top of page

NEWS: Fevereiro (27/02 - 05/03) - 09 Semana de 2022

Cyber Security and Information Security News - Daily Updates !!


A Path Towards Shaping the Future of Zero-Trust

Avast Released Free Decryptor for HermeticRansom Ransomware to help Ukraine

Cormac O'Keeffe: Cyberattacks could be used to fund sanction-hit Russia's war machine

How to protect yourself against cyberattacks

Imperva mitigated a series of massive ransom DDoS attacks

Key Ways Your Business Can Suffer Due to Ransomware Attacks

Leaked stolen Nvidia cert can sign Windows malware

Malware now using NVIDIA's stolen code signing certificates

New Linux Kernel cgroups Vulnerability Could Let Attackers Escape Container

NotPetya: the cyberattack that shook the world

Nvidia data breach exposes data of 71,000 employees: Report

Russia shares list of 17,000 IPs allegedly DDoSing Russian orgs

SharkBot malware hides as Android antivirus in Google Play


5 cybersecurity trends that will define 2022

6 Biggest Scams That Ontarians Were Tricked By Last Year According To Provincial Police

29K Wyomingites’ Data Exposed On Dark Web; Cyber Wyoming Warns Of Risks

A Cyber Risk Management Primer: Identifying Risk, Vulnerability And Threat

Advice from Internet experts.. Fake Facebook pages set a trap

Agencies in Humboldt County hit with phishing emails

App Discovered on Google Play Found to be Data-Stealing Malware, Downloaded Over 10K Times

Ascension Michigan data breach may have exposed some patients' Social Security numbers

Authorities investigate ransomware attack in Fleetwood ASD

Bracing for State-Sponsored Ransomware and Cyberthreats in a World of Conflict

BMV warning Ohioans about identity theft text scam

Carousell phishing scam! — At least 72 victims have fallen for it since Jan, over $109,000 lost

CISA pledges to share incident reports with FBI after DOJ backlash to bipartisan cybersecurity act

CISA warns organizations to patch 95 actively exploited bugs

Cyber-Criminals Exploit Invasion of Ukraine

Cyber Security: 3 Legal Implications and Risk Management

Data Breach Alert: Monongalia Health System, Inc

Data Breach at Michigan Medicine Exposes Info of 3K Patients

DORA's Global Reach and Why Enterprises Need to Prepare

Energy scam warning: Beware of Eon phishing email, warns Which? as power bills soar

Equifax data breach: Consumers unlikely to benefit financially from final settlement

FBI Memphis Field Office Reminds Tennesseans About The Risk Of Ransomware

February ransomware attacks hit major enterprises

First Nations Health Authority (FNHA) warns of ‘potentially malicious’ phishing attack on First Nations communities

Get patching now: CISA adds another 95 flaws to its known exploited vulnerabilities list

Google: To stop phishing and malware we're changing our comment notifications

Hackers are being forced to pick sides in the Russia-Ukraine war

Hackers leak 190GB of alleged Samsung data, source code

Healthcare IoT, Medical Device Vulnerability Disclosures Skyrocket

Healthcare Sector Grapples With Legacy Devices, Patching Woes

Heightened state of alert over cyber warfare threat, says new NCSC chief

IBM Report Examines Cyberattack Trends of 2021

Imposters Are attempting to Trick Ukrainian Crypto benefactors using Phishing Websites and Fake benefactors Addresses

Irish Healthcare System Requires More Than $100 Million To Recover From the Conti Ransomware Attack

James warns consumers impacted by T-Mobile data breach of potential identity theft

Japanese beauty retailer Acro blames third-party hack for breach of 100k payment cards

Lapus$ Group Leaks Alleged Samsung Confidential Data

Log4j Vulnerabilities: Over 80% of Exploitation Attempts Originated in the U.S.

