top of page

NEWS: Julho (24/07 - 30/07) - 30 Semana de 2022

Cyber Security and Information Security News - Daily Updates !! Weekly Review


10 biggest data breaches in history, and how to prevent them

911 ( Proxy Service Shuts Down After Confirming Security Breach

Afraid to delete data? Think again

Bromford Housing Association targeted by cyber attack

Cyber attack targets Finnish news agency STT

Data breach potentially exposes names and medical history of Allegheny Health Network (AHN) patients

Facebook ads push Android adware with 7 million installs on Google Play

How a woman caught a hacker who sent her nudes to people who knew her

India must prepare for AI warfare

Majority of public agencies feel ‘under-equipped’ to investigate digital assets-related crimes: Chainalysis

Medical billing service seeking insurance coverage for ransomware attack among upcoming Ohio Supreme Court cases

Melbourne Man Charged With Creating Global Spyware

Meta, US hospitals sued for using healthcare data to target ads

Microsoft Links Raspberry Robin USB Worm to Russian Evil Corp Hackers

Morocco Arrests French National Wanted In US For Cybercrime

Phishing risks escalate as Celsius confirms client emails leaked

Ransomware: Sometimes you need to pay to make it go away

Russian hacker group is said to have targeted German energy suppliers

Scenic Group Overcomes Cyber Attack with IT Restructure

Smishing gang smashed thanks to an operation by Almeria province’s Guardia Civil

State warns of new phishing scam with fake bank fraud alerts

Staying Ahead of the Distortion of a Cyber Attack?

This is what to expect when a managed service provider gets popped

Top 10 Cybersecurity Startups Redefining Digital Security Landscape

UK mobile industry cracks down on scam texts, reduces them by 97%

What is Phishing and Why Should You Care?

You Pay More When Companies Get Hacked IG News


A ransomware attack cost this entrepreneur a year of his life and almost wrecked his business

Amazon, PayPal, iCloud, USPS, FedEx, Costco, T-Mobile, Citibank, & MORE — Top Phishing Scams of the Week

Attackers are slowly abandoning malicious macros

Bromford Housing Association shuts down systems after cyber attack - live updates

CISA warns of critical Confluence bug exploited in attacks

Congress Warns of US Court Records System Breach

Cyber attack on US court system being investigated, Department of Justice (DoJ) confirms

Cybercriminals selling malware kits to amateur hackers for price of gallon of fuel - report

Dahua IP Camera Vulnerability Could Let Attackers Take Full Control Over Devices

Euro Police Bust €3m Internet Fraud Gang

Federal Communications Commission (FCC) Warns of Rising Robotext Scams

Housing association Bromford shuts down systems 'as a precaution' after cyber attack

How ‘No More Ransom’ Helped More Than 1.5 million People Decrypt Their Devices

How to Combat the Biggest Security Risks Posed by Machine Identities

LockBit operator abuses Windows Defender to load Cobalt Strike

Malicious Npm Packages Designed to Steal Discord Tokens

Microsoft has blocked hackers' favourite trick. So now they are looking for a new route of attack

Microsoft links Raspberry Robin malware to Evil Corp attacks

New banking scam: Warning for Bank of America, Citi and Wells Fargo customers

Over a Dozen Android Apps on Google Play Store Caught Dropping Banking Malware

Paytm Data leak update: retracts Paytm Mall data breach claim, users' data absolutely safe

Paytm Mall rejects claim of data breach in 2020, says users’ data is absolutely safe

Phishing risks escalate as Celsius confirms client emails leaked

Prevent email phishing attacks this summer with 3 defensive measures

Ransomware-as-a-service (RaaS) Groups Forced to Change Tack as Payments Decline

Ransomware Bill Passes House

Researchers Warns of Increase in Phishing Attacks Using Decentralized IPFS Network

South Plainfield residents frustrated over handling of data breach

Spanish Police Arrest 2 Nuclear Power Workers for Cyberattacking the Radiation Alert System

Staying safe online: How to browse the web securely

Telegram and Discord Bots Delivering Infostealing Malware

This phishing attack uses a countdown clock to panic you into handing over passwords

US govt warns Americans of escalating SMS phishing attacks

Using real customer data in testing environments creates unnecessary risk

Victims in S'pore lose some S$37,400 in July 2022 alone due to surge in IRAS phishing scams

What’s Top of Mind for CISOs in 2022?

