top of page

NEWS: Junho (12/06 - 18/06) - 24 Semana de 2022

Cyber Security and Information Security News - Daily Updates !!

18/06


Azerbaijan successfully implements measures to ensure cybersecurity


DeadBolt ransomware takes another shot at QNAP storage


DMEA: Cyber attack in investigators' hands


eCh0raix ransomware starts targeting QNAP NAS devices again


Federal cybersecurity bill may be 'Band-Aid on a bigger problem,' Waterloo, Ont., expert says


Global Physical Security Information Management (PSIM) Market 2022 by Major Players List: Tyco international, Intergraph, Genetec, Axxon Soft, Vidsys, etc…


Healthcare Cybersecurity: Some Progress, Still Problems


Heineken, Screwfix and B&Q Father's Day scams spark warning


How crypto-related phishing scams continue to defraud investors


How Tinder scammers steal your heart, then your money


How to Implement a Cybersecurity-First Culture


MaliBot Android Banking Trojan targets Spain and Italy


O que hackers podem fazer com seu endereço se ele vazar? Entenda riscos


Ranchi Dhanbad: Cyber security lessons at BIT Sindri


The Philippines: All about cyber scams


TikTok clears the air about suspected U.S. user data breach by Chinese workers


Top 10 Enterprise Cybersecurity Companies to Know in 2022


Wave of 'Matanbuchus' spam is infecting devices with Cobalt Strike


17/06


A Microsoft 365 feature can ransom files on SharePoint and OneDriveCould


Allahabad University's website crashes during exam, cyber attack suspected


Are your legacy systems an open door for cyber attacks?


Atlassian Confluence Server Bug Under Active Attack to Distribute Ransomware


Cadê minha M4? Hackers de Warzone serão desarmados no meio da partida


Chinese Hackers Exploited Sophos Firewall Zero-Day Flaw to Target South Asian Entity


Cisco says it won’t fix zero-day RCE in end-of-life VPN routers


Costa Rica chaos is a warning that the global ransomware threat remains


Criminal IP analysis report on zero-day vulnerability in Atlassian Confluence


Cyber criminals continue to target and exploit people


DeadBolt Ransomware Actively Targets QNAP NAS Devices — Again


Experts Discuss Next Steps in Trust, Privacy and Security


FBI: Crypto Scam on LinkedIn a 'Significant Threat' to Platform, Consumers


Financial data, passwords targeted by novel Android malware


Fraud trends and scam tactics consumers should be aware of


GoDaddy’s Failure to Prevent Attacks – DeFi Projects Urge The Ecosystem to Abandon Centralised Hosting


Hacker instalou o Ubuntu em uma tela do Google Nest Hub de 2ª geração


Hacker invade conta de Maradona, troca foto de perfil e exibe falsa publicação de Elon Musk


How Data Landlords Put Their Tenants at Risk


How financial institutions are improving customer experience with fraud prevention measures


How Florida Businesses Can Protect Against Data Breaches


How to Tell If Someone Accessed Your Google Account


Incident Of The Week: BlackCat ransomware strikes Italian university


Immersive Labs Cyber Team Sim prepares teams for real-life cyber attacks


Interpol anti-fraud operation busts call centers behind business email scams


Is Stopping a Ransomware Attack More Important than Preventing One?


Kenyan authorities arrest student hackers converting stolen money to bitcoin


Main types of cyber attacks in Azerbaijan unveiled


Malaysia: Data breach deja vu


Microsoft: June Windows updates may break Wi-Fi hotspots


NakedPages - A new phishing toolkit available on cybercrime forums


New MaliBot Android Malware Found Stealing Personal, Banking Data


Over a Million WordPress Sites Forcibly Updated to Patch a Critical Plugin Vulnerability


Pakistan: ARY News Twitter account hacked


Phishing Attacks Reached a Record High in the First Quarter of 2022, APWG Report Found


Proofpoint details 'dangerous' ransomware flaw in SharePoint and OneDrive


PSA | QR Code Scams Are Real (What They Are + How to Protect Yourself)


