NEWS: Fevereiro (27/02 - 05/03) - 09 Semana de 2022
Cyber Security and Information Security News - Daily Updates !!

05/03
A Path Towards Shaping the Future of Zero-Trust
Avast Released Free Decryptor for HermeticRansom Ransomware to help Ukraine
Cormac O'Keeffe: Cyberattacks could be used to fund sanction-hit Russia's war machine
How to protect yourself against cyberattacks
Imperva mitigated a series of massive ransom DDoS attacks
Key Ways Your Business Can Suffer Due to Ransomware Attacks
Leaked stolen Nvidia cert can sign Windows malware
Malware now using NVIDIA's stolen code signing certificates
New Linux Kernel cgroups Vulnerability Could Let Attackers Escape Container
NotPetya: the cyberattack that shook the world
Nvidia data breach exposes data of 71,000 employees: Report
Russia shares list of 17,000 IPs allegedly DDoSing Russian orgs
SharkBot malware hides as Android antivirus in Google Play
04/03
5 cybersecurity trends that will define 2022
6 Biggest Scams That Ontarians Were Tricked By Last Year According To Provincial Police
29K Wyomingites’ Data Exposed On Dark Web; Cyber Wyoming Warns Of Risks
A Cyber Risk Management Primer: Identifying Risk, Vulnerability And Threat
Advice from Internet experts.. Fake Facebook pages set a trap
Agencies in Humboldt County hit with phishing emails
App Discovered on Google Play Found to be Data-Stealing Malware, Downloaded Over 10K Times
Ascension Michigan data breach may have exposed some patients' Social Security numbers
Authorities investigate ransomware attack in Fleetwood ASD
Bracing for State-Sponsored Ransomware and Cyberthreats in a World of Conflict
BMV warning Ohioans about identity theft text scam
Carousell phishing scam! — At least 72 victims have fallen for it since Jan, over $109,000 lost
CISA pledges to share incident reports with FBI after DOJ backlash to bipartisan cybersecurity act
CISA warns organizations to patch 95 actively exploited bugs
Cyber-Criminals Exploit Invasion of Ukraine
Cyber Security: 3 Legal Implications and Risk Management
Data Breach Alert: Monongalia Health System, Inc
Data Breach at Michigan Medicine Exposes Info of 3K Patients
DORA's Global Reach and Why Enterprises Need to Prepare
Energy scam warning: Beware of Eon phishing email, warns Which? as power bills soar
Equifax data breach: Consumers unlikely to benefit financially from final settlement
FBI Memphis Field Office Reminds Tennesseans About The Risk Of Ransomware
February ransomware attacks hit major enterprises
Get patching now: CISA adds another 95 flaws to its known exploited vulnerabilities list
Google: To stop phishing and malware we're changing our comment notifications
Hackers are being forced to pick sides in the Russia-Ukraine war
Hackers leak 190GB of alleged Samsung data, source code
Healthcare IoT, Medical Device Vulnerability Disclosures Skyrocket
Healthcare Sector Grapples With Legacy Devices, Patching Woes
Heightened state of alert over cyber warfare threat, says new NCSC chief
IBM Report Examines Cyberattack Trends of 2021
Irish Healthcare System Requires More Than $100 Million To Recover From the Conti Ransomware Attack
James warns consumers impacted by T-Mobile data breach of potential identity theft
Japanese beauty retailer Acro blames third-party hack for breach of 100k payment cards
Lapus$ Group Leaks Alleged Samsung Confidential Data
Log4j Vulnerabilities: Over 80% of Exploitation Attempts Originated in the U.S.
Massive Meris Botnet Embeds Ransomware Notes from REvil
March 2022 Patch Tuesday forecast: Pressure mounts to resolve vulnerabilities
Michigan Medicine Notifies Nearly 3,000 Patients Of Data Breach After Employee’s Email Compromised
Microsoft suspends all new sales of Microsoft products and services in Russia
MSPs see cybersecurity as both a challenge and an opportunity
Nearly All Cybersecurity Companies Expose AWS Assets - Report
New Wiper Malware Used Against Ukranian Organizations
NSA report: This is how you should be securing your network
Nvidia Data, Credentials Stolen in Cyberattack
Over 60% of SOC Analysts Are Planning to Quit Next Year
Perennial security challenges hampering organizations in achieving their security objectives
Ransomware attackers begin to eye midmarket acquisition targets
Role of US agencies limited in protecting against BGP hijacks, attacks on internet architecture
Russian Claims YouTube "Misinformation" to Blame for Protests
Russia/Ukraine War Increases Spillover Risks of Global Cyberattacks
SBI alerts customers about KYC fraud: Here are the details
Senate Passes Strengthening American Cybersecurity Act
Slight Increase in Attacks on ICS Computers in 2021: Report
The most impersonated brands in phishing attacks
The top 1,000 open-source libraries
These are the problems that cause headaches for bug bounty hunters
These old security vulnerabilities are creating new opportunities for hackers
Vulnerabilities in Over 100k Medical Infusion Pumps
What is challenging malware analysis?
What is Ransomware Protection as a Service?
03/03
75% of Tested Smart Infusion Pumps Vulnerable to Hacking
A Business Owner’s Guide To Avoiding Data Breach
After Russia’s invasion of Ukraine, it's time to hunker down
AMCA Medical Lab Data Breach Class Action Lawsuit Investigation
Army of cyber hackers rise up to back Ukraine
Before you scan, make sure QR code isn't a fake
Boardroom does not see ransomware as a priority
CCSE22: The Latest Cybersecurity Workforce Trends
China's top procuratorate warns against personal data breach
Customer Data from the 2021 T-Mobile Data Breach Found on the Dark Web
Critical Patches Issued for Cisco Expressway Series, TelePresence VCS Products
Cyber-Attack on New York Ethics Watchdog
Cyberattacks in Russia-Ukraine conflict are so far ‘no more than a nuisance’
Data breach may have exposed personal information of Oklahomans on disability aid list
Data Science in Cybersecurity: What you wanted to know
December 2021 shows highest number of Phishing attacks
Fraudsters weave Scotland’s £24m web of cyber crime and despair
Hackers use phishing to swindle crores from potential EV buyers, dealers
Hackers Who Broke Into NVIDIA's Network Leak DLSS Source Code Online
Hacktivists, cybercriminals switch to Telegram after Russian invasion
Healthcare Company Mon Health Discloses Second Data Breach
How Different Industries Can Approach Ransomware Protection
How The Cyber War Is Being Fought In The Russia-Ukraine Conflict
How to Automate Offboarding to Keep Your Company Safe
ICS vulnerability discoveries soar by 110% in four years
Itaú fica fora do ar, exibe saldo incorreto de clientes e rejeita ataque hacker
Log4Shell flaw: Still being used for crypto mining, botnet building... and Rickrolls
Look out for identity theft and fraud crimes as tax season begins
Michigan Medicine data breach may have exposed some patients' health information
NATO Completes Quantum-Safe Comms Test
Navigating data privacy in the higher education ecosystem
New report shows increase of ICS vulnerabilities in critical infrastructure
Over 1.2 million customers affected by Hong Kong data breaches
Phishing attacks hit all-time high in December 2021
Report: Nearly 75% of Infusion Pumps Affected by Severe Vulnerabilities
Researchers Demonstrate New Side-Channel Attack on Homomorphic Encryption
Russia Denies Satellite Hacking and Warns of Wider War
Russian APT and Ransomware Groups: Vulnerabilities and Threat Actors Who Exploit Them
Scams targeting Indian EV industry on the rise: Report
Security researchers warn of phishing attempts against officials helping refugees
Singapore: At least 72 victims in phishing scam on Carousell since January, losing over S$109,00
Singapore to launch digital defence agency to counter growing cyber threats
The biggest threat to ICS/OT is a lack of prioritization
The Linux Foundation’s Census of OSS app libraries helps prioritize security work
Ukraine says local govt sites hacked to push fake capitulation news
US launches KleptoCapture force to tackle cryptocurrency use in Russian sanction avoidance
U.S. Senate Passes Cybersecurity Bill to Strengthen Critical Infrastructure Security
Universities Should Prepare for Attacks
Vade Releases 2021 Phishers' Favorites Report
Vulnerability Exploit Attempts Surge Tenfold Against Ukrainian Websites
We're all still using the same passwords, even after they've been breached
What is identity theft and how you can protect your personal data online
Why banks should incorporate software bill of materials (SBOM) into their third-party risk programs
02/03
5 Cybersecurity Tips for Small Business Owners
10 Tips for Recovery From Ransomware Attacks
All You Need to Know About NIST List for Password Guidelines
Apple and Google Turn Off Map Features to Help Ukraine
Attacks abusing programming APIs grew over 600% in 2021
Bad actors are becoming more successful at evading AI/ML technologies
Belarus may be funding cyberattacks to disrupt refugees fleeing Ukraine
Boise State University offering cybersecurity help to Idaho communities through Cyberdome program
CCSE22: "Focusing on Reducing Time to Containment Is Way to Reduce Threat Risk"
CCSE22: How to Create a Security First Culture
CCSE22: The Need to Change Course in User Cybersecurity Training
CCSE22: "Zero Trust Model Is Becoming the Default Cyber Posture," Claims Expert
CMA CGM raises cyber threat risk level
Conti, Karma Ransomware Groups Target 1 Healthcare Org Simultaneously
Conti Ransomware Decryptor, TrickBot Source Code Leaked
Cybersecurity’s Evolution Through 2022
Data breach at OK Department of Human Services may have leaked people's personal information
Daxin: A Chinese-linked malware that is dangerous and nearly impossible to detect
DDoS attackers have found this new trick to knock over websites
EV industry is the new target of phishing campaigns
First Windows 11 on Arm laptops arrive with Microsoft's Pluton chip. Here's why it matters
Five tips to combat cyberattacks amidst a land war
Flawed Encryption Feature Affected 100M Samsung Galaxy Phones
Ghostwriter Group Targets NATO Refugee Effort
Hackers Begin Weaponizing TCP Middlebox Reflection for Amplified DDoS Attacks
Hackers Imitating Popular Metaverse Projects Are Targeting Novice MetaMask Users
Hackers target Russia’s railways and power grid with cyber attacks
HHS Warns of Potential Threats to the Healthcare Sector
How much do different generations trust their mobile devices’ security?
How to keep your medical device IP safe from cyber attacks
HSB Survey Finds EV Security Fears
Ignoring US Cybersecurity Vulnerabilities No Longer an Option
Instagram phishing emails. What they look like and how to spot them
Insurance giant AON hit by cyberattack
Japan's govt. urges firms to strengthen cybersecurity
Less than a quarter of directors see ransomware as a top priority
Log4shell exploits now used mostly for DDoS botnets, cryptominers
More than 68k West Virginians impacted by massive data breach
Multifactor Authentication Is Being Targeted by Hackers
NATO cybersecurity center finishes tests of quantum-proof network
New Windows 11 test build adds Smart App control, better Microsoft 365 account management
Nvidia Admits Hackers Stole Employee and Internal Data
Over 100,000 medical infusion pumps vulnerable to years old critical bug
Paying a Ransom Doesn’t Put an End to the Extortion
Police warn of 'sophisticated' fake NHS Covid scam costing people thousands
Ransomware infections top list of the most common results of phishing attacks