When It Comes To Protecting Data, Know Your Enemy

Why your data protection strategy needs to prioritise recovery


1 in 3 employees don’t understand why cybersecurity is important

84% of organizations experienced an identity-related breach in the past 18 months

Ataques cibernéticos no Brasil aumentaram 46% no segundo trimestre de 2022

Cybersecurity is becoming a top priority among critical infrastructure operators

Enovos energy supplier still recovering from weekend cyber attack

European firm DSIRF behind the attacks with Subzero surveillance malware

European Police Arrest 100 Suspects in BEC Crackdown

Explained: What is cryptojacking, the cyber attack carried out by crypto miners?

Google Delays Blocking 3rd-Party Cookies in Chrome Browser Until 2024

Hackers atacam manifesto em defesa da democracia

Hackers Change Tactics for New Post-Macro Era

Hackers Opting New Attack Methods After Microsoft Blocked Macros by Default

H0lyGh0st ransomware gang faces challenges, but still a threat

How Does Ransomware Spread in a Network?

How to advance from vulnerability scanning to cyber risk management

Industrial Cybersecurity Market is forecasted to be valued US$ 43.5 Bn by 2032 – Future Market Insights, Inc.

Kubernetes security: Shift-left strategies and simplifying management

Late payday coming for some at WRDSB, 1 week after cyberattack

Malwares de commodities foram a principal ameaça do segundo trimestre

Memorandum of understanding in the field of cyber security signed between Slovenia and Ukraine

Microsoft Uncovers Austrian Company Exploiting Windows and Adobe Zero-Day Exploits

NCSC Startup Program Seeking Candidates to Help Protect Critical Infrastructure

One Ransomware victim is appearing on leak sites every four hours: Report

Only 25% of organizations consider their biggest threat to be from inside the business

Organizações portuguesas sofrem 907 ataques ransomware por semana. E os principais alvos estão identificados

Ransomware attacks badly hit manufacturing industry

Ransomware caused American Dental Association outage, led to stolen data

Site da carta pela democracia sofreu 1.538 tentativas de ataque hacker

Social Media Accounts Hijacked to Post Indecent Images

Spain police arrested two men accused of cyber attacks on radioactivity alert network (RAR)

Survey reveals the important role of ‘malicious insiders’ in successful ransomware attacks

The future of attack surface management (ASM)

Top MSSP CEOs Share 7 Must-Do Tips for Higher MSSP Revenue and Margin

Why Data Recovery Due Diligence Helps Improve Cyber Resilience and Ransomware Response


Average cost of data breach in India at all-time high

Beyond prevention: Stepping up the fight against ransomware

Big gaps found in workplace cybersecurity best practices

Canadian orchestra group among victims of ransomware attack

Consumers Pay the Price as Data Breach Costs Reach All-Time High

Cybercrime goods and services are cheap and plentiful

Data Breach Costs Reach New Record High

Data breach costs record $4.3M with firms passing buck to customers

DDoS Attack Trends in 2022: Ultrashort, Powerful, Multivector Attacks

Discord and Telegram are used to distribute malware: Research

Fallout from massive Shanghai Police data breach reverberates on dark web

Fundsmith warns investors about phishing scams

Global State of Ransomware Survey Reveals One in Three Organizations See Malicious Insiders as a Route for Ransomware

How Ransomware Has Become a Geopolitical Risk for Governments

How SMBs are evolving their cybersecurity operations practices

IBM Report Reveals Economic Impact of Data Breaches

Iraqi hacker group 'ALtahrea Team' targets Israeli IT, e-commerce companies in major cyber attack: Reports

Kansas MSP shuts down cloud services to fend off cyberattack

Malicious IIS Extensions Gaining Popularity Among Cyber Criminals for Persistent Access

Microsoft warns of stealthy backdoors used to target Exchange Servers

More Than 1.5 Crore Social Media Phishing Attacks in Q2 In India: Report

New Ducktail Infostealer Malware Targeting Facebook Business and Ad Accounts

No More Ransom Has Helped Over 1.5m Victims

Over half of users in Saudi Arabia faced phishing scams when using digital payments

Palo Alto Networks Unit 42 Incident Response Report Reveals that Phishing and Software Vulnerabilities Cause Nearly 70% of Cyber Incidents

Price hike for consumers as data breach costs rocket to all-time high

Race against time: Hackers start hunting for victims just 15 minutes after a bug is disclosed

Ransomware now strikes one in 40 organisations per week, Check Point finds

Single data breach now costs nearly Rs 17.5 crore in India: Study

Taking the Risk-Based Approach to Vulnerability Patching

The global average cost of a data breach reaches an all-time high of $4.35 million

These 28+ Android Apps with 10 Million Downloads from the Play Store Contain Malware

