Welcome to this week's Data Breaches Digest, a catalogue of links concerning Data Breaches and Cyber Security that were published on the Internet during the period between 30th May and 5th June 2022.
5th June
A country threatens to collapse because of a cyberattack, never seen
Bored Ape Yacht Club hacked, loses $360,000 worth of NFTs in phishing attack
Bored Apes Creator Trolls Discord After 200 ETH Worth Of NFTs Stolen In Another Hack
Cybersecurity insurance costs escalate for municipalities as cases of ransomware attacks climb
ESET Threat Report details targeted attacks connected to the Russian invasion of Ukraine and how the war changed the threat landscape
Evasive phishing mixes reverse tunnels and URL shortening services
Exploit released for Atlassian Confluence RCE bug, patch now
FBI Chief: Iranian hackers targeted Boston Children's Hospital in 2021
FluBot: Strike against SMS-based Android malware
Gmail and Outlook warning: Don't ignore urgent Government advice, dangerous new scam email
High Seas and High Stakes Communications: Securing the Maritime Industry
How companies can fight the menace of phishing
How identity segmentation can reduce the attack surface for healthcare organizations
How Login Phishing Attacks Compromise Your Spotify Credentials
How to avoid falling prey to cyber frauds
Mumbai tops in Maharashtra in cyber-crime cases
Online scams lead most cybercrimes
Ransomware malware grows 7.6 per cent
Singapore: Police warn of banking-related phishing scams; S$114,000 lost since May
Spam text messages from Scammers can Cost You a Big Deal
State-Backed Hackers Exploit Microsoft 'Follina' Bug to Target Entities in Europe and U.S
Tech pros have low confidence in supply chain security
The Hacker Gold Rush That’s Poised to Eclipse Ransomware
What is an Open Redirect vulnerability, why is it dangerous and how can you stay safe?
Why You Should Keep Your Health Records Safe
4th June
2 Mutant Ape Yacht Club (MAYC) and 8 Cool Cats NFTs Stolen From Yet Another Phishing Scam Victim
4 cybersecurity risks online gamers face
66% of Critical Incidents in Government Sector in 2021 were Targeted Attacks
A look at how AI can help battle cyberattacks
An actively exploited Microsoft 0-day flaw still doesn’t have a patch
Anonymous Hacktivists Leak 1TB of Top Russian Law Firm Data
Apple blocked 1.6 millions apps from defrauding users in 2021
Atlassian Releases Patch for Confluence Zero-Day Flaw Exploited in the Wild
Australian Trading Giant ACY Securities Exposed 60GB of User Data
Beware WhatsApp Users! New Scam Can Seize Your Account After One Phone Call
Bored Ape Yacht Club, Otherside NFTs stolen in Discord server hack
Bored Ape Yacht Club Discord reportedly compromised in $357,000 NFT phishing attack
Cape Cod Regional Transit Authority hit by ransomware attack
Costa Rica 'at war' with Russian hackers, experts warn other countries
Cyber attack still hinders council services almost six months after Russian hackers hit Gloucester
Cybersecurity Tips for Traveling This Summer
Enhancing Marketplace Safety Against NFT Frauds and Scams
Evil Corp Switches to Ransomware-as-a-Service to Evade US Sanctions
Exiled Iran group claims Tehran hacking attack
Facebook has HIDDEN list you need to check now – you may be a hacker target
Hacker Used ‘Social Media Data Leak’ to Steal USD 660K in Crypto from 90 Victims
How Russia’s Invasion of Ukraine Is a Litmus Test for Cryptocurrency Exchanges
How to Protect Your CRM from Hackers
Investigating the cyber crime scene
Monetary Authority of Singapore (MAS) introduces more measures to fight digital banking scams
Montreal's Grande Bibliothèque Has Shut Down Some Services After A Data Breach
Operations at Mexican Hon Hai plant gradually return to normal after cyberattack
Portugal: CTT scam warning
Pro-Indian APT Attempts Phishing Attacks Against Pakistani Military, Government
Ransomware hits military supplier CMC Electronics
SMSFactory Android malware sneakily subscribes to premium services
‘So convincing!’ Britons warned about sinister National Insurance scam phone call
The explosion of digital identities and growth of cybersecurity debt
TOTS, Inc. Notifies Patients of Cyber Attack
Urgent warning to Microsoft Office users over “homograph attacks” which can expose data & why you must check spellings
We need to be extra careful to avoid theft of data in cyberspace
What We Can Learn from the American Dental Association Ransomware Attack
Why hybrid work is leading to cybersecurity mistakes
Why Students Are at Risk of Data Breaches (and How to Protect Them)
3rd June
5 tricky PayPal scams going after your money
40% of enterprises don’t include business-critical systems in their cybersecurity monitoring
94% increase in ransomware attacks on healthcare organizations
A snapshot of India’s Cyber Threat Landscape
Accountability unclear as cybersecurity for federal dams falls short
Alarming Cyber Statistics For Mid-Year 2022 That You Need To Know
America's Cyber Command Accepts Initiating Operations in Support of Ukraine
Americans report losing over $1 billion to cryptocurrency scams
Attackers are leveraging Follina. What can you do?
