Editor's Message

Welcome to DBD. On March 8th we celebrated our 4th Anniversary and the 1st Anniversary of our PRiSM application, officially endorsed by the SANS Institute. Despite recent personal issues that have impacted the amount of time I have been able to dedicate to both projects, I have been doing my best to keep everything as up-to-date as possible, and I would like to take this opportunity to thank everyone for their patience and support whilst I navigate through this very difficult time. Stay safe. :)



Monday 20 June 2022

Data Breaches Digest - Week 25 2022

Welcome to this week's Data Breaches Digest, a catalogue of links concerning Data Breaches and Cyber Security that were published on the Internet during the period between 20th June and 26th June 2022.


26th June

$52 billion lost to identity thieves in 2021

Alliance Physical Therapy Group Reports Data Breach

Apart from market malaise, crypto also facing a number of security risks

Beware of NFT scams: Rewarding, but highly risky

Canada: TD bank “card locked” scam hits Mississauga and Brampton residents

Cetera Financial Group Data Breach and Investigation

Clever phishing method bypasses MFA using Microsoft WebView2 apps

Covenant Care’s Data Breach Continues to Grow Across California

Cybercrimes rising in Kazakhstan

Electronic Frontier Foundation (EFF) cybersecurity head warns US women to delete their period tracking apps in post Roe v. Wade world

Experts fear Kremlin cyber attacks

Fake copyright infringement emails install LockBit ransomware

Hacker warning: Hillsborough-like disaster looms as cyber attack could lock stadium exits

How Do Spam and Spoofed Emails Impact Businesses?

How to Protect Your Remote Workforce from a Cyberattack

Indians Have Lost Up to INR 1,000 Cr In Crypto Scams So Far

Lethal drinking water, runs on banks and panic buying: What a real Undeclared War cyber attack could mean

LGBTQ+ community warned of extortionists abusing dating apps

New headache for cops: Cyber criminals buying personal data in bulk

North Korean Hackers Have Crypto In Their Crosshairs

North Korean Hackers Stealing from the Crypto World

Ransomware as a service creates cottage industry of cybercrime

Rethinking organizational cybersecurity strategy for corporations

Staying digitally secure in a digital world

The rise of cybercrime

Thousands of scam emails sent claiming to be from Dorset Council

Threat Intelligence Best-Practice Tips

Top 3 Green Dot Phishing Scams 2022: Fake COVID-19 Assistance, Security Alert, and Bonus Benefit Program

Two biggest cryptocurrency scams detailed — here's how to avoid

Why an effective data backup strategy is a vital protection against ransomware attacks

25th June

5 million Facebook accounts in danger! This phishing scam will steal your money - how it works

Another day, another crypto heist: Hacker steals $100 million from Harmony blockchain bridge

Appalachian Power email scam targets Roanoke-area residents

Automotive fabric supplier TB Kawashima announces cyberattack

DeepFake technology dupes Berlin, Madrid mayors into thinking they speak with Klitschko

DIY ransomware kits have created thriving cottage industry of cybercrime, Tenable research reveals

Drunk IT person loses USB stick with data half a million people

Floyd County School System Recovers Money Stolen in Recent “Scam”

Gartner: 8 Ways Cybersecurity Will Change Companies

Hackers Exploit Harmony’s Horizon Blockchain Bridge to Steal $100 Million

How should businesses protect themselves against new cyber attack threats?

In Singapore, three teens among eight charged with involvement in DBS phishing scam

Indian Investors Could Have Lost $128 Million to Fake Crypto Exchanges

It's Back: REvil Ransomware Makes a Return, Here's What to Do

Milton Keynes residents warned of text message scam that could steal bank details

NHS warns Brits of Covid text scam that could steal your bank details

Police Service of Northern Ireland (PSNI) investigate 'potential data breach'

Portugal: 13 convictions for phishing scams

PyPi python packages caught sending stolen AWS keys to unsecured sites

Ransomware attack caused ongoing Napa Valley College internet and phone system outage

Schools and hospitals at risk of ATTACK as outdated tech leaves them open to cyber strikes

The Philippines posts highest number of phishing in SEA

We're now truly in the era of ransomware as pure extortion without the encryption

What Is Conti Ransomware and What Makes It Different?

What Is Network Segmentation and How Does It Improve Security?

