Editor's Message
Welcome to DBD. On March 8th we celebrated our 4th Anniversary and the 1st Anniversary of our PRiSM application, officially endorsed by the SANS Institute. Despite recent personal issues that have impacted the amount of time I have been able to dedicate to both projects, I have been doing my best to keep everything as up-to-date as possible, and I would like to take this opportunity to thank everyone for their patience and support whilst I navigate through this very difficult time. Stay safe. :)
Monday 28 February 2022
Data Breaches Digest - Week 09 2022
Welcome to this week's Data Breaches Digest, a catalogue of links concerning Data Breaches and Cyber Security that were published on the Internet during the period between 28th February and 6th March 2022.
6th March
5 Ways to Protect Your Email as Cybersecurity Concerns Grow
Adafruit discloses data leak from ex-employee's GitHub repo
Conti ransomware gang, which leaked ransomware victims’ data, has its own data leaked
Cyber attacks by Iran hackers on rise
Cyberrisk Management Tips for Businesses Amid the Russia-Ukraine War
Don't fall for the new validation tag scam
Email security bill of rights for a zero-trust world
Experts fear for Suffolk's cyber-security after Russian invasion of Ukraine
Fake apps, imposter websites and social media posts - red flags to watch to avoid scammers
Gmail alert: This email says it protects your PC but does the opposite - delete it now
Google makes important Workspace change to prevent phishing
Hackers claim to have discovered a large Samsung data breach, including encryption keys and source code
Hackers Threaten To Leak "Nvidia's Most Closely Guarded" Secrets
Hacking-as-a-Service has rendered cyberspace more vulnerable
How to avoid bidding on a scam auction
Navigate the unknowns of tomorrow in this must-read report for CISOs, CTOs, and CIOs
Opensea phishing scandal reveals a security need across the NFT and Digital Assets
Operational Technology (OT) Cybersecurity Concerns Are Increasing Across the Globe
Radware calls for companies to review their cyber security posture in light of current events
Ransomware may not be the ‘impossible problem’ for businesses
Safeguarding patient data is crucial for Pharmaceutical companies
Sea Transportation: Cyber Security Stumbles
SharkBot Banking Malware Spreading via Fake Android Antivirus App on Google Play Store
Small Business Cybersecurity Concerns Amid Russia-Ukraine Crisis
Solana Network Gets Hit with Phishing Attacks
T-Mobile Users Should Take Action After Data Hack, DC Attorney General Warns
The Washington State Department of Licensing has restored its website after 650,000 individuals data was leaked
Tips to ensure your information secure, as cybersecurity threats linger
Tips to protect yourself from cyberattacks with crisis in Ukraine
Trading Standards warning over scam Tesco emails
Ukraine Situation Drives New Cyber Attack Reporting Mandates
Washingtonians affected by 2021 T-Mobile data breach
Ways to avoid ransomware attacks
Why Hasn't Russia Launched a Major Cyber Attack Against Ukraine?
5th March
A Path Towards Shaping the Future of Zero-Trust
Avast Released Free Decryptor for HermeticRansom Ransomware to help Ukraine
Cyberattacks could be used to fund sanction-hit Russia's war machine
How to protect yourself against cyberattacks
Imperva mitigated a series of massive ransom DDoS attacks
Key Ways Your Business Can Suffer Due to Ransomware Attacks
Leaked stolen Nvidia cert can sign Windows malware
Malware now using NVIDIA's stolen code signing certificates
New Linux Kernel Cgroups Vulnerability Could Let Attackers Escape Container
NotPetya: the cyberattack that shook the world
Nvidia data breach exposes data of 71,000 employees
Opensea phishing scandal reveals a security need across the NFT landscape
Russia shares list of 17,000 IPs allegedly DDoSing Russian orgs
SharkBot malware hides as Android antivirus in Google Play
4th March
5 cybersecurity trends that will define 2022
5 steps to stay cyber smart
6 Biggest Scams That Ontarians Were Tricked By Last Year According To Provincial Police
7 Risk Management Insights for Social Engineering and Ransomware Threats
29K Wyomingites’ Data Exposed On Dark Web; Cyber Wyoming Warns Of Risks
64% of Companies Affected By Ransomware Had Obsolete Security Protocols, New Study Reveals
A Cyber Risk Management Primer: Identifying Risk, Vulnerability And Threat
A ransomware mitigation plan
Advice from Internet experts...Fake Facebook pages set a trap
Agencies in Humboldt County hit with phishing emails
Amazon: Charities, aid orgs in Ukraine attacked with malware
App Discovered on Google Play Found to be Data-Stealing Malware, Downloaded Over 10K Times
Ascension Michigan data breach may have exposed some patients' Social Security numbers
Authorities investigate ransomware attack in Fleetwood ASD
Both Sides in Russia-Ukraine War Heavily Using Telegram for Disinformation and Hacktivism
Bracing for State-Sponsored Ransomware and Cyberthreats in a World of Conflict
Bureau of Motor Vehicles (BMV) warning Ohioans about identity theft text scam
Carousell phishing scam! — At least 72 victims have fallen for it since January, over $109,000 lost
Centralia College Continues Recovering From Ransomware Attack
CISA warns organizations to patch 95 actively exploited bugs
Colleges warned as cyber threat from Russia increases
Companies Can't Just Train Their Way to More Secure Endpoints
Conti Ransomware Group Diaries, Part III: Weaponry
Cyber risk to increase amid Russian invasion of Ukraine
Cyber Security: 3 Legal Implications and Risk Management
Cyber threat 'absolutely real', says Cheshire East ICT boss
Cyber-Criminals Exploit Invasion of Ukraine
Cyberattacks on SMBs are increasing, will your business be ready?
