NEWS: Junho (19/06 - 25/06) - 25 Semana de 2022
Cyber Security and Information Security News - Daily Updates !!

25/06
3 reasons to consider adopting AI cybersecurity tools
Arizona to get $52K in settlement with Carnival Cruise Line over data breach
Attackers exploited a zero-day in Mitel VOIP devices to compromise a network
Automotive fabric supplier TB Kawashima announces cyberattack
BoG, Cyber Security Authority to deepen collaboration
Everything old is new again? Ransomware groups stop encrypting and switch to theft/extortion model.
FTC Finalizes Action Against CafePress for Covering Up Data Breach, Lax Security
Gartner: 8 Ways Cybersecurity Will Change Companies
Hackers Exploit Harmony’s Horizon Blockchain Bridge to Steal $100 Million
How should businesses protect themselves against new cyber attack threats?
It's Back: REvil Ransomware Makes a Return, Here's What to Do
Learn NIST Inside Out With 21 Hours of Training @ 86% OFF
Microsoft: Exchange Server 2013 reaches end of support in 9 months
Multiple malicious packages in PyPI repository found stealing AWS secrets
Oracle spent 6 months to fix ‘Mega’ flaws in the Fusion Middleware
PyPi python packages caught sending stolen AWS keys to unsecured sites
Sardenha é alvo de ataque hacker e tem dados vazados na dark web
‘Start-ups being encouraged to take cyber security technology to public’
The 5 best security cameras: Secure your home, inside and out
24/06
'Acesso não autorizado': entenda o termo usado por empresas em casos de suspeitas de ataque hacker
Amsterdam cyber startup Hadrian closes €10.5M Seed for platform which simulates hacker attacks
Attackers still exploit Log4Shell on VMware Horizon servers, CISA warns
Beware! This Italian Spyware Is Hacking Apple iPhones And Android Smartphones
CafePress fined $500,000 for breach affecting 23 million users
Chinese Hackers Distributing Nim language Malware in SMS Bomber Tool
CISA: Hackers are still using Log4Shell to breach networks, so patch your systems
Conti Group Compromised 40 Firms in Just One Month
Conti ransomware finally shuts down data leak, negotiation sites
Country’s largest housing association hit by cyber attack
Cyber-security professionals have to keep upgrading skills against new online threats: Janil
Cyber security threats “a major concern among East African CEOs"
Despite known security issues, VPN usage continues to thrive
Euro Police Target Gangs Grooming Ukrainian Refugees Online
Experts reveal how to protect your business from cyber attacks
Fast Shop Brazilian retailer discloses "extortion" cyberattack
Google details commercial spyware that targets both Android and iOS devices
Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit Spyware
Google TAG argues surveillance firm RCS Labs was helped by ISPs to infect mobile users
Hackers da China usam ransomware como isca para espionagem industrial no Brasil e nos EUA
Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack
How companies are prioritizing infosec and compliance priorities
How to enhance EU cybersecurity
InfosecurityEurope2022: Security awareness must be in the moment
InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs
iPaaS: The latest enterprise cybersecurity risk?
