Welcome to this week's Data Breaches Digest, a catalogue of links concerning Data Breaches and Cyber Security that were published on the Internet during the period between 6th June and 12th June 2022.
12th June
Agriculture industry put on alert after series of cyberattacks
Are Passwords Really Enough?
Chinese-Linked APT Spying On Organizations for 10 Years
Conti's Attack Against Costa Rica Sparks a New Ransomware Era
Cyber security experts raise alarm over possible data breach involving millions of Malaysians
Do not fall for this PAN fraud; HDFC Bank issues alert to customers
Hello XD ransomware now drops a backdoor while encrypting
How to avoid job scams in the post-pandemic era
Iran's Mullahs Are Losing the Cyber War
Iranian Hackers Spotted Using a new DNS Hijacking Malware in Recent Attacks
Malaysia: Is our personal data security at stake?
Nigerian Police Bust Gang Planning Cyberattacks on 10 Banks
PyPI package 'keep' mistakenly included a password stealer
Singapore: At least 415 victims fall prey to parcel delivery phishing scams this year
The 10 Most Important Cybersecurity Statistics You Need to Know
The attacker’s toolkit: Ransomware-as-a-service
The Great Phishing Fail
The State of Security: Ransomware
Your browser stores passwords and sensitive data in clear text in memory
Yuga Labs and Bored Ape Yacht Club (BAYC) Co-Founder Raises the Alarm on Possible Attack on the Projects’ Social Media Accounts, Especially Twitter
11th June
5 Tips for Organisations to Stay Protected From Ransomware
2022 Cyber Attacks: What You Need To Know
A Chinese-linked APT called Aoqin Dragon operate in Southeast Asia, since 2013
Authorities Warn Of Cyber Attack On Ukrainian Media
Bluetooth Signals Can Be Abused To Detect and Track Smartphones
CERT-In flags vulnerabilities in Google Chrome, Mozilla Firefox browsers
Confluence servers hacked to deploy AvosLocker, Cerber2021 ransomware
Cybercriminal Steals 1 Million Facebook Account Details Over the Course of 4 Months
Data Breaches In Healthcare Can Put Lives At Risk
DBS bank phishing scams: 8 arrested
External and Internal Cyber Threats: How World Events Have Changed the Rules of Engagement
FBI, DOJ say less than 25% of NetWalker ransomware victims reported incidents
Hacker Tricked: World of Solana Community Reclaims Stolen NFTs
Hackers hijacked millions of Facebook messenger accounts
Has your smartphone been hacked? Here are nine tell-tale signs
How New Zealand businesses can safeguard against cyber threats
MIT Researchers Discover New Flaw in Apple M1 CPUs That Can't Be Patched
MIT researchers find new hardware vulnerability in the Apple M1 chip
Rising zero-click risks and how to defend your business
Shoprite warns customers of suspected data compromise
Singapore: At least $574k lost to phishing scams involving parcel delivery since January
South African Revenue Services (SARS) warns taxpayers that there has been a sharp increase in scams
South Korea: Man arrested on charges of exploiting data leak to steal digital assets
Think twice before scanning any random QR code
Urgent warning issued to BT customers to watch out for new email scam that could drain bank account in seconds
WiFi probing exposes smartphone users to tracking, info leaks
10th June
5 cyber threats facing the education sector
7 SMS messages from your “bank” that are probably scams
8 major cyber-attacks in Portugal so far this year
10 Tips for Securing Your Home Wi-Fi Network
13 Red Flags To Not Entrust A Company With Your Personal Data
700K Yuma Regional Medical Center (YRMC) patients impacted by data leak
Aesto Health, Aon PLC, Alameda Health System Suffer Healthcare Data Breaches
Azure Misconfiguration Leaves 30.5GB of Student Data Exposed
Be Cautious Before Clicking On Random Links: Cyber-Forensics Explains About Phishing Scams
Biolase Data Breach Class Action Investigation
BlackBerry discovers Symbiote malware, a highly evasive Linux threat
Building a Foundation for Zero Trust
By deploying modernized cloud security, the financial sector can better defend against ransomware
China is Exploiting Network Providers and Devices, Says US Cybersecurity Advisory
Compromised Email Account Leads to Data Breach at Private Client Services, LLC
Conti Ransomware Develops Proof-of-Concept Code for Firmware Attacks
Cybercriminals increasingly targeting cryptocurrency
CyberRes Reveals Digital Value Chain Attacks on a Rapid Rise with Ransomware Victims Nearly Doubled Year over Year
Data Breach at Health Care Organization May Affect 2 Million
Data of thousands of Indian and Israeli Students exposed in a breach
Digital resilience big concern for 95% of APAC businesses
Do Small Businesses and Startups Need to Worry About Cybersecurity?