Data Breach Alert: Monongalia Health System, Inc
Data Breach at Michigan Medicine Exposes Info of 3K Patients
Did Global Lockdowns Trigger A Cybercrime Boom?
Digital transformations require strategies for unique cyber vulnerabilities
Don’t get caught in criminals’ phishing lines
DORA's Global Reach and Why Enterprises Need to Prepare
Elon Musk warns of possible targeted attacks on Starlink in Ukraine
Energy scam warning: Beware of Eon phishing email, warns Which? as power bills soar
Equifax data breach: Consumers unlikely to benefit financially from final settlement
Facebook and Microsoft are the most impersonated brands in phishing
FBI Memphis Field Office Reminds Tennesseans About The Risk Of Ransomware
February ransomware attacks hit major enterprises
Federal Agencies Take Mitigating Steps To Protect Internet Infrastructure
First Nations Health Authority (FNHA) warns of ‘potentially malicious’ phishing attack on First Nations communities
Free HermeticRansom Ransomware Decryptor Released
Get patching now: CISA adds another 95 flaws to its known exploited vulnerabilities list
Global poll unearths alarming data protection levels
Hackers are being forced to pick sides in the Russia-Ukraine war
Hackers leak 190GB of alleged Samsung data, source code
Hackers Target Russia in Support Of Ukraine
Healthcare IoT, Medical Device Vulnerability Disclosures Skyrocket
Healthcare Organizations Report Email Compromises, Hacking Incidents and Other ePHI Exposures
Healthcare Sector Grapples With Legacy Devices, Patching Woes
Heightened alert for cybercrime: Dental practices should take steps to prevent threats
Heightened state of alert over cyber warfare threat, says new National Cyber Security Centre (NCSC) chief
Homework, bingo, and movies: Employees reveal bad 'remote work' habits
How Blockchain Could Revolutionize Cybersecurity
IBM Report Examines Cyberattack Trends of 2021
Imperva Thwarts 2.5 Million RPS Ransom DDoS Extortion Attacks
Imposters Are attempting to Trick Ukrainian Crypto benefactors using Phishing Websites and Fake benefactors Addresses
Increased Cyber Risk for Health Care Organizations Due to the Russia-Ukraine Conflict
Irish Healthcare System Requires More Than $100 Million To Recover From the Conti Ransomware Attack
Japanese beauty retailer Acro blames third-party hack for breach of 100k payment cards
Lapus$ Group Leaks Alleged Samsung Confidential Data
Linux Multi-Cloud Ransomware Attacks Expected to Increase
Log4j Forced a Cybersecurity Wake-Up Call
Log4j Vulnerabilities: Over 80% of Exploitation Attempts Originated in the U.S.
Maryland Weighs Measures to Enhance State, Local Government Cybersecurity
Massive Meris Botnet Embeds Ransomware Notes from REvil
Michigan Medicine Notifies Nearly 3,000 Patients Of Data Breach After Employee’s Email Compromised
Michigan Medicine officials say nearly 3,000 affected in data breach
MSPs see cybersecurity as both a challenge and an opportunity
Nearly All Cybersecurity Companies Expose AWS Assets
New Wiper Malware Used Against Ukranian Organizations
New York Attorney General Letitia James warns consumers impacted by T-Mobile data breach of potential identity theft
Nonprofit Organizations Beware: Is This a Legitimate Copyright Infringement Takedown Notice or a Phishing Scam?
Now's the time to protect your computer networks from cyberattack
Nvidia Data, Credentials Stolen in Cyberattack
Over 60% of SOC Analysts Are Planning to Quit Next Year
Perennial security challenges hampering organizations in achieving their security objectives
Proofpoint expert on why cybersecurity defenders must leverage a platform approach
Ransomware attackers begin to eye midmarket acquisition targets
Role of US agencies limited in protecting against Border Gateway Protocol (BGP) hijacks, attacks on internet architecture
Russia-Ukraine war exploited as lure for malware distribution
Russia-Ukraine War Increases Spillover Risks of Global Cyberattacks
Russia’s invasion kicks Senate into cybersecurity law mode
Russia's Ukraine Invasion: How Serious Is the Cybersecurity Threat to Businesses?
Russian invasion of Ukraine highlights need for cybersecurity at local level
Scam calls hitting global businesses – how do we steer clear?
Scammers Prey on Donations as a Result of Ukraine’s War
Security teams need a more defined strategy to combat ransomware – the modern form of digital extortion
Senate Passes Strengthening American Cybersecurity Act
Singapore to Establish Cyber Military Force
Slight Increase in Attacks on ICS Computers in 2021
State Bank of India (SBI) alerts customers about KYC fraud: Here are the details
Telegram becomes digital front in Ukraine – but beware
The Cyber Conflict Isn’t Limited to Ukraine
The most impersonated brands in phishing attacks
The rising cost of cyber insurance
These are the problems that cause headaches for bug bounty hunters
These old security vulnerabilities are creating new opportunities for hackers
This is how you should be securing your network
'Ticking time bomb': Russian ransomware attacks are coming. What small businesses should do right now
Tips for Healthcare Organizations to Prevent and Respond to Data Breaches
Toyota Group resumes production in Japan after major supplier hit by ransomware. Here are the series of events
U.S. Security Agencies Release Network Security, Vulnerability Guidance
U.S. Senate passes cybersecurity bill amid warnings of Russian cyberattacks
Ukraine: How to protect yourself against cyberattacks
Ukraine warns of new phishing campaign targeting officials, citizens
Understanding the PYSA Ransomware Attack
Universities need better protection from email-based cyber attacks
Vulnerabilities in Over 100k Medical Infusion Pumps
War in Ukraine Brings Out Scammers Trying to Exploit Donations
Watch out - that PayPal email could be a phishing attack
What is challenging malware analysis?
