Welcome to this week's Data Breaches Digest, a catalogue of links concerning Data Breaches and Cyber Security that were published on the Internet during the period between 23rd August and 29th August 2021.
29th August
5.8 Million Attacks Detected in Malware Disguised as PC Games
72% Of IT Execs Fear Trickle-down Of Nation State Tools And Techniques Will Hurt Their Business
A Guide to OWASP: Why it is Important for Mobile Security?
Australia: Agencies urged to educate staff more after reporting 34 data breaches
Bangkok Airways breach may have compromised customer data
Beware this new tactic targeting your home WiFi router
Chico State students are conflicted about university's vaccination exemption data breach
Cyberattacks, data loss among top management concerns today
Education sector sees 27% increase in attacks against organizations in the Middle East
Failing to Meet Cybersecurity Standards Can Have Legal Consequences for Companies
FortiGuard Labs Reports Tenfold Increase in Ransomware
Hackers Targeted Major Linux Flaws
In a huge privacy disaster, millions of Microsoft users’ sensitive information was put at danger
Japan has no time to waste in boosting its cyberdefenses
New Zealanders are exposing themselves to cybercrime, study shows
SIM Swapping Is a Growing Cyber Threat
Software as a Service (SaaS) Has a Problem: 40% of Data Access Unmanaged
Staying Secure: How to Ensure You Stay Safe Online
T-Mobile hacker used brute force attack to steal customers’ data
There's no easy fix to the worsening ransomware epidemic
Travel scams: If it looks too good to be true, it probably is
What to do if you are sent a suspicious scam email
Why you can’t ignore the hackers and data breaches, like one at T-Mobile
28th August
3 SSL VPN vulnerabilities disclosed in 2019 are still routinely exploited
40 Percent Of Businesses Feel Threatened By Cyber Incidents in 2021
Bangkok Airways reports cyberattack
Deepfakes in cyberattacks aren’t coming. They’re already here
FBI Issues Alert on Hive Ransomware
Filipinos urged to be on guard vs fraud when banking online
Hoosiers start receiving data breach letters from state
How to stop hackers reading your WhatsApp texts – three steps to take right now
In the first half of 2021, coin miners, web shells, and ransomware accounted for 56% of malware attacking Linux systems
Is Your Startup Safe From Phishing Emails?
Kaseya Releases Advisory on How to Mitigate Unpatched Zero-Day on ‘Unitrends’ Client
Linux is not invulnerable, here are some top Linux malware in 2021
LockFile Ransomware Bypasses Protection Using Intermittent File Encryption
Manifold Co-Founder On How To Keep NFTs Safe From Hackers
Microsoft Azure vulnerability uncovered great many cloud databases
Microsoft warns cloud customers of data vulnerability
Microsoft Warns of Widespread Phishing Attacks Using Open Redirects
Microsoft warns thousands of cloud customers of data vulnerability
NatWest customers served warning as man responds to 'horrible' scam email
Over 1 Million Gamers were exposed to Hackers by known Android game developers from China
Philippines: Banks step up campaign vs cybercrime, online fraud
Philippines: Cagayan de Oro (CDO) contact tracing app hacked; data secure
Ragnarok Gang shuts down activities and releases its decryption key
‘Ransomware will dominate the cybercrime landscape’
SANS Survey Finds Cyber Threats to OT Environments Continue to Rise, Severity Reaches All-Time High
T-Mobile CEO calls latest data breach ‘humbling,’ claims it’s committed to security
T-Mobile hack: Everything you need to know
T-Mobile hack: Here's what we know about the massive data breach
T-Mobile to Partner Up with Security Firm Mandiant, Apologizes for Massive Data Breach That Affected Millions
T-Mobile’s Security Is ‘Awful,’ Says Purported Thief
The Source Code of the ‘Phorpiex’ Botnet Was Made Available for Purchase
This email should not be opened! It’s difficult not to be duped by the new UPS delivery fraud
Top 6 Reasons Why You Need a Third-party Microsoft Office 365 Backup Solution?