Do software vendors care as much about security as you do?
Don’t break the chain: How to secure the supply chain from cyberattacks
Emotet malware gang re-emerges with Chrome-based credit card heistware
Employees ‘lose’ around two business days per year on spam
Facebook Was Hit By A major Phishing Scam
Federal Trade Commission (FTC) signals expanded breach notice obligations
Goblin Town NFT Fake Site Drains Wallets of Users of Venezuelan Paper’s Compromised Twitter Account
Hackers add fake names, prevent press registration for SD Republican Party Convention
Hackers exploit recently patched Confluence bug for cryptomining
Here’s the latest email phishing scam targeting employees
Home business entrepreneurs: The 6 best ways to prevent data breaches
How Geopolitics Impacts the Cyber-Threat Landscape
How Private Equity (PE) and Venture Capital (VC) Firms Can Protect Themselves (And Their Portfolio Companies) From Cyber Risks
How to Defeat a Zero Trust Architecture
How To Inspire Employees To Care About Cybersecurity
How To Secure WordPress Website From Cyber Attacks?
Identity-based Attacks and Living-of-the-land Tactics Represent Top Threats
Instagram users ALERT! Don't fall prey to phishing emails; here's how to stay safe
Iranian hackers target energy sector with new DNS backdoor
It’s Time For The C-Suite To Protect Themselves Against Cyberattacks
Job cuts hit cybersecurity industry despite surging growth from ransomware attacks
Learn About Passkeys, the No-Password Login Tech Coming to iOS 16 and Android
Medical Device Company Shields Leaks 2 Million U.S. Patient Data
Monkeypox the latest tool in the phisher’s tackle box
Mortgage servicers sued by borrowers for data breach
MRI provider sued over March data breach
New Cohesity research reveals a lack of collaboration between IT and security operations teams
New PACMAN hardware attack targets Macs with Apple M1 CPUs
Newspaper Twitter account hacked to promote Goblintown phishing scam
Only 9% of Australian orgs prepared for breach
Only 43% of security pros can respond to critical alerts in less than an hour
Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy
Passwords swapped for passkeys: What is it and why is it important?
Phishing Hits All-Time High in Q1 2022
Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto
Ping Identity Analyses Need of Passwordless Authentication as Companies See 925 Weekly Cyber Attacks
Potent Emotet Variant Spreads Via Stolen Email Credentials
Pyramid Consulting Group, LLC Experienced Data Breach Leaking Social Security Numbers of More Than 3,000 People
Radware Finds New Era of DDoS Attacks Dawning
Ransomware Gang Incorporates Website Defacement, Posts Ransom Notes to Public-Facing Websites
Ransomware hits New Jersey school district
Regulatory Rumblings Force Companies to Rethink their Ransomware Policies
Researchers Block Two Million Extortion Emails Daily
Researchers Detail How Cyber Criminals Targeting Cryptocurrency Users
Researchers Disclose Critical Flaws in Industrial Access Control System from Carrier
Researchers discover a new hardware vulnerability in the Apple M1 chip
Researchers Find Bluetooth Signals Can be Fingerprinted to Track Smartphones
Researchers unearth highly evasive “parasitic” Linux malware
Russia: Cyber-Attacks Could Escalate Military Conflict
Russian threats unlikely to stop US cyberattacks as part of Ukraine war
Scammers use every trick to steal your identity, financial information
Security Measures That Must Be Considered
Snake Keylogger climbing malware charts, says Check Point
Southeast Asia and Australia Orgs Targeted by Aoqin Dragon Hackers for Ten Years
State of the geopolitical cyber threat landscape
The Basics of Data Breaches
The Gmail and Hotmail spam email that could break your PC or laptop just by opening it
The importance of the human element of security