These ransomware hackers gave up when they hit multi-factor authentication

Twitter data breach: Personal details of 5.4M users leaked

United States and Ukraine Expand Cooperation on Cybersecurity

Wawa agrees to payment, security changes after 2019 data breach

What to do if your school experiences a ransomware attack


3 Actions Enterprises Must Take After Suffering a Data Breach

4 Steps Financial Industry Can Take to Cope With Their Growing Attack Surface

A robust cybersecurity response plan has never been more critical

Benefits of modern PAM: Efficiency, security, compliance

Critical FileWave MDM Flaws Open Organization-Managed Devices to Remote Hackers

Cybercrime in food: Five-step plan for Australian firms to tackle 'increasingly sophisticated' security risks

Cybercriminals target Stranger Things fans

Cybersecurity Firm Mutare Reveals That Nearly Half Of All Organizations Have Been Targeted By Voice-Acted Phishing Attacks

Experts Find Similarities Between New LockBit 3.0 and BlackMatter Ransomware

Facing plenty of phish, employees need to get schooled

Global Malware Volumes Increase for First Time in Three Years

Hackers Increasingly Using WebAssembly Coded Cryptominers to Evade Detection

Hackers scan for vulnerabilities within 15 minutes of disclosure

Hackers steal $6 million from blockchain music platform Audius

How to report phishing emails

Indian insurance portal Policybazaar suffers data breach

Infosec pros want more industry cooperation and support for open standards

Italian taxman hit by ransomware

LockBit claims ransomware attack on Italian tax agency

Lockbit Ramps Up Attacks on Public Sector

Major shifts and the growing risk of identity fraud

Maritime sector and satellite infrastructure will be particular targets for cyber attacks in the second half of 2022

Microsoft Is the Most Impersonated Brand in Phishing Attacks

New Android malware apps installed 10 million times from Google Play

No More Ransom helps millions of ransomware victims in 6 years

Over 200 Domains Impersonating Middle Eastern Postal Services

Palo Alto Networks Unit 42 Incident Response Report Reveals that Phishing and Software Vulnerabilities Cause Nearly 70% of Cyber Incidents

Phishers Targeted Financial Services Most During H1 2022

Phishing Attacks Rose 61% in 2022, New Study Finds

Poor Training and Communications Hindering Cybersecurity Efforts

Ransomware: 1.5 million people have got their files back without paying the gangs. Here's how

Ransomware Attackers Double Down on Attacking Vulnerable Schools

Report shows a third of employees don’t understand importance of cybersecurity

SmokeLoader Infecting Targeted Systems with Amadey Info-Stealing Malware

Targeted campaign uses infostealer to hijack Facebook Business accounts

T-Mobile to Pay $350m Settlement in Breach Case

Tech media giants pledge to maintain online safety in NZ pact

The Industrial Cyber-Attack Evolution: How to Keep Your Network Safe

The infosec investment landscape: Which tech gets the most bucks?

Uber Settles 2016 Hacking Case With DoJ

U.S. doubles reward for tips on North Korean-backed hackers

Why Cyber Attacks On Identities Are On The Rise


A ‘top tier’ hacking gang is likely to be behind Entrust ransomware attack

American Airlines is Fighting Back Against Cyberpirates Using Fake Airline Emails to Steal Your Personal Data

Blue Cross and Blue Shield (BCBS) of Massachusetts Reports Third-Party Vendor Data Breach

Building trust into every aspect of an organization

Charity platform alerts public to phishing e-mails

CosmicStrand UEFI malware found in Gigabyte, ASUS motherboards

Cyber-Attacks on Port of LA Double

Cyber-mercenaries for hire represent shifting criminal business model

Cyber-Security for Controller Area Network (CAN) Market Share | Size | Forecast to 2028

Data Protection in the Era of Growing Ransomware Threat

Double extortion ransomware and patient data protection

Employees Most Frequently Fall for Emails That Look Like They Came From Human Resources or IT

Enovos and Creos targeted by cyber attacks on 22-23 July

Entire Canadian town hit by ransomware attack

Entrust the biggest cybersecurity company in the United States got hacked!