Massive Meris Botnet Embeds Ransomware Notes from REvil

March 2022 Patch Tuesday forecast: Pressure mounts to resolve vulnerabilities

Michigan Medicine Notifies Nearly 3,000 Patients Of Data Breach After Employee’s Email Compromised

Microsoft suspends all new sales of Microsoft products and services in Russia

MSPs see cybersecurity as both a challenge and an opportunity

Nearly All Cybersecurity Companies Expose AWS Assets - Report

New Wiper Malware Used Against Ukranian Organizations

NSA report: This is how you should be securing your network

Nvidia Data, Credentials Stolen in Cyberattack

Over 60% of SOC Analysts Are Planning to Quit Next Year

Perennial security challenges hampering organizations in achieving their security objectives

Ransomware attackers begin to eye midmarket acquisition targets

Role of US agencies limited in protecting against BGP hijacks, attacks on internet architecture

Russian Claims YouTube "Misinformation" to Blame for Protests

Russia/Ukraine War Increases Spillover Risks of Global Cyberattacks

SBI alerts customers about KYC fraud: Here are the details

Senate Passes Strengthening American Cybersecurity Act

Slight Increase in Attacks on ICS Computers in 2021: Report

The most impersonated brands in phishing attacks

The top 1,000 open-source libraries

These are the problems that cause headaches for bug bounty hunters

These old security vulnerabilities are creating new opportunities for hackers

Toyota Group resumes production in Japan after major supplier hit by ransomware. Here are the series of events

Vulnerabilities in Over 100k Medical Infusion Pumps

What is challenging malware analysis?

What is Ransomware Protection as a Service?


75% of Tested Smart Infusion Pumps Vulnerable to Hacking

A Business Owner’s Guide To Avoiding Data Breach

After Russia’s invasion of Ukraine, it's time to hunker down

AMCA Medical Lab Data Breach Class Action Lawsuit Investigation

Army of cyber hackers rise up to back Ukraine

Before you scan, make sure QR code isn't a fake

Boardroom does not see ransomware as a priority

CCSE22: The Latest Cybersecurity Workforce Trends

China's top procuratorate warns against personal data breach

Customer Data from the 2021 T-Mobile Data Breach Found on the Dark Web

Critical Patches Issued for Cisco Expressway Series, TelePresence VCS Products

Cyber-Attack on New York Ethics Watchdog

Cyberattacks in Russia-Ukraine conflict are so far ‘no more than a nuisance’

Data breach may have exposed personal information of Oklahomans on disability aid list

Data Science in Cybersecurity: What you wanted to know

December 2021 shows highest number of Phishing attacks

Fraudsters weave Scotland’s £24m web of cyber crime and despair

Hackers use phishing to swindle crores from potential EV buyers, dealers

Hackers Who Broke Into NVIDIA's Network Leak DLSS Source Code Online

Hacktivists, cybercriminals switch to Telegram after Russian invasion

Healthcare Company Mon Health Discloses Second Data Breach

How Different Industries Can Approach Ransomware Protection

How The Cyber War Is Being Fought In The Russia-Ukraine Conflict

How to Automate Offboarding to Keep Your Company Safe

ICS vulnerability discoveries soar by 110% in four years

Itaú fica fora do ar, exibe saldo incorreto de clientes e rejeita ataque hacker

Kaspersky Discovers About 100,000 New Banking Trojans and Warns About Increasing Mobile Malware Sophistication

Log4Shell flaw: Still being used for crypto mining, botnet building... and Rickrolls

Look out for identity theft and fraud crimes as tax season begins

Michigan Medicine data breach may have exposed some patients' health information

NATO Completes Quantum-Safe Comms Test

Navigating data privacy in the higher education ecosystem

New report shows increase of ICS vulnerabilities in critical infrastructure

Over 1.2 million customers affected by Hong Kong data breaches

Phishing attacks hit all-time high in December 2021

Report: Nearly 75% of Infusion Pumps Affected by Severe Vulnerabilities

Researchers Demonstrate New Side-Channel Attack on Homomorphic Encryption

Russia Denies Satellite Hacking and Warns of Wider War

Russian APT and Ransomware Groups: Vulnerabilities and Threat Actors Who Exploit Them

Scams targeting Indian EV industry on the rise: Report

Security researchers warn of phishing attempts against officials helping refugees

Singapore: At least 72 victims in phishing scam on Carousell since January, losing over S$109,00

Singapore to launch digital defence agency to counter growing cyber threats

The biggest threat to ICS/OT is a lack of prioritization

The Linux Foundation’s Census of OSS app libraries helps prioritize security work

Ukraine says local govt sites hacked to push fake capitulation news

US launches KleptoCapture force to tackle cryptocurrency use in Russian sanction avoidance

U.S. Senate Passes Cybersecurity Bill to Strengthen Critical Infrastructure Security

