NEWS: Junho (19/06 - 25/06) - 25 Semana de 2022

Cyber Security and Information Security News - Daily Updates !!

25/06


3 reasons to consider adopting AI cybersecurity tools


Arizona to get $52K in settlement with Carnival Cruise Line over data breach


Attackers exploited a zero-day in Mitel VOIP devices to compromise a network


Automotive fabric supplier TB Kawashima announces cyberattack


BoG, Cyber Security Authority to deepen collaboration


Cyber Security in Robotic Market Size & Revenue Analysis | McAfee, Skyhopper, Trojan Horse Security, Aujas Cybersecurity, Exida


Everything old is new again? Ransomware groups stop encrypting and switch to theft/extortion model.


FTC Finalizes Action Against CafePress for Covering Up Data Breach, Lax Security


Gartner: 8 Ways Cybersecurity Will Change Companies


Hackers Exploit Harmony’s Horizon Blockchain Bridge to Steal $100 Million


How should businesses protect themselves against new cyber attack threats?


INSS é condenado a indenizar segurada em R$ 2,5 mil por vazamento de dados e assédio de instituições financeiras


It's Back: REvil Ransomware Makes a Return, Here's What to Do


JPMorgan lays off mortgage staffers, Flagstar data breach revealed and more of this week’s top stories


Learn NIST Inside Out With 21 Hours of Training @ 86% OFF


Lethal drinking water, runs on banks and panic buying: What a real Undeclared War cyber attack could mean


Microsoft: Exchange Server 2013 reaches end of support in 9 months


Multiple malicious packages in PyPI repository found stealing AWS secrets


Oracle spent 6 months to fix ‘Mega’ flaws in the Fusion Middleware


PyPi python packages caught sending stolen AWS keys to unsecured sites


Sardenha é alvo de ataque hacker e tem dados vazados na dark web


‘Start-ups being encouraged to take cyber security technology to public’


The 5 best security cameras: Secure your home, inside and out


24/06


'Acesso não autorizado': entenda o termo usado por empresas em casos de suspeitas de ataque hacker


Amsterdam cyber startup Hadrian closes €10.5M Seed for platform which simulates hacker attacks


Attackers still exploit Log4Shell on VMware Horizon servers, CISA warns


AWS Security Best Practices


Beware! This Italian Spyware Is Hacking Apple iPhones And Android Smartphones


CafePress fined $500,000 for breach affecting 23 million users


Chinese Hackers Distributing Nim language Malware in SMS Bomber Tool


CISA: Hackers are still using Log4Shell to breach networks, so patch your systems


Conti Group Compromised 40 Firms in Just One Month


Conti ransomware finally shuts down data leak, negotiation sites


Country’s largest housing association hit by cyber attack


Cyber-security professionals have to keep upgrading skills against new online threats: Janil


Cyber security threats “a major concern among East African CEOs"


Despite known security issues, VPN usage continues to thrive


Euro Police Target Gangs Grooming Ukrainian Refugees Online


Experts reveal how to protect your business from cyber attacks


Fast Shop Brazilian retailer discloses "extortion" cyberattack


Google details commercial spyware that targets both Android and iOS devices


Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit Spyware


Google TAG argues surveillance firm RCS Labs was helped by ISPs to infect mobile users


Hackers da China usam ransomware como isca para espionagem industrial no Brasil e nos EUA


Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack


How companies are prioritizing infosec and compliance priorities


How to enhance EU cybersecurity


InfosecurityEurope2022: Security awareness must be in the moment


InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs


iPaaS: The latest enterprise cybersecurity risk?


Iranian cyber-attackers trying, and so far failing, to create panic in Israel


ISPs Helping Attackers Install Hermit Spyware on Smartphones- Google


June Windows preview updates fix VPN, RDP, RRAS, and Wi-Fi issues


Mitel zero-day used by hackers in suspected ransomware attack


Multiple Backdoored Python Libraries Caught Stealing AWS Secrets and Keys


NIST Sets SSE Framework in Final SP 800-160 Guidance


Novas funcionalidades do Chrome para iOS adicionam maior proteção contra phishing e malware