24th June

3 Keys to Preventing Ransomware and Lateral Movement Threats

5 best practices for cloud data protection

10 Effective Ways to Prevent Falling Victim to Smishing Scams

84% of orgs experienced an identity-related breach last year

A Phishy Breach

Attackers still exploit Log4Shell on VMware Horizon servers, CISA warns

Bank data breach exposes 1.5 million Social Security numbers

Beijing-backed attackers use ransomware as a decoy while they conduct espionage

Black Basta may be an all-star ransomware gang made up of former Conti and REvil members

Black Basta ransomware crew aiming for ‘big leagues’

Blockchain.com, Luno, and Cardano are the top-most phished crypto projects

CafePress fined $500,000 for breach affecting 23 million users

Carnival Cruise Pays $5M, Gives Up Insurance Licenses in New York Over Data Breach

Chinese Groups Use Ransomware As Lure For Cyber Espionage

Chinese Hackers Distributing Nim language Malware in SMS Bomber Tool

CISA: Hackers are still using Log4Shell to breach networks, so patch your systems

Conti Group Compromised 40 Firms in Just One Month

Conti ransomware finally shuts down data leak, negotiation sites

Crypto firm Harmony faces cyber attack, $100 Million in digital assets wiped out

Cyber attack on Apple & Android: Hacked by spyware!!

Cyber security threats “a major concern among East African CEOs"

Cybercriminals Hit Travel and Hospitality – Hard

Cybersecurity: What Can We Learn From The Social Sciences?

Despite known security issues, VPN usage continues to thrive

Digital Hygiene: How It Works And Why It Is Important

Don’t Be the Next Victims of a Data Breach: Protect Your Privacy with a Residential Proxy

Don't remove PowerShell: US, UK and NZ security agencies

Eight linked to DBS phishing scams charged with disclosing Singpass details, duping banks

Energy bill payers warned as phishing email scams on rise

Energy scams you need to be aware of as cost of living crisis bites

Facebook users issued urgent warning with 'five million accounts stolen and breached'

Fast Shop Brazilian retailer discloses "extortion" cyberattack

Fortnite accused of allegedly collecting Social Security Number and credit card info

Give Me Your Lunch Money: Ransomware Bullies Took $3.56 Billion From Schools In 2021

Google details commercial spyware that targets both Android and iOS devices

Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit Spyware

Google Warns Spyware Being Deployed Against Android, iOS Users

Hackers Are Still Exploiting Log4Shell Vulnerability, Warns CISA

Hackers Exploit Mitel VoIP Zero-Day Bug to Deploy Ransomware

How companies are prioritizing infosec and compliance

Importance of Using Strong Passwords, and Ways to Safeguard Your Passwords and Accounts

Indian crypto investors have lost $128 million due to fake exchanges and wallets

Iranian cyber-attackers trying, and so far failing, to create panic in Israel

ISPs Helping Attackers Install Hermit Spyware on Smartphones

Japanese man loses USB stick with entire city's personal details

Kaspersky: Every 7 in 10 phishing attempts in the Philippines are finance-related

Lawsuits in Wake of MCG Health Data Breach Start Piling Up

Lost USB with city residents' personal data found

MCG Health Data Breach Impacts 8 Organizations, 793K Individuals

MetaMask Crypto-Wallet Theft Skates Past Microsoft 365 Security

Mitel zero-day used by hackers in suspected ransomware attack

Multiple Backdoored Python Libraries Caught Stealing AWS Secrets and Keys

Nichirin's US subsidiary suffers a ransomware attack, switches to manual operations

Pape-Dawson Engineers, Inc. Announces Data Breach

Queensland government proposes mandatory data breach reporting for agencies

Ransomware attacks cost schools more than $3.5 billion last year

Ransomware Gang Uses Log4Shell

Ransomware Industry Earns $692M From Attacks

Ransomware-as-a-Service Is a “Self-Sustaining Industry”, Report Reveals

Reputational Cost of a Data Breach

Risky behavior reduced when executives put focus on identity security

Scalper bots are snapping up appointments for government services in Israel

Schools are prime targets for cyberattacks: Here’s what can be done to protect them

Shell, Amazon, Citizens Bank, Venmo, Netflix, USPS — Top Text & Email Phishing Scams of the Week

SIM Swaps, Other Crypto-related Crimes Set to Rise in South Korea

Singapore: 3 teens among 8 charged with involvement in DBS phishing scam

Singapore: 8 people linked to DBS phishing scams charged; offences include disclosing Singpass details for monetary gains

South Africa: Don’t fall victim to this monkeypox phishing scam

State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks

The Active Adversary Landscape In 2022

The psychology of phishing attacks

This new malware diverts cryptocurrency payments to attacker-controlled wallets

TridentCare Confirms Data Breach After Criminal Breaks into Office and Steals Hard Drives

UK's biggest housing association Clarion suffers cyber attack

University of Pittsburgh Medical Center (UPMC) settles data breach lawsuit for $450K

Unsecured APIs Could Be Costing Firms $75 Billion Per Year

US arm of Japanese automotive hose maker Nichirin pauses production after ransomware attack

US watchdog is worried cyber insurance won't cover 'catastrophic cyberattacks'

Very warns on delays as delivery partner hit by cyber-attack

What Is a Browser-in-the-Browser Attack and How Can You Protect Yourself?

23rd June

3 Trends from Verizon’s 2022 Data Breach Investigations Report

5 more organizations added to Eye Care Leaders attack total, now biggest PHI breach of 2022

5 Tips for Protecting Your Phone from Malware

37% of firms in India experienced a Cloud data breach in past year

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

2022 Trends in Wealth Management Cybersecurity

A look at Chainalysis’ Crypto incident response service

Access management issues may create security holes

Active Directory is an Active Vulnerability

Advanced Threat Protection: An Instantaneous Threat Killer Machine

Alliance Physical Therapy Group, LLC Confirms 2021 Data Breach Affected Tens of Thousands More People Than the Company First Thought

An Overview of Russian–Ukrainian cyberwarfare

Are organizations prepared for the shifting data privacy landscape?

As API Adoption in Healthcare Skyrockets, Cybersecurity Risks Follow

Atrium notifies patients of phishing attack

Attack methods using hybrid bots enable criminals to open mule accounts at scale

Automotive hose maker Nichirin hit by ransomware attack

Automotive hose manufacturer hit by ransomware, shuts down production control system

Avamere Health Services, LLC Announces Data Breach Impacting Skilled Nursing and Senior Living Employees

Avera, Newman Regional and more affected by the MCG Health data breach

Avos ransomware threat actor updates its attack arsenal

Brazilian retail giant confirms cyberattack after extortion group takes over Twitter account

Chainalysis Launches Crypto Crime Incident Response Program

Chinese APT Group Likely Using Ransomware Attacks as Cover for IP Theft

Chinese Hackers Distributing SMS Bomber Tool with Malware Hidden Inside

Chinese hackers use ransomware as decoy for cyber espionage

Chinese HUI Loader malware ups the ante on espionage attacks

Chinese Threat Actor Uses Ransomware as a ‘Smokescreen’ For Espionage

CISA: Log4Shell exploits still being used to hack VMware servers

CISA warns over software flaws in industrial control systems

CISA, US Coast Guard warn of Log4Shell attacks after 130GB data breach in May

Cloud Email Threats Soar 101% in a Year

Conti effectively created an extortion-oriented IT company, says Group-IB

Conti ransomware hacking spree breaches over 40 orgs in a month

Cyber insurers are starting to require lateral movement defense. Here’s why

Cybercriminals Use Azure Front Door CDN to Trick Users in Stealing Credentials

Diving into Zero Trust Security

Don’t Be in Jeopardy: Essentials for Keeping Your College or University from Becoming a Cyberattack Statistic

Don't block PowerShell, here's what to do instead

Dwell time in websites under attack increased by 36% in 2021

Email security threats are on the rise once more - are you protected?

Employees in Chichester are the biggest threat to company cyber security

Europol arrests nine suspected of stealing 'several million' euros via phishing

Facebook users issued urgent warning with 'five million accounts stolen and breached'

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

Find out Why Ransomware Attacks on Healthcare Organizations Increased 94% in 2021 according to Sophos

Flaws in Smart Jacuzzi App Could Be Exploited To Extract Users’ Data

Halfords suffers a puncture in the customer details department

How Is the Evolution of Bots Impacting the Threat Landscape?

If you are online, you are a cybersecurity risk

If you didn't store valuable data, ransomware would become impotent

Implementing Zero-Trust? Don’t Forget About Printers

In the era of ransomware, recovery has become as important as prevention

Indian Investors Suffer Massive Loss In Fake Crypto Exchange

Indians Have Lost $130 Million in Fake Crypto Exchange Scams

Indians Lost Nearly $128 Million to Fake Crypto Exchanges And Apps

Iranian Spear Phishing Operation Targeting US and Israeli Government Figures, Email Account Takeovers Lead to Impersonation Campaigns

Law enforcement agencies kill significant botnet

Law firms are a "fully radioactive class of risk"

Less Than Half of Organizations Have Open Source Security Policy

Lithuania warns of rise in DDoS attacks against government sites

Lockbit 2.0 accounts for 40% of May ransomware attacks

Log4Shell Still Being Exploited to Hack VMWare Servers to Exfiltrate Sensitive Data

Malaysia: Personal Data Breach At Government Agencies – What Measures Can Be Taken?