Was your info exposed in the latest mobile breach? Here’s how to get free identity theft protection
Wawa Will Settle Its Lawsuit With Data Breach Victims for $9 Million
White House rallies private industry in cyber battle
Work from Home Increased Worldwide Phishing Attacks
27th August
5 Strategies for Cybersecurity in Supply Chain Management
5 Ways to Minimize the Cost of a Ransomware Attack
Abuse survivors to receive six-figure pay-out after data breach
Annke Video Recorder Vulnerable to Critical Remote Code Execution
Azure Cosmos DB alert: This critical vulnerability puts users at risk
Beyond the pandemic: Why are data breach costs at an all‑time high?
Boston Public Library discloses cyberattack, system-wide technical outage
Breach of PHI? California AG Reminds Companies of Potential State Notification Obligations
California Attorney General Calls Out Unreported Healthcare Data Breaches
Challenges organizations face when implementing zero trust architecture
Chinese Developer Exposes Data on Over One Million Gamers
CISA Recommends Risk Assessments on Service Providers
Cisco says it will not release software update for critical 0-day in EOL VPN routers
Cloudflare says it stopped the largest DDoS attack ever reported
Commissioners say no ransom paid after county computer system shutdown; some issues linger
Controlling the top cause of ransomware – social engineering
Cook County circuit clerk’s website may not be fully functional for a ‘few weeks’
Critical Azure Cosmos DB Bug Allows Full Cloud Account Takeover
Critical Cosmos Database Flaw Affected Thousands of Microsoft Azure Customers
Critical F5 bug could lead to wide range of security vulnerabilities
Critical IoT Camera Flaw Allows for Device Hijacking
Cryptojacking vs. Ransomware: What's the Difference? Explained
Data Breach Culprits: Phishing and Ransomware Dominate
Delving into the ‘how and why’ of the latest healthcare data breach
Employee Security Training and Endpoint Security
Empowering People to Make Meaningful Change to Security Behaviors
EPCOR USA Telephone Service Vendor Impacted by Ransomware
Experts React to the UK's Planned Divergence from GDPR
Fake DMCA complaints, DDoS threats lead to BazaLoader malware
Fake New Account Registration Fraud Rose 70% in H1 2021
FBI releases alert about Hive ransomware after attack on hospital system in Ohio and West Virginia
FBI Warns Businesses of New Hive Ransomware
FBI Warns of OnePercent Group Ransomware Attacks
FBI warns that Hive ransomware hackers are calling victims by phone
FIN8 Resurfaces with New Sardonic Backdoor
FIN8 Targets US Bank With New ‘Sardonic’ Backdoor
Google: Here's how our $10 billion investment will boost US cybersecurity
Herd Immunity Can Strengthen Cybersecurity
How To Combat Fraudsters As The Digital World Grows
Infusion Pump Vulnerabilities Point to Gaps in Medical Device Security
"Intruders" in the cloud: Microsoft warns "thousands" of Azure customers about potential exposure
Kaseya Issues Patches for Two New 0-Day Flaws Affecting Unitrends Servers
Lessons from ransomware attacks at Maine water-treatment facilities
Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years
Microsoft Cloud Databases Exposed
Microsoft Warns About a Widespread Phishing Campaign Which Abuses Redirector Links
Microsoft warns Azure customers of critical Cosmos DB vulnerability
Microsoft warns of widespread open redirection phishing attack – which Defender can block, coincidentally
Microsoft warns thousands of cloud customers of exposed databases
No easy fix to the worsening ransomware epidemic
Novel Ransomware Leverages ProxyShell Vulnerabilities
Parallels Offers ‘Inconvenient’ Fix for High-Severity Bug
Parents of teens who stole $1 million in Bitcoin sued by alleged victim
Phish tales
Phishing attacks increase as hackers take advantage of pandemic
Phishing Fraudsters Are Determined to Con You out of Your Money
Police warn about new ASDA scam
ProxyShell Exchange Exploitation Now Leads To An Increasing Amount Of Cobaltstrike Backdoors
Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor
Ransomware: It's only a matter of time before a smart city falls victim, and we need to take action now
Ransomware attack at Singapore eye clinic potentially breaches 73,000 patients’ data
Scam Alert: Avoid a Big Mistake in a New Job
Security alert: The threat is coming from inside your Docker container images
Security Is a critical component of digital equity that can’t be overlooked
ShinyHunters threat group makes their return
Stormont payout for institutional abuse victims over data breach
Strategies for establishing a zero-trust approach
Supply chain cyber security is only as strong as the weakest link
Survey reveals data breach fears as 90% of businesses see rise in cyber attacks
T-Mobile attempts to assuage subscriber fears in wake of historic data breach
T-Mobile CEO: Hacker brute-forced his way through our network
T-Mobile CEO apologizes for massive hack, announces cybersecurity deal with Mandiant
T-Mobile offers details of data breach that affected 40M
T-Mobile ‘truly sorry’ over user data breach of 50M customers
Tech giants pledge billions in cybersecurity investments amid White House push
The Coming AI Threats We Aren’t Prepared For
The compliance challenges of hybrid working
The T-Mobile data breach: A timeline
Underestimating a ransomware attack lead to leak of personal data of an entire Swiss town
What happened with the Accenture ransomware attack?
When to have the online-security talk with your kids
White House Cybersecurity Summit Should Be Followed by Regulation, Enforcement
Whitehat hackers accessed primary keys of Azure’s Cosmos DB customers
Why It's Time for Software Development to Wake Up
Winning the Cyber-Defense Race: Understand the Finish Line
26th August
7 Emerging Ransomware Groups Practicing Double Extortion
21-year-old tells Wall Street Journal (WSJ) he was behind massive T-Mobile hack
AI Is Slowly Outperforming Human-written Phishing Emails, and It Is a Cause of Concern!
Angry Birds Developer Accused of Illegal Data Collection
Arizona Cops Arrest Fugitive in Police Data Bribery Case
Ban ransomware payments, experts urge — but first plan for the consequences
Checking for misconfigurations isn’t enough
Chinese developers expose data belonging to Android gamers
CISA Issues Guidance on Ransomware Attacks
Cyber recovery strategy key when ransomware strikes
Cybersecurity Tips for Back to School Season 2021
Cybersecurity market soaring as threats target commercial and government organizations
Cybersecurity warning: Realtek flaw exposes dozens of brands to supply chain attacks
Data protection: UK to diverge from GDPR in post-Brexit overhaul of privacy rules
Emerging Ransomware Groups Getting into the Action
Employees participating in unethical behaviors to help an organization actually harm themselves
Envision Credit Union 'taking all appropriate steps' after possible cyber attack
F5 Bug Could Lead to Complete System Takeover
F5 Releases Critical Security Patches for BIG-IP and BIG-IQ Devices
FBI shares technical details for Hive ransomware
FBI warns of OnePercent ransomware gang – what you need to know
Google and mobile operating systems top list of privacy concerns, says Kaspersky
Hacker behind huge T-Mobile data breach says company’s security is ‘awful’
Healthcare Ransomware Attack Leads to EHR Downtime in Indiana
How to make email safe for business
Ireland: Survivors of historical institutional abuse to receive more than £100,000 for being exposed in data breach
Joe Biden and tech bosses talk cybersecurity after ransomware attacks
Kaseya patches Unitrends server zero-days, issues client mitigations
Man Sues Parents of Teens Who Hijacked Nearly $1M in Bitcoin
Many businesses continue to underestimate phishing threat
Microsoft and Google to invest billions to bolster US cybersecurity
Microsoft Breaks Silence on Barrage of ProxyShell Attacks
Nearly 73,500 patients' data affected in ransomware attack on eye clinic in Singapore
New variant of PRISM Backdoor ‘WaterDrop’ targets Linux systems
New Zealand: Remote Working Putting Organisations At Risk Of Ransomware
Porn Blocking App ‘BlockerX’ Failed to Secure Its User Database Properly
Ransomware!?! What is it and how to protect yourself!
Ransomware epidemic triggers major shift in cyber insurance market
Ransomware Prevention: Use These 10 Security Recommendation
Ryuk, REvil, and Clop – how to prevent ransomware in your organization
San Andreas Regional Center Sends Notices of a Data Breach to Beneficiaries
Singaporean eye clinic serving over 73,000 patients hit by ransomware
"Sophisticated" Cyber-Attack Compromises Patient Data at Private Health Clinic
Synology: Multiple products impacted by OpenSSL RCE vulnerability
Tech companies pledge billions to bolster cybersecurity investments
Tech companies pledge to help toughen US cybersecurity in White House meeting
The definitive guide to protecting your private information online
The Increased Liability of Local In-home Propagation
There’s No Easy Fix to the Worsening Ransomware Epidemic
This clever fake UPS email takes phishing scams to a whole new level
UK Cyber Security Council Opens Membership Application Process
Unpatched Microsoft Exchange servers hit with ProxyShell attack
VMware Issues Patches to Fix New Flaws Affecting Multiple Products
Vulnerability allowed hackers to tamper medication in infusion pump
Vulnerability management is facing three core problems: Here’s how to solve them
25th August
22% of cybersecurity incidents in H1 2021 were ransomware attacks
40% of SaaS assets are unmanaged, putting companies at risk for data leaks
A look into the tactics of a ransomware affiliate from the FBI
Apple Security: Hacker Steals Over 6 Lakh Nude Pics From iCloud With Phishing Links
APT41 Now Targeting Southeast Asian Entities With New Shellcode Loaders and Backdoors
Australia's 'hacking' Bill passes the Senate after House made 60 amendments
B.Braun Infusomat Pumps Could Let Attackers Remotely Alter Medication Dosages
Banking’s Digital Future Raises Security Concerns
Biden and tech bosses talk cybersecurity after ransomware attacks
Biden gets Google, Apple, others to join "whole-of-nation" cybersecurity effort
Businesses are premium ransomware targets as attacks spike in last year
California College Data Breach Exposes Student Requests for Vaccine Exemptions
California Man Hacked iCloud Accounts to Steal Nude Photos
Cisco Issues Critical Fixes for High-End Nexus Gear
Coinminers, web shells and ransomware made up 56% of malware targeting Linux systems in H1 2021
Critical F5 BIG-IP bug impacts customers in sensitive sectors
Critical Flaw Discovered in Cisco APIC for Switches — Patch Released
Cybercrime Losses Triple to £1.3bn in 1H 2021
Digital banking: Online frauds are on the rise; here's how you can stay safe, alert
Does your VPN block malicious websites? Here's why you should check
“Domino effect” as cyber insurers, brokers react to losses
Ethereum urges Go devs to fix severe chain-split vulnerability
Fake Apple Rep Stole 620,000 Photos in iCloud Phishing Scam
FBI report looks at the tactics of a ransomware affiliate
FIN8 cybercrime gang backdoors US orgs with new Sardonic malware
Five keys to mitigating today’s ransomware risks
FMWhatsApp Comes With ‘xHelper’ Trojan Embedded on the App
FortiGuard report: Ransomware grows tenfold
Forty per cent of Service NSW data breach victims not notified
Four ways SMBs can protect themselves from cybersecurity threats
Healthcare Phishing Scam Exposes PHI for 12K Patients in Utah
HMRC warning as 'high numbers' of tax scams surge to target Britons
How the pandemic delivered the future of corporate cybersecurity faster
How to Quantify the Actual Cost of a Data Breach for Your Own Organization
How to Spot Phishing
HVAC Industry Needs to Prevent Ransomware from Entering Systems
Hybrid work: How do you secure every identity on your network?
Lockdown gaming baddies: 5.8 million attacks detected over the past year
Malaysia: 73% of local organisations likely to experience data breach
Microsoft: ProxyShell bugs “might be exploited,” patch servers now!
Microsoft will add secure preview for Office 365 quarantined emails
Millions of Microsoft-stored data records mistakenly exposed
Millions of Microsoft-stored data records mistakenly exposed
New Hampshire town loses $2.3 million to overseas scammers
New SideWalk Backdoor Targets U.S.-based Computer Retail Business
New UPS Delivery Scam Fools Victim Through Suspicious Email - Here's How to Identify and Avoid it
Nigerian Threat Actors Skip Social Engineering, Make Direct Pitches to Employees To Install Ransomware on Company Networks
NSO Group facing renewed backlash after helping repressive Bahraini Government hack iPhones of politicians, activists
One-time pin ‘phishing scam’: Couple arrested
OnePercent ransomware group hits companies via IceID banking Trojan
Poly Network Recoups $610M Stolen from DeFi Platform
Preventing your Cloud 'Secrets' from Public Exposure: An IDE plugin solution
Ransomware attacks are up tenfold — here’s what businesses should know
Ransomware: These four rising gangs could be your next major cybersecurity threat
Revere Health Data Breach Impacts Cardiology Patients
REvil feels the heat, disappears out of sites, but return is likely
Scammers Use Forged AFP Arrest Warrants to Convince People Into Giving Them Money
Spear Phishing from Trusted Sites Bypassing Secure Email Gateways (SEGs) 65% of the Time
SteelSeries App Also Vulnerable to Elevation of Privilege on Windows
Take steps now to protect your organisation as ransomware as a service ramps up its DDOS attack offering
Tech CEOs to Discuss Cybersecurity with Biden Today
The Cyber War on our Critical Infrastructure and How to Win
Tokio Marine Insurance Singapore falls victim to ransomware cyberattack
Trend Micro survey forewarns MENA enterprises of customer record breach in 2022
US Media, Retailers Targeted by New SparklingGoblin APT
US State Department suffers cyberattack
Utilising a post-breach mindset for ransomware
What contractors should take from T-Mobile's '100 million people' cybersecurity breach
White House to tackle cyber challenges with Apple, IBM, insurance CEOs
White House turns to big tech CEOs to boost cyber security
Why are cybercriminals targeting smaller businesses instead?
Why you need to make Microsoft 365 a 24/7 security priority
Win10 Admin Rights Tossed Off by Yet Another Plug-In
You’ve Got Fake Mail: Pro-Palestinian Hackers Behind Massive Phishing Campaign Targeting Israelis Expecting Packages
24th August
$2.3 million theft via email is an example of a problem so common it has an acronym: BEC
4 most dangerous emerging ransomware threat groups to watch
38 Million Records Exposed from Microsoft Power Apps of Dozens of Organisations
73% of Malaysian organisations expect data breach that impacts customer data in next 12 months
80% of global businesses expect a breach of customer records in the next year
12,000 patients' records exposed in 45-minute email hack of Utah physicians group
Adverse security implications of enterprises network overprovisioning
APIs Create New Security Headaches
Apple, Microsoft and Amazon chiefs to meet Biden over critical infrastructure cyber attacks
Australia: Cyber premiums up 80% after 'unsustainable' losses
Average time to fix severe vulnerabilities is 256 days
B. Braun updates faulty IV pump after McAfee discovers vulnerability allowing attackers to change doses
Bahrain Government Caught Spying on the iPhones of Local Activists
Bahraini Activists Targeted Using a New iPhone Zero-Day Exploit From NSO Group
CEOs from Apple, Google and other Major US companies will attend a White House Meeting on Wednesday to discuss Ransomware attacks
Chase Bank leak spotlights customer data protection problem
China Passes New Data Privacy and Security Laws
CISA Releases Cybersecurity Guidance Against Ransomware
Coalition Of Big Names Coming Together To Fight Ransomware
Consumer Confidence in Data Security Plummets
Custom WhatsApp Build Delivers Triada Malware
Cyber Threats And Third-Party Management: A Risky Business
Cyber-thieves Scam New Hampshire Town Out of $2.3m
Cybercriminals Selling Access to Compromised Networks: 3 Surprising Research Findings
Cybereason vs. LockBit2.0 Ransomware
Data breach exposes California college student requests for COVID vaccine exemptions
Data breach exposes student requests for vaccine exemptions
Data breaches drop as cybercrime rises
Data Loss Prevention: What Is DLP and Why Is It Important?
Diavol ransomware sample reveals potential link to TrickBot gang
Diving Deeper Into the “Hive” Ransomware Modus Operandi
Department of Conservation's Mt Cook search and rescue base hit by ransomware attack
Don’t Let Ransomware Slip Through the Zero Trust Blind Spot
Eskenazi: Hospital Data Taken In Ransomware Hack
Fake OpenSea support staff are stealing cryptowallets and NFTs
FBI Issues Ransomware Group Flash Alert
FBI Warns About the “OnePercent” Ransomware Group and Its Tactics
Firmware: Beyond Securing the Software Stack
Four emerging ransomware groups take center stage
Fraudsters shifting focus away from financial services
Hackers target Microsoft email server vulnerabilities
Hackers targeting outdated versions of Linux in the cloud
Healthcare under attack: Another hospital system hit by ransomware
How do I select an automated red teaming solution for my business?
How One MSP Negotiated ‘In The Early Days Of Ransomware’
How to Make Your Remote Team Safe from Cyberthreats
How to Tackle Open Source Vulnerabilities While Closing the DevOps/SecOps Gap
How Will Identity Theft Evolve in the Upcoming Years?
Implications of the Alleged State Department Breach
Is Dentistry Now A Major Target For Cyber-attackers? Why And How?
Is T-Mobile’s data breach going to hurt subscriber metrics?
Is Your Healthcare Organization Following These Four Ransomware Best Practices?
JP Morgan Chase Again in the Throes of a Possible Customer Data Breach
Konni RAT variant targeting Russia in ongoing attack campaign
Linux cloud environments face an onslaught of malware attacks
Malicious WhatsApp mod infects Android devices with malware
Man pleads guilty to stealing naked photos from iCloud accounts
Mass Exploitation of Exchange Server ProxyShell Bugs
Microsoft Data Breach Exposed 38 Million Records Including COVID-19 Vaccination Statuses
Microsoft Data Breach Exposes 38M Records Containing PII
Microsoft Exchange Server LockFile Ransomware Targets Windows Domains
Microsoft Power Apps misconfiguration exposes data from 38 million records
Microsoft Power Apps Tool Exposed 38 Million Records by Default
Modified Version of WhatsApp for Android Spotted Installing Triada Trojan
More data breaches in Australia arising from ransomware
Never Truly Quiet On The ‘Western Front’
New zero-click iPhone exploit used to deploy NSO spyware
Nokia subsidiary reveals data breach following Conti ransomware raid
OnePercent ransomware group hits companies via IceID banking Trojan
Over a Third of Smart Device Owners Do Not Take Security Measures
Pegasus Spyware Uses iPhone Zero-Click iMessage Zero-Day
Poly Network Recoups $610M Stolen from DeFi Platform
Protect yourself against ransomware attacks
ProxyShell Exchange Server Flaw Getting Used for Ransomware Attacks
ProxyShell flaws being actively exploited
Ransomware activity surged 10x in June 2021
Ransomware gang's script shows exactly the files they're after
Ransomware Is Too Easy for Criminals; Let’s Make It Harder
Realtek SDK vulnerability exploitation attempts detected (CVE-2021-35395)
Researchers Warn of 4 Emerging Ransomware Groups That Can Cause Havoc
Schools attacked by ransomware ask parents to get in touch after losing all their contact details
Security and compliance still a challenge for container architectures
Severe vulnerabilities in appsec environments taking longer to fix
South Korea: Vaccination phishing scams increasing
SteelSeries software makes you Windows 10 admin with or without a real device
Summer Is Usually A Time To Relax - That’s Exactly What Hackers Are Hoping For
T-Mobile Business customers also hit by security breach
T-Mobile says data breach grows to 53 million customers
Tech Company CEOs Plan to Visit White House to Talk Cyber
Tech executives invited to meet President Biden on cybersecurity
Texan Social Media Scammer Defrauded 100 People of $650,000
The First Half of 2021 “Biggest Test of Industrial Cybersecurity in History”
The Importance of Being Cyber Resilient
The ransomware debate – to pay or not to pay?
The weird crypto theft case of Poly Network in a growing attack landscape
Three reasons why ransomware recovery requires packet data
Time to Fix High Severity Apps Increases by Ten Days
Tips for SMEs and Start-ups to Secure their Financial Data in the New Age
Tokio Marine Hit by Ransomware Attack in Singapore
Top Linux Malware? Not Ransomware, but Coinminers
U.S. Cybersecurity Agency Publishes Updates on Protecting Sensitive and Personal Information from Ransomware
US Signs Cybersecurity Agreements with Singapore
Use of scareware increasing to trick staff working from home
Waiting for a package? Don't click this phony UPS email
What Is Phishing And How Can You Protect Yourself?
