NEWS: Junho (12/06 - 18/06) - 24 Semana de 2022
Cyber Security and Information Security News - Daily Updates !!

18/06
Azerbaijan successfully implements measures to ensure cybersecurity
DeadBolt ransomware takes another shot at QNAP storage
DMEA: Cyber attack in investigators' hands
eCh0raix ransomware starts targeting QNAP NAS devices again
Federal cybersecurity bill may be 'Band-Aid on a bigger problem,' Waterloo, Ont., expert says
Healthcare Cybersecurity: Some Progress, Still Problems
Heineken, Screwfix and B&Q Father's Day scams spark warning
How crypto-related phishing scams continue to defraud investors
How Tinder scammers steal your heart, then your money
How to Implement a Cybersecurity-First Culture
MaliBot Android Banking Trojan targets Spain and Italy
O que hackers podem fazer com seu endereço se ele vazar? Entenda riscos
Ranchi Dhanbad: Cyber security lessons at BIT Sindri
The Philippines: All about cyber scams
TikTok clears the air about suspected U.S. user data breach by Chinese workers
Top 10 Enterprise Cybersecurity Companies to Know in 2022
Wave of 'Matanbuchus' spam is infecting devices with Cobalt Strike
17/06
A Microsoft 365 feature can ransom files on SharePoint and OneDriveCould
Allahabad University's website crashes during exam, cyber attack suspected
Are your legacy systems an open door for cyber attacks?
Atlassian Confluence Server Bug Under Active Attack to Distribute Ransomware
Cadê minha M4? Hackers de Warzone serão desarmados no meio da partida
Chinese Hackers Exploited Sophos Firewall Zero-Day Flaw to Target South Asian Entity
Cisco says it won’t fix zero-day RCE in end-of-life VPN routers
Costa Rica chaos is a warning that the global ransomware threat remains
Criminal IP analysis report on zero-day vulnerability in Atlassian Confluence
Cyber criminals continue to target and exploit people
DeadBolt Ransomware Actively Targets QNAP NAS Devices — Again
Experts Discuss Next Steps in Trust, Privacy and Security
FBI: Crypto Scam on LinkedIn a 'Significant Threat' to Platform, Consumers
Financial data, passwords targeted by novel Android malware
Fraud trends and scam tactics consumers should be aware of
Hacker instalou o Ubuntu em uma tela do Google Nest Hub de 2ª geração
Hacker invade conta de Maradona, troca foto de perfil e exibe falsa publicação de Elon Musk
How Data Landlords Put Their Tenants at Risk
How financial institutions are improving customer experience with fraud prevention measures
How Florida Businesses Can Protect Against Data Breaches
How to Tell If Someone Accessed Your Google Account
Incident Of The Week: BlackCat ransomware strikes Italian university
Immersive Labs Cyber Team Sim prepares teams for real-life cyber attacks
Interpol anti-fraud operation busts call centers behind business email scams
Is Stopping a Ransomware Attack More Important than Preventing One?
Kenyan authorities arrest student hackers converting stolen money to bitcoin
Main types of cyber attacks in Azerbaijan unveiled
Microsoft: June Windows updates may break Wi-Fi hotspots
NakedPages - A new phishing toolkit available on cybercrime forums
New MaliBot Android Malware Found Stealing Personal, Banking Data
Over a Million WordPress Sites Forcibly Updated to Patch a Critical Plugin Vulnerability
Pakistan: ARY News Twitter account hacked
Phishing Attacks Reached a Record High in the First Quarter of 2022, APWG Report Found
Proofpoint details 'dangerous' ransomware flaw in SharePoint and OneDrive
PSA | QR Code Scams Are Real (What They Are + How to Protect Yourself)
Quer ser um hacker? Nova plataforma oferece ambiente gamificado e desafios
QNAP 'thoroughly investigating' new DeadBolt ransomware attacks
Quebec court approves $200.9M settlement against Desjardins over data breach
Ranked: the 59 cybersecurity unicorns you need to know about
RansomHouse hackers threaten to sell Shoprite data
Ransomware Defense: Preventative Techniques To Combat Attack Methods Of Today’s Cybercriminal Gangs
Rapid7 report examines use of double extortion ransomware attacks
Reimagine Hybrid Work: Same CyberSec in Office and at Home
Researchers Uncover 'Hermit' Android Spyware Used in Kazakhstan, Syria, and Italy
Russian botnet ‘RSOCKS’ dismantled after hacking millions of devices
Russian RSocks botnet disrupted after hacking millions of devices
Slovakia's defence department faced a large-scale cyber attack
Stakeholders call for collaboration to restore cyber security sanity
Surfshark Finds US is the Most-Breached Country
The future of cyber-security: MFA and beyond
The rise of double extortion ransomware
Think of the Russia-Ukraine conflict as a microcosm of the cyber war
UK Proposes Post-Brexit Data Laws to Boost Innovation
Understanding the global rise of ransomware
University of Pittsburgh Medical Center Settles Data Breach Class Action for $450,000
US Bipartisan Privacy Proposal Has Cybersecurity Mandates
US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes
Vladimir Putin's key speech delayed because of 'massive' cyber attack in Russia
Warning issued over Father’s Day Heineken scam tricking people on WhatsApp
Warning Signs of Data Breaches You Should Know Of
What is cloud security? A guide to cyber security in the cloud for the public sector
Which stolen data are ransomware gangs most likely to disclose?