Malicious Windows 'LNK' attacks made easy with new Quantum builder

Maryland Amends Data Security and Breach Notice Obligations

MCG Health Faces Lawsuit Over Data Breach Impacting 1.1 Million Individuals

MCG Health Sued Again Over 2020 Data Breach

Microsoft 365 users may be overestimating platform’s security, survey warns

New MetaMask phishing campaign uses KYC lures to steal passphrases

New 'Quantum' Builder Lets Attackers Easily Create Malicious Windows Shortcuts

NSA warns against silly mistake in the fight against Windows malware

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

Open source security is rapidly becoming a major concern

OpsPatuk to be theme for Malaysia-based hacker group DragonForce's anniversary celebrations

Phishing Scams Roll Up Their Hands

Phishing Websites Hits $128M Jackpot in Indian Market

Privacy As A Growing And Changing Source Of Business Risk

Proofpoint warns of "dangerous" Microsoft 365 function

QNAP calls on users to update NAS devices immediately

Quick Endpoint Recovery From Ransomware Is Needed Even With Data In The Cloud

Ransomware Attacks Are Earning Big By Staying Under The Radar

Ransomware Cost US Schools $3.56 Billion in 2021

Ransomware, IP & data theft top concerns for Indian pharma firms

Ransomware-as-a-Service: Learn to Enhance Cybersecurity Approaches

Rate of IT security incidents grows with company size

Robinhood, PayPal, Others Sell Personal Data to Third Parties

Russia Steps Up Cyber-Espionage Against Ukraine Allies

Russian Cyberattacks on Ukraine Underscored By Microsoft

Russian hackers use Cobalt Strike and CredoMap malware against Ukraine

Scalper bots out of control in Israel, selling state appointments

Scam warning issued over ‘fraudulent’ Tesco gift card giveaway

Security pros increasingly plan to adopt MDR services in the next 12 months

Should the finance industry rethink cybersecurity with Secure Access Service Edge (SASE)?

Social Security Numbers Stolen in Flagstar Bank Data Breach

Spyware vendor works with ISPs to infect iOS and Android users

Tarmac warned over data breach

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

The Cyber Blind Spot That Makes Every Supply Chain Vulnerable

The Ins And Outs Of Insider Threats

The Philippines biggest target of phishing in Southeast Asia

The Rise, Fall, and Rebirth of the Presumption of Compromise

These hackers are spreading ransomware as a distraction - to hide their cyber spying

ToddyCat: an advanced threat actor targets high-profile entities with new malware

Top 10 Cybersecurity Lingoes to Keep a Tab on in 2022

Trend Micro report highlights major cyber risks for organisations

University of Pittsburgh Medical Center (UPMC) Reaches $450K Settlement in Healthcare Data Breach Lawsuit

University of Pittsburgh Medical Center Settles Data Breach Lawsuit for $450,000

US passes bills to foreground national cybersecurity

Vishing scams are on the rise and Interpol is cracking down

Which States Have Cybersecurity Task Forces?

Why think tanks are such juicy targets for cyberspies

Why You Need to Get on the Zero Trust Network Access Express Lane

Xi'an university suffers cyber attacks from overseas

Yodel cyber attack: Courier deliveries and online services disrupted

Yodel Hack Leaves Millions Waiting for Parcel Deliveries

Your email is a major source of security risks and it's getting worse

22nd June

4 ways to streamline security operations centers

5 Ways to Solidify Organizational Cybersecurity Compliance

7 Cybersecurity Best Practices for Financial Services Firms

7 in 10 phishing attempts in The Philippines are finance-related

11 hospitals, health systems that experienced data breaches in June

37% of firms in India experienced a Cloud data breach in past year

90 Degree Benefits Reports Data Breach Affecting over 163,000

A good anti-ransomware strategy is at the heart of Digital Transformation

Almost 70% of email scammers leave the 'subject' line empty

Ameriprise Financial, Inc. Announces (Another) Data Breach

API insecurity costing the US billions annually

Authorities Suspect Cyber Attack Behind False Rocket Sirens in Israel

Banking scams are wreaking havoc in Singapore and Malaysia, why?

Beware!! New Voicemail Phishing Attack That Aims to Steal Office365 Login Credentials

Blind trust in open source security is hurting us

Can You Predict a Cyber Attack Before It Happens?