Attackers Weaponize Vulnerabilities Days After Publishing
Atlassian fixes Confluence zero-day widely exploited in attacks
Australian CISOs worry about application vulnerabilities leaking into production
Australian pension provider falls for a phishing email, leaks PII of 50k members
Authorities Take Down SMS-based FluBot Android Spyware
Best way to protect your company’s information services? Have a plan in place first
By understanding unstructured data, companies can prevent attack risks and cyber insurance denials
Caja declares an institutional state of emergency due to hacks
Can Technological Advancement Fade Out VPN Usage in Cybersecurity?
Chicago Public Schools reports data breach five months after incident
China's draft cybersecurity rules pose risks for financial firms
Chinese LuoYu Hackers Using Man-on-the-Side Attacks to Deploy WinDealer Backdoor
ChromeLoader is Way More Dangerous Than the Average Browser Hijacker, Here’s Why
City of Alexandria investigating system hack
Combatting the malicious and unwitting insider threat
Conti reforms into several smaller groups, are they now more dangerous than ever?
Cost of living scam: Gmail, Outlook and Hotmail email users should be wary of HMRC fraudsters
Crypto Scams Have Cost Consumers More Than $1 Billion, FTC Says
Crypto Vultures Are Stealing Imaginary Land In The Metaverse: 3 Things To Know
Cybercriminals continue to prey on job-seekers in Philippines
Cybersecurity a key driver in local media coverage
Cybersecurity And Branding: Building Brand Trust In A World Of Cyber Threats
Data breach a major concern as universities struggle with cyber threats
Data Breaches Reported by Alameda Health System, Aon, and Capsule Pharmacy
East Tennessee Children's Hospital faces lawsuit after data breach
EMC National Life Company Announces Data Breach
Emotet Proved Too Effective for Threat Actors to Abandon
Endpoint Protection for Cloud-Native Workloads
Even Russia's Evil Corp now favors software-as-a-service
Evil Corp Pivots LockBit to Dodge U.S. Sanctions
Fake Updates Continue To Be A Digital Risk: What To Do?
FBI Thwarted ‘Despicable’ Cyberattack on Boston Children’s Hospital
Fear of ‘cyber capture’ amid rising cyber attacks
Five Steps to a Secure Cloud Architecture
Five ways to promote employee cyber awareness
FluBot Malware Strain Taken Down in Multi-Agency Effort
Forescout’s Vedere Labs reveals first proof of concept of ransomware for IoT (R4IoT)
Foxconn Confirms Ransomware Hit Factory in Mexico
GitLab Issues Security Patch for Critical Account Takeover Vulnerability
GitLab security update fixes critical account take over flaw
Hawaii unemployment insurance fraud scams increase via SMS phishing attacks
Health PEI employee data breached after laptop theft
Healthcare Cybersecurity: The Challenges of Protecting Patient Data
Healthcare sector hit by ransomware onslaught
Healthcare organizations face rising ransomware attacks – and are paying up
How can small businesses protect themselves from cyber threats?
How COVID-19 triggered a spike in cybercrimes in Australia
How Russian-Ukraine war changed the cyber threat landscape
How USB Drives Can Be a Danger to Your Computer
Hybrid work a calling for businesses to strengthen digital defences
Icare data breach due to ‘human error’, agency says
Importance of Cybersecurity in the Education Sector
Incident response for surviving a ransomware attack
Iran capital municipality computer system briefly hacked
Karakurt Team hits North America and Europe with data theft and extortion
Leaked Credentials are the Top Cause Of Data Breaches, But Not All Companies are Monitoring for it, Survey Reveals
Losses to cryptocurrency scams top $1B, FTC reports
Louisiana authorities investigating ransomware attack on city of Alexandria
Malware is now spreading via weaponized files circulating in data lakes, file shares
Microsoft Blocks Iran-linked Lebanese Hackers Targeting Israeli Companies
Microsoft disrupts Bohrium hackers’ spear-phishing operation
Microsoft disrupts Iranian-linked hackers targeting organizations in Israel
More than half of British Columbians are concerned about their data being hacked while online
Most software supply chains are vulnerable
Nearly 75% of companies suffer downtime due to DNS attacks
New ERMAC 2.0 Trojan Variant Actively Targeting Android Users
New Research Shows Nearly Four out of Five (79%) Organizations Faced Ransomware Attacks within the Last Year
New York Districts Warn About Mail Scam Alleging Data Breach
Nigeria: Federal Government queries Wema Bank over data breach, illegal accounts opening
Novartis says no sensitive data was compromised in cyberattack
Old Hacks Die Hard: Ransomware, Social Engineering Top Verizon Data Breach Investigations Report (DBIR) Threats – Again
One-third of defense contractors vulnerable to ransomware
Personal Data Breach – Implications and Consequences
Phishing: What is it, and how risky is it to use it?