NSA Wants To Help you Lock Down MS Windows in PowerShell


Organizations lag on confidence and policies to manage open source security


Protocolo de conexão Horizon sofre ataque hacker e perde R$ 500 milhões em Ether


Rede de lojas de eletrônicos sofre tentativa de invasão hacker


Risky behavior reduced when executives put focus on identity security


Scalper bots are snapping up appointments for government services in Israel


School Admin Shared Non-Public Details of Ransomware Attack with Private Company


Sem paz! Novo alerta de ataque hacker aos usuários do Facebook, entenda e proteja-se


State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks


The 7 best cybersecurity certifications: Become a security expert


UK's biggest housing association Clarion suffers cyber attack


Unsecured APIs Could Be Costing Firms $75bn Per Year


US watchdog is worried cyber insurance won't cover 'catastrophic cyberattacks'


USB devices with personal data of all 460,000 Amagasaki residents lost


Very warns on delays as delivery partner hit by cyber-attack


Windows 10 22H2 accidentally confirmed by latest preview update


23/06


Attack methods using hybrid bots enable criminals to open mule accounts at scale


Automotive hose maker Nichirin hit by ransomware attack


Automotive hose manufacturer hit by ransomware, shuts down production control system


Avos ransomware threat actor updates its attack arsenal


Chinese Hackers Distributing SMS Bomber Tool with Malware Hidden Inside


Chinese hackers use ransomware as decoy for cyber espionage


CICT addresses cyber security issues in public schooling sector


Cloud Email Threats Soar 101% in a Year


Conti ransomware hacking spree breaches over 40 orgs in a month


Cybersecurity can no Longer be Pushed to Next Year


Cybersecurity framework still not finalized after 3 years, N.L. agency blames COVID for delay


Employees in Chichester are the biggest threat to company cyber security


Fast Shop: rede varejista sofre ataque hacker e grupo propõe negociar dados obtidos


Fast Shop sofre ataque hacker e loja virtual fica fora do ar


Financial Markets Authority reminds sector of its cyber security obligations


In the era of ransomware, recovery has become as important as prevention


InfosecurityEurope2022: Are You Prepared For The Next Big Crisis?


InfosecurityEurope2022: The Power of Narrative in Highlighting OT System Risks


Inside a large-scale phishing campaign targeting millions of Facebook users


Less Than Half of Organizations Have Open Source Security Policy


MCG Health Faces Lawsuit Over Data Breach Impacting 1.1 Million Individuals


New MetaMask phishing campaign uses KYC lures to steal passphrases


NSA, CISA say: Don't block PowerShell, here's what to do instead


NightDragon, Orange Cyberdefense Partner to Bring Emerging Cybersecurity Innovation to European Organizations


Quanto tempo leva para um hacker descobrir sua senha?


Rate of IT security incidents grows with company size


Researchers found flaws in MEGA that allowed to decrypt of user data


Russia Steps Up Cyber-Espionage Against Ukraine Allies


Security pros increasingly plan to adopt MDR services in the next 12 months


Simpson University Reports Data Breach of Medical, Financial and Student Information


Site da loja Fast Shop sofre ataque hacker e grupo quer negociar dados de consumidores


University of Pittsburgh Medical Center Settles Data Breach Lawsuit for $450,000


Your email is a major source of security risks and it's getting worse


22/06


7 DevSecOps myths and how to overcome them


7 in 10 phishing attempts in PHL are finance-related


A good anti-ransomware strategy is at the heart of Digital Transformation


Ataques hacker contra PMEs crescem 41% em 2022


Authorities Suspect Cyber Attack Behind False Rocket Sirens in Israel


Banking scams are wreaking havoc in Singapore and Malaysia, why?


Capital One hacker convicted in a US Court for stealing the PII of 100m people


Chainalysis launches reporting service for businesses targeted in crypto-related cyberattacks


Cyber attack trend increases significantly, one attack in 9 seconds — Veritas Technologies


CyberRes Reveals Digital Value Chain Attacks on a Rapid Rise with Ransomware Victims Nearly Doubled Year over Year


Daycare apps may expose children, parents to data breach risk: Report


Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture


Elusive ToddyCat APT Targets Microsoft Exchange Servers


Euro Cops Dismantle Multimillion-Dollar Phishing Gang


Exit of VPNs just the beginning. CERT-In’s cybersecurity rules will affect many players


Fake adverts: how to spot them and protect yourself


Fifteen Years of Data Breaches – What’s New and What’s the Same


Flagstar Bank discloses a data breach that impacted 1.5 Million individuals


Food and beverage: still a prime target


Grupo hacker investigado pela PF desviou R$ 3 milhões de prefeituras do ES


Hacker de CS:GO rouba conta valendo US$ 2 milhões em skins


Hacker que invadia contas bancárias tem ligação com investigados por roubos de mensagens de autoridades