Capital One hacker convicted in a US Court for stealing the PII of 100m people

Chainalysis launches reporting service for businesses targeted in crypto-related cyberattacks

Chinese hackers target script kiddies with info-stealer trojan

Class Action Lawsuit Filed Against MCG Health for Massive Data Breach

Critical PHP flaw exposes QNAP NAS devices to RCE attacks

Cyber attack blamed for computer outage at University of Windsor

Cyber attack trend increases significantly, one attack in 9 seconds

CyberRes Reveals Digital Value Chain Attacks on a Rapid Rise with Ransomware Victims Nearly Doubled Year over Year

Cybersecurity priorities for digital leaders navigating digital transformation

Daycare apps may expose children, parents to data breach risk

Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture

Elusive ToddyCat APT Targets Microsoft Exchange Servers

Embracing the modern work culture with the Zero Trust Security Model

Euro Cops Dismantle Multimillion-Dollar Phishing Gang

Europol Busts Phishing Gang Responsible for Millions in Losses

Fake adverts: how to spot them and protect yourself

Fake Crypto Exchanges Dupe Indians Out of $128M; Binance Stresses Investor Education

Fewer new ransomware families could mean a chance to disrupt cybercrime activity

Fifteen Years of Data Breaches – What’s New and What’s the Same

Flagstar Bank data breach compromised the personal data of 1.5m customers

Flagstar reports data breach affecting 1.5 million clients

Food and beverage: still a prime target

Here’s Why You Keep Getting Password Reset Emails and How to Avoid it

How Decentralized Identity Will Boost Web 3.0

How Europol busted phishing gang responsible for millions of losses

How instant messaging platforms became a venue for phishing attacks

How Threat Actors Weaponize Your Trust

How to keep your NFTs safe from scammers

IDC Study Highlights Need for Continuous Data Protection

Identity-Related Breaches Hit 84% of US Firms in 2021

Is Cyber Breach Insurance part of your Cybersecurity roadmap?

Kaspersky detects nearly 200 000 phishing attacks targeting crypto

Machine Learning Tackles Ransomware Attacks

Maintaining cybersecurity as digital identities expand

Maryland Amends Data Security and Breach Notice Obligations

MEGA fixes critical flaws that allowed the decryption of user data

Microsoft: Russia stepped up cyberattacks against Ukraine’s allies

Microsoft 365 Users in US Face Raging Spate of Attacks

NatWest files under whistleblower’s bed contain live customer data

New Zealand: Phishing most frequently reported cyber scam

Newly Discovered Magecart Infrastructure Reveals the Scale of Ongoing Campaign

NHS warns of scam Covid-test texts

Nichirin faces cyber attack forcing to shut down production

Nine suspects arrested for online fraud that trapped several Belgians

Organisations ‘wait for attack before defending themselves’, says security report

Organised crime group dismantled by Europol

Over 24 Billion Compromised User Credentials Circulating on the Dark Web Market

Overseas hacker group attacks email system of Chinese university; case filed for further investigations

Phishing gang that stole millions by luring victims to fake bank websites is broken up by police

Proofpoint dispels commonly held threat actor assumptions in new report

Protecting Yourself From Online Identity Theft Scams

QNAP issues patch for an RCE security vulnerability affecting PHP in NAS Drive management

Rainbow Bridge Falls Under Phishing Scam

Researchers Uncover Ways to Break the Encryption of 'MEGA' Cloud Storage Service

Revealed: The food manufacturers leading the way on cybersecurity

RSocks criminal botnet taken down

Russia's APT28 Launches Nuke-Themed Follina Exploit Campaign

Russian Hackers Exploiting Microsoft Follina Vulnerability Against Ukraine

Russian hacks remind free world it's time for cyber upgrade

Sensitive data from Indiana University Health patients breached by unknown perpetrators

Somerset County treasurer's office scammed. Here's what to know

Targeted voicemail phishing attacks hits specific US industries’ verticals

Tesco shoppers in Milton Keynes warned of scam that could see bank details stolen

The hidden cyber threats in health tech

The Million-Dollar Question: To Pay or Not to Pay Ransom?

The Philippines: Three ways to strengthen cybersecurity resilience in the country

The price of stolen info: Everything on sale on the dark web

The Risk of Multichannel Phishing Is on the Horizon

Third of schools lack cybersecurity policies, suggests survey

This Android Malware spies on your messages to steal your data

This could be a super-easy way to spot spam emails

Three Tips for Securing K-12 Student Data

Tips for Preventing Patient Data Breaches

Tools Every Company Needs to Avoid Data Breach Lawsuits

Top 5 data leakages in the crypto industry

Uh oh, malicious Windows shortcuts are making a return

UK: Potential tax demand scam using the Office of Tax Simplification (OTS) logo

Ukrainian organizations warned of hacking attempts using CredoMap malware, Cobalt Strike beacons

Ukrainian organizations warned of hacking attempts using CredoMap malware, Cobalt Strike beacons

Updated Emotet banking trojan more effective, proliferates through Excel macros

US: Health systems want government help fighting off the hackers

Watch for the five stages of social engineering

Watch for this fake voicemail notification trying to steal your Outlook password

Whaling Phishing Attacks: A Complete Guide

What Every Enterprise Can Learn from Russia’s Cyber Assault on Ukraine

What is rootkit malware and how to remove it from Windows PC and Mac

What, exactly, is cybersecurity? And why does it matter?

