top of page

NEWS: Março (20/03 - 26/03) - 12 Semana de 2022

Cyber Security and Information Security News - Daily Updates !!


Another Chinese Hacking Group Spotted Targeting Ukraine Amid Russia Invasion

Cybercriminal Connected to Multimillion Dollar Ransomware Attacks Sentenced for Online Fraud Schemes

Experts seek cyberwarfare definition following recent cyber warnings

Federal Communications Commission (FCC) Adds Kaspersky and Chinese Telecom Firms to National Security Threat List

Here are the realities of paying ransomware thieves

How to Avoid Tripping Over Russia’s Ransomware Threat

HSBC issues scam warning after fraudsters use ‘deplorable’ tactics to con victims

It’s time to light the match and burn your data

LAPSUS$ Hacking Group Has Targeted Massive Tech Companies, But Who Are They?

Massive data hack: TransUnion says at least 3 million South Africans impacted – this is the information that was stolen

Ransomware Can Encrypt 100,000 Files in Minutes

School district offering identity protection services to current, former students & staff after December ransomware attack

What Is a SIM Swapping and How Do You Protect Yourself From It?


7 Suspected Members of LAPSUS$ Hacker Gang, Aged 16 to 21, Arrested in U.K.

Avast acquires SecureKey Technologies in authentication, identity management push

Cloud Automation Key to Future-Proofing Cybersecurity

Cybersecurity in the Data Center: New Political Developments Shape New Ways of Thinking in 2022—and Beyond

Email Incidents Reported by Ultimate Care, CareOregon Advantage, and University Medical Center Southern Nevada

EU and US Agree Deal to Reopen Seamless Transatlantic Data Flows

Experts Uncover Campaign Stealing Cryptocurrency from Android and iPhone Users

Feds Charge 4 Russians With Long-Term Energy Sector Attacks

Florida Sheriff’s Officer Charged with Cyber-Flashing Minor

Four Russians Charged with Dragonfly Attacks on Critical Infrastructure

Frosties NFT operators arrested over $1.1 million 'rug pull' scam

Google Bans This App That Stole Passwords Of 100,000+ Users Via Malware (How It Worked?)

Google Discovers Initial Access Broker Working With Russian Ransomware Gangs Including Conti and Diavol

Google: We stopped these hackers who were targeting job hunters and crypto firms

Honda bug lets a hacker unlock and start your car via replay attack

How the cloud skills gap is hindering business development

How to unlock a resilient hybrid work plan

Italian rail operator stops ticket sales after suspected cyberattack

Japanese Healthcare Firm ‘Doctors Me’ Exposed Images of 12,000 Patients

London DJ Surrenders £214,000 of Music Kit in Money Laundering Case

Major League Baseball Players’ Personal Data Stolen

‘Mustang Panda’ hacking group exploiting Ukraine invasion, COVID-19 to spread malware

New Zealand at increased risk from pro-Russian cyberattacks, hackers, CyberCX says

One in four Indian organisations experienced ransomware attack in 2021: Report

Police authorities still investigating cyberattack to 17 local hotels

Ransomware attacks rose 105% in 2021; a top concern for industry with Ukraine war increasing alarm

Reserve Bank of India (RBI) warns against phishing links, vishing calls, messages, emails and online scams

Samsung Electronics employee allegedly caught stealing trade secrets

Senate Committee Questions Pentagon’s Information Restrictions

Teen Mastermind Behind Lapsus$ Ransomware Attacks

The challenge of planning an IAM strategy for multi-cloud environments to avoid risk

These fake crypto wallets want to steal from iPhone and Android users

This Report Shows How 60% of Ransomware Can Be Prevented By Analyzing Precursor Delivery Techniques

Toyota to restart production in Japan after shutdown caused by cyberattack on supplier

TransUnion ransomware attack could give rise to civil claims

Trends, threats and techniques that comprised the 2021 threat landscape

UK police arrest seven individuals suspected of being hacking group members

UK police arrest seven teens allegedly connected to Lapsus$

UK Teen Arrested in Lapsus Crackdown

Understanding Cybercrime is Key to Defending Against it

U.S. Charges 4 Russian Govt. Employees Over Hacking Critical Infrastructure Worldwide