Quer ser um hacker? Nova plataforma oferece ambiente gamificado e desafios


QNAP 'thoroughly investigating' new DeadBolt ransomware attacks


Quebec court approves $200.9M settlement against Desjardins over data breach


Ranked: the 59 cybersecurity unicorns you need to know about


RansomHouse hackers threaten to sell Shoprite data


Ransomware Defense: Preventative Techniques To Combat Attack Methods Of Today’s Cybercriminal Gangs


Rapid7 report examines use of double extortion ransomware attacks


Reimagine Hybrid Work: Same CyberSec in Office and at Home


Researchers Uncover 'Hermit' Android Spyware Used in Kazakhstan, Syria, and Italy


Russian botnet ‘RSOCKS’ dismantled after hacking millions of devices


Russian RSocks botnet disrupted after hacking millions of devices


Selfridges, Wells Fargo, Apple ID, Netflix, and Mercedes-Benz: Top Scams and Phishing Schemes of the Week


Slovakia's defence department faced a large-scale cyber attack


Stakeholders call for collaboration to restore cyber security sanity


Surfshark Finds US is the Most-Breached Country


The future of cyber-security: MFA and beyond


The rise of double extortion ransomware


Think of the Russia-Ukraine conflict as a microcosm of the cyber war


UK Proposes Post-Brexit Data Laws to Boost Innovation


Understanding the global rise of ransomware


University of Pittsburgh Medical Center Settles Data Breach Class Action for $450,000


US Bipartisan Privacy Proposal Has Cybersecurity Mandates


US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes


Vladimir Putin's key speech delayed because of 'massive' cyber attack in Russia


Warning issued over Father’s Day Heineken scam tricking people on WhatsApp


Warning Signs of Data Breaches You Should Know Of


What is cloud security? A guide to cyber security in the cloud for the public sector


Which stolen data are ransomware gangs most likely to disclose?


Why You Need CIS Controls for Effective Cyber Defense


Wilkins Recreational Vehicles, Inc. Reports Data Breach Following Conti Ransomware Attack


WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability


16/06


4 Cloud Application Security Best Practices


5-star hotel’s business account hacked, customers lose money


24B Credentials Are Up for Grabs on Darkweb Marketplaces


72% of middle market companies expect to experience a cyberattack


A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage


A Smarter Cyber-Risk Management Strategy


ALPHV/ BlackCat ransomware gang lets victims check if their data has been compromised


Anker Eufy smart home hubs exposed to RCE attacks by critical flaw


Another 1.3M patients added to data breach tally of ransomware attack on Eye Care Leaders


Another group of Indian hackers exposed on decade-long attacks against China


Ataques hacker do tipo DDoS podem destruir e tirar do ar o seu humilde site ou blog


BeanVPN leaks 25 million user reco


BlackCat Extortion Technique: Public Access to Breached Data


BlackCat Ransomware Gang Targeting Unpatched Microsoft Exchange Servers


Business email platform Zimbra patches memcached injection flaw that imperils user credentials


CERT-In law impact on data breaches: India is the 6th most breached country worldwide


College hackers in Kenya are converting stolen money to bitcoin


Corporate Network Access Selling for Under $1000 on Dark Web


Customers sue 365 Data Centers over alleged ransomware which caused outage


Cyber Resiliency: What It Is and How To Build It


Cybersecurity: Twitter littered with thieves that are eyeing your assets


Cybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data


Data breach puts hundreds of Uganda Securities Exchange (USE) investor details at risk


Deepfake attacks expected to be next major threat to businesses


Difference Between Agent-Based and Network-Based Internal Vulnerability Scanning


Facebook Messenger Scam Duped Millions


Global Police Arrest Thousands in Fraud Crackdown


Hacker usa empréstimos relâmpago para roubar bitcoins de protocolo DeFi


Healthcare Providers see 94% hike in ransomware in 2021


High-Severity RCE Vulnerability Reported in Popular Fastjson Library


How social engineering attacks are evolving beyond email


How to Build Cybersecurity Resilience


How To Protect Yourself From Fraudulent App Scams


Human error leading factor in data breaches, Verizon report says


In modern war, we have as much to fear from cyber weapons as kinetics


Latin America governments are prime targets for ransomware due to lack of resources, analysis argues


