top of page

NEWS: Junho (19/06 - 25/06) - 25 Semana de 2022

Cyber Security and Information Security News - Daily Updates !!


3 reasons to consider adopting AI cybersecurity tools

Arizona to get $52K in settlement with Carnival Cruise Line over data breach

Attackers exploited a zero-day in Mitel VOIP devices to compromise a network

Automotive fabric supplier TB Kawashima announces cyberattack

BoG, Cyber Security Authority to deepen collaboration

Cyber Security in Robotic Market Size & Revenue Analysis | McAfee, Skyhopper, Trojan Horse Security, Aujas Cybersecurity, Exida

Everything old is new again? Ransomware groups stop encrypting and switch to theft/extortion model.

FTC Finalizes Action Against CafePress for Covering Up Data Breach, Lax Security

Gartner: 8 Ways Cybersecurity Will Change Companies

Hackers Exploit Harmony’s Horizon Blockchain Bridge to Steal $100 Million

How should businesses protect themselves against new cyber attack threats?

INSS é condenado a indenizar segurada em R$ 2,5 mil por vazamento de dados e assédio de instituições financeiras

It's Back: REvil Ransomware Makes a Return, Here's What to Do

JPMorgan lays off mortgage staffers, Flagstar data breach revealed and more of this week’s top stories

Learn NIST Inside Out With 21 Hours of Training @ 86% OFF

Lethal drinking water, runs on banks and panic buying: What a real Undeclared War cyber attack could mean

Microsoft: Exchange Server 2013 reaches end of support in 9 months

Multiple malicious packages in PyPI repository found stealing AWS secrets

Oracle spent 6 months to fix ‘Mega’ flaws in the Fusion Middleware

PyPi python packages caught sending stolen AWS keys to unsecured sites

Sardenha é alvo de ataque hacker e tem dados vazados na dark web

‘Start-ups being encouraged to take cyber security technology to public’

The 5 best security cameras: Secure your home, inside and out


'Acesso não autorizado': entenda o termo usado por empresas em casos de suspeitas de ataque hacker

Amsterdam cyber startup Hadrian closes €10.5M Seed for platform which simulates hacker attacks

Attackers still exploit Log4Shell on VMware Horizon servers, CISA warns

AWS Security Best Practices

Beware! This Italian Spyware Is Hacking Apple iPhones And Android Smartphones

CafePress fined $500,000 for breach affecting 23 million users

Chinese Hackers Distributing Nim language Malware in SMS Bomber Tool

CISA: Hackers are still using Log4Shell to breach networks, so patch your systems

Conti Group Compromised 40 Firms in Just One Month

Conti ransomware finally shuts down data leak, negotiation sites

Country’s largest housing association hit by cyber attack

Cyber-security professionals have to keep upgrading skills against new online threats: Janil

Cyber security threats “a major concern among East African CEOs"

Despite known security issues, VPN usage continues to thrive

Euro Police Target Gangs Grooming Ukrainian Refugees Online

Experts reveal how to protect your business from cyber attacks

Fast Shop Brazilian retailer discloses "extortion" cyberattack

Google details commercial spyware that targets both Android and iOS devices

Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit Spyware

Google TAG argues surveillance firm RCS Labs was helped by ISPs to infect mobile users

Hackers da China usam ransomware como isca para espionagem industrial no Brasil e nos EUA

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

How companies are prioritizing infosec and compliance priorities

How to enhance EU cybersecurity

InfosecurityEurope2022: Security awareness must be in the moment

InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs

iPaaS: The latest enterprise cybersecurity risk?

Iranian cyber-attackers trying, and so far failing, to create panic in Israel

ISPs Helping Attackers Install Hermit Spyware on Smartphones- Google

June Windows preview updates fix VPN, RDP, RRAS, and Wi-Fi issues

Mitel zero-day used by hackers in suspected ransomware attack

Multiple Backdoored Python Libraries Caught Stealing AWS Secrets and Keys

NIST Sets SSE Framework in Final SP 800-160 Guidance

Novas funcionalidades do Chrome para iOS adicionam maior proteção contra phishing e malware

