top of page

NEWS: Junho (12/06 - 18/06) - 24 Semana de 2022

Cyber Security and Information Security News - Daily Updates !!


Azerbaijan successfully implements measures to ensure cybersecurity

DeadBolt ransomware takes another shot at QNAP storage

DMEA: Cyber attack in investigators' hands

eCh0raix ransomware starts targeting QNAP NAS devices again

Federal cybersecurity bill may be 'Band-Aid on a bigger problem,' Waterloo, Ont., expert says

Global Physical Security Information Management (PSIM) Market 2022 by Major Players List: Tyco international, Intergraph, Genetec, Axxon Soft, Vidsys, etc…

Healthcare Cybersecurity: Some Progress, Still Problems

Heineken, Screwfix and B&Q Father's Day scams spark warning

How crypto-related phishing scams continue to defraud investors

How Tinder scammers steal your heart, then your money

How to Implement a Cybersecurity-First Culture

MaliBot Android Banking Trojan targets Spain and Italy

O que hackers podem fazer com seu endereço se ele vazar? Entenda riscos

Ranchi Dhanbad: Cyber security lessons at BIT Sindri

The Philippines: All about cyber scams

TikTok clears the air about suspected U.S. user data breach by Chinese workers

Top 10 Enterprise Cybersecurity Companies to Know in 2022

Wave of 'Matanbuchus' spam is infecting devices with Cobalt Strike


A Microsoft 365 feature can ransom files on SharePoint and OneDriveCould

Allahabad University's website crashes during exam, cyber attack suspected

Are your legacy systems an open door for cyber attacks?

Atlassian Confluence Server Bug Under Active Attack to Distribute Ransomware

Cadê minha M4? Hackers de Warzone serão desarmados no meio da partida

Chinese Hackers Exploited Sophos Firewall Zero-Day Flaw to Target South Asian Entity

Cisco says it won’t fix zero-day RCE in end-of-life VPN routers

Costa Rica chaos is a warning that the global ransomware threat remains

Criminal IP analysis report on zero-day vulnerability in Atlassian Confluence

Cyber criminals continue to target and exploit people

DeadBolt Ransomware Actively Targets QNAP NAS Devices — Again

Experts Discuss Next Steps in Trust, Privacy and Security

FBI: Crypto Scam on LinkedIn a 'Significant Threat' to Platform, Consumers

Financial data, passwords targeted by novel Android malware

Fraud trends and scam tactics consumers should be aware of

GoDaddy’s Failure to Prevent Attacks – DeFi Projects Urge The Ecosystem to Abandon Centralised Hosting

Hacker instalou o Ubuntu em uma tela do Google Nest Hub de 2ª geração

Hacker invade conta de Maradona, troca foto de perfil e exibe falsa publicação de Elon Musk

How Data Landlords Put Their Tenants at Risk

How financial institutions are improving customer experience with fraud prevention measures

How Florida Businesses Can Protect Against Data Breaches

How to Tell If Someone Accessed Your Google Account

Incident Of The Week: BlackCat ransomware strikes Italian university

Immersive Labs Cyber Team Sim prepares teams for real-life cyber attacks

Interpol anti-fraud operation busts call centers behind business email scams

Is Stopping a Ransomware Attack More Important than Preventing One?

Kenyan authorities arrest student hackers converting stolen money to bitcoin

Main types of cyber attacks in Azerbaijan unveiled

Malaysia: Data breach deja vu

Microsoft: June Windows updates may break Wi-Fi hotspots

NakedPages - A new phishing toolkit available on cybercrime forums

New MaliBot Android Malware Found Stealing Personal, Banking Data

Over a Million WordPress Sites Forcibly Updated to Patch a Critical Plugin Vulnerability

Pakistan: ARY News Twitter account hacked

Phishing Attacks Reached a Record High in the First Quarter of 2022, APWG Report Found

Proofpoint details 'dangerous' ransomware flaw in SharePoint and OneDrive

PSA | QR Code Scams Are Real (What They Are + How to Protect Yourself)

Quer ser um hacker? Nova plataforma oferece ambiente gamificado e desafios

QNAP 'thoroughly investigating' new DeadBolt ransomware attacks

Quebec court approves $200.9M settlement against Desjardins over data breach

Ranked: the 59 cybersecurity unicorns you need to know about

RansomHouse hackers threaten to sell Shoprite data

Ransomware Defense: Preventative Techniques To Combat Attack Methods Of Today’s Cybercriminal Gangs

Rapid7 report examines use of double extortion ransomware attacks

Reimagine Hybrid Work: Same CyberSec in Office and at Home

Researchers Uncover 'Hermit' Android Spyware Used in Kazakhstan, Syria, and Italy