MetaMask, Phantom warn of flaw that could steal your crypto wallets


Microsoft Office 365 feature can help cloud ransomware attacks


Mounting Data Breaches Cause Huge Encryption Spike


Office 365 Functionality Could Allow Ransomware to Hold Files Stored on SharePoint and OneDrive


NakedPages Phishing Toolkit is Now Available on Cybercrime Forums


Office 365 loophole may give ransomware an easy shot at your files


Operational Technology (OT) Cybersecurity Readiness is Dangerously Behind


Phishing-as-a-Service (PhaaS) Explained


Ransomware attack on Montrose Environmental Group disrupts lab testing services


Ransomware Risk in Healthcare Endangers Patients


Russian Cybercriminals, the Target of Global Authorities


San Diego Family Care Agrees to $1 Million Settlement to Resolve Class Action Data Breach Lawsuit


SeaFlower Backdoor Targets Web3 Wallet Seed-Phrases


South Dakota Health Care System Says Data Breach Affected 700


State-Sponsored Phishing Attack Targeted Israeli Military Officials


Tech Experts Say You Should Never Fall For This One Common Scam–It’s So Dangerous!


The Age Of The Digital Self: What To Look Out For In The Near Future


The challenges of managing increased complexity as hybrid IT accelerates


The future is passwordless. What’s slowing it down?


The Top Five Mistakes Of Underperforming Cybersecurity Teams


This new Android malware bypasses multi-factor authentication to steal your passwords


Zero trust adoption: Industry-specific challenges and implementation strategies


What are the Consequences of a Data Breach?


What Cyberattacks Do Threat Actors Use for Data Leaks?


What is a Cyberattack? Types and Defenses


Why Combating Ransomware Should Top The List Of Insurance Industry Priorities


Why we need philosophy and ethics of cyber warfare


Yuma Regional Medical Center Experiences Ransomware Attack


15/06


3 Indications That Your Computer is Being Hacked


A closer look at the SEC Cybersecurity Disclosure rule


A daily conundrum for cyber insurance brokers – but it hasn't always been this way


A new side-channel attack Hertzbleed affects Intel and AMD CPUs


A tiny botnet launched the largest DDoS attack on record


Behavioral Wellness Department reports medical data breach


BNPL Fraud Alert as Account Takeovers Surge


Cisco Secure Email bug can let attackers bypass authentication


Citrix warns critical bug can let attackers reset admin passwords


Class Action Lawsuit Filed Against Shields Health Care Group Over 2 Million-Record Data Breach


Cloud computing top concerns: The focus is shifting


Cloudflare Thwarted Largest Ever HTTPS DDoS Attack


Comprehensive, Easy Cybersecurity for Lean IT Security Teams Starts with XDR


Cyber attack: Council fixes issue preventing people from moving home in Gloucester


Cyber Threats Target US Election Officials With Phishing Campaign


Cybersecurity in the Pacific: how island nations are building their online defences


Cybersecurity Professionals Identify Top Cloud Computing Security Risks


Data breach at US ambulance billing service Comstar exposed patients’ healthcare information


Don't use these passwords: These are the 10 logins most regularly found for sale online


DragonForce Gang Unleash Hacks Against Govt. of India


Education sector in need of greater cybersecurity


Elasticsearch Database Mess Up Exposed Login, PII Data of 30,000 Students


Energy sector cybersecurity still a growing priority


Enterprise Strategy Group Research Finds Businesses Have Mission-critical Gaps in the Fight Against Ransomware


Federal Trade Commission (FTC) Blames Meta for Over Half of all Social Media Crypto Scams


Firefox: Our new cookie protection will stop companies tracking you across sites


Got hit by a cyberattack? Hackers will probably come after you again - within a year


Government signs cybersecurity agreement with Microsoft


Hackers exploit three-year-old Telerik flaws to deploy Cobalt Strike


Heineken warns customers over WhatsApp Father's Day 'competition' scam


How confident are IT pros in the security of their organization’s supply chain?