What is Ransomware Protection as a Service?
What Security Engineers Hate About SIEM
What to Do If You’re Hit by Ransomware
Why Average Americans Should Beware Russian Cyber Attacks
Why you should trust nothing and verify everything
3rd March
5 tips to protect your small business from ransomware
8 things to do right now to protect your business from Russia
75% of Tested Smart Infusion Pumps Vulnerable to Hacking
85% of companies experience at least one ransomware attack per year, study finds
A Business Owner’s Guide To Avoiding Data Breach
Accelerated Ransomware Attacks Pressure Targeted Companies to Speed Response
After Russia’s invasion of Ukraine, it's time to hunker down
AI-powered intelligent security makes the hybrid enterprise possible
American Medical Collection Agency (AMCA) Medical Lab Data Breach: Who’s Affected?
Are you the victim of a data breach? Here are 4 steps to protect your identity
Army of cyber hackers rise up to back Ukraine
Before you scan, make sure QR code isn't a fake
Boardroom does not see ransomware as a priority
China's top procuratorate warns against personal data breach
Conti ransomware gang dismantles infrastructure amid Ukraine row
Critical Patches Issued for Cisco Expressway Series, TelePresence VCS Products
Customer Data from the 2021 T-Mobile Data Breach Found on the Dark Web
Cyber-Attack on New York Ethics Watchdog
Cyber-attacks are inevitable: Prioritise data skills training to reduce risk
Cyberattacks in Russia-Ukraine conflict are so far ‘no more than a nuisance’
Cybercrime: A clear and present danger
Data Breach Alert: Bako Diagnostics
Data Breach Alert: DataHEALTH, Inc
Data Breach Alert: JDC Healthcare Management, LLC
Data breach may have exposed personal information of Oklahomans on disability aid list
Data Science in Cybersecurity: What you wanted to know
Data-stealing app found in Google Play downloaded thousands of times
December 2021 shows highest number of Phishing attacks
Decentralizing Cybersecurity Via DNS
Facebook, Microsoft were the top two impersonated brands for phishing attacks in 2021
Fake Amazon Emails sent by Hackers: How to prevent Phishing Scams
Fraudsters weave Scotland’s £24m web of cyber crime and despair
Free decryptor released for HermeticRansom victims in Ukraine
Hackers use phishing to swindle crores from potential EV buyers, dealers
Hackers Who Broke Into NVIDIA's Network Leak DLSS Source Code Online
Hacktivists, cybercriminals switch to Telegram after Russian invasion
Healthcare Company Mon Health Discloses Second Data Breach
HHS Issues Threat Warning to US Healthcare Sector
How AI protects machine identities in a zero-trust world
How Different Industries Can Approach Ransomware Protection
How HR can prepare for a cybersecurity attack — 'before it's too late'
How Telegram became Ukraine's biggest digital ally in the war
How The Cyber War Is Being Fought In The Russia-Ukraine Conflict
How the Senate’s new cybersecurity legislation could affect your business
How to protect against phishing attacks
Impostors Are Trying to Trick Ukrainian Crypto Donors via Phishing Websites and Fake Donation Addresses
Industrial Control System (ICS) vulnerability discoveries soar by 110% in four years
Kaspersky Discovers About 100,000 New Banking Trojans and Warns About Increasing Mobile Malware Sophistication
Latvia: Intensity of cyber attacks remains high
Legitimate DMCA Takedown Notice or Phishing Scam?
Log4Shell: Still out there, still dangerous, and how to protect your systems
Log4Shell flaw: Still being used for crypto mining, botnet building...and Rickrolls
Look out for identity theft and fraud crimes as tax season begins
Make sure that you don’t fall for this official-looking Google Forms phishing scam
Malware campaign impersonates Venture Capitalist (VC) firm looking to buy sites
Michigan Medicine data breach may affect health information of nearly 3,000 patients
Michigan Medicine data breach may have exposed some patients' health information
Microsoft finds FoxBlade malware on Ukrainian systems
Most Disclosed ICS Vulnerabilities are Low Complexity
Most MSP Customers Lack Incident Response Plans
Navigating data privacy in the higher education ecosystem
Nearly 75% of Infusion Pumps Affected by Severe Vulnerabilities
New report shows increase of ICS vulnerabilities in critical infrastructure
New Security Vulnerability Affects Thousands of GitLab Instances
New York State Office of the Attorney General (NY OAG) warns T-Mobile data breach victims of identity theft risks
No evidence of Russian involvement in Isle of Man cyber attack
NVIDIA cyberattack affects employee, company information
NVIDIA data breach exposed credentials of over 71,000 employees
Over 1.2 million customers affected by Hong Kong data breaches
Patient records exposed in data breach at Michigan Medicine
PayPal and Mastercard most impersonated in financial phishing schemes in 2021
Phishing attacks hit all-time high in December 2021
Phishing Campaign Targeted Those Aiding Ukraine Refugees
Predicting the future of AI and analytics in endpoint security
Preparing for Heightened Attacks in the Current Geopolitical Environment
Protect Your Association Amid Growing Concerns of Russian Cyberattacks
Protecting technology from hacking, malware amidst current events
Ransomware Attacks: What You Need to Know
Ransomware seen as No. 1 threat of financial organizations
Researchers Demonstrate New Side-Channel Attack on Homomorphic Encryption
Russia Denies Satellite Hacking and Warns of Wider War
Russia Releases List of IPs, Domains Attacking Its Infrastructure with DDoS Attacks
Russian cyberattacks are possible. Be prepared but not panicked
Scam emails, donation fraud surge in Canada as Ukraine crisis continues
Scams targeting Indian EV industry on the rise
Security researchers warn of phishing attempts against officials helping refugees
'Several combinations of social engineering' used during cyberattack on camera maker Axis
Singapore: At least 72 victims in phishing scam on Carousell since January, losing over S$109,000
Singapore to launch digital defence agency to counter growing cyber threats
Singapore to set up digital intelligence unit as cyber threats intensify
Some 'Smol' NFTs returned after Treasure marketplace exploit leads to theft
The 5 Critical Cybersecurity Steps Construction Companies Should Be Taking
The biggest threat to ICS/OT is a lack of prioritization
The Top 5 Russian Cyber Threat Actors to Watch
These Are the Vulnerabilities That Russian APTs and Russia-Affiliated Ransomware Groups Have Exploited
Top 3 Reasons Multi-Channel Phishing is a Real and Present Danger Now
U.S. Senate Passes Cybersecurity Bill to Strengthen Critical Infrastructure Security
Ukraine hit by destructive attacks before and during the Russian invasion with HermeticWiper and IsaacWiper
Ukraine says local government sites hacked to push fake capitulation news
Ukrainian military emails hacked to phish and steal refugee data
Universities Should Prepare for Attacks
US legislation brings mandatory cyberattack and ransomware reporting one step closer
Vade Releases 2021 Phishers' Favorites Report
Vulnerability Exploit Attempts Surge Tenfold Against Ukrainian Websites
Warning to lock Microsoft and Outlook accounts down NOW – even if you hardly use them
We're all still using the same passwords, even after they've been breached
What business leaders need to know — and do — about zero-trust security
What is identity theft and how you can protect your personal data online
What You Need to Know About Cloud Email Security
What’s Next for Ransomware?
Who's Actually Behind the Cyberattacks Hitting Ukraine?
Why Banks Should Be More Worried About Security
2nd March
4 tips for launching a simulated phishing campaign
5 Cybersecurity Tips for Small Business Owners
5 insights into cybersecurity for development of a successful company
$5.9 billion lost due to fraud in 2021
10 Tips for Recovery From Ransomware Attacks
20 percent of organizations have had significant impacts relating to Log4j
92% of Australian orgs hit with phishing attacks in 2021
All You Need to Know About NIST List for Password Guidelines
API attacks increased 681% in the last 12 months
As Worries Grow Around Russian Cyberattacks, Update Your Operating Systems
Attacks abusing programming APIs grew over 600% in 2021
Bad actors are becoming more successful at evading AI/ML technologies
Belarus may be funding cyberattacks to disrupt refugees fleeing Ukraine
Belarus-linked cyber attacks aim to disrupt Ukraine refugee operations
Biden administration remains 'on guard' for Russian cyberattacks amid war in Ukraine
CMA CGM raises cyber threat risk level
Conti cybergang gloated when leaking victims’ data. Now the tables are turned
Conti Ransomware Decryptor, TrickBot Source Code Leaked
Conti Ransomware Group Diaries, Part II: The Office
Conti ransomware group’s source code leaked
Conti, Karma Ransomware Groups Target 1 Healthcare Org Simultaneously
Cybersecurity’s Evolution Through 2022
Data breach at Oklahoma Department of Human Services may have leaked people's personal information
Daxin: A Chinese-linked malware that is dangerous and nearly impossible to detect
DDoS attackers have found this new trick to knock over websites
Education Providers Face Challenges With Growth in Cyber Threats, Insurance Costs
Electric Vehicle (EV) industry is the new target of phishing campaigns
Five tips to combat cyberattacks amidst a land war
Flawed Encryption Feature Affected 100M Samsung Galaxy Phones
Get ready for security in the age of the Extended Internet of Things, says Claroty
Ghostwriter Group Targets NATO Refugee Effort
Hackers Begin Weaponizing TCP Middlebox Reflection for Amplified DDoS Attacks
Hackers Imitating Popular Metaverse Projects Are Targeting Novice MetaMask Users
Hackers sanctioned by Ukrainian government target Russia’s railways and power grid with cyber attacks
Hackers Try to Target European Officials to Get Info on Ukrainian Refugees, Supplies
Hartford Steam Boiler Inspection and Insurance Company (HSB) Survey Finds EV Security Fears
HHS Warns of Potential Threats to the Healthcare Sector
HIPAA Violation Reporting
How companies can limit a cyberattack like Expeditors
How much do different generations trust their mobile devices’ security?
How to keep your medical device IP safe from cyber attacks
How to recover from a ransomware attack
Huge 2021 T-Mobile Data Breach Still Causing Problems for Montanans
Ignoring US Cybersecurity Vulnerabilities No Longer an Option
Instagram phishing emails: What they look like and how to spot them
Insurance giant AON hit by cyberattack
Insurer Aon falls victim to a cyber attack
Is Your Cyber Insurance Keeping Up With the Times?