Why consumers need to be at the heart of your crisis response plan

Why cybersecurity needs to tighten up as cryptocurrencies plummet

Why organizations are keen on zero trust but are slow to adopt it

Yale New Haven Hospital Research File Implicated in Healthcare Data Breach

Yodel Cyber Incident Disrupts UK Deliveries

Yodel Cyber-attack: What Happened?

Yodel experiencing service disruption following cyberattack

Yodel hit by cyber attack

You’ve Been Warned: Overlook Security Basics at Your Peril

21st June

1.5 million customers impacted by Flagstar Bank data breach

5 Tips to Thwart Business Email Compromise (BEC) Attacks

6 steps to improve healthcare cybersecurity

60% of ransomware victims lost a client due to an attack

Acorda Therapeutics, Inc. Announces Data Breach Following Compromised Emails

After being breached once, many companies are likely to be hit again

Are retailer employees ready for today’s cybersecurity challenges?

Australia: It’s tax time and scams are everywhere. Here’s what to look out for

AvosLocker Ransomware Deployed in Log4Shell Attack

Baptist Medical Center notifies patients of data breach

BRATA malware has evolved to target online banking across Europe, researchers warn

Brooks County pays off hacker with tax dollars after ransomware attack

California man hacked into women's iCloud accounts, stole nude photos & blackmailed victims

Can Business Cybersecurity Protection Outlay Offset Cybercrime Insurance?

Choice Health Insurance Data Breach and Class Action Investigation

Cloud Infrastructure Cyberattacks: Research Reveals Key Trends

Complete Guide to Cyber Threat Intelligence Feeds

Comstar Ambulance Billing Service Cyber Attack and Data Breach

Critical National Infrastructure (CNI) leaders’ attitude to ransomware lackadaisical at best

Cyber attacks from within the open-source community

Cybercrime In California Is Increasing, But What Can You Do About It?

Cybercriminals sell access to companies via the Dark Web from $2000

Cybersecurity researchers face real-life threats

Delivery firm Yodel disrupted by cyber attack

Digital Value Chain Attacks on the Rise

DiversiTech Corporation Reports “Data Privacy Event” Impacting Names and Social Security Numbers

Ex-Amazon employee convicted over data breach of 100 million CapitalOne customers

Examining the Modern Attack Surface: Quantifying the Risks to Individuals and the Enterprise

Examining Zero-Day Attacks And How To Prevent Them

Facebook data breach could cost health systems millions

Fake voicemail notifications are after Office365, Outlook credentials

False Air Raid Sirens in Israel Possibly Triggered by Iranian Cyberattack

Feds Dismantle Russian Rsocks Botnet Powered by Millions of IoT Devices

Five benefits of industrial cybersecurity implementation

Flagstar Data Breach: Social Security Numbers From Over 1.5 Million Customers Reportedly Stolen

Forescout discloses 'OT:Icefall,' 56 flaws from 10 vendors

Former Amazon employee convicted of Capital One Data Breach

Former Amazon Employee Found Guilty in 2019 Capital One Data Breach

Hacker group RansomHouse threatens to sell Shoprite data

Harry Styles fan's data breach fears after receiving email with concert goers addresses still attached

Healthcare Is Now the Industry Most Targeted by Hackers: Here’s How Organizations Can Defend Themselves

How Cybersecurity Readiness Prevents SMBs from Fuelling Supply Chain Attacks

How Security Teams Can Overcome These Top Five Risk-Based Vulnerability Management (RBVM) Challenges

How the blurring of the “supply chain” opens your doors to attackers - and how you can close them

How to Defend Your Company on the New Frontier of Payment Fraud

How to stop malicious privileged user attacks

Icefall: 56 flaws impact thousands of exposed industrial devices

Indian investors duped of Rs 1000 crore to fake crypto exchanges

Insider Threats: How to Protect Your Business and Data From the Enemy Within

iPhone users targeted with new Apple Pay text message scam

Just $2k could buy cybercriminals access to your company

Kazakhstan Government Used Spyware Against Protesters

Lowering cybersecurity insurance premiums with managed security services

Magecart attacks are still around. And they are becoming more stealthy

May 2022 Healthcare Data Breach Report

Microsoft 365 Research Highlights Cloud Vulnerabilities

Mitigate Ransomware in a Remote-First World

Modern IT Security Teams’ Inevitable Need for Advanced Vulnerability Management

New Android banking malware disguises as crypto app to spread

New DFSCoerce NTLM Relay Attack Enables Hackers to Perform Windows Domain Takeover