Iranian cyber-attackers trying, and so far failing, to create panic in Israel
ISPs Helping Attackers Install Hermit Spyware on Smartphones- Google
June Windows preview updates fix VPN, RDP, RRAS, and Wi-Fi issues
Mitel zero-day used by hackers in suspected ransomware attack
Multiple Backdoored Python Libraries Caught Stealing AWS Secrets and Keys
NIST Sets SSE Framework in Final SP 800-160 Guidance
Novas funcionalidades do Chrome para iOS adicionam maior proteção contra phishing e malware
NSA Wants To Help you Lock Down MS Windows in PowerShell
Organizations lag on confidence and policies to manage open source security
Protocolo de conexão Horizon sofre ataque hacker e perde R$ 500 milhões em Ether
Rede de lojas de eletrônicos sofre tentativa de invasão hacker
Risky behavior reduced when executives put focus on identity security
Scalper bots are snapping up appointments for government services in Israel
School Admin Shared Non-Public Details of Ransomware Attack with Private Company
Sem paz! Novo alerta de ataque hacker aos usuários do Facebook, entenda e proteja-se
State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks
The 7 best cybersecurity certifications: Become a security expert
UK's biggest housing association Clarion suffers cyber attack
Unsecured APIs Could Be Costing Firms $75bn Per Year
US watchdog is worried cyber insurance won't cover 'catastrophic cyberattacks'
USB devices with personal data of all 460,000 Amagasaki residents lost
Very warns on delays as delivery partner hit by cyber-attack
Windows 10 22H2 accidentally confirmed by latest preview update
23/06
Attack methods using hybrid bots enable criminals to open mule accounts at scale
Automotive hose maker Nichirin hit by ransomware attack
Automotive hose manufacturer hit by ransomware, shuts down production control system
Avos ransomware threat actor updates its attack arsenal
Chinese Hackers Distributing SMS Bomber Tool with Malware Hidden Inside
Chinese hackers use ransomware as decoy for cyber espionage
CICT addresses cyber security issues in public schooling sector
Cloud Email Threats Soar 101% in a Year
Conti ransomware hacking spree breaches over 40 orgs in a month
Cybersecurity can no Longer be Pushed to Next Year
Cybersecurity framework still not finalized after 3 years, N.L. agency blames COVID for delay
Employees in Chichester are the biggest threat to company cyber security
Fast Shop: rede varejista sofre ataque hacker e grupo propõe negociar dados obtidos
Fast Shop sofre ataque hacker e loja virtual fica fora do ar
Financial Markets Authority reminds sector of its cyber security obligations
In the era of ransomware, recovery has become as important as prevention
InfosecurityEurope2022: Are You Prepared For The Next Big Crisis?
InfosecurityEurope2022: The Power of Narrative in Highlighting OT System Risks
Inside a large-scale phishing campaign targeting millions of Facebook users
Less Than Half of Organizations Have Open Source Security Policy
MCG Health Faces Lawsuit Over Data Breach Impacting 1.1 Million Individuals
New MetaMask phishing campaign uses KYC lures to steal passphrases
NSA, CISA say: Don't block PowerShell, here's what to do instead
Quanto tempo leva para um hacker descobrir sua senha?
Rate of IT security incidents grows with company size
Researchers found flaws in MEGA that allowed to decrypt of user data
Russia Steps Up Cyber-Espionage Against Ukraine Allies
Security pros increasingly plan to adopt MDR services in the next 12 months
Simpson University Reports Data Breach of Medical, Financial and Student Information
Site da loja Fast Shop sofre ataque hacker e grupo quer negociar dados de consumidores
University of Pittsburgh Medical Center Settles Data Breach Lawsuit for $450,000
Your email is a major source of security risks and it's getting worse
22/06
7 DevSecOps myths and how to overcome them
7 in 10 phishing attempts in PHL are finance-related
A good anti-ransomware strategy is at the heart of Digital Transformation
Ataques hacker contra PMEs crescem 41% em 2022
Authorities Suspect Cyber Attack Behind False Rocket Sirens in Israel
Banking scams are wreaking havoc in Singapore and Malaysia, why?