What is the HIPAA Security Rule? Three safeguards to have in place
White House to tackle cyber challenges with Apple, IBM, insurance CEOs
Who’s Responsible for Cybersecurity in Industrial and Manufacturing Settings?
Why businesses must stop paying the ransom
23rd August
17.2 million request-per-second DDoS attack successfully thwarted
58% of IT leaders worried their business could become a target of rising nation state attacks
70 million AT&T customer records reportedly stolen in data breach
446 Australian breach notifications with 30% of system faults found after a year
AI-Fueled Deep Fakes Signal New Era of Cybercrime
APAC businesses unsure if cybersecurity defences are up to scratch
Are Start-ups The Solution To Cyber Threats?
AT&T Denies Data Breach
Atlas VPN Finds Ransomware Attacks Surge by Over 150% in 2021
Aussie ransomware data breaches on the rise
Banks warn against fraudulent practices following Banque Misr phishing incidents
Botnet targets hundreds of thousands of devices using Realtek SDK
Business email compromise attacks are getting out of hand
CISA warns admins to urgently patch Exchange ProxyShell bugs
CISA updates ransomware tips
Companies need to undergo a shift in cyber culture
Company Data Hoards Create Tempting Targets for Hackers
Considerations when deciding on a new SIEM or SOAR tool
Cost of a Data Breach Hits New High During Pandemic
Cyber attack continues to cause delays in Waikato DHB
Cyber breach one of biggest business risks in 2021
Cyber insurance market encounters ‘crisis moment’ as ransomware costs pile up
Cybercriminals Inducing Insiders to Plant Malware
Cybersecurity Begins with Reversing Years of Neglect
Cybersecurity is paramount for not for profits – we need to act now
Cybersecurity Threats to Remote Workers In the Pharmaceutical Industry
Data breach at California college exposes student requests for COVID vaccine exemptions
Data breach exposes Chico State student requests for vaccine exemptions
Data breach or data scraping? With over 38 million records up for grabs, IndiaMART has some answering to do
DemonWare Ransomware Group Attempts to Bribe Company Insiders
Did hackers pull off a maritime ‘Colonial Pipeline 2.0’?
FBI: OnePercent Group Ransomware targeted US orgs since Nov 2020
Federal Board of Revenue (FBR) data breach and its consequences
FortiGuard Labs Reports Tenfold Increase in Ransomware
FortiGuard Labs Research: Ransomware Activity Climbs 10X YoY
FortiGuard Labs Threat Landscape Report Highlights Tenfold Increase in Ransomware
Global ransomware payments skyrocket
Hacker gets 500K reward for returning stolen cryptocurrency
Hackers Leak Footage of Iranian Prison
Healthcare Organizations Mopping Up After Cyberattacks
How Construction Can Defend Itself from Ransomware Attacks
How Faulty Software Development Allows Ransomware to Thrive
How good is your cyber risk management strategy?
How the LemonDuck Malware Targets Businesses and How to Stay Protected
How To Enhance Your Phishing Training
How to secure your brokerage’s data
How to Stay Secure When Gaming Online
Hybrid working and guarding against sophisticated threats
IBM’s New Telum Chips Can Detect and Stop Fraud in Real-Time
Identifying the Hidden Threat
Industrial Control System (ICS) vulnerabilities disclosed in H1 2021 rose by 41%
Is Your Gaming Account Safe From Hackers?
Kaspersky estimated the volumes of fraud targeting potential crypto investors
Key email threats and the high cost of Business Email Compromise (BEC)
Lessons from Transnet: Is your business prepared for a ransomware attack?