Pivotal Homes reports ‘ransomware attack’ weeks before liquidation
Protecting the Three Dimensions of the Data Lifecycle
Protecting Your Business From Cyberthreats: A Guide For 2022
Ransomware actors have found a new way to make victims pay up
Ransomware Attacks on Healthcare Almost Doubled Last Year
Ransomware coming for IoT devices, researchers warn
Researchers Uncover Malware Controlling Thousands of Sites in Parrot TDS Network
Russian hacking gang Evil Corp shifts its extortion strategy after sanctions
Scammers taking advantage of hype over NFTs
Security researchers target bug bounties for cyber insights
Senators push for more frequent medical device cybersecurity guidance from Food and Drug Administration (FDA)
Shutterfly, Inc. Provides Notice of Data Breach to Additional Employees
Telegram’s Blogging Platform Comes Under Attack By Phishing Actors
The workplace revolution: turning security weaknesses into strengths
These Sinister Android Trojans Target Financial Apps With Over 1 Billion Downloads
This Microsoft Office exploit will make you rethink everything you know about web safety
Three Pillars For The C-Suite Playbook On Data Privacy: A Cyber Asset Perspective
Unpatched Atlassian Confluence zero-day exploited, fix expected today (CVE-2022-26134)
Urgent scam warning as fraudsters impersonate government to steal money
Verizon Data Breach Investigations Report 2022
Verizon Data Breach Investigations Report 2022: What’s Worth Acting On?
Vulnerability in DNA Sequencing Device Spotlights Health Care’s Weak Cyber Infrastructure
WatchDog hacking group launches new Docker cryptojacking campaign
Why Timely Response is Essential and How to Achieve It
Will a passwordless system give big tech companies too much power? The FIDO Alliance tries to make passwords obsolete
Zero trust leaders avert 5 cyber disasters per year on average
2nd June
4 Effects Of Evolving Technology On Cybersecurity
5 Bold Cybersecurity Predictions for 2022 and Beyond
45% of cybersecurity professionals have considered quitting the industry
Access Brokers and Ransomware-as-a-Service Gangs Tighten Relationships
Access brokers help boost cyber crime profits
After Microsoft And Nvidia, This Major Apple Supplier Became Ransomware Target
Aligning Leadership On Cybersecurity
Business’s Data May Be Vulnerable Under Proposed China Cybersecurity Rules
Cape Cod Regional Transit Authority’s (CCRTA) Hit with Ransomware Incident, Service Largely Unaffected
Chinese LuoYu hackers deploy cyber-espionage malware via app updates
Chinese LuoYu hackers deploy cyber-espionage malware via app updates
CISA Warns of Karakurt Extortion Group
Clipminer malware gang stole $1.7M by hijacking crypto payments
Connected digital tech means infinite attack surface
Conti Leaks Reveal Ransomware Gang's Interest in Firmware-based Attacks
Conti Ransomware Group: The Alliances Behind the Chaos
Conti ransomware group targeted Intel firmware tools
Conti ransomware targeted Intel firmware for stealthy attacks
Costa Rica public health service ransomware attack
Costa Rica's public health service disrupted by yet another ransomware attack
Critical Atlassian Confluence zero-day actively used in attacks
Critical flaw found inside the UNISOC smartphone chip
Cyber attacks in the manufacturing sector
Cyber-Attacks on Industrial Assets Cost Firms Millions
Cybercriminals Expand Attack Radius and Ransomware Pain Points
Cybercriminals look to exploit Intel ME vulnerabilities for highly persistent implants
Cybersecurity: this is the city with the most hackers in the world
Cybersecurity expert gives insight into timing of attack on Unified Government data centers
Department of Justice (DOJ) Role to Contain the Explosion of Ransomware
Digital and automated systems are targets of cyber attacks in 2022
Digital Identity: It’s Way More Important Than You Thought
Elasticsearch databases are being hit hard by ransom attacks
Email scam warning issued as fraudsters impersonate government and make enticing offer
Email Security: How To Protect Your Email From Hacking Attempts
Empathy: The Overlooked Ingredient in Cybersecurity
Employee training is best cyber crime protection
Evil Corp Affiliates Deploy LockBit Ransomware to Sidestep Sanctions
Evil Corp hackers evolve ransomware tactics to dodge US sanctions
Evil Corp switches to LockBit ransomware to evade sanctions
FBI Seizes WeLeakInfo, IPStress and OVH-Booter Cybercrime Portals
Five foundational elements of cyber resilience
Five Ways Shippers Can Shore Up Cybersecurity
Follina abuses Microsoft Office to execute remote code
Four ways cybercriminals can hack passwords
Foxconn confirms ransomware attack disrupted operations at Mexico factory
Foxconn confirms ransomware attack disrupted production in Mexico
Government Should Notify Data Breach Victims
Hackers Accessed Car Owners’ Personal Information in General Motors Credential Stuffing Attack
Hackers Exploiting Unpatched Critical Atlassian Confluence Zero-Day Vulnerability
HanesBrands Suffers Ransomware Attack
HanesBrands Suffers Ransomware Attack
HHS alerts to ongoing Emotet threat to the healthcare sector
How Business Insurance Can Protect Your Company After a Cyberattack
How Cloud SaaS Security Assessment Helps You Tackle Security Threats
How Do I Protect Myself From Cyber Threats?