Capital One hacker convicted in a US Court for stealing the PII of 100m people
Chainalysis launches reporting service for businesses targeted in crypto-related cyberattacks
Cyber attack trend increases significantly, one attack in 9 seconds — Veritas Technologies
Daycare apps may expose children, parents to data breach risk: Report
Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture
Elusive ToddyCat APT Targets Microsoft Exchange Servers
Euro Cops Dismantle Multimillion-Dollar Phishing Gang
Exit of VPNs just the beginning. CERT-In’s cybersecurity rules will affect many players
Fake adverts: how to spot them and protect yourself
Fifteen Years of Data Breaches – What’s New and What’s the Same
Flagstar Bank discloses a data breach that impacted 1.5 Million individuals
Food and beverage: still a prime target
Grupo hacker investigado pela PF desviou R$ 3 milhões de prefeituras do ES
Hacker de CS:GO rouba conta valendo US$ 2 milhões em skins
How Threat Actors Weaponize Your Trust
How to keep your NFTs safe from scammers
IDC Study Highlights Need for Continuous Data Protection
Identity-Related Breaches Hit 84% of US Firms in 2021
InfosecurityEurope2022: Geopolitical Tensions a "Danger" to Cybersecurity
Kaspersky detects nearly 200 000 phishing attacks targeting crypto
Machine Learning Tackles Ransomware Attacks
MEGA fixes critical flaws that allowed the decryption of user data
Microsoft: Russia stepped up cyberattacks against Ukraine’s allies
NatWest files under whistleblower’s bed contain live customer data
Newly Discovered Magecart Infrastructure Reveals the Scale of Ongoing Campaign
Organisations ‘wait for attack before defending themselves’, says security report
Over 24 Billion Compromised User Credentials Circulating on the Dark Web Market
Proofpoint dispels commonly held threat actor assumptions in new report
Rainbow Bridge Falls Under Phishing Scam
Russian Hackers Exploiting Microsoft Follina Vulnerability Against Ukraine
Sensitive data from Indiana University Health patients breached by unknown perpetrators
Stellar Cyber’s security sensors enable enterprises to improve their overall security posture
Tesco shoppers in Milton Keynes warned of scam that could see bank details stolen
The Philippines: Three ways to strengthen cybersecurity resilience in the country
The price of stolen info: Everything on sale on the dark web
The Risk of Multichannel Phishing Is on the Horizon
This Android Malware spies on your messages to steal your data
Three Tips for Securing K-12 Student Data
Top 5 data leakages in the crypto industry
UK backs acceleration of UNSW cyber security research
Ukrainian organizations warned of hacking attempts using CredoMap malware, Cobalt Strike beacons
US Health systems want government help fighting off the hackers
What are the benefits of passwordless authentication?
What is rootkit malware and how to remove it from Windows PC and Mac
Yale New Haven Hospital Research File Implicated in Healthcare Data Breach
Yodel Cyber Incident Disrupts UK Deliveries
21/06
5 Tips to Thwart Business Email Compromise (BEC) Attacks
1.5 million customers impacted by Flagstar Bank data breach
After being breached once, many companies are likely to be hit again
Are retailer employees ready for today’s cybersecurity challenges?
Baptist Medical Center notifies patients of data breach
BHG Financial Information Security Team Wins 2022 Fortress Cyber Security Award
BRATA malware has evolved to target online banking across Europe, researchers warn
Complete Guide to Cyber Threat Intelligence Feeds
Critical National Infrastructure (CNI) leaders’ attitude to ransomware lackadaisical at best
Cybercrime In California Is Increasing, But What Can You Do About It?
Cybercriminals sell access to companies via the Dark Web from $2000
Cybercriminals Use Azure Front Door in Phishing Attacks
Delivery firm Yodel disrupted by cyber attack
Digital Value Chain Attacks on the Rise
DiversiTech Corporation Reports “Data Privacy Event” Impacting Names and Social Security Numbers
Esse Malware para Android espiona suas mensagens para roubar seus dados
Examining the Modern Attack Surface: Quantifying the Risks to Individuals and the Enterprise
Examining Zero-Day Attacks And How To Prevent Them
Fake voicemail notifications are after Office365, Outlook credentials
Flagstar Bank discloses data breach impacting 1.5 million customers
Former Amazon Employee Found Guilty in 2019 Capital One Data Breach
Hacker é detido em operação contra pirataria digital em Maceió, diz polícia
Hacker maceioense é preso por pirataria digital em operação internacional
Hackers stole Social Security numbers in Flagstar data breach affecting 1.5 million customers
How the blurring of the “supply chain” opens your doors to attackers—and how you can close them
Icefall: 56 flaws impact thousands of exposed industrial devices
Insider Threats: How to Protect Your Business and Data From the Enemy Within
iPhone users targeted with new Apple Pay text message scam
Kazakh Govt. Used Spyware Against Protesters
Magecart attacks are still around. And they are becoming more stealthy
Massive Cloudflare outage caused by network configuration error
May 2022 Healthcare Data Breach Report
Microsoft 365 outage affects Microsoft Teams and Exchange Online
Microsoft Out-of-Band Update Fixes Arm Device Issues
Microsoft wants to improve IoT security with Edge Secured-core devices
Mitigate Ransomware in a Remote-First World
New Android banking malware disguises as crypto app to spread
New DFSCoerce NTLM relay attack allows taking control over Windows domains
New NTLM Relay Attack Lets Attackers Take Control Over Windows Domain
New Stellar Cyber Security Sensors Disrupt Economics for Defending Distributed Environments
New ToddyCat APT group targets Exchange servers in Asia, Europe
New ToddyCat Hacker Group on Experts' Radar After Targeting MS Exchange Servers
O número de ataques de ransomware diminuiu, mas isso não é bom o suficiente
Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack
One Million Facebook Credentials Compromised in Four Months by Ongoing Phishing Campaign
Phishing Attacks Broke All Records in the First Quarter of 2022
Photos: Infosecurity Europe 2022, part 1
Preventative Approach Could Block 90% of Cyber-attacks, Research Finds
Ransomware parece focar no Brasil e aparece em 40% dos ataques
Researchers Disclose 56 Vulnerabilities Impacting OT Devices from 10 Vendors
Researchers disclose 56 vulnerabilities impacting thousands of OT devices
Researchers Reveal 56 OT Bugs in "Icefall" Report
Robert Half International, Inc. Reports Data Breach Affecting Consumers’ Social Security Numbers
Slim.AI introduces beta software supply chain container security as a service
Solution to cybersecurity skills gap largely sits with hiring practices
These fake voicemail phishing emails want to steal your passwords
University accidentally leaks personal information of 15,000 students
US Bank Data Breach Impacts Over 1.5 Million Customers
Voicemail phishing emails steal Microsoft credentials
What are the Methods of a Data Breach?
Why the Long View Matters in API Attack Protection
Yodel blames cyber incident for disruption and parcel tracking problems
20/06
5 Reasons You Should Learn About Cyber Security
9 Cybersecurity Challenges Companies Must Tackle Now
Ataques cibernéticos, clonagem de aplicativos e de dados pautam Café de Ideias
Attackers could use Office 365 functionality to encrypt files on SharePoint and OneDrive
Baptist Health System Announces Data Breach Affecting Patients of Two San Antonio-Area Hospitals
BlackCat Ransomware That Breached Over 60 Organizations
Board members and the C-suite need secure communication tools
Brasil salta para 18ª posição em ranking mundial de cibersegurança
BRATA Android Malware Group Now Classified As Advanced Persistent Threat
BRATA virus, which erases Android devices, is becoming a chronic problem
Canada Introduces New Cybersecurity Legislation for Critical Infrastructure
Canada's Desjardins Settles Data Breach Lawsuit for $155M
Cyber attack: Gloucester council services still not back to normal
Cyber Security Integral To National Security: Amit Shah
Data recovery depends on how good your backup strategy is
Do You Have Ransomware Insurance? Look at the Fine Print
Do you Use Adobe Products? Then you might be at a Risk of Cyber-Attack
ECL data breach affected multiple eye care providers & 2m patients in the US
Experts publish ex-Soviet Republics’ cyber security index – Latvia on the same level as Ukraine
False rocket sirens in Jerusalem, Eilat might have been cyber attack
Flagstar Bank discloses data breach impacting 1.5 million customers
Former Amazon employee convicted of Capital One hack
Four Key Findings from the 2022 Cyberthreat Defense Report
Glorin Sebastian, first Keralite to be on list of world’s top cyber-security experts
Google Chrome Extensions Could Be Used to Track Users Online
Google Researchers Detail 5-Year-Old Apple Safari Vulnerability Exploited in the Wild
Governance Gap Raises AI Security Concerns
Healthcare breaches on the rise in 2022
How to properly adopt and manage Kubernetes in production
How to protect your online financial data
How tool sprawl is becoming a common issue for SMEs
HowTo: Demystify the NIST Cybersecurity Framework
Increased security driving investments in cloud computing
Investigators Disrupt Giant RSocks Botnet
Israel suspects Iranian cyber-attack behind false siren alerts
Kaspersky: Phishing attempts in Malaysia mostly target payment system
LGPD: Como as pequenas e médias empresas podem evitar vazamento de Dados dos clientes
Many Operational Technology (OT) Security Incidents Result in Outages Posing Physical Safety Risk
MCG Health, company that provides support for IU Health, reports data breach
Microsoft 365 credentials targeted in new fake voicemail campaign
More than 81,000 Social Security Numbers Leaked in Quality Temporary Services, Inc. Data Breach
New 'BidenCash' site sells your stolen credit card for just 15 cents
O Brasil é o terceiro país no mundo a receber mais ataques do RansomEXX
Pesquisa da Sophos aponta crescimento nos ataques de ransomware do setor de saúde em 2021
QNAP Customers Hit by Double Ransomware Blitz
QNAP NAS devices hit by DeadBolt and ech0raix ransomware
Ransomware Attack on Shoprite Holdings: Important Reminder of Employees’ Role in Cybersecurity
Ransomware attacks: This is the data that cyber criminals really want to steal
Simpson University Confirms Data Breach Leaked Information of More than 6,000 Students
Suspected cyberattack triggers sirens in Jerusalem, Eilat
The future of IoT ransomware – targeted multi-function bots and more cyberattacks
The Importance Of Securing Your Enterprise’s IT Systems From Cyber Threats
This new Windows 11 privacy feature shows when apps access your microphone, camera or location
This phone-wiping Android banking trojan is getting nastier
Vietnam needs to ensure cyber security: experts
Was Iran behind siren cyberattacks in Jerusalem, Eilat?
Weller Truck Parts Reports Data Breach Resulting in More than 6,500 Leaked Social Security Numbers
What the Russia-Ukraine war means for the future of cyber warfare
Why diversity is vital for a strong cybersecurity team
19/06
2M Eyecare Patients Potentially Affected by Data Breach
Android-wiping BRATA malware is evolving into a persistent threat
BRATA Android Malware Gains Advanced Mobile Threat Capabilities
Costa Rica’s turmoil is a reminder that the danger of ransomware is still present
Cyber attack continues on India as hackers leak data of lakhs of citizens on dark web
Cyberthreat Defense Report 2022: Key Points You Should Know
EU and U.S. Join Forces to Help Developing World Cybersecurity
Exposed: Scammers' latest ploys and how to outwit them
Google Chrome extensions can be fingerprinted to track you online
How to stay safe from phishing links, messages and emails
More cyber warfare with Russia lies on the horizon
Novo kit de phishing já disponível em fóruns de cibercrime
QNAP NAS devices targeted by increased eCh0raix ransomware attacks
Rapid7 research reveals which data ransomware groups seek and use for leverage
Reexamining the “5 Laws of Cybersecurity”
Será que todos são “do mal”? Já ouviu falar dos hackers e sabe se tudo que fazem é ilegal?
Shields Health Care Group suffers data breach
Singapore: More than $71,000 lost to new scam variants in first half of June
Tesco shoppers warned over fake gift cards that could empty your bank
Tether Experience DDOS Attack ! Here’s The Outlook at What Really Happened!
URSSAF scam: what to be wary of right now
Why cybersecurity is also a human issue, not just a technology one