Universities Should Prepare for Attacks

Vade Releases 2021 Phishers' Favorites Report

Vulnerability Exploit Attempts Surge Tenfold Against Ukrainian Websites

We're all still using the same passwords, even after they've been breached

What is identity theft and how you can protect your personal data online

Why banks should incorporate software bill of materials (SBOM) into their third-party risk programs


5 Cybersecurity Tips for Small Business Owners

10 Tips for Recovery From Ransomware Attacks

All You Need to Know About NIST List for Password Guidelines

Apple and Google Turn Off Map Features to Help Ukraine

Attacks abusing programming APIs grew over 600% in 2021

Bad actors are becoming more successful at evading AI/ML technologies

Belarus may be funding cyberattacks to disrupt refugees fleeing Ukraine

Boise State University offering cybersecurity help to Idaho communities through Cyberdome program

CCSE22: "Focusing on Reducing Time to Containment Is Way to Reduce Threat Risk"

CCSE22: How to Create a Security First Culture

CCSE22: The Need to Change Course in User Cybersecurity Training

CCSE22: "Zero Trust Model Is Becoming the Default Cyber Posture," Claims Expert

CMA CGM raises cyber threat risk level

Conti, Karma Ransomware Groups Target 1 Healthcare Org Simultaneously

Conti Ransomware Decryptor, TrickBot Source Code Leaked

Cybersecurity’s Evolution Through 2022

Data breach at OK Department of Human Services may have leaked people's personal information

Daxin: A Chinese-linked malware that is dangerous and nearly impossible to detect

DDoS attackers have found this new trick to knock over websites

EV industry is the new target of phishing campaigns

First Windows 11 on Arm laptops arrive with Microsoft's Pluton chip. Here's why it matters

Five tips to combat cyberattacks amidst a land war

Flawed Encryption Feature Affected 100M Samsung Galaxy Phones

Ghostwriter Group Targets NATO Refugee Effort

Hackers Begin Weaponizing TCP Middlebox Reflection for Amplified DDoS Attacks

Hackers Imitating Popular Metaverse Projects Are Targeting Novice MetaMask Users

Hackers target Russia’s railways and power grid with cyber attacks

HHS Warns of Potential Threats to the Healthcare Sector

HIPAA Violation Reporting

How much do different generations trust their mobile devices’ security?

How to keep your medical device IP safe from cyber attacks

HSB Survey Finds EV Security Fears

Ignoring US Cybersecurity Vulnerabilities No Longer an Option

Instagram phishing emails. What they look like and how to spot them

Insurance giant AON hit by cyberattack

Japan's govt. urges firms to strengthen cybersecurity

Less than a quarter of directors see ransomware as a top priority

Log4shell exploits now used mostly for DDoS botnets, cryptominers

More than 68k West Virginians impacted by massive data breach

Multifactor Authentication Is Being Targeted by Hackers

NATO cybersecurity center finishes tests of quantum-proof network

New Windows 11 test build adds Smart App control, better Microsoft 365 account management

Nvidia Admits Hackers Stole Employee and Internal Data

Over 100,000 medical infusion pumps vulnerable to years old critical bug

Paying a Ransom Doesn’t Put an End to the Extortion

Police warn of 'sophisticated' fake NHS Covid scam costing people thousands

Ransomware infections top list of the most common results of phishing attacks

Rising Phishing Scams Targeting the Indian Electric Vehicle Industry

Rural Idaho Receives Cybersecurity Boost

Russia/Ukraine Conflict: Ransomware Updates & Cybersecurity Consequences

Russia-Ukraine war: After HermeticWiper, a second malware called IsaacWiper observed

Russian space agency says hacking satellites is an act of war

Salt Security Survey Surfaces API Security Weaknesses

SDP solutions are true ZTNA solutions: They trust no one

Security leaders want legal action for failing to patch for Log4j

Senate passes bill to mandate reporting of cyberattacks

State Department of Licensing site back online after data breach

Successful phishing attacks were up in 2021: Report

Swiss Bank Requests Destruction of Documents

TeaBot Android Banking Trojan continues its global conquest with new upgrades

TeaBot Trojan Haunts Google Play Store, Again

The 20 most common passwords leaked from data breaches — did yours make the list?