How obfuscation can help with data breach mitigation


Identity and Access: The Game is the Same, But Fiercer


In Cybersecurity, What You Can’t See Can Hurt You


Insta-scam: how scammers are targeting younger users online


Interpol seizes $50 million, arrests 2000 social engineers


Iranian Hackers Targeted Former US Ambassador, Israeli Officials: REPORT


MaliBot: A New Android Banking Trojan Spotted in the Wild


Microsoft's Final Patch Tuesday Fixes Follina Bug


Mind the gap: How to ensure your vulnerability detection methods are up to scratch


Need of a Geospatial Approach to Cybersecurity


New Hertzbleed Side-Channel Attack Affects All Modern AMD and Intel CPUs


New peer-to-peer botnet infects Linux servers with cryptominers


New VIP3R Campaign Highlights the Dangers of Spearphishing


Oregon luxury resort hit by unusual cyberattack; employee data, guest names posted on public internet


Organizations are Concerned that Digital Attack Surface is Spiralling Out of Control


Phishing for cryptocurrency continues to rise


Phishing in the Metaverse: The New Reality of Brand Protection


Phishing reaches all-time high in early 2022


Privacy Watchdog Boosts Legal Funds by Keeping Millions in Fines


Ransomware gang publishes stolen victim data on the public Internet


Shields Healthcare Provider Suffered A Data Breach That Exposed Personal Health Information of 2 Million Patients


The rise of phishing as a service (PhaaS) and how to tackle it


The unrelenting threat of ransomware is pushing cybersecurity workers to quit


Thousands of GitHub, AWS, Docker tokens exposed in Travis CI logs


Travel-related Cybercrime Takes Off as Industry Rebounds


Unpatched Exchange server, stolen RDP logins... How miscreants get BlackCat ransomware on your network


Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar


Why Ransomware Extortion is a Threat


14/06


8 Outside Threats to Protect Your Business From: How to Secure Your Company


Admin of DDoS-For-Hire Service “DownThem” Gets 2 Years Prison Sentence


API Security Best Practices


Are Phishing Attacks Targeting Crypto on the Rise?


Attacks on Cloud Service Providers Down 25% During First 4 Months of 2022


Attack on Kaiser Permanente Exposes Data on 70,000 Customers


Avera Health Data Breach Affects 700 Patients


Brazil's data protection authority to gain independence from presidential office


Chima Opara weighs in on AI Bias, Cyber Security


Cloud computing means big opportunities - and big threats


Cloudflare mitigates record-breaking HTTPS DDoS attack


Cloudflare Saw Record-Breaking DDoS Attack Peaking at 26 Million Request Per Second


Companies can improve cybersecurity posture with better security training


Conversão da ANPD em autarquia pode garantir viabilidade jurídica da LGPD


Crypto has another problem – scammers will stop at nothing to steal digital currency


CSIRO’s Support to SMEs Working in Cyber Security


Cyber security: a race against time


Cybercriminals are impersonating your boss—here’s how to tell


Deep Web Vs. Dark Web: Differences, Legality and Security


Experts spotted Syslogk, a Linux rootkit under development


Experts Warn on The Dangers of QR Codes, Say They May Target Your Vital Information


Hacker Advertises ‘Crappy’ Ransomware on Instagram


HelloXD Ransomware Variants Found Installing Backdoor on Windows and Linux Machines