How to ensure your printer or device is secure
How to Fix Common Data Security Mistakes
How to Prevent Ransomware: 5 Common Behaviors to Hunt
Illumina Cybersecurity Vulnerability May Present Risks for Patient Results and Customer Networks
Illumio calls for change as ransomware attacks cost Australian Businesses on average $250,000
Indian Ransomware Holds People's Data Hostage Until They Perform Three Good Deeds
INKY Identifies Telegraph as Platform for Phishing Campaigns
International Authorities Take Down Flubot Malware Network
Iran: Exiled MEK claims hacked 5,000 Tehran security cameras, dozens of municipality websites
Karakurt alert latest indicator that feds are worried about spin-off ransomware groups
Killnet: Analysis of Attacks from a Prominent Pro-Russian Hacktivist Group
Language-based BEC attacks rising
Majority of CIOs say their software supply chains are vulnerable, execs demand action
Martin University Announces Data Breach
Massive shadow code risk for world’s largest businesses
May ransomware attacks strike municipal governments, IT firms
Microsoft blocks Polonium hackers from using OneDrive in attacks
Microsoft Office apps are vulnerable to IDN homograph attacks
Millions of MySQL Servers are Publicly Exposed
Most CFOs, CEOs see cybersecurity gaps
New Research Shows Nearly Four out of Five (79%) Organizations Faced Ransomware Attacks within the Last Year
New York City Department of Education Bans Use of “Illuminate” Software Following Enormous Data Breach
No Organization Is Immune
Ontario Cannabis Store data breach raises credibility, security concerns
Owner of Dodge’s Southern Stores, D&H Company, Reports Data Breach Impacting Over 35k Consumers
Phishers Having a Field Day on WhatsApp, Telegraph
Ransomware attacks are wreaking havoc on Elasticsearch databases
Ransomware Attacks on Healthcare Organizations Increased 94%, According to Sophos
Ransomware gang now hacks corporate websites to show ransom notes
Ransomware hackers sidestep U.S. sanctions with a new trick: Rebranding
Ransomware roundup: System-locking malware dominates headlines
Researchers Demonstrate Ransomware for IoT Devices That Targets IT and OT Networks
Retailers amongst most targeted by cybercriminals
Rising Trends of Cyberattacks in Nigeria
Russia, backed by ransomware gangs, actively targeting US, FBI director says
Russian Hacking Gang Evil Corp Shifts Its Extortion Strategy After Sanctions
SAG-AFTRA Alerts Pensioners To Data Breach Of Horizon Actuarial Services That Might Affect Their Personal Information
Scammers Target NFT Discord Channel
Secrets in code make passwords vulnerable to hackers
SideWinder Hackers Use Fake Android VPN Apps to Target Pakistani Entities
Singapore banks take further step to tackle digital scammers
Singapore mandates 'kill switch' for banks as safeguard against online scams
Six ways to thwart malicious emails
Solving the Gen-N Security Dilemma
Somerset County still 'working through' ransomware attack with temporary solutions
The Day that Passwords Died (It’s coming soon, really!)
The EU’s Apple App Store crackdown ‘will fuel cyber attacks’
The Great Cybersecurity Resignation? Stressed-Out Pros Consider Quitting
The Top Five Sources of Data Breaches and How to Reduce Their Impact
The Zero Trust Approach to Data Management
This Runescape phishing scam could leave you seriously out of pocket
Top 10 Android banking trojans target apps with 1 billion downloads
Top Techniques for Cybersecurity Mitigation in an Organization
Turbulent Cyber Insurance Market Sees Rising Prices and Sinking Coverage
U.S. charges Venezuelan doctor with selling ransomware used by Iranian group
US confirms military hackers have conducted cyber operations in support of Ukraine
US government issues warning over ‘Karakurt’ data extortion group
What Comes from Requiring Local Government to Report Cyber Incidents?
What Companies Need to Know about the Strengthening American Cybersecurity Act (SACA)
What Is a Phishing Attack and How To Stop It
Why are Data Breaches so Expensive?
