is Hacked (And How to Fix It)


Akasa Air Reports Data Breach, Personal Details Of Fliers Leaked: Report


Akasa Air suffers mega data breach, passengers details leaked


Akasa airline suffers data breach including personal details of passengers


Cyber attack impacts Montenegro’s state infrastructure


Cyber ​​attack on Signal: Phone Numbers of Users Reached to Hacker


Cyber Element in the Russia-Ukraine War & its Global Implications


CyberX9 says data of 20 million postpaid customers of Vodafone Idea exposed; telco denies claim


Data breach at Akasa Air; ‘self-reported’ to CERT-In, says airline


Don't wish to be a cyber victim? Awareness is the best defence


DoorDash data breach leaves important customer details exposed


Every fifth FIR in Hyderabad is filed by a cyber fraud victim


Finland: Police solve 4% of internet crime


Future look of Gloucester remains uncertain months after cyber attack


Hackers have laid siege to U.S. health care and a tiny HHS office is buckling under the pressure


India: Save your savings! 'Banking App' scammers newest on the block


India’s Akasa Air exposed sensitive records of thousands of customers


Malaysia among top APAC country with most spam emails detected


New Hampshire lottery website returns after facing cyber attack


Over $100 Million Worth of NFTs Stolen Over the Past Year: Report


PLDT, Smart offer tips on preventing ‘session hijacking’


Ransomware cyber attacks spike to over 1.2 mn per month


SBI customer alert! ‘Your account will be blocked if you don’t update PAN’ – Do this if you get such message


Twilio breach let hackers see Okta's one-time MFA passwords


Veriff Uncovers Whether Phishing Scams Should Be the Cybercrime Americans Are Most Scared Of


Zero trust: an answer to cybersecurity


What is SIM Swapping and how you can avoid being scammed with this method



NEWS: Agosto (21/08 - 27/08) - 34 Semana de 2022

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.

 

Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon