top of page

NEWS: Fevereiro (27/02 - 05/03) - 09 Semana de 2022

Cyber Security and Information Security News - Daily Updates !!

05/03


A Path Towards Shaping the Future of Zero-Trust


Avast Released Free Decryptor for HermeticRansom Ransomware to help Ukraine


Cormac O'Keeffe: Cyberattacks could be used to fund sanction-hit Russia's war machine


How to protect yourself against cyberattacks


Imperva mitigated a series of massive ransom DDoS attacks


Key Ways Your Business Can Suffer Due to Ransomware Attacks


Leaked stolen Nvidia cert can sign Windows malware


Malware now using NVIDIA's stolen code signing certificates


New Linux Kernel cgroups Vulnerability Could Let Attackers Escape Container


NotPetya: the cyberattack that shook the world


Nvidia data breach exposes data of 71,000 employees: Report


Russia shares list of 17,000 IPs allegedly DDoSing Russian orgs


SharkBot malware hides as Android antivirus in Google Play


04/03


5 cybersecurity trends that will define 2022


6 Biggest Scams That Ontarians Were Tricked By Last Year According To Provincial Police


29K Wyomingites’ Data Exposed On Dark Web; Cyber Wyoming Warns Of Risks


A Cyber Risk Management Primer: Identifying Risk, Vulnerability And Threat


Advice from Internet experts.. Fake Facebook pages set a trap


Agencies in Humboldt County hit with phishing emails


App Discovered on Google Play Found to be Data-Stealing Malware, Downloaded Over 10K Times


Ascension Michigan data breach may have exposed some patients' Social Security numbers


Authorities investigate ransomware attack in Fleetwood ASD


Bracing for State-Sponsored Ransomware and Cyberthreats in a World of Conflict


BMV warning Ohioans about identity theft text scam


Carousell phishing scam! — At least 72 victims have fallen for it since Jan, over $109,000 lost


CISA pledges to share incident reports with FBI after DOJ backlash to bipartisan cybersecurity act


CISA warns organizations to patch 95 actively exploited bugs


Cyber-Criminals Exploit Invasion of Ukraine


Cyber Security: 3 Legal Implications and Risk Management


Data Breach Alert: Monongalia Health System, Inc


Data Breach at Michigan Medicine Exposes Info of 3K Patients


DORA's Global Reach and Why Enterprises Need to Prepare


Energy scam warning: Beware of Eon phishing email, warns Which? as power bills soar


Equifax data breach: Consumers unlikely to benefit financially from final settlement


FBI Memphis Field Office Reminds Tennesseans About The Risk Of Ransomware


February ransomware attacks hit major enterprises


First Nations Health Authority (FNHA) warns of ‘potentially malicious’ phishing attack on First Nations communities


Get patching now: CISA adds another 95 flaws to its known exploited vulnerabilities list


Google: To stop phishing and malware we're changing our comment notifications


Hackers are being forced to pick sides in the Russia-Ukraine war


Hackers leak 190GB of alleged Samsung data, source code


Healthcare IoT, Medical Device Vulnerability Disclosures Skyrocket


Healthcare Sector Grapples With Legacy Devices, Patching Woes


Heightened state of alert over cyber warfare threat, says new NCSC chief


IBM Report Examines Cyberattack Trends of 2021


Imposters Are attempting to Trick Ukrainian Crypto benefactors using Phishing Websites and Fake benefactors Addresses


Irish Healthcare System Requires More Than $100 Million To Recover From the Conti Ransomware Attack


James warns consumers impacted by T-Mobile data breach of potential identity theft


Japanese beauty retailer Acro blames third-party hack for breach of 100k payment cards


Lapus$ Group Leaks Alleged Samsung Confidential Data


Log4j Vulnerabilities: Over 80% of Exploitation Attempts Originated in the U.S.


Massive Meris Botnet Embeds Ransomware Notes from REvil


March 2022 Patch Tuesday forecast: Pressure mounts to resolve vulnerabilities


Michigan Medicine Notifies Nearly 3,000 Patients Of Data Breach After Employee’s Email Compromised


Microsoft suspends all new sales of Microsoft products and services in Russia


MSPs see cybersecurity as both a challenge and an opportunity


Nearly All Cybersecurity Companies Expose AWS Assets - Report


New Wiper Malware Used Against Ukranian Organizations


NSA report: This is how you should be securing your network


Nvidia Data, Credentials Stolen in Cyberattack


Over 60% of SOC Analysts Are Planning to Quit Next Year


Perennial security challenges hampering organizations in achieving their security objectives


Ransomware attackers begin to eye midmarket acquisition targets


Role of US agencies limited in protecting against BGP hijacks, attacks on internet architecture


Russian Claims YouTube "Misinformation" to Blame for Protests


Russia/Ukraine War Increases Spillover Risks of Global Cyberattacks


SBI alerts customers about KYC fraud: Here are the details


Senate Passes Strengthening American Cybersecurity Act


Slight Increase in Attacks on ICS Computers in 2021: Report


The most impersonated brands in phishing attacks


The top 1,000 open-source libraries


These are the problems that cause headaches for bug bounty hunters


These old security vulnerabilities are creating new opportunities for hackers


Toyota Group resumes production in Japan after major supplier hit by ransomware. Here are the series of events


Vulnerabilities in Over 100k Medical Infusion Pumps


What is challenging malware analysis?


What is Ransomware Protection as a Service?



03/03


75% of Tested Smart Infusion Pumps Vulnerable to Hacking


A Business Owner’s Guide To Avoiding Data Breach


After Russia’s invasion of Ukraine, it's time to hunker down


AMCA Medical Lab Data Breach Class Action Lawsuit Investigation


Army of cyber hackers rise up to back Ukraine


Before you scan, make sure QR code isn't a fake


Boardroom does not see ransomware as a priority


CCSE22: The Latest Cybersecurity Workforce Trends


China's top procuratorate warns against personal data breach


Customer Data from the 2021 T-Mobile Data Breach Found on the Dark Web


Critical Patches Issued for Cisco Expressway Series, TelePresence VCS Products


Cyber-Attack on New York Ethics Watchdog


Cyberattacks in Russia-Ukraine conflict are so far ‘no more than a nuisance’


Data breach may have exposed personal information of Oklahomans on disability aid list


Data Science in Cybersecurity: What you wanted to know


December 2021 shows highest number of Phishing attacks


Fraudsters weave Scotland’s £24m web of cyber crime and despair


Hackers use phishing to swindle crores from potential EV buyers, dealers


Hackers Who Broke Into NVIDIA's Network Leak DLSS Source Code Online


Hacktivists, cybercriminals switch to Telegram after Russian invasion


Healthcare Company Mon Health Discloses Second Data Breach


How Different Industries Can Approach Ransomware Protection


How The Cyber War Is Being Fought In The Russia-Ukraine Conflict


How to Automate Offboarding to Keep Your Company Safe


ICS vulnerability discoveries soar by 110% in four years


Itaú fica fora do ar, exibe saldo incorreto de clientes e rejeita ataque hacker


Kaspersky Discovers About 100,000 New Banking Trojans and Warns About Increasing Mobile Malware Sophistication


Log4Shell flaw: Still being used for crypto mining, botnet building... and Rickrolls


Look out for identity theft and fraud crimes as tax season begins


Michigan Medicine data breach may have exposed some patients' health information


NATO Completes Quantum-Safe Comms Test


Navigating data privacy in the higher education ecosystem


New report shows increase of ICS vulnerabilities in critical infrastructure


Over 1.2 million customers affected by Hong Kong data breaches


Phishing attacks hit all-time high in December 2021


Report: Nearly 75% of Infusion Pumps Affected by Severe Vulnerabilities


Researchers Demonstrate New Side-Channel Attack on Homomorphic Encryption


Russia Denies Satellite Hacking and Warns of Wider War


Russian APT and Ransomware Groups: Vulnerabilities and Threat Actors Who Exploit Them


Scams targeting Indian EV industry on the rise: Report


Security researchers warn of phishing attempts against officials helping refugees


Singapore: At least 72 victims in phishing scam on Carousell since January, losing over S$109,00


Singapore to launch digital defence agency to counter growing cyber threats


The biggest threat to ICS/OT is a lack of prioritization


The Linux Foundation’s Census of OSS app libraries helps prioritize security work


Ukraine says local govt sites hacked to push fake capitulation news


US launches KleptoCapture force to tackle cryptocurrency use in Russian sanction avoidance


U.S. Senate Passes Cybersecurity Bill to Strengthen Critical Infrastructure Security


Universities Should Prepare for Attacks


Vade Releases 2021 Phishers' Favorites Report


Vulnerability Exploit Attempts Surge Tenfold Against Ukrainian Websites


We're all still using the same passwords, even after they've been breached


What is identity theft and how you can protect your personal data online


Why banks should incorporate software bill of materials (SBOM) into their third-party risk programs


02/03


5 Cybersecurity Tips for Small Business Owners


10 Tips for Recovery From Ransomware Attacks


All You Need to Know About NIST List for Password Guidelines


Apple and Google Turn Off Map Features to Help Ukraine


Attacks abusing programming APIs grew over 600% in 2021


Bad actors are becoming more successful at evading AI/ML technologies


Belarus may be funding cyberattacks to disrupt refugees fleeing Ukraine


Boise State University offering cybersecurity help to Idaho communities through Cyberdome program


CCSE22: "Focusing on Reducing Time to Containment Is Way to Reduce Threat Risk"


CCSE22: How to Create a Security First Culture


CCSE22: The Need to Change Course in User Cybersecurity Training


CCSE22: "Zero Trust Model Is Becoming the Default Cyber Posture," Claims Expert


CMA CGM raises cyber threat risk level


Conti, Karma Ransomware Groups Target 1 Healthcare Org Simultaneously


Conti Ransomware Decryptor, TrickBot Source Code Leaked


Cybersecurity’s Evolution Through 2022


Data breach at OK Department of Human Services may have leaked people's personal information


Daxin: A Chinese-linked malware that is dangerous and nearly impossible to detect


DDoS attackers have found this new trick to knock over websites


EV industry is the new target of phishing campaigns


First Windows 11 on Arm laptops arrive with Microsoft's Pluton chip. Here's why it matters


Five tips to combat cyberattacks amidst a land war


Flawed Encryption Feature Affected 100M Samsung Galaxy Phones


Ghostwriter Group Targets NATO Refugee Effort


Hackers Begin Weaponizing TCP Middlebox Reflection for Amplified DDoS Attacks


Hackers Imitating Popular Metaverse Projects Are Targeting Novice MetaMask Users


Hackers target Russia’s railways and power grid with cyber attacks


HHS Warns of Potential Threats to the Healthcare Sector


HIPAA Violation Reporting


How much do different generations trust their mobile devices’ security?


How to keep your medical device IP safe from cyber attacks


HSB Survey Finds EV Security Fears


Ignoring US Cybersecurity Vulnerabilities No Longer an Option


Instagram phishing emails. What they look like and how to spot them


Insurance giant AON hit by cyberattack


Japan's govt. urges firms to strengthen cybersecurity


Less than a quarter of directors see ransomware as a top priority


Log4shell exploits now used mostly for DDoS botnets, cryptominers


More than 68k West Virginians impacted by massive data breach


Multifactor Authentication Is Being Targeted by Hackers


NATO cybersecurity center finishes tests of quantum-proof network


New Windows 11 test build adds Smart App control, better Microsoft 365 account management


Nvidia Admits Hackers Stole Employee and Internal Data


Over 100,000 medical infusion pumps vulnerable to years old critical bug


Paying a Ransom Doesn’t Put an End to the Extortion


Police warn of 'sophisticated' fake NHS Covid scam costing people thousands


Ransomware infections top list of the most common results of phishing attacks