Japan's government urges firms to strengthen cybersecurity
Less than a quarter of directors see ransomware as a top priority
Log4shell exploits now used mostly for DDoS botnets, cryptominers
Mon Health Reports Breach Soon After Phishing Incident
More Details On The New FBI Task Force Responsible For Crypto Crimes
More than 68k West Virginians impacted by massive data breach
Multifactor Authentication Is Being Targeted by Hackers
NATO countries' refugee management may have been targeted by Belarus-linked hackers
New research reveals cyber attackers are actively targeting OT/ICS environments
Nvidia Admits Hackers Stole Employee and Internal Data
Nvidia confirms data breach as hackers make additional demands
Officials tighten cybersecurity measures amid potential threats from Russia; Here’s how to protect yourself
Only 23% of board members consider ransomware their top priority
Open an email, open a door for cyberattack: Here’s what your company should watch for
Over 100,000 medical infusion pumps vulnerable to years old critical bug
Over-confidence in ransomware and other cyber security protections seen in new survey
Paying a Ransom Doesn’t Put an End to the Extortion
Pennsylvania Attorney General’s comments raising questions about status of investigation into contact tracing data breach
Phishing attacks target countries aiding Ukrainian refugees
Police warn of 'sophisticated' fake NHS Covid scam costing people thousands
Proposal for industries to report big cyberattacks, ransomware payments wins Senate approval
Ransomware attacks are complex — preventing them isn’t
Ransomware infections top list of the most common results of phishing attacks
Ransomware Protection: Who’s Responsible for What?
Ransomware with a difference: “Derestrict your software, or else!”
Rising Phishing Scams Targeting the Indian Electric Vehicle Industry
Russia-Ukraine Conflict: Ransomware Updates & Cybersecurity Consequences
Russia-Ukraine Conflict Could Push Major Cybersecurity Legislation Past Finish Line
Russia-Ukraine escalation means shields up at U.S. hospitals
Russia-Ukraine war: After HermeticWiper, a second malware called IsaacWiper observed
Russian Ransomware Attacks on Ukraine Muted By Leaks, Insurance Woes
Russian space agency says hacking satellites is an act of war
Russian-Themed Phishing Emails Target Microsoft Users
Salt Security Survey Surfaces API Security Weaknesses
Scam Alert: Tedinad.com and Helenabl.com
Security leaders want legal action for failing to patch for Log4j
Senate passes bill to mandate reporting of cyberattacks
Senate passes cybersecurity act forcing orgs to report cyberattacks, ransom payments
So I’ve been hit with Ransomware...now what?
Software Defined Perimeter (SDP) solutions are true Zero Trust Network Access (ZTNA) solutions: They trust no one
State Department of Licensing site back online after data breach
Strix cyber-attack not linked to Russian state
Successful phishing attacks were up in 2021
Swiss Bank Requests Destruction of Documents
TeaBot Android Banking Trojan continues its global conquest with new upgrades
TeaBot Trojan Haunts Google Play Store, Again
Terramaster NAS servers also under DeadBolt attack (firmware update released)
The 20 most common passwords leaked from data breaches — did yours make the list?
The importance of a zero-trust model for hybrid working
The Rise of VR and the Transformation of the Cybersecurity Capability
ThrottleNet Reveals How to Avoid A Ransomware Attack
Toyota to resume Japan production after supplier cyberattack
UK Organisations at Risk of Cyber Attacks After Ukraine Invasion
Ukraine government, military sector record 196% increase in cyber attacks amid war
Ukraine invasion heightens contractors' risk of cyberattack
Ukrainian sites saw a 10x increase in attacks when invasion started
Ukraine war sanctions could spur Russian cyberattacks on U.S., expert warns
Warning: Hackers Are Targeting The Ukraine Refugee Crisis
Weaponized Links and Attachments Being Used to Install Malware
What happens during a ransomware attack: Understanding stages of targeting and response
What is Cloud Security? Why is Cloud Security Mission-Critical?
What Is Moonbounce Malware and How Does It Work?
What is Phishing as a Service (PhaaS)?
What You Need To Know About Ransomware
Why Hasn't Russia Launched a Major Cyberattack on Ukraine?
Why You Should Be Concerned About Ransomware
Wiperware (pseudo ransomware) used in Ukraine cyberattacks
Your Identity May Be On Dark Web
1st March
3 Cloud IAM Security Questions You Must Be Able to Answer
3 reasons why no-code automation is vital to security teams
8 Non Fungible Token (NFT) Scams to Avoid
$16 billion freight forwarding firm “Expeditors” still offline after crippling hack
85% of companies experience at least one ransomware attack per year
93% of orgs are challenged by malware analysis
100 million Samsung phones affected by encryption weakness
2022 Cybersecurity Forecast: The Threat Landscape & Protecting Your Organization
A Primer on Healthcare Cybersecurity in 2022
A Sophisticated Phishing is Now Targeting Metaverse Users Using MetaMask
A storm brewing in the clouds?