The Makings of a Million-Dollar Facebook Phishing Campaign
The never-ending ransomware assault against healthcare
The rise of text and phone scams and why you should worry
The True Cost of a Ransomware Attack
This weird ransomware can only be decrypted by going to the Roblox store
Top Five Fraud Tactics Employed By Online Scammers
Top ways to strengthen protection for IoT devices in Operational Technology (OT)
U.S. Water Utilities Prime Cyberattack Target
United Arab Emirates (UAE) well prepared to thwart ransomware attacks, report finds
University of Pittsburgh Medical Center data breach $450K class action settlement
US: Alaskans are the most scammed in the country losing $14.2 million last year
US Justice Department Accuses AT&T of Allowing Scammers to Use IP Relay Call System to Cheat American Merchants
Use of Agricultural Technology Opens Possibility of Digital Havoc
Using the random motion of electrons to improve cybersecurity
Vulnerabilities Targeting InfiRay Thermal Cameras May Result in Industrial Process Hacking
What A 650% Rise In Open-Source Software Targeted Hacks Is Teaching Us
What is an SQL Injection (SQLi) and How to Prevent It?
Which Online Threats Could Destroy Your Business?
9th June
2 million patients’ data exposed in cyberattack on New England health services provider
41% of Aussie businesses have endured a ransomware attack
90% of UAE organizations that suffered ransomware attack and paid ransom were hit a second time
A cybercriminal stole 1 million Facebook account credentials over 4 months
A Decade-Long Chinese Espionage Campaign Targets Southeast Asia and Australia
A focus on risk in software supply chain security
AdviceOne, LLC Announces Data Breach
Aon, PLC Announces Data Breach After Learning an Unauthorized Party Had Access to Its Systems for Over a Year
Bizarre ransomware sells decryptor on Roblox Game Pass store
Canada: Federal government may make reporting cyberattacks mandatory
Canada: National Defence looking at potential ‘impacts’ after cyberattack on military contractor
China-backed hackers breach 'major' telecoms firms
Chinese hacking group Aoqin Dragon quietly spied orgs for a decade
CISA warning: Hackers are exploiting these 36 "significant" cybersecurity vulnerabilities - so patch now
Cloud computing: Here's the security threat you should be most worried about
Crypto Industry Insiders Support Better Public-Private Collabs To Prevent Major Ransomware Attacks
Cuba Ransomware Is Back - With New Infection Techniques
Cyberattacks up for travel companies, consumers
Cyberextortion schemes increasing pressure to pay
Cybersecurity giant Mandiant denies it suffered a LockBit 2.0 ransomware attack in June
Cyberthreats and Cyberattacks: Global Trends, Ransomware Rates Revealed
Data, DNS Abuse and What to Do Next
Emotet malware detections surge 27-fold in first quarter
Even the Most Advanced Threats Rely on Unpatched Systems
Experts Decry Increase in Global Cyberattacks, Ransomware in 12 Months
Facebook phishing campaign nets millions in IDs and cash
Feds Forced Travel Firms to Share Surveillance Data on Hacker
Financial services saw a 35% increase in ransomware attacks in Q1 2022
Foundational Tips for Fighting Healthcare’s Top Cyberthreats
Fred Hutch announces data breach: Unauthorized party hacked into an employee email
Getting to grips with SaaS security
Ghana: Data Protection Commission halts University of Ghana (UG) School of Public health ‘nutrition research’ over data breach
Healthcare is most likely to pay the ransom
Healthcare Under Fire: Why Data Security is Critical to the Sector’s Long-term Prosperity
How AI will help combat ransomware and leaky cloud security
How cyber attackers use black hat SEO to gain access to information
How Poor Communication Opens the Door to Ransomware and Extortion
How to Find Out if Your Passwords Are Being Sold Online
How to Prevent Data Leaks?