Why You Need CIS Controls for Effective Cyber Defense
Wilkins Recreational Vehicles, Inc. Reports Data Breach Following Conti Ransomware Attack
WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability
16/06
4 Cloud Application Security Best Practices
5-star hotel’s business account hacked, customers lose money
24B Credentials Are Up for Grabs on Darkweb Marketplaces
72% of middle market companies expect to experience a cyberattack
A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage
A Smarter Cyber-Risk Management Strategy
ALPHV/ BlackCat ransomware gang lets victims check if their data has been compromised
Anker Eufy smart home hubs exposed to RCE attacks by critical flaw
Another 1.3M patients added to data breach tally of ransomware attack on Eye Care Leaders
Another group of Indian hackers exposed on decade-long attacks against China
Ataques hacker do tipo DDoS podem destruir e tirar do ar o seu humilde site ou blog
BeanVPN leaks 25 million user reco
BlackCat Extortion Technique: Public Access to Breached Data
BlackCat Ransomware Gang Targeting Unpatched Microsoft Exchange Servers
Business email platform Zimbra patches memcached injection flaw that imperils user credentials
CERT-In law impact on data breaches: India is the 6th most breached country worldwide
College hackers in Kenya are converting stolen money to bitcoin
Corporate Network Access Selling for Under $1000 on Dark Web
Customers sue 365 Data Centers over alleged ransomware which caused outage
Cyber Resiliency: What It Is and How To Build It
Cybersecurity: Twitter littered with thieves that are eyeing your assets
Cybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data
Data breach puts hundreds of Uganda Securities Exchange (USE) investor details at risk
Deepfake attacks expected to be next major threat to businesses
Difference Between Agent-Based and Network-Based Internal Vulnerability Scanning
Facebook Messenger Scam Duped Millions
Global Police Arrest Thousands in Fraud Crackdown
Hacker usa empréstimos relâmpago para roubar bitcoins de protocolo DeFi
Healthcare Providers see 94% hike in ransomware in 2021
High-Severity RCE Vulnerability Reported in Popular Fastjson Library
How social engineering attacks are evolving beyond email
How to Build Cybersecurity Resilience
How To Protect Yourself From Fraudulent App Scams
Human error leading factor in data breaches, Verizon report says
In modern war, we have as much to fear from cyber weapons as kinetics
Latin America governments are prime targets for ransomware due to lack of resources, analysis argues
MetaMask, Phantom warn of flaw that could steal your crypto wallets
Microsoft Office 365 feature can help cloud ransomware attacks
Mounting Data Breaches Cause Huge Encryption Spike
Office 365 Functionality Could Allow Ransomware to Hold Files Stored on SharePoint and OneDrive
NakedPages Phishing Toolkit is Now Available on Cybercrime Forums
Office 365 loophole may give ransomware an easy shot at your files
Operational Technology (OT) Cybersecurity Readiness is Dangerously Behind
Phishing-as-a-Service (PhaaS) Explained
Ransomware attack on Montrose Environmental Group disrupts lab testing services
Ransomware Risk in Healthcare Endangers Patients
Russian Cybercriminals, the Target of Global Authorities
San Diego Family Care Agrees to $1 Million Settlement to Resolve Class Action Data Breach Lawsuit
SeaFlower Backdoor Targets Web3 Wallet Seed-Phrases
South Dakota Health Care System Says Data Breach Affected 700
State-Sponsored Phishing Attack Targeted Israeli Military Officials
Tech Experts Say You Should Never Fall For This One Common Scam–It’s So Dangerous!