New NTLM Relay Attack Lets Attackers Take Control Over Windows Domain

New ToddyCat APT group targets Exchange servers in Asia, Europe

New ToddyCat APT targets MS Exchange servers in Europe, Asia

New ToddyCat Hacker Group on Experts' Radar After Targeting MS Exchange Servers

Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack

One Million Facebook Credentials Compromised in Four Months by Ongoing Phishing Campaign

Only 8% of C-suite executives use MFA across a majority of apps, devices

Overconfidence in API security posture leaves enterprises at high risk

Patient information may have been illegally accessed at Kernersville Eye Surgeons. Practice discloses data breach

Phishing attacks are making a comeback

Phishing Attacks Broke All Records in the First Quarter of 2022

Phishing awareness training: Help your employees avoid the hook

Phishing gang behind millions in losses dismantled by police

Precision Eye Care, Ltd. Confirms Third-Party Data Breach as a Result of a Data Security Incident at Eye Care Leaders

President Putin’s Economic Forum Speech Delayed due to DDoS Attack

Preventative Approach Could Block 90% of Cyber-attacks, Research Finds

Privilege Escalation Attacks: Types, Examples and Defence

Prolific Russian botnet infrastructure taken down in international law enforcement operation

Ransomware is rife – are cryptocurrencies to blame?

Ransomware is stressing CISOs to breaking point

Researchers Disclose 56 Vulnerabilities Impacting OT Devices from 10 Vendors

Researchers Reveal 56 Operational Technology (OT) Bugs in "Icefall" Report

RIG Exploit Kit Now Infects Victims' PCs With Dridex Instead of Raccoon Stealer

Risk Assessments Aren’t Enough – Why You Need Threat Modeling

Robert Half International, Inc. Reports Data Breach Affecting Consumers’ Social Security Numbers

Russian government hackers hit Ukraine with Cobalt Strike, CredoMap malware

School Admin Shared Non-Public Details of Ransomware Attack with Private Company

Security Flaw In Strava, A Social Fitness App, Exposed Identities Of Israeli Soldiers At Military Bases

Sight Partners Physicians, P.C. Is the Latest to Be Affected By Eye Care Leaders Data Breach

Supply chain, ransomware vulnerabilities hit financial firms particularly hard

The C-Suite Is Optimistic About Ransomware. Are They Right?

The link between cyberattacks and war

These fake voicemail phishing emails want to steal your passwords

Uncovering Security Breaches

University accidentally leaks personal information of 15,000 students

US Bank Data Breach Impacts Over 1.5 Million Customers

US Department of Justice (DoJ) dismantles Russian botnet infra that hacked millions of devices

Voicemail phishing emails steal Microsoft credentials

Voicemail Scam Steals Microsoft Credentials

Voicemail-themed phishing attacks target organisations

What are the Methods of a Data Breach?

What data is most at risk of being leaked by ransomware gangs?

When ransomware hits your cloud, can your backup strategy recover?

Yodel blames cyber incident for disruption and parcel-tracking problems

Yodel ‘cyber incident’ bears hallmarks of ransomware, expert says

Yodel parcel company confirms cyberattack is disrupting delivery

Your money or your business: beating the ransomware threat

20th June

5 Reasons You Should Learn About Cyber Security

6 Greatest Cyber Threats to Construction Companies

9 Cybersecurity Challenges Companies Must Tackle Now

9 Years Jail for iCloud Phishing Scam Hacker Who Stole Nude Photos

ALPHV Ransomware Operators Pressure Victim With Dedicated Leak Site

Attackers could use Office 365 functionality to encrypt files on SharePoint and OneDrive

Australia: The ‘damaging’ myGov phishing scam catching out ‘unsuspecting’ Aussies

Baptist Health System Announces Data Breach Affecting Patients of Two San Antonio-Area Hospitals

Beware of Ransomware: Hacks to Stop Getting Hacked

BlackCat Ransomware That Breached Over 60 Organizations

Board members and the C-suite need secure communication tools

BRATA Android Malware Group Now Classified As Advanced Persistent Threat

BRATA virus, which erases Android devices, is becoming a chronic problem

Businesses Take Bigger Hit in Productivity After Ransomware Attack Than Ransom Payment Itself

Canada's Desjardins Settles Data Breach Lawsuit for $155M

Cisco tells customers to upgrade VPN routers or risk attack

Cyber attack: Gloucester council services still not back to normal

Cyber attack: Leaking data of lakhs of Indians priority of DragonForce

Cyber attackers spent median of 15 days inside victim networks last year

Data recovery depends on how good your backup strategy is

Do You Have Ransomware Insurance? Look at the Fine Print

Do you Use Adobe Products? Then you might be at a Risk of Cyber-Attack

Energy bill rebate alert over scammers posing as Ofgem

Experts publish ex-Soviet Republics’ cyber security index – Latvia on the same level as Ukraine