LockFile Ransomware Encrypting Domains Via Exchange Hack
Massive Microsoft Power Apps data breach exposes personal details of 38 million people: American Airlines and NYC schools data including social security numbers and vaccination status among information leaked
Microsoft Power Apps misconfiguration exposes 38 million data records
Microsoft Spills 38 Million Sensitive Data Records Via Careless Power App Configs
MSP Survey: Kaseya Cyberattack Prompts More Questions, Concerns from Customers
Navigating Vendor Risk Management as IT Professionals
Nevada hospital ransomware attack could affect data of 1.3M patients
New Links Between Diavol Ransomware and TrickBot Gang Revealed
New LockFile Ransomware Variant Exploits "PetitPotam" Bug
New ransomware called LockFile targets Microsoft Exchange servers
Nokia subsidiary discloses data breach after Conti ransomware attack
Online Fraud is Now Refocusing on Gaming, Leisure and Travel Industries
Organizations Brace for Breaches as IT Pros Battle Fatigue
Pay Now or Pay Later: Don’t Procrastinate When It Comes to Preventing Ransomware
Pearson Will Pay $1 Million Fine For ‘Understating’ 2018 Data Breach, Misleading Investors
Phishing attack exposes medical information for 12,000 patients at Revere Health
Phishing campaign uses UPS.com XSS vuln to distribute malware
Phishing scam targets Hoosier high-school sports lovers
Poly Network Hacker Returns Remaining Funds
Protect Your Organization From Cyber Threats
Protecting citizen-facing staff from phishing starts with a people-first approach
ProxyShell Attacks Pummel Unpatched Exchange Servers
ProxyShell vulnerabilities actively exploited to deliver web shells and ransomware
Ransomware attacks doubled in frequency during pandemic
Ransomware group solicits employees to target corporations
Ransomware Groups Look for Inside Help
Ransomware pandemic is just beginning
Razer software bug lets anyone gain admin rights on Windows PC
Renner says he has not received notification from Procon about cyber attack
Research shows BlackMatter ransomware is closely acquainted with DarkSide
Researcher Releases ‘Razer’ Elevation of Privilege Exploit on Twitter
Researchers Detail Modus Operandi of ShinyHunters Cyber Crime Group
Retail sector became top target for ransomware and data-theft extortion attacks during the pandemic in 2020, Sophos
Risk management in the age of ransomware
Scammers target Australians relying on COVID-19 disaster payments
Student Who Scammed Victims With Fake Royal Mail Texts Is Jailed
T-Mobile Breach Now Affects 54.6 Million Individuals
T-Mobile Data Breach Impact Grows, Draws Class-Action Lawsuits
T-Mobile Experiences Profound Data Breach
T-Mobile Now Facing the Wrath of Its Customers as First Lawsuits Are Submitted
T-Mobile's 2021 cyberattack: 4 ways to protect your personal data after a breach
The impact of eCommerce fraud on retailers and shoppers
The key to mobile security? Be smarter than your device
The most important cybersecurity measures for HR
The new normal of cybersecurity: Ransomware, phishing and zero trust
The rise of ransomware within healthcare
The T-Mobile data breach: A timeline
Tokio Marine Insurance Singapore hit by ransomware attack
Top 5 cyber exposures tied to the rising use of international remote workforces
Top 15 Vulnerabilities Attackers Exploited Millions of Times to Hack Linux Systems
Top Cyber Security Threats to Organizations
Trend Micro Detected Nearly 13 Million Malware Events Targeting Linux-based Cloud Environments
Trend Micro's Linux Threat Report identifies the most vulnerable distributions and biggest security headaches
Twin Falls County, Idaho, Confirms Ransomware Attack
US military personnel defrauded into losing $822m through scams
US State Department Hit By Cyber-Attack
Warning: ‘Extremely Serious’ Microsoft Vulnerabilities Hacked By Ransomware Criminals
Who pays the ransom for NJ records taken by hackers? Taxpayers, and 'it's all preventable'
Why automated pentesting won’t fix the cybersecurity skills gap
Why automation is key to education’s cybersecurity problem
Why Do Developers Continue to Write Vulnerable Code?
Why MSPs must prioritise Cloud security
Why no one is safe from ransomware attacks
Why zero-trust models should replace legacy VPNs
Will AI/ML Solve the Cybersecurity Skills Gap?
Windows 10 Admin Rights Gobbled by Razer Devices
Zero-day vulnerability affects Cisco small business routers
Zero Trust Network Access (ZTNA): Secure remote access to protect your company from outside and inside threats