Editor's Message

Welcome to DBD. On March 8th we officially celebrated our second anniversary. What started as a small idea one Sunday morning has now grown to 310,000+ Visits and 2,400+ Twitter followers. Therefore, we would like to take this opportunity once again to thank you all for your support. Here's to another year of information and awareness. Stay safe. :)



Monday, 18 April 2022

Data Breaches Digest - Week 16 2022

Welcome to this week's Data Breaches Digest, a catalogue of links concerning Data Breaches and Cyber Security that were published on the Internet during the period between 18th April and 24th April 2022.


24th April

3 ways to increase cybersecurity while working remotely

Australia's overheated property market has become a target for hackers - and they're scamming millions

Can Your Printer Be Hacked?

Cryptocurrency scams are on the rise in South Africa: How crypto cons work and how to protect yourself

Cyber threats to media companies are on the rise

Cyberattack Is Currently The Fastest Growing Crime Worldwide

FBI Warns of BlackCat Ransomware That Breached Over 60 Organisations Worldwide

FBI Warns of Targeted Cyberattacks on Food Plants Amid Heightened Coverage of Fires

Google, Mandiant say zero-day numbers reached all-time highs in 2021

Intuit Faces Class-Action Lawsuit Over Trezor Phishing Hack

Investigation launched as 2,000 health workers caught up in data breach

Lapsus$ stole T-Mobile's source code before member arrests in March

Managing Employee Cyber Risk is Essential For Your Business

Phone hacking is a child’s play; read how you can SECURE your device

Privilege Escalation Explained: Types, Cases, And Prevention

Ransomware attacks on farmers are timed to coincide with harvest season

Scam Alert: Fraudsters Pretend to Be Coinbase Customer Support to Steal Funds

Sensitive Data: Securing Your Most Important Asset

Terra users lost more than $4 million in a phishing attack

The retail industry is at risk of more than 400% of phishing scams according to a new report

Threat Intelligence in the SOC - How can it help mitigate risks?

What Are Initial Access Brokers?

What are the major cyber threats faced by SMEs in Nigeria?

WhatsApp Tips and Tricks: Stop Hackers from Reading Your Messages

23rd April

5 Cyber Threats Community Organizations Can’t Ignore

Analysts flag China link to ‘India Post’ phishing scam

Binance TAKES BACK $5 Million+ in Stolen Crypto from North Korean Hacker Group 'Lazarus'

Cloud storage: Zero trust’s ultimate defense

Costa Rican government systems are in chaos due to a cyber attack

Critical US Power Grid Hardware Wide Open With Backdoors, Warns CISA

Cyber attack shuts Costa Rica government systems

Cyber nukes could be our path to digital peace

Cyberattacks rise at oil firms as hackers step up their game

Dangerous malware is up 86%: Here’s how AI can help

Hacking Viruses Cause Criminal Activites

How Vulnerable Are You To A Cyberattack? Here's How To Know

Knowledge Sharing: Breaking Down Real-World Attacks to Learn for the Future

LinkedIn users beware – scammers are targeting you

Newest Phishing Scheme

North Korean gang still accessing its $600 million crypto haul

Royal Malaysia Police (PDRM): Beware of viral fake Petronas lucky draw link that is actually a phishing website

Russian malware planted from Nigeria in OIL cyber attack

Terra (LUNA) Network Addresses Scammed Out of $4,310,000 in Phishing Attack

The 10 favorite brands of hackers to trap you by email

Third-party company with Mesa County Valley School District 51 (D51) experienced data breach

U.S. Sanctions More North Korean ETH Addresses Over $600M Ronin Hack

Veracode Report Shows Signs of Progress in Securing Software Supply Chain

Warning as scam impersonates Martin Lewis in Bitcoin schemes

Warning over Amazon invoice scam as tech giant says hackers could steal your account information – signs to look out for

Watch Out! Cryptocurrency Miners Targeting Dockers, AWS and Alibaba Cloud

22nd April

3 things you need to know about cryptocurrency scams

5 Signs of Phone Tracking You Should Look Out For

7 tips from cybercrime experts to stop hackers in their tracks

8 million customers affected by Cash App security breach

ALPHV: Breaking Down the Complexity of the Most Sophisticated Ransomware

Android security: Flaw in an audio codec left two-thirds of smartphones at risk of snooping, say researchers

Atlassian Drops Patches for Critical Jira Authentication Bypass Vulnerability

Atlassian fixes critical Jira authentication bypass vulnerability

Backup is key for cyber recovery

Bolstering Security Standards: How A Consolidated IT Infrastructure Can Arm Businesses Against Cyber-Criminals

Chinese hackers behind most zero-day exploits during 2021

Common NFT Scams

Conti ransomware attack was aimed at destabilizing government transition, Costa Rican president says

Costa Rica: President Carlos Alvarado assures that cyber attack seeks to destabilize the country

Costa Rica’s President Alvarado Says Cyber Attacks Seek to Destabilize Country as Government Transitions

Crypto-Mining Botnet Goes After Misconfigured Docker APIs

Cyber attack causes chaos in Costa Rica government systems

Cyber attacks scare directors

Defense against the dark arts: CISOs prep for critical infrastructure attacks

Demand for Cybersecurity Skills Rises as Quantum Computing Threats Tighten

Developer snuck apps past Apple that forced users into subscriptions

Error in ALPHV/BlackCat ransomware code may offer some Linux users a shield

Extra Online Security for your phone

FBI: Hackers targeting farmers with ransomware attacks

FBI: Ransomware Attack Risk to Food and Agriculture Sector

FBI Warns US Farmers of Ransomware Surge

'Hack DHS' bug hunters find 122 security flaws in DHS systems

Hackers Are Timing Ransomware Attacks to Hit Farmers During Harvest Season

Hackers Use Malicious Google Ads to Steal $4 Million In Crypto Stablecoin

Hive ransomware affiliate zeros in on Exchange servers

How Can Penetration Testing Prevent Social Engineering Attacks?

How Common Types of Cyberattacks Are Evolving

How Geopolitical Events Should Shape Data Security Posture

How phishing attacks are spoofing credit unions to steal money and account credentials

Illinois Gastroenterology Group, PLLC Provides Notice of a Security Incident

In a remote-work world, a zero-trust revolution is necessary

Indian Petroleum Refineries network faces enormous cyber attacks from October 2021 to April 2022

Is REvil really back? Ransomware gang’s ‘return’ raises more questions than answers

Keeping online payments safe

Lapsus$ hackers targeted T-Mobile source code in latest data breach

LemonDuck botnet plunders Docker cloud instances in cryptocurrency crime wave

LemonDuck Cryptomining Botnet Hunting for Misconfigured Docker APIs

Like the Senate, CONICET has now suffered a cyberattack

LinkedIn is the social network most supplanted by cybercriminals, according to report

Managing Risk of Insider Threats in Healthcare Cybersecurity

Moving Beyond Security Culture Bottlenecks

Multi-Tiering to Negate the Heightened Risk from Cyber-Attacks

Navigating a changing cyber security landscape

New threat groups and malware families emerging

Optimizing Security in Data Collection Processes

Pacific Market Research Data Breach $250K Class Action Settlement

Phishing Scam Targeting MetaMask Crypto Wallet Holders Nets $650,000; Default Settings Stored Seed Phrases in iCloud

Police issue warning over fake emails claiming to be from Martin Lewis after more than 1,000 reported in just three days

QNAP Advises Users to Update NAS Firmware to Patch Apache HTTP Vulnerabilities

Ransomware attacks are hitting universities hard, and they are feeling the pressure

Ransomware threat to universities

Remotely exploitable flaws found in codec used by many Android phones

Researcher Releases PoC for Recent Java Cryptographic Vulnerability

Retail sector named top target of phishing attacks

REvil resurrected? Ransomware crew appears to be back. Keyword: Appears

REvil Tor sites have come back to life

Rio de Janeiro finance department hit with LockBit ransomware

Russia Is Losing a War Against Hackers Stealing Huge Amounts of Data

Russian hackers are seeking alternative money-laundering options

Russian malware planted from Nigeria in Oil India Limited (OIL) cyber attack

Scammers Have a New Way to Phish for Bank Account Information, Banker Says

Skeletons in the Closet: Security 101 Takes a Backseat to 0-days

Snapshots vs backup: Use both for optimum Recovery Point Objectives (RPOs)

State Actors Drive Record Number of Zero-Day Exploits in 2021

State Bank of India (SBI) phishing scam ALERT! Protect your money NOW

SuperCare Health Faces Lawsuits Over Data Breach

T-Mobile Admits Lapsus$ Hackers Gained Access to its Internal Tools and Source Code

T-Mobile confirms Lapsus$ hackers breached internal systems

Tackling Cybersecurity Vulnerabilities in School Systems

Terra (LUNA) Network Addresses Scammed Out of $4,310,000 in Phishing Attack

The Great Resignation meets the Great Exfiltration: How to securely offboard security personnel

The modern bank heist is an endgame for financial institutions

The most powerful hacking tools are no longer in the hands of governments alone

Third-party identity risk increases vulnerability to cyberattacks

Threat actors exploited more zero-day vulnerabilities in 2021

Ukraine ramps up cyber defences to slow surge in attacks

Vulnerability in AWS Log4Shell hot patch allowed full host takeover

Vulnerable infrastructure operators are 'switching off' security to avoid downtime

Watch Out! Cryptocurrency Miners Targeting Dockers, AWS and Alibaba Cloud

Wawa Sues Mastercard Over Data Breach Penalties

What are the best backup strategies to protect against ransomware?

When Attacks Surge, Turn to Data to Strengthen Detection and Response

When Botnets Attack

Why Ransomware Attacks Prefer Small Business Targets Rather Than Rich Enterprises

Zero-Day Exploit Use Exploded in 2021

Zero-Trust For All: A Practical Guide

21st April

60% of BYOD companies face serious security risks

Adaptive Health Integrations Data Breach Impacts 510K

Amazon's Hotpatch for Log4j Flaw Found Vulnerable to Privilege Escalation Bug

Another School District Says Student Data Breached Within an Illuminate Education Product

Are QR Codes Safe? Best Practices to Ensure QR Code Security

As the most imitated brand in phishing attempts, is LinkedIn really safe for professional networking?

Austrac outlines how to spot ransomware and detect abuse of digital currencies

Beanstalk DeFi project robbed of $182 million in flash loan attack

Bob's Red Mill Reports Data Breach

Cisco Releases Security Patches for TelePresence, RoomOS and Umbrella VA

Cisco Umbrella default SSH key allows theft of admin credentials

Citibank, Wells Fargo, Chase...Watch Out for Fake Bank Text Messages — Phishing & Zelle Scams

Conti ESXi ransomware strain could be run directly by an attacker, says Trellix

Costa Rica's President Alvarado says cyberattacks seek to destabilize country as government transitions

Critical bug in Android could allow access to users' media files

Critical Chipset Bugs Open Millions of Android Devices to Remote Spying

Cybercrime threatens business growth. Take these steps to mitigate your risk

Cybersecurity Advisory warns of Russian-backed cyber threats to infrastructure

Cybersecurity threats facing enterprise email accounts

Cybersecurity threatscape: year 2021 in review

Data security across multi-clouds requires unified identity orchestration

Digging Into the Science of Behaviour to Tackle Cyber Extortion

Docker servers hacked in ongoing cryptomining malware campaign

FBI: BlackCat ransomware breached at least 60 entities worldwide

FBI Issues Warning About Unique BlackCat Ransomware Attacks

FBI Seeks Info on BlackCat

FBI warning: Ransomware gangs are going after this lucrative but unexpected target

Feds warn of 'exceptionally aggressive' ransomware threat targeting healthcare

Financial leaders grappling with more aggressive and sophisticated attack methods

Five Eyes advisory warns more malicious Russian cyber activity incoming

Five Eyes Agencies Issue Detailed Russian Cyber-Threat Warning

Five Eyes Warns of Russian Hacks on Critical Infrastructure

Flash Loan Attack Takes Beanstalk Defi Platform for $182 Million, Largest Yet of Its Type

Fraudsters ask for bank details in latest licence plate sticker refund phone scam

Free Yanlouwang decryptor released, after flaw found in ransomware code

Google: Record Year for Zero Days in 2021

Google Is Now Warning All Chrome Users Against Doing This

Hackers earn $400K for zero-day ICS exploits demoed at Pwn2Own

Hackers Sneak 'More_Eggs' Malware Into Resumes Sent to Corporate Hiring Managers

Has Your Code Leaked?

Hive hackers are exploiting Microsoft Exchange Servers in ransomware spree

Hive ransomware affiliate targets vulnerable Microsoft Exchange servers

How fast do cybercriminals capitalize on new security weaknesses?

How phishing attacks are spoofing credit unions to steal money and account credentials

How Quickly Do MSSPs and Internal Security Teams Find Hackers Inside Networks?

How to Test Your Browser’s Security

ICO says Labour not meeting legal obligations regarding Subject Access Requests from data breach victims

International Data Corporation Confirms Recent Data Breach

International security agencies brace for Russian state-sponsored hacks

Is the REvil Ransomware Gang Back From the Brink, Or Is It an Impostor?

Leaks Fail to Dent Conti's Successful Ransomware Operation

LinkedIn Is Most Imitated Brand in Phishing Attacks

Lincoln College was already struggling. Then came ransomware

LinkedIn most likely to be imitated in phishing attempts in Q1

Microsoft Exchange Server users are being targeted by Hive ransomware attack

Mortgage servicer data breach affects 2.5 million; Crypto wallet provider warns iOS users

New Incident Report Reveals How Hive Ransomware Targets Organizations

North Korea Funding Nuclear Program with Cyber Activity

North Korea targeting blockchain, cryptocurrency companies

Paying Cyber Ransoms Won't Get Your Data Back, Enterprise Strategy Group (ESG) Finds

Phishing Attacks Jumped 29 Percent in 2021, New Zscaler Research Finds

Phishing attacks up 29%

Phishing emails targeting LinkedIn accounts are on the rise. Here's what to watch out for

Privacy Coin Monero’s Use in Ransomware Fuels Growing Security Concerns

QNAP asks users to mitigate critical Apache HTTP Server bugs

Ransomware rises in Kenya, as Office 365 targeted

Ransomware Targeting Virtualization Platforms on the Rise

REvil ransomware group's infrastructure comes back online hinting at fresh campaign

REvil reborn? Notorious gang’s dark web site redirects to new ransomware operation

Russia-Ukraine Conflict Creating Cybersecurity Concerns for American Businesses

Russian state-sponsored groups threaten cybersecurity

State Bank of India (SBI) warns customers of phishing scam: Here’s how to protect yourself

Slow deployment is hampering fraud prevention. What gives?

Strengthening the ability of public companies to combat cybersecurity threats

Terra Users Lose $4.3M in Crypto to Phishing Scam Over 10 Days

Two-Thirds of Global Banks Report Surge in Destructive Attacks

U.S. Treasury sanctions Russian cryptocurrency mining companies

Unpatched Bug in RainLoop Webmail Could Give Hackers Access to all Emails

Verizon’s Data Breach Report – Insights for Cloud Security Professionals

Wawa’s $12M data breach settlement gets final approval from judge

What is a VPN and what does data logging by a VPN means?

Why Monero [XMR] is a growing favorite among ransomware groups

Why Uploading Your Personal Data on Social Media is a Bad Idea

Will IT Leaders' Phishing Headache Ever Go Away?

20th April

60% of Healthcare Orgs Say Third-Party Risk Management Needs Improvement

Adaptive Health Integrations Data Breach Affects More than 510,000 Individuals

Amazon Web Services fixes container escape in Log4Shell hotfix

Anonymous OpRussia Reports Metro System Hack, Counter-Disinformation Milestone

Behind the push to finally eliminate passwords

Beware of Fake Windows 11 Update Delivering Malware

BlackCat emerges as one of the top ransomware threats

Breaches by the numbers: Why adapting to regional challenges is imperative

Check Your Messages: Scam Texts on the Rise

Crypto Scams on the Rise in South Africa: Here’s How to Protect Yourself

Cyber-Attackers Hit Sunwing Airlines

Cyberattack creates chaos for Sunwing air travellers

Cybercrime Is Escalating from Bank Heists to Market Manipulation

Cybercriminals are finding new ways to target cloud environments

DDoS and Ransomware: A Prevalent and Potent Blend

Despite global drop in data breaches, India remains among the five worst-hit nations

Discover the top three cybersecurity essentials for universities

Double extortion ransomware surges

FBI Releases AvosLocker Ransomware Advisory

FBI warns agricultural sector of heightened risk of ransomware attacks

FBI Warns of Ransomware Attacks on Farming Co-ops During Planting, Harvest Seasons

FBI warns of ransomware attacks targeting US agriculture sector

Feds warn healthcare providers of 'exceptionally aggressive' ransomware group

Financial Services Firms Under Cybersecurity Siege

First person linked to OCBC phishing scam pleads guilty

Five Eyes Nations Warn of Russian Cyber Attacks Against Critical Infrastructure

Five ransomware attacks in 2022 so far you should know about

Former Shiseido staff say company was aware of data breach weeks before official notice

Global Dwell Time Drops but EMEA Lags

Google: 2021 was a Banner Year for Exploited 0-Day Bugs

Google: We're spotting more zero-day bugs than ever. But hackers still have it too easy

Google Project Zero Detects a Record Number of Zero-Day Exploits in 2021

Healthcare vendor accused of ‘concealed’ ransomware, lengthy service outages

HHS sounds alarm on 'exceptionally aggressive' ransomware group

How companies face risk to security operations derived from the Ukrainian crisis

How ready are organizations to manage and recover from a ransomware attack?

How to reduce the risk of cyber-attacks on government organisations’ physical security systems

How to Stay Safe from Crypto Hacks and Phishing Scams

IT leaders require deeper security insights to confidently manage multi-cloud workloads

It Was a Good Month for Fighting Cybercrime. Don’t Get Comfortable

Kaspersky offers free decryptor tool to deal with Yanluowang ransomware

Latest cyber impact report underlines ransomware as a huge threat, but financial cost of attacks is still unclear

LAZARUS APT Using TraderTraitor Malware to Target Blockchain Orgs, Users

LinkedIn Tops Global Rankings for Brand Phishing Attacks

Making operational continuity central to an effective counter-ransomware strategy

McCarter & English experiences data breach

Microsoft Exchange servers hacked to deploy Hive ransomware

Modern Bank Heists 5.0: The Escalation from Dwell to Destruction

Monero’s crypto of choice as ransomware ‘double extortion’ attacks increase 500%

More than 42 million people in UK have had their financial data hacked

Most Email Security Approaches Fail to Block Common Threats

'Most of the attacks start with email': One click can put financials on your phone at risk

New Global Research Reveals that 90 Percent of Organizations Have Suffered One or More Successful Email Breaches in the Last 12 Months

New Zscaler Research Shows Over 400% Increase in Phishing Attacks with Retail and Wholesale Industries at Greatest Risk

OCBC phishing scam: 20-year-old is first to plead guilty

Okta: Just Two Customers Impacted by Lapsus Breach

Okta: Lapsus$ breach lasted only 25 minutes, hit 2 customers

Okta claims its Lapsus$ data breach only affected two customers

Okta says Lapsus$ breach hit just two customers

Over 3/4 of organisations think they'll be breached in 2022

Phishing alert: How cybercriminals are using India Post to steal money from gullible citizens

Phishing attacks on government up 110%

PlanMember Securities Corporation Confirms Recent Data Breach

Ransomware: This gang is getting a lot quicker at encrypting networks

Ransomware groups show preference for Monero, charge more for Bitcoin ransom

Ransomware is the biggest cybersecurity pain point in India

Ransomware plagues finance sector as cyberattacks get more complex

Researchers Detail Bug That Could Paralyze Snort Intrusion Detection System

REvil appears to return after 14 of its members were arrested in January

REvil's TOR sites come alive to redirect to new ransomware operation

Russian state hackers hit Ukraine with new malware variants

Scam apps on Apple’s macOS App Store won’t let you quit until you pay a subscription

Social networks most likely to be imitated by criminal groups

Sunwing incident shows need for mandatory cyber breach reporting, says expert

Sunwing says outage caused by data breach from a supplier

SuperCare Health faces lawsuits over data breach

The Basics of Cloud Security for Your Business

The evolving role of the lawyer in cybersecurity

The New Cyberthreat To Healthcare: Killware

The Pros and Cons of Cybersecurity Insurance for Municipalities

The Top 5 Security Orchestration Myths

The Top 7 Most Common Web Vulnerabilities

Time to get patching: Oracle's quarterly Critical Patch Update arrives with 520 fixes

UK government employees receive ‘billions’ of malicious emails per year

UK Government Staff Hit with Billions of Malicious Emails in 2021

Ukraine Ramps Up Cyber Defenses to Slow Surge in Attacks

US and allies warn of Russian hacking threat to critical infrastructure

US Government: North Korean Threat Actors Are Targeting Cryptocurrency Organizations

Vermont Eyecare Practice Suffers Data Breach Affecting 30K Patients

Virtualisation platforms becoming a top target for ransomware gangs

Wawa wants a refund, says Mastercard owes $32 million for data breach penalties

What Is a Threat Actor?

What is data breach, and how vulnerable are you to cyberattacks?

Why Striking the Balance Between Insider Risk and Privacy is More Important Than Ever

‘Zero-Day’ Hacks Hit Record in 2021, Google Researchers Say

19th April

6 in 10 Asia-Pacific firms saw 1 data breach in last 12 months

41% of organizations suffered API security incidents in the past year

81% of codebases contain known open source vulnerabilities

APAC consumers share more data, but will ditch firms over security breach

Attacker Accessed Dozens of Repositories After OAuth Token Theft

Blockchain warning: Hackers are targeting developers and DevOps teams

Bob’s Red Mill Natural Foods Reports Data Breach Affecting Online Customers' Credit Card Data

‘CatalanGate’ Spyware Infections Tied to NSO Group

Churchill Mortgage Corporation Data Breach Compromises Social Security Numbers and Financial Account Information

CISA warns of attackers now exploiting Windows Print Spooler bug

Comelec withholds payment to Smartmatic amid data breach controversy

Common Security Issues In WordPress

Corvus Insurance finds 2021 average ransoms paid by quarter were down 44.2%

Critical steps to ransomware protection in the cloud

Cyber-insurance – Spreading the risk and driving it down

Cyberattack hits Costa Rica ministry, government has to disable services

Cyberattacks Pose ‘Existential Risk’ To Colleges - And Sealed One Small College’s Fate

CybeReady: Top recommendations for security during time of war

Cybersecurity a boardroom blindspot

Data Breach Resolution 22% Faster in 2021 for Organizations Embracing Intelligent Automation

Data Breaches, Ransomware Attacks Leave Security Teams “Exhausted”

Don't Want Your Phone Carrier Tracking Your Personal Data? You Can Tell It to Stop

Double Extortion Ransomware Increased Almost 500% in 2021

Emotet botnet switches to 64-bit modules, increases activity

Experts Uncover Spyware Attacks Against Catalan Politicians and Activists

Fake Windows upgrade website delivering information stealer malware

Family Health Team records also compromised in Arnprior Regional Health data breach

FBI warning: These hackers are targeting developers and DevOps teams to break into crypto firms

Funky Pigeon pauses all orders after 'security incident'

Funky Pigeon shuts website and pauses orders after cyber attack – are you at risk?

Funky Pigeon suspends all orders after major cyber attack

Funky Pigeon suspends orders after cyber attack

Funky Pigeon suspends orders after cyber-attack

Funky Pigeon Suspends Orders Following Cyber-Attack

Funky Pigeon website suspends all online orders after ‘cyber security incident’

Funkypigeon.com suspends orders after 'cyber security incident'

GitHub notifies owners of private repos stolen using OAuth tokens

Google fixes Chrome zero day being used in exploits in the wild

Hacked Contra Costa County emails could have contained residents’ personal information

Hackers Exploiting Recently Reported Windows Print Spooler Vulnerability in the Wild

Here’s Which Phishing Email Subjects Get the Most Clicks

HHS HC3 Warns Healthcare Sector of Hive Threats

Hive ransomware group ‘exceptionally aggressive,’ HHS says in warning to health sector

How much are cyber breaches costing UK businesses?

How To Defend the Financial Sector Against Cybersecurity Threats

How to Mitigate Client-side Supply Chain Threats

India is among the top five countries with the most data breaches

Inside complex RansomOps and the ransomware economy

Kaspersky cracks Yanluowang ransomware, offers free decryptor

Lazarus Gets Banned by Tornado Cash for Hacking $600 Million From Axie Infinity’s Ronin Bridge

Lenovo patches UEFI firmware vulnerabilities impacting millions of users

Lenovo UEFI firmware driver bugs affect over 100 notebook models

LinkedIn Becomes the Most Impersonated Brand for Phishing Attacks

LinkedIn brand takes lead as most impersonated in phishing attacks

LinkedIn is now the most imitated brand by phishing scammers

Local U.S. Governments and Municipalities at Risk of Foreign Nation Cyber Attacks

March 2022 Healthcare Data Breach Report

March 2022’s most wanted malware: Revenge RAT asserts its dominance in the UAE followed by Emotet

Messenger Phishing Scams Soar in 2021 amid Pandemic

MetaMask Asks Apple Users to Disable iCloud Backup for Wallet After User Lost $650,000

Microsoft: We're boosting our bug bounties for these high-impact security flaws

Mismanaged IAM Can Lead to Data Breaches

More Than Half of Initial Infections in Cyberattacks Come Via Exploits, Supply Chain Compromises

Moving towards defense in depth under the gray skies of conflict

New Lenovo UEFI Firmware Vulnerabilities Affect Millions of Laptops

New Security Priorities Report Details What Security Leaders Need to Plan for Next

New stealthy BotenaGo malware variant targets DVR devices

New Zealand: Cyber Security Literacy Needed To Reduce Security Issues

Night Sky: A Short-Lived Threat from a Long-Lived Threat Actor

North Korea aims 'TraderTraitor' malware at cryptocurrency workers

Northern Ireland law firms urged to prioritise defences against cyber attacks

Nothing Changes If Nothing Changes

Okta Says Security Breach by Lapsus$ Hackers Impacted Only Two of Its Customers

Palo Alto Networks reveals ransomware payments hit new records in 2021

Pegasus Spyware Targeted UK Prime Minister, Say Researchers

QNAP urges customers to disable UPnP port forwarding on routers

Ransomware attacks are on the rise — is your auto dealership secure?

Ransomware Evolves from “Spray and Pray” to Multi-billion Mega Industry

Ransomware needs to form part of any business disaster recovery planning

Ransomware targeting virtualization platforms is on the rise

Rethinking Cyber-Defense Strategies in the Public-Cloud Age

Ronin Crypto Heist of $618m Traced to North Korea

Secret Attempt to “Buy Back” Customer Data From T-Mobile Hack Failed, Criminals Sold Information in Spite of $200,000 Payment

Secret Service seizes more than $102 million in crypto assets

Social Media Network LinkedIn Ranks First in List of Brands Most Likely to be Imitated in Phishing Attempts in Q1 2022

T-Mobile Customers Are Prey To An Unblockable SMS Phishing Attack

The Human Factor in Cybersecurity

The state of coordinated vulnerability disclosure policies in EU

These scam macOS apps won't let you quit without paying a subscription

This New Research Shows that Paying Ransoms Doesn’t Always Solve Ransomware Attacks

Thousands of furious customers left without birthday cards and gifts as Funky Pigeon SUSPENDS orders after being hit by a cyber-attack amid fears personal details may have been exposed

Top tips on how SMEs can prevent cyber incidents

Top Ways That AI Improves Cybersecurity

UK: Prime Minister Johnson's office hacked? Research group claims Pegasus spyware behind attack

Ukraine warns of cyberattack aiming to hack users’ Telegram Messenger accounts

US Officials Increase Warnings About Russian Cyber-Attacks

WH Smith Says Its Funky Pigeon Was Victim of Cyberattack

WH Smith suspends Funky Pigeon online orders after cyber incident

What is Adaptive Security?

What is Conversation Hijacking? Exploring This Emerging Form of Phishing

What is phishing?

What You Need to Know About Cryptocurrency Scams in 2022

Why you shouldn’t reply to this Australian Taxation Office (ATO) scam text message

Zywave, Insurance Technologies Corp. Data Breach $11M Class Action Lawsuit Settlement

18th April

4 steps for building an orchestrated authorization policy for zero trust

4 Ways to Prioritize Data Security in the Cloud

8 best practices to harden identity and access management permissions

9 Steps Necessary for Infrastructure Security

9 types of password hacking attacks and how to avoid them

16 Essential Early Steps In Creating An Effective Zero-Trust Environment

83% of cybersecurity teams affected by talent shortages

A Gift for Paying Your Mobile Bill? Don't Click That Link: It's a Scam

A single email account hack spurs breach notice for 503K Christie Clinic patients

Apple Users Warned By MetaMask Over Potential Phishing Attacks Via iCloud

As Data Proliferates, so Does Security Risk. It Doesn’t Have to be That Way

Attacker Steals $182 Million From Ethereum-based Beanstalk Stablecoin Protocol

Beanstalk DeFi platform loses $182 million in flash-load attack

Beanstalk Farms loses $182M in DeFi governance exploit

Blue Earth County releases report on 2021 data breach

Bangko Sentral ng Pilipinas (BSP) urges public to turn on multi-factor authentication for online transactions

Can AI help cyber-proof public safety systems?