How to Protect Your Email — Stay Safe from Spam, Malware, and Online Attacks
How to talk about ransomware so leadership will listen
How To Tell If a Ransomware Message Is Real or Fake
Huge Facebook Phishing Operation Targets Millions
Incident Of The Week: US healthcare group data breach affects two million
Is Cyber Essentials Enough to Secure Your Organisation?
Is Encryption a Defense Against Ransomware?
Know your phishing from your smishing
Laser Targeted: massive phishing campaign singles out clients of major Vietnamese banks
Leiters Inc. Data Breach Class Action Investigation
Lincoln College closure a testament to the threat posed by ransomware
More than 90% of cyberattacks are made possible by human error
Moving beyond usernames and passwords
MyEasyDocs Exposed 30GB of Israeli and Indian Students PII Data
New Jersey District Cancels Finals After Ransomware Attack
New Linux Malware Symbiote is "Nearly Impossible to Detect"
New MSDT 0-day Flaw ‘DogWalk’ Receives Free Unofficial Patches
New Symbiote malware infects all running processes on Linux systems
Newry, Mourne and Down council warns email cyber attack 'may have spread to others'
Nigeria: Government probes data breach in bank, betting firm
Now Windows Follina zero-day exploited to infect PCs with Qbot
Only 13.5% of IT pros have mastered security in the cloud native space
Over 11 million phishing emails blocked in Southeast Asia
Phishing at all-time high; 1 million attacks in Q1 2022
Preparing for the unexpected: 5 benefits of cloud disaster recovery
QR Code Phishing: A New Threat?
Ransomware Actors Leaning on DNS Tunneling
Ransomware Actors, Access Brokers Form Lucrative Relationships
Ransomware attack strikes City of Ellsworth
Roblox Game Pass store used to sell ransomware decryptor
Russian Radio Station Hacked to Broadcast Ukrainian National Anthem
Shields Health Care Group, Inc. Announces Massive Data Breach Impacting More Than Two Million People
Singapore: 8 people arrested for involvement in phishing scams targeting DBS customers
SMEs under cyber attack
Sophos uncovers latest cyber attack trends in Playbook report
SSNDOB Cybercrime Marketplace Seized in International Coordinated Operation
Summer holiday season fuels upswing of travel-themed spam
Symbiote: A Stealthy Linux Malware Targeting Latin American Financial Sector
Taming the Digital Asset Tsunami
Texas Tech University Health Sciences Center’s Eye Care Leaders experienced data breach in April
The cyber path forward for manufacturers
The most common exploit paths enterprises leave open for attackers
The Real Cost Of Cyber-Attacks: What Organizations Should Be Prepared For
This Facebook Messenger phishing scam may have trapped millions of users
This new Linux malware is 'almost impossible' to detect
Top three most critical areas of web security
Turkish flight operator Pegasus Airlines suffers data breach
Twice as Many Healthcare Organizations Paid Extortion After Ransomware Attacks, but Only 2% Recovered All Data
Use Gmail, Hotmail or Outlook? Be on the lookout for a new tax scam
Vice Society ransomware claims attack on Italian city of Palermo
Watch Out For SVCReady Malware In MS Word Documents!
What Is Account Pre-Hijacking and How Does It Work?