American Dental Association (ADA) advises dentists to be on alert for internet security risks
Americans are at higher risk of Russian cyberattacks after Ukraine invasion: What you should do right now
Analyzing Cyber and Influence Operations in the Russia-Ukraine Conflict
Apps, devices and workloads provide an ecosystem cornerstone for zero trust growth
Australian Cyber Security Centre (ACSC) warns Australian businesses to prepare for a probable Russian cyber attack
Australian Cyber Security Centre (ACSC) warns businesses to defend themselves against Russian cyber attacks
Avast Threat Labs warns against joining in DDoS attacks in aid of Ukraine
Belgium 4th in world for cybercrime
Big Tech enters fight against Russia's multi-pronged cyber offensive
Brand is the new perimeter: Cyberattacks involving brand abuse increase
Bridgestone still struggling with plant closures across North America after cyberattack
Caught in the Cyber Blast Radius
China-linked Daxin Malware Targeted Multiple Governments in Espionage Attacks
Coalition Releases 2022 Cyber Claims Report, Detailing Surge in Ransomware
Companies Were Barraged By Phishing Attacks In 2021, Study Says
Content filtering devices abused for 65x DDoS amplification
Conti chat logs leaked as ransomware gang sides with Russia
Conti Encrypts Karma Ransom Note in Same Victim Network
Conti Ransomware Gang's Internal Chats Leaked Online After Siding With Russia
Conti Ransomware Group Diaries, Part I: Evasion
Conti Ransomware source code leaked by Ukrainian researcher
Conti ransomware source code, documentation leaked
Controversial conveyancer hits back at 'forgotten stamp duty' claim
Critical Bugs Reported in Popular Open Source PJSIP SIP and Media Stack
Critical Security Bugs Uncovered in VoIPmonitor Monitoring Software
Crypto Frauds And Ransomware, The New Arsenal In Ukraine Russian War
Crypto scams are on the rise...How to avoid getting trapped
Cyber attacks against the BBC increase 35% in two years
Cyber threats to U.S. corporations, infrastructure loom amid Russian invasion of Ukraine
Cyberattacks in Ukraine: New Worm-Spreading Data-Wiper With Ransomware Smokescreen
Cyberattacks in Ukraine Soon Could Spill Over to Other Countries
Cyberspace and intelligence: Threats to intelligence, business and personal data will increase in 2022
Data Breach Alert: Gitterman Wealth Management, LLC
Data Breach At DHS May Have Compromised Thousands Of Peoples' Information
Daxin Espionage Backdoor Ups the Ante on Chinese Malware
Destructive “HermeticWiper” malware strikes Ukraine
Does war mean your cybersecurity is at greater risk?
Don’t rely on your Storage & Backup Vendors for Security
Enterprise Malware Analysis Efforts are Lacking
Enterprises Need To Prepare for Broader Cyberwar
Feds Warn Health Sector of Ukraine-Russia Conflict Threats
Four Healthcare Providers Hit with Ransomware Attacks
Google's Threat Analysis Group (TAG) removes fraudulent 'influence' operations linked to Belarus, Moldova, Ukraine
Hackers interrupt Catholic charity’s online press conference on Ukraine
Hacking attacks launched across Europe as internet activist group trolls Putin
'Help Ukraine' crypto scams emerge as Ukraine raises over $37 million
Here’s Why Cybersecurity is the New Normal
Holidaymakers warned of rising number of travel scams
How Attackers use Typosquatting Domains for BEC and Ransomware Attacks
How Board Members Can Address the Cyber Risk Crisis
How Rogue and Zombie APIs Expand Your Attack Surface
How the 3G sunset affects enterprise security
Hundreds of eBike phishing sites abuse Google Ads to push scams
In The Fight Against Cyberattacks, It's Time To Collaborate To Improve Defenses
Intelligence, information warfare, cyber warfare, electronic warfare – what they are and how Russia is using them in Ukraine
IoT security is foundational, not optional
Is It Safe to Shop Online on Public Wi-Fi While Using a VPN?
Kirklees council admits ‘massive’ breach of Unison president Paul Holmes’s data
Lack of visibility plaguing ICS environments
Leveling The Playing Field Against Adversaries: What Organizations Need To Know About Low-Code Security Automation
List of data breaches and cyber attacks in February 2022 – 5.1 million records breached
Logan Health reports data breach
Majority of successful ransomware attacks feature double or triple extortion tactics
Microsoft Accounts Targeted by Russian-Themed Credential Harvesting
Microsoft Finds FoxBlade Malware Hit Ukraine Hours Before Russian Invasion
New SANS Research Reveals Cyber Attackers are Actively Targeting OT/ICS Environments: Critical Systems are at High Risk and Demand Priority from IT Security
New Technology Will Make Cyber Attacks Easier to Detect
New worm and data wiper malware seen hitting Ukrainian networks
Nvidia Confirms Data Breach From Ransomware Attack
NVIDIA confirms data was stolen in recent cyberattack
NVIDIA says employee credentials, proprietary information stolen during cyberattack
Nvidia says employee, company information leaked online after cyber attack
Nvidia says hackers are leaking company data after ransomware attack
Office for Civil Rights (OCR) Director Encourages HIPAA-Regulated Entities to Strengthen Their Cybersecurity Posture
Office for Civil Rights (OCR) Director Urges Healthcare to Prioritize Cybersecurity This Year
Pay More, Get Less: Cyberinsurance Now A Nightmare For Law Firms
Prepare Your Team And Plan Now For Ransomware Attacks
Quinnipiac University raises cybersecurity concerns amid war in Ukraine
Ransomware Attackers Begin to Eye Midmarket Acquisition Targets
Ransomware Continues to Hinder 85% of Organisations, but UK Leads the Way in Refusal to Pay Hackers
Ransomware Cyberattacks Targeted Manufacturing to “Fracture” Global Supply Chain
Ransomware gangs use cloud, remote work to target firms, with 43% reporting attacks since 2020
RCE Bugs in Hugely Popular VoIP Apps: Patch Now!