How Threat Actors Weaponize Your Trust


How to keep your NFTs safe from scammers


IDC Study Highlights Need for Continuous Data Protection


Identity-Related Breaches Hit 84% of US Firms in 2021


InfosecurityEurope2022: Geopolitical Tensions a "Danger" to Cybersecurity


Kaspersky detects nearly 200 000 phishing attacks targeting crypto


Machine Learning Tackles Ransomware Attacks


MEGA fixes critical flaws that allowed the decryption of user data


Microsoft: Russia stepped up cyberattacks against Ukraine’s allies


NatWest files under whistleblower’s bed contain live customer data


Newly Discovered Magecart Infrastructure Reveals the Scale of Ongoing Campaign


Organisations ‘wait for attack before defending themselves’, says security report


Over 24 Billion Compromised User Credentials Circulating on the Dark Web Market


Proofpoint dispels commonly held threat actor assumptions in new report


Quad and Cybersecurity


Rainbow Bridge Falls Under Phishing Scam


Russian Hackers Exploiting Microsoft Follina Vulnerability Against Ukraine


Sensitive data from Indiana University Health patients breached by unknown perpetrators


Stellar Cyber’s security sensors enable enterprises to improve their overall security posture


Tesco shoppers in Milton Keynes warned of scam that could see bank details stolen


The Philippines: Three ways to strengthen cybersecurity resilience in the country


The price of stolen info: Everything on sale on the dark web


The Risk of Multichannel Phishing Is on the Horizon


This Android Malware spies on your messages to steal your data


Three Tips for Securing K-12 Student Data


Top 5 data leakages in the crypto industry


UK backs acceleration of UNSW cyber security research


Ukrainian organizations warned of hacking attempts using CredoMap malware, Cobalt Strike beacons


US Health systems want government help fighting off the hackers


What are the benefits of passwordless authentication?


What is rootkit malware and how to remove it from Windows PC and Mac


Yale New Haven Hospital Research File Implicated in Healthcare Data Breach


Yodel Cyber Incident Disrupts UK Deliveries



21/06


5 Tips to Thwart Business Email Compromise (BEC) Attacks


1.5 million customers impacted by Flagstar Bank data breach


After being breached once, many companies are likely to be hit again


Are retailer employees ready for today’s cybersecurity challenges?


Baptist Medical Center notifies patients of data breach


BHG Financial Information Security Team Wins 2022 Fortress Cyber Security Award


BRATA malware has evolved to target online banking across Europe, researchers warn


Complete Guide to Cyber Threat Intelligence Feeds


Critical National Infrastructure (CNI) leaders’ attitude to ransomware lackadaisical at best


Cybercrime In California Is Increasing, But What Can You Do About It?


Cybercriminals sell access to companies via the Dark Web from $2000


Cybercriminals Use Azure Front Door in Phishing Attacks


Delivery firm Yodel disrupted by cyber attack


Digital Value Chain Attacks on the Rise


DiversiTech Corporation Reports “Data Privacy Event” Impacting Names and Social Security Numbers


Esse Malware para Android espiona suas mensagens para roubar seus dados


Examining the Modern Attack Surface: Quantifying the Risks to Individuals and the Enterprise


Examining Zero-Day Attacks And How To Prevent Them


Fake voicemail notifications are after Office365, Outlook credentials


Flagstar Bank discloses data breach impacting 1.5 million customers


Former Amazon Employee Found Guilty in 2019 Capital One Data Breach


Hacker é detido em operação contra pirataria digital em Maceió, diz polícia


Hacker maceioense é preso por pirataria digital em operação internacional


Hackers stole Social Security numbers in Flagstar data breach affecting 1.5 million customers


Harry Styles fan's data breach fears after receiving email with concert goers addresses still attached


How the blurring of the “supply chain” opens your doors to attackers—and how you can close them