What Is Cyber Insurance And Why Do You Need It
Why advanced email protection is more important than ever
Why Cybersecurity Is The Springboard For Successful Digital Transformation
Windows Follina zero-day now being abused to infect PCs with Qbot malware
8th June
8 More Orgs Added to Eye Care Leaders EMR Data Breach Tally
12 months on, how the Colonial Pipeline attack has changed cyber security
Android security: Google updates fix these five critical vulnerabilities
APIs and cloud applications are CISOs’ greatest threats
As Conti attacks firmware, a flurry of new tools also pushes firmware security up the agenda
Attacker Dwell Time Surges 36% in 2021
Barely one-third of IT pros can vet code for tampering
Black Basta Ransomware Targets ESXi Servers in Active Campaign
Black Basta Ransomware Teams Up with Malware Stalwart Qbot
Bradford-based windows and doors firm Safestyle provides update following cyber attack in January
CISA exec: Lack of ransomware incident reporting is crippling defense efforts
CISA Reveal Chinese Hackers Tactics Targeting US Telecoms and Network Service Providers
Cloud data breaches are getting bigger and nastier
Comstar Ambulance Billing Service Confirms Unauthorized Access Resulted in Data Breach Impacting Over 69,000 People
Credential Harvesting: How to Identify & Eliminate Threats
CSA Survey Sees Shift Toward Zero-Trust IT Frameworks
Cuba ransomware returns to extorting victims with updated encryptor
Cyber crime: What is it and what can we do about it?
Cyber Security Giant Mandiant Denies Hacking Claims By LockBit Ransomware
Cybercrime Trend Toward Advanced, Structured Fraud Continues as Over Half of Incidents in 2021 Were Scams
Cybereason Survey Reveals the Extent of Ransomware Havoc
Cybersecurity threats in aviation
Data breach at health care organization may affect 2 million
Data Breach at Shields Health Care Group Impacts 2 Million Patients
Data Breach Now Affects 16 Eyecare Groups, 583K Patients
Double extortion ransomware pushes average payments close to $1 million
Emotet malware now steals credit cards from Google Chrome users
Experts say ransomware could be bigger threat for campaigns in 2022
Fake Windows Updates Trick Users Into Installing Ransomware
Final exams canceled in N.J. school district after ransomware attack cripples computers
Floyd County School District scammed out of nearly $200,000 in taxpayer funds
Four Best Practices For Ransomware Protection
Hackers are taking over Instagram accounts using phishing attacks — how to protect yourself
Healthcare has 650% increase in ransomware attacks
How Phishing Groups Are Exploiting the Trend Toward Online Surfing at the Kitchen Table
How to mitigate employee risk in remote work environments
How to protect your business from a supply chain cyber-attack
How to Recover From a Ransomware Attack
How Vulnerable Is Your Organization to the Growing Ransomware Threat? It May Be Time to Modernize Your Cybersecurity Approach
Intruder dwell time jumps 36%
Kaspersky blocks 11 million phishing attempts via emails in Southeast Asia (SEA)
Key privacy notice disclosures under comprehensive California, Colorado and Virginia laws effective 2023
Kmart issues urgent warning to shoppers over Nintendo Facebook scam
Leiters, Inc. Recently Learns of Data Breach Affecting Mail-Order Pharmacy Orders
Linux botnets now exploit critical Atlassian Confluence bug
Massive Facebook Messenger phishing operation generates millions
More than 90% of cyberattacks are made possible by human error
Most organizations that paid a ransom were hit with a second ransomware attack
New Emotet Variant Stealing Users' Credit Card Information from Google Chrome
New Jersey school district’s computer system crippled by ransomware attack
New Zscaler report finds ransomware continues to run amok
Nigeria: Federal Government investigates bank, BetNaija over alleged data breach
Nigeria: Federal Government probes two firms over alleged data breach
Novartis latest pharma to be targeted in cyberattack
NSA, FBI warning: Hackers are using these flaws to target VPNs and network devices
OnDeck Announces Data Breach Impacting Social Security Numbers and Financial Account Information
Palo Alto Networks Sees Rise in Ransomware Payments
Pandemic-related identity fraud: How serious is it?
Paying Ransomware Paints Bigger Bullseye on Target’s Back
Phishing: use of reverse tunnel services to avoid detection and shutdown increases
Poisoned CCleaner search results spread information-stealing malware
Q1 2022 DDoS and Application Attack Activity: An Overview
Qbot – known channel for ransomware – delivered via phishing and Follina exploit
Ransomware Greatest Risk to Supply Chain in Minds of IT Pros
Ransomware Payouts Can Be 'A Matter of Life or Death' but 'Don't Pay' Generally Advised
Ransomware Pressure Forces UK CISOs to Consider Quitting
Ransomware Trends Show Lockbit Most Active, New Tactics, Healthcare Hit Hard
Ransomware, botnets could plague 2022 midterms, NSA cyber director says
Recovery and resilience: CISO insights into the 2022 cybersecurity landscape
Researchers Warn of Unpatched "DogWalk" Microsoft Windows Vulnerability
Saskatchewan school systems vulnerable to cybersecurity threats, auditor's report says
Singapore: Police and DBS warn about SMS phishing scams
Smishing attacks surged exponentially in 2021
Stepn, A ‘Move-To-Earn’ Application Suffers Cyber Attack After Upgrade
SVCReady Malware Emerges in Phishing Campaigns
Switching Malware Helps Evil Corp Evade Ransomware Sanctions
Telegram Shared Personal User Data With German Authorities
The real-world repercussions of cyberattacks will usher in a security renaissance
Tips for Avoiding Ransomware Attacks for Your Business
U.S. Agencies Warn About Chinese Hackers Targeting Telecoms and Network Service Providers
Ukraine Successfully Defends Its Cyberspace While Russia Leans Heavily on Guns, Bombs
US and Euro Police Smash Cybercrime Marketplace
Warning over scam emails purporting to be from HMRC
Weak collaboration between IT and security teams opens doors to cyber-attacks
When your cloud is compromised by ransomware, can your backup strategy recover?
Why CIOs must lead on cybersecurity and become champions for zero-trust
Work Remains in Fight Against Ransomware
Zero trust segmentation eliminates 5 cyber disasters per year and saves $20+ million annually
Zero-day flaw in Atlassian Confluence exploited in the wild since May
7th June
3 Reasons Why API Security Issues Are Growing
5 Steps to Stronger Passwords
6.5TB of Sensitive Data Flies Away in Airline Cloud Data Breach
7 deadly NFT scams that are targeting brands
A third of organizations hit by ransomware were forced to close temporarily or permanently
Akamai Reports Massive Increase in Web Apps, API Attacks
Android June 2022 updates bring fix for critical RCE vulnerability
APWG 1Q 2022 Report: Phishing Reaches Record High; APWG Observes One Million Attacks in First Quarter of 2022
Attackers aren’t slowing down, here’s what researchers are seeing
Attackers Use Public Exploits to Throttle Atlassian Confluence Flaw
Bank of Jamaica (BOJ) engages banks after recent phishing, smishing, vishing attacks
Beginner’s guide to DMARC - Everything you need to know
Boards, CEOs demand software supply chain security improvements
Bored Ape Yacht Club Discord Attacker May Have Been Involved in Previous NFT Phishing Scams
Class action looms over NDIS third party data breach
Crypto Unable to Shake Reputation as Ransomware Tool in Senate Hearing
Cyber attack strikes the Municipality of Palermo; online services disrupted
Cyber crime: What is it and what can we do about it?
Cyber-Attack Surface "Spiralling Out of Control"
Cyberattack on a Massachusetts-based medical imaging company may have affected millions
Cybereason: Paying ransoms leads to more ransomware attacks
Cybereason Ransomware True Cost To Business Study Reveals Organisations Pay Multiple Ransom Demands
CyberRes Reveals Digital Value Chain Attacks on a Rapid Rise with Ransomware Victims Nearly Doubled Year over Year
Cybersecurity advisory warns organizations of Karakurt cyber extortion
Destructive malware, supply chain attacks rising
Eight arrests in Mallorca for phishing online fraud
Emotet Reemerges as Prominent Cyber Threat to Healthcare
Evil Corp Cybercrime Group Shifts to LockBit Ransomware to Evade Sanctions
Evil Corp Hacker Group Changes Ransomware Tactics to Evade US Sanctions
FBI Alert: Russian Hacker Forums Are Selling Security Credentials of Higher Education Institutions
FBI Seizes 'SSNDOB' ID Theft Service for Selling Personal Info of 24 Million People
Follina Exploited by State-Sponsored Hackers
Fred Hutchinson Cancer Center Announces Data Breach
Globe warns customers against new phishing threats, blocks 203 sites in Q1 2022
Google Publishes Monthly Android Security Bulletin, Patches Critical Vulnerabilities
Hackers are now hiding inside networks for longer. That's not a good sign
Hacking Scenarios: How Hackers Choose Their Victims
How to use AI in cybersecurity?