Russian botnet ‘RSOCKS’ dismantled after hacking millions of devices

Russian RSocks botnet disrupted after hacking millions of devices

Selfridges, Wells Fargo, Apple ID, Netflix, and Mercedes-Benz: Top Scams and Phishing Schemes of the Week

Slovakia's defence department faced a large-scale cyber attack

Stakeholders call for collaboration to restore cyber security sanity

Surfshark Finds US is the Most-Breached Country

The future of cyber-security: MFA and beyond

The rise of double extortion ransomware

Think of the Russia-Ukraine conflict as a microcosm of the cyber war

UK Proposes Post-Brexit Data Laws to Boost Innovation

Understanding the global rise of ransomware

University of Pittsburgh Medical Center Settles Data Breach Class Action for $450,000

US Bipartisan Privacy Proposal Has Cybersecurity Mandates

US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes

Vladimir Putin's key speech delayed because of 'massive' cyber attack in Russia

Warning issued over Father’s Day Heineken scam tricking people on WhatsApp

Warning Signs of Data Breaches You Should Know Of

What is cloud security? A guide to cyber security in the cloud for the public sector

Which stolen data are ransomware gangs most likely to disclose?

Why You Need CIS Controls for Effective Cyber Defense

Wilkins Recreational Vehicles, Inc. Reports Data Breach Following Conti Ransomware Attack

WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability


4 Cloud Application Security Best Practices

5-star hotel’s business account hacked, customers lose money

24B Credentials Are Up for Grabs on Darkweb Marketplaces

72% of middle market companies expect to experience a cyberattack

A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage

A Smarter Cyber-Risk Management Strategy

ALPHV/ BlackCat ransomware gang lets victims check if their data has been compromised

Anker Eufy smart home hubs exposed to RCE attacks by critical flaw

Another 1.3M patients added to data breach tally of ransomware attack on Eye Care Leaders

Another group of Indian hackers exposed on decade-long attacks against China

Ataques hacker do tipo DDoS podem destruir e tirar do ar o seu humilde site ou blog

BeanVPN leaks 25 million user reco

BlackCat Extortion Technique: Public Access to Breached Data

BlackCat Ransomware Gang Targeting Unpatched Microsoft Exchange Servers

Business email platform Zimbra patches memcached injection flaw that imperils user credentials

CERT-In law impact on data breaches: India is the 6th most breached country worldwide

College hackers in Kenya are converting stolen money to bitcoin

Corporate Network Access Selling for Under $1000 on Dark Web

Customers sue 365 Data Centers over alleged ransomware which caused outage

Cyber Resiliency: What It Is and How To Build It

Cybersecurity: Twitter littered with thieves that are eyeing your assets

Cybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data

Data breach puts hundreds of Uganda Securities Exchange (USE) investor details at risk

Deepfake attacks expected to be next major threat to businesses

Difference Between Agent-Based and Network-Based Internal Vulnerability Scanning

Facebook Messenger Scam Duped Millions

Global Police Arrest Thousands in Fraud Crackdown

Hacker usa empréstimos relâmpago para roubar bitcoins de protocolo DeFi

Healthcare Providers see 94% hike in ransomware in 2021

High-Severity RCE Vulnerability Reported in Popular Fastjson Library

How social engineering attacks are evolving beyond email

How to Build Cybersecurity Resilience

How To Protect Yourself From Fraudulent App Scams

Human error leading factor in data breaches, Verizon report says

In modern war, we have as much to fear from cyber weapons as kinetics

Latin America governments are prime targets for ransomware due to lack of resources, analysis argues

MetaMask, Phantom warn of flaw that could steal your crypto wallets

Microsoft Office 365 feature can help cloud ransomware attacks

Mounting Data Breaches Cause Huge Encryption Spike

Office 365 Functionality Could Allow Ransomware to Hold Files Stored on SharePoint and OneDrive

NakedPages Phishing Toolkit is Now Available on Cybercrime Forums

Office 365 loophole may give ransomware an easy shot at your files

Operational Technology (OT) Cybersecurity Readiness is Dangerously Behind

Phishing-as-a-Service (PhaaS) Explained

Ransomware attack on Montrose Environmental Group disrupts lab testing services

Ransomware Risk in Healthcare Endangers Patients

Russian Cybercriminals, the Target of Global Authorities

San Diego Family Care Agrees to $1 Million Settlement to Resolve Class Action Data Breach Lawsuit

SeaFlower Backdoor Targets Web3 Wallet Seed-Phrases

South Dakota Health Care System Says Data Breach Affected 700

State-Sponsored Phishing Attack Targeted Israeli Military Officials

Tech Experts Say You Should Never Fall For This One Common Scam–It’s So Dangerous!

The Age Of The Digital Self: What To Look Out For In The Near Future

The challenges of managing increased complexity as hybrid IT accelerates

The future is passwordless. What’s slowing it down?

The Top Five Mistakes Of Underperforming Cybersecurity Teams

This new Android malware bypasses multi-factor authentication to steal your passwords

Zero trust adoption: Industry-specific challenges and implementation strategies

What are the Consequences of a Data Breach?

What Cyberattacks Do Threat Actors Use for Data Leaks?

What is a Cyberattack? Types and Defenses

Why Combating Ransomware Should Top The List Of Insurance Industry Priorities

Why we need philosophy and ethics of cyber warfare

Yuma Regional Medical Center Experiences Ransomware Attack


3 Indications That Your Computer is Being Hacked

A closer look at the SEC Cybersecurity Disclosure rule

A daily conundrum for cyber insurance brokers – but it hasn't always been this way

A new side-channel attack Hertzbleed affects Intel and AMD CPUs

A tiny botnet launched the largest DDoS attack on record

Behavioral Wellness Department reports medical data breach

BNPL Fraud Alert as Account Takeovers Surge

Cisco Secure Email bug can let attackers bypass authentication

Citrix warns critical bug can let attackers reset admin passwords

Class Action Lawsuit Filed Against Shields Health Care Group Over 2 Million-Record Data Breach

Cloud computing top concerns: The focus is shifting

Cloudflare Thwarted Largest Ever HTTPS DDoS Attack

Comprehensive, Easy Cybersecurity for Lean IT Security Teams Starts with XDR

Cyber attack: Council fixes issue preventing people from moving home in Gloucester

Cyber Threats Target US Election Officials With Phishing Campaign

Cybersecurity in the Pacific: how island nations are building their online defences

Cybersecurity Professionals Identify Top Cloud Computing Security Risks

Data breach at US ambulance billing service Comstar exposed patients’ healthcare information

Don't use these passwords: These are the 10 logins most regularly found for sale online

DragonForce Gang Unleash Hacks Against Govt. of India

Education sector in need of greater cybersecurity

Elasticsearch Database Mess Up Exposed Login, PII Data of 30,000 Students

Energy sector cybersecurity still a growing priority

Enterprise Strategy Group Research Finds Businesses Have Mission-critical Gaps in the Fight Against Ransomware

Federal Trade Commission (FTC) Blames Meta for Over Half of all Social Media Crypto Scams

Firefox: Our new cookie protection will stop companies tracking you across sites

Got hit by a cyberattack? Hackers will probably come after you again - within a year

Government signs cybersecurity agreement with Microsoft

Hackers exploit three-year-old Telerik flaws to deploy Cobalt Strike

Heineken warns customers over WhatsApp Father's Day 'competition' scam

How confident are IT pros in the security of their organization’s supply chain?

How obfuscation can help with data breach mitigation

Identity and Access: The Game is the Same, But Fiercer

In Cybersecurity, What You Can’t See Can Hurt You

Insta-scam: how scammers are targeting younger users online

Interpol seizes $50 million, arrests 2000 social engineers

Iranian Hackers Targeted Former US Ambassador, Israeli Officials: REPORT

MaliBot: A New Android Banking Trojan Spotted in the Wild

Microsoft's Final Patch Tuesday Fixes Follina Bug

Mind the gap: How to ensure your vulnerability detection methods are up to scratch

Need of a Geospatial Approach to Cybersecurity

New Hertzbleed Side-Channel Attack Affects All Modern AMD and Intel CPUs

New peer-to-peer botnet infects Linux servers with cryptominers

New VIP3R Campaign Highlights the Dangers of Spearphishing

Oregon luxury resort hit by unusual cyberattack; employee data, guest names posted on public internet

Organizations are Concerned that Digital Attack Surface is Spiralling Out of Control

Phishing for cryptocurrency continues to rise

Phishing in the Metaverse: The New Reality of Brand Protection

Phishing reaches all-time high in early 2022

Privacy Watchdog Boosts Legal Funds by Keeping Millions in Fines

Ransomware gang publishes stolen victim data on the public Internet

Shields Healthcare Provider Suffered A Data Breach That Exposed Personal Health Information of 2 Million Patients

The rise of phishing as a service (PhaaS) and how to tackle it

The unrelenting threat of ransomware is pushing cybersecurity workers to quit

Thousands of GitHub, AWS, Docker tokens exposed in Travis CI logs

Travel-related Cybercrime Takes Off as Industry Rebounds

Unpatched Exchange server, stolen RDP logins... How miscreants get BlackCat ransomware on your network

Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar

Why Ransomware Extortion is a Threat


8 Outside Threats to Protect Your Business From: How to Secure Your Company

Admin of DDoS-For-Hire Service “DownThem” Gets 2 Years Prison Sentence

API Security Best Practices

Are Phishing Attacks Targeting Crypto on the Rise?