The Age Of The Digital Self: What To Look Out For In The Near Future
The challenges of managing increased complexity as hybrid IT accelerates
The future is passwordless. What’s slowing it down?
The Top Five Mistakes Of Underperforming Cybersecurity Teams
This new Android malware bypasses multi-factor authentication to steal your passwords
Zero trust adoption: Industry-specific challenges and implementation strategies
What are the Consequences of a Data Breach?
What Cyberattacks Do Threat Actors Use for Data Leaks?
What is a Cyberattack? Types and Defenses
Why Combating Ransomware Should Top The List Of Insurance Industry Priorities
Why we need philosophy and ethics of cyber warfare
Yuma Regional Medical Center Experiences Ransomware Attack
15/06
3 Indications That Your Computer is Being Hacked
A closer look at the SEC Cybersecurity Disclosure rule
A daily conundrum for cyber insurance brokers – but it hasn't always been this way
A new side-channel attack Hertzbleed affects Intel and AMD CPUs
A tiny botnet launched the largest DDoS attack on record
Behavioral Wellness Department reports medical data breach
BNPL Fraud Alert as Account Takeovers Surge
Cisco Secure Email bug can let attackers bypass authentication
Citrix warns critical bug can let attackers reset admin passwords
Class Action Lawsuit Filed Against Shields Health Care Group Over 2 Million-Record Data Breach
Cloud computing top concerns: The focus is shifting
Cloudflare Thwarted Largest Ever HTTPS DDoS Attack
Comprehensive, Easy Cybersecurity for Lean IT Security Teams Starts with XDR
Cyber attack: Council fixes issue preventing people from moving home in Gloucester
Cyber Threats Target US Election Officials With Phishing Campaign
Cybersecurity in the Pacific: how island nations are building their online defences
Cybersecurity Professionals Identify Top Cloud Computing Security Risks
Data breach at US ambulance billing service Comstar exposed patients’ healthcare information
Don't use these passwords: These are the 10 logins most regularly found for sale online
DragonForce Gang Unleash Hacks Against Govt. of India
Education sector in need of greater cybersecurity
Elasticsearch Database Mess Up Exposed Login, PII Data of 30,000 Students
Energy sector cybersecurity still a growing priority
Federal Trade Commission (FTC) Blames Meta for Over Half of all Social Media Crypto Scams
Firefox: Our new cookie protection will stop companies tracking you across sites
Got hit by a cyberattack? Hackers will probably come after you again - within a year
Government signs cybersecurity agreement with Microsoft
Hackers exploit three-year-old Telerik flaws to deploy Cobalt Strike
Heineken warns customers over WhatsApp Father's Day 'competition' scam
How confident are IT pros in the security of their organization’s supply chain?
How obfuscation can help with data breach mitigation
Identity and Access: The Game is the Same, But Fiercer
In Cybersecurity, What You Can’t See Can Hurt You
Insta-scam: how scammers are targeting younger users online
Interpol seizes $50 million, arrests 2000 social engineers
Iranian Hackers Targeted Former US Ambassador, Israeli Officials: REPORT
MaliBot: A New Android Banking Trojan Spotted in the Wild
Microsoft's Final Patch Tuesday Fixes Follina Bug
Mind the gap: How to ensure your vulnerability detection methods are up to scratch
Need of a Geospatial Approach to Cybersecurity
New Hertzbleed Side-Channel Attack Affects All Modern AMD and Intel CPUs
New peer-to-peer botnet infects Linux servers with cryptominers
New VIP3R Campaign Highlights the Dangers of Spearphishing
Organizations are Concerned that Digital Attack Surface is Spiralling Out of Control
Phishing for cryptocurrency continues to rise
Phishing in the Metaverse: The New Reality of Brand Protection
Phishing reaches all-time high in early 2022
Privacy Watchdog Boosts Legal Funds by Keeping Millions in Fines
Ransomware gang publishes stolen victim data on the public Internet
The rise of phishing as a service (PhaaS) and how to tackle it
The unrelenting threat of ransomware is pushing cybersecurity workers to quit
Thousands of GitHub, AWS, Docker tokens exposed in Travis CI logs
Travel-related Cybercrime Takes Off as Industry Rebounds
Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar
Why Ransomware Extortion is a Threat
14/06
8 Outside Threats to Protect Your Business From: How to Secure Your Company
Admin of DDoS-For-Hire Service “DownThem” Gets 2 Years Prison Sentence
Are Phishing Attacks Targeting Crypto on the Rise?