Humans and identity are constants in the ever-changing world of cybersecurity
Humans still weakest link in cybersecurity
Investigating the effects of bot cyberattacks
Lawmakers eye cryptocurrency laws to combat ransomware attacks
Linux version of Black Basta ransomware targets VMware ESXi servers
LockBit overtakes Conti as most active ransomware group so far in 2022
Microsoft seizes 41 domains tied to 'Iranian phishing ring'
Multi-factor Authentication: The Best Way to Verify User Identity
Multilevel Extortion: DeadBolt Ransomware Targets Internet-Facing NAS Devices
Nearly half of businesses had a cloud-based data breach or failed audit
Nearly half of organizations hit by ransomware lost business as a result
New ‘DogWalk’ Windows zero-day bug gets free unofficial patches
New IIoT ransomware exposes industry hardware vulnerabilities
New SVCReady malware loads from Word doc properties
Nigeria: Federal Government investigates Wema Bank, Bet Naija over alleged data breach
Online gun shops in the US hacked to steal credit cards
Online Perpetrators Steal Ethereum And NFTs From Yuga Labs Through Server Hack
Over half of organizations not effectively defending against cyberattacks
Phishing attacks will use powerful text generation, say machine-learning engineers
Prothena Corporation, PLC Confirms Recent Data Breach Following Compromised Employee Email Account
Qbot malware now uses Windows MSDT zero-day in phishing attacks
Ransom Payment Debate Is Reminder to Stick to Cybersecurity Fundamentals
Ransomware Attack on Costa Rica Spreads to Public Health System, Covid-19 Testing Results Taken Offline
Ransomware Attacks Are Completed 94% More Quickly Now, Suggesting Dangerous Trend
Ransomware Attacks Force Costa Rica To Shut Downs Its Computers: What Went Wrong?
Ransomware attacks have doubled in 2 years, report shows
Ransomware attacks setting new records
Ransomware strategies – preparing for an attack
Researchers Warn of Spam Campaign Targeting Victims with SVCReady Malware
Russian Ministry Website Hacked to Display “Glory To Ukraine” Message
Sanctions Take Toll on Laundering Tools Used by Ransomware Gangs
Shields Health Care Group data breach affects 2 million patients
Smishing and Vishing Attempts Surged in 2021
Spotlight on MITRE ATT&CK: Understanding the DNS Attack Surface
Surfshark, ExpressVPN pull out of India over data retention laws
Sussex Police issue warning over rise of fraudulent text scams
The Chief Data Officer's Key Role in Fighting Ransomware
The Ian Martin Group Announces Data Breach Leaking Social Security Numbers of More than 15,000 People
The necessity of privacy and security laws in Africa
Trackers Say Sanctions Against Crypto Exchanges Are Working in Ransomware Fight
US: Chinese government hackers breached telcos to snoop on network traffic
US Lawmakers Take on Crypto Ransom Payments
US seizes SSNDOB market for selling personal info of 24 million people
What we can learn from the leaked Conti ransomware group chats
Why paying a ransomware ransom is a bad idea
Why Phishing Is Still the Top Attack Method
Why you should worry about medical ID theft
6th June
10 Most Prolific Banking Trojans Targeting Hundreds of Financial Apps with Over a Billion Users
Apple: These are the sorts of apps we blocked from our App Store last year
Apple protected App Store users from $1.5 billion fraud last year
Are Vendors Failing in the Face of Open Source Cyberthreats?