Why SMEs Should Worry About Cybersecurity in 2022
Why Stopping Business Email Compromise (BEC) Needs To Be A Priority For MSPs
Zscaler ThreatLabz 2022 Ransomware Report Reveals Record Number of Attacks and Nearly 120% Growth in Double Extortion Ransomware
1st June
5 Law Firm Cybersecurity Threats Solved with Legal Practice Management Software
5 Ways to Make Cybersecurity Fun
6 Lessons For Cybersecurity Leaders
33% of cybersecurity leaders name zero trust their top priority
46% increase in cyber attacks on SMEs in Saudi Arabia
Alameda Health System Reports Data Breach To HHS Affecting 90,000 People
Bad news: The cybersecurity skills crisis is about to get even worse
Browser-in-the Browser sextortion scam makes victims pay by imitating Indian Government
BT shares five ways to spot and avoid the most common online scams
Canadian organizations struggle to defend against ransomware
CISOs say ransomware is the least concerning threat to enterprises
Cloud computing security: Five things you are probably doing wrong
Connecticut Becomes Fifth US State to Enact Consumer Privacy Law
Conti Ransomware Group Voluntarily Shuttered, but Members Expected to Splinter off To Smaller Groups
Corporate Account Takeover: What It Is, and What To Do
Costa Rica’s public health system hit by Hive ransomware following Conti attacks
Countdown to Ransomware: Analysis of Ransomware Attack Timelines
Crypto Scams of the Week: MetaMask Phishing / Sextortion Attempt
Cyber Attack On Nigerian SMEs Up By 89%
Cyber attackers: if you can’t stop them, disrupt them
Cyber criminals selling thousands of university staff credentials on the dark web, FBI warns
Cyber-Warfare – Your People Are The Best Defense
Cybercriminals in 'concerted effort' to target South Africa's critical infrastructure
Cybersecurity experts weigh in after city of Portland data breach
DDoS threats growing in sophistication, size, and frequency
Don't let your cloud cybersecurity choices leave the door open for hackers
Email remains top cyberattack vector, more cybersecurity pros needed
Encryption: What it is, how it can help, and what to watch out for
Euro Cops Bust $47m Money Laundering Operation
Europol Announces Takedown of FluBot Mobile Spyware
Europol Confirms Takedown of SMS-based FluBot Spyware
Experts reveal the average ransomware attack takes just 3 days
FBI seizes domains used to sell stolen data, DDoS services
FBI says it thwarted Iranian cyberattack on Boston Children’s Hospital
Firms’ reliance on IT creates more cyber threats, Solicitors Regulation Authority (SRA) warns
FluBot Android malware operation shutdown by law enforcement
FluBot Android Spyware Taken Down by Global Law Enforcement Operation
FluBot takedown: Law enforcement takes control of Android spyware’s infrastructure
Gmail, Outlook and Hotmail email users warned over latest inbox scam
GoodWill ransomware dons Robinhood hat
GoodWill Ransomware Requires Victims to Do Good Deeds
Graham & Brown suffers major data breach
Hanesbrands Reports Ransomware Attack
How ransomware kill chains help detect attacks
How Scammers Try To "Phish" You Using Fake Regulator Email
How to Protect Your Business from Email Spoofing?
How To Push Past Polite And Bring A Security Mindset To Your Employees
Hundreds of Elasticsearch databases targeted in ransom attacks
Industrial IoT ransomware attacks control systems directly
Karakurt Data Extortion Group
List of data breaches and cyber attacks in May 2022 – 49.8 million records breached
Magniber ransomware now targets Windows 11 machines
Mayfield Heights-based Parker Hannifin facing class-action lawsuits over hack that exposed personal information of 119,000 employees
Microsoft Office zero day vulnerability discovered
Microsoft Releases Workaround for ‘One-Click’ 0Day Under Active Attack
Nearly Three-Quarters of Firms Suffer Downtime from DNS Attacks
New PoC Shows IoT Devices Can Be Hacked to Install Ransomware on OT Networks
New Unpatched Horde Webmail Bug Lets Hackers Take Over Server by Sending Email
New Windows Search zero-day added to Microsoft protocol nightmare
New XLoader Botnet Version Using Probability Theory to Hide its C&C Servers
Outlook, Hotmail and Gmail warning issued over rogue request
Pacemakers, insulin pumps can be hacked, experts say
Paving your path to Secure Access Service Edge (SASE): 4 tips for achieving connectivity and security
Pegasus Airline breach sees 6.5TB of data left in unsecured AWS bucket
Phishing incidents provide critical avenue for ransomware attacks, spur financial losses
R4IoT: When Ransomware Meets the Internet of Things
Ransomware Attack Disrupted SpiceJet’s Flight Operations Leaving Passengers Stranded
Ransomware attack recovery costs top $1.85M in healthcare
Ransomware attacks need less than four days to encrypt systems
Ransomware Group Claims to Have Breached Foxconn Factory
Ransomware hit 65% of organisations in Singapore
RuneScape phishing steals accounts and in-game item bank PINs
Second ransomware group attacks Costa Rica
SideWinder hackers plant fake Android VPN app in Google Play Store