NSA Wants To Help you Lock Down MS Windows in PowerShell

Organizations lag on confidence and policies to manage open source security

Protocolo de conexão Horizon sofre ataque hacker e perde R$ 500 milhões em Ether

Rede de lojas de eletrônicos sofre tentativa de invasão hacker

Risky behavior reduced when executives put focus on identity security

Scalper bots are snapping up appointments for government services in Israel

School Admin Shared Non-Public Details of Ransomware Attack with Private Company

Sem paz! Novo alerta de ataque hacker aos usuários do Facebook, entenda e proteja-se

State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks

The 7 best cybersecurity certifications: Become a security expert

UK's biggest housing association Clarion suffers cyber attack

Unsecured APIs Could Be Costing Firms $75bn Per Year

US watchdog is worried cyber insurance won't cover 'catastrophic cyberattacks'

USB devices with personal data of all 460,000 Amagasaki residents lost

Very warns on delays as delivery partner hit by cyber-attack

Windows 10 22H2 accidentally confirmed by latest preview update


Attack methods using hybrid bots enable criminals to open mule accounts at scale

Automotive hose maker Nichirin hit by ransomware attack

Automotive hose manufacturer hit by ransomware, shuts down production control system

Avos ransomware threat actor updates its attack arsenal

Chinese Hackers Distributing SMS Bomber Tool with Malware Hidden Inside

Chinese hackers use ransomware as decoy for cyber espionage

CICT addresses cyber security issues in public schooling sector

Cloud Email Threats Soar 101% in a Year

Conti ransomware hacking spree breaches over 40 orgs in a month

Cybersecurity can no Longer be Pushed to Next Year

Cybersecurity framework still not finalized after 3 years, N.L. agency blames COVID for delay

Employees in Chichester are the biggest threat to company cyber security

Fast Shop: rede varejista sofre ataque hacker e grupo propõe negociar dados obtidos

Fast Shop sofre ataque hacker e loja virtual fica fora do ar

Financial Markets Authority reminds sector of its cyber security obligations

In the era of ransomware, recovery has become as important as prevention

InfosecurityEurope2022: Are You Prepared For The Next Big Crisis?

InfosecurityEurope2022: The Power of Narrative in Highlighting OT System Risks

Inside a large-scale phishing campaign targeting millions of Facebook users

Less Than Half of Organizations Have Open Source Security Policy

MCG Health Faces Lawsuit Over Data Breach Impacting 1.1 Million Individuals

New MetaMask phishing campaign uses KYC lures to steal passphrases

NSA, CISA say: Don't block PowerShell, here's what to do instead

NightDragon, Orange Cyberdefense Partner to Bring Emerging Cybersecurity Innovation to European Organizations

Quanto tempo leva para um hacker descobrir sua senha?

Rate of IT security incidents grows with company size

Researchers found flaws in MEGA that allowed to decrypt of user data

Russia Steps Up Cyber-Espionage Against Ukraine Allies

Security pros increasingly plan to adopt MDR services in the next 12 months

Simpson University Reports Data Breach of Medical, Financial and Student Information

Site da loja Fast Shop sofre ataque hacker e grupo quer negociar dados de consumidores

University of Pittsburgh Medical Center Settles Data Breach Lawsuit for $450,000

Your email is a major source of security risks and it's getting worse


7 DevSecOps myths and how to overcome them

7 in 10 phishing attempts in PHL are finance-related

A good anti-ransomware strategy is at the heart of Digital Transformation

Ataques hacker contra PMEs crescem 41% em 2022

Authorities Suspect Cyber Attack Behind False Rocket Sirens in Israel

Banking scams are wreaking havoc in Singapore and Malaysia, why?

Capital One hacker convicted in a US Court for stealing the PII of 100m people

Chainalysis launches reporting service for businesses targeted in crypto-related cyberattacks

Cyber attack trend increases significantly, one attack in 9 seconds — Veritas Technologies

CyberRes Reveals Digital Value Chain Attacks on a Rapid Rise with Ransomware Victims Nearly Doubled Year over Year

Daycare apps may expose children, parents to data breach risk: Report

Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture

Elusive ToddyCat APT Targets Microsoft Exchange Servers

Euro Cops Dismantle Multimillion-Dollar Phishing Gang

Exit of VPNs just the beginning. CERT-In’s cybersecurity rules will affect many players

Fake adverts: how to spot them and protect yourself

Fifteen Years of Data Breaches – What’s New and What’s the Same

Flagstar Bank discloses a data breach that impacted 1.5 Million individuals

Food and beverage: still a prime target

Grupo hacker investigado pela PF desviou R$ 3 milhões de prefeituras do ES

Hacker de CS:GO rouba conta valendo US$ 2 milhões em skins

Hacker que invadia contas bancárias tem ligação com investigados por roubos de mensagens de autoridades