Icefall: 56 flaws impact thousands of exposed industrial devices


Insider Threats: How to Protect Your Business and Data From the Enemy Within


iPhone users targeted with new Apple Pay text message scam


Kazakh Govt. Used Spyware Against Protesters


Magecart attacks are still around. And they are becoming more stealthy


Massive Cloudflare outage caused by network configuration error


May 2022 Healthcare Data Breach Report


Microsoft 365 outage affects Microsoft Teams and Exchange Online


Microsoft Out-of-Band Update Fixes Arm Device Issues


Microsoft: This out-of-band Windows security update fixes Microsoft 365 sign-in issues for Arm devices


Microsoft wants to improve IoT security with Edge Secured-core devices


Mitigate Ransomware in a Remote-First World


New Android banking malware disguises as crypto app to spread


New DFSCoerce NTLM relay attack allows taking control over Windows domains


New NTLM Relay Attack Lets Attackers Take Control Over Windows Domain


New Stellar Cyber Security Sensors Disrupt Economics for Defending Distributed Environments


New ToddyCat APT group targets Exchange servers in Asia, Europe


New ToddyCat Hacker Group on Experts' Radar After Targeting MS Exchange Servers


O número de ataques de ransomware diminuiu, mas isso não é bom o suficiente


Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack


One Million Facebook Credentials Compromised in Four Months by Ongoing Phishing Campaign


'Operação 404': hacker detentor de sites de streaming pirata é conduzido coercitivamente para ser interrogado


Patient information may have been illegally accessed at Kernersville Eye Surgeons. Practice discloses data breach.


Phishing Attacks Broke All Records in the First Quarter of 2022


Photos: Infosecurity Europe 2022, part 1


Preventative Approach Could Block 90% of Cyber-attacks, Research Finds


Ransomware parece focar no Brasil e aparece em 40% dos ataques


Researchers Disclose 56 Vulnerabilities Impacting OT Devices from 10 Vendors


Researchers disclose 56 vulnerabilities impacting thousands of OT devices


Researchers Reveal 56 OT Bugs in "Icefall" Report


Robert Half International, Inc. Reports Data Breach Affecting Consumers’ Social Security Numbers


Security Flaw In Strava, A Social Fitness App, Exposed Identities Of Israeli Soldiers At Military Bases


Site da terceira maior criptomoeda do mundo sofre ataque hacker; stablecoin Tether (USDT) tenta manter paridade com o dólar


Slim.AI introduces beta software supply chain container security as a service


Solution to cybersecurity skills gap largely sits with hiring practices


These fake voicemail phishing emails want to steal your passwords


University accidentally leaks personal information of 15,000 students


US Bank Data Breach Impacts Over 1.5 Million Customers


Voicemail phishing emails steal Microsoft credentials


What are the Methods of a Data Breach?


Why the Long View Matters in API Attack Protection


Yodel blames cyber incident for disruption and parcel tracking problems


20/06


5 Reasons You Should Learn About Cyber Security


9 Cybersecurity Challenges Companies Must Tackle Now


Ataques cibernéticos, clonagem de aplicativos e de dados pautam Café de Ideias


Attackers could use Office 365 functionality to encrypt files on SharePoint and OneDrive


Baptist Health System Announces Data Breach Affecting Patients of Two San Antonio-Area Hospitals


BlackCat Ransomware That Breached Over 60 Organizations


Board members and the C-suite need secure communication tools


Brasil salta para 18ª posição em ranking mundial de cibersegurança


BRATA Android Malware Group Now Classified As Advanced Persistent Threat


BRATA virus, which erases Android devices, is becoming a chronic problem


Canada Introduces New Cybersecurity Legislation for Critical Infrastructure


Canada's Desjardins Settles Data Breach Lawsuit for $155M


Cyber attack: Gloucester council services still not back to normal


Cyber Attack in Telecom Sector Market Size 2022 And Analysis By Top KeyPlayers – Netrika Consulting India, eSec Forte Technologies, Aspirantz InfoSec, ALTEN Calsoft Labs


Cyber Security Integral To National Security: Amit Shah


Data recovery depends on how good your backup strategy is


Do You Have Ransomware Insurance? Look at the Fine Print


Do you Use Adobe Products? Then you might be at a Risk of Cyber-Attack


ECL data breach affected multiple eye care providers & 2m patients in the US


Experts publish ex-Soviet Republics’ cyber security index – Latvia on the same level as Ukraine


False rocket sirens in Jerusalem, Eilat might have been cyber attack


Flagstar Bank discloses data breach impacting 1.5 million customers


Former Amazon employee convicted of Capital One hack


Four Key Findings from the 2022 Cyberthreat Defense Report


Glorin Sebastian, first Keralite to be on list of world’s top cyber-security experts