Attacks on Cloud Service Providers Down 25% During First 4 Months of 2022

Attack on Kaiser Permanente Exposes Data on 70,000 Customers

Avera Health Data Breach Affects 700 Patients

Brazil's data protection authority to gain independence from presidential office

Chima Opara weighs in on AI Bias, Cyber Security

Cloud computing means big opportunities - and big threats

Cloudflare mitigates record-breaking HTTPS DDoS attack

Cloudflare Saw Record-Breaking DDoS Attack Peaking at 26 Million Request Per Second

Companies can improve cybersecurity posture with better security training

Conversão da ANPD em autarquia pode garantir viabilidade jurídica da LGPD

Crypto has another problem – scammers will stop at nothing to steal digital currency

CSIRO’s Support to SMEs Working in Cyber Security

Cyber security: a race against time

Cybercriminals are impersonating your boss—here’s how to tell

Deep Web Vs. Dark Web: Differences, Legality and Security

Experts spotted Syslogk, a Linux rootkit under development

Experts Warn on The Dangers of QR Codes, Say They May Target Your Vital Information

Hacker Advertises ‘Crappy’ Ransomware on Instagram

HelloXD Ransomware Variants Found Installing Backdoor on Windows and Linux Machines

India 5th on breached users' global list: Report

Iran says cyber threats against it are rising - analysis

Iran Spear-Phishers Hijack Email Conversations in New Campaign

Kaiser Permanente Exposes Nearly 70K Medical Records in Data Breach

Linux Malware Deemed ‘Nearly Impossible’ to Detect

LockBit Ransomware Compromise of Mandiant Not Supported by Any Evidence, May Be a PR Move by Cybercrime Gang

Malicious Android apps collect personal financial information from users, according to MyCERT

Microsoft patches actively exploited Follina Windows zero-day

Microsoft: Ransomware gangs are using unpatched Exchange servers to gain access, so get updating

More than 90% of cyber attacks made possible by human error

New Aadhaar data leak exposes 11 crore Indian farmers’ sensitive info

New Syslogk Linux Rootkit Lets Attackers Remotely Command It Using "Magic Packets"

New Zimbra Email Vulnerability Could Let Attackers Steal Your Login Credentials

Numrich Gun Parts Corporation Announces Data Breach

Nupur Sharma Row: Int’l hackers fire cyber attack on India against Nupur Sharma’s remark

Once is never enough: The need for continuous penetration testing

Only 10% of vulnerabilities are remediated each month

Only More Secure Coding Can Protect the Software Supply Chain

Os 5 métodos de ataque cibernético em que você precisa ficar de olho

Over Three-Quarters of UK Adults Hit by Online Scams

Owner of ‘DownThem’ DDoS service gets 2 years in prison

Paid a ransom? The crims will be back for more

Ransomware Attackers Claim 98 percent of Payments in Bitcoin

Ransomware attacks are increasing with more dangerous hybrids ahead

Ransomware attacks on healthcare organisations up 94% in 2021: Sophos

Reasons To Choose Career In Cybersecurity

Researchers Detail PureCrypter Loader Cyber Criminals Using to Distribute Malware

SA government departments are vulnerable to cyber attack

Saas security: How to avoid “death by 1000 apps”

San Diego Family Care data breach $1M class action settlement

Santa Barbara County Behavioral Wellness experiences data breach in medical records

SeaFlower campaign distributes backdoored versions of Web3 wallets to steal seed phrases

Six ways to tell if you have been hacked

South Africans seeing emails about 'mandatory training' for monkeypox prevention – it's a scam

Strong passwords still a priority strategy for enterprises

Technical Details Released for 'SynLapse' RCE Vulnerability Reported in Microsoft Azure

Teixeira: Chefe de Gabinete da prefeitura é vítima de crime cibernético; Polícia investiga o caso

The unrelenting threat of ransomware is pushing cybersecurity workers to quit

This new Linux malware has a sneaky way of staying hidden

Unpatched Travis CI API Bug Exposes Thousands of Secret User Access Tokens

Urgent warning: ALDI shoppers urged to be wary of new cheap LG television scam

Using compliance to create value for your organization

Vulnerability management mistakes CISOs still make

Warning to WhatsApp users over Heineken scam offering 'free beer' for Father's Day