Experts Uncover New 'CosmicStrand' UEFI Firmware Rootkit Used by Chinese Hackers

Flaws in Enabot Ebo Air Home Security Robot Allowed Attackers to Spy on Users

Flaws in FileWave MDM could have allowed hacking +1000 organizzations

GUEST ESSAY: How amplified DDoS attacks on Ukraine leverage Apple’s Remote Desktop protocol

Hackers Exploit PrestaShop Zero-Day to Steal Payment Data from Online Stores

Healthcare Cyber Security Market 2022 Segmentation Analysis, Key Players, Industry Share, and Forecast by 2030

How Cybercriminals Conduct Credential Harvesting and How You Can Protect Yourself

How to Mitigate Ransomware and Malware Attacks

Indian Insurance Portal Policybazaar Suffers Breach

Investigation ongoing on MyIDENTITY data breach, no arrests yet

Lockbit 3.0 and the ransomware business model

LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities

Magecart Hacks Food Ordering Systems to Steal Payment Data from Over 300 Restaurants

Medical Device Maker to Pay $13m in False Claims Case

Microsoft Adds Default Protection Against RDP Brute-Force Attacks in Windows 11

Military Cyber Security Market 2022-2028 Comprehensive Analysis by Top Most Players – Lockheed Martin, IBM Corporation, BAE Systems, Northrop Grumman Corporation

Minimizing risk: Key cybersecurity-related M&A considerations

Monitoring the impact of security solutions on user experiences is critical

New pathway for budding cybersecurity professionals

NIST revises healthcare guidance to improve HIPAA Security Rule compliance

NIST Updates Healthcare Security Guidance

Opposition Seeking Update on Health Care Cyber Attack

Phishing Attacks Are Now Using the Windows Calculator

Policybazar hit by a cyber security incident

Prison caught up in cyber attack

Protecting IoT Devices from Within – Why IoT Devices Need A Different Security Approach?

QBot Malware Exploiting Windows Calculator to Compromise Devices

Racoon Stealer is Back — How to Protect Your Organization

Ransomware With a Philanthropic Twist

Researcher finds Russia-based ransomware network with foothold in U.S.

Roaming Mantis Financial Hackers Targeting Android and iPhone Users in France

SHI International Corp. Confirms Recent Data Breach Resulted in Compromised Employee Data

Shields Health Care Group, Inc. Announces Data Breach

Source code for Rust-based info-stealer released on hacker forums

T-Mobile to pay US customers $350 mn in settlement over massive data breach

Tamil Nadu cyber security on high alert as phishing attacks rise

Tenet Healthcare Cyberattack Had a $100 Million Unfavorable Impact in Q2, 2022

The state of cybercrime in 2022: What it costs and where it comes from

Three questions to ask when setting up MFA

TMT firms among top targets for cyber attacks in Singapore

TN Cyber security on high alert as phishing attacks rise

Transportation Security Administration (TSA) Issues New Cyber Directive for Pipeline Operators

Trust in fintech security has been wavering

Uber Admits Covering Up 2016 Data Breach, Avoids Prosecution

UK Seizes Nearly $27m in Crypto-Assets

Ukraine Cyber War Fall-out and Ransomware Trends Areas of Focus in New CyberCube Research

U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack

Vista Bank Reports Data Breach Affecting Social Security Numbers

Web apps offer a way in for cyberattacks in health care computer networks

Western Australian Arts and Culture Trust discloses potential data breach


45% of businesses owners have faced ‘major data breach’ — with a third being an inside job

A database containing data of 5.4 million Twitter accounts available for sale

A Ransomware Attack Permanently Shut Down A College

Amadey malware pushed via software cracks in SmokeLoader campaign

An Entire Canadian Town Is Being Extorted By Ransomware Cyber Criminals

Botnet Attacks and Ransomware on Cryptocurrency Will Continue: Check Here for All Details

Como ser um Hacker? O que precisa estudar para se tornar um Hacker? Nós explicamos tudo

Drop in the number of phone scams reported to HMRC in Wales this year

Hacker drena US$ 1,08 milhão da Audius após aprovação de proposta maliciosa

Huge Neopets hack may have compromised over 69 million accounts, hacker wants $100,000 for the data

Is APT28 behind the STIFF#BIZON attacks attributed to North Korea-linked APT37?

Microsoft and AustCyber tackle cybersecurity skills shortage

New Business Email Compromise Schemes Add Vendor Deception

Now That Bitcoin Is Considered Property In The UK, Reclaiming Ransomed Assets Sent To Exchanges Is Much Easier

Omicron SMS scam after Aussie credit details

Pakistan: Cybersecurity threats

Port Of LA Calls FBI After Cyber Attacks Double

QBot phishing uses Windows Calculator sideloading to infect devices

QR codes are essential, but some may hurt you

Samsung: Our responsibility to protect users doesn't end once a device is in their hands

T-Mobile Cybersecurity Data Breach Settlement: Details Emerge

WA start-ups lax on cybersecurity, says RSM

What is Vishing and Why RBI Warns You To Stay Alert

NEWS: Julho (17/07 - 23/07) - 29 Semana de 2022

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.


Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page