Size does not matter in cyber attacks
Small businesses need cyber insurance now more than ever
Smart factories need smarter cyber defence
South Africa: Tax season is coming amidst a shocking rise in cybercrime
Survey Sees Greater Appreciation of Software Supply Chain Risks
Taking a data-driven approach to SOC operations
Taking An Enterprise-Wide Approach To Cyber Risk: How Understanding Trends And Responsibilities Can Strengthen Cyber Risk Resilience
Telegram’s blogging platform abused in phishing attacks
The Top 10 Personal Cyber Security Tips
Three security issues that should be top of mind right now
Twice as Many Healthcare Organizations Now Pay Ransom
Understanding What Cyber Insurance For Businesses Includes
Unofficial Micropatch for Follina Released as Chinese Hackers Exploit the 0-day
US city crippled by a ransomware attack pays £396,520 for a decryption key
US government: Paying Karakurt extortion ransoms won’t stop data leaks
Visualizing The 50 Biggest Data Breaches From 2004–2021
War in Ukraine Brings Out Scammers Trying to Exploit Donations
Watch out for phishing emails that inject spyware trio
What to do if you receive spam job offer via text message
Why cloud security matters and why you can't ignore it
Why cyber-security compliance should be an afterthought
Why Your Business Needs a Disaster Recovery Plan
Windows MSDT zero-day vulnerability gets free unofficial patch
YODA Tool Found 47,000 Malicious WordPress Plugins Installed in Over 24,000 Sites
31st May
3 Takeaways From the 2022 Verizon Data Breach Investigations Report
4 emerging threats in the domain name landscape
4 in 5 cyber attacks executed by organised crime
57% of all digital crimes in 2021 were scams
82% of CIOs believe their software supply chains are vulnerable
50,000 super fund members impacted by data breach
After Hive cyberattack, Partnership HealthPlan confirms data theft affecting 855K
Albany Bank & Trust Co. Reports Data Breach Following Data Security Incident
Australian National Disability Insurance Scheme provider breached and treating its database as compromised
Automation and Artificial Intelligence Are the Strategic Keys for an Effective Defense Against Growing Threats in the Digital World
Beware of scam emails claiming to be from Ofgem over energy rebates
Cheerscrypt Linux-Based Ransomware Targets VMware ESXi Servers
Chinese Hackers Begin Exploiting Latest Microsoft Office Zero-Day Vulnerability
ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats
Clearview AI fined over $8 million for data privacy violation
Compromised academic credentials available on cybercriminal platforms
Costa Rica May Be Pawn in Conti Ransomware Group’s Bid to Rebrand, Evade Sanctions
Costa Rica public health system targeted by ransomware
Costa Rica’s public health agency hit by Hive ransomware
Costa Rican Social Security Fund hit with ransomware attack
Cyber attack on Nigerian SMEs up by 89 per cent in 2022
Cyber Defense Confidence Ebbs as Ransomware Attacks Multiply
Cyber Security in Universities: The Top Threats and How to Defend Against Them
Cybercrime complexity drives changes in the CISO role
Cybersecurity and Decentralized Finance: 4 Key Points
Cybersecurity Automation: How Can Businesses Benefit From It
Cybersecurity Mesh: What It Is and Why You Need It
Delaware physician group latest spine practice to suffer ransomware attack
Digital commerce fraud: What it is and how to stop it
Digital Pharmacy Capsule Files Notice of Data Breach with Federal Government
Discord Is the World’s Most Important Financial Messenger, and a Hotbed for Scammers
Email breach costs Portland, Oregon, $1.4 million
EnemyBot Malware Targets Web Servers, CMS Tools and Android OS
Energy giants sign Cyber Resilience Pledge
FBI warns of Ukrainian charities impersonated to steal donations
Five ways to build holistic cybersecurity in the hybrid workplace
Four cryptocurrency cybersecurity risks and how to avoid them
Global Events Are Raising Cyber Risks for American Businesses
Global Phishing Incidents Increasingly Driven by Ransomware Gangs
'GoodWill' ransomware: How it entraps victims with unusual demand
'GoodWill' ransomware demands victims donate to charity
Hackers breached Canadian hospital network's servers, stole sensitive patient data
Hackers Hit Donation Account At Boys and Girls Club Of New Rochelle
Hackers Selling US Colleges VPN Credentials on Russian Forums
Hackers steal WhatsApp accounts using call forwarding trick
Hanesbrands discloses ransomware attack. It's unclear whether company paid the ransom
Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts
How Enterprises can Protect Their Digital Assets in 2022
How Metaverse Phishing Scams Work and How to Stay Safe
How to avoid scammers on the internet
How to keep your cloud storage data safe
How to protect your business data from cyber-attacks
India Home To Fourth-Highest Number Of Cybercrime Victims In The World
Interpol Arrests Alleged Head of BEC Cybercrime Syndicate
Investing In Cybersecurity Amid Rising Digital Threats
Is your business cyber secure?