Utah Becomes Latest US State to Pass a Data Privacy Law

What is ransomware? Everything you need to know about one of the biggest menaces on the web


23-Year-Old Russian Hacker Wanted by FBI for Running Marketplace of Stolen Logins

A Better Grasp of Cyber Attack Tactics Can Stop Criminals Faster

Allerdale Council had 29 data breaches between 2015 and 2021

Brits Express Greater Concern Over Data Privacy as Cyber Attacks Soar

Chinese APT Hackers Targeting Betting Companies in Southeast Asia

CRM data breach leaks personal info tied to crypto accounts; Healthcare security breach affects 100K

Data Breach Alert: Wheeling Health Right, Inc

Enterprises are engaged in a powerful battle to retain cybersecurity staff

FBI: Ransomware hit 649 critical infrastructure entities in 2021

Hackers abriram 500 mil contas falsas com emails vazados no Brasil, diz estudo

How to Build a Custom Malware Analysis Sandbox

How will recent risk trends shape the future of GRC

HubSpot Data Breach – Major Cryptocurrency Companies Impacted

Indian Police Bust Online Helicopter Scam

Investment Fraud Surges as Cybercrime Losses Hit $7bn in 2021

ISACA: Two-Thirds of Cybersecurity Teams Are Understaffed

Learn Everything You Need to Know About Phishing Scams

Malicious npm packages target Azure developers to steal personal data

Mustang Panda hacking group takes advantage of Ukraine crisis in new attacks

New cyberespionage campaign targeting ISPs, research entities

Nokia: Botnet DDoS attacks are on the rise

Okta CSO: Lapsus Incident Was “Embarrassing”

Okta names contractor involved in Lapsus$ gang’s attack

Over 200 Malicious NPM Packages Caught Targeting Azure Developers

Ransomware demands and payments increase with use of leak sites

Ransomware is scary, but another scam is costing victims much, much more, says FBI

Ransomware Payments Hit Record Highs in 2021

Researchers Trace LAPSUS$ Cyber Attacks to 16-Year-Old Hacker from England

Russia, Ukraine hackers run ransomware ops

SaaS security is broken and is ready to be repaired - opinion

Someone Falls for Bored Ape Yacht Club (BAYC) Animation Phishing Website, Loses 3 BAYC NFTs Worth $900,000 in ETH

Strengthening third-party vendor programs in times of crisis and beyond

The biggest security threats to today’s businesses

The importance of ramping up digital forensics and incident response tech investments

These tax season scams aim to steal your passwords and bank details. Here's what to watch out for

This is how fast a ransomware attack encrypts all your files

Understanding DDoS Protection Options

US Indicts Russian Over "Carding Shop"

Vidar spyware is now hidden in Microsoft help files

What’s holding back zero trust implementation for device access?


Ataque hacker tira do ar sites de instituições públicas e privadas de Curitiba

As breaches soar, companies must turn to cloud-native security solutions for protection

China-linked GIMMICK implant now targets macOS

Chinese 'Mustang Panda' Hackers Spotted Deploying New 'Hodur' Malware

CIOs’ growing responsibilities going beyond IT

Companies should evolve their cybersecurity strategy in light of the Great Resignation

Cybersecurity compliance: Start with proven best practices

Fastest Ransomware Encrypts 100k Files in Four Minutes

FBI: Ransomware hit 649 critical infrastructure orgs in 2021

FBI warns of growing risks of Russia-linked attacks on US energy firms

Hackers steal from hackers by pushing fake malware on forums

Internet crime in 2021: Investment fraud losses soar

It’s official, Lapsus$ gang compromised a Microsoft employee’s account

Limitless bandwidth is not a panacea for mission-critical application QoE

Medical Service Leaks 12,000 Sensitive Patient Images

Microsoft and Okta confirm, detail impact of Lapsus$ gang’s attacks

Microsoft fixes Bluetooth issue causing Windows blue screens

New Mustang Panda hacking campaign targets diplomats, ISPs

New Variant of Chinese Gimmick Malware Targeting macOS Users

Okta Confirms 2.5% of Customers Impacted by Lapsus Breach

Okta names Sitel in Lapsus$ security incident impacting up to 366 customers

Over 200,000 MicroTik Routers Worldwide Are Under the Control of Botnet Malware

Sistema de ferrovias da Itália é alvo de ataque hacker

Ten notorious ransomware strains put to the encryption speed test

The challenges audit leaders need to look out for this year

This is how much the average Conti hacking group member earns a month

Three steps to secure an organization during mergers and acquisitions

Ukraine War Alters Security Landscape for Orgs, ERM Leaders

What is CWPP? (Cloud Workload Protection Platform)

Who are the Lapsus$ hackers and what do they want?