Reality Winner's Twitter account was hacked to target journalists
Research Finds Cyberattackers Actively Target Industrial Operations
Russia Ukraine War: advice to follow in the event of a cyber attack in France
Russian cyber attacks against US banks increasing: sources
Russian ransomware attacks on Ukraine muted by leaks, insurance woes
Russian-based phishing attacks increased eight-fold since February 27
Schneider Relay Flaws Can Allow Hackers to Disable Electrical Network Protections
Second New 'IsaacWiper' Data Wiper Targets Ukraine After Russian Invasion
Securing Distributed Workspaces
Security researchers spot another form of wiper malware that was used against Ukraine's networks
Serverless Applications Pose Unique Challenges for Security Testing
Should You Pay Ransomware Demands?
South Africa ranks in top 10 countries with most cybercrime victims
State Bar of California Investigates Data Breach
Suspected Ransomware Cyber Attack Disrupts Expeditors International’s Logistics Operations Worldwide
Talking about cyber attacks will boost security, says expert
Tampa Bay cybersecurity firms on alert as Russia-Ukraine fight raises threat
TeaBot Android Banking Malware Spreads Again Through Google Play Store Apps
TeaBot malware slips back into Google Play Store to target US users
The importance of balancing security requirements and employee user experience
The Rise of Cybercrime – An Overview
The Top Security Threats Of 2022
This is what happens when two ransomware gangs hack the same target at the same time
This stealthy and 'most advanced' malware burrows deep into networks to steal data
Three Ways to Defeat Ransomware
Toyota Halts Production Across Japan After Ransomware Attack
Toyota halts production after cyberattack on supplier
TrickBot backend source code leaked
TrickBot Malware Gang Upgrades its AnchorDNS Backdoor to AnchorMail
Two Separate Ransomware Groups Attack One Healthcare Network
Types Of Computer Malware
Ukraine Hit with Novel ‘FoxBlade’ Trojan Hours Before Invasion
Ukraine is building an 'IT army' of volunteers, something that's never been tried before
Universities need to start taking cybersecurity seriously
Viasat Attributes Outage to "Cyber Event"
What Are the Benefits of Adopting the Cloud in Industrial Cybersecurity?
What can healthcare organizations do to repel ransomware attacks?
Why it makes sense to evolve from reactive to proactive cybersecurity
Why Multi-Factor Authentication Isn’t Enough To Secure Enterprises
Why Ongoing Vulnerability Assessments Are Key to A Sound Security Posture?
Why Ransomware Keeps Growing — and What Businesses Can Do About It
Why the cyber ‘incident’ at a large wind turbine manufacturer is bad news
Why the Shifting Nature of Endpoints Requires a New Approach to Security
‘Zero Trust Doesn’t Have To Be A Heavy Lift’
28th February
50% of employees use unauthorised file services for work
100 Million Samsung Galaxy Phones Affected with Flawed Hardware Encryption Feature
260,000 confidential attorney discipline records published after data breach, State Bar of California says
An Olympic Effort? Ensuring Security In A Rising Threat Landscape
Anonymous hacks Russian TV channels & EV charging station with pro-Ukraine messages
Another new malware has popped out and is taking over many social media accounts
Anti-Putin hackers escalate cyber battle against supporters of Russian government
As data breach notifications rise, so does organisation accountability
As the Ukrainian crisis escalates, here are seven ways security leaders can take action
As Ukraine War Rages, Conti Ransomware Gang Throws Support Behind Russian Government
Australian orgs face mounting threats of data loss
Authorization is bridging the gap between security and IAM
Axis Communications shares details on disruptive cyberattack
Businesses warned to check cyberattack defenses amid Russia tensions
Children, teens more vulnerable to mobile threats
Chinese cyberspies target governments with their ‘most advanced’ backdoor
CISA adds recently disclosed Zimbra bug to its Exploited Vulnerabilities Catalog
CISA and FBI warn of potential data wiping attacks spillover
CISA Warns of High-Severity Flaws in Schneider and GE Digital's SCADA Software
CISA, FBI Advise Vigilance as Ukraine Conflict Continues
Cloud security is too important to leave to cloud providers
Congress should prioritize data privacy protections
Construction industry identified as number one target for cyber criminals
Conti Group Suffers Massive Data Breach
Criminal Whales Hold $25 Billion In Crypto Assets: Chainalysis Report
Crypto scams are bilking investors out of billions, here are 4 to watch out for
Cryptocurrency Frauds And Ransomware: The New Face of Ukraine-Russia Conflict
Cyber Attackers More Dangerous, Destructive: How MSSPs Can Intercede
Cyber expert warns of potential identity theft risks working from home
Cybercrime getting more destructive, remote workers in the crosshairs
Cyberinsurers Key to Combating Ransomware
Cybersecurity: The Importance of Protecting Sensitive Information
Data Breach Alert: BluePearl Specialty + Emergency Pet Hospital
Data Breach Alert: St. Augustine College
Deep Instinct 2022 Threat Landscape Report Finds 125% Increase in Threat Types and Novel Evasion Techniques
Digital banking needs beefed-up security to preserve trust
England’s Hospitals Told To Boost Cybersecurity Amid Russia-Ukraine Conflict
Experts Warn of Cyberattacks on U.S. Banking, Infrastructure
Firms should start building quantum-ready data security 'by end of 2022'
FortiGuard Lab Reports Ransomware Not Slowing; Continues to be Relentless & Destructive
Hackers to NVIDIA: Remove mining cap or we leak hardware data
Hacking group leaks Nvidia data following alleged ransomware attack
Half of Employees Use Unauthorized File Services to Complete Work
Health Care Organizations Must be Prepared for Cyberattacks
Here’s how cybercriminals are using cryptocurrency as a scamming tool
Houston Health Department Suffers Healthcare Data Breach
How Biden’s National Security Memo Bolsters US Cybersecurity
How prepared are organizations to face email-based ransomware attacks?