India 5th on breached users' global list: Report


Iran says cyber threats against it are rising - analysis


Iran Spear-Phishers Hijack Email Conversations in New Campaign


Kaiser Permanente Exposes Nearly 70K Medical Records in Data Breach


Linux Malware Deemed ‘Nearly Impossible’ to Detect


LockBit Ransomware Compromise of Mandiant Not Supported by Any Evidence, May Be a PR Move by Cybercrime Gang


Malicious Android apps collect personal financial information from users, according to MyCERT


Microsoft patches actively exploited Follina Windows zero-day


Microsoft: Ransomware gangs are using unpatched Exchange servers to gain access, so get updating


More than 90% of cyber attacks made possible by human error


New Aadhaar data leak exposes 11 crore Indian farmers’ sensitive info


New Syslogk Linux Rootkit Lets Attackers Remotely Command It Using "Magic Packets"


New Zimbra Email Vulnerability Could Let Attackers Steal Your Login Credentials


Numrich Gun Parts Corporation Announces Data Breach


Nupur Sharma Row: Int’l hackers fire cyber attack on India against Nupur Sharma’s remark


Once is never enough: The need for continuous penetration testing


Only 10% of vulnerabilities are remediated each month


Only More Secure Coding Can Protect the Software Supply Chain


Os 5 métodos de ataque cibernético em que você precisa ficar de olho


Over Three-Quarters of UK Adults Hit by Online Scams


Owner of ‘DownThem’ DDoS service gets 2 years in prison


Paid a ransom? The crims will be back for more


Ransomware Attackers Claim 98 percent of Payments in Bitcoin


Ransomware attacks are increasing with more dangerous hybrids ahead


Ransomware attacks on healthcare organisations up 94% in 2021: Sophos


Reasons To Choose Career In Cybersecurity


Researchers Detail PureCrypter Loader Cyber Criminals Using to Distribute Malware


SA government departments are vulnerable to cyber attack


Saas security: How to avoid “death by 1000 apps”


San Diego Family Care data breach $1M class action settlement


Santa Barbara County Behavioral Wellness experiences data breach in medical records


SeaFlower campaign distributes backdoored versions of Web3 wallets to steal seed phrases


Six ways to tell if you have been hacked


South Africans seeing emails about 'mandatory training' for monkeypox prevention – it's a scam


Strong passwords still a priority strategy for enterprises


Technical Details Released for 'SynLapse' RCE Vulnerability Reported in Microsoft Azure


Teixeira: Chefe de Gabinete da prefeitura é vítima de crime cibernético; Polícia investiga o caso


The unrelenting threat of ransomware is pushing cybersecurity workers to quit


This new Linux malware has a sneaky way of staying hidden


Unpatched Travis CI API Bug Exposes Thousands of Secret User Access Tokens


Urgent warning: ALDI shoppers urged to be wary of new cheap LG television scam


Using compliance to create value for your organization


Vulnerability management mistakes CISOs still make


Warning to WhatsApp users over Heineken scam offering 'free beer' for Father's Day


Well-Constructed And Well-Defended: Countering Modern Attack Patterns


What Is a Secure Web Gateway (SWG) for the Cloud?


Why EVs are a vulnerability in automotive cybersecurity


Why do organizations need to prioritize ransomware preparedness?


With 13.4% CAGR, Global Cyber Security Market Size to Surpass USD 376.32 Billion in 2029


13/06


7 Tips to protect yourself from online banking fraud


19 Ways to Vet Your MSP for Cybersecurity Best Practices


45% of cybersecurity pros are considering quitting the industry due to stress


700,000 Patients Affected by Yuma Regional Medical Center Ransomware Attack


Accenture’s Boland Lithebe on the rising cybersecurity threat


API security warrants its own specific solution


Bangladesh has the lowest data breach density in Asia: studies


Businesses are leaving bot attacks unchallenged for almost four months


Chinese 'Gallium' Hackers Using New PingPull Malware in Cyberespionage Attacks


Chinese Hackers Distribute Backdoored Web3 Wallets for iOS and Android Users


ConnectWise reveals cybersecurity updates and partnerships


CyberCube report addresses criminal cyber threat actors


Data breach: Patriot demands accountability from govt


Eight Zero Days Could Open Doors for Hackers


ESET Threat Report details cyberattacks with links to Ukraine-Russia war


Ethical Hacking: Understanding the Basics


Europe’s new NIS2 cybersecurity directive covers more sectors, increases accountability