The Rise of VR and the Transformation of the Cybersecurity Capability

ThrottleNet Reveals How to Avoid A Ransomware Attack

Ukraine calls for corporate support as Oracle suspends Russian operations

Ukraine govt, military sector record 196% increase in cyber attacks amid war, says CPR

Ukrainian sites saw a 10x increase in attacks when invasion started

Warning: Hackers Are Targeting The Ukraine Refugee Crisis

What Is Moonbounce Malware and How Does It Work?


3 Cloud IAM Security Questions You Must Be Able to Answer

8 NFT Scams to Avoid

$16B freight forwarder “Expeditors” hit by crippling hack

85% of companies experience at least one ransomware attack per year - Report

100 million Samsung phones affected by encryption weakness

A Sophisticated Phishing is Now Targeting Metaverse Users Using MetaMask

Analyzing Cyber and Influence Operations in the Russia-Ukraine Conflict

Apps, devices and workloads provide an ecosystem cornerstone for zero trust growth

Australian Cyber Security Centre (ACSC) warns Australian businesses to prepare for a probable Russian cyber attack

Belgium 4th in world for cybercrime

Big Tech enters fight against Russia's multi-pronged cyber offensive

Brand is the new perimeter: Cyberattacks involving brand abuse increase

China-linked Daxin Malware Targeted Multiple Governments in Espionage Attacks

Coalition Releases 2022 Cyber Claims Report, Detailing Surge in Ransomware

Content filtering devices abused for 65x DDoS amplification

Conti Ransomware Gang's Internal Chats Leaked Online After Siding With Russia

Crypto Frauds And Ransomware, The New Arsenal In Ukraine Russian War

Cyber attacks against the BBC increase 35% in two years

Cyberattacks in Ukraine: New Worm-Spreading Data-Wiper With Ransomware Smokescreen

Destructive “HermeticWiper” malware strikes Ukraine

Don’t rely on your Storage & Backup Vendors for Security

Enterprise Malware Analysis Efforts are Lacking

Four Healthcare Providers Hit with Ransomware Attacks

Google TAG removes fraudulent 'influence' operations linked to Belarus, Moldova, Ukraine

Hackers interrupt Catholic charity’s online press conference on Ukraine

Anonymous news – live: Hackers claim to have breached Russian space agency as group trolls Putin

Here’s Why Cybersecurity is the New Normal

How Attackers Use Typosquatting Domains for BEC and Ransomware Attacks

Hundreds of eBike phishing sites abuse Google Ads to push scams

In The Fight Against Cyberattacks, It's Time To Collaborate To Improve Defenses

IoT security is foundational, not optional

Is It Safe to Shop Online on Public Wi-Fi While Using a VPN?

Lack of visibility plaguing ICS environments

List of data breaches and cyber attacks in February 2022 – 5.1 million records breached

Logan Health reports data breach

Majority of successful ransomware attacks feature double or triple extortion tactics

Microsoft Accounts Targeted by Russian-Themed Credential Harvesting

New SANS Research Reveals Cyber Attackers are Actively Targeting OT/ICS Environments: Critical Systems are at High Risk and Demand Priority from IT Security

New Technology Will Make Cyber Attacks Easier to Detect

Nvidia Confirms Data Breach From Ransomware Attack

Nvidia says employee, company information leaked online after cyber attack

OCR Director Encourages HIPAA-Regulated Entities to Strengthen Their Cybersecurity Posture

Ransomware Attackers Begin to Eye Midmarket Acquisition Targets

Ransomware Continues to Hinder 85% of Organisations, but UK Leads the Way in Refusal to Pay Hackers

Reality Winner's Twitter account was hacked to target journalists

Russia Ukraine War: advice to follow in the event of a cyber attack in France

Schneider Relay Flaws Can Allow Hackers to Disable Electrical Network Protections

Securing Distributed Workspaces

Security researchers spot another form of wiper malware that was used against Ukraine's networks

Should You Pay Ransomware Demands?

State Bar of California Investigates Data Breach

Talking about cyber attacks will boost security, says expert

Tampa Bay cybersecurity firms on alert as Russia-Ukraine fight raises threat

TeaBot malware slips back into Google Play Store to target US users

The Top Security Threats Of 2022

This is what happens when two ransomware gangs hack the same target - at the same time

Three Ways to Defeat Ransomware

Toyota Halts Production Across Japan After Ransomware Attack