In a time of war, it’s important to stay secure
Infiltrating the Dark Web for Threat Intelligence Collaboration
Instagram scammers as busy as ever: passwords and 2FA codes at risk
Insurance giant AON hit by a cyberattack over the weekend
Is your firm at risk of cyber attacks following Russia’s invasion of Ukraine?
IT decision makers concerned about multiple-extortion ransomware attacks
It’s Elementary: Measures that Educational Institutions Should Take to Prepare for Ransomware Attacks: Part 1
Leveraging mobile networks to threaten national security
Logan Health reports data breach
Manufacturing is the most targeted sector by ransomware in Brazil
Manufacturing under ransomware attack in 2021
Medtech, hospitals on alert for cyberattacks after Russia's invasion of Ukraine
Meta: Ukrainian officials, military targeted by Ghostwriter hackers
Meta and Twitter block disinformation campaigns targeting Ukraine amid phishing warnings
Meta Squeezes Russian State-Controlled Media Platforms
Microsoft: Ukraine hit with new FoxBlade malware hours before invasion
Microsoft finds FoxBlade malware on Ukrainian systems, removes RT from Windows app store
Microsoft says it informed the Ukrainian government about cyberattacks
Microsoft warning: Some files might not be deleted when you reset a Windows PC
Moscow Exchange Downed by Cyber-Attack
MSPs Are Bracing For Increase In Cyberattacks In Wake Of Russia Invasion of Ukraine
NATO Official Cites Collective Defense Clause Will Be Triggered If a Cyberattack Hits an Alliance Member
Nvidia Appears to Brush Off Ransomware Attack
Nvidia breach seen as ransomware attack unconnected to Ukraine
Phishing Attack in Ukraine Could Be Prelude to Disinformation Campaign
Phishing attacks dominated threat landscape in 2021
Phishing scams grow more sophisticated
Preparing for Cyberattacks and Limiting Liability
Ransomware anatomy: Dual cyberattacks on provider call for vulnerability review
Ransomware attacks fall but new threats appear
Ransomware sneaks in with remote workers and cloud-based IT says CyberRisk Alliance survey
Reborn of Emotet: New Features of the Botnet and How to Detect it
Report identifies phishing, ransomware attacks as most significant security incidents for healthcare
Rising threats on Critical Infrastructure amidst the Ukraine crisis
Russia Could 'Absolutely' Lash Out at US Through Cyber, Lawmaker Warns
Russia Invasion of Ukraine Poses Grave Threat To MSPs
Russia may retaliate with cyber attacks
Russia vs Ukraine - The War in Cyberspace
Russia’s War with Ukraine Puts Banking on High Alert for Cyberattacks
Russian State Media Hacked to Show Casualty Numbers for Russian Soldiers in Ukraine War
Russian TV Stations Hacked
Shields Up – Now is the time to double‑check cybersecurity processes and operations
Statistics reveal Amazon, DHL, DocuSign and PayPal are the most targeted platforms to be impersonated in email phishing attempts
Stealthy 'SockDetour' Backdoor Used in Attacks on U.S. Defense Contractors
Swedish Security Solutions Provider Axis Hit by Cyberattack
Take these steps to prepare for and handle the cybersecurity effects of the war in Ukraine
Tesco customers warned about spam email offering free food
The Importance of Safety When Using Self-Custody Platforms
The next frontier in cyberwar: Embedded devices
The State Bar of California is conducting an investigation into a massive data breach that exposed confidential records
The tech savvy physician: 3 steps to protect your practice from ransomware
Toyota halts production after reported cyberattack on supplier
Toyota suspends production at car plants as cyberattack hits key supplier
Toyota supplier reports cyberattack that halts production across Japan
Toyota to Close Japan Plants After Suspected Cyberattack
U.S. Banks Brace For Retaliatory Ransomware Attacks From Russia
U.S. cyber officials brace for attacks in wake of Ukraine invasion
UK energy sector top target for cyberattacks, IBM finds
Ukraine says its 'IT Army' has taken down key Russian sites
Ukraine security agencies warn of Ghostwriter threat activity, phishing campaigns
Ukraine-Russia Cyber Warzone Splits Cyber Underground
US banks prepare for cyber attacks after latest Russia sanctions
US Cyber Command, CISA, and the FBI Are Preparing For Iranian Cyber Attack
US Indicts BitConnect Founder
Viasat says 'cyber event' is causing broadband outages across Europe
What is Cybercrime?
What should companies do to respond to ransomware attacks?
What the launch of the FBI crypto task force means for the digital asset space
Why being breached is a spectrum and the importance of post-hoc detection
Why Companies Need To Rethink Cybersecurity Now
Why is the healthcare industry so vulnerable to ransomware?
Will zero trust solve the future workplace problems?
Your Apps Offer a Gateway for Cybercrime
Subscribe to:
Posts (Atom)