How Threat Actors Weaponize Your Trust

How to keep your NFTs safe from scammers

IDC Study Highlights Need for Continuous Data Protection

Identity-Related Breaches Hit 84% of US Firms in 2021

InfosecurityEurope2022: Geopolitical Tensions a "Danger" to Cybersecurity

Kaspersky detects nearly 200 000 phishing attacks targeting crypto

Machine Learning Tackles Ransomware Attacks

MEGA fixes critical flaws that allowed the decryption of user data

Microsoft: Russia stepped up cyberattacks against Ukraine’s allies

NatWest files under whistleblower’s bed contain live customer data

Newly Discovered Magecart Infrastructure Reveals the Scale of Ongoing Campaign

Organisations ‘wait for attack before defending themselves’, says security report

Over 24 Billion Compromised User Credentials Circulating on the Dark Web Market

Proofpoint dispels commonly held threat actor assumptions in new report

Quad and Cybersecurity

Rainbow Bridge Falls Under Phishing Scam

Russian Hackers Exploiting Microsoft Follina Vulnerability Against Ukraine

Sensitive data from Indiana University Health patients breached by unknown perpetrators

Stellar Cyber’s security sensors enable enterprises to improve their overall security posture

Tesco shoppers in Milton Keynes warned of scam that could see bank details stolen

The Philippines: Three ways to strengthen cybersecurity resilience in the country

The price of stolen info: Everything on sale on the dark web

The Risk of Multichannel Phishing Is on the Horizon

This Android Malware spies on your messages to steal your data

Three Tips for Securing K-12 Student Data

Top 5 data leakages in the crypto industry

UK backs acceleration of UNSW cyber security research

Ukrainian organizations warned of hacking attempts using CredoMap malware, Cobalt Strike beacons

US Health systems want government help fighting off the hackers

What are the benefits of passwordless authentication?

What is rootkit malware and how to remove it from Windows PC and Mac

Yale New Haven Hospital Research File Implicated in Healthcare Data Breach

Yodel Cyber Incident Disrupts UK Deliveries


5 Tips to Thwart Business Email Compromise (BEC) Attacks

1.5 million customers impacted by Flagstar Bank data breach

After being breached once, many companies are likely to be hit again

Are retailer employees ready for today’s cybersecurity challenges?

Baptist Medical Center notifies patients of data breach

BHG Financial Information Security Team Wins 2022 Fortress Cyber Security Award

BRATA malware has evolved to target online banking across Europe, researchers warn

Complete Guide to Cyber Threat Intelligence Feeds

Critical National Infrastructure (CNI) leaders’ attitude to ransomware lackadaisical at best

Cybercrime In California Is Increasing, But What Can You Do About It?

Cybercriminals sell access to companies via the Dark Web from $2000

Cybercriminals Use Azure Front Door in Phishing Attacks

Delivery firm Yodel disrupted by cyber attack

Digital Value Chain Attacks on the Rise

DiversiTech Corporation Reports “Data Privacy Event” Impacting Names and Social Security Numbers

Esse Malware para Android espiona suas mensagens para roubar seus dados

Examining the Modern Attack Surface: Quantifying the Risks to Individuals and the Enterprise

Examining Zero-Day Attacks And How To Prevent Them

Fake voicemail notifications are after Office365, Outlook credentials

Flagstar Bank discloses data breach impacting 1.5 million customers

Former Amazon Employee Found Guilty in 2019 Capital One Data Breach

Hacker é detido em operação contra pirataria digital em Maceió, diz polícia

Hacker maceioense é preso por pirataria digital em operação internacional

Hackers stole Social Security numbers in Flagstar data breach affecting 1.5 million customers

Harry Styles fan's data breach fears after receiving email with concert goers addresses still attached

How the blurring of the “supply chain” opens your doors to attackers—and how you can close them

Icefall: 56 flaws impact thousands of exposed industrial devices

Insider Threats: How to Protect Your Business and Data From the Enemy Within

iPhone users targeted with new Apple Pay text message scam

Kazakh Govt. Used Spyware Against Protesters

Magecart attacks are still around. And they are becoming more stealthy

Massive Cloudflare outage caused by network configuration error

May 2022 Healthcare Data Breach Report

Microsoft 365 outage affects Microsoft Teams and Exchange Online

Microsoft Out-of-Band Update Fixes Arm Device Issues

Microsoft: This out-of-band Windows security update fixes Microsoft 365 sign-in issues for Arm devices

Microsoft wants to improve IoT security with Edge Secured-core devices

Mitigate Ransomware in a Remote-First World

New Android banking malware disguises as crypto app to spread

New DFSCoerce NTLM relay attack allows taking control over Windows domains

New NTLM Relay Attack Lets Attackers Take Control Over Windows Domain

New Stellar Cyber Security Sensors Disrupt Economics for Defending Distributed Environments

New ToddyCat APT group targets Exchange servers in Asia, Europe

New ToddyCat Hacker Group on Experts' Radar After Targeting MS Exchange Servers

O número de ataques de ransomware diminuiu, mas isso não é bom o suficiente

Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack

One Million Facebook Credentials Compromised in Four Months by Ongoing Phishing Campaign

'Operação 404': hacker detentor de sites de streaming pirata é conduzido coercitivamente para ser interrogado

Patient information may have been illegally accessed at Kernersville Eye Surgeons. Practice discloses data breach.

Phishing Attacks Broke All Records in the First Quarter of 2022

Photos: Infosecurity Europe 2022, part 1

Preventative Approach Could Block 90% of Cyber-attacks, Research Finds

Ransomware parece focar no Brasil e aparece em 40% dos ataques

Researchers Disclose 56 Vulnerabilities Impacting OT Devices from 10 Vendors

Researchers disclose 56 vulnerabilities impacting thousands of OT devices

Researchers Reveal 56 OT Bugs in "Icefall" Report

Robert Half International, Inc. Reports Data Breach Affecting Consumers’ Social Security Numbers

Security Flaw In Strava, A Social Fitness App, Exposed Identities Of Israeli Soldiers At Military Bases

Site da terceira maior criptomoeda do mundo sofre ataque hacker; stablecoin Tether (USDT) tenta manter paridade com o dólar

Slim.AI introduces beta software supply chain container security as a service

Solution to cybersecurity skills gap largely sits with hiring practices

These fake voicemail phishing emails want to steal your passwords

University accidentally leaks personal information of 15,000 students

US Bank Data Breach Impacts Over 1.5 Million Customers

Voicemail phishing emails steal Microsoft credentials

What are the Methods of a Data Breach?

Why the Long View Matters in API Attack Protection

Yodel blames cyber incident for disruption and parcel tracking problems


5 Reasons You Should Learn About Cyber Security

9 Cybersecurity Challenges Companies Must Tackle Now

Ataques cibernéticos, clonagem de aplicativos e de dados pautam Café de Ideias

Attackers could use Office 365 functionality to encrypt files on SharePoint and OneDrive

Baptist Health System Announces Data Breach Affecting Patients of Two San Antonio-Area Hospitals

BlackCat Ransomware That Breached Over 60 Organizations

Board members and the C-suite need secure communication tools

Brasil salta para 18ª posição em ranking mundial de cibersegurança

BRATA Android Malware Group Now Classified As Advanced Persistent Threat

BRATA virus, which erases Android devices, is becoming a chronic problem

Canada Introduces New Cybersecurity Legislation for Critical Infrastructure

Canada's Desjardins Settles Data Breach Lawsuit for $155M

Cyber attack: Gloucester council services still not back to normal

Cyber Attack in Telecom Sector Market Size 2022 And Analysis By Top KeyPlayers – Netrika Consulting India, eSec Forte Technologies, Aspirantz InfoSec, ALTEN Calsoft Labs

Cyber Security Integral To National Security: Amit Shah

Data recovery depends on how good your backup strategy is

Do You Have Ransomware Insurance? Look at the Fine Print

Do you Use Adobe Products? Then you might be at a Risk of Cyber-Attack

ECL data breach affected multiple eye care providers & 2m patients in the US

Experts publish ex-Soviet Republics’ cyber security index – Latvia on the same level as Ukraine

False rocket sirens in Jerusalem, Eilat might have been cyber attack

Flagstar Bank discloses data breach impacting 1.5 million customers

Former Amazon employee convicted of Capital One hack

Four Key Findings from the 2022 Cyberthreat Defense Report

Glorin Sebastian, first Keralite to be on list of world’s top cyber-security experts

Google Chrome Extensions Could Be Used to Track Users Online

Google Researchers Detail 5-Year-Old Apple Safari Vulnerability Exploited in the Wild

Governance Gap Raises AI Security Concerns

Healthcare breaches on the rise in 2022

Healthcare Is Now the Industry Most Targeted by Hackers: Here’s How Organizations Can Defend Themselves

How to properly adopt and manage Kubernetes in production

How to protect your online financial data

How tool sprawl is becoming a common issue for SMEs

HowTo: Demystify the NIST Cybersecurity Framework

Increased security driving investments in cloud computing

Investigators Disrupt Giant RSocks Botnet

Israel suspects Iranian cyber-attack behind false siren alerts

Kaspersky: Phishing attempts in Malaysia mostly target payment system

LGPD: Como as pequenas e médias empresas podem evitar vazamento de Dados dos clientes

Many Operational Technology (OT) Security Incidents Result in Outages Posing Physical Safety Risk

MCG Health, company that provides support for IU Health, reports data breach

Microsoft 365 credentials targeted in new fake voicemail campaign

More than 81,000 Social Security Numbers Leaked in Quality Temporary Services, Inc. Data Breach

New 'BidenCash' site sells your stolen credit card for just 15 cents

O Brasil é o terceiro país no mundo a receber mais ataques do RansomEXX

Pesquisa da Sophos aponta crescimento nos ataques de ransomware do setor de saúde em 2021

Previously Undiscovered Team of State-Sponsored Chinese Hackers, Has Been Quietly Committing Cyber Espionage in the APAC Region for a Decade

QNAP Customers Hit by Double Ransomware Blitz

QNAP NAS devices hit by DeadBolt and ech0raix ransomware

Ransomware Attack on Shoprite Holdings: Important Reminder of Employees’ Role in Cybersecurity

Ransomware attacks: This is the data that cyber criminals really want to steal

Simpson University Confirms Data Breach Leaked Information of More than 6,000 Students

Suspected cyberattack triggers sirens in Jerusalem, Eilat

The future of IoT ransomware – targeted multi-function bots and more cyberattacks

The Importance Of Securing Your Enterprise’s IT Systems From Cyber Threats

This new Windows 11 privacy feature shows when apps access your microphone, camera or location

This phone-wiping Android banking trojan is getting nastier

Vietnam needs to ensure cyber security: experts

Was Iran behind siren cyberattacks in Jerusalem, Eilat?

Weller Truck Parts Reports Data Breach Resulting in More than 6,500 Leaked Social Security Numbers

What the Russia-Ukraine war means for the future of cyber warfare

Why diversity is vital for a strong cybersecurity team


2M Eyecare Patients Potentially Affected by Data Breach

Android-wiping BRATA malware is evolving into a persistent threat

BRATA Android Malware Gains Advanced Mobile Threat Capabilities

Costa Rica’s turmoil is a reminder that the danger of ransomware is still present

Cyber attack continues on India as hackers leak data of lakhs of citizens on dark web

Cyberthreat Defense Report 2022: Key Points You Should Know

EU and U.S. Join Forces to Help Developing World Cybersecurity

Exposed: Scammers' latest ploys and how to outwit them

Google Chrome extensions can be fingerprinted to track you online

How to stay safe from phishing links, messages and emails

More cyber warfare with Russia lies on the horizon

Novo kit de phishing já disponível em fóruns de cibercrime

Putin ‘orders up to 50 sleeper agent spies hiding in Britain to prepare to launch cyber attacks against UK’

QNAP NAS devices targeted by increased eCh0raix ransomware attacks

Rapid7 research reveals which data ransomware groups seek and use for leverage

Reexamining the “5 Laws of Cybersecurity”

Será que todos são “do mal”? Já ouviu falar dos hackers e sabe se tudo que fazem é ilegal?

Shields Health Care Group suffers data breach

Singapore: More than $71,000 lost to new scam variants in first half of June

Tesco shoppers warned over fake gift cards that could empty your bank

Tether Experience DDOS Attack ! Here’s The Outlook at What Really Happened!

URSSAF scam: what to be wary of right now

Why cybersecurity is also a human issue, not just a technology one

NEWS: Junho (12/06 - 18/06) - 24 Semana de 2022

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.


Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page