Banking-related phishing scams on rise in Singapore
Being asleep at the wheel can prove costly
Brush up on phishing detection to prevent ransomware
CISA Warned About Critical Vulnerabilities in Illumina's DNA Sequencing Devices
CL0P Ransomware Activity Heats Up
Critical Vulnerability Found in Motorola's Unisoc Chips
Crypto Scammers Are Running Riot In Australia
Cyber-Attacks on Industrial Assets Cost Firms Millions
Cybercriminals continue to prey on Malaysian job-seekers
Cybersecurity should be more complex than 123456
Defense in Depth – Definition & Relation to Layered Security Approach
Demand for cyber risk insurance soars in Brazil
Different DDoS Attack Types: Know What They Are to Protect Yourself
Email domain spoofing and look-alike domains: Tips to spot fakes and prevent fraud
European Commission Acknowledges the Evolving Threat Landscape
FBI warning: This gang steals data for ransom, then makes harassing phone calls to pile on the pressure
Fintech Company Lower LLC Issues Notice of Data Breach
Gloucester Council IT Systems Still Not Fully Operational Six Months After Cyber-Attack
Goodman Campbell computer network attacked by hackers
GSM Roofing - Notice Of Data Breach
Hackers Claim Drug Data Theft as Reports Warn Health Sector
Hackers double ransomware attacks on healthcare organisations
Healthcare Is Vulnerable To Cybercrime - Consider This Data Protection Solution For Your Clients
Healthcare Organizations Struggle to Obtain Cyber Insurance Policies, Report Shows
How FBI Helped Thwart ‘Despicable’ Cyberattack on Boston Children’s Hospital
How has the UK response to ransomware worked?
How the Russia-Ukraine war makes ransomware payments harder
How to defend your school from cyber-attacks
How to Reduce Cybersecurity Risks for Truck Fleets
Italian city of Palermo shuts down all systems to fend off cyberattack
Kaspersky blocks 11 Million malicious mails in Southeast Asia (SEA) in 2021
KELA’s Ransomware Victims and Network Access Sales Report Finds 227 Ransomware Attacks Every Month in Q1 2022
Mandiant: No Evidence Of LockBit 2.0 Ransomware Attack ‘At This Point’
Mandiant: “No evidence” we were hacked by LockBit ransomware
Microsoft Seizes 41 Domains Used in Spear-Phishing Attacks by Bohrium Hackers
Mind the Gap: How Organizations Can Protect Their Valuable SAP Systems
NFT Scams and Phishing Attacks – Goblin Town Targeted
QBot now pushes Black Basta ransomware in bot-powered attacks
Rainier Arms, LLC Reports Data Breach Impacting the Credit Card Numbers of More than 46,000 Customers
Ransomware attacks have dropped. And gangs are attacking each other's victims
Ransomware attacks may be tough to stop, but here’s how to recover
Ransomware attacks on health organizations up by 94% in 2021 globally
Ransomware gangs now give victims time to save their reputation
Ransomware's ROI Retreat Will Drive More BEC Attacks
Researchers Warn Phishing Attacks Based on Reverse Tunneling on Rise
Russian Ministry Website Reportedly Hacked
Schools and Underwriters Do Their Cyber Security Homework; Since Remote Classes, $1 Million Ransomware Claims Have Become the Norm
Singapore: More scammers impersonating bank staff over the phone and via SMS to dupe victims
Small business cybersecurity: Avoid these 8 basic mistakes that could let hackers in
Somerset County Restores Email System Following May 24 Cyber Attack
State-Backed Hacker Believed to Be Behind Follina Attacks on EU and US
Texas Gulf Bank Confirms Data Breach Stemming from Unauthorized Access to Employee Email Accounts
The costs and damages of DNS attacks
Thousands of unprotected Elasticsearch databases are being ransomed
Traps for rogue ransomware attacks
Trojan Horse Malware Has Been On The Rise As New Report Issues Alarm For Mobile Banking Apps
UnionBank warns against phishing scheme through text messages
Unpatched Critical Flaws Disclosed in U-Boot Bootloader for Embedded Devices
Urgent Microsoft Office Security Alert: All Applications Vulnerable To Homograph Attacks
Washington's Labor and Industries has had a data breach – Is the government ever going to protect our data?
What Is Typosquatting? Spotting a Sting Site in 2022
Why your business needs data resilience in an unsafe world
Windows zero-day exploited in US local government phishing attacks