Attacks on Cloud Service Providers Down 25% During First 4 Months of 2022
Attack on Kaiser Permanente Exposes Data on 70,000 Customers
Avera Health Data Breach Affects 700 Patients
Brazil's data protection authority to gain independence from presidential office
Chima Opara weighs in on AI Bias, Cyber Security
Cloud computing means big opportunities - and big threats
Cloudflare mitigates record-breaking HTTPS DDoS attack
Cloudflare Saw Record-Breaking DDoS Attack Peaking at 26 Million Request Per Second
Companies can improve cybersecurity posture with better security training
Conversão da ANPD em autarquia pode garantir viabilidade jurídica da LGPD
Crypto has another problem – scammers will stop at nothing to steal digital currency
CSIRO’s Support to SMEs Working in Cyber Security
Cyber security: a race against time
Cybercriminals are impersonating your boss—here’s how to tell
Deep Web Vs. Dark Web: Differences, Legality and Security
Experts spotted Syslogk, a Linux rootkit under development
Experts Warn on The Dangers of QR Codes, Say They May Target Your Vital Information
Hacker Advertises ‘Crappy’ Ransomware on Instagram
HelloXD Ransomware Variants Found Installing Backdoor on Windows and Linux Machines
India 5th on breached users' global list: Report
Iran says cyber threats against it are rising - analysis
Iran Spear-Phishers Hijack Email Conversations in New Campaign
Kaiser Permanente Exposes Nearly 70K Medical Records in Data Breach
Linux Malware Deemed ‘Nearly Impossible’ to Detect
Malicious Android apps collect personal financial information from users, according to MyCERT
Microsoft patches actively exploited Follina Windows zero-day
Microsoft: Ransomware gangs are using unpatched Exchange servers to gain access, so get updating
More than 90% of cyber attacks made possible by human error
New Aadhaar data leak exposes 11 crore Indian farmers’ sensitive info
New Syslogk Linux Rootkit Lets Attackers Remotely Command It Using "Magic Packets"
New Zimbra Email Vulnerability Could Let Attackers Steal Your Login Credentials
Numrich Gun Parts Corporation Announces Data Breach
Nupur Sharma Row: Int’l hackers fire cyber attack on India against Nupur Sharma’s remark
Once is never enough: The need for continuous penetration testing
Only 10% of vulnerabilities are remediated each month
Only More Secure Coding Can Protect the Software Supply Chain
Os 5 métodos de ataque cibernético em que você precisa ficar de olho
Over Three-Quarters of UK Adults Hit by Online Scams
Owner of ‘DownThem’ DDoS service gets 2 years in prison
Paid a ransom? The crims will be back for more
Ransomware Attackers Claim 98 percent of Payments in Bitcoin
Ransomware attacks are increasing with more dangerous hybrids ahead
Ransomware attacks on healthcare organisations up 94% in 2021: Sophos
Reasons To Choose Career In Cybersecurity
Researchers Detail PureCrypter Loader Cyber Criminals Using to Distribute Malware
SA government departments are vulnerable to cyber attack
Saas security: How to avoid “death by 1000 apps”
San Diego Family Care data breach $1M class action settlement
Santa Barbara County Behavioral Wellness experiences data breach in medical records
SeaFlower campaign distributes backdoored versions of Web3 wallets to steal seed phrases
Six ways to tell if you have been hacked
South Africans seeing emails about 'mandatory training' for monkeypox prevention – it's a scam
Strong passwords still a priority strategy for enterprises
Technical Details Released for 'SynLapse' RCE Vulnerability Reported in Microsoft Azure
Teixeira: Chefe de Gabinete da prefeitura é vítima de crime cibernético; Polícia investiga o caso
The unrelenting threat of ransomware is pushing cybersecurity workers to quit
This new Linux malware has a sneaky way of staying hidden
Unpatched Travis CI API Bug Exposes Thousands of Secret User Access Tokens
Urgent warning: ALDI shoppers urged to be wary of new cheap LG television scam
Using compliance to create value for your organization
Vulnerability management mistakes CISOs still make
Warning to WhatsApp users over Heineken scam offering 'free beer' for Father's Day
Well-Constructed And Well-Defended: Countering Modern Attack Patterns
What Is a Secure Web Gateway (SWG) for the Cloud?
Why EVs are a vulnerability in automotive cybersecurity
Why do organizations need to prioritize ransomware preparedness?