Windows 11 22H2 almost here as it moves exclusively to Release channel


Anonymous hacked Nestlè and leaked 10 GB of sensitive

Association for Savings and Investment South Africa (Asisa) warns investors about an increase in criminal cyber activity

Bad Actors Innovate, Extort and Launch 9.7M DDoS Attacks in 2021 According to the Latest NETSCOUT Threat Intelligence Report

Background Check Company Sued Over Data Breach

Biden issues warning about Russian cyber attacks

Cloud storage - Zero trust's last line of defense

Companies Failing to Protect Themselves Against Cyberattacks Even When Patches Exist According to New Survey

DEV-0537 criminal actor targeting organizations for data exfiltration and destruction

Evolving cyber threat tactics keeping businesses and individuals alike on their toes

Expanding threat landscape: Cybercriminals attacking from all sides

FIDO: Here’s Another Knife to Help Murder Passwords

Google Uncovers Initial Access Broker Behind Conti Ransomware Who Uses Phishing to Infiltrate Organization

Greece's public postal service offline due to ransomware attack

Hack on DeFiance Capital Founder Cheong Sees Him Lose $1.7M in NFTs and Crypto

Highly Evasive Adaptive Threats (HEAT) attacks: A new class of cyber threats organizations are not prepared for

How to Prevent the Overtaking of Your Personal Data

Hundreds of HP printer models vulnerable to remote code execution

Isle of Wight Council apologises for home education data breach

Lapsus$ gang says it has breached Okta and Microsoft

LAPSUS$ Hackers Claim to Have Breached Microsoft and Authentication Firm Okta

Lapsus$ hackers leak 37GB of Microsoft's alleged source code

Microsoft might be the victim of a data breach after a screenshot of an internal developer account was leaked

National Research Council uncovers 'cyber incident'

New Dell BIOS Bugs Affect Millions of Inspiron, Vostro, XPS, Alienware Systems

New Jersey Dialysis Center, Neurosurgery Practice Both Face Cyberattacks

Okta: Lapsus$ attackers had access to support engineer's laptop

Okta Investigates Possible Lapsus Breach

Russia Lays Groundwork for Cyberattacks on US Infrastructure – White House

Security Teams are Responsible for Over 165k Assets

Serpent Backdoor Slithers into Orgs Using Chocolatey Installer

Social engineering attacks to dominate Web3, the metaverse

Tech Leaders Must Raise Awareness And Build Trust To Close The Cybersecurity Gap

The not so scary truth about zero-day exploits

The top 5 things the 2022 Weak Password Report means for IT security

This is a BlackCat you don't want crossing your path

TranUnion hack not a surprise: Expert

UAE data from Acronis continues to show cyber protection is vital

US critical infrastructure operators should prepare for retaliatory cyberattacks

Venture Capital and Private Equity Firms: Why Data Security Matters

White House warns: Do these 8 things now to boost your security ahead of potential Russian cyberattacks


A New Exploit in a Wormable Module has been observed to Spread Rapidly

Asus routers have been targeted by this dangerous new variant of botnet

Attackers employ novel methods to backdoor French organizations

AvosLocker Ransomware Striking Critical Infrastructure Targets

Bad Dog—Everyone HATES This FIDO Passwordless Idea

CNAPP and the World of Cloud Security

'CryptoRom' Crypto Scam Abusing iPhone Features to Target Mobile Users

Cybersecurity Red Team 101

Dental Care Data Breach May Impact 1 Million Texans

Developer Sabotages Open-Source Software Package

DirtyMoe modules expand the bot using worm-like techniques

FBI warning: This ransomware uses DDoS to threaten victims. Here's what to watch out for

FBI warns of cyberattacks using AvosLocker ransomware

FTC Accuses CafePress of Data Breach "Cover-Up"

