top of page

NEWS: Junho (12/06 - 18/06) - 24 Semana de 2022

Cyber Security and Information Security News - Daily Updates !!


Azerbaijan successfully implements measures to ensure cybersecurity

DeadBolt ransomware takes another shot at QNAP storage

DMEA: Cyber attack in investigators' hands

eCh0raix ransomware starts targeting QNAP NAS devices again

Federal cybersecurity bill may be 'Band-Aid on a bigger problem,' Waterloo, Ont., expert says

Global Physical Security Information Management (PSIM) Market 2022 by Major Players List: Tyco international, Intergraph, Genetec, Axxon Soft, Vidsys, etc…

Healthcare Cybersecurity: Some Progress, Still Problems

Heineken, Screwfix and B&Q Father's Day scams spark warning

How crypto-related phishing scams continue to defraud investors

How Tinder scammers steal your heart, then your money

How to Implement a Cybersecurity-First Culture

MaliBot Android Banking Trojan targets Spain and Italy

O que hackers podem fazer com seu endereço se ele vazar? Entenda riscos

Ranchi Dhanbad: Cyber security lessons at BIT Sindri

The Philippines: All about cyber scams

TikTok clears the air about suspected U.S. user data breach by Chinese workers

Top 10 Enterprise Cybersecurity Companies to Know in 2022

Wave of 'Matanbuchus' spam is infecting devices with Cobalt Strike


A Microsoft 365 feature can ransom files on SharePoint and OneDriveCould

Allahabad University's website crashes during exam, cyber attack suspected

Are your legacy systems an open door for cyber attacks?

Atlassian Confluence Server Bug Under Active Attack to Distribute Ransomware

Cadê minha M4? Hackers de Warzone serão desarmados no meio da partida

Chinese Hackers Exploited Sophos Firewall Zero-Day Flaw to Target South Asian Entity

Cisco says it won’t fix zero-day RCE in end-of-life VPN routers

Costa Rica chaos is a warning that the global ransomware threat remains

Criminal IP analysis report on zero-day vulnerability in Atlassian Confluence

Cyber criminals continue to target and exploit people

DeadBolt Ransomware Actively Targets QNAP NAS Devices — Again

Experts Discuss Next Steps in Trust, Privacy and Security

FBI: Crypto Scam on LinkedIn a 'Significant Threat' to Platform, Consumers

Financial data, passwords targeted by novel Android malware

Fraud trends and scam tactics consumers should be aware of

GoDaddy’s Failure to Prevent Attacks – DeFi Projects Urge The Ecosystem to Abandon Centralised Hosting

Hacker instalou o Ubuntu em uma tela do Google Nest Hub de 2ª geração

Hacker invade conta de Maradona, troca foto de perfil e exibe falsa publicação de Elon Musk

How Data Landlords Put Their Tenants at Risk

How financial institutions are improving customer experience with fraud prevention measures

How Florida Businesses Can Protect Against Data Breaches

How to Tell If Someone Accessed Your Google Account

Incident Of The Week: BlackCat ransomware strikes Italian university

Immersive Labs Cyber Team Sim prepares teams for real-life cyber attacks

Interpol anti-fraud operation busts call centers behind business email scams

Is Stopping a Ransomware Attack More Important than Preventing One?

Kenyan authorities arrest student hackers converting stolen money to bitcoin

Main types of cyber attacks in Azerbaijan unveiled

Malaysia: Data breach deja vu

Microsoft: June Windows updates may break Wi-Fi hotspots

NakedPages - A new phishing toolkit available on cybercrime forums

New MaliBot Android Malware Found Stealing Personal, Banking Data

Over a Million WordPress Sites Forcibly Updated to Patch a Critical Plugin Vulnerability

Pakistan: ARY News Twitter account hacked

Phishing Attacks Reached a Record High in the First Quarter of 2022, APWG Report Found

Proofpoint details 'dangerous' ransomware flaw in SharePoint and OneDrive

PSA | QR Code Scams Are Real (What They Are + How to Protect Yourself)

Quer ser um hacker? Nova plataforma oferece ambiente gamificado e desafios

QNAP 'thoroughly investigating' new DeadBolt ransomware attacks

Quebec court approves $200.9M settlement against Desjardins over data breach

Ranked: the 59 cybersecurity unicorns you need to know about

RansomHouse hackers threaten to sell Shoprite data

Ransomware Defense: Preventative Techniques To Combat Attack Methods Of Today’s Cybercriminal Gangs

Rapid7 report examines use of double extortion ransomware attacks

Reimagine Hybrid Work: Same CyberSec in Office and at Home

Researchers Uncover 'Hermit' Android Spyware Used in Kazakhstan, Syria, and Italy

Russian botnet ‘RSOCKS’ dismantled after hacking millions of devices

Russian RSocks botnet disrupted after hacking millions of devices

Selfridges, Wells Fargo, Apple ID, Netflix, and Mercedes-Benz: Top Scams and Phishing Schemes of the Week

Slovakia's defence department faced a large-scale cyber attack

Stakeholders call for collaboration to restore cyber security sanity

Surfshark Finds US is the Most-Breached Country

The future of cyber-security: MFA and beyond

The rise of double extortion ransomware

Think of the Russia-Ukraine conflict as a microcosm of the cyber war

UK Proposes Post-Brexit Data Laws to Boost Innovation

Understanding the global rise of ransomware

University of Pittsburgh Medical Center Settles Data Breach Class Action for $450,000

US Bipartisan Privacy Proposal Has Cybersecurity Mandates

US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes

Vladimir Putin's key speech delayed because of 'massive' cyber attack in Russia

Warning issued over Father’s Day Heineken scam tricking people on WhatsApp

Warning Signs of Data Breaches You Should Know Of

What is cloud security? A guide to cyber security in the cloud for the public sector

Which stolen data are ransomware gangs most likely to disclose?

Why You Need CIS Controls for Effective Cyber Defense

Wilkins Recreational Vehicles, Inc. Reports Data Breach Following Conti Ransomware Attack

WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability


4 Cloud Application Security Best Practices

5-star hotel’s business account hacked, customers lose money

24B Credentials Are Up for Grabs on Darkweb Marketplaces

72% of middle market companies expect to experience a cyberattack

A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage

A Smarter Cyber-Risk Management Strategy

ALPHV/ BlackCat ransomware gang lets victims check if their data has been compromised

Anker Eufy smart home hubs exposed to RCE attacks by critical flaw

Another 1.3M patients added to data breach tally of ransomware attack on Eye Care Leaders

Another group of Indian hackers exposed on decade-long attacks against China

Ataques hacker do tipo DDoS podem destruir e tirar do ar o seu humilde site ou blog

BeanVPN leaks 25 million user reco

BlackCat Extortion Technique: Public Access to Breached Data

BlackCat Ransomware Gang Targeting Unpatched Microsoft Exchange Servers

Business email platform Zimbra patches memcached injection flaw that imperils user credentials

CERT-In law impact on data breaches: India is the 6th most breached country worldwide

College hackers in Kenya are converting stolen money to bitcoin

Corporate Network Access Selling for Under $1000 on Dark Web

Customers sue 365 Data Centers over alleged ransomware which caused outage

Cyber Resiliency: What It Is and How To Build It

Cybersecurity: Twitter littered with thieves that are eyeing your assets

Cybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data

Data breach puts hundreds of Uganda Securities Exchange (USE) investor details at risk

Deepfake attacks expected to be next major threat to businesses

Difference Between Agent-Based and Network-Based Internal Vulnerability Scanning

Facebook Messenger Scam Duped Millions

Global Police Arrest Thousands in Fraud Crackdown

Hacker usa empréstimos relâmpago para roubar bitcoins de protocolo DeFi

Healthcare Providers see 94% hike in ransomware in 2021

High-Severity RCE Vulnerability Reported in Popular Fastjson Library

How social engineering attacks are evolving beyond email

How to Build Cybersecurity Resilience

How To Protect Yourself From Fraudulent App Scams

Human error leading factor in data breaches, Verizon report says

In modern war, we have as much to fear from cyber weapons as kinetics

Latin America governments are prime targets for ransomware due to lack of resources, analysis argues

MetaMask, Phantom warn of flaw that could steal your crypto wallets

Microsoft Office 365 feature can help cloud ransomware attacks

Mounting Data Breaches Cause Huge Encryption Spike

Office 365 Functionality Could Allow Ransomware to Hold Files Stored on SharePoint and OneDrive

NakedPages Phishing Toolkit is Now Available on Cybercrime Forums

Office 365 loophole may give ransomware an easy shot at your files

Operational Technology (OT) Cybersecurity Readiness is Dangerously Behind

Phishing-as-a-Service (PhaaS) Explained

Ransomware attack on Montrose Environmental Group disrupts lab testing services

Ransomware Risk in Healthcare Endangers Patients

Russian Cybercriminals, the Target of Global Authorities

San Diego Family Care Agrees to $1 Million Settlement to Resolve Class Action Data Breach Lawsuit

SeaFlower Backdoor Targets Web3 Wallet Seed-Phrases

South Dakota Health Care System Says Data Breach Affected 700

State-Sponsored Phishing Attack Targeted Israeli Military Officials

Tech Experts Say You Should Never Fall For This One Common Scam–It’s So Dangerous!

The Age Of The Digital Self: What To Look Out For In The Near Future

The challenges of managing increased complexity as hybrid IT accelerates

The future is passwordless. What’s slowing it down?

The Top Five Mistakes Of Underperforming Cybersecurity Teams

This new Android malware bypasses multi-factor authentication to steal your passwords

Zero trust adoption: Industry-specific challenges and implementation strategies

What are the Consequences of a Data Breach?

What Cyberattacks Do Threat Actors Use for Data Leaks?

What is a Cyberattack? Types and Defenses

Why Combating Ransomware Should Top The List Of Insurance Industry Priorities

Why we need philosophy and ethics of cyber warfare

Yuma Regional Medical Center Experiences Ransomware Attack


3 Indications That Your Computer is Being Hacked

A closer look at the SEC Cybersecurity Disclosure rule

A daily conundrum for cyber insurance brokers – but it hasn't always been this way

A new side-channel attack Hertzbleed affects Intel and AMD CPUs

A tiny botnet launched the largest DDoS attack on record

Behavioral Wellness Department reports medical data breach

BNPL Fraud Alert as Account Takeovers Surge

Cisco Secure Email bug can let attackers bypass authentication

Citrix warns critical bug can let attackers reset admin passwords

Class Action Lawsuit Filed Against Shields Health Care Group Over 2 Million-Record Data Breach

Cloud computing top concerns: The focus is shifting

Cloudflare Thwarted Largest Ever HTTPS DDoS Attack

Comprehensive, Easy Cybersecurity for Lean IT Security Teams Starts with XDR

Cyber attack: Council fixes issue preventing people from moving home in Gloucester

Cyber Threats Target US Election Officials With Phishing Campaign

Cybersecurity in the Pacific: how island nations are building their online defences

Cybersecurity Professionals Identify Top Cloud Computing Security Risks

Data breach at US ambulance billing service Comstar exposed patients’ healthcare information

Don't use these passwords: These are the 10 logins most regularly found for sale online

DragonForce Gang Unleash Hacks Against Govt. of India

Education sector in need of greater cybersecurity

Elasticsearch Database Mess Up Exposed Login, PII Data of 30,000 Students

Energy sector cybersecurity still a growing priority

Enterprise Strategy Group Research Finds Businesses Have Mission-critical Gaps in the Fight Against Ransomware

Federal Trade Commission (FTC) Blames Meta for Over Half of all Social Media Crypto Scams

Firefox: Our new cookie protection will stop companies tracking you across sites

Got hit by a cyberattack? Hackers will probably come after you again - within a year

Government signs cybersecurity agreement with Microsoft

Hackers exploit three-year-old Telerik flaws to deploy Cobalt Strike

Heineken warns customers over WhatsApp Father's Day 'competition' scam

How confident are IT pros in the security of their organization’s supply chain?

How obfuscation can help with data breach mitigation

Identity and Access: The Game is the Same, But Fiercer

In Cybersecurity, What You Can’t See Can Hurt You

Insta-scam: how scammers are targeting younger users online

Interpol seizes $50 million, arrests 2000 social engineers

Iranian Hackers Targeted Former US Ambassador, Israeli Officials: REPORT

MaliBot: A New Android Banking Trojan Spotted in the Wild

Microsoft's Final Patch Tuesday Fixes Follina Bug

Mind the gap: How to ensure your vulnerability detection methods are up to scratch

Need of a Geospatial Approach to Cybersecurity

New Hertzbleed Side-Channel Attack Affects All Modern AMD and Intel CPUs

New peer-to-peer botnet infects Linux servers with cryptominers

New VIP3R Campaign Highlights the Dangers of Spearphishing

Oregon luxury resort hit by unusual cyberattack; employee data, guest names posted on public internet

Organizations are Concerned that Digital Attack Surface is Spiralling Out of Control

Phishing for cryptocurrency continues to rise

Phishing in the Metaverse: The New Reality of Brand Protection

Phishing reaches all-time high in early 2022

Privacy Watchdog Boosts Legal Funds by Keeping Millions in Fines

Ransomware gang publishes stolen victim data on the public Internet

Shields Healthcare Provider Suffered A Data Breach That Exposed Personal Health Information of 2 Million Patients

The rise of phishing as a service (PhaaS) and how to tackle it

The unrelenting threat of ransomware is pushing cybersecurity workers to quit

Thousands of GitHub, AWS, Docker tokens exposed in Travis CI logs

Travel-related Cybercrime Takes Off as Industry Rebounds

Unpatched Exchange server, stolen RDP logins... How miscreants get BlackCat ransomware on your network

Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar

Why Ransomware Extortion is a Threat


8 Outside Threats to Protect Your Business From: How to Secure Your Company

Admin of DDoS-For-Hire Service “DownThem” Gets 2 Years Prison Sentence

API Security Best Practices

Are Phishing Attacks Targeting Crypto on the Rise?

Attacks on Cloud Service Providers Down 25% During First 4 Months of 2022

Attack on Kaiser Permanente Exposes Data on 70,000 Customers

Avera Health Data Breach Affects 700 Patients

Brazil's data protection authority to gain independence from presidential office

Chima Opara weighs in on AI Bias, Cyber Security

Cloud computing means big opportunities - and big threats

Cloudflare mitigates record-breaking HTTPS DDoS attack

Cloudflare Saw Record-Breaking DDoS Attack Peaking at 26 Million Request Per Second

Companies can improve cybersecurity posture with better security training

Conversão da ANPD em autarquia pode garantir viabilidade jurídica da LGPD

Crypto has another problem – scammers will stop at nothing to steal digital currency

CSIRO’s Support to SMEs Working in Cyber Security

Cyber security: a race against time

Cybercriminals are impersonating your boss—here’s how to tell

Deep Web Vs. Dark Web: Differences, Legality and Security

Experts spotted Syslogk, a Linux rootkit under development

Experts Warn on The Dangers of QR Codes, Say They May Target Your Vital Information

Hacker Advertises ‘Crappy’ Ransomware on Instagram

HelloXD Ransomware Variants Found Installing Backdoor on Windows and Linux Machines

India 5th on breached users' global list: Report

Iran says cyber threats against it are rising - analysis

Iran Spear-Phishers Hijack Email Conversations in New Campaign

Kaiser Permanente Exposes Nearly 70K Medical Records in Data Breach

Linux Malware Deemed ‘Nearly Impossible’ to Detect

LockBit Ransomware Compromise of Mandiant Not Supported by Any Evidence, May Be a PR Move by Cybercrime Gang

Malicious Android apps collect personal financial information from users, according to MyCERT

Microsoft patches actively exploited Follina Windows zero-day

Microsoft: Ransomware gangs are using unpatched Exchange servers to gain access, so get updating

More than 90% of cyber attacks made possible by human error

New Aadhaar data leak exposes 11 crore Indian farmers’ sensitive info

New Syslogk Linux Rootkit Lets Attackers Remotely Command It Using "Magic Packets"

New Zimbra Email Vulnerability Could Let Attackers Steal Your Login Credentials

Numrich Gun Parts Corporation Announces Data Breach

Nupur Sharma Row: Int’l hackers fire cyber attack on India against Nupur Sharma’s remark

Once is never enough: The need for continuous penetration testing

Only 10% of vulnerabilities are remediated each month

Only More Secure Coding Can Protect the Software Supply Chain

Os 5 métodos de ataque cibernético em que você precisa ficar de olho

Over Three-Quarters of UK Adults Hit by Online Scams

Owner of ‘DownThem’ DDoS service gets 2 years in prison

Paid a ransom? The crims will be back for more

Ransomware Attackers Claim 98 percent of Payments in Bitcoin

Ransomware attacks are increasing with more dangerous hybrids ahead

Ransomware attacks on healthcare organisations up 94% in 2021: Sophos

Reasons To Choose Career In Cybersecurity

Researchers Detail PureCrypter Loader Cyber Criminals Using to Distribute Malware

SA government departments are vulnerable to cyber attack

Saas security: How to avoid “death by 1000 apps”

San Diego Family Care data breach $1M class action settlement

Santa Barbara County Behavioral Wellness experiences data breach in medical records

SeaFlower campaign distributes backdoored versions of Web3 wallets to steal seed phrases

Six ways to tell if you have been hacked

South Africans seeing emails about 'mandatory training' for monkeypox prevention – it's a scam

Strong passwords still a priority strategy for enterprises

Technical Details Released for 'SynLapse' RCE Vulnerability Reported in Microsoft Azure

Teixeira: Chefe de Gabinete da prefeitura é vítima de crime cibernético; Polícia investiga o caso

The unrelenting threat of ransomware is pushing cybersecurity workers to quit

This new Linux malware has a sneaky way of staying hidden

Unpatched Travis CI API Bug Exposes Thousands of Secret User Access Tokens

Urgent warning: ALDI shoppers urged to be wary of new cheap LG television scam

Using compliance to create value for your organization

Vulnerability management mistakes CISOs still make

Warning to WhatsApp users over Heineken scam offering 'free beer' for Father's Day

Well-Constructed And Well-Defended: Countering Modern Attack Patterns

What Is a Secure Web Gateway (SWG) for the Cloud?

Why EVs are a vulnerability in automotive cybersecurity

Why do organizations need to prioritize ransomware preparedness?

With 13.4% CAGR, Global Cyber Security Market Size to Surpass USD 376.32 Billion in 2029


7 Tips to protect yourself from online banking fraud

19 Ways to Vet Your MSP for Cybersecurity Best Practices

45% of cybersecurity pros are considering quitting the industry due to stress

700,000 Patients Affected by Yuma Regional Medical Center Ransomware Attack

Accenture’s Boland Lithebe on the rising cybersecurity threat

API security warrants its own specific solution

Bangladesh has the lowest data breach density in Asia: studies

Businesses are leaving bot attacks unchallenged for almost four months

Chinese 'Gallium' Hackers Using New PingPull Malware in Cyberespionage Attacks

Chinese Hackers Distribute Backdoored Web3 Wallets for iOS and Android Users

ConnectWise reveals cybersecurity updates and partnerships

CyberCube report addresses criminal cyber threat actors

Data breach: Patriot demands accountability from govt

Eight Zero Days Could Open Doors for Hackers

ESET Threat Report details cyberattacks with links to Ukraine-Russia war

Ethical Hacking: Understanding the Basics

Europe’s new NIS2 cybersecurity directive covers more sectors, increases accountability