With 13.4% CAGR, Global Cyber Security Market Size to Surpass USD 376.32 Billion in 2029
13/06
7 Tips to protect yourself from online banking fraud
19 Ways to Vet Your MSP for Cybersecurity Best Practices
45% of cybersecurity pros are considering quitting the industry due to stress
700,000 Patients Affected by Yuma Regional Medical Center Ransomware Attack
Accenture’s Boland Lithebe on the rising cybersecurity threat
API security warrants its own specific solution
Bangladesh has the lowest data breach density in Asia: studies
Businesses are leaving bot attacks unchallenged for almost four months
Chinese 'Gallium' Hackers Using New PingPull Malware in Cyberespionage Attacks
Chinese Hackers Distribute Backdoored Web3 Wallets for iOS and Android Users
ConnectWise reveals cybersecurity updates and partnerships
CyberCube report addresses criminal cyber threat actors
Data breach: Patriot demands accountability from govt
Eight Zero Days Could Open Doors for Hackers
ESET Threat Report details cyberattacks with links to Ukraine-Russia war
Ethical Hacking: Understanding the Basics
Europe’s new NIS2 cybersecurity directive covers more sectors, increases accountability
Exabeam Cybersecurity Scholarship Program 2022 for College Women nos EUA (até US$ 10.000)
Febraban cria laboratório que simula ataque cibernético para conter fraudes
Gallium hackers backdoor finance, govt orgs using new PingPull malware
Googler Suspended After Claiming AI Became Sentient
Hackers clone Coinbase, MetaMask mobile wallets to steal your crypto
HelloXD Ransomware Installing Backdoor on Targeted Windows and Linux Systems
How ‘Make-in-India’ cybersecurity startups are emerging in the global space
How organizations can protect themselves in the emerging risk landscape
Increased cloud complexity needs stronger cybersecurity
Kaiser Permanente data breach exposes health data of 69K people
Managing Cybersecurity in the Workplace
Metasploit 6.2.0 comes with 138 new modules, 148 enhancements and features
Microsoft: Exchange servers hacked to deploy BlackCat ransomware
Microsoft helps prevent lateral movement from compromised unmanaged devices
Mobile malware attacks in Singapore drops 15.9% in 2021
New Syslogk Linux rootkit uses magic packets to trigger backdoor
Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy
Public getting fed up with never ending data leaks
Quick and Simple: BPFDoor Explained
Researchers Disclose Rooting Backdoor in Mitel IP Phones for Businesses
RSAC: The Cybersecurity Maturity Model Certification Program is Coming
RSAC: World Economic Forum Cybercrime Atlas Effort Advances
Russian hackers start targeting Ukraine with Follina exploits
Schneider Electric debunks cybersecurity misconception
SentinelLabs uncovers decade-long cyber espionage operations by a Chinese threat group
Seven tech security trends heading your way now
Shoprite’s “possible data compromise” nothing else but data breach — legal expert
State-sponsored Chinese threat actors compromise telecom and network service providers
The Importance of Information Security in Today’s World
Threat actors becoming more creative exploiting the human factor
Time to update: Google patches seven Chrome browser bugs, four rated 'high' risk
Two Convicted in Major Drugs Bust After Cops Read Encrypted Chats
Uganda Security Exchange Caught Leaking 32GB of Sensitive Data
Understanding CDSPM: cloud data security posture management
Vulnerabilities in Industrial Control Systems Lets Attackers Remotely Unlock Doors
Yuga Labs Co-founder Warns of Incoming Attack, Says Twitter Insider Involved
12/06
AWS, IBM, Cisco Lead Surging Cybersecurity Market
Chinese-Linked APT Spying On Organizations for 10 Years
Conti's Attack Against Costa Rica Sparks a New Ransomware Era
Cyber security experts raise alarm over possible data breach involving millions of Malaysians
Do not fall for this PAN fraud; HDFC Bank issues alert to customers
Hacker da Vaza-Jato tenta usar o STF para anular condenação
Hello XD ransomware now drops a backdoor while encrypting
How to avoid job scams in the post-pandemic era
Iranian Hackers Spotted Using a new DNS Hijacking Malware in Recent Attacks
Iran's Mullahs Are Losing the Cyber War
Malaysia: Is our personal data security at stake?
Nigerian Police Bust Gang Planning Cyberattacks on 10 Banks
Singapore: At least 415 victims fall prey to parcel delivery phishing scams this year
The 10 Most Important Cybersecurity Statistics You Need to Know
Your browser stores passwords and sensitive data in clear text in memory