Exabeam Cybersecurity Scholarship Program 2022 for College Women nos EUA (até US$ 10.000)


Febraban cria laboratório que simula ataque cibernético para conter fraudes


Gallium hackers backdoor finance, govt orgs using new PingPull malware


Googler Suspended After Claiming AI Became Sentient


Hackers clone Coinbase, MetaMask mobile wallets to steal your crypto


HelloXD Ransomware Installing Backdoor on Targeted Windows and Linux Systems


How ‘Make-in-India’ cybersecurity startups are emerging in the global space


How organizations can protect themselves in the emerging risk landscape


Increased cloud complexity needs stronger cybersecurity


Kaiser Permanente data breach exposes health data of 69K people


Managing Cybersecurity in the Workplace


Metasploit 6.2.0 comes with 138 new modules, 148 enhancements and features


Microsoft: Exchange servers hacked to deploy BlackCat ransomware


Microsoft helps prevent lateral movement from compromised unmanaged devices


Mobile malware attacks in Singapore drops 15.9% in 2021


New Syslogk Linux rootkit uses magic packets to trigger backdoor


Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy


Public getting fed up with never ending data leaks


Quick and Simple: BPFDoor Explained


Researchers Disclose Rooting Backdoor in Mitel IP Phones for Businesses


RSAC: The Cybersecurity Maturity Model Certification Program is Coming


RSAC: World Economic Forum Cybercrime Atlas Effort Advances


Russian hackers start targeting Ukraine with Follina exploits


Schneider Electric debunks cybersecurity misconception


SentinelLabs uncovers decade-long cyber espionage operations by a Chinese threat group


Seven tech security trends heading your way now


Shoprite’s “possible data compromise” nothing else but data breach — legal expert


State-sponsored Chinese threat actors compromise telecom and network service providers


The Importance of Information Security in Today’s World


Threat actors becoming more creative exploiting the human factor


Time to update: Google patches seven Chrome browser bugs, four rated 'high' risk


Two Convicted in Major Drugs Bust After Cops Read Encrypted Chats


Uganda Security Exchange Caught Leaking 32GB of Sensitive Data


Understanding CDSPM: cloud data security posture management


Vulnerabilities in Industrial Control Systems Lets Attackers Remotely Unlock Doors


Yuga Labs Co-founder Warns of Incoming Attack, Says Twitter Insider Involved


12/06


AWS, IBM, Cisco Lead Surging Cybersecurity Market


Chinese-Linked APT Spying On Organizations for 10 Years


Conti's Attack Against Costa Rica Sparks a New Ransomware Era


Cyber security experts raise alarm over possible data breach involving millions of Malaysians


Do not fall for this PAN fraud; HDFC Bank issues alert to customers


Hacker da Vaza-Jato tenta usar o STF para anular condenação


Hello XD ransomware now drops a backdoor while encrypting


How to avoid job scams in the post-pandemic era


Iranian Hackers Spotted Using a new DNS Hijacking Malware in Recent Attacks


Iran's Mullahs Are Losing the Cyber War


Malaysia: Is our personal data security at stake?


Nigerian Police Bust Gang Planning Cyberattacks on 10 Banks


Singapore: At least 415 victims fall prey to parcel delivery phishing scams this year


The 10 Most Important Cybersecurity Statistics You Need to Know


The Great Phishing Fail


Your browser stores passwords and sensitive data in clear text in memory


Yuga Labs and Bored Ape Yacht Club (BAYC) Co-Founder Raises the Alarm on Possible Attack on the Projects’ Social Media Accounts, Especially Twitter



NEWS: Junho (05/06 - 11/06) - 23 Semana de 2022

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.

 

Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page