It takes a community to fight cyber crime
Kanza Cooperative Association Files Notice of Data Breach After Cybersecurity Incident
Keep Yourself Cyber Safe – See How
Latest Mobile Malware Report Suggests On-Device Fraud is on the Rise
Legacy Fraud Techniques No Match For Cybercriminals Using ‘Weaponized’ Identity Credentials
Magniber Ransomware Now Targets Windows 11 Machines
Microsoft Acknowledges Zero-Day, Follina Office Vulnerability, Suggests Fix
Microsoft Confirms ‘Follina’ Office Zero Day Vulnerability
Microsoft shares mitigation for Office zero-day exploited in attacks
Microsoft zero day “Follina” demystified: What you need to know about CVE-2022-30190
Nation State Actors Target Vulnerabilities in Critical Infrastructure
National Disability Insurance Scheme (NDIS) case management system provider breached
New Ransomware Forces People to be Charitable to Get Their Data Back
New XLoader botnet uses probability theory to hide its servers
New York City schools ban use of Illuminate Education products after massive data breach
Nigerian Betting Site Bet9ja Suffers Cyber-Attack
Ohio data breach affects nearly 30,000 patients
Over 3.6 million MySQL servers found exposed on the Internet
Parker Hannifin Hit with Class Action Over March 2022 Data Breach
Passwords Stolen in Breach of New York Financial Disclosure System
Pegasus Airlines Leaked 6.5TB of Data in AWS S3 Bucket Mess Up
Pharmacy Delivery Service Hit With Class Action Over Data Breach
Psychological Assessment Resources, Inc. Announces Data Breach
Ransomware: Organizations are at risk today than ever
Ransomware attacked more last year than in previous five years
Ransomware attacks stabilise in April
Reducing the Risk
Russia nixes US charges against REvil defendants as cooperation fizzles
Russian Killnet cyber attacks begin on Italian-linked businesses
Secure your data online with these 8 foolproof ways and stay safe on the web
Security and Backup Alignment Critical to Ransomware Recovery
Security underpins digital transformation
Seven warning signs you need to upgrade your endpoint security
SideWinder Hackers Launched Over a 1,000 Cyber Attacks Over the Past 2 Years
Software Supply Chain Attacks are Skyrocketing
Study highlights a ‘dangerous disconnect’ within UK businesses when it comes to cyber resilience
The Future of Zero Trust in a Hybrid World
The State of Cyber Resilience: no progress in executive confidence
The value of cyber insurance for small businesses
There is no good digital transformation without cybersecurity
This Hacker Group Forces People to Do Good to Get Their Data Back
This zero-day Windows flaw opens a backdoor to hackers via Microsoft Word. Here's how to fix it
Three BEC Suspects Arrested in “Killer Bee” Sting
Trend Micro blocked and detected over 58 million threats in Egypt
Turkish Airline Exposes Flight and Crew Info in 6.5TB Leak
U.S. Department of Homeland Security and Ransomware: The Research Findings
UK Privacy Tsar: Stop Excessive Data Collection from Rape Victims
Ukraine Observed Nearly 14M Cyber Incidents in Q1 2022
US academic credentials advertised for sale in dark web forums
What AI can (and can't) do for organisations' cyber resilience
What is a cyber attack?
What should be done if you are affected by a bank phishing fraud
Why Companies Must Protect themselves from Data Breaches
Windows MSDT zero-day now exploited by Chinese APT hackers
Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190)
Zero-trust-washing: Why zero trust architecture is the framework to follow
30th May
5 key frauds in the travel and tourism industry
5 reasons why GDPR became a milestone for data protection
6 Steps to Ensure Cyber Resilience
7 easy ways to improve your online security for free
10 Email Server Security Best Practices to Secure Your Email Server
$39.5 billion lost to phone scams in last year
50k customers caught up in Spirit Super phishing attack
75% of phishing websites surpass Google chrome defenses
Adecco Group subsidiary Akka Technologies hit by cyber attack
AgTech revolution leaving sector prone to cyber risks
AI-ransomware attacks are creating havoc in different industries - maybe there is time limit for AI expertise
All cars will be connected to the internet ‘by 2026’ - Expert tips to stop hackers
Anonymous Claims Attacks Against Belarus for Involvement in Russian Invasion of Ukraine
Avertible risk
Beware the Smish! Home delivery scams with a professional feel
Cert-In warns users about mobile-based malware and methods employed to infect devices
Check your Google NOW – someone might be watching everything you do
Common Cybersecurity Terms That Are Often Confused
Corporate Divorce: How Companies Can Prevent Multimillion-Dollar Data Breaches
Cryptocurrency Spams Grow By Over 4000% In The Last Few Years
Cyber cover worth paying for? 58% say yes, survey finds
Cyberattacks on Australian Healthcare Doubles
Cybersecurity disclosure can make companies vulnerable to attacks
Cybersecurity tools you should be aware in 2022
Data breach at Australian pension provider Spirit Super impacts 50k victims following phishing attack
Department of Justice (DOJ) Says Cardiologist Created, Distributed Ransomware
EnemyBot Linux Botnet Now Exploits Web Server, Android and CMS Vulnerabilities
Fastly Study Shows Large Amount Of Aussie IT Companies Are Operating Under Threat Of Cyber Attack
Four key elements of a defense-in-depth cybersecurity program
Hacker Stole Verizon Employee Data, Holds It For $250,000 Ransom
Hackers are Selling US University Credentials Online, FBI Says
Hackers Found Selling Stolen University Credentials
Hackers’ Phishing Attack Cuts Off Moonbirds NFTs Worth $1.5 Million
Health care must bolster privacy, security efforts
Here Is The Importance Of Using Two-Factor Authentication
How can AI prove to be a game-changer in cybersecurity?