Exabeam Cybersecurity Scholarship Program 2022 for College Women nos EUA (até US$ 10.000)

Febraban cria laboratório que simula ataque cibernético para conter fraudes

Gallium hackers backdoor finance, govt orgs using new PingPull malware

Googler Suspended After Claiming AI Became Sentient

Hackers clone Coinbase, MetaMask mobile wallets to steal your crypto

HelloXD Ransomware Installing Backdoor on Targeted Windows and Linux Systems

How ‘Make-in-India’ cybersecurity startups are emerging in the global space

How organizations can protect themselves in the emerging risk landscape

Increased cloud complexity needs stronger cybersecurity

Kaiser Permanente data breach exposes health data of 69K people

Managing Cybersecurity in the Workplace

Metasploit 6.2.0 comes with 138 new modules, 148 enhancements and features

Microsoft: Exchange servers hacked to deploy BlackCat ransomware

Microsoft helps prevent lateral movement from compromised unmanaged devices

Mobile malware attacks in Singapore drops 15.9% in 2021

New Syslogk Linux rootkit uses magic packets to trigger backdoor

Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy

Public getting fed up with never ending data leaks

Quick and Simple: BPFDoor Explained

Researchers Disclose Rooting Backdoor in Mitel IP Phones for Businesses

RSAC: The Cybersecurity Maturity Model Certification Program is Coming

RSAC: World Economic Forum Cybercrime Atlas Effort Advances

Russian hackers start targeting Ukraine with Follina exploits

Schneider Electric debunks cybersecurity misconception

SentinelLabs uncovers decade-long cyber espionage operations by a Chinese threat group

Seven tech security trends heading your way now

Shoprite’s “possible data compromise” nothing else but data breach — legal expert

State-sponsored Chinese threat actors compromise telecom and network service providers

The Importance of Information Security in Today’s World

Threat actors becoming more creative exploiting the human factor

Time to update: Google patches seven Chrome browser bugs, four rated 'high' risk

Two Convicted in Major Drugs Bust After Cops Read Encrypted Chats

Uganda Security Exchange Caught Leaking 32GB of Sensitive Data

Understanding CDSPM: cloud data security posture management

Vulnerabilities in Industrial Control Systems Lets Attackers Remotely Unlock Doors

Yuga Labs Co-founder Warns of Incoming Attack, Says Twitter Insider Involved


AWS, IBM, Cisco Lead Surging Cybersecurity Market

Chinese-Linked APT Spying On Organizations for 10 Years

Conti's Attack Against Costa Rica Sparks a New Ransomware Era

Cyber security experts raise alarm over possible data breach involving millions of Malaysians

Do not fall for this PAN fraud; HDFC Bank issues alert to customers

Hacker da Vaza-Jato tenta usar o STF para anular condenação

Hello XD ransomware now drops a backdoor while encrypting

How to avoid job scams in the post-pandemic era

Iranian Hackers Spotted Using a new DNS Hijacking Malware in Recent Attacks

Iran's Mullahs Are Losing the Cyber War

Malaysia: Is our personal data security at stake?

Nigerian Police Bust Gang Planning Cyberattacks on 10 Banks

Singapore: At least 415 victims fall prey to parcel delivery phishing scams this year

The 10 Most Important Cybersecurity Statistics You Need to Know

The Great Phishing Fail

Your browser stores passwords and sensitive data in clear text in memory

Yuga Labs and Bored Ape Yacht Club (BAYC) Co-Founder Raises the Alarm on Possible Attack on the Projects’ Social Media Accounts, Especially Twitter

NEWS: Junho (05/06 - 11/06) - 23 Semana de 2022

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.


Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page