Eye Care Leaders (ECL) data breach affected multiple eye care providers & 2 million patients in the US

False rocket sirens in Jerusalem, Eilat might have been cyber attack

Five active ransomware gangs and their tactics (part one)

Flagstar Bank discloses data breach impacting 1.5 million customers

Flagstar Bank Reveals 1.5 Million Customers Have Been Affected by Data Breach

Former Amazon employee convicted of Capital One hack

Former Amazon Worker Convicted of Capital One Data Breach

Four Key Findings from the 2022 Cyberthreat Defense Report

Gloucester Cyber attack: Six months since Russian hackers brought city council to its knees

Google Chrome Extensions Could Be Used to Track Users Online

Google Chrome warning for MILLIONS – simple mistake means you can be ‘tracked’ online

Google Researchers Detail 5-Year-Old Apple Safari Vulnerability Exploited in the Wild

Government Institutions in India: A Popular Target for Hackers

Healthcare breaches on the rise in 2022

Healthcare Is Now the Industry Most Targeted by Hackers: Here’s How Organizations Can Defend Themselves

How hackable is your WiFi network?

How to check if your password has been stolen

How To Demystify the NIST Cybersecurity Framework

How to futureproof clients for successful cyber insurance

How to outwit scammers‘ latest ploys

How to protect your online financial data

How to spot an unsafe website in 5 simple steps

How To Tell If Your Instagram Account Has Been Hacked

Illuminate Education Data Breach Class Action Investigation

Inside North Korea’s global cyber war: The intersection of hacking and organized crime

Investigators Disrupt Giant RSocks Botnet

Iranian cyberattack may be behind false rocket warning sirens in Jerusalem

Ireland: Scammers pretending to be gardai and telling people their computer will be seized in bogus email con

Israel suspects Iranian cyber-attack behind false siren alerts

Jury Convicts Seattle Woman in Massive Capital One Hack

Kaspersky: Phishing attempts in Malaysia mostly target payment system

Keeping E-Commerce Stores Safe from Security Vulnerabilities

Many Operational Technology (OT) Security Incidents Result in Outages Posing Physical Safety Risk

MCG Health, company that provides support for IU Health, reports data breach

Microsoft 365 credentials targeted in new fake voicemail campaign

Microsoft Office 365 and Onedrive Vulnerability Still Open To Ransomware attacks

More than 81,000 Social Security Numbers Leaked in Quality Temporary Services, Inc. Data Breach

New 'BidenCash' site sells your stolen credit card for just 15 cents

New DFSCoerce NTLM Relay attack allows Windows domain takeover

One in 6 scams are related to crypto

Previously Undiscovered Team of State-Sponsored Chinese Hackers, Has Been Quietly Committing Cyber Espionage in the APAC Region for a Decade

Q1 2022 Phishing Threat Trends and Intelligence Report

QNAP Customers Hit by Double Ransomware Blitz

QNAP investigating new Deadbolt ransomware attacks

QNAP NAS devices hit by DeadBolt and ech0raix ransomware

Ransomware Attack on Shoprite Holdings: Important Reminder of Employees’ Role in Cybersecurity

Ransomware attacks: This is the data that cyber criminals really want to steal

Ransomware attacks rise but reseachers prove hackers aren't all genuises

Ransomware ring claims attack on Africa’s largest retail chain Shoprite

Regina Public Schools systems mostly back online after cyber attack

Simpson University Confirms Data Breach Leaked Information of More than 6,000 Students

Spyware Attack On Android Devices On The Rise

Suspected cyberattack triggers sirens in Jerusalem, Eilat

The actual cost of a breach – reputation, loss of customers, fines, suspension of business

The clear link between cyberattacks and war

The future of IoT ransomware – targeted multi-function bots and more cyberattacks

The hacker stole my homework — the education industry faces its greatest test

The Importance Of Securing Your Enterprise’s IT Systems From Cyber Threats

This phone-wiping Android banking trojan is getting nastier

Threat hunters adopt personas, leverage AI to gather intel in the Dark Web

US disrupts Russian botnet that 'hacked millions of devices'

Weller Truck Parts Reports Data Breach Resulting in More than 6,500 Leaked Social Security Numbers

What is a computer worm and how it is more dangerous than a virus

Why Hackers Are Winning the Ransomware Game

Why It’s More Important Than Ever for Accounting Professionals To Keep Sensitive Financial Information Secure From Cyberattacks

Who Is Legally Responsible for a Cyber Incident?