How Costa Rica found itself at war over ransomware
How ransomware attack on SpiceJet reveals gaps in our air safety
How the shutdown of a small college brings home the danger of ransomware attacks
How to Avoid Fraudulent Transactions in Your Online Business: Tips and Tricks
How To Eradicate Plaintext Data Breaches
How to Implement a Proactive Cyber Defense Strategy
How Wildcard Hacktivists and ‘Robin Hood’ Ransomware Groups Amplify Cyber Risk
ICS Security in Healthcare: Why Software Vulnerabilities Pose a Threat to Patient Safety
India Among Top Five Countries In Terms Of Victims Of Cybercrimes; Phishing Most Common Crime
Interpol Nabs 3 Nigerian Scammers Behind Malware-based Attacks
Is 3rd Party App Access the New Executable File?
Italy on alert over Killnet cyber attack threat
Italy warns organizations to brace for incoming DDoS attacks
JBS Foods cyber attack highlights industry vulnerabilities to Russian hackers
Key takeaways from Verizon's 2022 data breach report
Linux malware is on the rise - 6 types of attacks to look for
Look out for this malware that is targeting web browsers like Chrome
Microsoft Releases Workarounds for Office Vulnerability Under Active Exploitation
Microsoft to Roll Out Security Details to Older Azure Users
Mobile Threat Volumes Slump 58% in a Year
More than half of all cybercrimes were scams in 2021, claim Group IB
New Microsoft Office zero-day used in attacks to execute PowerShell
New WhatsApp OTP Scam Allows Scammers to Hijack Your Account
NHS Scotland must be on ‘high alert’ amid rise in ransomware attacks, warns cyber boss
Nigeria records 147% increase in password-stealing malware in three months
Online Bodyguards: The Security Behind Online Casinos
Online cyber security and the threats of modern technology
Protecting your data with multi-factor authentication
Putin horror warning over 'own goal' attack on UK coming back to haunt Kremlin
QR code malware: protect yourself and your family
Ramping up or shutting down? Cl0p ransomware gang’s puzzling resurgence
Researchers Warn of New Microsoft Office 0-Day Vulnerability “Follina”
Singapore’s OCBC Hit With SGD 330M Additional Cap Requirement Following Phishing Scams
Singapore’s OCBC told to reserve extra $240m after phishing scam
Small businesses in Kenya are still in danger, facing a 47% increase in Internet attacks in 2022
SMEs under cyber attack
Social engineering is top cyberattack method targeting financial orgs
Strong internal foundations are key to withstanding external threats
Study Warns That Shadow Code on External JavaScript Libraries Pose a Serious Supply Chain Risk
The evolving cybersecurity needs of organisations across the UK
The Growing Importance Of Endpoint Security In The Post-Covid World
The Importance of Securing Operational Technology
The most widespread methods of cyber-attack on individuals and companies in 2022
The Navarrese city councils have been down for 13 days: a ransomware has left the entire administration as it was 20 years ago
Third of UK Firms Have Experienced a Security Breach Since 2020
Three Nigerians arrested for malware-assisted financial crimes
Top 10 Cyber Threats in 2022
Twitter fined $150m for exploiting users' personal data
UK firms pay £3m in cyber ransom as Russian cybercrime surges
UK government seeks views on cloud, datacenter security
US Academic Credentials Displayed in Public and Dark Web Forums
Watch Out! Researchers Spot New Microsoft Office Zero-Day Exploit in the Wild
What makes for the most deceptive phishing attacks?
Why Botnets Are Becoming Difficult to Detect
Why businesses need to get serious about cyber
Why Healthcare IoT Requires Strong Machine Identity Management
Will Russia Launch a New Cyber Attack on America?
Zero-Day ‘Follina’ Bug Lays Older Microsoft Office Versions Open to Attack