Can you predict ransomware attacks before they happen?

CoCo Data Breach: Employment and Human Services Department

Conti Claims Responsibility for Nordex Breach

Conti’s Ransomware Toll on the Healthcare Industry

Corvus Insurance reports ransomware attacks are down from recent peaks

Currency.com Evades Russian DDoS Cyber Attack

Cyber Security Education Firm Aware Force Reports on Most Dangerous Phishing E-mails and Texts Cyber Thieves Sent in Q1 2022

Cybersecurity: Evolution of ransomware reaches dangerous levels

Cybersecurity litigation remains growing concern facing financial institutions

Danske Bank Fined for GDPR Violations, Customer Data Held for Longer Than Legally Allowed

Data Breach Said To Have Exposed Personal Information

Data Breach Update: Cytometry Specialists, Inc. d/b/a CSI Laboratories

Data Breaches: Current Open Lawsuits and Settlements

Don’t Get Zero Trust Backward

Escalation of Cybercrime-As-A-Service Has Major Ramifications

Ethereum Mixer Blocks North Korean Hacker Group Behind $600M Axie Infinity Heist

FBI, U.S. Treasury and CISA Warn of North Korean Hackers Targeting Blockchain Companies

FBI Warns of 'Reverse' Instant Payments Phishing Schemes

Federal Motor Carrier Safety Administration (FMCSA) warns Commercial Driver’s License (CDL) drivers to be alert to phishing scam

Financial firms increasingly targeted by cybercriminals

Free decryptor released for Yanluowang ransomware victims

GitHub Notifies Victims Whose Private Data Was Accessed Using OAuth Tokens

Government issues warning against unblockable phishing attacks on T-Mobile customers

Hackers steal $655K after picking MetaMask seed from iCloud backup

Here Are 5 Cloud Security Predictions for 2022

How Cloud-Based Solutions Might Mitigate EMR Security Risks

How To Create a Cyber Maturity Strategy

Identity dilemma: When to back-up data and when not to

It’s Time To Protect The Most Unprotected Part Of The Modern Workforce: Humans

Many SMBs wouldn’t survive a ransomware attack

MetaMask Issues Warning Following $650K iCloud Phishing Scam

Modest improvement in cybersecurity in 2H 2021, report suggests

Most Governments Were Hacked in the Past Year, Reports Reveal

New SolarMarker Malware Variant Using Updated Techniques to Stay Under the Radar

Newly found zero-click iPhone exploit used in NSO spyware attacks

No 10 network targeted with spyware, says group

Over 42 million people in the UK had financial data compromised

Over Three-Quarters of Global Organizations Think They'll Be Breached in 2022

Protecting The Real Target: Data-Focused Security In The Era Of Commoditized Malware

PYSA Ransomware Attacks: Here’s What MSSPs Need to Know

Ransomware Attacks On The Decline, Corvus Insurance Finds

Ransomware Is Getting "User Friendly" To Victims

Ransomware Prevention Best Practices for State and Local Governments

Researchers Share In-Depth Analysis of PYSA Ransomware Group

Resilient Futures: A Blueprint for Securing Society in 2022 and Beyond

Rising cyber threats demand cybersecurity measures for golf clubs

Russia-backing Conti claims Nordex cyber attack

Scripps notifies 'newly identified' patients affected by 2021 cyberattack

Skills shortage, burnout can lead to increased cyberattacks

Something’s Phishy: How To Spot And Avoid Phishing Attacks

Spam is coming to get you via email, social media and your phone like never before

SuperCare Health Faces Lawsuit After Data Breach Impacts 318K

T-Mobile sounds the alarm over unblockable SMS phishing attacks

The danger of digital footprints

The Importance of Securing the Manfuacturing Supply Chain

The underlying story behind the infamous SolarWinds data breach

The Urgent Concern That Boardrooms Must Brace For In 2022: Supply Chain Cyberattacks

Unofficial Windows 11 upgrade installs info-stealing malware

US critical infrastructures targeted by complex malware

US warns of Lazarus hackers using malicious cryptocurrency apps

What Are Phishing Emails and How to Avoid Them?

What Can Someone Do With Your IP Address?

What to do if your business has been hacked