Grandes empresas de bitcoin têm dados de clientes vazados após ataque hacker

Hacker leaked a new version of Conti ransomware source code on Twitter

Hackers’ new target of stealing money from ATM machines

How to become a passwordless organization

How to run a security audit on AlmaLinux with Lynis

Italy’s data privacy watchdog investigates how Kaspersky manages Italian users’ data

Microsoft investigating claims of hacked source code repositories

New Backdoor Targets French Entities via Open-Source Package Installer

New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable

New Conti ransomware source code leaked

New Mexico Appoints Cybersecurity Advisor

New Serpent backdoor malware targets French entities with unforeseen method

NFT Fraud in the UK Soars 400% in 2022

NJ: East Windsor Township computer system hacked

Over 40,000 London Voters Have Data Leaked to Strangers

Payment fraud attack rate across fintech ballooned 70% in 2021

Purdue University’s CERIAS 2021 Security Symposium – Christian Moya’s ‘Protecting The Power Grid From Cyberattacks: A Machine Learning Based Approach’

Qualys platform study: Log4Shell, the menace continues

Ransomware as a Service – The Trending Business Model for Attacks

Serpent malware campaign abuses Chocolatey Windows package manager

South Korean DarkHotel Hackers Targeted Luxury Hotels in Macau

Suspected DarkHotel APT resurgence targets luxury Chinese hotels

Ukraine warns of InvisiMole attacks tied to state-sponsored Russian hackers

What makes a successful development team?

Why machine identities matter (and how to use them)

Why Machine Identity Management is Core to Cybersecurity

Why these 5 cybersecurity threats should concern any IT team

Windows zero-day flaw giving admin rights gets unofficial patch, again

Your Data, Their Gain: How Threat Actors Leverage Tax Season to Commit Fraud


75% of cyberattacks start with an email, reveals report

A Password Set To Password Leads To A $15 Million Ransom Demand

Anonymous: como hackers estão tentando minar Putin

Anonymous: How hackers are trying to undermine Putin

Anonymous leaked data stolen from Russian pipeline company Transneft

Apple’s TestFlight Used to Distribute Malicious Crypto Apps to iOS Users: Report

Australia pledges new powers for combatting online disinformation

Bitcoin miners breached Land Information NZ cloud service

Cyber Insurance Business Is Becoming Unviable

Cybersecurity in an interconnected world

EPP/EDR: What Is It and How Can It Help to Keep Your Organization Safe?

Filipinos must be responsible digital citizens to protect themselves from cybercrime, says advocacy group

Global Cybersecurity Ramifications from the War in Ukraine

Hacker stole $790,000 from owners of Rare Bears NFT collection

How to avoid Amazon scams — 5 tips you need to know

It just got easier for scammers to fool you with fake Chrome windows

Lapsus$ hack leaves NVIDIA in a tight spot

More Conti ransomware source code leaked on Twitter out of revenge

North Korea hackers stole $400m in cryptocurrency last year: report

Oil and gas industry scrutinized for weak cyber defenses

Perth mum and daughter win £2,500 pay out over council data breach

Ransomware puts organisations’ communications response in the spotlight

Standard virtual workspace security is improving but still not enough

The Growing Importance of The Cybersecurity Sector In Light Of The Russian-Ukraine War

TransUnion faces R10-million fine for hack

US National Rifle Association confirms 2021 ransomware attack: Report

We are headed for an ecosystem of cyber haves and cyber nots: Cisco advisory CISO

We are in the golden age of online fraud and internet scams

Western Digital app bug gives elevated privileges in Windows, macOS

Your co-workers have probably been involved in a data breach

NEWS: Março (13/03 - 19/03) - 11 Semana de 2022

Who am I...

Apenas um amante da tecnologia e da Segurança da Informação. Hacker ? Até que prove ao contrário não.. Profissional ? Sim.. Mais de 20 anos no mercado de Segurança da Informação sempre atuando em grandes Empresas.


Levantando a bandeira de que hacker é um profissional e especialista naquilo que ele faz. Hacker é um especialista, um pesquisador, um profissional como outro qualquer.

Skatista, músico e fotógrafo de instagram nas horas vagas....

Procurar por Tags
Pelo Mundo Afora...
  • Twitter Social Icon
  • LinkedIn Social Icon
bottom of page