Google Chrome Extensions Could Be Used to Track Users Online


Google Researchers Detail 5-Year-Old Apple Safari Vulnerability Exploited in the Wild


Governance Gap Raises AI Security Concerns


Healthcare breaches on the rise in 2022


Healthcare Is Now the Industry Most Targeted by Hackers: Here’s How Organizations Can Defend Themselves


How to properly adopt and manage Kubernetes in production


How to protect your online financial data


How tool sprawl is becoming a common issue for SMEs


HowTo: Demystify the NIST Cybersecurity Framework


Increased security driving investments in cloud computing


Investigators Disrupt Giant RSocks Botnet


Israel suspects Iranian cyber-attack behind false siren alerts


Kaspersky: Phishing attempts in Malaysia mostly target payment system


LGPD: Como as pequenas e médias empresas podem evitar vazamento de Dados dos clientes


Many Operational Technology (OT) Security Incidents Result in Outages Posing Physical Safety Risk


MCG Health, company that provides support for IU Health, reports data breach


Microsoft 365 credentials targeted in new fake voicemail campaign


More than 81,000 Social Security Numbers Leaked in Quality Temporary Services, Inc. Data Breach


New 'BidenCash' site sells your stolen credit card for just 15 cents


O Brasil é o terceiro país no mundo a receber mais ataques do RansomEXX


Pesquisa da Sophos aponta crescimento nos ataques de ransomware do setor de saúde em 2021


Previously Undiscovered Team of State-Sponsored Chinese Hackers, Has Been Quietly Committing Cyber Espionage in the APAC Region for a Decade


QNAP Customers Hit by Double Ransomware Blitz


QNAP NAS devices hit by DeadBolt and ech0raix ransomware


Ransomware Attack on Shoprite Holdings: Important Reminder of Employees’ Role in Cybersecurity


Ransomware attacks: This is the data that cyber criminals really want to steal


Simpson University Confirms Data Breach Leaked Information of More than 6,000 Students


Suspected cyberattack triggers sirens in Jerusalem, Eilat


The future of IoT ransomware – targeted multi-function bots and more cyberattacks


The Importance Of Securing Your Enterprise’s IT Systems From Cyber Threats


This new Windows 11 privacy feature shows when apps access your microphone, camera or location


This phone-wiping Android banking trojan is getting nastier


Vietnam needs to ensure cyber security: experts


Was Iran behind siren cyberattacks in Jerusalem, Eilat?


Weller Truck Parts Reports Data Breach Resulting in More than 6,500 Leaked Social Security Numbers


What the Russia-Ukraine war means for the future of cyber warfare


Why diversity is vital for a strong cybersecurity team


19/06


2M Eyecare Patients Potentially Affected by Data Breach


Android-wiping BRATA malware is evolving into a persistent threat


BRATA Android Malware Gains Advanced Mobile Threat Capabilities


Costa Rica’s turmoil is a reminder that the danger of ransomware is still present


Cyber attack continues on India as hackers leak data of lakhs of citizens on dark web


Cyberthreat Defense Report 2022: Key Points You Should Know


EU and U.S. Join Forces to Help Developing World Cybersecurity


Exposed: Scammers' latest ploys and how to outwit them


Google Chrome extensions can be fingerprinted to track you online


How to stay safe from phishing links, messages and emails


More cyber warfare with Russia lies on the horizon


Novo kit de phishing já disponível em fóruns de cibercrime


Putin ‘orders up to 50 sleeper agent spies hiding in Britain to prepare to launch cyber attacks against UK’


QNAP NAS devices targeted by increased eCh0raix ransomware attacks


Rapid7 research reveals which data ransomware groups seek and use for leverage


Reexamining the “5 Laws of Cybersecurity”


Será que todos são “do mal”? Já ouviu falar dos hackers e sabe se tudo que fazem é ilegal?


Shields Health Care Group suffers data breach


Singapore: More than $71,000 lost to new scam variants in first half of June


Tesco shoppers warned over fake gift cards that could empty your bank


Tether Experience DDOS Attack ! Here’s The Outlook at What Really Happened!


URSSAF scam: what to be wary of right now


Why cybersecurity is also a human issue, not just a technology one



NEWS: Junho (12/06 - 18/06) - 24 Semana de 2022

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.

 

Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon